Untitled - University of Nebraska Omaha

Transcription

Untitled - University of Nebraska Omaha
-2-
APPENDIX 1 – INSTITUTIONAL SUMMARY .......................................................................5
APPENDIX 2 – COURSE DESCRIPTIONS ........................................................................... 27
APPENDIX 3 – FACULTY VITAE ....................................................................................... 353
APPENDIX 4 – CURRENT LIST OF SERIALS TITLES .................................................. 501
APPENDIX 5 – STRATEGIC PLAN FOR INFORMATION
TECHNOLOGY SERVICE .......................................................................... 503
APPENDIX 6 – COLLEGE OF IS&T SYSTEM OVERVIEW............................................ 529
APPENDIX 7 – ASSESSMENT DATA COLLECTION ...................................................... 605
-3-
-4-
APPENDIX 1 – INSTITUTIONAL SUMMARY
The Institution
University of Nebraska at Omaha
John E. Christensen, Chancellor
Type of Control
The University of Nebraska at Omaha is a comprehensive, public university located in the heart of
Nebraska’s largest city. It is the second-largest higher education campus in the state. UNO is part of the
University of Nebraska system, which also includes the University of Nebraska-Lincoln, the University of
Nebraska at Kearney and the University of Nebraska Medical Center.
The University of Nebraska at Omaha, with 471 full-time faculty members, offers approximately 100
baccalaureate degree programs and more than 60 masters and doctoral degree programs.
Undergraduate degree programs are offered in the colleges of Arts and Sciences, Business
Administration, Education, Fine Arts, Information Science and Technology, Public Affairs and Community
Service, and Division of Continuing Studies. Programs and courses also are offered in the College of
Human Resources and Family Sciences, the College of Engineering and Technology, the College of
Agriculture and Natural Resources, and the College of Architecture, which are administered by the
University of Nebraska-Lincoln. The College of Public Affairs and Community Service is administered by
the University of Nebraska at Omaha on both the Omaha and Lincoln campuses.
The University of Nebraska has a central administration with a President at the helm who reports to an
elected Board of Regents. Each campus including UNO has a chancellor who reports to the system
President. UNO is organized into five colleges (College of Information Science & Technology, College of
Fine Arts, Communication and Media, College of Public Administration and Community Affairs, College
of Education and the College of Arts & Sciences), with Deans who report to the Vice Chancellor of
Academic Affairs.
History of Institution
What is now the University of Nebraska at Omaha was founded in 1908 as the University of Omaha, a
private non-sectarian college, with a campus at 24th and Pratt Streets in northeast Omaha. The first
term of the co-educational college began in 1909, under the leadership of Dr. Daniel E. Jenkins, with
twenty students.
The movement to make the University a municipal institution began in 1929, and in May, 1930 the
citizens of Omaha voted to establish the Municipal University of Omaha. In the summer of 1930, the
Omaha Board of Education selected the first University Board of Regents who was inducted into office
-5-
on July 1, 1930. In January, 1931 the new Board of Regents took over the University of Omaha and its
properties.
The expansion of the Municipal University of Omaha in the early 1930s led to a decision to move the
campus to a 52-acre site southwest of Dodge and 60th Streets. In November 1936, the University
secured a grant from the Works Progress Administration which, together with some accrued building
funds, financed the construction of a Georgian-style building. This building, now called Arts and
Sciences Hall, was finished in 1938 and served as the sole campus building until the 1950s.
In July 1968, the citizens of Omaha voted to transfer all University property to the University of
Nebraska, and the former Municipal University of Omaha became the University of Nebraska at Omaha.
The University began rapid growth when it became a part of the University of Nebraska System.
Enrollment was 8,730 in the fall of 1967 which was the last year as the Municipal University of Omaha.
Three years later, enrollment was 13,185, a growth of 51 percent in the first three years as the
University of Nebraska at Omaha. Student enrollment for the fall 2003 semester is 14,959.
The Dodge Street campus has expanded from its original 52 acres to the current 158.5 acres at two
locations. On January 17, 1998 the Board of Regents approved a ground lease with Nebraska Housing I
Limited Partnership (with Century Development as the general partner) to provide 576 beds of student
housing at UNO. Six buildings and a club/office was completed for the fall 1999 semester and Scott Hall
was completed for the fall 2000 semester which provided housing for an additional 164 students. Scott
Village opened in fall 2003; total on-campus housing capacity is now 1,212 students. Groundbreaking for
The Peter Kiewit Institute of Information Science, Technology and Engineering began on September 10,
1997 and was open for the fall 1999 semester. This 147,797 square foot facility is located on the former
Aksarben property and is designed to meet present needs and has the flexibility to adapt easily to
breaking technologies of tomorrow. The building will house UNO’s College of Information Science and
Technology and the Omaha-based programs of UNL’s College of Engineering and Technology.
Student Body
With a student body of 14,959 undergraduate and graduate students, the University of Nebraska at
Omaha strives to treat each student as an individual. The UNO student population is a diverse mix of full
and part-time students, men and women, and traditional and non-traditional-age enrollees. Students
come from all walks of life, from business professionals to international students. Such broad
backgrounds and experiences enrich the classroom atmosphere. Ample opportunity is provided for
specialized study in terms of interest, talent and ultimate vocational objective. Thus, the University is
concerned that its graduates be good citizens who earn a better living and live a richer, fuller life.
The University, in addition to offering courses for college credit, designs training courses for thousands
of business and industrial employees; provides in-service training for elementary and secondary school
-6-
teachers; conducts television classes for college credit and sponsors a wide variety of conferences,
workshops, lectures, and fine art events to enrich the college credit offerings.
Opportunities for teaching and research abroad, coordinated by the Office of International Studies and
Programs, exist through the University’s network of sister institutions in Germany, India, Japan, Norway
the Philippines, Romania and Czechoslovakia, and through exchange programs with China, Austria,
Russia, Belgium and Mexico.
Regional or Institutional Accreditation
The University of Nebraska at Omaha is accredited by the North Central Association of Colleges and
Secondary Schools, and has programs which are accredited or approved by the National Council for
Accreditation of Teacher Education, the Council for Accreditation of Counseling and Related Educational
Programs, the National Council on Social Work Education, the Engineers Council for Professional
Development, Computing Accreditation Commission/Accreditation Board for Engineering and
Technology, National Association for Industrial Technology, the American Home Economics
Association(for undergraduate programs), the American Dietetic Association, the AACSB International –
the Association to Advance Collegiate Schools of Business, the National Association of School of Music,
the National Association of Schools of Public Affairs and Administration, the Educational Standards
Board of the Board of Examiners in Speech-Language Pathology and Audiology, the Commission on
Accreditation of Allied Health Education Programs (CAAHEP), the Council on Aviation Administration,
Association of Small Business Development Centers, and the American Chemical Society.
UNO’s courses are accepted for purposes of teacher certification by the Nebraska State Department of
Education. The Elementary School, Secondary School and Community Counseling programs are
accredited by the Council for the Accreditation of Counseling and Related Educational Programs
(CACREP), the national accrediting agency for Counselor Education programs.
Course credits from UNO are accepted by other member colleges and universities of the North Central
Association and by member institutions of other regional accrediting agencies
Personnel and Policies
Promotion and Tenure
In general, tenure-track junior faculty must be reappointed each year. Their portfolios are reviewed first
by a departmental committee consisting of all tenured faculty members within the department. This
committee evaluates the individual's performance as outstanding, above average, average, or belowaverage in the three categories of teaching, research, and service. In addition, a vote is taken on
whether to reappoint the individual. This evaluation and the vote, together with supporting arguments
and recommendations for the department chair and for the individual, are submitted to the faculty
member review and possible comments. Then the portfolios are submitted to the department chair.
-7-
The department chair writes a recommendation on whether to reappoint the individual or not.
Following the Department chair's review, the faculty member reviews the portfolio prior to its
submission to the College Personnel Committee, which similarly evaluates the faculty member's
accomplishments in teaching, research, and service, and votes on reappointment. The recommendation
of the Personnel Committee, consisting of three members each of the ISQA and CS departments, is then
reviewed by the faculty member, and then the portfolio is submitted to the Dean. Having received
recommendations from the committees, the department chair and the College Personnel Committee,
the Dean writes a recommendation to the Senior Vice Chancellor for Academic and Student Affairs, who
makes the final decision on reappointment. Prior to submission to the Vice Chancellors Office, the
faculty member is required to review and sign the portfolios.
The process for tenure and promotion is similar. Unless a faculty member has been hired on a "fasttrack" to tenure, he or she submits a tenure packet for review during the fall of the sixth year of
employment at UNO. The tenure packet is reviewed by the same committees and individuals as for
reappointment with the faculty member allowed the opportunity to review the portfolio after each
review and recommendation. The difference is that the departmental committee now consists only of
those individuals who have already received tenure. Each committee votes on whether or not to
recommend tenure and/or promotion. Rather than making the final decision in the case of tenure, the
Senior Vice Chancellor for Academic and Student Affairs makes recommendations to the Board of
Regents, which must approve each decision.
To be eligible for tenure, an individual must be evaluated as outstanding in either teaching or research,
and above average in the other. Service must be average or better. To help make this evaluation more
objective, the College faculty has approved the use of a scoring matrix to assist the committees in
evaluating the scholarly contribution of various elements of the tenure packet. This scoring matrix may
be made available upon request. This matrix is used as an aid in decision making, but does automate
the tenure decision. Committee members rely on their own judgments and letters of reference from
those outside the College who may be in a position to evaluate the faculty member's scholarly
contributions.
Depending on their professional experience prior to hire, a faculty member may be hired on a "fasttrack" tenure schedule, submitting a tenure packet in the fall of third year of employment.
Faculty Salaries
Each February, all faculty members must submit an Annual Performance Review report, which is used as
the basis for annual performance reviews by the Department Faculty, Department Chair, and the Dean.
The University of Nebraska at Omaha chapter of the American Association of University Professors in
their collective bargaining agreement with the faculty negotiates with the University the total dollars
that shall be used in determining salary increase for satisfactory performance. This is distributed across
campus on an equal increase for each faculty member who has achieved a satisfactory performance
rating.
-8-
The same Annual Performance Review report is used as the basis for determining merit salary
adjustments. Each year, the Senior Vice Chancellor informs the College of the availability of money for
merit salary increases which is determined from the amount specified in the Union Bargaining
Agreement less any promotion increases achieved by campus faculty during the
reappointment/promotion/tenure process. Each Department Committee reviews the annual
Performance Review Reports and categorizes each faculty member in the three areas of research,
service and teaching. The review is submitted to the department chairperson who then uses these
reviews to assist in assessing faculty performance. The chairperson determines categories based upon
department input and to determine merit salary increments which are submitted to the Dean. The
Dean reviews the recommendations and makes any adjustments that he deems appropriate and the
information is forwarded to the Academic and Student Affairs Office.
Faculty Benefits
The University of Nebraska has a workforce of approximately 13,000, including faculty and staff
members on campuses and in outreach locations throughout the state. As one of Nebraska's largest
employers, the University offers excellent benefits, tuition assistance for faculty and staff and their
families, a diverse multicultural work environment and access to tremendous cultural and education
opportunities.
The normal retirement age for all members of the University staff is 59 1/2 years. Employees may retire
at age 55 after 10 years of service with the University with earned annuity benefits computed on an
actuarially equivalent basis. An employee also may retire prior to the normal retirement age because of
physical or mental disability that prevents such employee from satisfactorily performing work. A faculty
member who is disabled because of physical or mental disability and who carries the University group
long-term disability income insurance may request a disability leave in lieu of a disability retirement.
Among the benefits in the Fringe Benefit Program offered to retirees and early retirees are group life
insurance with various age limits, group medical insurance (or health maintenance organization
participation) which includes prescription benefits, group dental insurance, and long-term care
insurance. The retired employee pays the entire premium for these insurance options.
The University of Nebraska provides employees a retirement plan for the purpose of accumulating
lifetime retirement income through participation in the Basic Retirement Plan. Participation is
mandatory at age 30 and optional at age 26 with two years of service. Both the employee and the
University contribute to the basic retirement plan based on a percentage of income on a pre-tax basis.
The employee chooses between two levels of participation: Tier 1 is 3.5 percent for employee’s
contribution and 6.6 percent for the University. Tier 2 is 5.5 percent for the employee’s contribution
and 8.0 percent for the University. All contributions, including those made by the University are vested
immediately in the employee’s name. Employees have the option to allocate contributions with TIAA-9-
CREF and/or Fidelity Investments in several investment categories. Accumulations can be accessed after
employment with the University is terminated and can be taken as a lifetime retirement annuity or as a
lump sum payment.
Employees may also participate in the Supplemental Retirement Plan (SRA) which establishes individual
annuity and/or custodial accounts for the purpose of supplementing the basic retirement plan. Any
employee, regardless of age or length of service, may enroll in the SRA. All contributions are made on a
pre-tax, voluntary basis and no University contributions are made to this plan. Participants may invest
with TIAA-CREF and/or Fidelity Investments. Accumulations can be accessed only after employment
with University is terminated and can be taken as a lifetime retirement annuity or as a lump sum
payment. In addition to the basic and supplemental retirement programs, the University also
participates in the Federal Social Security Program.
All retired faculty who have met the normal retirement regulations are also eligible for the employee
scholarship program. Retirees whose applications have been approved pay all normal admission and
matriculation fees. They shall also pay all usual course-related costs such as books and supplies. The
courses may be taken for credit or audit. The program allows tuition equal to the University’s residencytuition-charge-per-semester credit hours less $1.00 per semester credit hour. The program is limited to
not more than 15 credit hours in any 12-month period and is restricted to no more than 6 credit hours
per semester. The program also allows retired employees to be eligible for the Dependent Scholarship
Program which allows a spouse or dependent children to use the employee’s scholarship. Full-time
enrollment status is required for a dependent child to be eligible but not for a spouse and is limited to
undergraduate academic credit courses at any campus of the University of Nebraska.
Retired faculty has the same right to University non-academic facilities and services as full-time
employees. These include access and/or admission to University non-academic facilities, services,
intercollegiate athletic events, and fine arts programs.
-10-
Education Unit
The chief academic officer is Dr. Terry Hynes, Senior Vice Chancellor of Academic Affairs.
The complete hierarchy of the educational unit is provided in the following organizational
chart.
-11-
Credit Unit
We count the 50 minute meeting of classroom contact as equal to one contact hour and our semesters
are 16 weeks total which includes one week for finals and one week (5 days total) of non-class time
(Spring Break in the Spring semester and Fall Break and Thanksgiving Break in the Fall semester) which is
a total of 28 weeks of scheduled instruction between a fall and spring semester.
Instructional Modes
In addition to traditional on-campus instruction, the College of IS&T has been offering online or distance
education courses. The College of IS&T collaborates with the Division of Continuing Studies to offer
online degrees in a BGS in MIS and BGS in IT. The BS in MIS is only two or three courses from having
their program online. The following courses have been developed into an online offering:
Pre-requisites for BGS in MIS
*CIST 1100 – Introduction to Personal Computers
*CSCI 1400 – Introduction to Computer Programming
*CIST 2500 – Introduction to Statistics
*ISQA 3210 – Advanced Technology for Personal Productivity
Required Courses
*CIST 3100 – Organizations, Applications, and Technology
*CSCI 1620 – Introduction to Computer Science II
*ISQA 3300 – File Structures for Information Systems
*ISQA 3310 – Managing the Database Environment
**ISQA 4110 – Information Systems Analysis
**ISQA 4120 – Systems Design and Implementation
**ISQA 3400 – Business Data Communications
*CIST 3110 – Information Technology Ethics
*CIST 3600 – Information Security and Policy
*denotes the courses that have been developed and available for online offering
**denotes that these courses are under development and will be available Fall Semester 2009.
Several of these courses are offered only once a year or twice a year. For example, CIST 3600 is
offered Spring Semester during the daytime and an online course would be available for
evening students. Courses could alternate semesters between an in-person and online delivery
mode.
Grade-Point Average
For all programs in the College of IS&T, a minimum cumulative GPA of 2.5 is required for graduation. A
student must obtain a grade of C- or better in each class counted towards the degree.
-12-
Academic Supporting Units
The following departments teach courses that are required for the MIS major:
Department
College
Name and Title of Responsible Individual
Accounting
Economics
English
Mathematics
School of
Communication
Business Administration
Business Administration
Arts & Sciences
Arts & Sciences
Communication, Fine Arts, and
Media
Jack L. Armitage, Department Chair
Donald Baum, Department Chair
Susan Naramore Maher, Department Chair
Jack Heidel, Department Chair
Jeremy Lipschultz, School Director
Students are also required to take a co-requisite course, which may be chosen from either an ISQA
course or from one of the following departments:
Department
College
Name and Title of Responsible Individual
Finance, Banking,
and Law
Marketing and
Management
Business Administration
David Volkman, Department Chair
Business Administration
Phani Tej Adidam, Department Chair
Students also take Distribution requirements which include the Natural Sciences (Biology, Chemistry,
Physics, Geology, etc.), Humanities (History, Philosophy, Religion, selected English courses, Foreign
Languages, etc.), Social Sciences (Anthropology, Goodrich, Sociology, Psychology, Political Sciences,
selected subjects of communication, etc.), Racial minorities (Native American studies, Black Studies,
Latino/Latin American studies, etc.), and International dimension/or Women Studies. Most of these
courses are taught by the College of Arts & Sciences and some by the College of Communication, Fine
Arts and Media.
Non-Academic Supporting Units
<<Provide information about units that provide non-academic support to the programs being
evaluated, e.g., library, computing facilities, placement, tutoring, etc. Include names and titles
of the individuals responsible for these units>>
Criss Library
Dr. C.C. and Mabel L. Criss Library (http://library.unomaha.edu) serves as the primary source of
academic information for the University community through its collections, academic and reference
services, innovative and modern technology, exhibit and event programming and modern physical
-13-
facilities. A library staff liaison person is specifically assigned to the college of IS&T. In addition, the
college of IS&T has a faculty member who is a designated library liaison.
Primary contact: Nora Hillyer, IS&T Staff Liaison (nhillyer@mail.unomaha.edu; 554-2138).
PKI Career Resource Center
The Peter Kiewit Institute's Career Resource Center is dedicated to providing and facilitating unique
opportunities that will enhance your college career and allow students to graduate fully prepared to
enter their chosen profession well prepared for success!
Opportunities provided to students by the Career Resource Center include:
Internships with a large variety of business partners during the academic year and summer.
Internship include full/part-time internships, salaried and "for credit" internships.
Full-time employment opportunities following graduation.
Resume/cover letter development and assistance.
Mock interviews with business/industry representatives.
Networking opportunities with business/industry partners.
A library and other reading material.
An environment conducive to study and interaction with other students and staff.
Primary contact: Doug Bahle, Coordinator, Career Resource Center (dbahle@nufoundation.org;
554-2090)
UNO Career Center
The UNO Career Center (http://unoceo.unomaha.edu/) establishes and develops partnerships
with employers, the community, and alumni to assist students in exploring their career
possibilities. These partnerships provide students, alumni, and faculty with enhanced career
development and educational experiences. The career center offers various services including the
following:
-14-
Fairs & Exhibits
Career Preparation Workshops
Info Sessions & Tables
On-campus Interviews
Resume & Cover Letter
Job Search
Interviewing & Salary
Networking & Apparel
Self Assessment
Graduate School Advising
UNO CareerConnect
Primary contact: Michelle Perone, Director, UNO Career Center (554-3523)
Information Technology Services (ITS)
ITS provides customer service and free software through a site license program with Microsoft and
McAfee. They also offer a laptop loan program and support computer user rooms, labs and Internet
centers in multiple buildings on campus. ITS also provides training for a variety of computer programs
including MS Office, Lotus Notes, and Blackboard; supports distance education courses; and manages
campus servers and networks.
Primary contact: Lanyce Keel, Director, ITS (554-2020).
College of IS&T Systems Support
The members of the Systems Staff at the College of Information Science and Technology are dedicated
to providing quality support for faculty, staff and students. Support services provided by this group
include:
Software Installation and troubleshooting
Classroom server support
Printer Installation
Hardware Repairs
Backups
Website help
Technical specifications
Primary contact: Mike Grove, Director, Systems Support (mgrove@mail.unomaha.edu; 554-4392)
International Studies & Programs (http://world.unomaha.edu)
Since 1973, International Studies and Programs (IS&P) has developed and coordinated UNO’s
international projects, student and faculty exchanges, and the undergraduate program in International
Studies. IS&P serves as a focal point for the international mission of the university, cultivating global
-15-
awareness and expanding the international connections of the students and faculty of UNO and the
citizens of the State of Nebraska. IS&P provides outstanding programs and services for prospective and
currently enrolled international students, as well as all other UNO students, faculty and staff. IS&T
international students are serviced by IS&P staff advisors and are the first point of contact for all
applicants.
Primary contact: Merry Ellen Turner, Director of International Studies & Programs (554-2562;
mturner@mail.unomaha.edu)
UNO Writing Center (http://www.unomaha.edu/writingcenter/)
The Writing Center offers UNO students, faculty, and staff in all university divisions the service to work
with a writing consultant on any university-related writing project. This free service can be used to work
on assignments, resumés, business letters, or other projects. The center’s goal is to encourage students
to become effective, independent writers, rather than edit papers for you, the center helps student
develop the ability to edit their own work. A number of IS&T students use this center’s service.
Primary contact: Dorianne Richards, Director (554-3311; drichards@mail.unomaha.edu)
UNO Math and Science Learning Center
The Math-Science Learning Center (MSLC) is a place where UNO students can find the assistance they
need to conquer academic challenges in Math and Science. Model students serve as tutors,
supplemental instruction leaders and study group facilitators trained to assist their peers in achieving
academic success. The MSLC houses meeting alcoves, study/tutoring space, tutorial computers and
reserve study materials. It also offers academic consultation for students seeking to increase their
overall learning effectiveness and efficiency.
Primary contact: Dr. Dana Richter-Egger, Director
UNO Honors Program
The mission of the University of Nebraska at Omaha Honors Program is to provide an enhanced and
supportive learning environment responsive to the educational needs of highly able and/or
exceptionally motivated undergraduate students. This goal will be accomplished through participation of
faculty noted for excellence in teaching by providing small honor sections of regular courses,
interdisciplinary Honors colloquia, special seminars, and increased opportunity for undergraduate
research/creative activity. The University Honors Program is a program with its own budget with a
Director who is responsible to the Vice Chancellor for Academic and Student Affairs through the
Associate Vice Chancellor for Academic Affairs. The Director works closely with the University Honors
Committee to establish and review policies and procedures for the University Honors Program.
Primary contact: Dr. Rosalie C. Saltzman, Director (rsaltzma@mail.unomaha.edu; 554-4963)
-16-
Faculty Workload
<<Describe the faculty workload policy. Define what constitutes a full-time load>>
The University of Nebraska at Omaha and the college of IS&T has specific guidelines on faculty workload.
Teaching load per faculty member per term is based on a 12-hour equivalent workload. (Most courses
are taught as a 3-hour course.) Tenured and tenure-track faculty members on an average teach 6 hours
per semester with the additional 6 hours for research and/or service activities. Newly recruited faculty
members will have their teaching workload further reduced normally to give them opportunity to begin
their research (if recruited directly after receiving their Ph.D.) or an opportunity to continue their
research activities while acclimating to a new academic environment.
-17-
Not Now
Accredited
Not Now
Accredited
Now
Accredited.
Submitted for
Evaluation3
Offered, Not
Submitted for
Evaluation4
Now
Accredited
Administrative
Unit or Units
(e.g. Dept.)
Exercising
Budgetary
Control
Alternate
Mode
Off
Campus
Co-op
Program Title1
Day
Modes Offered2
Administrative
Head
Nominal
Years to
Complete
Table 1. Programs Offered by the Educational Unit
BS Computer Science X
4
Quiming Zhu
Computer
Science
X
BS Management
Information Systems
X
4
Ilze ZIgurs
ISQA
X
BS Bioinformatics
X
X
BS Information
Assurance
X
X
MS Computer
Science
X
2
Quiming Zhu
Computer
Science
X
MS Management
Information Systems
X
2
Ilze Zigurs
ISQA
X
-18-
List of the titles of all degrees offered by the education unit responsible for the programs being evaluated, undergraduate and graduate, granted by the institution. If there are
differences in the degrees awarded for completion of co-op programs, these should be clearly indicated.
1
Give program title as shown on a graduate’s transcript
2
Indicate all modes in which the program is offered. If separate accreditation is requested for an alternative mode, list on a separate line.
Describe “Other” by footnote.
3
Only those programs being submitted at this time for reaccreditation (now accredited) or initial accreditation (not now accredited) should be
checked in this column.
-19-
Table 2. Degrees Awarded and Transcript Designations by Educational Unit
Modes Offered
Program Title
1
Day
Co-op
Dept: Computer Science
2
Off Campus
Alternative
Mode
Name of Degree
3
Awarded
Designation on Transcript
4
Bachelor of
Science in
Computer Science
Major Computer Science
Dept: Information Systems
Quantitative Analysis
Bachelor of
Science in
Management
Information
Systems
Major: Management
Information Systems
Complete the table for all programs, as follows:
1
Give the program title as officially published in catalog.
2
List the mode for each program offered.
4
Indicate how the program is listed on transcript for each mode offered. If different designations are used, list on separate lines.
3
List degree awarded for each mode offered. If different degrees are awarded, list on separate lines.
-20-
The transcript of a Computer Science major would show the following information:
Current Academic Program:
Information Science & Technology
Bachelor of Science, Computer Sci
Major: Computer Science
The transcript of a Management Information Systems major would show the following information:
Current Academic Program:
Information Science & Technology
Bach of Science, Mgmt Info Systems
Major: Management Info Systems
-21-
Table 3. Support Expenditures
Information Systems and Quantitative Analysis
Fiscal Year
Expenditure Category
Operations (not including staff)
Travel
Equipment
(a) Institutional Funds
(b) Grants and Gifts
Graduate Teaching Assistants
Part-time Assistance
(other than teaching)
Faculty Salaries
2007-2008
2008-2009
2009-2010
25,480
26,048
34,808
17,786
34,808
17,786
0
0
0
45,234
7,976
47,686
915
47,548
945
1,356,993
1,553,708
1,615,708
2007-2008
2008-2009
2009-2010
293,154
69,818
356,258
74,305
370,508
71,333
11,432
0
0
314,150
217,828
189,767
87,485
197,357
90,984
3,735,088
4,117,042
4,420,273
College of IS&T
Fiscal Year
Expenditure Category
Operations (not including staff)
Travel
Equipment
(a) Institutional Funds
(b) Grants and Gifts
Graduate Teaching Assistants
Part-time Assistance
(other than teaching)
Faculty Salaries
Approximately 24% of total faculty salaries for their benefits are not included in Faculty Salary
figures.
-22-
Table 4. Personnel and Students
Information Systems and Quantitative Analysis
Year: __2008-2009___
HEAD COUNT
FT
PT
.6
0
13.4
0
Administrative
Faculty (tenure-track)
Other Faculty (excluding student
Assistants)
Student Teaching Assistants
Student Research Assistants
Technicians/Specialists
Office/Clerical Employees
Others
Undergraduate Student enrollment
Graduate Student enrollment
2
0
4
0
1
0
3
0
0
0
0
0
FTE
RATIO TO
FACULTY
.6
13.4
2.75
0
4
0
1
0
0
25%
0
6%
0
*The undergraduate student enrollment figures include Freshmen and Sophomores.
College of IS&T
Year: __2008-2009___
Administrative
Faculty (tenure-track)
Other Faculty (excluding student
Assistants)
Student Teaching Assistants
Student Research Assistants
Technicians/Specialists
Office/Clerical Employees
Others
Undergraduate Student enrollment
Graduate Student enrollment
HEAD COUNT
FT
PT
2.7
0
30.3
0
FTE
12
4
20
7
6
7.05
473
78
12.29
4
20
8.9
6.5
7.05
522
95
.29
0
0
1.9
.5
0
123
182
RATIO TO
FACULTY
2.7
30.3
9%
47%
21%
15%
17%
14%
6%
*The undergraduate student enrollment figures include Freshmen and Sophomores and
one Early Entry.
*Others
including
advising,
-23-
grant
writer
and
IT
Outreach
1st
Enrollment Year
rd
2nd
3
4th
26
5
31
10
34
3
42
5
26
1
40
7
35
4
29
11
35
7
34
3
42
5
53
16
34
10
40
12
44
15
46
17
61
19
63
29
43
28
41
18
39
29
57
41
50
53
80
49
5th
5
1
3
1
7
8
3
11
4
7
Total
Grad
CURRENT
Fall 2008
1
Fall 2007
2
Fall 2006
3
Fall 2005
4
Fall 2004
5
Fall 2003
Academic
Year
FT
08-09 PT
FT
07-08 PT
FT
06-07 PT
FT
05-06 PT
FT
04-05 PT
FT
03-04 PT
Total
Undergrad
Table 5. Program Enrollment and Degree Data
Information Systems and Quantitative Analysis
138
52
142
54
153
61
179
74
182
89
240
108
34
109
40
84
34
82
31
87
27
89
57
99
Bachelor
Degrees Conferred
Master
Doctor
50
35
45
57
27
11
68
38
94
26
78
52
Note: 08-09 Degrees Conferred will be made available during the campus visit in fall 2009.
st
The 1 year column includes some undeclared majors.
th
The 5 year columns reports special undergraduates and undergraduates enrolled in only a certificate program. Give official fall term
enrollment figures (head count) for the current and preceding five academic years and undergraduate and graduate degrees conferred during
each of those years. The "current" year means the academic year preceding the fall visit.
FT--full time, PT—part time
-24-
Other
Table 6. Faculty Salary Data1
Information Systems and Quantitative Analysis
Academic Year 2008-2009
Professor
2
157,544
152,439
147,334
Number
High
Mean
Low
1
Associate
Professor
9
129,304
99,299
85,929
Assistant Professor
3
108,130
105,355
100,000
Instructor
2
47,491
44,157
40,823
Chairs and segregated salary support is not included in these figures. The Instructor
column includes Instructors and Lecturers.
College of IS&T
Academic Year 2008-2009
Number
High
Mean
Low
1
Professor
9
157,544
113,261
94,797
Associate
Professor
14
129,304
99,485
85,929
Assistant Professor
8
108,130
98,742
82,994
Instructor
8
59,484
42,196
39,924
Chairs and segregated salary support is not included in these figures. The Instructor
column includes Assistant Instructors and Lecturers. Other column includes Senior
Community Service Associate, Senior Fellows, Senior Research Fellows and Senior
Research Tech Fellows. This does not include any faculty support from grants.
-25-
Other
8
158,327
71,416
57,757
-26-
APPENDIX 2 – COURSE DESCRIPTIONS
For each required or elective course in the program that can be counted in the curriculum being reviewed for
accreditation, include a two-page or three-page course outline, as indicated below, at this point in the Self-Study
Report. If your documentation does not exactly follow this format, be sure that all of the requested information
(if applicable) is present, and please in any case adhere to a common format for all course descriptions. If some of
this documentation is on-line (e. g., in an instructor’s web site), please give here the URLs for accessing any such
materials. These URLs should be made accessible to the visiting team as soon as the Self-Study is sent to them.
As described in Section H of the General Instructions for the Self-Study, the course outline for each required or
elective computing course in the program (including those that satisfy the IS Environment component of an
Information Systems program) must also be included in a display of course materials that is available for study at
all times during the evaluation visit.
-27-
-28-
CIST 1010 Foundations of Information Science and Technology
Department and Course Number
CIST 1010
Course Title
Foundations of Information Science and Technology
Course Coordinator
Ilze Zigurs
Total Credits
1
Date of Last Revision
10/12/08
1.0
2.0
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
An introduction to the information age; focus on foundations of information technologies,
problem solving, information system applications, and social issues. Also describes careers in
information related fields.
1.2
For whom course is intended.
This course is the first of six included in the College of IS&T’s new core curriculum. Core courses
are to be taken by students before moving into their major area of study in the college.
Foundations of IS&T is for all students coming into the college (i.e., new incoming freshmen,
transfers from other colleges and universities, and transfers from other colleges in UNO), as well
as students from other colleges who are interested in an overview of the broad topics in
information science and technology.
1.3
Prerequisites of the course (Courses).
There are no prerequisites for the course.
1.4
Prerequisites of the course (Topics).
None.
1.5
Unusual circumstances of the course.
This course is unique in taking an experiential approach to the discovery of information science
and technology. Students have the opportunity to find out what the College of Information
Science and Technology is all about – the main areas of study, the big topics in the field, and the
opportunities that are ahead. In-class exercises allow students to experience the “inner workings”
of information technology and get a first-hand feel for what they might do, so that they can make
informed choices for their careers as students and beyond.
Objectives:
List of performance objectives stated in terms of the student educational outcomes.
2.1
2.2
2.3
2.4
Understand the main areas of study in information science and technology.
Recognize and appreciate the range of career options in information science and technology.
Be able to find answers to questions during your career as a student here.
Know how to connect with faculty members in your areas of interest
-29-
2.5
3.0
Know how to connect with staff members who can help you accomplish your academic goals .
Content and Organization:
List of major topics to be covered in chronological sequence.
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
4.0
5.0
Description of College of IS&T; Foundation of information science
and technology fields
Foundations of bioinformatics; experiencing bioinformatics
Foundations of computer science; experiencing computer science
Foundations of management information systems; experiencing
management information systems
Foundations of information assurance; experiencing information
assurance
IT innovation and problem solving
Careers and career development in IS&T
Interdisciplinary issues in IS&T; Social impacts
2 hours
2 hours
2 hours
2 hours
2 hours
1 hour
2 hours
2 hours
Teaching Methodology:
4.1
Methods to be used.
The class is a mix of experiential exercises with discussion. Exercises are conducted in lab sessions
and follow-up discussion builds on what was learned in lab. Guest instructors are included to
expose students to a broad range of faculty in the college as well as some guests from industry.
Virtual learning environments and collaboration technologies expose students to leading-edge
methods for collaborative learning.
4.2
Student role in the course.
Students are asked to learn concepts through experiencing them, not to memorize lists and
specific content presented in class. In addition, they are required to apply these concepts in
discussion and exploration.
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
Students are continuously evaluated during the course. Each experiential exercise is preceded by
research on that topic and a short written assignment.
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
The final grade will be calculated as follows:
Component
Grading
Class attendance and participation in exercises 50%
-30-
Weekly written assignments
5.3
6.0
7.0
Grading scale and criteria.
The course is a pass-fail course. Students must achieve at least 2500 out of 3000 possible points in
order to pass the course. Each weekly assignment is worth 100 points and each weekly class
attendance/participation is worth 100 points.
Resource Material
6.1
Textbooks and/or other required readings used in course.
There are no textbooks or required/suggested reading materials.
6.2
Other suggested reading materials, if any.
Current news articles as assigned.
6.3
Other sources of information.
The students are provided handouts of selected overheads presented in each class presentation
to help them to identify key concepts.
6.4
Current bibliography of resource for student’s information.
None
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
50%
Core
Advanced
8
Oral and Written Communications:
Every student is required to submit at least __15___ written reports (not including exams, tests, quizzes,
or commented programs) to typically __1__ pages and to make __0__ oral presentations of typically
_____ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as
well as for technical content, completeness, and accuracy.
9.0
Social and Ethical Issues:
Please list the topics that address the social and ethical implications of computing covered in all course
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded
on their understanding of these topics (e.g. test questions, essays, oral presentations, and so forth?).
One speaker per semester
-31-
10.0
Theoretical content:
Please list the types of theoretical material covered, and estimate the time devoted to such coverage.
No coverage
11.0
Problem analysis:
Please describe the analysis experiences common to all course sections.
One speaker per semester
12.0
Solution design:
Please describe the design experiences common to all course sections
No coverage
CHANGE HISTORY
Date
Change
By whom
6/24/03
ABET cleanup
Wolcott
10/12/08
Change to experiential exercises;
Zigurs
Update approach to evaluation to
having regular assignments over the
course of the semester;
Update course coordinator
-32-
Comments
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
CIST 1010
Foundations of Information Science and Technology
Ilze Zigurs
1
5/26/09
S – Strong relationship
X – Contributing relationship
Computer-based tools
Work on a team
Professional, legal, ethical standards
Model processes and data
Design, implement, evaluation IS
5.
6.
7.
8.
9.
X
X
S
X
X
X
X
X
X
X
X
X
13. Recognize need for prof. develop.
Communication
4.
X
12. Manage change
Analysis and design
3.
X
11. Manage IS within application env.
Knowledge of computing
2.
S
10. Manage projects
Local and global role of iS
Course objective
Understand the main areas of study in
information science and technology.
Recognize and appreciate the range of career
options in information science and technology.
Be able to find answers to questions during your
career as a student here
Know how to connect with faculty members in
your areas of interest
Know how to connect with staff members who
can help you accomplish your academic goals
1.
BIS Program Outcomes
X
X
X
X
X
X
X
X
-33-
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-34-
CIST 1100 Introduction to Computing
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
CIST 1100
Introduction to Personal Computing
Mary Levesque
3
10/13/08
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
This course is an introduction to program development using Visual Basic, Excel and
Access.
1.2
For whom course is intended.
Designed for majors in the College of IS&T and others required to take it as a pre-requisite
for CIST 1400
1.3
Prerequisites of the course (Courses).
None.
1.4
Prerequisites of the course (Topics).
None.
1.5
Unusual circumstances of the course.
There are no unusual circumstances for this course.
2.0
Objectives:
List of performance objectives stated in terms of the student educational outcomes.
2.1
2.2
2.3
2.4
2.5
3.0
Understanding of the program development cycle,
Create basic Visual Basic programs
Apply introductory user interface design practices
Create functional databases using Microsoft Access
Create and use Excel spreadsheets
Content and Organization:
3.1
Introduction to Spreadsheets –
3.1.1 Introduction to Microsoft Excel (4.5 hours)
3.1.2 Charts and Graphs in Excel (1.5 hours)
3.1.3 3D Workbooks and file Linking (1.5 hours)
-35-
13.5 Hours
3.1.4
3.1.5
List and Data Management (3.0 hours)
Exam (1.5 hours)
3.2
Introduction to Programming –
21.0 hours
3.2.1 CPU Fundamentals (1.5 hours, integrated with other topics)
3.2.2 Introduction to programming languages
3.2.3 Problem solving
3.2.4 User-interface design issues (1.5 hours)
3.2.5 Fundamentals of Visual Basic (3.0 hours)
3.2.6 Functions (1.5 hours)
3.2.7 Procedures (1.5 hours)
3.2.8 Decisions (4.5 hours)
3.2.9 Repetition (3.0 hours)
3.2.10 Files (1.5 hours)
3.2.11 Arrays (1.5 hours, if time allows)
3.2.12 Exam (1.5 hours)
3.3
Introduction to Database –
3.3.1 Introduction to Microsoft Access (1.5 hours)
3.3.2 Access Tables (3.0 hours)
3.3.3 Reports and Queries from a Data base (1.5 hours)
3.3.4 Miscellaneous (1.5 hours)
3.3.5 Relating Tables (1.5 hours)
3.3.6 Exam (1.5 hours)
-36-
10.5 hours
4.0
5.0
Teaching Methodology:
4.1
Methods to be used.
The course will be taught through lecture, discussions and demonstrations in the Visual Basic,
Access and Excel applications.
4.2
Student role in the course.
Students will be evaluated through programming assignments, Microsoft Application assignments
(written and computer) quizzes and three exams.
4.3
Contact hours.
3 hours
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
The grade will be based on a combination of quizzes, examinations, applications, and
programming assignments.
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
The grade will be determined from a weighted average that may resemble the following:
Component
Quizzes
Exams
Program assignments
5.3
Grading
10%
50%
40%.
Grading scale and criteria.
-37-
Points
96-100%
92-95%
89-91%
86-88%
82-85%
79-81%
76-78%
72-75%
69-71%
66-68%
62-65%
59-61%
0-58%
6.0
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1
6.1.2
6.1.3
6.1.4
7.0
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
Shelly, Gary, Cashman, Thomas, and Hoisington, Corinne, Mocrosoft Visual Basic 2008 for
Windows and Modile Applications, Introductory.
Farrell, Joyce, Programming Logic and Design Fifth Edition bundled with a flowcharting
tool called Visual Logic
Shelly, Gary, Cashman, Thomas, and Quasney, Jeffrey, Microsoft Office Excel 2007
Complete Concepts and Techniques.
Shelly, Gary, Cashman, Thomas, Pratt, Philip, and Last, Mary, Microsoft Office Access
2007 Complete Concepts and Techniques.
6.2
Other sources of information.
Students are directed to search the World Wide Web for other relevant material.
6.3
Current bibliography of resource for student’s information.
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Advanced
Core
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
15
18
2
9
-38-
8.0
Oral and Written Communications:
Every student is required to submit at least ___0__ written reports (not including exams, tests, quizzes, or
commented programs) to typically __0___ pages and to make ___0__ oral presentations of typically
__0___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,
as well as for technical content, completeness, and accuracy.
9.0
Social and Ethical Issues:
No coverage
10.0
Theoretical content:
No coverage
11.0
Problem analysis:
No coverage
12.0
Solution design:
No coverage
CHANGE HISTORY
Date
9/26/02
6/24/03
10/13/08
Change
Initial ABET version
ABET cleanup
Reference list updated
By whom
Levesque
Wolcott
Levesque
-39-
Comments
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
CIST 1100
Introduction to Personal Computing
Mary Levesque
3
10/13/08
S – Strong relationship
X – Contributing relationship
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
Understanding of the program
development cycle,
Create basic Visual Basic programs
Apply introductory user interface design
practices
Create functional databases using
Microsoft Access
Create and use Excel spreadsheets
1. Local and global role of iS
BIS Program Outcomes
X
X
X
X
X
S
S
X
X
S
X
S
S
-40-
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. work effectively in a team environment and collaborate with others to accomplish a common goal.
6. understand and apply appropriate types of computer-based tools to support communication.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-41-
-42-
CIST 1300 Introduction to Web Development
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
CIST 1300 / CSCI 1300
Introduction to Web Development
Robert Fulkerson
3
November 17, 2008
Course Description
1.1
Overview of content and purpose of course (Catalog description)
This course will provide students with a practical introduction to web development. By learning
the basic skills needed to develop an interactive website, students will develop an understanding
of the web development task and an appreciation of the importance of the Internet in both
business and academic environments. Specific technical topics to be covered include XHTML, CSS,
the Unix/Linux operating system, web server software, and a programming language. As part of
the class, each student will develop a working website.
2.0
1.2
For whom course is intended
This course is intended for all college students with an interest in computers.
1.3
Prerequisites of the course (Courses)
MATH 1310 (or equivalent)
1.4
Prerequisites of the course (Topics)
1.4.1 User knowledge of a computer (PC or equivalent), keyboard and mouse
1.4.2 Basic algebra
1.5
Unusual circumstances of the course
None
Objectives
2.1
List of performance objectives stated in terms of the student educational outcomes.
Students successfully completing this class will have developed:
1.5.1
1.5.2
1.5.3
1.5.4
A working knowledge of a command-line oriented operating system.
The ability to write simple programs in the Perl programming language.
The ability to create an XHTML standards-compliant web page.
The ability to create standards-compliant CSS documents.
-43-
3.0
Content and Organization
List of major topics to be covered in chronological sequence (specify number of contact hours on each).
Contact Weeks
3.1
Introduction and Overview
3.2
Unix
3.2.1
3.2.2
3.2.3
3.2.4
3.2.5
3.2.6
3.2.7
3.2.8
3.2.9
3.2.10
3.2.11
3.3
3
1.5
asdjklfasjd
Overview of Unix
ssh
mkdir
chmod
directory structure
cd
ls
mv
rm
vim
XHTML 6
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.3.6
3.3.7
3.3.8
3.3.9
3.3.10
3.3.11
3.3.12
3.3.13
3.3.14
3.3.15
3.3.16
3.3.17
3.3.18
3.3.19
3.3.20
Overview
Web browsers
Web servers
Block vs. Inline elements
Content vs. Structure
URLs, relative and absolute
Minimal page (<!DOCTYPE>, <html>, <head>, <title>, <meta>, <body>)
Headers (<h1>, <h2>, <h3>, <h4>, <h5>, <h6>)
Paragraphs, line breaks and blocks (<p>, <br />, <div>, <span>)
Naming and labeling elements (<id>, <class>)
Comments (<!-- -->)
Formatting (<b>, <i>, <strong>, <em>, <code>, <tt>, <sample>, <pre> )
Block quotes (<blockquote>)
More formatting (<sup>, <sub>, <ins>, <del>)
Abbreviations and acronyms (<abbr>, <acronym>)
Images (<img>)
Image types (JPEG, GIF, PNG)
Links (<a href>, <a name>)
Lists (<ul>, <ol>, <dl>, <li>, <dt>, <dd>)
Tables (<table>, <tr>, <td>, <th>)
-44-
3.4
CSS
4.5
3.4.1
3.4.2
3.4.3
3.4.4
3.4.5
3.4.6
3.4.7
Overview
Inline vs. Embedded vs. External
Inline CSS via style attribute
CSS Predefined Values
CSS Lengths / Percentages (em, px, in, cm, mm, pt, pc)
RGB triplets for color
Common properties used for formatting (border, border-color, width, padding, font-size,
font-family, background-color, border-top, border-bottom, etc)
3.4.8 Embedded CSS via <style> tag
3.4.9 Style sheets and rules
3.4.10 External CSS via <link> tag
3.4.11 Pseudo-classes
3.4.12 What is meant by “Cascading” style sheets
3.5
Box Model of CSS Layout
Perl
18
3.5.1
3.5.2
3.5.3
3.5.4
3.5.5
3.5.6
3.5.7
3.5.8
3.5.9
3.5.10
3.5.11
3.5.12
3.5.13
3.5.14
3.5.15
3.5.16
3.5.17
3.5.18
3.5.19
3.5.20
3.5.21
3.5.22
3.5.23
3.5.24
3.5.25
3.6
Overview
Machine language, Assembly Language, High-level Language
Compiling
Basic output using print, printf
Types of programming errors (syntax, runtime, semantic)
Scalar data type
Basic input using <>
Variable interpolation
Escape characters
chomp() and chop()
Basic arithmetic (+, -, *, /, %, **, ., x)
Precedence of operators
Compound assignment operators
Unary increment and decrement operators
if selection
if/else selection
Boolean expressions (&&, ||, !)
Uninitialized variables
while repetition
until repetition
Array data type
foreach repetition
for repetition
Data::Dumper for debugging
Hash data type
XHTML Forms 3
-45-
3.7
4.0
3.6.1
3.6.2
3.6.3
3.6.4
3.6.5
Overview
Submit and reset buttons
Checkboxes and radio buttons
Text fields, password fields, text areas
Combo boxes
CGI
6
3.7.1
3.7.2
3.7.3
3.7.4
3.7.5
3.7.6
3.7.7
3.7.8
3.7.9
Overview
Static content vs. dynamic content
CGI defined
Basic CGI using simple Content-Type: text/html
CGI.pm overview
CGI.pm to create basic XHTML
CGI::Carp for debugging
CGI.pm to create XHTML forms
CGI.pm to process forms
Teaching Methodology
4.1
Methods to be used
The material is taught through lectures based on a common set of slides for all instructors. Some
sections may use hands-on laboratory classrooms for each lecture or for special lectures
throughout the semester.
4.2
Student role in the course
Students are encouraged to read the material in the books in advance of the lecture so that new
concepts and terms are not “sprung on them”. They are encouraged to participate in class
discussions and ask questions when the material is unclear since all of the material is cumulative
and builds on understanding of the material that has come before it in the course.
4.3
Contact hours
The course usually meets for two 75-minute periods weekly (3.0 contact hours).
5.0
Evaluation
5.1
Types of student products that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. (For laboratory projects, specify
the number of weeks spent on each project).
Each student will write complete approximately 15 assignments on the various topics as they are
covered during the semester. These assignments will include creating XHTML web pages, CSS style
-46-
sheets and Perl programs. Additionally, the students will take a mid-term and a final exam along
with quizzes as needed.
5.2
Basis for determining the final grade.
70% of grade will be based on the program/homework scores, 30% of the grade will be based on
the quiz and exam scores.
5.3
Grading scale.
A+
A
AB+
B
BC+
C
CD+
D
DF
6.0
4.00 GPA
4.00 GPA
3.67 GPA
3.33 GPA
3.00 GPA
2.67 GPA
2.33 GPA
2.00 GPA
1.67 GPA
1.33 GPA
1.00 GPA
0.67 GPA
0.00 GPA
Resource Material
6.1
Textbook(s) or other required readings
6.1.1
6.1.2
6.2
6.3
Randall L. Schwartz, Tom Phoenix, brian d foy. Learning Perl, Fourth Edition. O’Reilly,
2005.
Elizabeth Castro. HTML, XHTML and CSS, Sixth Edition. Peachpit Press, 2006.
Other suggested reading materials, if any
6.1.3
6.1.4
6.1.5
7.0
97% - 100%
93% - 96%
90% - 92%
87% - 89%
83% - 86%
80% - 82%
77% - 79%
73% - 76%
70% - 72%
67% - 69%
63% - 66%
60% - 62%
0% - 59%
http://www.perl.com/
http://www.w3.org/
http://www.w3schools.com/
Current bibliography and other resources
Computing Accreditation Commission Category Content (class time in hours)
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
-47-
Core
43.5
Advanced
8.0
Oral and Written Communications
Every student is required to submit at least 0 written reports (not including exams, tests, quizzes, or
commented programs) to typically N/A pages and to make 0 oral presentations of typically 0
minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as well as
for technical content, completeness, and accuracy.
9.0
Social and Ethical Issues
Please list the topics that address the social and ethical implications of computing covered in all course
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded
on their understanding of these topics (e.g. test questions, essays, oral presentations, and so forth)?
None.
10.0
Theoretical content
Please list the types of theoretical material covered, and estimate the time devoted to such coverage.
None.
11.0
Problem analysis
Please describe the analysis experiences common to all course sections.
Students will learn a number of fundamental computer concepts and skills. At the end of the course, they
will be able to apply these skills to the development of their own dynamic, data-driven web site.
12.0
Solution design
Please describe the design experiences common to all course sections.
This course will require the student to apply a set of initially unfamiliar tools to a diverse set of problems.
As the student works through each problem, he/she will gain experience and competence in the broader
skill of problem solving.
CHANGE HISTORY
Date
4/22/2004
3/9/2005
Change
Initial ABET version
Change to initial course of a sequence
By whom
Pauley
Brown
8/18/05
Reorganization of Content and
Organization section to make the course
more web page centric. Also added a
semester project.
Further reorganization of Content and
Pauley
9/11/06
Pauley
-48-
Comments
Also formatted the course to be
suitable for General Education
4/21/08
4/24/08
11/17/08
Organization to make the course even
more web page centric.
Revision to reflect course conversion to
Perl since Fall 2007
Revision to reflect CSCI 1300 cross-listing
and removal of “database” in course
description
Update to include CS Program outcomes
Fulkerson
Fulkerson
Fulkerson
-49-
Mapping of CS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
CIST 1300 / CSCI 1300
Introduction to Web Development
Robert Fulkerson
3
November 17, 2008
S – Strong relationship
X – Contributing relationship
A working knowledge of a command-line
oriented operating system
The ability to write simple programs in the
Perl programming language.
The ability to create an XHTML standardscompliant web page
The ability to create standards-compliant CSS
documents.
Computer-based tools
Work on a team
Professional, legal, ethical standards
Model processes and data
Design, implement, evaluation IS
5.
6.
7.
8.
9.
S
X
13. Recognize need for prof. develop.
Communication
4.
S
12. Manage change
Analysis and design
3.
S
11. Manage IS within application env.
Knowledge of computing
2.
X
S
10. Manage projects
Local and global role of iS
Course objective
1.
BIS Program Outcomes
X
X
S
S
X
S
X
X
S
S
X
S
-50-
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-51-
-52-
CIST 1400 Introduction to Computer Programming
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
CIST 1400
Introduction to Computer Programming
Robert Fulkerson
3
April 24, 2008
Course Description
1.1
Overview of content and purpose of the course (Catalog description).
An introduction to programming within the context of a high level modern programming
language. Coverage of fundamental programming concepts and program design; including arrays,
user defined types, and objects. This course has a laboratory component in CIST 1404. This lab is
optional.
1.2
For whom course is intended.
This course is intended for freshman-level students in the College of IS&T. It also serves many
other departments, including math, education, geography/geology and engineering.
1.3
Prerequisites of the course (Courses).
MATH 1310 AND EITHER CIST 1100 OR CIST 1300
2.0
1.4
Prerequisites of the course (Topics).
Fundamental computing basics and familiarity with computer processing (input, output). Basic
college algebra.
1.5
Unusual circumstances of the course.
None.
Objectives
List of performance objectives stated in terms of the student educational outcomes.
2.1
2.2
2.3
3.0
The student should be able to write moderately complex programs in the Java language that
accomplish moderately difficult tasks.
The students are prepared for the continuation of their Java studies in CSCI 1620.
The students should be comfortable working in a Unix-based console environment.
Content and Organization
List of major topics to be covered in chronological sequence (specify number of contact hours on each).
-53-
3.1
Overview
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.2
3.5
Classes, objects and instance variables
Declaring a class with a method
Instantiating an object of a class
Declaring a method with a parameter
Primitive types
Constructors
(10.5 hrs)
if
if/else
switch
while
do/while
for
Boolean operators (&&, ||, !)
break
continue
Arithmetic
3.5.1
3.5.2
3.6
(7.5 hrs)
Control Structures
3.4.1
3.4.2
3.4.3
3.4.4
3.4.5
3.4.6
3.4.7
3.4.8
3.4.9
(6 hrs)
Basic program structure
Console output with System.out.printf()
Console output with System.out.print()
Console output with System.out.println()
Variables
int
Console Input Using the Scanner Class
Arithmetic (+, -, *, /, %)
Precedence of operators
Equality and relational operators (==, !=, <, >, <=, >=)
if
Introduction to Classes and Objects
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.3.6
3.4
What is a computer
Machine Language
Assembly Language
High-Level Langauge
Compiling bytecode
Introduction to console-based Java Applications
3.2.1
3.2.2
3.2.3
3.2.4
3.2.5
3.2.6
3.2.7
3.2.8
3.2.9
3.2.10
3.2.11
3.3
(1.5 hrs)
(1.5 hrs)
Compound assignment operators
Unary increment and decrement operators
Methods
(9 hrs)
-54-
3.6.1
3.6.2
3.6.3
3.6.4
3.6.5
3.6.6
3.6.7
3.6.8
3.7
Arrays
3.7.1
3.7.2
3.7.3
3.7.4
3.7.5
3.7.6
3.7.7
4.0
Static methods
Static fields
Math class
Java API packages
Methods with multiple parameters
Argument promotion and casting
Scope
Method overloading
(9 hrs)
Introduction to Arrays
Arrays and References
Programming with Arrays
Multidimensional Arrays
Searching and sorting
Variable length argument lists
Command-line arguments
Teaching Methodology
4.1
Methods to be used.
The material is taught through lectures based on a common set of slides, assignments and other
documents for all instructors.
4.2
Student role in the course.
Students are encouraged to read the material in the book in advance of the lecture so that new
concepts and terms are not “sprung on them”. They are encouraged to participate in class
discussions and ask questions when the material is unclear since all of the material is cumulative
and builds on understanding of the material that has come before it in the course.
4.3
Contact hours.
3.0 contact hours per week
5.0
Evaluation
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
Each student will write approximately 15 – 20 complete console-based Java programs on
the various topics as they are covered during the semester. Additionally, the students will
take four substantial quizzes and a final exam. There may be writing assignments to help
build a fundamental understanding of key programming concepts.
-55-
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
60% of grade will be based on the program/homework scores, 40% of the grade will be
based on the quiz and final exam scores.
5.3
Grading scale and criteria.
A+
A
AB+
B
BC+
C
CD+
D
DF
6.0
4.00 GPA
4.00 GPA
3.67 GPA
3.33 GPA
3.00 GPA
2.67 GPA
2.33 GPA
2.00 GPA
1.67 GPA
1.33 GPA
1.00 GPA
0.67 GPA
0.00 GPA
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1
6.2
6.3
6.4
7.0
97% - 100%
93% - 96%
90% - 92%
87% - 89%
83% - 86%
80% - 82%
77% - 79%
73% - 76%
70% - 72%
67% - 69%
63% - 66%
60% - 62%
0% - 59%
Java How to Program, Seventh Edition, Deitel & Deitel, 2007
Other suggested reading materials, if any.
6.2.1
Thinking in Java, Fourth Edition, Bruce Eckel, 2006
6.2.2
Java Pocket Guide, Robert Liquori, Patricia Liquori, 2008
Other sources of information.
6.3.1
asdjklajsd
6.3.2
Student study groups
6.3.3
Tutoring provided by the College of IS&T
Current bibliography of resource for student’s information.
Computing Accreditation Commission (CAC) Category Content (class time in hours)
CAC Category
Hardware and software
Networking and telecommunications
-56-
Core
Advanced
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
43.5
Oral and Written Communications
Every student is required to submit at least ___0__ written reports (not including exams, tests, quizzes, or
commented programs) to typically __0___ pages and to make __0___ oral presentations of typically
__0___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,
as well as for technical content, completeness, and accuracy.
9.0
Social and Ethical Issues
Please list the topics that address the social and ethical implications of computing covered in all course
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded
on their understanding of these topics (e.g. test questions, essays, oral presentations, and so forth?).
None.
10.0
Theoretical content
Please list the types of theoretical material covered, and estimate the time devoted to such coverage.
None.
11.0
Problem analysis
Students must be able to identify the desired goals from a problem statement.
12.0
Solution design
Although each programming assignment targets some topics more than others (namely those that have
been recently presented in the lectures), the solutions will be designed using cumulative knowledge.
Students will design a solution by selecting those techniques that are appropriate to the problem at hand.
CHANGE HISTORY
Date
Change
By whom
12/16/2002
Initial ABET version
Fulkerson
06/13/2003
Cleanup
Wileman
12/04/2007
First draft for migration to Java
Dasgupta
04/21/2008
Second draft for migration to Java
Fulkerson
-57-
Comments
04/24/2008
Third draft, minor updates
Fulkerson
11/17/08
Update to include CS Program
Outcomes table
Fulkerson
-58-
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
CIST 1400
Introduction to Computer Programming
Robert Fulkerson
3
May 27, 2009
S – Strong relationship
X – Contributing relationship
X
-59-
S
13. Recognize need for prof. develop.
S
12. Manage change
X
11. Manage IS within application env.
S
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
S
6. Work on a team
X
5. Computer-based tools
3. Analysis and design
S
4. Communication
2. Knowledge of computing
Course objective
The student should be able to write
moderately complex programs in the Java
language that accomplish moderately
difficult tasks.
The students are prepared for the
continuation of their Java studies in CSCI
1620.
The students should be comfortable
working in a Unix-based console
environment.
1. Local and global role of iS
BIS Program Outcomes
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-60-
CIST 2500 Introduction to Applied Statistics for IS&T
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
CIST 2500
Introduction to Applied Statistics for IS&T
Loftollah Najjar
3
6/24/03
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
The course emphasizes the function of statistics in information science and technology
including topics such as descriptive statistical measures, probability, discrete probability,
sampling, estimation analysis, hypothesis testing, regression, and analysis of variance. A
well-known computer package will be used to support the problem-solving process.
1.2
For whom course is intended.
The course is primarily intended for College of Information Science and Technology
(CIST) undergraduate and graduate students who need to satisfy foundation requirements.
1.3
Prerequisites of the course (Courses).
1.3.1
1.4
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.4.6
1.4.7
1.4.8
1.4.9
1.4.10
1.5
2.0
MATH 2030 or MATH 2040 or permission of advisor
Combinatorics
Probability
Discrete Random Variables
Continuous Random Variables
Polynomial Equations
Quadratic Equations
Log and Natural Log Functions
Exponential Functions
Summations (single, double and triple)
Binomial Functions
Unusual circumstances of the course.
None.
Objectives:
The broad objective of this course is to enable you to gain an overview of the functions of statistics
in modern business. This course will facilitate your understanding of the concepts and your
-61-
development of the skills needed to apply statistics to the business decision-making process. This
course will also enable you to extend your understanding and use of computer-based statistical tools
and provide opportunities to use them to analyze business problems.
3.0
Content and Organization:
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13
4.0
Contact Hours
Data and Statistics
2
Descriptive Statistics I: Tabular and Graphical Methods
3
Descriptive Statistics II: Numerical Methods
5
Probability
1
Discrete Probability Distributions
2
Continuous Probability Distributions
1
Sampling and Sampling Distributions
5
Interval Estimation
4
Hypothesis Testing
5
Statistical Inference about Means with Two Populations
3
Analysis of Variance
4
Regression Analysis
5
Interpretation of Statistics for Technology Professionals
3
Teaching Methodology:
4.1
Methods to be used.
The course uses a combination of approaches including lecturing, problem solving, contemporary
project using a statistical packages (MINITAB and Excel), and exams
4.2
Student role in the course.
The student will attend lectures, participate in discussion on assigned readings, complete
assigned projects, and complete required examinations
4.3
Contact hours.
Three (3) hours per week.
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable.
Class attendance and participation
Three to four problem-solving projects using a statistical package
Three examinations with combination of problem solving and multiple-choice questions about
the concepts discussed in the class.
Component
Grading
-62-
Class attendance and participation 10%
Examinations
60%
Projects
30%
5.2
Grading scale and criteria.
The final grade is based on the percentage of points that the student receives out of the
total possible points for the course. The guaranteed grade scale is shown in the following
table. A curve may be used to scale the entire class higher, if necessary, but scaling down
will not be done.
Points
92-100%
89-91%
86-88%
82-85%
79-81%
76-78%
72-75%
69-71%
66-68%
62-65%
59-61%
<59%
6.0
Grade
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1
6.2
Anderson, Sweeney & Williams, Contemporary Business Statistics for Business, First
Edition, West Publishing, 2000.
Other suggested reading materials, if any.
6.2.1
6.2.2
Pelosi, Sandifer. Doing Statistics for Business, Second Edition, Wiley, 2000
Brightman, H.J. statistics in Plain English. Cincinnati, OH: South-Western Publishing
Company. 1986
6.3
Other sources of information.
None
6.4
Current bibliography of resource for student’s information.
None
-63-
7.0
8.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Core
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
5
3
Advanced
Oral and Written Communications:
Every student is required to submit at least _3___ written reports (not including exams, tests, quizzes, or
commented programs) to typically ___5__ pages and to make __0___ oral presentations of typically
___0__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,
as well as for technical content, completeness, and accuracy.
9.0
Social and Ethical Issues:
No coverage.
10.0
Theoretical content:
Contact Hours
Descriptive Statistics
Sampling and Sampling Distributions
Interval Estimation
Hypothesis Testing
Analysis of Variance
Regression Analysis
11.0
Problem analysis:
11.1
11.2
11.3
12.0
8
5
3
5
4
5
Data Collections
Data Organization
Data Analysis
Solution design:
-64-
Student design the appropriate experimental design using statistical models and a well known statistical
software such as Excel or MINITAB. Then the appropriate conclusions will be drawn from the results for a
better decision-making.
CHANGE HISTORY
Date
Change
By whom
10/9/200
6/24/03
6/25/03
Initial ABET version
ABET clean-up
Expansion of prerequisite topics
Najjar
Wolcott
Najjar
Comments
Prerequisite topics previously listed
just prerequisite class titles.
Mapping of CS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
CIST 2500
Introduction to Applied Statistics for IS&T
Loftollah Najjar
3
5/27/09
S – Strong relationship
X – Contributing relationship
BIS Program Outcomes
-65-
Work on a team
Computer-based tools
Professional, legal, ethical standards
Model processes and data
Design, implement, evaluation IS
5.
6.
7.
8.
9.
13. Recognize need for prof. develop.
Communication
4.
12. Manage change
Analysis and design
3.
S
11. Manage IS within application env.
Knowledge of computing
2.
S
10. Manage projects
Local and global role of iS
1.
Course objective
The broad objective of this course is to enable
you to gain an overview of the functions of
statistics in modern business. This course will
facilitate your understanding of the concepts and
your development of the skills needed to apply
statistics to the business decision-making process.
This course will also enable you to extend your
understanding and use of computer-based
statistical tools and provide opportunities to use
them to analyze business problems.
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. work effectively in a team environment and collaborate with others to accomplish a common goal.
6. understand and apply appropriate types of computer-based tools to support communication.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
-66-
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-67-
-68-
CIST 3000 Advanced Technical Writing for IS&T
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
CIST 3000
Advanced Composition for IS & T
Sheri Hronek
3
5/15/08
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
Advanced Composition for IS & T provides students with instruction and practice in
academic writing for the technical sciences. The course focuses on principles of rhetoric
and composition, advanced library-based research techniques, academic modes of writing
suited to the technical sciences, style, grammar, and punctuation, all with attention to
adapting writing to suit the needs of various academic and professional audiences.
1.2
For whom course is intended.
Undergraduate students in IS & T or other students interested in academic writing in the
technical sciences.
1.3
Prerequisites of the course (Courses).
ENGL1160 (or placement in a 3rd year writing course)
1.4
Prerequisites of the course (Topics).
Students should be able to demonstrate the basic writing competencies developed during
their freshman composition course work.
1.5
Unusual circumstances of the course.
None
2.0
Objectives:
List of performance objectives stated in terms of the student educational outcomes.
By the end of the course, students will exhibit:
2.1
an advanced understanding of various academic-based writing strategies and of the genres
appropriate for and expected in the technical sciences
2.2
an ability to apply field-related, advanced research skills including a knowledge of scholarly, peerreviewed journals and indexes, the use of primary sources, the ability to evaluate sources, and
expertise in using field-appropriate documentation
-69-
3.0
2.3
a sophisticated understanding of grammar and language issues as they apply to writing generally
and to the style expected in academic writing in the technical sciences
2.4
developed proficiency in using discourse-community specific language, including vocabulary and
style
2.5
a sophisticated understanding of writing as a process that includes multiple drafts that
productively and effectively respond to feedback
2.6
an understanding of how writing functions in various academic and professional communities
students will encounter in their personal, professional, and academic life
2.7
a mature awareness of audience and the ability to adapt writing to various audiences and
purposes
Content and Organization:
List of major topics to be covered in chronological sequence (specify number of hours on each).
As various instructors will teach the course, the sequence of topics may vary. The following table
provides a suggested sequence based on collaborative research proposals and projects (groups of
3-4).
Class Hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13
3.14
3.15
3.16
3.17
4.0
Discourse communities & academic/professional communication practices
Writing fundamentals overview
Style 1: Discourse communities & tiles
Style II: General Stylistic Conventions
General technical stylistic conventions
Diction & Style
Theoretical/historical research overview
Theoretical/historical research proposals
Collaboration
Style III Persuasive writing
Using sources
Style IV: Paragraphing
Style V: Tone
Peer Review practices
Shifting from proposal to research
Research project norming
Style VI: Syntactical Revision Workshop
Teaching Methodology:
4.1
Methods to be used.
-70-
3
3
3
3
3
3
3
Teaching methods may vary from instructor to instructor. The course may include any of
the following: lectures, writing/draft workshops, group discussion, norming sessions,
library research instruction, and peer-review sessions.
4.2
Student role in the course.
The student’s role in the course flows from the objectives and content benchmarks
outlined above (2.1). In general, students should seek to develop and advance their
academic writing skills through active, conscientious engagement in the various writing
projects and activities.
4.3
Contact hours.
3 hours
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
As writing projects may vary from instructor to instructor, the following list is suggestive
only.
5.1.1
5.1.2
5.1.3
5.1.4
5.1.5
5.1.6
5.1.7
5.1.8
5.1.9
5.1.10
5.1.11
5.2
Field Description (technically informed audience)
Field Introduction (nontechnically informed audience)
Peer-Reviewed Journal Analysis
Library-Based Research Proposal (individual or collaborative)
Library-Based Research Project (individual or collaborative)
Abstract
Project Plans
Individual Activity Logs
Semester Self-Assessment memos
Research Presentation (individual or collaborative)
Portfolio
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
The basis for determining the final may vary depending on instructors. The following is a
suggestive model assessing both individual and collaborative writing efforts.
5.2.1
Individual Assessments:
Documentation Exams I & II
Field Description & Intro
Journal Analysis
-71-
10%
5%
15%
5.2.2
5.2.3
5.2.4
Individual Effort & Work Participation
Abstract
Documentation Workshop
Individual Portfolio
Quote, Paraphrase, Summary Ex.
Individual’s Collaborative Effort & Work
Group Assignments:
Research Proposal & Deliverables
Research Project & Deliverables
-72-
15%
15%
15%
25%
5.3
Grading scale and criteria.
98-100 A+
95-97 A
92-94 A88-91 B+
85-87 B
82-84 B78-81 C+
75-77 C
72-74 C68-71 D+
65-67 D
62-64 D-61 F
An “I” or “IP” will be awarded only if a student is unable to complete the course
requirements due to circumstances beyond her/his control as specified in the UNO
catalog. The student must also have substantially completed the course and have a
passing grade when the grade of “I” is requested.
6.0
Resource Material
6.1
Textbooks and/or other required readings used in course.
Textbook selection may vary from instructor to instructor. The following is a suggestive
list.
6.1.1
6.1.2
6.1.3
6.2
Other suggested reading materials, if any.
6.2.1
6.3
Readings that support the students’ development as writers are recommended,
particularly peer-reviewed, article-length or book-length works. Students should also
become familiar with the APA Publication Manual (2001) or other style guides suitable to
academic writing in the technical sciences.
Other sources of information.
6.3.1
6.4
Hansen, K. (1998). A rhetoric for the social sciences: A guide to academic and professional
communication. Upper Saddle River, NJ: Prentice Hall.
Jones, D. (1998). Technical writing style. Boston: Allyn and Bacon.
Lunsford, A. A. (2008). The St. Martin’s handbook (6th ed.). Boston: Bedford/St.Martin’s.
Industry white papers & reports related to areas of technical research.
Current bibliography of resource for student’s information.
-73-
6.4.1
7.0
Alred, G., Brusaw, C., & Oliu, W. (1992). The professional writer: A guide for advanced
technical writing. New York: St. Martin’s Press. American Psychological Association.
(2001). Publication manual (5th ed.). Washington, DC: American Psychological
Association.
6.4.2 Coe, M. (1996). Human factors for technical communication. New York: Wiley.
6.4.3 Coletta, W. J. (1992). The ideologically based use of language in scientific and technical
communication. Technical Communication Quarterly, 1(1), 59-70.
6.4.4 Day, R. (1988). How to write and publish scientific paper (3rd ed.). Phoenix, AZ: Oryx.
6.4.5 Day , R. (1992). Scientific English: A guide for scientists and other professionals. Phoenix,
AZ: Oryx.
6.4.6 Ede, L., & Lunsford, A. (1990). Singular texts/plural authors: Perspectives on collaborative
writing. Carbondale: Southern Illinois University Press.
6.4.7 Gross, A. G. (1996). The rhetoric of science. Cambridge, MA: Harvard University Press.
6.4.8 Gurak, L. J. (2000). Oral presentations for technical communications. Boston: Allyn &
Bacon.
6.4.9 Hager, P. J., & Scheiber, H. J. (1997). Designing and delivering scientific, technical, and
managerial presentations. New York: Wiley.
6.4.10 Halloran, M. (1978). Technical writing and the rhetoric of science. Journal of Technical
Writing and Communication, 8(2), 77-88.
6.4.11 Haring-Smith, T. (1993). Learning together: An introduction to collaborative learning. New
York: HarperCollins.
6.4.12 Hoft, N. L. (1995). International technical communication: How to export information
about high technology. New York: Wiley.
6.4.13 Houp, K. W., Pearsall, T. E., & Thebeaux, E. (1998). Reporting technical information (9th
ed.). Boston: Allyn & Bacon.
6.4.14 Locke, D. (1992). Science as writing. New Haven, CT: Yale University Press.
6.4.15 Miller, C. (1984). Genre as social action. Quarterly Journal of Speech, 70, 151-167.
6.4.16 Penrose, A. M., and Katz, S. B. (2004). Writing in the sciences: Exploring conventions of
scientific discourse (2nd ed.). Boston: Allyn and Bacon.
6.4.17 Porush, D. (1995). A short guide to writing about science. New York: HarperCollins.
6.4.18 Prelli, L. J. (1989). A rhetoric of science: Inventing scientific discourse. Columbia:
University of South Carolina Press.
6.4.19 Rude, C. D. (2002). Technical editing (3rd ed.). New York: Longman.
6.4.20 Sanders, S (1988). How can technical writing be persuasive? In L. Beene & P. White (Eds.),
Solving problems in technical writing (pp. 55-78). New York: Oxford University Press.
6.4.21 Schindler, G. E., Jr. (1975). Why engineers and scientists write as they do— Twelve
characteristics of their prose. IEEE Transactions on Professional Communication, 18(1), 510.
6.4.22 Young, J. Z. (1965). Doubt and certainty in science. In J. Harrison (Ed.), Scientists as writers
(pp. 49-51). Cambridge, MA: MIT Press.
(Fill out for ISQA and CIST courses) Estimate Computing Accreditation Commission (CAC) Category
Content (class time in hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Core
0
0
0
-74-
Advanced
0
0
0
Analysis and Design
Data management
Role of IS in Organizations
As this course focuses on students’ development as writers, these areas are not directly addressed.
Students may, however, engage any of these areas in individual/collaborative writing projects. See 8.0
7.0
(Fill out for CSCI and CIST courses) Estimate Computer Science Accreditation Board (CSAB)
Category Content (class time in hours):
CSAB Category
Data structures
Computer organization and architecture
Algorithms and software design
Concepts of programming languages
Core
0
0
0
0
Advanced
0
0
0
0
As this course focuses on students’ development as writers, these areas are not directly addressed.
Students may, however, engage any of these areas in individual/collaborative writing projects. See 8.0
8.0
Oral and Written Communications:
Every student is required to submit at least ___6__ written reports (not including exams, tests, quizzes, or
commented programs) of typically __1-20___ pages and to make ___1__ oral presentations of typically
__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,
as well as for technical content, completeness, and accuracy.
As this is an academic-based writing course, Instructors should present some of the basic
principles of effective academic document design based on appropriate manuscript preparation
style guides, such as the APA Publication Manual (2001). Students should also demonstrate their
understanding of the importance of good design through their research presentations.
9.0
Social and Ethical Issues:
Please list the topics that address the social and ethical implications of computing covered in all course
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded
on their understanding of these topics (e.g. test questions, essays, oral presentations, and so forth?).
The course should address social and ethical issues related to the practice of writing. One area of
concern is style, particularly the importance of unbiased language use (in terms of gender,
race/ethnicity, etc.), the role of the detached persona, and other elements as specified by the
American Psychological Association’s Publication Manual (2001). Students should be expected to
reflect awareness of professional language use concerns in all their writing.
-75-
Another area of concern should be the ethics of working with sources, especially in terms of
understanding and avoiding plagiarism.
All of these issues are explored and reiterated throughout the semester.
Students may also explore social and ethical issues related to the technical fields through their
individual or collaborative research projects.
10.0
Theoretical content:
Please list the types of theoretical material covered, and estimate the time devoted to such coverage.
The course should cover relevant rhetorical and compositional theories and practices related to
the process of writing such as invention, audience analysis, stylistics, and
argumentation/persuasion in technical academic writing. Theories of collaboration as a
community of practice are also addressed.
These theories and their application to writing are discussed throughout the semester.
Students may also explore theoretical material through their individual and collaborative projects.
11.0
Problem analysis:
Please describe the analysis experiences common to all course sections.
Analytical activities generally should focus on examining practical issues related to the writing &
research process. These include, but are not limited to, audience analysis, research planning and
coordination, self-assessment, source assessment, solving problems in the research process,
solving problems in collaboration, and so forth.
While all writing for the class should encourage analysis (implicitly or explicitly), one major writing
project should have an explicitly analytical focus. This may vary from instructor to instructor.
12.0
Solution design:
Please describe the design experiences common to all course sections.
Students should be encouraged to address solution design as part of problem analysis. Forms
(project planning, individual/group activity logs) may be used to help students construct effective
solution decisions by encouraging them to define problems, articulate potential solutions, and the
rationale for the proposed solutions. Ultimately, students’ writing should reflect their abilities to
effectively handle problems with research, collaboration, the writing process, and so forth.
CHANGE HISTORY
Date
5/15/08
Change
Created
By whom
Hronek
-76-
Comments
-77-
Mapping of CS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
CIST 3000
Advanced Technical Writing for IS&T
Sheri Hronek
3
5/15/08
S – Strong relationship
X – Contributing relationship
Work on a team
Computer-based tools
Professional, legal, ethical standards
Model processes and data
Design, implement, evaluation IS
5.
6.
7.
8.
9.
S
a sophisticated understanding of grammar
and language issues as they apply to writing
generally and to the style expected in
academic writing in the technical sciences
S
developed proficiency in using discourse-
S
-78-
13. Recognize need for prof. develop.
Communication
4.
an ability to apply field-related, advanced
research skills including a knowledge of
scholarly, peer-reviewed journals and
indexes, the use of primary sources, the
ability to evaluate sources, and expertise in
using field-appropriate documentation
12. Manage change
Analysis and design
3.
S
11. Manage IS within application env.
Knowledge of computing
2.
an advanced understanding of various
academic-based writing strategies and of the
genres appropriate for and expected in the
technical sciences
10. Manage projects
Local and global role of iS
Course objective
1.
BIS Program Outcomes
community specific language, including
vocabulary and style
a sophisticated understanding of writing as a
process that includes multiple drafts that
productively and effectively respond to
feedback
S
an understanding of how writing functions in
various academic and professional
communities students will encounter in their
personal, professional, and academic life
S
a mature awareness of audience and the
ability to adapt writing to various audiences
and purposes
S
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. work effectively in a team environment and collaborate with others to accomplish a common goal.
6. understand and apply appropriate types of computer-based tools to support communication.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-79-
-80-
CIST 3100 Organizations, Applications, and Technology
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
CIST 3100
Organizations, Applications and Technology
Paul van Vliet
3
10/12/2008
Course Description
1.1 Overview of content and purpose of the course
This survey course provides an introduction to organizations and the role information and information
systems play in supporting operations, decision-making, processes, quality management, and strategic
activities of an organization. In addition, the course covers management of the IS function, strategic and
regulatory issues of telecommunications, and ethical and legal issues.
1.2 For whom course is intended
The course is intended for undergraduate students in the schools of IS&T, Business Administration and
Engineering who need to learn the fundamentals of Management Information Systems.
1.3 Prerequisites of the course
None
1.4 Unusual circumstances of the course
As of January 2007, this course is regularly offered as an online course.
2.0
Objectives:
2.1
2.2
2.3
2.4
2.5
2.6
2.7
To understand the role of information systems and the subsequent challenges in today’s
competitive business environment
To understand the diversity of Information Systems and networks in the enterprise
To understand Information Systems, organizations and management models, roles and their
impact on the decision making process.
To understand how Internet technology, electronic commerce, and electronic web based systems
have transformed organizations, business models, supply chains and quality
To understand basic computer hardware and software and information systems security and
control
To obtain a basic understanding of software applications such as operating systems, file
management and data storage
To gain a basis understanding of the challenges of maintaining a traditional data environment
versus a database environment
-81-
2.8
2.9
2.10
2.11
3.0
To gain a basis understanding of telecommunications and networks, including the Internet.
To understand the business value of systems and technology
To understand how organizations can use expert systems and case-based reasoning to capture
knowledge
To understand the legal and ethical impacts of information systems
Content and Organization
Contact Hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13
3.14
3.15
3.16
4.0
Introduction to course, description of course requirements,
and a discussion of expectations for the course
Information Systems in Global Business Today.
Global E-Business: How Businesses Use Information Systems
Information Systems, Organizations, and Strategy
Ethical and Social Issues in Information Systems
IT Infrastructure and Emerging Technologies
Foundations of Business Intelligence:
Databases and Information Management
Telecommunications, the Internet, and Wireless Technology
Securing Information Systems
Achieving Operation Excellence and Customer Intimacy:
Enterprise Applications
E-Commerce: Digital Markets, Digital Goods
Managing Knowledge
Enhancing Decision Making
Building Systems
Project Management: Establishing the Business Value of
Systems and Managing Change
Managing Global Systems
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
Teaching Methodology
4.1
Methods to be used
The primary teaching method will be discussion of chapter contents, case studies, lecture, and
discussion questions.
4.2
Student role in the course
The student will attend lectures and demonstrations, participate in discussion on assigned
readings, complete assigned projects and papers, and complete required examinations.
4.3
Contact hours
Three (3) hours per week.
Note: exact contact hours may vary for the online version of this course; however, the contents of
the online course follows the regular course closely.
5.0
Evaluation
-82-
5.1
Types of student products
The student products will be: two examinations (a midterm and final) or a single comprehensive
examination, a ten-page research paper, a group term project, and other small assignments as
deemed useful by the instructor.
5.2
Basis for determining the final grade
Grades will be determined on the basis of the student’s participation in class (10%), the student’s
performance on examinations (30%), development of a ten-page research report based on
readings from the trade and empirical literature (30%), and completion of the term project (30%).
Component
Examination(s)
Class Participation
Research Paper
Term project
5.3
6.0
Grading
30%
10%
30%
30%
Grading Scale and Criteria
Earned Grade
Grade
97-100%
A+
93-96%
A
90-92%
A-
87-89%
B+
83-86%
B
80-82%
B-
77-79%
C+
73-76%
C
70-72%
C-
67-69%
D+
63-66%
D
60-62%
D-
59%
F
Resource Material:
6.1
The latest edition of textbook(s) or other required readings used in the course, or equivalent.
-83-
6.1.1
6.2
Loudon, K.C. and Loudon, J.P. (2007) Management Information Systems: Managing the
Digital Firm, 10th Edition, Saddle River, NJ: Prentice Hall.
Other suggested reading materials or equivalent
Additional articles relating to the various topics in the course can be made available at the UNO
Library or via online links. These articles are used to supplement topics presented in various
chapters.
6.3
Other sources for gathering information or equivalent
Students are encouraged to read articles in current professional and trade journals and websites
that are relevant to topics in information systems. The process is particularly important in
keeping current with technology and new methodologies.
6.4
7.0
8.0
Current Bibliography:
6.4.1 Jessup, L. & Valacich, J. (2008) Information Systems Today; Managing in the Digital World,
3rd Edition, Saddle River, NJ: Prentice Hall.
6.4.2 Stair, R. & Reynolds, G., (2006) Principles of Information Systems; A Managerial Approach,
7th Edition, Boston, MA: Thomson Course Technology.
6.4.3 Turban, E., Rainer, Jr., R.K., & Potter, R.E. (2005) Introduction to Information Technology,
3rd Edition, Hoboken, NJ, John Wiley & Sons, Inc.
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Core
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
3
4
0
2
3
8
Advanced
Oral and Written Communications:
Written research reports, and optional case study assignments and review questions provide
opportunities for written and oral communication. The students also collaborate on written term projects
which emphasize professional communication practices.
Note: for the online version of the course, oral student presentations are often impractical, and written
assignments are regularly substituted.
-84-
9.0
Social and Ethical Issues:
Contact Hrs. 3
Every student will be expected to understand the ethical impacts of information systems including:
auditing of computer systems, the ethical, social and political needs of society, the ethical issues involved
in any situation, ethical principles for conduct, and ethical conduct policies as they relate to information
systems
10.0
Theoretical content:
10.1
10.2
11.0
Contact Hours
1
1
Value Chain Model
Industry Competitive Forces Model
Problem analysis:
Case studies are provided at the end of each of 15 chapters, providing the instructor with the opportunity
to have the students analyze them.
12.0
Solution design:
Review problems are provided at the end of each of 15 chapters, providing the instructor with the
opportunity to have the students develop solutions and appropriate answers to them.
CHANGE HISTORY
Date
9/22/2002
6/12/03
Change
Initial ABET version
Remove Prerequisite. Course Change
Form 2/11/03
6/24/03
ABET cleanup
9/13/2007 Change course number from CIST
2110 to CIST 3100
9/13/2007 Update document to match current
text contents and assignments
9/13/2007 Update document to include elearning adjustments
10/12/2008 Reviewed course document, found
contents to be current.
By whom
Van Vliet
lw
Wolcott
Van Vliet
Van Vliet
Van Vliet
Van Vliet
-85-
Comments
CIST 2010 no longer required
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
CIST 3100
Organizations, Applications and Technology
Paul van Vliet
3
5/26/09
S – Strong relationship
X – Contributing relationship
Work on a team
Professional, legal, ethical standards
Model processes and data
Design, implement, evaluation IS
6.
7.
8.
9.
S
S
S
S
S
S
S
S
S
X
S
S
X
S
S
X
S
S
S
-86-
X
13. Recognize need for prof. develop.
Computer-based tools
5.
S
12. Manage change
Communication
4.
S
11. Manage IS within application env.
Analysis and design
3.
S
10. Manage projects
Knowledge of computing
2.
To understand the role of information systems
and the subsequent challenges in today’s
competitive business environment
To understand the diversity of Information
Systems and networks in the enterprise
To understand Information Systems,
organizations and management models, roles and
their impact on the decision making process.
To understand how Internet technology,
electronic commerce, and electronic web based
systems have transformed organizations,
business models, supply chains and quality
To understand basic computer hardware and
software and information systems security and
control
To obtain a basic understanding of software
applications such as operating systems, file
management and data storage
To gain a basis understanding of the challenges of
Local and global role of iS
Course objective
1.
BIS Program Outcomes
X
X
X
X
X
X
maintaining a traditional data environment versus
a database environment
To gain a basis understanding of
telecommunications and networks, including the
Internet.
To understand the business value of systems and
technology
To understand how organizations can use expert
systems and case-based reasoning to capture
knowledge
To understand the legal and ethical impacts of
information systems
S
S
S
X
S
X
S
S
S
S
-87-
S
X
S
X
X
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-88-
CIST 3110 Information Technology Ethics
1.0
Department and Course Number
Course Title
Course Coordinator
Total Credits
CIST 3110
Information Technology Ethics
Leah R. Pietron
3
Date of Last Revision
09/10/08
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
The course will cover the development and need for issues regarding privacy and the application
of computer ethics to information technology.
1.2
For whom course is intended.
This course is intended for undergraduate management information systems (MIS), computer
science (CS), information assurance (IA), and bioinformatics majors.
1.3
Prerequisites of the course (Courses).
CIST 3110 - Organizations, Applications & Technology or equivalent.
1.4
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.5
Introduction to Information Systems
Review of Social, Privacy, Legal, and Ethics theory
Unusual circumstances of the course.
None
2.0
Objectives:
List of performance objectives stated in terms of student behavior.
The student will:
2.1
2.2
2.3
2.4
Be able to determine the impact of the privacy laws on information security policies.
Understand the issues related to intellectual freedom, intellectual property, and copyright law as
they relate to electronic publishing.
Be able to determine and identify ethical procedures and behaviors in the organization related to
information security.
Be able to identify issues of professional conduct in information technology case studies.
-89-
2.5
2.6
2.7
2.8
2.9
2.10
2.11
2.12
2.13
2.14
3.0
Be able to apply University standards of ethical conduct in preparing assignments for all
coursework.
Learn the areas most impacted by ethical decisions by professionals in the computing field and
will gain skills in making such decisions.
Identify key ethical concerns of information technology specialists.
Apply theories of ethics to case situations in the context of organizational use of information
technology.
Appreciate how rapid changes in technology might affect ethical issues and changing norms of
behavior.
Understand the issues related to privacy and confidentiality as they relate to information
technology.
Understand the ethical issues associated with gathering, storing and accessing genetic
information in databases.
Recognize the differences in ethical codes of conduct in different cultures and countries.
Understand the ethical issues that arise from findings in genomic and bioinformatics analyses.
The student will study and apply the following:
2.14.1 Business Rules
2.14.2 Firewalls
2.14.3 Cryptography
2.14.4 Privacy Laws
2.14.5 Copyright Ownership
2.14.6 Privacy, Publicity and Defamation
2.14.7 Trademarks and Unfair Competition in Cyberspace
2.14.8 Intellectual Property
2.14.9 Contrast of Law vs. Ethic
2.14.10 Organizational Ethical Principles
Content and Organization:
List of major topics to be covered in chronological sequence
Contact Hours
3.1
3.2
3.3
Frameworks for Ethical and Policy Analysis
3.1.1 Moral Frameworks
3.1.2 General Framework for Ethical Analysis
Unwrapping the Gift
3.2.1 The Ubiquity of Computers and the Rapid Pace of Change
3.2.2 New Developments and Dramatic Impacts
3.2.3 An Introduction to Some Issues and Themes
3.2.4 Ethics
Privacy
3.3.1 Privacy and Computer Technology
3.3.2 “Big Brother Is Watching You.”
3.3.3 Diverse Privacy Topics
3.3.4 Protecting Privacy: Technology, Markets, Rights and Laws
3.3.5 Communications
-90-
3
3
3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
4.0
Freedom of Speech
3.4.1 Changing Communications Paradigms
3.4.2 Offensive Speech and Censorship in Cyberspace
3.4.3 Anonymity
3.4.4 Spam
3.4.5 Ensuring Valuable and Diverse Content
Intellectual Property
3.5.1 Intellectual Property and Changing Technology
3.5.2 Copyright Law
3.5.3 Copying and Sharing
3.5.4 Search Engines and Online Libraries
3.5.5 Free-Speech Issues
3.5.6 Free Software
3.5.7 Issues for Software Developers
Computer Crime
3.6.1 Introduction
3.6.2 Hacking
3.6.3 Identity Theft and Credit-Card Fraud
3.6.4 Scams and Forgery
3.6.5 Crime Fighting Versus Privacy and Civil Liberties
3.6.6 Whose Laws Rule the Web?
Work
3.7.1 Fears and Questions
3.7.2 The Impact on Employment
3.7.3 The Work Environment
3.7.4 Employee Crime
3.7.5 Employee Monitoring
Evaluating and Controlling Technology
3.8.1 Information, Knowledge, and Judgment
3.8.2 Computers and Community
3.8.3 The Digital Divide
3.8.4 Evaluations of the Impact of Computer Technology
3.8.5 Making Decisions About Technology
Errors, Failures, and Risk
3.9.1 Failures and Errors in Computer Systems
3.9.2 Case Study: The Therac-25
3.9.3 Increasing Reliability and Safety
3.9.4 Dependence, Risk, and Progress
Professional Ethics and Responsibilities
3.10.1
What is Professional Ethics?
3.10.2
Ethical Guidelines for Computer Professionals
3.10.3
Scenarios
The Software Engineering Code and the ACM Code
ethical Cases in Social, Legal, Privacy and Ethics
Teaching Methodology:
-91-
3
3
3
3
3
15
4.1
Methods to be used.
The primary teaching methods will be instructor-led discussions, student-led small group
discussions, case studies, lecture, guest speakers, and demonstration.
4.2
Student role in the course.
The student will attend lectures and demonstrations, analyze selected cases, lead and participate
in discussions on assigned readings and cases, complete assigned projects, and complete required
examinations.
4.3
5.0
Contact hours.
Three hours per week
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
The student products will be group and individual case analysis reports, article reviews, book
reports, quizzes, computer projects, examinations, term paper, and oral presentations.
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
Grades will be determined on the following basis:
Component
Participation in project/term paper
Book report
Case studies
Oral presentation
Quizzes on readings
Midterm
Final exam
In-class participation
5.3
Grading
15%
10%
10%
5%
10%
20%
20%
10%
Grading scale and criteria.
-92-
Points
97-100%
93-96%
90-92%
87-89%
83-86%
80-82%
77-79%
73-76%
70-72%
67-69%
63-66%
60-62%
<60%
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
The particular scale will be determined by the instructor for the particular course. This will be
distributed in the course outline distributed the first day of class.
6.0
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1
6.1.2
6.2
Case Studies in Information and Computer Ethics by Richard A. Spinello, Prentice Hall,
2003.
A Gift of Fire, Third Edition, by Sara Baase, Prentice-Hall, 2008.
Other suggested reading materials, if any.
6.2.1
6.2.2
Additional articles that have been collected for various topics are available at
the UNO Library. These articles are used to supplement topics presented in various
chapters.
6.2.3 Wall Street Journal – students will be required to subscribe for one semester.
6.2.4 CIO, Forbes, Fortune & Business Week magazines
6.2.5 Electronic Frontier Foundation (EFF), advocate for civil liberties, has an e-newsletter
6.2.6 Electronic Privacy Information Center (EPIC), advocates for privacy and civil liberties, has
an e-newsletter
6.2.7 Ethics in Computing site at North Carolina State University
6.2.8 The Tavani Bibliography of Computing, Ethics, and Social Responsibility
6.2.9 UCLA Online Institute for Cyberspace Law & Policy
6.2.10 Computers, Freedom, and Privacy, annual conference. The site contains many useful
documents from past conferences and information about the next one.
-93-
6.2.11 Cato Institute, a libertarian perspective
6.2.12 Thomas, Library of Congress site for bills currently going through the U.S. Congress and
recent U.S. laws.
6.2.13 Privacy.org, news and advocacy of strong privacy regulation (EPIC and Privacy
International)
6.2.14 TRUSTe
6.2.15 Federal Trade Commission
6.2.16 "Freedom of Speech and Information Privacy" (Eugene Volokh, UCLA Law School)
6.2.17 Federal Bureau of Investigation (Use site search tool for "Carnivore," etc.)
6.2.18 Echelonwatch (American Civil Liberties Union, EPIC, and others)
6.2.19 Cryptography issues and legislation (Center for Democracy and Technology).
6.2.20 "Cryptography's Role in Securing the Information Society" (National Academy of Sciences)
6.2.21 "Encryption Policy for the 21st Century" (Cato Institute)
6.2.22 CryptoRights Foundation
6.2.23 National Security Agency
6.2.24 EFF's archive on the Digital Millennium Copyright Act
6.2.25 Digitalconsumer.org and its Consumer Technology Bill of Rights.
6.2.26 American Library Association Office for Intellectual Freedom, includes the ALA Resolution
on the Use of Filtering Software in Libraries.
6.2.27 Chilling Effects Clearinghouse, information about Internet legal issues related to "ceaseand-desist" letters, letters claiming violation of copyright, trademark, and so forth, and
threatening legal action if the claimed violations continue. (EFF and several major law
schools)
6.2.28 Recording Industry Association of America
6.2.29 ACM
6.2.30 IEEE Computer Society
6.2.31 Online Ethics Center for Engineering and Science (Case Western Reserve University)
Electronic Frontiers Australia
6.2.32 Privacy Commissioner of Australia
6.2.33 Privacy Commissioner of Canada
6.2.34 "Privacy as Censorship A Skeptical View of Proposals to Regulate Privacy in the Private
Sector" (Cato Institute)
6.2.35 Genetics and Public Health in the 21st Century (2000) Muin Khoury, Wylie Burke, and
Elisabeth Thomson, Eds., Oxford University Press.
6.2.36 Annual Review of Genomics and Human Genetics (yearly since 2000). Eric Lander, David
Page and Richard Lifton, Eds., Annual Reviews, Academic Press.
6.2.37 Nuffield Council on Bioethics Reports: Reports and discussion papers assembled by an
independent body that considers the ethical issues arising from developments in
medicine and biology that plays a major role in contributing to policy making and
stimulating debated in bioethics. http://www.nuffieldbiotethics.org/home
6.3
Other sources of information.
Students are encouraged to collect articles in current professional and trade journals that are
relevant to topics in systems information security privacy and ethics. The process is particularly
important in keeping current with technology and new methodologies.
6.4
Current bibliography of resource for student’s information.
-94-
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
6.4.6
6.4.7
6.4.8
6.4.9
6.4.10
6.4.11
6.4.12
6.4.13
6.4.14
6.4.15
6.4.16
6.4.17
6.4.18
6.4.19
6.4.20
7.0
Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property,
Free Speech, and Privacy, by Constance S. Hawke, John Wiley & Sons, September 1, 2000
Borders in Cyberspace: Information Policy and the Global Information Infrastructure
(Publication of the Harvard Information Infrastructure Project) by Brian Kahin and Charles
Nesson, MIT Press, March 1997.
Cybercrime: Law Enforcement, Security and Surveillance in the Information Age by Tom
Douglas, Routledge, and July 2000.
Data Privacy in the Information Age by Jacqueline Klosek, Praeger Publishing, August 30,
2000.
Database Nation: The Death of Privacy in the 21st Century by Simson Garfinkel, O'Reilly &
Associates, and January 2000.
ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache, and Privacy
Regulations, by Timothy D. Casey, Wiley, 2000.
Technology and Privacy: The New Landscape, by Philip E. Agre, and Marc Rotenberg. , MIT
Press, September 1998.
Internet Privacy Protection Guide by J. K. Santiago, Boggy Cove, Inc. 1999.
Building in Big Brother: The Cryptographic Policy Debate by Lance J. Hoffman, Springer
Verlag, April 1995.
Computer Rules: A Guide to Formulating Computer Operating & Security Policy for Users
by Randal F. Fleury, Compupol, Inc., 1998.
Technology and Privacy: The New Landscape, by Philip E. Agre and Marc Rotenberg, MIT
Press, September 1998 or most recent edition.
Legislating Privacy: Technology, Social Values, and Public Policy, by Priscilla M. Regan,
University of North Carolina Press, September 1995.
Managing Privacy: Information Technology and Corporate America, by H. Jeff Smith,
University of North Carolina Press, June 1994.
Computers, Ethics and Social Values by Deborah G. Johnson and Helen Nissenbaum,
Prentice Hall, February 2, 1995.
Computers, Ethics, and Society by M. David Ermann, Mary B. Williams, and Michele S.
Shauf, Oxford University Press, April 1997.
Sex, Laws, and Cyberspace: Freedom and Censorship on the Frontiers of the Online
Revolution, by Jonathan Wallace and Mark Mangan, Henry Holt, March 1997.
Computer and Information Ethics by John Weckert and Douglas Adeney, Greenwood
Publishing Group, May 1997.
Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing by Tom Forester
and Perry Morrison, MIT Press, December1993.
The Information Systems Security Officer's Guide: Establishing and
Managing an Information Protection Program, by Gerald Kovacich, ButterworthHeinemann, 1998.
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Hardware and software
Networking and telecommunications
-95-
Core
3
3
Advanced
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
10
Oral and Written Communications:
Every student will be required to:
(1) Complete individually the analysis of ten to fifteen in class mini-cases and actively participate
in the instructor lead discussions.
(2) Either individually or as a member of a small group, analyze six to ten major cases, prepare
either a two to four-page point paper report or a six-page narrative report about the case, and
lead or participate in the in-class discussions.
(3) Lead several small group discussions about the cases
(4) Prepare oral presentations of approximately 10-minute duration that present an analysis of
select cases.
All papers and presentations will be evaluated for technical content, application of principles,
appropriateness of format, use of supporting materials, and correct use of grammar and spelling rules.
9.0
Social and Ethical Issues:
This course focuses on the ethical, social, legal, and privacy issues in the information technology,
bioinformatics, and health care industries. After extensive presentations of the fundamental theories and
principles of ethical behavior, the students will apply the theories and principles to cases and real-world
situations current to these industries.
10.0
Theoretical content:
Please list the types of theoretical material covered, and estimate the time devoted to such coverage.
No coverage.
11.0
Problem analysis:
A major part of this course is case analysis. Throughout the presentation of the theoretical materials,
there will be shore in-class exercises that provide situations for student analysis. These exercises provide
the students with models and processes that will be applied to the more formal lengthier cases and to
situations that the students will encounter in business and industry.
12.0
Solution design:
-96-
The students apply what they have learned in this class to cases and everyday events in the industries of
focus. Students will be expected to determine the consequences for unethical behavior and to provide
solid justification for their decisions.
CHANGE HISTORY
Date
2/14/03
6/24/03
10/10/08
6/23/2009
Change
Initial ABET version
ABET cleanup
Major changes to outline, assignments,
textbook.
Update of the course matrix
By whom
Pietron
Wolcott
Schooff
Pietron
-97-
Comments
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
CIST 3110
Information Technology Ethics
Leah R. Pietron
3
9/10/08
S – Strong relationship
X – Contributing relationship
Be able to determine the impact of the
privacy laws on information security policies.
Understand the issues related to intellectual
freedom, intellectual property, and copyright
law as they relate to electronic publishing.
Be able to determine and identify ethical
procedures and behaviors in the organization
related to information security.
Be able to identify issues of professional
conduct in information technology case
studies.
Be able to apply University standards of
Work on a team
Computer-based tools
Professional, legal, ethical standards
Model processes and data
Design, implement, evaluation IS
5.
6.
7.
8.
9.
X
S
X
S
X
X
S
X
X
S
-98-
13. Recognize need for prof. develop.
Communication
4.
S
12. Manage change
Analysis and design
3.
X
11. Manage IS within application env.
Knowledge of computing
2.
X
10. Manage projects
Local and global role of iS
Course objective
1.
BIS Program Outcomes
X
X
X
ethical conduct in preparing assignments for
all coursework.
Learn the areas most impacted by ethical
decisions by professionals in the computing
field and will gain skills in making such
decisions.
Identify key ethical concerns of information
technology specialists.
Apply theories of ethics to case situations in
the context of organizational use of
information technology.
Appreciate how rapid changes in technology
might affect ethical issues and changing
norms of behavior.
Understand the issues related to privacy and
confidentiality as they relate to information
technology.
Understand the ethical issues associated with
gathering, storing and accessing genetic
information in databases.
Recognize the differences in ethical codes of
conduct in different cultures and countries.
Understand the ethical issues that arise from
findings in genomic and bioinformatics
analyses.
The student will study and apply the
following:
Business Rules
Firewalls
Cryptography
Privacy Laws
Copyright Ownership
Privacy, Publicity and Defamation
Trademarks and Unfair Competition in
Cyberspace
Intellectual Property
Contrast of Law vs. Ethics
Organizational Ethical Principles
S
X
S
X
X
S
S
X
X
S
X
S
X
X
S
X
X
S
S
x
S
X
X
S
X
X
S
X
X
S
X
X
S
X
S
X
X
S
X
X
S
X
S
X
S
BIS Program Outcomes (2009)
-99-
X
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. work effectively in a team environment and collaborate with others to accomplish a common goal.
6. understand and apply appropriate types of computer-based tools to support communication.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-100-
CIST 3600 Information Security and Policy
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
CIST 3600
Information Security and Policy
Leah R. Pietron
3
6/23/2009
Course Description
1.1
Overview of content and purpose of the course (Catalog description).
This course provides an introduction to the fundamental principles and topics of Information
Assurance. The principles are laid out in such a way that computer professionals not only learn
about principles; they learn them in a logical order that provides a framework for developing and
performing the security tasks. The course will address hardware, software, processes,
communications, applications, and policies and procedures relative to information assurance in
the organization.
This course is intended as a first course in Information Assurance at the undergraduate level. This
course will be a pre-requisite for additional information and network security courses for the
Information Assurance concentration in the undergraduate MIS program.
1.2
For whom course is intended.
This course is intended for undergraduate information assurance (IA), management information
systems (MIS) and computer science (CS) majors.
1.3
Prerequisites of the course (Courses).
1.3.1
1.4
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.4.6
1.5
CIST 3100
Types of Processing Systems
Essential Concepts of Networks
Introduction to Topologies
Understanding of TCP/IP
Introduction to Systems Analysis, Design, and Databases
Principles of Management
Unusual circumstances of the course.
None
-101-
2.0
Objectives:
List of performance objectives stated in terms of the student educational outcomes
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
2.10
2.11
2.12
3.0
Identify the fundamental principles of Information Security
Demonstrate an understanding: the concept of threat, evaluation of assets, information assets,
physical, operational, and information security – and how they are interrelated
Understand risk analysis and risk management
Demonstrate the ability to design and guide the development of a security policy for any
corporate environment.
Demonstrate an understanding of mitigation approaches – technical and administrative
Understand the need for a comprehensive security model and its implications for the security
manager
Understand the need for the careful design of a secure corporate information infrastructure.
Demonstrate an understanding of security technologies.
Understand the relationship network infrastructure equipment to the implementation of a given
security policy.
Display an introductory understanding of basic cryptography, its implementation considerations
and key management
Understand the importance of secure system management - economical and corporation
implications
The Role of Procedures and Education in the overall Corporate Security Solution
Content and Organization:
Contact hours
3.1
The Future of Business
1.0
3.2
Introduction to Information Security
1.0
3.3
Inspection
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.4
1.5
Resource Inventory
Threat Assessment
Identifying Vulnerabilities
Assigning Safeguards
Evaluation of Current Status
Protection
3.4.1
3.4.2
3.4.3
3.4.4
1.5
Awareness
Access
Identification
Authentication
-102-
3.4.5
3.4.6
3.4.7
3.4.8
3.4.9
3.4.10
3.5
Detection
3.5.1
3.5.2
3.5.3
3.5.4
3.6
Authorization
Availability
Accuracy
Confidentiality
Accountability
Administration
1.5
Intruder Types
Intrusion Methods
Intrusion Process
Detection Methods
Reaction
3.6.1
3.6.2
3.6.3
3.6.4
3.6.5
3.6.6
1.5
Incident Determination
Incident Notification
Incident Containment
Assessing Damage
Incident Recovery
Automated Response
3.7
Reflection
1.5
3.8
3.9
3.10
3.11
3.12
3.13
3.14
3.15
3.16
3.17
3.18
3.19
3.20
3.21
3.22
3.23
3.24
3.25
3.26
3.7.1 Incident Documentation
3.7.2 Incident Evaluation
3.7.3 Legal Prosecution
3.7.4 The Future of Information Security
What is Security Engineering
Protocols
Passwords
Access Controls
Cryptography
Distributed Systems
Multilevel Security
Multilateral Security
Banking and Bookkeeping
Monitoring Systems
Nuclear Command and Control
Security Printing and Seals
Biometrics
Physical Tamper Resistance
Emission Security
Electronic and Information Warfare
Telecom System Security
Network Attack and Defense
Protecting E-Commerce Systems
-103-
1.5
1.5
1.5
1.5
1.5
1.5
1.5
1.5
1.5
1.5
1.5
1.5
1.5
1.5
1.5
1.5
1.5
1.5
1.5
3.27
3.28
3.29
3.30
4.0
Copyright and Privacy Protection
E-Policy
Management Issues
System Evaluation and Assurance
1.5
1.5
1.5
1.5
Teaching Methodology:
4.1
Methods to be used.
The primary teaching method will be discussion, programming-related projects and
demonstrations, case studies, lecture, expert speakers and security-related application
demonstrations.
4.2
Student role in the course.
The student will attend lectures and demonstrations, participate in discussion on assigned
readings, complete assigned programming-related projects, and complete required examinations.
4.3
5.0
Contact hours
3.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
The student products will be article reviews, projects, examinations, and oral presentations.
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
Grades will be determined on the basis of the student’s participation in research, presentation of
results, participation through class discussion, and achievement on examinations. The specific
weights shall be specified in the outline for the particular class.
5.3
Grading scale and criteria.
Points
97 – 100%
94 – 96%
90 – 93%
87 – 89%
84 – 86%
80 – 83%
77 – 79%
Grading
A+
A
A–
B+
B
B–
C+
-104-
70 – 76%
70 – 73%
67 – 69%
64 – 66%
60 – 63%
6.0
C
CD+
D
D–
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1
6.1.2
6.1.3
6.2
asjdkflaj
Information Security Protecting the Global Enterprise, by Donald L. Pipkin, Prentice-Hall,
2000. (or more recent text)
Security Engineering, by Ross Anderson, Wiley Computer Publishing, 2001. (or more
recent text)
Other suggested reading materials, if any.
Additional articles that have been collected for various topics are available at the UNO Library.
These articles are used to supplement topics presented in various chapters.
6.3
Other sources of information
Students are encouraged to collect articles in current professional and trade journals that are
relevant to topics in systems analysis and design. The process is particularly important in keeping
current with technology and new methodologies.
6.4
Current bibliography of resource for student’s information.
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
6.4.6
6.4.7
6.4.8
Designing Network Security by Merike and Kaeo, Cisco Systems,
Macmillan
Publishing, 1999.
Computer and Internet Use on Campus: A Legal Guide to Issues of
Intellectual
Property, Free Speech, and Privacy, by Constance S. Hawke, John Wiley & Sons,
September 1, 2000
Borders in Cyberspace: Information Policy and the Global Information Infrastructure
(Publication of the Harvard Information Infrastructure Project) by Brian Kahin and Charles
Nesson, MIT Press, March 1997.
Cybercrime: Law Enforcement, Security and Surveillance in the Information Age by Tom
Douglas, Routledge, and July 2000.
Data Privacy in the Information Age by Jacqueline Klosek, Praeger Publishing, August 30,
2000.
ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache, and Privacy
Regulations, by Timothy D. Casey, Wiley, 2000.
Technology and Privacy: The New Landscape, by Philip E. Agre, and Marc Rotenberg. , MIT
Press, September 1998.
Internet Privacy Protection Guide by J. K. Santiago, Boggy Cove, Inc. 1999.
-105-
6.4.9
6.4.10
6.4.11
6.4.12
6.4.13
6.4.14
6.4.15
6.4.16
6.4.17
6.4.18
6.4.19
6.4.20
6.4.21
6.4.22
6.4.23
6.4.24
7.0
E-Policy: How to Develop Computer, E-Policy, and Internet Guidelines to Protect Your
Company and Assets by Michael R. Overly, AMACOM, September 1998.
Computer and Information Ethics by John Weckert and Douglas Adeney, Greenwood
Publishing Group, May 1997.
Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing by Tom Forester
and Perry Morrison, MIT Press, December1993.
The Information Systems Security Officer's Guide: Establishing and Managing an
Information Protection Program by Gerald Kovacich, Butterworth-Heinemann, 1998
Information Warfare and Security by Dorothy E. Denning, Addison Wesley, 1999.
Cyberwar 2.0: Myths, Mysteries and Realities, Alan D. Campen and Douglas H. Dearth,
AFCEA Press, 1998.
The Art of Information Warfare: Insight into the Knowledge Warrior Philosophy, by
Richard Forno and Ronald Baklarz, Upublish.com, 1999.
Big Brother NSA, and It's Little Brother; National Security Agency's Global Surveillance
Network, by Cook, HSPI, March 1999.
Maximum Security; A Hacker's Guide to Protecting Your Internet Site and Network with
CDROM Anonymous / Sams Publishing, SAMS, 1998.
Information Warfare : Chaos on the Electronic Superhighway by Winn Schwartau,
Thunder's Mouth Pr. October 1996 .
Information Warfare : Principles and Operations by Edward Waltz, Artech House,
September 1998.
Strategic Appraisal: The Changing Role of Information in Warfare by John White, Zalmay
Khalilzad , Andrew W. Marshall, Rand Corporation, May 1999.
Toward a Revolution in Military Affairs : Defense and Security at the Dawn of the TwentyFirst Century (Contributions in Military Studies, No. 197) by Thierry Gongora and Harald
Von Riekhoff, Greenwood Publishing Group, June 30, 2000.
Hacker Proof; The Ultimate Guide to Network Security with CDROM by Lars Klander,
Jamsa Press, 2000.
Hacking Exposed; Network Security Secrets and Solutions, 2000, SAMS.
Designing Network Security by Merike Kaeo, Cisco Systems, Macmillan Publishing, 1999.
Estimate Computer Science Accreditation Board (CSAB) Category Content (class time in hours):
CSAB Category
Data structures
Computer organization and architecture
Algorithms and software design
Concepts of programming languages
8.0
Core
Advanced
12
Oral and Written Communications:
Every student is required to submit at least __2___ written reports (not including exams, tests, quizzes, or
commented programs) to typically __10-20___ pages and to make __1___ oral presentations of typically
__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,
as well as for technical content, completeness, and accuracy.
-106-
9.0
Social and Ethical Issues:
The course will address the social and ethical issues on Information Assurance. Students will be graded on
their understanding of these topics by class participation, exams, or researches.
10.0
Theoretical content:
Hours
11.0
10.1
The fundamental principles of Information Security
2
10.2
The basic concept of threat, evaluation of assets, information assets,
physical, operational, and information security and how they are related.
2
Problem analysis:
The students will learn the principles that are used by computer professionals. They will not only learn
about principles; but learn them in a logical order that provides a framework for developing and
performing the security tasks. The course will address hardware, software, processes, communications,
applications, and policies and procedures relative to information assurance in the organization.
12.0
Solution design
Using these established principles and frameworks, students will build and maintain secure and reliable
information systems. Students also learn to design and guide the development of a security policy for any
corporate environment.
CHANGE HISTORY
Date
11/2/02
6/25/03
10/14/08
6/23/2009
Change
Initial ABET version
ABET clean-up
Update to course title, description and
prerequisites
Updated course objectives to BIS program
objectives
By whom
Pietron
Wolcott
Pietron
Pietron
-107-
Comments
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
CIST 3600
Information Security and Policy
Leah R. Pietron
3
5/27/09
S – Strong relationship
X –Contributing relationship
S
S
S
S
S
x
x
x
x
X
S
S
S
13. Recognize need for prof. develop.
S
12. Manage change
S
11. Manage IS within application env.
x
10. Manage projects
x
9. Design, implement, evaluation IS
6. Computer-based tools
x
8. Model processes and data
5. Work on a team
x
7. Professional, legal, ethical standards
4. Communication
X
3. Analysis and design
2. Knowledge of computing
Course objective
Identify the fundamental principles of
Information Security
Demonstrate an understanding: the
concept of threat, evaluation of assets,
information assets, physical, operational,
and information security – and how they
are interrelated
Understand risk analysis and risk
management
Demonstrate the ability to design and
guide the development of a security
policy for any corporate environment.
Demonstrate an understanding of
mitigation approaches – technical and
administrative
1. Local and global role of iS
BIS Program Outcomes
S
S
S
X
X
S
-108-
X
Understand the need for a
comprehensive security model and its
implications for the security manager
Understand the need for the careful
design of a secure corporate information
infrastructure.
Demonstrate an understanding of
security technologies.
Understand the relationship network
infrastructure equipment to the
implementation of a given security policy.
Display an introductory understanding of
basic cryptography, its implementation
considerations and key management
Understand the importance of secure
system management - economical and
corporation implications
The Role of Procedures and Education in
the overall Corporate Security Solution
s
X
S
s
S
S
S
S
S
S
X
X
X
x
-109-
X
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. work effectively in a team environment and collaborate with others to accomplish a common goal.
6. understand and apply appropriate types of computer-based tools to support communication.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-110-
CIST 4360 Foundations of Information Assurance
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
Semester Offered
1.0
CIST 4360 CSCI 4360-001 CSCI 8366-001
Foundations of Information Assurance
Blaine Burnham and Robin Gandhi
3
May 26, 2009
Fall 2009
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
The purpose of the course is to provide students with a comprehensive overview of the
Information Assurance subject area starting from its foundational roots and to prepare students
for more extensive study in the subject. The course topics outline what we knew during the early
days of the field, what we now know, what has been done until now, and what are the
challenging problems still exist.
1.2
For whom course is intended.
This course is intended for graduate and undergraduate students with IA majors in the College of
IS&T who understand how computers are organized, how they compute and how they
communicate. These students need to have an uncommon passion for learning and the need to
have a highly motivated curiosity. Typically the class is designed for students that are seniors or
graduate students. However, admission for any qualified student may be arranged with
permission of the instructor.
1.3
Prerequisites of the course (Courses).
1.3.1
1.3.2
1.4
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.5
Introduction to information assurance (IASC 1100, CIST 3600, or instructor permission).
Computer networking (CSCI 3550 or ISQA 3400, or instructor permission).
Core terms and principles of information assurance: Confidentiality, Integrity, Availability,
Threats, Vulnerabilities, Types of Malware, Authorization, Access Control, Accountability,
Identification, Authentication, Security Controls, and Defense in Depth.
Computer networking topics: Media, Protocol Stacks, Protocol Encapsulation, ARP, IP
addressing, IP routing, ICMP, DHCP, TCP Virtual Circuits, Network Address Translation,
DNS, and HTTP.
Unusual circumstances of the course.
None
-111-
2.0
Objectives:
List of performance objectives stated in terms of the student educational outcomes.
2.1
Know and comprehend the principle concepts of information assurance.
2.2
Apply methods and tools associated with information assurance to
engineer dependable software systems.
2.3
Analyze case studies related to information assurance to
synthesize meaningful class presentations and discussions.
2.4
Criticize current information assurance approaches.
3.0
Content and Organization:
List of major topics to be covered in chronological sequence. (Total 43.5 topic hours assuming a 15 week
schedule and 1.5 hours for midterm)
3.1
What is Information?
(1 hour)
3.2
Legal, Privacy and Ethical Issues
(1.5 hour)
3.2.1
3.2.2
3.2.3
3.3
Overview of Information Assurance
3.3.1
3.3.2
3.3.3
3.3.4
3.4
(3 hours)
A Taxonomy of Information Assurance
The meaning of “Secure”
Attacks and Computer Criminals
A Vulnerability Taxonomy
Genesis of the Field
3.4.1
3.4.2
3.4.3
3.5
Information and Law
Computer crime
Ethical reasoning
(6 hours)
The problem description, The Ware Report
Proposed solutions, The Anderson Report
Design principle for secure systems
General Operating System
3.5.1
3.5.2
3.5.3
3.5.4
3.5.5
3.5.6
(3 hours)
Shared Resources
Access Control Mechanisms
General Operating System Process Management
Memory and Address Protection
File Protection
User protection
-112-
3.6
Identification and Authentication
3.6.1
3.7
Characteristics of a Trusted Operating System
Kernelized Design
Separation/Isolation
Virtualization
Layered Design
(3 hours)
Information Classification
Bell Lapadula
BIBA
Clark Wilson
Chinese Wall Policy
Case Study: Trusted Operating Systems Architecture
3.9.1
3.10
(3 hours)
Security Models
3.8.1
3.8.2
3.8.3
3.8.4
3.8.5
3.9
Trusted Path
Designing Trusted Operating System
3.7.1
3.7.2
3.7.3
3.7.4
3.7.5
3.8
(1 hours)
(3 hours)
Analysis of the Multics Ring Architecture
Trusted Operating System Assurance
(6 hours)
3.10.1 The History of Assurance in Computer Systems
3.10.2 Assurance methods
3.10.3 Trusted Computer System Evaluation
Criteria (TCSEC): The Orange Book
3.11
Trusted Database Implementation
(3 hours)
3.11.1 Security requirements for databases
3.11.2 Inference problems in databases
3.11.3 Multilevel Databases
3.12
Security in Network
(3 hours)
3.12.1 Common Threats to Networks
3.12.2 Network Security Controls
3.12.3 Firewalls and IDS
3.13
Fundamentals of Cryptography
3.13.1
3.13.2
3.13.3
3.13.4
(6 hours)
Background on Cryptography
Cryptographic Algorithms
Applying Cryptography
Attacks against Cryptography
-113-
3.14
Risk Management
(1 hour)
3.14.1 Security Planning
3.14.2 Risk Analysis
3.14.3 Organization Security Policies
4.0
Teaching Methodology:
4.1
Methods to be used.
The course will be presented primarily in lecture form. However, students will be expected to
participate in discussions of the various topics as they are studied. In addition to the study of the
text, students must do homework as assigned. Two tests will be given. A written paper with oral
presentation as a semester project will be required.
4.2
Student role in the course.
The students will be involved through exams, homework, projects, and discussions with each
other.
4.3
Contact hours.
3 hours per week.
5.0
Evaluation:
5.1
Project.
Students will complete a semester long project. The purpose of the semester project is to
demonstrate some in-depth knowledge of a topic related to the class subject material. Students
can choose to write a research paper exploring some topic related to the class, to demonstrate a
security application program, or to develop a programming project. Students will summarize the
lessons learned from the project with a 10-15 page report and 20 minute conference quality
power point presentation.
5.2
Laboratory Assignments.
The course includes a scheduled Laboratory component. The purpose of the Labs is to give
students the opportunity to develop an operational understanding of many of the concepts
discussed in class as well as additional ones. Each lab exercise will involve an investigation into
some part of the subject matter. Each exercise will result in a 5 page written paper and a 10minute presentation suitable for presentation at a faculty / student brown-bag forum. Laboratory
assignments will generally require access to STEAL-1 outside of class.
Daily Assignments.
-114-
Daily assignments will be for each student to bring to each class a one page write-up of two
current events articles and two web sites of substantive internet information security resource.
Each of these current event articles and web site references needs to be accompanied with a
short and incisive discussion of why the article or reference is relevant. The student should be
prepared to discuss these them class.
5.3
Exams.
Student performance will be evaluated through three examinations: 2 in-class exams and a
comprehensive Final Exam. All these exams will include a variety of question types to measure
student understanding of the material. Tentatively, exams are scheduled every seven weeks.
5.4
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
Two exams will be given during the course:
15%
15%
25%
20%
15%
5%
5%
5.5
Exam 1
Exam 2
Lab
Final exam
Semester project
Class attendance and participation
Daily written assignments
Grading scale and criteria.
98 –100%
93 – 97%
90 – 92%
88 – 89%
83 – 87%
80 – 82%
78 – 79%
72 – 77%
70 – 72%
68 – 69%
62 – 67%
60 – 62%
0 – 59%
6.0
A+
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
-115-
6.1
Textbooks and/or other required readings used in course.
6.1.1
6.1.2
6.1.3
6.1.4
6.2
Other suggested reading materials, if any.
6.2.1
6.2.2
6.3
Pfleeger, C.P., & Pfleeger, S.L. (2003). Security in Computing (3rd ed.). Upper Saddle River,
NJ: Pearson Education, Inc.
Anderson, R. (2001). Security Engineering: A Guide to Building Dependable Distributed
Systems (1st ed.). Wiley.
Schneier, B. (2000). Secrets and Lies: Digital Security in a Networked World (1st ed.). John
Wiley & Sons.
Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1997). Handbook of Applied
Cryptography. CRC Press Series on Discrete Mathematics and Its Applications.
Graff, M.G. & van Wyk, K. R. (2003). Secure Coding: Principles and Practice, O’Reilly &
Associates, Inc.
Bishop, M. (2005). Introduction to Computer Security. Addison-Wesley Professional.
Other sources of information.
Additional materials and online resources will be identified for students at the beginning of the
course and as the course progresses.
6.4
Current bibliography of resource for student’s information.
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
7.0
Anderson, J.P. (1972). Computer Security Technology Planning Study, ESD-TR-73-51,
ESD/AFSC, Hanscom AFB, Bedford, MA 01731 [NTIS AD-758 206]
Bell, D. E & La Padula, L. (1975). Secure Computer System: Unified Exposition and Multics
Interpretation, ESD-TR-75-306, ESD/AFSC, Hanscom AFB, Bedford, MA 01731. [DTIC ADA023588]
Department of Defense. (1983, 1985). Trusted Computer System Evaluation Criteria
(Orange Book). DoD 5200.28-STD
Karger, P. A. & Schell, R. R. (1974). MULTICS Security Evaluation: Vulnerability Analysis.
ESD-TR-74-193 Vol. II, ESD/AFSC, Hanscom AFB, Bedford, MA 01731.
Ware, W. (1970) Security Controls for Computer Systems (U): Report of Defense Science
Board Task Force on Computer Security. Rand Report R609-1, The RAND Corporation,
Santa Monica, CA.
Computer Science Accreditation Board (CSAB) Category Content (class time in hours)
CSAB Category
Data structures
Computer organization and architecture
Algorithms and software design
Concepts of programming languages
8.0
Core
5
5
10
5
Oral and Written Communications:
-116-
Advanced
10
5
5
Every student is required to submit at least __1 written summary per class period (not including exams,
tests, quizzes, or commented programs) to typically __2__ page and to be prepared to make __1__ oral
presentation per class period of typically __3-5__ minutes duration. Include only material that is graded
for grammar, spelling, style, and so forth, as well as for technical content, completeness, and accuracy.
Additionally, every student is required to submit at least __1 written semester project report (not
including exams, tests, quizzes, or commented programs) to typically __10-15__ pages and to make __1__
oral presentation of typically __20__ minutes duration.
9.0
Social and Ethical Issues:
Embedded in material covered throughout the course.
10.0
Theoretical content
Contact hours
10.1
10.2
10.3
11.0
What is information assurance?
Secure system engineering
Intrinsic and extrinsic assurance activities and their interdependencies
1.0
0.5
1.0
Problem analysis
Students experience analysis of information assurance problems through class examples, homework
exercises, and semester project report.
12.0
Solution design
The semester long project will provide the students with hands-on experience with tools and techniques
for information assurance.
CHANGE HISTORY
Date
Change
By whom
02/20/2009
05/26/2009
Initial ABET version
Corrected the CSCI Course No.
Robin Gandhi
Robin Gandhi
-117-
Comments
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
CIST 4360
Foundations of Information Assurance
Blaine Burnham and Robin Gandhi
3
May 26, 2009
S – Strong relationship
X – Contributing relationship
11. Manage IS within application env.
S
S
S
S
X
X
X
X
S
S
X
X
X
S
S
S
X
S
S
X
S
S
S
S
S
X
S
S
S
S
X
-118-
6. Computer-based tools
X
5. Work on a team
X
S
13. Recognize need for prof. develop.
10. Manage projects
X
S
12. Manage change
9. Design, implement, evaluation IS
S
X
8. Model processes and data
S
4. Communication
X
3. Analysis and design
X
2. Knowledge of computing
X
1. Local and global role of iS
Course objective
Know and comprehend the principle
concepts of information assurance.
Apply methods and tools associated with
information assurance to
engineer dependable software systems.
Analyze case studies related to
information assurance to
synthesize meaningful class presentations
and discussions.
Criticize current information assurance
approaches.
7. Professional, legal, ethical standards
BIS Program Outcomes
X
S
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. work effectively in a team environment and collaborate with others to accomplish a common goal.
6. understand and apply appropriate types of computer-based tools to support communication.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-119-
-120-
CIST 4370
Security Administration
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
CIST 4370/IASC 4370
Host Security Administration Using Windows
Stephen Nugen
3
Feb 17, 2009
Course Description
1.1
Overview of content and purpose of the course (Catalog description).
Students will learn the principles and practice of secure system administration of
host computers using Microsoft Windows operating systems. Lecture,
demonstrations, and hands-on assignments include installation, storage
management, account management, service management, and scripting. Students
will learn how to assess and harden Windows-based hosts operating in server and
client roles.
1.2
For whom course is intended.
This course is intended to be a second course for the Information Assurance degree
or the Information Assurance concentration at the undergraduate level; and a
foundation course for graduate study.
1.3
Prerequisites of the course (Courses).
1.3.1 Computer networking (CSCI 3550 or ISQA 3400, or instructor permission).
1.4
Prerequisites of the course (Topics).
1.4.1 Core terms and principles of Information Assurance such as: Confidentiality,
Integrity, Availability, Threats, Vulnerabilities, Types of Malware,
Authorization, Access Control, Accountability, Identification, Authentication,
Security Controls, Defense in Depth, Certification and Accreditation.
1.4.2 Understanding of networking topics such as: Media, Protocol Stacks, Protocol
Encapsulation, Ethernet, TCP/IP suite, IP addressing, IP routing, TCP Virtual
Circuits, and Network Address Translation.
1.4.3 Understanding the role of network application protocols like ARP, ICMP,
DHCP, DNS, and HTTP.
1.4.4 Understanding basic programming constructs sufficient to understand
presented content on Shell Scripting.
-121-
1.5
Unusual circumstances of the course.
None
2.0
Objectives
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
2.10
2.11
3.0
4.0
Understand core principles of Information Assurance with respect to host security.
Identify key sources for Information Assurance requirements with respect to how
operating systems are installed, configured, and maintained.
Understand the system administration and security impacts of different host
architectures.
Understand and demonstrate different options for installing the host operating
system.
Understand and demonstrate different options for user interfaces with respect to
host security.
Understand and demonstrate how to configure, inspect, and monitor host storage
mechamisms, including disks, partitions and volumes, file systems, and access
controls.
Understand and demonstrate how to write system administration scripts.
Understand and demonstrate how to configure operating system services.
Understand and demonstrate how to configure and manage Windows domains,
including domain user credentials.
Understand and demonstrate how to securely configure and manage Windows
networking and host firewall.
Identify options for host vulnerability assessments, including frameworks and tools.
Content and Organization
Contact hours
3.1
Introduction and context
1.5
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
Core security principles and requirements
Host considerations
Boot process and operating system installations
Configuring and inspecting host system state
Special focus on storage management
Special focus on scripting
Windows domains
Windows networking
Operating system services
Host assessments
3.0
3.0
4.5
6.0
3.0
6.0
3.0
4.5
6.0
4.5
Teaching Methodology
4.1
Methods to be used.
-122-
The primary teaching methods will be lecture, discussion, demonstrations, lab
exercises, and reading assignments.
4.2
Student role in the course.
Students will attend lectures and demonstrations, participate in discussions,
complete and submit lab and other assignments, and complete required
examinations.
4.3
Contact hours.
In-class contact consists of two 75-minute lectures per week (3.0 contact
hours/week).
5.0
Evaluation
5.1
Type of student projects that will be the basis for evaluating student performance,
specifying distinction between undergraduate and graduate, if applicable. For
Laboratory projects, specify the number of weeks spent on each project.
Students will complete individual assignments requiring independent study and
preparing short written responses to instructor-provided questions.
Students will also complete small and large laboratory assignments and projects with
specified deliverables such as: Report of Findings; Test Cases; and Annotated Source
Code. Most laboratory assignments will be be due within one to two weeks of
assignment. Some laboratory assignments will be started in-class. Laboratory
assignments will require access to STEAL-1 outside of class.
Student performance will also be evaluated through two examinations: Midterm and
a comprehensive Final Exam. Both of these exams will include a variety of question
types to measure student understanding of the material.
5.2
Basis for determining the final grade (Course requirements and grading standards)
specifying distinction between undergraduate and graduate, if applicable.
Grades will be determined on the following basis:
Assignments
Midterm
Final Exam
55%
20%
25%
-123-
100%
5.3
Grading scale and criteria.
Points
99 – 100%
92 – 98%
90 – 91%
88 – 89%
82 – 87%
80 – 81%
78 – 79%
72 – 77%
70 – 71%
68 – 69%
62 – 67%
60 – 61%
6.0
Grading
A+
A
A–
B+
B
B–
C+
C
CD+
D
D–
Resource Material
6.1
Textbooks and/or other required readings used in course. No required textbook.
6.2
Other suggested reading materials, if any.
6.2.1 Mueller, J.P. (2007). Windows Administration at the Command Line.
Indianapolis, Wiley.
6.2.2 Northrup, T. & Thomoas, O. (2004). Implementing and Administering Security
in a Microsoft Windows Server 2003 Network. Redmond, WA: Microsoft Press.
6.2.3 Russel, C., Crawford, S., & Gerend, J. (2003). Microsoft Windows Server 2003
Administrator's Companion. Redmond, WA: Microsoft Press.
6.2.4 Russinovich, M. & Solomon, D. (2005). Microsoft Windows Internals, Fourth
Edition. Redmond, WA: Microsoft Press.
6.2.5 Scambray, J. & McClure, S. (2003). Hacking Exposed Windows Server 2003.
New York, McGraw-Hill.
6.2.6 Scambray, J. & McClure, S. (2008). Hacking Exposed Windows: Windows
Security Secrets & Solutions, Third Ed. New York, McGraw-Hill.
6.2.7 Stanek, W. R. (2004). Microsoft Windows Server 2003 Inside Out. Redmond,
WA: Microsoft Press.
6.2.8 Stanek, W. R. (2007). Windows Vista Administrator's Pocket Reference.
Redmond, WA: Microsoft Press.
6.2.9 Stanek, W. R. (2008). Microsoft Windows Command-Line Administrator’s
Pocket Consultant, Second Edition. Redmond, WA: Microsoft Press.
-124-
6.3
Other sources of information.
Students are encouraged to collect articles in current professional and trade journals
that are relevant to security administration using Windows. The process is
particularly important in keeping current with technology and new methodologies.
6.4
Current bibliography of online resources for student’s information.
6.4.1 Carnegie Mellon Software Engineering Institute. (2009). CERT Coordination
Center. Available from http://www.cert.org/
6.4.2 CERIAS (Purdue). (2009). CERIAS Blog. Available from
http://www.cerias.purdue.edu/site/blog
6.4.3 Defense Information Systems Agency: Information Assurance Support
Environment. (2009). Security Technical Implementation Guides (STIGS) and
Supporting Documents. Available from http://iase.disa.mil/stigs/index.html
6.4.4 Department of Homeland Security. (2009). National Vulnerability Database.
Available from http://nvd.nist.gov/
6.4.5 Intini, F. (2008.) Feliciano Intini's Microsoft Security Taxonomy 2.0. Available
from http://blogs.technet.com/feliciano_intini/pages/
microsoft-blogs-and-web-resources-about-security.aspx
6.4.6 Jones, J. (2009). Jeff Jones Security Blog. Available from
http://blogs.technet.com/security/default.aspx
6.4.7 LeBlanc, D. (2009). David LeBlanc's Web Log. Available from
http://blogs.msdn.com/david_leblanc/
6.4.8 Margois, A. (n.d.) Aaron Margosis' "Non-Admin" WebLog. Available from
http://blogs.msdn.com/Aaron_Margosis/
6.4.9 Microsoft. (2006). BOOT.INI and ARC Path Naming Conventions and Usage.
Available from http://support.microsoft.com/kb/102873/EN-US/
6.4.10 Microsoft. (2006). Adding Optional Components to Add/Remove Programs
Tool. Available from http://support.microsoft.com/kb/223182/en-us
6.4.11 Microsoft. (2006). Security Monitoring and Attack Detection. Available from
http://www.microsoft.com/downloads/details.aspx?
FamilyID=1E194D99-5734-4B02-9CAA-C80F5C0FB0C0&displaylang=en
6.4.12 Microsoft. (2007). How To Add, Modify, Or Delete Registry Subkeys And
Values By Using A Registration Entries (.Reg) File. Available from
http://support.microsoft.com/kb/310516/
6.4.13 Microsoft. (2008). Windows Registry Information for Advanced Users.
Available from http://support.microsoft.com/kb/256986/
6.4.14 Microsoft. (2009). Microsoft Malware Protection Center: Threat Research &
Response Blog. Available from http://blogs.technet.com/mmpc/
6.4.15 Microsoft. (2009). Security Research & Defense. Available from
http://blogs.technet.com/swi/default.aspx
6.4.16 Microsoft. (2009). The Microsoft Security Response Center (MSRC). Available
from http://blogs.technet.com/msrc/default.aspx
-125-
6.4.17 Microsoft. (2009). Windows Client TechCenter. Available from
http://technet.microsoft.com/en-us/windows/default.aspx
6.4.18 Microsoft. (2009). Windows Server TechCenter. Available from
http://technet.microsoft.com/en-us/windowsserver/default.aspx
6.4.19 National Information Assurance Training and Education Center. (2009). Home
Page. Available from http://niatec.info/ViewPage.aspx?id=0.
6.4.20 National Institute of Standards and Technology: Computer Security Division.
(2009). Computer Security Resource Center. Available from
http://csrc.nist.gov/index.html
6.4.21 Schneirer, B. (2009). Schneier on Security. Available from:
http://www.schneier.com/blog/
6.4.22 US-CERT. (2009). Technical Users. Available from http://www.uscert.gov/nav/t01/
7.0
CSAB and CAC Category Content (class time in hours)
(CS Program) Estimate Computer Science Accreditation Board (CSAB) Category Content
CSAB Category
Data structures
Computer organization and
architecture
Algorithms and software design
Concepts of programming languages
8.0
Core
1
6
Advanced
2
2
3
3
Oral and Written Communications
All student submissions will be evaluated for technical content, application of principles,
completeness, accuracy, and use of use of supporting materials.
Student submittals such as justification of test cases or why certain attributes are more
valued in system administrators than other attributes will be also be graded for clarity of the
communication which includes: structure, grammar, spelling, for formatting.
Every student will be required to participate in classroom discussion.
Every student will be encouraged to help other students resolve laboratory problems and to
share their experiences and lessons-learned.
9.0
Social and Ethical Issues
The course will address the social and ethical issues related to the special role of System
Administration, including: individual privacy, sensitivity of information, and investigating
-126-
potential misuse. Students will be graded on their understanding of these topics through
participation, assignments, and examinations.
10.0
11.0
Theoretical Content
10.1
Transforming broad security policies into specific security controls
(e.g., access controls and audit).
6.0
10.2
Analyzing tradeoffs between decreased attack surface and diminished 6.0
functionality.
Problem Analysis
Students will learn the principles of host system administration, illustrated through
Microsoft Windows operating system environment. Students will demonstrate and extend
their understanding of those principles by solving problems in Windows system
administration.
12.0
Solution design
Students will develop command pipelines and scripts for secure host system administration,
choosing the appropriate commands and structures. Students will develop resourceconstrained host security assessment approaches, defending their tradeoff choices.
CHANGE HISTORY
Date
Change
02/17/2009 Revised ABET version
-127-
By whom
Comments
Nugen
Prerequisites changed.
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
CIST 4370/IASC 4370
Host Security Administration Using Windows
Stephen Nugen
3
Feb 17, 2009
S – Strong relationship
X – Contributing relationship
Understand core principles of
Information Assurance with respect
to host security.
Identify options for host
vulnerability assessments, including
frameworks and tools.
Identify key sources for Information
Assurance requirements with
respect to how operating systems
are installed, configured, and
maintained.
Understand the system
administration and security impacts
of different host architectures.
Understand and demonstrate
different options for installing the
X
X
X
X
X
X
X
-128-
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Computer-based tools
5. Work on a team
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
1. Local and global role of iS
BIS Program Outcomes
host operating system.
Understand and demonstrate
different options for user interfaces
with respect to host security.
Understand and demonstrate how
to configure, inspect, and monitor
host storage mechamisms, including
disks, partitions and volumes, file
systems, and access controls.
Understand and demonstrate how
to write system administration
scripts.
Understand and demonstrate how
to configure operating system
services.
Understand and demonstrate how
to configure and manage Windows
domains, including domain user
credentials.
Understand and demonstrate how
to securely configure and manage
Windows networking and host
firewall.
X
X
X
X
X
-129-
X
X
X
X
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. work effectively in a team environment and collaborate with others to accomplish a common goal.
6. understand and apply appropriate types of computer-based tools to support communication.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-130-
CIST 4540
Computer Security Management
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
CIST 4540
Computer Security Management
Dwight Haworth
3
November 15, 2008
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
The purpose of this course is to integrate concepts and techniques from security assessment,
risk mitigation, disaster planning, and auditing to identify, understand, and propose solutions
to problems of computer security and security administration.
1.2
For whom course is intended.
This course is intended for all students in the College of Information Science and Technology
who desire to increase their understanding of computer security management.
1.3
Prerequisites of the course (Courses).
1.3.1
1.3.2
1.4
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.5
CIST 4360 – Foundations of Information Assurance
or permission of the instructor.
Familiarity with computer hardware and system software.
Familiarity with the glossary of computer security.
Unusual circumstances of the course.
None.
2.0
Objectives:
List of performance objectives stated in terms of the student educational outcomes. The student will be
able to
2.1
2.2
2.3
2.4
Plan an organizational security assessment,
Specify the required characteristics of a system for a specific application,
Specify a network architecture to support given policy requirements,
Create a Disaster Response Plan, and
Identify the informational needs of a Computer Security Manager.
-131-
3.0
Content and Organization:
List of major topics to be covered in chronological sequence (specify number of contact hours on each).
Hours
3.1
Management responsibilities and liabilities
3.0
3.2
Turquoise Book
3.0
3.3
Vulnerability Assessment
3.0
3.4
Physical threats
3.5
3.5
Protecting Internet-visible systems
3.0
3.6
Orange Book
6.0
3.7
Common Criteria Standards
3.0
3.8
Software Development Issues
1.5
3.9
Continuity planning
3.0
3.10 Disaster recovery
6.0
3.11 Computer emergency response teams
4.0
3.12 Auditing Computer Security
3.0
3.13 Monitoring and Control Systems
1.5
4.0
Teaching Methodology:
4.1
Methods to be used.
4.1.1
4.1.2
4.1.3
4.2
Lecture and discussion of assigned material
The student is to prepare reports that require the application of principles and techniques
presented in class.
The student will read print media for articles related to the subject matter for the week
and submit a brief synopsis of the article.
Student role in the course.
The student will attend lectures and demonstration, participate in discussion on assigned
readings, take required quizzes, complete assigned projects, and complete required
examinations
4.3
Contact hours.
Three contact hours per week
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
5.1.1
5.1.2
5.1.3
Informational Analysis of Value Chain Activity
Design of a network security architecture
Recovery Process Planning
-132-
(3)
(2)
(2)
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
Component
Quizzes
Two Examinations
Assignments
5.3
Grading scale and criteria.
Points
97-100%
93-96%
90-92%
87-89%
83-87%
80-82%
77-79%
73-76%
70-72%
67-69%
63-66%
60-62%
<60%
6.0
Grading
10%
50%
40%.
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1
6.1.2
6.1.3
6.2
Other suggested reading materials, if any.
6.2.1
6.2.2
6.3
National Information Systems Security Glossary, by NSTISSC (2000).
Guide to Disaster Recovery, by M. Erbschloe (2003).
Other sources of information.
6.3.1
6.4
Textbook: Computer Security Handbook, by S. Bosworth and M. Kabay (2002).
Textbook: A Guide to Understanding Information Security Officer Responsibilities for
Automated Information Systems, by National Computer
Security Center (1992).
Reference: Department of Defense Trusted Computer System Evaluation Criteria, by
National Computer Security Center (2002).
Internet sites devoted to computer security and disaster planning
Current bibliography of resources for student’s information.
-133-
7.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
Advanced
3
3
0.5
12
4.5
Oral and Written Communications:
Every student is required to submit at least __2___ written reports (not including exams, tests, quizzes, or
commented programs) to typically __10___ pages and to make __0___ oral presentations of typically
_____ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as
well as for technical content, completeness, and accuracy. Each graduate student will submit one paper
of at least 15 pages (excluding front- and back-matter).
9.0
Social and Ethical Issues:
Please list the topics that address the social and ethical implications of computing covered in all course
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded
on their understanding of these topics (e.g. test questions, essays, oral presentations, and so forth?).
None
10.0
Theoretical content:
Please list the types of theoretical material covered, and estimate the time devoted to such coverage.
None.
11.0
Problem analysis:
Please describe the analysis experiences common to all course sections.
The student will analyze the value chain of a real company to identify critical informational flows along
with material flows necessary to maintain the operation of the value chain processes.
12.0
Solution design:
Please describe the design experiences common to all course sections.
The student will design a partitioned network structure to achieve varying levels of protection for the
information resources within each partition.
-134-
CHANGE HISTORY
Date
Change
11/15/08
Projects Changed
By whom
DAH
-135-
Comments
CC Toolbox Not Available
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
CIST 4540
Computer Security Management
Dwight A. Haworth
3
11/15/08
S – Strong relationship
X –Contributing relationship
X
X
X
X
X
-136-
X
X
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Computer-based tools
5. Work on a team
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
Plan an organizational security
assessment
Specify the required characteristics of a
system for a specific application
Specify a network architecture to support
given policy requirements
Create a Disaster Response Plan
Identify the informational needs of a
Computer Security Manager
1. Local and global role of iS
BIS Program Outcomes
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. work effectively in a team environment and collaborate with others to accomplish a common goal.
6. understand and apply appropriate types of computer-based tools to support communication.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-137-
-138-
CSCI 1620
Introduction to Computer Science II
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
CSCI 1620
Introduction to Computer Science II
John Clark
3
December 12, 2008
Course Description
1.1
Overview of content and purpose of the course (catalog description)
Advanced topics in programming; topics in data representation and manipulation, data structures,
problem solving and algorithm design.
1.2
For whom course is intended
This course is designed primarily for computer science and information systems majors.
1.3
Prerequisites of the course (courses)
CSCI 1610 or CIST 1400 with a grade of “C” or better
1.4
Prerequisites of the course (topics).
Basic programming skills and facility with:
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.4.6
1.5
Input/output
Control structures
Using functions
Arrays
Pointers
Basic object properties
Unusual circumstances of the course
None
2.0
Objectives
2.1
2.2
2.3
2.4
2.5
2.6
sdfgskdl
Describe the basic data types used in algorithms and discuss their implementation on modern
computer systems.
Discuss the concept of an abstract data type and how it is related to the concept of an object in
the context of object-oriented programming.
Characterize the ways in which the scope of an object can be controlled, with specific references
to the features available in C++ for controlling object lifetimes.
Discuss the use of recursion and iteration as alternate techniques for solving problems. Comment
on the manner in which local variables are preserved, and on the space/time tradeoffs in each
approach.
Describe several elementary sorting algorithms and comment on their running times using the
“big O” notation. Describe efficient algorithms to identify all permutations of a set of items, and
-139-
2.7
2.8
2.9
2.10
2.11
2.12
3.0
to identify all possible combinations of a set of items. Comment on the running time of these
algorithms.
Comment on the design of algorithms, specifically with regard to verifying their correctness.
Discuss the potential effects of the failure of an algorithm.
Discuss operator overloading, specifically as it is used in the C++ programming language. Indicate
its purpose, appropriate circumstances for its use, and how the compiler decides which function
to use when an overloaded operated is utilized.
Illustrate the use of templates in the C++ programming language. Indicate how the appropriate
use of templates can reduce the size of a source program. Comment on whether the size of the
object program is also reduced when templates are employed.
Comment on techniques for defining objects that store collections of other objects. Indicate
typical ways in which the objects in these collections may be accessed, including specific coding
examples in C++.
Describe the stack, queue, and list abstract data types. Provide example implementations in the
C++ programming language. Illustrate the use of these data types in several classic applications.
Define a generic tree abstract data type. Discuss how a generic tree differs from a search tree.
Demonstrate implementation of binary trees and binary search trees in the C++ programming
language. Illustrate the use of tree is solutions to several classic applications.
Content and Organization
3.1
Data Representation
(2 hours)
3.1.1 Basic Data Types
3.1.2 Computer Storage of Basic Data Types
3.2
Abstract Data Types & Objects
3.2.1
3.2.2
3.2.3
3.2.4
(4 hours)
Abstract Data Type Specification
Object Specification
Object Implementation
Object Instantiation
3.3
Dynamic Memory Management
(3 hours)
3.4
Recursion
(5 hours)
3.4.1 Space, Time and Computability Considerations
3.4.2 Run Time Stack
3.4.3 Combinations & Permutations
3.5
Basic sorting techniques
3.5.1
3.5.2
3.5.3
3.5.4
(4 hours)
Definition of sorting
Basic algorithms for sorting
The “big O” notation
Recursion and sorting
-140-
3.6
Object Oriented Techniques
(6 hours)
3.6.1 Operator Overloading
3.6.2 Template Objects
3.7
Collection Classes
3.7.1
3.7.2
3.7.3
3.7.4
3.8
Composite Objects
Access Collections
Group Collections
Organizing Collections
Stacks & Queues
3.8.1
3.8.2
3.8.3
3.8.4
3.9
(4 hours)
(5 hours)
Expression Analysis
Priority Queues
Resource Allocation
Event Driven Simulations
Linked Lists
(4 hours)
3.9.1 Singly Linked
3.9.2 Circular
3.9.3 Doubly Linked
3.10
Trees
3.10.1
3.10.2
3.10.3
3.10.4
4.0
(8 hours)
Structure
Binary
Binary Search Trees
Parsing
Teaching Methodology
4.1
Methods to be used
This course is presented primarily through lectures.
4.2
Student role in the course
The student in this course will analyze algorithms, code object oriented and linear data structure
programs, write programs, and work on group projects.
4.3
Contact hours
Three hours per week
-141-
5.0
5.0
Evaluation
5.1
Type of student projects that will be the basis for evaluating student performance,
specifying distinction between undergraduate and graduate, if applicable. For laboratory
projects, specify the number of weeks spent on each project).
The grade for a student will be based on a combination of homework, group projects and
examinations. Between one and two weeks will be spent on each laboratory project.
5.2
Basis for determining the final grade
Traditionally, approximately 60 to 70 percent of the grade will be determined by
performance on between 7 and 9 laboratory projects. Scores on examinations and
quizzes will be the basis for the remaining part of the grade, with a midterm examination
having a typical weight of 10 percent, and a final examination having a weight of 20
percent..
Laboratory assignments will be evaluated using the following components and weights:
40 percent for correctness, 40 percent for documentation/ease of use and ease of
maintenance, and 20 percent for having all required components submitted (source files,
output examples, etc.). Suitable penalties for tardiness will be imposed (e.g. 15 percent if
an submission is more than three days late).
5.3
Grading scale and criteria
Points
97 – 100%
93 – 96%
90 – 92%
87 – 89%
83 – 86%
80 – 82%
77 – 79%
73 – 76%
70 – 72%
67 – 69%
63 – 66%
60 – 62%
0 – 59%
6.0
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
-142-
6.1
Textbooks and/or other required readings used in course.
6.1.1 Ford & Topp,. Data Structures With C++ , Prentice Hall, 1996 (or a more recent
text)
6.2
Other suggested reading materials, if any
None
6.3
Other sources of information
None
6.4
Current bibliography of resource for student’s information
None
7.0
Computer Science Accreditation Board (CSAB) Category Content (class time in hours)
CSAB Category
Data structures
Computer organization and architecture
Algorithms and software design
Concepts of programming languages
8.0
Core
15
Advanced
10
20
Oral and Written Communications
Every student is required to submit at least __0___ written reports (not including exams, tests,
quizzes, or commented programs) to typically _____ pages and to make ___0__ oral
presentations of typically _____ minutes duration. Include only material that is graded for
grammar, spelling, style, and so forth, as well as for technical content, completeness, and
accuracy
9.0
Social and Ethical Issues
The importance of testing algorithms is made clear to students. Examples of algorithm failure
and the impact of these failures are presented.
10.0
Theoretical content
This course introduces algorithmic problem-solving in the context of a modern programming language.
Such topics as problem solving strategies, basic data structures, data and procedural abstraction, and
algorithmic complexity are treated.
-143-
Contact Hours
10.1
10.2
10.3
10.4
10.5
10.6
10.7
10.8
10.9
Data Representation
Abstract Data Types and Objects
Dynamic Memory Management
Recursion
Object Oriented Techniques
Collection Classes
Stacks & Queues
Linked Lists
Trees
2.0
4.0
3.0
5.0
6.0
4.0
5.0
4.0
8.0
11.0
Problem analysis
Basic problem analysis is a focal point of this course. While learning the techniques of abstraction and
encapsulation for basic data structures, the programming exercises provide opportunities to use the
analysis techniques discussed in class.
12.0
Solution design
This course amplifies the object-oriented programming techniques introduced in CIST 1400. Students
learn fundamental techniques for organizing data using a variety of classic data structures. Treatment of
memory management and recursion complement the discussion of these data structures. The significance
of choosing the appropriate data structure for a solution is illustrated throughout the design of solutions
to the programming exercises.
CHANGE HISTORY
Date
02/20/1998
06/13/2003
12/2/2008
Change
Original version
Cleanup, ABET-specific material
Cleanup, ABET-specific material
By whom
Clark
Wileman
Clark
-144-
Comments
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
CSCI 1620
Introduction to Computer Science II
John W. Clark
3
12/2/2008
S – Strong relationship
X – Contributing relationship
Describe the basic data types
Abstract data types and objectoriented programming
Object scope
Recursion and iteration techniques for
solving problems
Searching, sorting and “big O”
notation
Operator overloading
C++ templates
Collections and storage classes
Linear storage types ( stack, queue,
and list )
S
S
X
S
X
X
X
X
S
S
S
S
S
X
S
X
-145-
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Computer-based tools
5. Work on a team
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
1. Local and global role of iS
BIS Program Outcomes
Trees and binary search trees
S
X
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. work effectively in a team environment and collaborate with others to accomplish a common goal.
6. understand and apply appropriate types of computer-based tools to support communication.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-146-
ISQA 3150 Principles of Quantitative Analysis
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
The course is designed to give students the principles of Quantitative Analysis, a scientific
approach to decision making that involves the operations of organizational systems.
Quantitative Analysis attempts to solve the conflicts of interest among the components of
the organization in a way that is best for the organization as a whole.
1.2
For whom course is intended.
This course is intended for upper division undergraduate MIS majors who wish to
understand the principles of Quantitative Analysis. It is one of elective courses for
undergraduates who wish to pursue Data Mining and Business Intelligence.
1.3
Prerequisites of the course (Courses).
CIST 1100 and CIST 2500
1.4
Prerequisites of the course (Topics).
1.4.1 Introduction to Visual Basic Programming,
1.4.2 Program development cycle
1.4.3 Training in spreadsheets and database
1.4.4 Statistics in information science and technology
1.4.5 A well-known computer package being used to support the problem-solving
process.
Unusual circumstances of the course.
None
1.5
2.0
ISQA 3150
Principles of Quantitative Analysis
Yong Shi
3
10/02/08
Objectives:
List of performance objectives stated in terms of the student educational outcomes.
2.1
2.2
To structure the real-life situation into a mathematical model, and abstract the essential elements
so that a solution relevant to the decision maker’s objective can be sought. This involves looking
at the problem in the context of the entire organizational system;
To explore the structure of such solutions and develop systematic procedures for obtaining them;
-147-
2.3
3.0
To develop a solution that yields an optimal value of the organizational system measure of
desirability, or compare alternative courses of action by evaluating their measure of desirability.
Content and Organization:
Contact hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
4.0
Introduction
Linear Programming: Model Formulation & Graphical
Solution, Computer Solution and Modeling Examples
Integer Programming
Transportations
Multi-criteria Decision Making
Decision Analysis
Forecasting
Inventory Management
3
12
6
6
6
6
6
6
Teaching Methodology:
4.1
Methods to be used.
The primary teaching methods will be lectures.
4.2
Student role in the course.
The student will attend lectures, participate in discussion, complete required
examinations, homework and the class project.
4.3
Contact hours.
Three (3) hours per week
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance,
specifying distinction between undergraduate and graduate, if applicable. For Laboratory
projects, specify the number of weeks spent on each project).
The student will attend lectures, participate in discussion, complete required
examinations, homework and the class project.
5.2
Basis for determining the final grade (Course requirements and grading standards)
specifying distinction between undergraduate and graduate, if applicable.
Components
Exams
Class Project
Grading
60%
25%
-148-
Class Participation / Homework
5.3
Grading scale and criteria.
Points
96 – 100%
90 – 95%
86 – 89%
80 – 85%
76 – 79%
70 – 75%
66 – 69%
60 – 65%
< 60%
6.0
15%
Grade
A+
A
B+
B
C+
C
D+
D
F
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1 B. W. Taylor III, Management Science, Prentice Hall, 9th Ed.
6.1.2 B. Render, R. M. Star JR, and N. Balakrishnan, Managerial Decision Modeling,
Prentice Hall, 2nd Ed.
6.1.3 B. Render, R. M. Star JR, and M. E. Hanna, Quantitative Analysis for Management,
Prentice Hall, 8th Ed. (or more recent text)
6.2
Other suggested reading materials, if any.
None
6.3
Other sources of information.
None
6.4
Current bibliography of resource for student’s information.
None
7.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Hardware and software
Networking and telecommunications
-149-
Core
Advanced
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
12
9
6
Oral and Written Communications:
Every student is required to submit at least ___3__ written reports (not including exams, tests,
quizzes, or commented programs) to typically __30___ pages and to make __1___ oral
presentations of typically __10___ minutes duration. Include only material that is graded for
grammar, spelling, style, and so forth, as well as for technical content, completeness, and
accuracy.
9.0
Social and Ethical Issues:
No coverage
10.0
Theoretical content:
Please list the types of theoretical material covered, and estimate the time devoted to such
coverage.
Hours
10.1
10.2
10.3
10.4
10.5
10.6
11.0
Linear Programming
Integer Programming
Transportations
Multi-criteria Decision Making
Decision Analysis
Forecasting
12
6
6
6
6
6
Problem analysis:
Students learn the principles of Quantitative Analysis, a scientific approach to decision making
that involves the operations of organizational systems. They learn to solve the conflicts of
interest among the components of the organization in a way that is best for the organization as a
whole.
12.0
Solution design:
Students learn to develop a solution that yields an optimal value of the organizational system
measure of desirability, or compare alternative courses of action by evaluating their measure of
desirability.
-150-
CHANGE HISTORY
Date
Change
By whom
12/2002
6/25/03
10/09/07
10/02/08
Initial ABET version
ABET cleanup
Update of resource material
Review completed
Shi
Wolcott
Shi
Shi
-151-
Comments
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
S – Strong relationship
X – Contributing relationship
ISQA 3150
Principles of Quantitative Analysis
Yong Shi
3
5/26/09
S
X
S
S
S
-152-
S
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
Structure the real-life situation into a
mathematical model, and abstract the
essential elements so that a solution
relevant to the decision maker’s objective
can be sought. This involves looking at
the problem in the context of the entire
organizational system;
Explore the structure of such solutions
and develop systematic procedures for
obtaining them;
Develop a solution that yields an optimal
value of the organizational system
measure of desirability, or compare
alternative courses of action by
evaluating their measure of desirability.
1. Local and global role of iS
BIS Program Outcomes
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-153-
-154-
ISQA 3210 Advanced Technology for Personal Productivity
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 3210
Advanced Technology for Personal Productivity
Leah R. Pietron
3
10/13/08
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
The purpose of this class is to give students extensive coverage in the area of the
microcomputers and its components, operating systems (Windows XP, Windows Vista),
an office suite (Microsoft Office 2007), and e-commerce site/intranet/internet design
(HTML/XML).
1.2
For whom course is intended.
This course is intended for undergraduate MIS majors and minors who wish to study
Advanced Technology for Personal Productivity including the area of the microcomputers
and its components, operating systems, an office suite, and e-commerce
site/intranet/internet design.
1.3
Prerequisites of the course (Courses).
CIST 1100
1.4
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.4.6
1.4.7
1.4.8
1.5
Fundamental Competencies in Word, Excel, Access, and PowerPoint
Basic Operating Systems operations
Understanding of Hardware Components
Proposal Development
HTML and Web Design
Basic HTML
Introduction to Graphics
Basic Web Design Principles
Unusual circumstances of the course.
None
-155-
2.0
3.0
Objectives:
2.1
Build and maintain personal computers: Students will complete an End User Needs
Analysis and complete specifications for a proposed client. They will use a lab
environment to build and repair current problems with personal computers.
2.2
Learn to configure and install operating systems (Windows 98/Windows 2000/Windows
XP): Students will deal with configuration and installation of an operating system in a LAN
environment, if labs and time are available.
2.3
Develop an e-commerce site/intranet/internet and develop personal and client home
pages using HTML/DHTML/JavaScript. If time allows, students will be given instruction on
using Cold Fusion.
2.4
Learn to use word processing (Word 2000/XP), spreadsheets (Excel 2000/XP), database
management (Access 2000/XP), and presentation graphics (PowerPoint 2000/XP)
programs. In addition, desktop publishing (Publisher 2000) and photo editor (PhotoDraw
2000) might be covered.
Content and Organization:
Contact hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
4.0
Managing and Maintaining PC
End User Analysis Project
Operating Systems - Windows 98 & Windows NT/2000/XP
HTML
DHTML
Word 2000
Excel 2000
Access 2000
PowerPoint 2000
3.0
3.0
3.0
15.0
6.0
3.0
3.0
3.0
3.0
Teaching Methodology:
4.1
Methods to be used.
The primary teaching methods include lectures, hands-on demonstrations, and guidance
on the semester projects.
4.2
Student role in the course.
Students will attend lectures, complete homework assignments, and unit projects
4.3
Contact hours.
-156-
Three (3) hours per week.
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance,
specifying distinction between undergraduate and graduate, if applicable. For Laboratory
projects, specify the number of weeks spent on each project).
Operating Systems Exercises
End User Analysis project
Office XP/2000 Word, Excel, Access, and PowerPoint projects
E-Commerce Web Design Project
5.2
Basis for determining the final grade (Course requirements and grading standards)
specifying distinction between undergraduate and graduate, if applicable.
Component
End User Analysis Project
HTML Projects
Web Design/Page Project
Word 2000
Excel 2000
Access 2000
PowerPoint 2000
5.3
Grading
15%
35%
10%
10%
10%
10%
10%
Grading scale and criteria.
Points
97% - 100%
93% - 96%
90% - 92%
87% - 89%
83% - 86%
80% - 82%
77% - 79%
73% - 76%
70% - 72%
67% - 69%
63% - 66%
60% - 62%
0% - 59%
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
-157-
6.0
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1 Microsoft Office 2000, Advanced Concepts and Techniques by Gary B. Shelly,
Thomas J. Cashman, and Misty E. Vermaat. Course Technology, 2000.
6.1.2 Creating Web Pages with HTML and Dynamic HTML by Patrick Carey, Course
Technology, 2001.
6.1.3 Microsoft XP New Features Guide: Changes from Office 2000 to Office XP
(packaged with Microsoft Office 2000 textbook)
6.2
Other suggested reading materials, if any.
6.2.1 Web Style Guide: Basic Design Principles for Creating Web Sites by Patrick Lynch
and Sarah Horton, Prentice-Hall, 2001.
6.2.2 Principles of Web Design by Joel Skalar, Course Technology, 2001
6.2.3 Cold Fusion by Kapathi & Kapathi, Course Technology, 2002.
6.2.4 A+ Guide to Managing and Maintaining Your PC, Third Edition by Jean Andrews,
Course Technology, 2002.
6.2.5 Designing Web Pages with Cascading Style Sheets by Joel Skalar, Course
Technology, 2001.
6.2.6 Cascading Style Sheets: Designing for the Web, Second Edition by Hakon Wium Lie
and Bert Bos, Addison Wesley, 2001.
6.2.7 Creative HTML Design by Lynda Weinman & William Weinman, Prentice-Hall,
2000.
6.2.8 Microsoft Windows 98 for Power Users by Harry L.Phillips, Course Technology,
2000.
6.2.9 Microsoft Windows 2000 for Power Users by Harry L.Phillips, Course Technology,
2001.
6.2.10 Microsoft MS-DOS Command Line - Comprehensive by Harry L.Phillips, Course
Technology, 2001.
6.3
Other sources of information.
Additional course content, either with pages developed especially for this course or with
links to additional course materials, will be provided during the semester.
6.4
Current bibliography of resource for student’s information.
None.
7.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time
in hours):
-158-
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
10
6
6
10
6
8
Advanced
Oral and Written Communications:
Every student is required to submit at least __2___ written reports (not including exams, tests,
quizzes, or commented programs) to typically __15-50___ pages and to make __1___ oral
presentations of typically __10___ minutes duration. Include only material that is graded for
grammar, spelling, style, and so forth, as well as for technical content, completeness, and
accuracy.
9.0
Social and Ethical Issues:
Social and ethical issues are threaded throughout all the units of this course: operating systems,
personal computer maintenance, end user analysis project, Office XP, and the development of an
e-commerce site. Topics include piracy of software, inappropriate duplication of software,
privacy and security issues regarding data collected on the web sites.
10.0
Theoretical content:
Please list the types of theoretical material covered, and estimate the time devoted to such
coverage.
No coverage.
11.0
Problem analysis:
The students will complete an End User Needs Analysis project that involves solving a problem
presented to them in a scenario. They have to conduct the research and make recommendations
based on the request for proposals (RFP) presented by the proposal client.
Students learn to analyze configurations, operating and network, and conduct routine
maintenance on their personal and business machines. The learn how to load two major types of
operating systems: Windows (2000/XP) and Linux (Red Hat 7.4).
-159-
Each student or group of two students must create a web site for a client. The student must
analyze the needs of the web site and use the appropriate tools to develop and design the web
application.
12.0
Solution design:
The end user project provides the analysis to select the appropriate software and hardware
solve the problem for the client. Based on this research, the student recommends systems
configuration, network implications and solutions, and application solutions.
Student will learn to develop an e-commerce site/intranet/internet and develop personal and
client home pages using HTML/DHTML/JavaScript. If time allows, students will be given
instruction on using Cold Fusion and Photoshop. The students will learn not only the code, but
the design elements behind the development of pages, graphics, and web sites.
Students will also learn design features of the office suite including word processing (Word
2000/XP), spreadsheets (Excel 2000/XP), database management (Access 2000/XP), and
presentation graphics (PowerPoint 2000/XP) programs. In addition, desktop publishing (Publisher
2000) and photo editor (PhotoDraw 2000) might be covered.
CHANGE HISTORY
Date
11/2/02
6/25/03
10/13/08
Change
Initial ABET version
ABET cleanup
Update to course description and
prerequisites
By whom
Pietron
Wolcott
Pietron
-160-
Comments
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 3210
Advanced Technology for Personal Productivity
Leah R. Pietron
3
5/26/09
S – Strong relationship
X – Contributing relationship
X
X
X
X
-161-
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
Build and maintain personal computers:
Students will complete an End User
Needs Analysis and complete
specifications for a proposed client. They
will use a lab environment to build and
repair current problems with personal
computers
Learn to configure and install operating
systems (Windows 98/Windows
2000/Windows XP): Students will deal
with configuration and installation of an
operating system in a LAN environment,
if labs and time are available.
Develop an e-commerce
site/intranet/internet and develop
personal and client home pages using
HTML/DHTML/JavaScript. If time allows,
students will be given instruction on
using Cold Fusion.
1. Local and global role of iS
BIS Program Outcomes
Learn to use word processing (Word
2000/XP), spreadsheets (Excel 2000/XP),
database management (Access 2000/XP),
and presentation graphics (PowerPoint
2000/XP) programs. In addition, desktop
publishing (Publisher 2000) and photo
editor (PhotoDraw 2000) might be
covered.
S
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-162-
ISQA 3250 Intermediate Quantitative Analysis
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 3250
Intermediate Quantitative Analysis
Yong Shi
3
10/02/08
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
The course is designed to provide students advanced decision making models in solving
business case problems. These models include transportation models, integer
programming, goal programming, simulation applications, Markov process in market
shares and dynamic programming. A variety of computer software will be applied to
formulate and solve both case-study and real-life problems.
1.2
For whom course is intended.
This course is intended for upper division undergraduate MIS majors who wish to
understand the advanced Quantitative Analysis. It is one of elective courses for
undergraduates who wish to pursue Knowledge Management, Data Mining and Business
Intelligence.
1.3
Prerequisites of the course (Courses).
1.3.1 CIST 1100
1.3.2 CIST 2500
1.3.3 ISQA 3150
1.3.4 or equivalent
1.4
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.5
Introduction to Visual Basic Programming,
Program development cycle
Training in spreadsheets and database
Statistics in information science and technology
A well-known computer package being used to support the problem-solving
process.
Unusual circumstances of the course.
-163-
None
2.0
Objectives:
List of performance objectives stated in terms of the student educational outcomes.
2.1
2.2
2.3
3.0
To structure the real-life situation into advanced mathematical models, and abstract the
essential elements so that a solution relevant to the decision maker’s objective can be
sought. This involves looking at the problem in the context of the entire organizational
system;
To explore the structure of such solutions and develop systematic procedures for
obtaining them;
To develop a solution that yields an optimal value of the organizational system measure
of desirability, or compare alternative courses of action by evaluating their measure of
desirability.
Content and Organization:
Contact hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
4.0
Introduction
Transportation Models: Part I
Transportation Models: Part II
Integer Programming
Goal Programming
Simulation
Markov Processes
Dynamic Programming
3
6
6
9
6
6
6
6
Teaching Methodology:
4.1
Methods to be used.
The primary teaching methods will be lectures.
4.2
Student role in the course.
The student will attend lectures, participate in discussion, complete required
examinations, homework and the class project.
4.3
Contact hours.
Three (3) hours per week
-164-
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance,
specifying distinction between undergraduate and graduate, if applicable. For Laboratory
projects, specify the number of weeks spent on each project).
The student will attend lectures, participate in discussion, complete required
examinations, homework and the class project.
5.2
Basis for determining the final grade (Course requirements and grading standards)
specifying distinction between undergraduate and graduate, if applicable.
Components
Exams
Class Project
Class Participation / Homework
5.3
Grading scale and criteria.
Points
96 – 100%
90 – 95.9%
86 – 89.9%
80 – 85.9%
76 – 79.9%
70 – 75.9%
66 – 69.9%
60 – 65.9%
< 60%
6.0
Grading
60%
25%
15%
Grade
A+
A
B+
B
C+
C
D+
D
F
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1 B. W. Taylor III, Management Science, Prentice Hall, 9th Ed.
6.1.2 B. Render, R. M. Star JR, and N. Balakrishnan, Managerial Decision Modeling,
Prentice Hall, 2nd Ed.
6.1.3 B. Render, R. M. Star JR, and M. E. Hanna, Quantitative Analysis for Management,
Prentice Hall, 8th Ed. (or more recent text)
6.2
Other suggested reading materials, if any.
-165-
None
6.3
Other sources of information.
None
6.4
Current bibliography of resource for student’s information.
None
7.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
Advanced
12
6
3
Oral and Written Communications
Every student is required to submit at least ___3__ written reports (not including exams, tests,
quizzes, or commented programs) to typically ___30__ pages and to make _1____ oral
presentations of typically ___10__ minutes duration. Include only material that is graded for
grammar, spelling, style, and so forth, as well as for technical content, completeness, and
accuracy.
9.0
Social and Ethical Issues:
No coverage
10.0
Theoretical content:
Please list the types of theoretical material covered, and estimate the time devoted to such
coverage.
Hours
10.1 Integer Programming
9
10.2 Transportations
12
10.3 Goal Programming
6
10.4 Markov Processes
6
10.5 Dynamic Programming
6
-166-
11.0
Problem analysis:
Students learn the advanced models of Quantitative Analysis, a scientific approach to decision
making that involves the operations of organizational systems. They learn to solve the conflicts
of interest among the components of the organization in a way that is best for the organization
as a whole.
12.0
Solution design:
Students learn to develop a solution that yields an optimal value of the organizational system
measure of desirability, or compare alternative courses of action by evaluating their measure of
desirability.
CHANGE HISTORY
Date
Fall 2001
6/25/03
10/09/07
10/02/08
Change
Created
ABET cleanup
Update of resource material
Review completed
By whom
Shi
Wolcott
Shi
Shi
Comments
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 3250
Intermediate Quantitative Analysis
Yong Shi
3
5/26/09
S – Strong relationship
X – Contributing relationship
BIS Program Outcomes
-167-
S
X
S
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
4. Communication
3. Analysis and design
2. Knowledge of computing
1. Local and global role of iS
Course objective
Structure the real-life situation into
advanced mathematical models, and
abstract the essential elements so that a
solution relevant to the decision maker’s
objective can be sought. This involves
looking at the problem in the context of
the entire organizational system
Explore the structure of such solutions
and develop systematic procedures for
obtaining them
Develop a solution that yields an optimal
value of the organizational system
measure of desirability, or compare
alternative courses of action by
evaluating their measure of desirability
S
S
S
X
X
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
-168-
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-169-
-170-
ISQA 3300 File Structures for Information Systems
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 3300
File Structures for Information Systems
Dwight Haworth
3
5/30/09
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
The purpose of this course is to introduce the student to computer file organizations
and access methods. A fundamental understanding of the performance implications
of each file organization is developed to allow the students to make information
systems design choices that will optimize the performance of business information
systems.
1.2
For whom course is intended.
This course is intended for undergraduate students in the College of Information
Science and Technology who wish to pursue the Bachelor of Science in Management
Information Systems (BIS) degree. It is one of the required courses for the degree.
1.3
Prerequisites of the course (Courses).
CSCI 1620 - Introduction Computer Science II.
1.4
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.4.3
1.4.4
1.5
2.0
Ability to program using procedural logic.
Ability to use Microsoft Excel.
Familiarity with probability distributions.
Familiarity with computer hardware and software.
Unusual circumstances of the course.
None.
Objectives:
List of performance objectives stated in terms of the student educational outcomes. The student will be
able to
2.1
Comprehension of computer hardware components,
2.2
Comprehension of the attributes and functions of file systems,
2.3
Application of storage devices to meet specified requirements,
2.4
Analysis of file organizations to meet specified response time and storage constraints,
2.5
Evaluate the output of processing algorithms with respect to selected performance criteria, and
2.6
Program file processing algorithms (application) using pseudocode.
-171-
3.0
Content and Organization:
List of major topics to be covered in chronological sequence (specify approximate number of contact
hours on each).
Hours
3.1.1 Computer hardware capabilities and limitations 3.0
3.1.2 File programming fundamentals
3.0
3.1.3 Physical storage organization
3.0
3.1.4 File system implementations (Windows and Unix)
6.0
3.1.5 Techniques for evaluating file performance
3.0
3.1.6 Sorting, searching, and indexing
6.0
3.1.7 Sort-merge and the balance line algorithm
3.0
3.1.8 Indexes
3.0
3.1.9 Tree structures and their maintenance
5.0
3.1.10 Static Hashing
4.0
3.1.11 Extendible Hashing
3.0
3.1.12 Continuous track storage (CDROM, DVD, etc) 1.5
4.0
Teaching Methodology:
4.1
Methods to be used.
4.1.1
4.1.2
4.2
Lecture and discussion of assigned material
The student is to use a modern programming language to implement selected file
structures and access algorithms.
4.1.3 Laboratory: The student must use a computer to solve assigned problems. The student is
to arrange his/her own laboratory time as needed to complete each assignment. Students
may use their own microcomputer to complete assigned problems.
Student role in the course.
The student will attend lectures and demonstration, participate in discussion on assigned
readings, take required quizzes, complete assigned projects, and complete required
examinations.
4.3
Contact hours.
Three contact hours per week
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
5.1.1
5.1.2
5.1.3
5.1.4
5.1.5
5.1.6
History of storage technologies
Programming the priming read algorithm
Storage utilization efficiency using blocking
Balance line programming
Static Hashing Algorithm Evaluation
Static hashing programming
-172-
(1)
(1)
(1)
(2)
(2)
(2)
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
Component
Approx.
Weight
Quizzes
10%
Two Examinations 50%
Assignments
40%.
5.3
Grading scale and criteria.
Points
97-100%
93-96%
90-92%
87-89%
83-87%
80-82%
77-79%
73-76%
70-72%
67-69%
63-66%
60-62%
<60%
6.0
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1
6.1.2
Textbook: File Structures, by Folk, Zoellick, and Riccardi (1998).
References: Appropriate reference manual for the compiler used in student exercises.
6.2
Other suggested reading materials, if any.
6.3
Other sources of information.
6.3.1
6.3.2
6.3.3
6.3.4
6.4
Internet sites devoted to the history of computer technologies
Internet sites devoted to comparing sorting algorithms
Dr. Haworth's internet site with File Structures online textbook.
File System Forensic Analysis, by B. Carrier (2005)
Current bibliography of resources for student’s information.
6.4.1
6.4.2
File Organization and Processing, by A. Tharp (1988)
File Structures, by Folk and Zoellick (1992)
-173-
6.4.3
7.0
File Systems: Structures and Algorithms, by T. Harbron (1988)
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
9
Advanced
6
24
4
Oral and Written Communications:
Every student is required to submit at least __0___ written reports (not including exams, tests, quizzes, or
commented programs) to typically _____ pages and to make __0___ oral presentations of typically _____
minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as well as
for technical content, completeness, and accuracy.
9.0
Social and Ethical Issues:
Please list the topics that address the social and ethical implications of computing covered in all course
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded
on their understanding of these topics (e.g. test questions, essays, oral presentations, and so forth?).
None
10.0
Theoretical content:
Please list the types of theoretical material covered, and estimate the time devoted to such coverage.
File processing theory
Probability theory (Poisson Distribution)
11.0
1.5
1.5
Problem analysis:
Please describe the analysis experiences common to all course sections.
The student will analyze various file access alternatives to determine which produces the most efficient
storage utilization. The student will analyze hashing algorithms to determine which produces the fewest
collisions.
12.0
Solution design:
Please describe the design experiences common to all course sections.
The student will use a balance line algorithm to implement one of three types of problem solutions. The
student will design a static hashing system store a specified number of records.
-174-
CHANGE HISTORY
Date
6/12/03
Change
Change prerequisite. Course Change Form
5/15/03.
By whom
Lw
6/25/03
3/25/08
5/30/09
ABET cleanup
Update content and required textbook
Update student outcomes and map
outcomes to Program outcomes
Wolcott
Haworth
Haworth
-175-
Comments
Change prereq. From CIST 1400 to
CSCI 1620 so students have more
programming experience.
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 3300
File Structures for Information Systems
Dwight A. Haworth
3
5/30/09
S – Strong relationship
X –Contributing relationship
X
X
X
X
X
X
X
X
X
-176-
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Computer-based tools
5. Work on a team
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
Comprehension of computer hardware
components
Comprehension of the attributes and
functions of file systems
Application of storage devices to meet
specified requirements
Analysis of file organizations to meet
specified response time and storage
constraints
Evaluate the output of processing
algorithms with respect to selected
performance criteria
Program file processing algorithms
(application) using pseudocode
1. Local and global role of iS
BIS Program Outcomes
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. work effectively in a team environment and collaborate with others to accomplish a common goal.
6. understand and apply appropriate types of computer-based tools to support communication.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-177-
-178-
ISQA 3310 Managing the Database Environment
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 3310
Managing the Database Environment
Peter Wolcott
3
1/31/08
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
Introduction to business database design and management functions. The focus is on the use of
current database management systems (DBMS) to support the data management function of an
organization. Topics include data modeling, database design, SQL, data management and
database administration. Hands-on experience in database design, creation, and use is provided.
1.2
For whom course is intended.
This course is intended for the undergraduates who wish to pursue the Bachelor of Science in
Management Information Systems (BIS) degree. It is one of the required courses for the degree.
1.3
Prerequisites of the course (Courses).
1.3.1 ISQA 3210 Advanced Technology for Personal Productivity (co-requisite)
1.3.2 CIST 1100 Introduction to Personal Programming
1.3.3 CIST 3100 Organizations, Applications, and Technology
or equivalent.
1.4
Prerequisites of the course (Topics).
1.4.1 General knowledge of Windows environment from user’s perspective
1.4.2 Introductory exposure to Microsoft Access
1.4.3 Knowledge of basic storage architecture and terminology
1.4.4 Basic familiarity with the role of data within organizations
1.4
Unusual circumstances of the course.
None
-179-
2.0
Objectives:
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
2.10
2.11
3.0
Distinguish between ‘data’ and ‘information’.
Define the terms 'database', 'database management system' and distinguish between such
systems and their predecessors.
Define the characteristics and benefits of the relational database model.
Use SQL to define and modify database objects, and retrieve data.
Describe the database development process, and explain how it fits into the broader context of
systems analysis, design, and implementation.
Use data modeling techniques and tools to develop data models.
Design appropriately normalized relations in a relational DBMS.
Design and implement a relational database system of modest size using a contemporary DBMS.
Identify the data integrity and security issues associated with database systems and explain how
these are addressed in contemporary database management systems.
Discuss the issues and techniques used with databases in a distributed environment, including the
Internet.
Explain the purpose, architecture, and associated terminology of data warehousing.
Content and Organization:
Contact hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
File processing systems definition and components of database system
Microsoft Access DBMS
The Relational Model
SQL & PL/SQL
Database development process
Data modeling & Entity-Relationship Diagramming
Logical database design: ERD to tables, Functional dependencies
Logical database design: Normalization
Transaction Processing & Concurrency Control
Business Intelligence and Data Warehousing
Databases and the Internet
-180-
3.0
1.5
1.5
9.0
4.5
6.0
4.5
3.0
3.0
3.0
3.0
4.0
Teaching Methodology:
4.1
Methods to be used.
The primary teaching methods are lectures, discussion, and in-class demonstrations. Both the
normal class meeting and the Internet-only teaching are available.
4.2
Student role in the course.
The student attends lectures, participate in the class discussion and complete assignments,
required examinations and the semester database project.
4.3
Contact hours.
Three hours per week.
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
Students participate in the class discussion and complete assignments, required examinations and
the semester database project.
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
Components
Exams
Assignments
Project
Participation
5.3
Grading
30%
50%
15%
5%
Grading scale and criteria.
Points
Grade
97-100%
93-96%
90-92%
87-89%
83-86%
80-82%
77-79%
73-76%
70-72%
67-69%
63-66%
60-62%
A+
A
AB+
B
BC+
C
CD+
D
D-
-181-
<60%
6.0
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1
6.1.2
7.0
F
Kroenke, D. (2006). Database Processing: Fundamentals, Design, and Implementation,
Tenth Edition (or more recent), Upper Saddle River, NJ : Prentice Hall.
Rob, P., and Coronel, C. (2007). Database Systems: Design, Implementation, and
Management, Seventh Edition (or more recent), Boston, MA: Course Technology.
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
6
Advanced
6
16
34
Oral and Written Communications:
Every student is required to submit at least __0___ written reports (not including exams, tests, quizzes, or
commented programs) to typically _____ pages and to make _0____ oral presentations of typically _____
minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as well as
for technical content, completeness, and accuracy.
9.0
Social and Ethical Issues:
No coverage
10.0
Theoretical content:
The course includes the following theoretical topics on database systems:
Hours
10.1
10.2
11.0
The relational Model
Normalization
1.5
3.0
Problem analysis:
Students learn to analyze the database model, database components, the transaction processing,
database administration and databases in the distributed environment. In the part of the database model,
-182-
students primarily learn the relational model; in the part of databases in the distributed environment,
students learn distributed databases and the relationship between databases and Internet.
12.0
Solution design:
Students learn the methods and processes needed to develop and design databases: the data modeling
and logical database design. Students will complete the semester database project by designing and
implementing a modest-size, but realistic database application.
CHANGE HISTORY
Date
12/19/02
Change
Time spent with Access limited to just
database construction
By whom
Wolcott
12/19/02
Database administration dropped from
content
Wolcott
12/19/02
Amount of time on databases in a
distributed environment, data
warehousing, databases and the Internet
reduced to 1.5 weeks total
Change course description and
prerequisites.
Wolcott
6/25/03
ABET cleanup
Wolcott
10/3/07
1/31/08
Updated resource material
Insertion of table mapping course
objectives to program outcomes
Course objectives updated to improve
wording.
Wolcott
Wolcott
Included more business intelligence
coverage
Included PL/SQL coverage
Wolcott
Updated resource material to APA citation
format.
Wolcott
6/12/03
1/31/08
10/13/08
10/31/08
2/12/09
Wild
Wolcott
Wolcott
-183-
Comments
The how-tos of interface design will
be provided via links to optional
tutorial. The database class will
focus on the database issues, not
complete systems development.
ISQA 4300 Database Administration
is available, and more time is
needed in ISQA 3310 for core
concepts.
Databases and the Internet and
databases in a distributed
environment covered in ISQA 4380.
More room left for core topics
Change description to reflect actual
course content and update
prerequisites needed.
Updated prerequisite topics to
reflect new requirement for CIST
1100
Update of textbook
‘Understand’ changed to a more
active verb, e.g. ‘explain’, ‘describe’
in many cases.
In response to demand by students
and IS&T advisory group.
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 3310
Managing the Database Environment
Peter Wolcott
3
1/31/08
S – Strong relationship
X – Contributing relationship
X
S
X
X
X
S
S
S
-184-
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
X
4. Communication
X
3. Analysis and design
2. Knowledge of computing
Course objective
Distinguish between ‘data’ and
‘information’.
Define the terms 'database', 'database
management system' and distinguish
between such systems and their
predecessors.
Define the characteristics and benefits of
the relational database model.S
Use SQL to define and modify database
objects, and retrieve data.
Describe the database development
process, and explain how it fits into the
broader context of systems analysis,
design, and implementation.
Use data modeling techniques and tools
to develop data models.
Design appropriately normalized relations
in a relational DBMS.
Design and implement a relational
1. Local and global role of iS
BIS Program Outcomes
database system of modest size using a
contemporary DBMS.
Identify the data integrity and security
issues associated with database systems
and explain how these are addressed in
contemporary database management
systems.
Discuss the issues and techniques used
with databases in a distributed
environment, including the Internet.
Explain the purpose, architecture, and
associated terminology of data
warehousing.
X
X
X
-185-
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-186-
ISQA 3400 Business Data Communications
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 3400
Business Data Communications
Kerry Ward
3
10/01/08
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
Data Communications principles and service operations with computers and telecommunication
systems for operational analysis and decision making. This course will focus on breath, not depth
-- concepts rather than specific technologies because concepts remain constant over time, while
technologies change from year to year. Students are expected to master the basic terminologies
and concepts, not necessarily to become experts in computer networking, nor to know the
engineering details of any technology.
1.2
For whom course is intended.
This course is required for those students pursuing undergraduate and graduate degrees. It is one
of the required courses for BIS degree.
1.3
Prerequisites of the course (Courses).
1.3.1
1.4
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.4.6
1.4.7
1.4.8
1.5
CIST 3100 Organizations, Applications, and Technology
Computer architecture basics
Transmission links
Network topologies
Network security and management
Network protocols
Network standards
OSI model
Internetworking
Unusual circumstances of the course.
None
2.0
Objectives:
2.1
Learn data communications principles and service operations with computers and
telecommunication systems for operational analysis and decision making.
-187-
2.2
2.3
2.4
2.5
3.0
Master the basic terminology and concepts of data communications.
Analyze and design a system or a sub-system of a large scale system for the semester project
applying the tools and techniques learn in the course.
Carry out hands-on projects to understand data communications models.
Understand network implementation, management, and use.
Content and Organization:
Contact hours
3.1
Data Transmission
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.1.6
3.1.7
3.2
21.0
Packets, Frames, and Error Detection
LAN Technologies and Network Topology
Hardware Addressing and Frame Type Identification
LAN Wiring, Physical Topology, and Interface Hardware
Extending LANs: Fiber Modems, Repeaters, Bridges, and Switches
Long-Distance Digital Connection Technologies
WAN Technologies and Routing
Connection-Oriented Networking and ATM
Network characteristics: Ownership, Service Paradigm, and Performance
Protocols and Layering
Internetworking
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.3.6
3.3.7
3.3.8
3.3.9
4.0
asjdklaj
Introduction
Internet Trends
Naming With the Domain Name System
Transmission Media
Long-Distance Communication (carriers,
Modulation, and Modems)
Networking and Packet Transmission
3.2.1
3.2.2
3.2.3
3.2.4
3.2.5
3.2.6
3.2.7
3.2.8
3.2.9
3.2.10
3.3
12.0
9.0
Internetworking: Concepts, Architecture, and Protocols
IP: Internet Protocol and Addresses
Binding Protocol Addresses (ARP)
IP Datagrams and Datagram Forwarding
IP Encapsulation, Fragmentation, and Reassembly
The Future IP (Ipv6)
An Error Reporting Mechanism (ICMP)
TCP: Reliable Transport Service
Network Security
Teaching Methodology:
-188-
4.1
Methods to be used.
The primary teaching methods will be interactive lectures, article discussions and actual cases.
4.2
Student role in the course.
The student will attend lectures, participate in in-class discussion, complete quizzes, exams,
assignments and the semester project.
4.3
Contact hours.
Three (3) hours per week.
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
Students will complete quizzes, exams, assignments and semester projects.
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
Component
Exams
Quizzes
Class Participation
Class Assignments
Class Project Report
Final Exam
5.3
Grading
37.5%
6.25%
6.25%
12.5%
25%
12.5%
Grading scale and criteria.
Points
98 – 100%
90 – 97%
87 – 89%
84 – 86%
80 – 83%
77 – 79%
74 – 76%
70 – 73%
67 – 69%
64 – 66%
Grade
A+
A
AB+
B
BC+
C
CD+
-189-
60 – 63%
57 – 59%
<= 56%
6.0
D
DF
Resource Material
6.1
Textbooks and/or other required readings used in course.
Douglas E. Comer, Computer Networks and Internets, Fifth Edition, Prentice Hall Publishing
Company.(or more recent text)
6.2
Other suggested reading materials, if any.
6.2.1
6.2.2
6.2.3
6.3
Behrouz A. Forouzan, Data Communications and Networking, Third Edition, McGraw Hill
Publishing Company.(or more recent text)
William Stallings, and Richard Van Slyke, Business Data Communications, Second Edition,
MacMillan Publishing Company.(or more recent text)
Charles N. Thurwachter, Data and Telecommunications: Systems Applications, Prentice
Hall Publishing Company.(or more recent text)
Other sources of information.
Handouts
6.4
Current bibliography of resource for student’s information.
None
7.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
6
42
Advanced
8
5
Oral and Written Communications:
Every student is required to submit at least _ 1__ written report (not including exams, tests, quizzes, or
commented programs) to typically ___10__ pages and to make _ 1_ oral presentation of typically
__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,
as well as for technical content, completeness, and accuracy.
-190-
Note: For the class project report, a student is expected to work alone or work in project team of 2 or 3
students and complete a report and one presentation. The individual assignment requires a student to
complete a summary and one presentation. The student is also expected to complete the team
assignment including a report and one presentation.
9.0
Social and Ethical Issues:
No coverage
10.0
Theoretical content:
This course primarily provides an overview of data communication and computer networking concepts,
and includes the following topics:
10.1 Data Transmission (3 hours)
10.2 Packet Transmission (3 hours)
10.3 OSI Reference model (3 hours)
10.4 Internetworking concepts (3 hours)
11.0
Problem analysis:
Students learn data communications principles and service operations with computers and
telecommunication systems for operational analysis and decision making. Students will learn to analyze a
systems or a sub system of a large scale system for the semester project applying the tools and
techniques learn in the course.
12.0
Solution design:
Students will learn to design a systems or a sub system of a large scale system applying the tools and
techniques learn in the course. Specially, they will complete the design document for the semester
project.
CHANGE HISTORY
Date
6/12/03
6/25/03
10/09/07
10/1/08
Change
Prerequisite from CSCI 2010 to 2110.
Course Change Form 2/21/03
ABET cleanup
Minor Revisions/Updates
Minor Revisions/Updates, including change
in prerequisite course number from CIST
2110 to CIST 3100
By whom
Wild
Wolcott
Ward
Ward
-191-
Comments
Course 2010 no longer required for
degree.
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
S – Strong relationship
X – Contributing relationship
ISQA 3400
Business Data Communications
Kerry Ward
3
01/22/09
S
X
S
X
X
X
X
BIS Program Outcomes (2009)
-192-
X
X
X
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
X
4. Communication
X
3. Analysis and design
2. Knowledge of computing
Course objective
Learn data communications principles
and service operations with computers
and telecommunication systems for
operational analysis and decision making.
Master the basic terminology and
concepts of data communications.
To understand how the Internet and
specific organizational networks function
Analyze a specific aspect of business data
communications in depth as a small
group project.
Carry out hands-on projects to
understand data communications
models.
Understand network implementation,
management, and use.
1. Local and global role of iS
BIS Program Outcomes
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-193-
-194-
ISQA 3420 Managing in a Digital World
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 3420
Managing in a Digital World
Stacie Petter
3
10/08/08
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
This course introduces the fundamentals of management as they apply in businesses and other
organizations, particularly from an information systems/technology (IS/T) management lens. In
particular, the course examines the various roles, responsibilities, and skills essential to
managerial success in the context in which the IT manager operates today -- a dynamic
environment of workforce diversity, a global economy, and concern for ethics and social
responsibility.
1.2
For whom course is intended.
The course is intended for undergraduate students in Information Systems, Computer Science and
related areas who are interested in learning the basics of management theory and its application
to the practice of IS/T management.
1.3
Prerequisites of the course (Courses).
CIST 3100 or permission from the instructor
1.4
Prerequisites of the course (Topics).
None
1.5
Unusual circumstances of the course.
None
2.0
Objectives:
List of performance objectives stated in terms of the student educational outcomes.
The goal of this course is to discuss and interpret management theory from an IS/T management lens.
Students examine opportunities and challenges in a world that is increasingly connected to one another
via technology. In this course, students will:
-195-
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
2.10
2.11
2.12
2.13
2.14
2.15
2.16
3.0
Increase awareness of how a dynamic and changing information-intensive environment affects IS
managers.
Appreciate challenges and opportunities of IS management in context of 21st century
organizations.
Understand the international aspects of IS management to develop a global and multi-cultural
view.
Understand the importance of having a competitive advantage and the potential role of IT in
developing a competitive advantage.
Become familiar with environmental challenges that IS managers face in managing diversity,
quality, information technology, and knowledge for competitive advantage in the 21st century.
Become familiar with the foundations of ethical managerial behavior, using information ethically,
and issues/challenges as it pertains to IS/T management
Understand IS planning processes as basic managerial responsibilities.
Understand strategy formulation and business models in a competitive IS/T environment.
Understand controls and organizational systems for control for the IS/T function.
Understand the challenges of attracting, developing, and maintaining a high quality IT workforce
Understand ways of organizing the workplace, with special emphasis high performance work
designs in IT organizations.
Identify how work can be altered with the use of information system and technology.
Understand the challenges of IS leadership, leadership theories and models, and the role of the
Chief Information Officer.
Understand issues affecting the management of global IS/T, particularly challenges of and best
practices for managing teleworkers and virtual teams
Appreciate the IT-enabled change process, including change strategies, resistance to change and
the nature of organization development.
Understand models for technology adoption and diffusion of technological innovations.
Content and Organization:
List of major topics to be covered in chronological sequence (specify number of weeks on each).
3.1
The Changing Organization and Workplace
1 week
3.2
Globalization
1 week
3.3
IT Management Environment and Role of IT for Competitive Advantage – 1 week
3.4
Ethics in the Digital World
1 week
3.5
IS/IT Planning
½ week
3.6
Business and IS Strategy; Business Models
1 ½ weeks
3.7
Control and Audit of Information Systems and Services ½ week
3.8
Managing and Retaining IS/T Employees
1 week
3.9
Motivating IS/T Employees
1 week
3.10 IS Organization Structure
½ week
3.11 Design of Work Using IS/IT
1 week
3.12 Organizational Culture and IS
1 week
3.13 IS Leadership
1 week
3.14 Teams, Teamwork, Virtual Teams
½ week
3.15 IT Enabled Change Management
1 week
-196-
4.0
Teaching Methodology:
4.1
Methods to be used.
The primary teaching methods will include class discussion, case study, and lecture.
4.1
Student role in the course.
The student will attend lectures, participate in class discussion on assigned readings, complete
assigned projects and papers, and complete required examinations.
Each student will be assigned to a learning group to participate in a project during the course of
the semester. These learning groups will examine a topic in more depth outside of the classroom.
Tasks that may be performed by learning groups would be the analysis of a case study or the
completion of a project in a virtual context.
4.2
Contact hours.
3 hours
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
Students will be evaluated on the following basis.
Class participation: Students are expected to attend each and every class and be prepared to
actively participate in the discussion. Much of the class will be conducted using an open
discussion approach, and the success of the class will be dependent on students’ ability to identify
and discuss relevant issues.
Exams: There will be three examinations.
Class Project: Each person will be assigned to a learning group to complete a case study or class
project which relates to one or more topic in the course.
Assignments: Students will receive assignments to be completed in class or outside of class to
reinforce material discussed in the classroom or in the readings.
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
The grade base for the course for undergraduate students will consist of the following:
Available points
-197-
Class Participation
Class Project
Exams
Assignments
5.3
15%
35%
35%
15%
Grading scale and criteria.
The grading scale is as follows:
GRADE POINT VALUE
A
93% <= x % <= 100%
A90% <= x <= 92%
B+
87% <= x <= 89%
B
83% <= x <= 86%
B80% <= x <= 82%
C+
77% <= x <= 79%
C
73% <= x <= 76%
C70% <= x <= 72%
D+
67% <= x <= 69%
D
63% <= x <= 66%
D60% <= x <= 62%
F
Less than 59%
An “I” or “IP” will be awarded only if a student is unable to complete the course requirements due
to circumstances beyond her/his control as specified in the UNO catalog. The student must also
have substantially completed the course and have a passing grade when the grade of “I” is
requested.
6.0
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.2
Customized text book based on the following:
6.2.1
Compilation of Articles, Cases and Internet Links in Information Systems Management
relating to each topic listed in the syllabus above.
The following is a typical list of articles and cases that students will read in a given semester. The
articles and case studies vary across semesters to ensure timely discussion of topics and issues.
6.2.2
6.2.3
6.2.4
6.2.5
“We’re All Entrepreneurs.” Goldsmith, M. BusinessWeek, August 14, 2008
“The Future IS Organization in a Flat World.” Gerth, A.B. and Rothman, S. Information
Systems Management, Vol 24, Iss. 2, 2007.
CASE: “InfoSys: Leveraging the Global Delivery Model (2004).” Jain, Amit. INSEAD, 2004.
“How to Find Your Competitive Advantage.” Moore, G. CIO.com, May 1, 2006.
-198-
6.2.6
6.2.7
6.2.8
6.2.9
6.2.10
6.2.11
6.2.12
6.2.13
6.2.14
6.2.15
6.2.16
6.2.17
6.2.18
6.2.19
6.2.20
6.2.21
6.2.22
6.2.23
6.3
Other suggested reading materials, if any.
6.3.1
6.4
“Mastering the Three Worlds of Information Technology.” McAfee, A. Harvard Business
Review, Nov. 1, 2006.
CASE: “Going Up Against Google.” Fitzgerald, M. Inc. Magazine, February 2006.
“What’s Wrong with Being ‘Borderline Ethical’?” Liebowitz, B., Healthcare Financial
Management, September 2003.
CASE: “The End of Enron's Empire.” Wang, J., Chen, Q., Yao, J., and Xing, R. Idea Group
Publishing, 2006.
“Getting IT Right.” Charlie S. Feld and Donna B. Stoddard. Harvard Business Review, Vol.
82 Issue 2, Feb 2004.
“Chapter 1: The Information Systems Strategy Triangle”, Pearlson, K.E. and Saunders, C.S.
Managing and Using Information Systems: A Strategic Approach, 2006.
CASE: “MySQL Open Source Database in 2004.” Burgelman, Robert A. Graduate School of
Business Stanford University, 2004.
CASE: “The True Meaning of Twitter.” Lashinksy, A. Fortune, August 7, 2008.
“How to Hook the IT Professionals you Need.” Overby, S. CIO.com, June 2007.
“Closing the Geek Gap.” Zetlin, M. Profit Magazine, November 2006.
CASE: “Lucent Technologies: Halting Information Technology Employee Turnover.”
Schneberger, S.L. and Mark, K. Richard Ivey School of Business, 2001.
CASE: “Microsoft.NET (Abridged).” MacCormack, A. and Herman, K. Harvard Business
School Publishing, 2004.
CASE: “Sealed Air Corporation: Globalization and Corporate Culture.” Paine, L.S. and
Wruck, K.H. Harvard Business School Publishing, 2006.
“Seeking Loyal, Devoted Workers? Let Them Stay Home” Coombes, A. Wall Street Journal,
Sep. 11, 2007.
“Creating and Sustaining Trust in Virtual Teams” Greenberg, P.S., Greenberg, R.H.,
Lederer A.Y. Business Horizons, 2007.
“Note on Innovation Diffusion: Rogers' Five Factors.” John T. Gourville. Harvard Business
School Publishing, 2005
“What to do when employees resist change.” Gregory J Iskat, Jay Liebowitz. SuperVision,
Vol. 64, Iss. 8. Aug 2003.
CASE: “Apple Inc., 2008.” Yoffie, D. and Slind, M. Harvard Business School Publishing;
2008.
Schermerhorn, J. R., Jr. (2004 or current edition). Core Concepts of Management. John
Wiley & Sons, Inc.
Other sources of information.
Guest speakers or other current articles from reputable journals, magazines, or media outlets.
6.5
Current bibliography of resource for student’s information.
Same as above.
7.0
(Fill out for ISQA and CIST courses) Estimate Computing Accreditation Commission (CAC) Category
Content (class time in hours):
-199-
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
0
0
0
3
0
6
Advanced
0
0
0
0
0
30
Oral and Written Communications:
Every student is required to submit at least ___7__ written reports (not including exams, tests, quizzes, or
commented programs) of typically __2-3___ pages and to make __1___ oral presentations of typically
__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,
as well as for technical content, completeness, and accuracy.
9.0
Social and Ethical Issues:
Please list the topics that address the social and ethical implications of computing covered in all course
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded
on their understanding of these topics (e.g. test questions, essays, oral presentations, and so forth?).
Ethics is discussed as a course topic for a one week period. The first half of the week is devoted to lecture
and discussion and students focus on the following learning objectives related to ethics:

Become familiar with the foundations of ethical managerial behavior and the issues/challenges
that pertain to IS/T management
 Define basic concepts related to ethical behavior
 Become familiar with ethical codes for our profession
 Recognize ethical dilemmas and forces that create them
 Identify different perspectives and approaches to resolve an ethical dilemma
Students then apply these concepts to a case study in which ethical dilemmas are discussed in more detail
and within the context of a specific situation. Students are graded based on class participation in this
discussion and test questions.
Social issues, as related to computing, are discussed throughout the semester. However, these topics are
brought to the forefront when we discuss globalization, competitive advantage, and IS culture. Students
are evaluated on their understanding of these issues via class participation, test questions, essay
questions, and homework assignments.
10.0
Theoretical content:
Please list the types of theoretical material covered, and estimate the time devoted to such coverage.
-200-
Several theoretical concepts related to IS are discussed in this course, such as:
10.1
10.2
10.3
10.4
10.5
10.6
10.7
11.0
The organization as a system – 1 week
Ethical frameworks as they relate to IS – 1 week
Business strategy frameworks – 1 ½ weeks
Employee turnover and retention models – ½ week
Motivational theories – 1 week
Leadership theories – 1 week
Change management and technology acceptance – 1 week
Problem analysis:
Please describe the analysis experiences common to all course sections.
Students read and discuss case studies throughout the semester. At least eight case studies are read and
discussed in class. In these discussions, students identify problems occurring in organizations as it relates
to concepts discussed in class.
The class project, regardless of its format, requires students to analyze a problem using frameworks and
ideas presented in class.
12.0
Solution design:
Please describe the design experiences common to all course sections.
Students develop solutions to problems identified from readings in case studies. These are discussed in
small groups and as a class. Students are also expected to identify solutions to specific problems that
occur in managing in a digital world via essay questions on exams.
CHANGE HISTORY
Date
3/10/06
10/8/08
Change
Syllabus created
Revision of syllabus to reflect current
course content. More detail
provided in template to conform to
ABET standards.
-201-
By whom
Khazanchi
Stacie
Petter
Comments
Lecture topics remained the
same; however, readings
reflect most current cases and
articles used in the course.
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 3420
Managing in a Digital World
Stacie Petter
3
10/8/08
S – Strong relationship
X – Contributing relationship
13. Recognize need for prof. develop.
11. Manage IS within application env.
9. Design, implement, evaluation IS
X
S
X
S
X
X
X
X
S
S
X
X
X
S
S
S
S
S
S
X
S
-202-
X
X
X
12. Manage change
S
10. Manage projects
4. Communication
8. Model processes and data
3. Analysis and design
X
6. Work on a team
2. Knowledge of computing
S
5. Computer-based tools
1. Local and global role of iS
Course objective
The goal of this course is to discuss and
interpret management theory from an
IS/T management lens.
Increase awareness of how a dynamic
and changing information-intensive
environment affects IS managers.
Appreciate challenges and opportunities
of IS management in context of 21st
century organizations.
Understand the international aspects of
IS management to develop a global and
multi-cultural view.
Understand the importance of having a
competitive advantage and the potential
role of IT in developing a competitive
advantage.
Become familiar with environmental
challenges that IS managers face in
managing diversity, quality, information
7. Professional, legal, ethical standards
BIS Program Outcomes
X
X
X
X
X
technology, and knowledge for
competitive advantage in the 21st
century.
Become familiar with the foundations of
ethical managerial behavior, using
information ethically, and
issues/challenges as it pertains to IS/T
management
Understand IS planning processes as
basic managerial responsibilities.
Understand strategy formulation and
business models in a competitive IS/T
environment
Understand controls and organizational
systems for control for the IS/T function.
Understand the challenges of attracting,
developing, and maintaining a high
quality IT workforce
Understand ways of organizing the
workplace, with special emphasis high
performance work designs in IT
organizations.
Identify how work can be altered with the
use of information system and
technology.
Understand the challenges of IS
leadership, leadership theories and
models, and the role of the Chief
Information Officer.
Understand issues affecting the
management of global IS/T, particularly
challenges of and best practices for
managing teleworkers and virtual teams
Appreciate the IT-enabled change
process, including change strategies,
resistance to change and the nature of
organization development.
Understand models for technology
adoption and diffusion of technological
innovations.
S
S
S
X
X
S
S
X
S
X
X
S
S
X
S
S
S
S
S
S
S
S
S
S
S
X
S
-203-
S
X
X
X
X
X
X
S
S
X
X
X
X
X
X
X
X
X
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-204-
ISQA 3520 Graphic User Interface Design
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 3520
Graphical User Interface Design
Sidney Davis
3
10/12/08
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
The purpose of this course is to introduce the principles of interface design. In this course,
students will learn principles that have been used successfully in the past and apply them to
everyday examples from business and industry; students will become aware of the roles of
different disciplines (e.g., computer science, psychology, sociology, anthropology) and will
understand how to begin to draw on them to create usable and useful computer software;
students will study formal methods of analysis that may be used to complement less structured
aspects of design.
1.2
For whom course is intended.
This course is intended for the undergraduate MIS or CS majors who wish to study the principles
of interface design. It is one of the specialization elective courses for the Bachelor of Science in
Management Information Systems (BIS) degree.
1.3
Prerequisites of the course (Courses).
1.3.1
1.4
Prerequisites of the course (Topics).
1.4.1
1.5
ISQA 3210 Advanced Technology for Personal Productivity (students should have at least
a basic understanding of how to create Web-based applications)
Introduction to Personal Computing
Unusual circumstances of the course.
None
2.0
Objectives:
2.1
2.2
Understand the principles of interface design.
Understand that interface design requires the integration of multiple disciplines and skills and
know how to draw on them to create usable and useful computer software.
-205-
2.3
3.0
Learn design principles and concepts that have been used successfully in the past and apply them
to everyday examples from business and industry.
Content and Organization:
Contact Time
3.1
Introduction
1.5
3.2
Framework for Design
7.0
3.2.1
3.2.2
3.2.3
3.3
Interactive System Design
3.3.1
3.3.2
3.3.3
3.4
The process of interaction design
Needs and requirements
Design, prototyping, and construction
10.0
Heuristic evaluation and walkthroughs
Evaluation of design
Predictive evaluation
Requirements definition
User Interface
3.5.1
3.5.2
3.5.3
4.0
9.0
System Evaluation
3.4.1
3.4.2
3.4.3
3.4.4
3.5
What is interaction design
Understanding and conceptualizing interaction
Designing for collaboration and communication
9.0
Interaction styles
Affective aspects
User’s mental model
Teaching Methodology:
4.1
Methods to be used.
The primary teaching methods will be lectures and in-class discussions.
4.2
Student role in the course.
The student will attend lecture, participate in discussion on assigned readings, complete quizzes,
exams, the interface design project, and homework.
4.3
Contact hours.
Three (3) hours per week.
-206-
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
Students will complete quizzes, homework assignments, individual interface design literature
reports and presentations, team project assignments, participate in in-class discussions, and takehome exams. A team project will be assigned in 4 phases – with each phase taking from one to
seven weeks to complete. Graduate students will be graded based on higher standards of
completeness, accuracy, and application of design principles on their design projects. Also,
graduate students will be required to answer additional questions (over and above those of the
undergraduates) on quizzes and exams.
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
Components
Quizzes
Homework
Class Participation
Exams
Team Project
Assignments
Interface Design
Report and
Presentation
Software projects
5.3
Grading
10%
5%
5%
30%
35%
5%
10%
Grading scale and criteria.
Points
95.5 – 100
92.5 – 95.4
89.5 – 92.4
85.5 – 89.4
82.5 – 85.4
79.5 – 82.4
75.5 – 79.4
72.5 – 75.4
69.5 – 72.4
65.5 – 69.4
62.5 – 65.4
59.5 – 62.4
59.4 or below
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
-207-
6.0
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1
6.2
Sharp, H., Rogers, Y., Preece, J. (2007). Interaction Design, Second Edition, John Wiley &
Sons, Ltd. (ISBN: 978-0-470-01866-8).
Other suggested reading materials, if any.
None
6.3
Other sources of information.
Web-based resources on computer interface design.
6.4
Current bibliography of resource for student’s information.
None
7.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
Advanced
30
Oral and Written Communications:
Student teams (3-4 students each) are required to submit at least __3___ written reports (not including
exams, tests, quizzes, or commented programs) to typically __8___ pages and to make __1___ oral
presentations of typically __20___ minutes duration. Also, each student will write __1__ interface design
literature report and will make __1__ presentation of typically __10___ minutes duration. Include only
material that is graded for grammar, spelling, style, and so forth, as well as for technical content,
completeness, and accuracy.
Note: student teams will complete final reports and oral presentations for the interface design project.
9.0
Social and Ethical Issues:
No coverage.
-208-
10.0
Theoretical content:
This course deals mostly with the principles of interface design. It includes relevant theories and
frameworks to analyze and solve problems.
Hours
10.1
10.2
10.3
10.4
10.5
10.6
10.7
10.8
11.0
Conceptual design models
Users’ mental models
Design principles for usability
Design principles for user experience
Evaluation framework
Predictive models of usability
Cognitive walkthrough
Heuristic evaluation
1.5
1.5
1.0
1.0
1.5
3.0
1.0
1.0
Problem analysis:
Students learn to analyze and understand the problems associated with the design context. This course
introduces formal methods of analysis that may be used to complement less structured aspects of design.
12.0
Solution design:
Students learn to apply relevant theories and frameworks to solving the problems that have been found
in the process of problem analysis. This course also emphasizes the fact that interface design requires the
integration of multiple disciplines and skills (from information systems analysis and design, human
psychology, and computer science)
CHANGE HISTORY
Date
6/12/03
6/25/03
10/12/08
Change
Change prerequisite from CIST 1100 and
CIST 1400. Course Change Form
5/15/03.
ABET cleanup
Complete reworking of course content
By whom
Wild
Wolcott
Davis
-209-
Comments
Prerequisites changed to match
need of course content.
Completely revamped course
description to reflect most current
content and teaching methods
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 3520
Graphical User Interface Design
Sidney Davis
3
10/12/08
S – Strong relationship
X – Contributing relationship
S
S
S
S
S
S
S
-210-
S
13. Recognize need for prof. develop.
S
12. Manage change
S
11. Manage IS within application env.
S
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
S
6. Work on a team
3. Analysis and design
S
5. Computer-based tools
2. Knowledge of computing
X
4. Communication
1. Local and global role of iS
Course objective
Understand the principles of good
interface design.
Understand that interface design requires
the integration of multiple disciplines and
skills and know how to draw on them to
create usable and useful computer
software.
Learn to apply design principles and
concepts that have been used
successfully in the past to everyday
examples from business and industry.
7. Professional, legal, ethical standards
BIS Program Outcomes
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-211-
-212-
ISQA 4010 Business Intelligence
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 4010
Business Intelligence
Yong Shi
3
10/02/08
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
The course focuses on the various topics on knowledge management by utilizing both
behavioral approaches and information technology tools. It includes data collection and
analysis, intelligent agents, business concerns on data warehousing and data mining,
customer relationship management. The course will also cover information overload,
human expert systems vs. artificial intelligent systems and intelligent decision making.
1.2
For whom course is intended.
This course is intended for upper division undergraduate MIS majors who wish to
understand the advanced Quantitative Analysis. It is one of elective courses for
undergraduates who wish to pursue Knowledge Management, Knowledge Engineering
and Decision Support Tracks.
1.3
Prerequisites of the course (Courses).
1.3.1
1.3.2
1.3.3
1.3.4
1.3.5
1.4
1.5
CIST 1400 Introduction to Computer Programming
CIST 2500 Introduction to Applied Statistics for IS&T
ISQA 3150 Principles of Quantitative Analysis
ISQA 3210 Advanced Technology for Personal Productivity
ISQA 3250 Intermediate Quantitative Analysis
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
Introduction to Visual Basic Programming,
Program development cycle
Training in spreadsheets and database
Statistics in information science and technology
A well-known computer package being used to support the problem-solving
process.
1.4
Unusual circumstances of the course.
-213-
None
2.0
Objectives:
List of performance objectives stated in terms of the student educational outcomes.
2.1
2.2
2.3
2.4
2.5
3.0
Data, Information, and Knowledge
Knowledge Management vs. Knowledge Technology
Knowledge represented by Data
Artificial Intelligence, Expert system vs. Data Mining
Analytic Customer Management
Content and Organization:
Contact hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
4.0
Introduction
Data Collection and Information
Information Overload
Information and Knowledge
Knowledge Management
Knowledge Technology
Business Intelligence
Analytic Customer Relation Management
3
6
6
8
6
4
6
6
Teaching Methodology:
4.1
Methods to be used.
The primary teaching methods will be lectures and group discussions.
4.2
Student role in the course.
The student will attend lectures, participate in discussion, complete required
examinations, homework and the class project.
4.3
Contact hours.
Three (3) hours per week
5.0
Evaluation:
-214-
5.1
Type of student projects that will be the basis for evaluating student performance,
specifying distinction between undergraduate and graduate, if applicable. For Laboratory
projects, specify the number of weeks spent on each project).
The student will attend lectures, participate in discussion, complete required
examinations, homework and the class project.
5.2
Basis for determining the final grade (Course requirements and grading standards)
specifying distinction between undergraduate and graduate, if applicable.
Components
Exams
Class Project
Class Participation / Homework
5.3
Grading scale and criteria.
Points
96 – 100%
90 – 95.9%
86 – 89.9%
80 – 85.9%
76 – 79.9%
70 – 75.9%
66 – 69.9%
60 – 65.9%
< 60%
6.0
Grading
60%
25%
15%
Grade
A+
A
B+
B
C+
C
D+
D
F
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1 Amrit Tiwana, Knowledge Management Toolkit, Prentice Hall, 2002. (or more
recent text)
6.2
Other suggested reading materials, if any.
6.2.1 T. Sowell, Knowledge and Decisions, Basic Books, 1980.
6.2.2 J. W. Cortada and J. A. Woods, The Knowledge Management Yearbook,
Butterworth-Heinemann, 1999.
-215-
6.3
Other sources of information.
6.3.1 Y. Shi, “Humancasting: A Fundamental Method to Overcome User Information
Overload,” Information – International Inter-discipline Journal, Vol. 3, 127-143,
2000.
6.3.2 M. Zeleny, “Knowledge of Enterprise: Knowledge Mangement or Knowledge
Technology,” International Journal of Information Technology and Decision
Making, Vol.1, 181-208, 2002
6.4
Current bibliography of resource for student’s information.
None
7.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time
in hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
Advanced
4
6
26
6
Oral and Written Communications
Every student is required to submit at least ___3__ written reports (not including exams, tests,
quizzes, or commented programs) to typically ___30__ pages and to make _1____ oral
presentations of typically ___10__ minutes duration. Include only material that is graded for
grammar, spelling, style, and so forth, as well as for technical content, completeness, and
accuracy.
9.0
Social and Ethical Issues:
No coverage
10.0
Theoretical content:
Please list the types of theoretical material covered, and estimate the time devoted to such
coverage.
10.1
10.2
Data Mining
Expert System
-216-
11.0
Problem analysis:
Students learn the advanced models of Quantitative Analysis, a scientific approach to decision
making that involves the operations of organizational systems. They learn to solve the conflicts
of interest among the components of the organization in a way that is best for the organization
as a whole.
12.0
Solution design:
Students learn to develop a solution that yields an optimal value of the organizational system
measure of desirability, or compare alternative courses of action by evaluating their measure of
desirability.
CHANGE HISTORY
Date
6/12/03
10/2/08
Change
Change prerequisites as needed.
Course change form 5/15/03.
Review completed
By whom
Wild
Comments
Shi
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 4010
Business Intelligence
Yong Shi
3
5/26/09
S – Strong relationship
X – Contributing relationship
BIS Program Outcomes
-217-
2. Knowledge of computing
S
S
S
S
S
X
S
S
-218S
S
X
S
S
S
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
4. Communication
3. Analysis and design
1. Local and global role of iS
Course objective
Data, Information, and Knowledge
Knowledge Management vs. Knowledge
Technology
Knowledge represented by Data
Artificial Intelligence, Expert system vs.
Data Mining
Analytic Customer Management
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-219-
-220-
ISQA 4100 Information Systems Architecture and Organization
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 4100
Information Systems Architecture & Organization
Paul J.A. van Vliet
3
10/12/2008
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
This course examines the frameworks and tools used to develop an organization's
information system architecture. It provides the analytical skills and conceptual
frameworks with which to make recommendations and decisions regarding the
integration of information technology components into an information system
architecture.
1.2
For whom course is intended.
This course is intended for upper division undergraduate MIS majors and graduate MIS
majors who wish to study advanced topics pertaining to an organization's information
system architecture.
1.3
Prerequisites of the course (Courses).
1.3.1 CIST 3100 - Organizations, Applications, and Technology
1.3.2 ISQA 3310 - Managing the Database Environment
1.4
Prerequisites of the course (Topics).
1.4.1 Working knowledge of business foundations.
1.4.2 Working knowledge of computer information systems.
1.4.3 Working knowledge of information systems development.
1.5
Unusual circumstances of the course.
None
2.0
Objectives:
2.1
Understand the issues involved in architecting the information systems infrastructure in
medium- and large-sized organizations.
-221-
2.2
2.3
2.4
3.0
Understand the frameworks and tools used to develop an organization's information
systems architecture.
Understand and apply the conceptual frameworks developed for managing information
systems architectures.
Understand the Unified Modeling Language (UML) as a tool for modeling the various
aspects of information systems architectures.
Content and Organization:
Contact hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13
3.14
3.15
3.16
3.17
3.18
3.19
3.20
4.0
The Role of IS in the Enterprise & the Problems of Large/Complex IS
The Concept of Information Systems Architecture
Initial Attempts at IS Architecture
Heuristics and Conceptual Building Blocks of ISA
Technical Building Blocks of IS Architecture
Builder-Architected Systems
The Zachman Information Systems Architecture Framework
Manufacturing Systems
The Data Warehouse Architecture Framework
Social Systems
Software Systems
Collaborative Systems
Representation Models and System Architecting
The Architecture Process
Integrated Modeling Methodologies
Architecture Frameworks
The Political Process of Systems Architecting
The professionalization of Systems Architecting
Architecture Management, Measurement, and Maintenance
Overview of the Unified Modeling Language (UML)
3.0
1.0
2.0
2.0
2.0
1.0
2.0
1.0
2.0
1.0
1.0
1.0
1.0
3.0
1.0
1.0
2.0
2.0
2.0
1.0
Teaching Methodology:
4.1
Methods to be used.
The primary teaching methods will include lectures, discussion, and guidance on the
group project.
4.2
Student role in the course.
-222-
Students will attend lectures, participate in the in-class discussion, complete the
individual presentation assignment, complete individual assignments, and participate in
the group project.
4.3
Contact hours.
Three (3) hours per week.
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance,
specifying distinction between undergraduate and graduate, if applicable. For Laboratory
projects, specify the number of weeks spent on each project).
Students will participate in the in-class discussions. Students will conduct an individual
presentation on a research topic related to the course; graduate students will also
complete an accompanying written report. Students will participate in the completion of
a group project which brings together analysis, design, modeling, communications, and
research skills.
5.2
Basis for determining the final grade (Course requirements and grading standards)
specifying distinction between undergraduate and graduate, if applicable.
Component
Presentation
Individual Assignments
Team Project
Class Participation
5.3
Grading
30%
30%
30%
10%
Grading scale and criteria.
Points
96% - 100%
92% - 95%
89% - 91%
86% - 88%
82% - 85%
79% - 81%
76% - 78%
72% - 75%
69% - 71%
66% - 68%
Grade
A+
A
AB+
B
BC+
C
CD+
-223-
62% - 65%
59% - 61%
< 59%
6.0
D
DF
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1 Eberhardt Rechtin & Mark W. Maier. The Art of Systems Architecting, 2nd Edition
CRC Press, 2000 (or more recent text)
6.2
Other suggested reading materials, if any.
6.2.1 On-line: Intranet Architecture - Integrating Information Design with Business
Planning (http://www.intrack.com/intranet/iarchi.shtml)
6.2.2 On-line: The IntraNet Architecture™: Managing information in the new paradigm
(http://www.iorg.com/papers/amdahl/infra.html)
6.2.3 On-line: Intranet Cost
Calculator(http://www.intrack.com/intranet/costs/index.shtml)
6.2.4 On-line: Complexity problems: the IRS
(http://cnnfn.com/1999/03/01/economy/irs/)
6.2.5 On-line: Multi-vendor problems: MCI
6.2.6 (http://cnn.com/TECH/computing/9908/23/network.nono.idg/index.html)
6.2.7 On-line: Definition of Architecture, as per the University of Leuven
(http://www.mech.kuleuven.ac.be/pma/project/goa/extracts/architec.htm)
6.2.8 On-line: How Do You Define Software Architecture? as per the Software
Engineering Institute at Carnegie Mellon University
(http://www.sei.cmu.edu/architecture/definitions.html)
6.2.9 On-line: What an Information Architect Does (PDF file)
(http://www.jjg.net/ia/iadoes0700.pdf)
6.2.10 On-line: The power of standardization: A Brief Overview of GSM (http://kbs.cs.tuberlin.de/~jutta/gsm/js-intro.html)
6.2.11 On-line: The power of heuristics: Usability Heuristics for the Web
(http://www.webreview.com/1997/10_10/strategists/10_10_97_2.shtml)
6.2.12 On-line: The power of patterns: Essential Concepts and Terminology
(http://www.enteract.com/~bradapp/docs/patterns-intro.html)
6.2.13 On-line: Technology: Computer User's High-Tech Dictionary
(http://www.computeruser.com/resources/dictionary/dictionary.html)
6.2.14 On-line: Technology: Information Technology Association of America
(http://www.itaa.org/)
6.2.15 On-line: UML: Rational Software's UML site (http://www.rational.com/uml/)
6.2.16 On-line: UML: UML Dictionary (http://softdocwiz.com/UML.htm)
-224-
6.2.17 On-line: UML: A Unified Object Modeling Approach
(http://www.iconixsw.com/Spec_Sheets/UnifiedOM.html)
6.2.18 On-line: Explore the Zachman Architecture
6.2.19 On-line: John Zachman's Homepage
(http://www.ozemail.com.au/~ieinfo/zachman.htm)
6.2.20 On-line: Getting Beyond the "Legacy," by John A. Zachman.
(http://www.ies.aust.com/~visible/papers/zachman1.htm)
6.2.21 On-line: The Challenge is Change: A Management Paper, by John A. Zachman
(http://www.ies.aust.com/~visible/papers/zachman2.htm)
6.2.22 On-line: Framework Software (http://www.frameworksoft.com/)
6.2.23 On-line: The Zachman Framework: An Introduction, by David C. Hay
(http://www.essentialstrategies.com/publications/methodology/zachman.htm)
6.2.24 On-line: The Framework for Enterprise Architecture, by the Zachman Institute for
Framework Advancement (http://www.zifa.com/zifajz02.htm)
6.2.25 On-line: An overview of the Zachman Framework, by Momentum Systems, Inc.
(http://www.momentumsystems.com/zframework.html)
6.2.26 On-line: Pattern Based Reengineering, Michael A. Beedle Ph. D. (This article
combines the topics of object-oriented software engineering, patterns, the
Zachman Framework, and the UML.)
6.2.27 On-line: Implementing the Zachman Framework for Enterprise Architecture, by
Alan Perkins. (http://www.ies.aust.com/~visible/papers/Zachman.html)
6.2.28 On-line: The Zachman Framework, by Dr. John K. Sharp (By the way, note the 7th
reference of this article - a reference to an earlier version of this course.)
(http://www.inconcept.com/JCM/February1999/print/sharp.html)
6.2.29 On-line: The Zachman Framework for the Data Administration function, as used by
the Forest Service of British Columbia.
(http://www.for.gov.bc.ca/isb/datadmin/framewrk.htm)
6.2.30 On-line: The Zachman Framework for Healthcare Informatics Standards
(http://www.ansi.org/rooms/room_41/public/documents/zach_isa.pdf)
6.2.31 On-line: The Zachman Framework for Enterprise Architecture by Andrew Faulkner
(http://www.datagruven.com/CIPS/Zachman.html)
6.2.32 On-line: Formalization of Multi-level Zachman Frameworks by Richard Martin and
Edward L. Robertson ( ftp://ftp.cs.indiana.edu/pub/techreports/TR522.pdf)
6.2.33 On-line: Explore the Data Warehousing Architecture
6.2.34 On-line: Data Warehousing resources on the World Wide Web
(http://www.datawarehousing.com/)
6.2.35 On-line: Data Warehousing Overview
(http://www.sas.com/rnd/warehousing/dwo_web.html)
6.2.36 On-line: Introduction to Business Modeling Using the Unified Modeling Language
(UML) (http://www.therationaledge.com/content/mar_01/m_uml_jh.html)
6.2.37 On-line: Use Case Modeling Introduction
(http://www.zoo.co.uk/~z0001039/PracGuides/pg_use_cases.htm)
-225-
6.2.38 On-line: Top Ten Use Case Mistakes
(http://www.sdmagazine.com/documents/s=815/sdm0102c/)
6.2.39 On-line: Use case modeling tips (http://www106.ibm.com/developerworks/java/library/tip-uml2.html)
6.2.40 On-line: Use and Abuse Cases, by Martin Fowler (PDF Format)
(http://www.awl.com/cseng/titles/0-201-89542-0/articles/abuse.pdf)
6.2.41 On-line: 7 tips for writing better use cases
(http://www.class.com.au/newsletr/97sep/usecases.htm)
6.2.42 On-line: Use Case Fundamentals, by Alistair Cockburn
(http://members.aol.com/acockburn/papers/AltIntro.htm)
6.2.43 On-line: Formalizing Use Cases with Message Sequence Charts, a Masters Thesis
by Michael Andersson & Johan Bergstrand
(http://www.efd.lth.se/~d87man/EXJOBB/ExBookTOC.doc.html)
6.2.44 On-line: Why Are Use Cases So Painful?
(http://www.evanetics.com/Articles/ObjectModeling/why_are_use_cases_so_pai
nful.htm)
6.2.45 On-line: Worldwide Institute of Software Architects (http://www.wwisa.org/)
6.2.46 On-line: Introduction to Objects (incl. Java code examples)
(http://www.comp.nus.edu.sg/~hengak/IC1101J/IC1101/content/ch8p1.html)
6.2.47 On-line: Object-Oriented Computing - What's the Big Deal?
(http://www.firststep.com.au/education/solid_ground/oo.html)
6.2.48 On-line: The Object-Oriented Advantage
(http://www.firststep.com.au/education/solid_ground/oo_dev.html)
6.2.49 On-line: What is Object-Oriented
Software?(http://catalog.com/softinfo/objects.html)
6.2.50 On-line: A collaborative systems example: CORBA
(http://www.cs.wustl.edu/~schmidt/corba.html)
6.2.51 On-line: State-Transition diagram
(http://cobra.csc.calpoly.edu/~gfisher/projects/work/inferno/documentation/uml
/notation/notation9a.html#9.1)
6.2.52 On-line: An Atlas of Cyberspaces - visual modeling at its finest
(http://www.cybergeography.org/atlas/atlas.html)
6.2.53 On-line: Sample Sequence Diagrams
(http://web.dis.unimelb.edu.au/undergrad/1997/cuc/245Project/Sequence3.htm)
6.2.54 On-line: Collaboration Diagrams
(http://193.174.33.104:7776/UMT/notation_guide_ch7.html)
6.2.55 On-line: Architecting for Business: An Executive Overview, by Unisys
6.2.56 (http://www.corp.unisys.com/UNISYS/ACEweb.NSF/LookupView/Executive+Overv
iew?OpenDocument#apoverview)
6.2.57 On-line: Building Blocks and the Architecture Development Method, by The Open
Group (http://www.opengroup.org/public/arch/p4/bbs/bbs_adm.htm)
6.2.58 On-line: The Hatley-Pirbhai Methodology
(http://www.turbocase.com/method.html)
-226-
6.2.59
6.2.60
6.2.61
6.2.62
6.2.63
6.2.64
6.2.65
6.2.66
6.2.67
6.2.68
6.3
On-line: Quality Function Deployment Institute (http://www.qfdi.org/)
On-line: UML Resource Center (http://www.rational.com/uml/index.jtmpl)
On-line: The Zachman Architecture
On-line: U.S. Department of Energy Information Systems Architecture - a vast online resource (http://cio.doe.gov/iap/)
On-line: ZDNet's Net.Politics site
(http://www.zdnet.com/products/netpolitics.html)
On-line: HotWired News' Politics site (http://www.wired.com/news/politics/)
On-line: INCOSE - International Council on Systems Engineering
(http://www.incose.org/)
On-line: INCOSE Systems Architecting Working Group
(http://www.incose.org/cmtes/sawg.html)
On-line: IEEE Software Engineering Standards Committee Architecture Working
Group (http://www.pithecanthropus.com/~awg/index.html)
On-line: TiAC - The Information Architects Cooperative
(http://www.infoed.com/default.htm)
Other sources of information.
Additional handouts may be used when deemed necessary by the instructor.
6.4
Current bibliography of resource for student’s information.
None
7.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time
in hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
Advanced
12
6
6
12
18
Oral and Written Communications:
As part of the group term project assignment, the students are required to submit 5 written
reports which are typically 5-15 pages long. Individually, each student makes 1 oral presentation
of typically 25 minutes duration. This presentation includes research, development of original
presentation materials, and oral presentation skills.
-227-
1.0
Social and Ethical Issues:
Students are presented with problems that arise from poorly developed and/or managed
information systems, and discuss potential solutions. A chapter on Social Systems specifically
addresses the impact of information systems on social structures.
9.0
Theoretical content:
Zachman Framework for Information Systems/Enterprise Architecture (4 hours)
10.0
Problem analysis:
Students will explore the need for information system architectures in medium and large-sized
organizations. Students will explore the conceptual frameworks developed for managing
information systems architectures. Students will explore the Unified Modeling Language as a
tool for architecture representation.
11.0
Solution design:
The students will develop and apply analytical skills, as well as their understanding of
architectural frameworks and the Unified Modeling Language. The students will combine these
new skills with existing knowledge and skills in the area of information systems development in
order to design an integrative architecture for a real-world organization.
CHANGE HISTORY
Date
4/8/2003
6/25/03
9/13/2007
10/12/2008
10/12/2008
10/12/2008
10/12/2008
Change
Added prerequisites: CIST 2110 and
ISQA 3310. Course Change Form
4/22/03.
ABET cleanup
Updated syllabus contents; changed
prerequisite from CIST 2110 to CIST
3100 as this course was renumbered.
Updated section 5.1 to more accurately
reflect the current term project
Updated section 8.0 to more accurately
reflect course administration
Updated section 9.0 to reflect current
course content
Updated section 10 to reflect change in
nomenclature of theoretical model
-228-
By whom
Paul van
Vliet
Wolcott
Van Vliet
Van Vliet
Van Vliet
Van Vliet
Van Vliet
Comments
Prerequisites suggested by ISQA
faculty undergraduate curriculum
review.
-229-
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 4100
Information Systems Architecture & Organization
Paul J.A. van Vliet
3
10/12/08
S – Strong relationship
X – Contributing relationship
S
S
X
X
S
S
S
X
S
S
S
BIS Program Outcomes (2009)
-230-
X
26. Recognize need for prof. develop.
S
S
25. Manage change
X
24. Manage IS within application env.
22. Design, implement, evaluation IS
S
23. Manage projects
21. Model processes and data
S
19. Work on a team
16. Analysis and design
S
18. Computer-based tools
15. Knowledge of computing
S
17. Communication
14. Local and global role of iS
Course objective
Understand the issues involved in
architecting the information systems
infrastructure in medium- and large-sized
organizations.
Understand the frameworks and tools
used to develop an organization's
information systems architecture.
Understand and apply the conceptual
frameworks developed for managing
information systems architectures.
Understand the Unified Modeling
Language (UML) as a tool for modeling
the various aspects of information
systems architectures.
20. Professional, legal, ethical standards
BIS Program Outcomes
X
14. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
1. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
2. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
3. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
4. understand and apply appropriate types of computer-based tools to support communication.
5. work effectively in a team environment and collaborate with others to accomplish a common goal.
6. understand and apply professional, legal, and ethical standards of conduct.
7. understand and model organizational processes and data.
8. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
9. manage projects.
10. manage information systems within a specific application environment.
11. manage change.
12. recognize the need for continuing professional development
-231-
-232-
ISQA 4110 Information Systems Analysis
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 4110
Information Systems Analysis
Leah R. Pietron
3
05/29/2009
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
The course presents an overview of information systems and the system development life
cycle for the systems analyst. The course emphasis focuses on tools and techniques that
the analyst, designer, and programmer can use to document information systems.
The classical and structured tools for describing data flow, data structures, process flow,
and logical design requirements will be applied to documenting systems. Emphasis will be
placed on the integrated use of the classical and structured tools, requirements
definition, project management, and cost/benefit analysis.
1.2
For whom course is intended.
This course is intended for undergraduate MIS majors who wish to study topics on
systems analysis and design.
1.3
Prerequisites of the course (Courses)
1.3.1 CIST 3100 - Organizations, Applications, and Technology
1.3.2 ISQA 3210 - Advanced Technology for Personal Productivity (prior or concurrent
enrollment)
1.3.3 ISQA 3310 - Database Management (prior or concurrent enrollment)
1.4
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.4.6
1.4.7
Types of Processing Systems
Essential Concepts of Networks
Essential Concepts in DSS, Artificial Intelligence and other technologies
Essential Concepts in Systems Analysis, Design, and Databases
Introduction to Data Modeling – ER Diagrams
Essential techniques in Word, Excel, Access, and PowerPoint
Understanding of Operating Systems (Windows and Unix)
-233-
1.4.8 Essential Techniques in Technical Writing
1.5
Unusual circumstances of the course.
None
2.0
Objectives:
2.1
2.2
2.3
2.4
2.5
2.6
2.7
3.0
asdfa
The students will be able to develop a better understanding of the entire information
system development process: from the identification of the business problems and needs
to the design of an improved system to the writing of documentation.
The students will improve their technical and group communication skills. The students’
ability to communicate with both technical and non-technical people should be improved
through the proper use of the tools. Their writing and speaking skills may also be
enhanced as they learn how to present their documentation to the instructor.
The student systems analyst will learn how to utilize critical thinking skills, problem
solving, change management, and project management. These essential skills will enable
them to work with their clients and define the client project. This process includes ethical
decision making and determine appropriate solutions for their client.
The students will apply technical and theoretical knowledge to the client project.
Students will be able to apply their specific strategies and methodologies such as cost
benefit analysis, process modeling, use diagrams, and documentation to their project.
The student will apply their technical knowledge to the client project. This knowledge
applies to the selection of hardware, software, operating systems, and networking
solutions.
The student will have a better understanding of information systems in general. Students
will learn many capabilities and characteristics of good information systems. This process
will help students design more effective systems, encourage additional education and
certification during their careers.
Content and Organization:
Contact hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
Introduction to ISQA 4110, The Systems Development Environment
& Overview of Software Applications
The Origins of Software
Managing the Information Systems Project
& Introduction to Microsoft Project 2007
Identifying and Selecting Systems Development Project
Initiating and Planning Systems Development Projects
Information Security
Risk Analysis for Information Systems
Determining Systems Requirements
-234-
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.9
3.10
4.0
Structuring Systems Requirements: Process Modeling
& Structuring Systems Requirements: Logic Modeling
Rapid Application Development
& Object-Oriented Analysis and Design
3.0
3.0
Teaching Methodology:
4.1
Methods to be used.
The primary teaching methods include lectures, in-class exercises, software tutorials, and
guidance on the semester project.
4.2
Student role in the course.
Students will attend lectures, complete in-class exercises and quizzes, complete two
examinations, complete and present class projects.
4.3
Contact hours.
Three (3) hours per week.
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance,
specifying distinction between undergraduate and graduate, if applicable. For Laboratory
projects, specify the number of weeks spent on each project).
Students will complete in-class exercises and quizzes, take two examinations, complete
and present class projects.
5.2
Basis for determining the final grade (Course requirements and grading standards)
specifying distinction between undergraduate and graduate, if applicable.
Component
In-class Exercises and Quizzes
Examinations
Class Project
Class Presentation
5.3
Grading
5%
40%
50%
5%
Grading scale and criteria.
Points
97% - 100%
90% - 96%
87% - 89%
80% - 86%
Grade
A+
A
B+
B
-235-
77% - 79%
70% - 76%
67% - 69%
60% - 66%
0% - 59%
C+
C
D+
D
F
-236-
6.0
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1 Jeffrey A. Hoffer, Joey F. George, and Joseph S. Valacich. Modern Systems Analysis
and Design, Fifth Edition. Addison Wesley Longman. 2008.
6.1.2 Rachel Biheller Bunin. Microsoft Project 2007, Introductory. Course Technology.
2008.
6.2
Other suggested reading materials, if any.
6.2.1 Systems Analysis and Design Methods by Jeffrey Whitten and Lonnie Bentley,
McGraw-Hill/Irwin, 7th Edition, 2005
6.2.2 Systems Analysis and Design by Allan Dennis, Barbara Wixom, and Roberta Roth,
Wiley Publishing, 2008.
6.2.3 Systems Analysis and Design, Seventh Edition, by Gary Shelley, Thomas Cashman,
and Harry Rosenblatt, Course Technology, 2007.
6.2.4 Systems Analysis and Design, 7th Edition, by Kenneth Kendall and Julie Kendall,
Prentice-Hall, 2007.
6.2.5 Systems Analysis and Design with UML, by Allan Dennis, Barbara Wixom, and
David Tegarden, Wiley Publishing, 2007.
6.2.6 Systems Anlaysis and Design in a Changing World, by John Satzinger, Robert
Jackson, and Stephen Burd, Course Technology, 2008.
6.2.7 Essentials of Systems Analysis and Design, 4th Edition, by Jeffrey Hoffer, Joey
George, and Joseph Valacich, Prentice-Hall, 2009.
6.2.8 Information Systems Methodologies by Olle, Addison-Wesley Publishing
6.3
Other sources of information.
Additional course content, either with pages developed especially for this course or with
links to additional course materials, will be provided during the semester.
6.4
Current bibliography of resource for student’s information.
None.
-237-
7.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time
in hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
Advanced
6
3
21
Oral and Written Communications:
Every student is required to submit at least ___4__ written reports (not including exams, tests,
quizzes, or commented programs) to typically _5-25____ pages and to make __1___ oral
presentations of typically __20___ minutes duration. Include only material that is graded for
grammar, spelling, style, and so forth, as well as for technical content, completeness, and
accuracy.
9.0
Social and Ethical Issues:
The course deals with information security and risk analysis for information systems. These
topics will partly be concerning social and ethical issues. Students will be graded on their
understanding of these topics by in-class exercises, quizzes or exams.
10.0
Theoretical content:
None.
11.0
Problem analysis:
Students select a project in which they will analyze a real-world organization and their
information systems need. Students will review systems development requirements and identify
the data that is required for the systems design. The students develop alternatives and present
these solutions for the client.
Student will learn the definition of systems planning, systems analysis and tools and techniques
that the programmer or analyst can use to document information systems. Classical and
structured tools about the problem analysis include ones for describing data flow, data structure,
and process flow. Time permitting, the course will survey other important skills for the systems
analyst such as data gathering and reporting, project management, and cost/benefit analysis.
-238-
12.0
Solution design:
Students will use the theory and established practices of information systems analysis and design
to develop a functional design specification document and determine information systems
security requirements. The project groups develop appropriate models (process models, state
transition diagrams, use case diagrams, and logic modeling) and supporting documentation
through the use of the above tools.
CHANGE HISTORY
Date
11/2/02
6/25/03
7/10/03
Change
Initial ABET version created
ABET cleanup
Change Prerequisite (Course Change
Form – 4-22-03)
10/13/08 Update to course description and
prerequisites
4/05/2009 Update to course objectives
By whom
Pietron
Wolcott
Wild
5/29/2009 Updating bibliography and
assignments
Pietron
Comments
Update course prerequisites.
Pietron
Pietron
-239-
Updated the course objectives
to be in alignment ABET
outcomes
Updating references
Mapping of IS Program Outcomes vs. Course Objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 4110
Information Systems Analysis
Leah R. Pietron
3
05/29/2009
S – Strong relationship
X – Contributing relationship
8. Model processes and data
S
S
S
S
S
X
S
X
S
S
S
S
-240-
X
S
S
S
13. Recognize need for prof. develop.
7. Professional, legal, ethical standards
S
12. Manage change
6. Computer-based tools
S
11. Manage IS within application env.
5. Work on a team
S
10. Manage projects
4. Communication
S
9. Design, implement, evaluation IS
3. Analysis and design
The students will be able to develop a
better understanding of the entire
information system development
process: from the identification of the
business problems and needs to the
design of an improved system to the
writing of documentation
The students will improve their technical
and group communication skills. The
students’ ability to communicate with
both technical and non-technical people
should be improved through the proper
use of the tools. Their writing and
speaking skills may also be enhanced as
they learn how to present their
documentation to the instructor.
The student systems analyst will learn
2. Knowledge of computing
Course objective
1. Local and global role of iS
BIS Program Outcomes
X
X
S
how to utilize critical thinking skills,
problem solving, change management,
and project management. These
essential skills will enable them to work
with their clients and define the client
project. This process includes ethical
decision making and determine
appropriate solutions for their client
The students will apply technical and
theoretical knowledge to
the client project. Students will be able
to apply their specific
strategies and methodologies such as
cost benefit analysis, process
modeling, use diagrams, and
documentation to their project
The student will apply their technical
knowledge to the project. This
knowledge applies to the selection of
hardware, software, operating systems
and networking solutions.
The student will have a better
understanding of information systems in
general. Students will learn many
capabilities and characteristics of good
information systems. This process will
help students design more effective
systems, encourage additional education
and certification during their careers.
S
X
S
S
X
S
X
S
S
-241-
X
X
S
S
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. work effectively in a team environment and collaborate with others to accomplish a common goal.
6. understand and apply appropriate types of computer-based tools to support communication.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-242-
ISQA 4120 System Design and Implementation
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 4120
Information Systems Design & Implementation
Paul J.A. van Vliet
3
10/12/2008
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
This is the second course in a sequence in computer information systems analysis, design,
and implementation. This course extends the basic foundations of systems development
started in ISQA 4110 and examines the activities comprising the design, construction and
implementation of information systems.
1.2
For whom course is intended.
This course is intended for undergraduate MIS majors who wish to study advanced topics
pertaining to information systems design and implementation. It is a required course for
the Bachelor of Science in MIS degree.
1.3
Prerequisites of the course (Courses).
1.3.1 ISQA 4110 Information Systems Analysis
1.3.2 ISQA 3310 Managing the Database Environment
1.4
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.5
Data modeling using the relational database model
Systems analysis
Database development using Microsoft Access
Project management basics
Technical writing
Unusual circumstances of the course.
None
2.0
Objectives:
2.1
2.2
Complete the development of the projects started in the previous semester in ISQA 4110.
Be able to successfully design and construct a software application.
-243-
2.3
2.4
3.0
Be able to critically assess systems development alternatives.
Be able to develop high quality systems documentation.
Content and Organization:
Contact hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
4.0
Overview of Systems Design approaches
Data Model Design
Database Design
User Interface Design
Systems Architecture Design
Systems Controls Design
Process Design & Code Development
Documentation Development
Design of Testing Procedures
Systems Installation Issues
Distributed Systems Design
System Maintenance
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
Teaching Methodology:
4.1
Methods to be used.
The primary teaching methods will include lectures, discussion, and intense guidance on
the systems development project.
4.2
Student role in the course.
Student will attend lectures, read assignment readings, complete exams, participate in
the systems development project and take part in the formal presentation of the project.
4.3
Contact hours.
Three (3) hours per week
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance,
specifying distinction between undergraduate and graduate, if applicable. For Laboratory
projects, specify the number of weeks spent on each project).
Student will complete two individual exams. Students – in groups of 3 to 5 - will
participate in the completion of the project milestones, the project application, the
project documentation, and the presentation of the project.
-244-
5.2
Basis for determining the final grade (Course requirements and grading standards)
specifying distinction between undergraduate and graduate, if applicable.
Component
Exams
Project milestones
Final project and presentation
5.3
Grading scale and criteria.
Points
96% - 100%
92% - 95%
89% - 91%
86% - 88%
82% - 85%
79% - 81%
76% - 78%
72% - 75%
69% - 71%
66% - 68%
62% - 65%
59% - 61%
00% - 58%
6.0
Grading
33.3%
33.3%
33.3%
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1 Modern Systems Analysis and Design - Fifth Edition, by Jeffrey A. Hoffer, Joey F.
George, and Joseph S. Valacich, Pearson/Prentice Hall, 2008.(or more recent text)
6.2
Other suggested reading materials, if any.
6.2.1 asdjaklsd
6.2.2 On-Line: A Relational Model of Data for Large Shared Data Banks - Ed Codd's
original article (http://www.acm.org/classics/nov95/)
6.2.3 On-Line Tutorial: Getting Started with ERwin - A tutorial created by Dr. Wolcott
(http://www.isqa.unomaha.edu/wolcott/tutorials/erwin/erwin.html)
6.2.4 On-Line: Normalization Overview
(http://www.troubleshooters.com/littstip/ltnorm.html)
6.2.5 On-Line: Normalization beyond 3NF
(http://www.utexas.edu/cc/database/datamodeling/rm/rm8.html)
-245-
6.2.6 On-Line: The Interface Hall of Shame (http://www.iarchitect.com/shame.htm)
6.2.7 On-Line: Nooface - in search of the post-PC interface (http://www.nooface.net/)
6.2.8 Special On-Line Reading: The Undead
(http://www.wired.com/wired/archive/7.03/punchcards_pr.html)
6.2.9 On-Line: Applicability of ISO 9001 to Software Development
(http://www.tantara.ab.ca/iso90003.htm)
6.2.10 On-Line: DevX - A software developer resource portal (http://www.devx.com/)
6.2.11 On-Line: High tech's missionaries of sloppiness - A great article on the need for
software quality.
(http://www.salon.com/tech/feature/2000/12/06/bad_computers/index.html)
6.2.12 On-Line: Implementation Pitfalls & Lessons (PDF file)
(http://www.acu.ac.uk/chems/onlinepublications/930916507.pdf)
6.2.13 On-Line: Mother Earth Mother Board, Neal Stephenson's lengthy chronicle of the
laying of the longest wire on Earth.
(http://www.wired.com/wired/archive/4.12/ffglass.html)
6.3
Other sources of information.
Additional handouts may be used when deemed necessary by the instructor.
6.4
Current bibliography of resources for student’s information.
None.
7.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time
in hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
Advanced
9
3
3
33
1.5
12
Oral and Written Communications:
As part of the group term project, all students contribute to the submission of 5 written reports
(not including exams, tests, quizzes, or commented programs) to typically 15-45 pages. In
addition, all students participate in 2 oral presentations of typically 10 and 25 minutes respective
duration.
9.0
Social and Ethical Issues:
-246-
The concept of ethical behavior in the role as system developer is discussed throughout.
10.0
Theoretical content:
Please list the types of theoretical material covered, and estimate the time devoted to such
coverage.
No coverage
11.0
Problem analysis:
Students will continue their analysis of a real-world organization’s information system needs.
Students will review systems design and development options so as to develop an appropriate
systems solution for the target organization.
12.0
Solution design:
Students will use the theory and established practices of information systems design to develop a
database design, a user interface design, a systems security and controls design, an application
process design, a network design (if needed), as well as a complete set of systems and end user
documentation for the real-world organization for which they undertake their systems
development project.
CHANGE HISTORY
Date
10/3/02
6/25/03
9/13/07
10/12/2008
Change
Initial ABET version
ABET cleanup
Document updated as needed
Updated Section 8.0 to more accurately
reflect course administration
-247-
By whom
van Vliet
Wolcott
Van Vliet
Van Vliet
Comments
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 4120
Information Systems Design & Implementation
Paul J.A. van Vliet
3
5/26/09
S – Strong relationship
X – Contributing relationship
S
S
S
S
S
S
S
X
X
S
S
S
S
S
S
X
S
S
-248-
X
S
S
S
S
S
X
13. Recognize need for prof. develop.
6. Work on a team
S
12. Manage change
5. Computer-based tools
S
11. Manage IS within application env.
4. Communication
S
10. Manage projects
3. Analysis and design
S
9. Design, implement, evaluation IS
2. Knowledge of computing
8. Model processes and data
1. Local and global role of iS
Course objective
Complete the development of the
projects started in the previous semester
in ISQA 4110.
Be able to successfully design and
construct a software application.
Be able to critically assess systems
development alternatives.
Be able to develop high quality systems
documentation.
7. Professional, legal, ethical standards
BIS Program Outcomes
S
S
X
X
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-249-
-250-
ISQA 4150 Advanced Statistical Methods for IS&T
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 4150
Advanced Statistical Methods for IS&T
Lotfollah Najjar
3
03/31/09
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
This course emphasizes the application and interpretation of statistical methods including
design of experiments, analysis of variance, multiple regression, and nonparametric
procedures and the use of statistical computer packages. The intent is to develop
quantitative abilities needed for quantitatively intensive jobs and for advanced study in
management information systems, computer science and information technology.
1.2
For whom course is intended.
This course is intended for upper division undergraduate MIS majors who wish to study
advanced topics pertaining to the application of statistics. It is one of elective courses for
undergraduates who wish to pursue Knowledge Engineering and Decision Support Track
1.3
Prerequisites of the course (Courses)
1.3.1 CIST 2500 Introduction to Applied Statistics for IS&T
1.4
Prerequisites of the course (Topics).
1.4.1 Statistics in information science and technology including such topics as
descriptive statistical measures, probability, discrete probability, sampling,
estimation analysis, hypothesis testing, regression, and analysis of variance.
1.4.2 A well-known computer package (e.g. SAS) will be used to support the problemsolving process.
1.5
Unusual circumstances of the course.
None
2.0
Objectives:
2.1
2.2
Understand advanced statistical analysis and how to apply them in real life situation.
Understand the sampling survey and how to collect the data, design the appropriate
experimental design.
-251-
3.0
Content and Organization:
Contact hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
4.0
Review some topics from CIST2500
Inferences about Population Variances
Analysis of Variance and Experimental Design
Simple Linear Regression
Multiple Regression
Regression Analysis: Model Building
Tests of Goodness of Fit and Independence
Nonparametric Statistics
Sampling Survey
Forecasting
3
3
6
6
6
3
3
6
4
4
Teaching Methodology:
4.1
Methods to be used.
A combination of faculty and student lectures on textbook and journal research.
4.2
Student role in the course.
Students will attend the lectures, participate in discussions, complete projects and
homework.
4.3
Contact hours.
Three (3) hours per week.
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance,
specifying distinction between undergraduate and graduate, if applicable. For Laboratory
projects, specify the number of weeks spent on each project).
Students complete computer projects and homework.
5.2
Basis for determining the final grade (Course requirements and grading standards)
specifying distinction between undergraduate and graduate, if applicable.
Component
Projects
Homework
Attendance &Participation
Grading
62.5%
25.0%
12.5%
-252-
5.3
Grading scale and criteria.
Points
98 – 100%
90 – 97%
87 – 89%
84 – 86%
80 – 83%
77 – 79%
74 – 76%
70 – 73%
67 – 69%
64 – 66%
60 – 63%
57 – 59%
<=56
6.0
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1 Anderson, Sweeney, & Williams, Statistics for Business and Economics. South
Western, Ninth Edition, 2007 .
6.2
Other suggested reading materials, if any.
Hand outs to supplement the course.
6.3
Other sources of information.
None
6.4
Current bibliography of resource for student’s information.
6.4.1
6.4.2
6.4.3
Canavos & Koutrouvelis. “Introduction to the Design & Analysis of Experiments.”
First/Eddition .2009. Pearson.
Frederick Mosteller, and John W. Tukey, “Data Analysis and Regression: A Second
Course in Statistics.” First/Eddition .1977. Addison-Wesley.
Govindarajulu. “ Elements of Sampling Theory and Methods.” First/Eddition 1999.
Prentice Hall.
6.4.4 Johnson & Wichern. “Applied Multivariate Statistical Analysis.”6th Edition.2008.
Prentice Hall
6.4.5 Norusis. “SPSS 17.0 Advanced Statistical Procedures Companion.” First Edition.
2008. Prentice Hall |
-253-
7.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time
in hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
Advanced
10
6
3
7
Oral and Written Communications:
Every student is required to submit at least ___6__ written reports (not including exams, tests,
quizzes, or commented programs) to typically _10____ pages and to make ___1__ oral
presentations of typically __15___ minutes duration. Include only material that is graded for
grammar, spelling, style, and so forth, as well as for technical content, completeness, and
accuracy.
9.0
Social and Ethical Issues:
No coverage.
10.0
Theoretical content:
Please list the types of theoretical material covered, and estimate the time devoted to such
coverage.
Hours
10.1
10.2
10.3
10.4
10.5
10.6
11.0
Simple Linear Regression
Multiple Regression
Regression Analysis: Model Building
Tests of Goodness of Fit and Independence
Nonparametric Statistics
Forecasting.
6
6
3
3
6
4
Problem analysis:
Students as a team will study and analyze an organization, preferably their workplace. They use
a sampling survey to collect the data in the areas of product quality, service quality, and
information quality in order to pinpoint the areas of inefficiency.
-254-
12.0
Solution design:
Student design the appropriate experimental design using statistical models and a well known
statistical software such as SAS or MINITAB. Then the appropriate conclusions will be drawn from
the results for a better decision-making.
CHANGE HISTORY
Date
Change
Spring
Initial ABET version
2003
11/6/2002 Change of title from “Cases in Applied
Statistics” to “Advanced Statistical
Methods for IS&T”
6/25/03
ABET cleanup
7/10/03
Change title & course description –
Course Change Form – 12-6-02
03/31/09 Change title & course description –
Course Change Form – 06/25/03
-255-
By whom
Najjar
Comments
Najjar
Wolcott
Wild
Najjar
Update course description and
title to reflect focus of class
Update course description and
added bibliography
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 4150
Advanced Statistical Methods for IS&T
Lotfollah Najjar
3
5/26/09
S – Strong relationship
X – Contributing relationship
X
X
S
-256-
S
X
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
Understand advanced statistical analysis
and how to apply them in real life
situation.
Understand the sampling survey and how
to collect the data, design the
appropriate experimental design.
1. Local and global role of iS
BIS Program Outcomes
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-257-
-258-
ISQA 4180 Electronic Commerce
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 4180
Electronic Commerce
Sajda Qureshi
3
6/8/09
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
This course will offer a critical examination of issues, technologies, standards, and business
and social implications of electronic commerce in cyberspace. Some key topics will include
history of the Internet, managing electronic commerce funds transfer, reinventing the future
of business through electronic commerce, business opportunities in electronic commerce,
electronic commerce Web site design, social, political and ethical issues associated with
electronic commerce, and business plans for technology ventures. The fundamental goal of
this course is to educate a new generation of managers, planners, analysts, and programmers
of the realities and potential for electronic commerce.
1.2
For whom course is intended.
This course is intended for students who wish to know the realities and potential for
electronic commerce. It is one of elective courses for the Bachelor of Science in MIS degree.
The fundamental goal of this course is to educate a new generation of managers, planners,
analysts, and programmers of the realities and potential for electronic commerce.
1.3
Prerequisites of the course (Courses)
1.3.1
ISQA 3400 or equivalent.
1.4
Prerequisites of the course (Topics).
1.5
Unusual circumstances of the course.
None
2.0
Objectives:
2.1
2.2
2.3
3.0
To learn about Electronic Commerce concepts and business models;
To familiarize individuals with current and emerging Electronic Commerce technologies;
To be able to apply electronic commerce practices by producing and presenting an e-business
plan, and create a web site for a client organization.
Content and Organization:
Contact time
-259-
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
4.0
Introduction to Electronic Commerce
The Internet and the Web: infrastructure for Electronic Commerce
Web-based tools for Electronic Commerce
Electronic Commerce software
Security threats to Electronic Commerce
Implementing security for Electronic Commerce
Electronic payment systems
Strategies for marketing, sales, and promotion
Strategies for purchasing and support activities
Strategies for Web auctions, virtual communities and Web portals
International, legal, ethical and tax issues
Implementing Electronic Commerce
6
3
3
3
3
3
2
6
6
3
3
3
Teaching Methodology:
4.1
Methods to be used.
The primary teaching methods will be lectures and in-class discussions. A problem based
learning approach is used through which students will 1) learn electronic commerce concepts
and business models, 2) apply these in case study situations and 3) explain and resolve
electronic commerce related issues through a problem solving process.
4.2
Student role in the course.
Students must complete all course requirements including, projects, discussions, and exams
by their deadlines and to the satisfaction of the instructor. Students will work out several inclass and out-of-class exercises individually and in groups. Students must come prepared
with the assigned readings so that students can initiate and participate in meaningful
discussions.
4.3
Contact hours.
Three (3) hours per week.
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
Grades conform to the degree to which each of the requirements stressed in class is met in
the various assignments and projects. To be eligible for a passing grade in the class, a student
must complete all course requirements including, in-class assignments, homework, projects,
discussions, and exams by their deadlines and to the satisfaction of the instructor.
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
-260-
Your final grade is based on the percentage of points that you receive out of the total possible
points for the course. A curve may be used to scale the entire class higher, if necessary, but
scaling down will not be done.
Component
Grading
Individual Assignments (case analysis)
40%
Group Term Project (Proposal, E-business plan and commercial web site)
40%
Group Project Presentation (Peer evaluation )
10%
Class Participation
10%
5.3
Grading scale and criteria.
Points
98-100%
92-97%
90-91%
86-89%
82-85%
80-81%
76-79%
72-75%
70-71%
66-69%
62-65%
60-61%
<60%
6.0
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1
6.1.2
6.2
Other suggested reading materials, if any.
6.2.1
6.2.2
6.3
Required: Laudon, K. and C. G. Traver "E-Commerce. business, technology, society."
Addison Wesley. (2009).
Recommended: Saloner, G and A.M. Spence "Creating and Capturing Value. Perspectives
and cases on Electronic Commerce". Wiley and Sons. (Spring 2003).
New Perspectives on Microsoft FrontPage 2000, Evans and Hayen, Course Technology,
2000. (or more recent text)
New Perspectives Creating Web Pages with HTML: Comprehensive, Carey, P., Course
Technology, 1999. (or more recent text)
Other sources of information.
Additional material and assignments may be provided in class and/or on Blackboard.
-261-
6.4
7.0
Current bibliography of resource for student’s information.
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
Advanced
6
6
6
18
Oral and Written Communications:
Every student is required to submit at least __3___ written reports (not including exams, tests, quizzes, or
commented programs) to typically __5-10___ pages and to make _1____ oral presentations of typically
__15-20___ minutes duration. Include only material that is graded for grammar, spelling, style, and so
forth, as well as for technical content, completeness, and accuracy.
8.1
8.2
8.3
9.0
Two case analysis assignments: every student will complete a paper with 5 single-spaced pages or
10 double-spaced pages (maximum).
One Web site analysis project (group)
One e-business plan and Web site project (group): every group will complete the business plan,
the Web site implementation and the presentation lasting 20 minutes followed by a ten-minute
question and answer session (All members of the group are expected to actively participate in the
presentation.).
Social and Ethical Issues:
The course will cover international, legal, ethical and tax issues related to Electronic Commerce. Three (3)
hours will be spent on the topic. The student in the course will be graded on their understanding of the
topic in test questions.
10.0
Theoretical content:
The course deals with various concepts and terms of Electronic Commerce (12 contact hours).
11.0
Problem analysis:
Students learn to analyze issues, technologies, standards, and business and social implications of
electronic commerce in cyberspace. In topical analysis assignments, students will analyze current EC
news events by applying/integrating concepts, models, and terminology learned in the chapters specified
on the syllabus and related class discussion. In the case analysis assignment, students will analyze a
"problem solving approach" or “educational ”case . In the Web site analysis project, students will analyze
Web sites with two categories of criteria: the technical dimension and business evaluation. In the e-
-262-
business plan and Web site project (group), every group will assess a client firm (or develop their own
business) user needs, develop an e-business plan, and implement it in the form of a commercial Web site.
12.0
Solution design:
In the e-business plan and Web site project (group), every group will develop an e-business plan, and
implement it in the form of a commercial Web site.
CHANGE HISTORY
Date
10/28/02
August
2002
Change
Initial ABET version
Removed section on “Strategies for marketing, sales,
and promotion”
By Whom
Qureshi
Sajda
Qureshi
January
2003
Grade Weights: Class Participation weight reduced to
5% and Peer evaluation made part of the Group Project
grade. More weight has been given to the website
analysis project. These changes are reflected in this
course outline.
Books: Saloner, G and A.M. Spence "Creating and
Capturing Value. Perspectives and cases on Electronic
Commerce". Wiley and Sons (2002) made required text
along with Laudon and Travers (2002).
Sajda
Qureshi
Course outline: Changed the order of material: moved
eCommerce models, technologies, infrastructure,
Customer Relationship Management, Supply Chain
Management, collaborative commerce, eMarkets,
portals and auctions, and virtual communities to the
first part of the course (weeks 1-9). Security, Electronic
Payment Systems, Ethical Social and Political issues to
the second part (weeks 10-15).
ABET cleanup
Pedagogy: Added hands on class exercises and incompany projects
Content: Developed additional hands on class exercises
and web assessment activities
Evaluation: Separated assignments for graduate and
undergraduate component to reflect separate
assessment
Sajda
Qureshi
Course Outline: Updated course content with class
exercises involving eCommerce companies such as Ali
Baba.
Qureshi
January
2003
January
2003
6/25/03
January
2004
August
2004
January
2005
January
2006
-263-
Sajda
Qureshi
Comments
Students do not have
the background to be
able to conduct a
market analysis
These weights more
accurately reflect
effort.
Material from Saloner
and Spence (2002) is
used for assignments,
exams and class
discussion.
Students need to
understand and apply
the specific material
first.
Wolcott
Qureshi
Qureshi
Qureshi
The groups remain
comprised of graduate
and undergraduate
students to enhance
learning.
Students appear to
learn better when they
can see the
January
2007
Course content: Replaced SAP case with the Google
case.
Qureshi
January
2008
Pedagogy: Conducted Teaching Assessment By
Students. Changed format and delivery to reflect need
for more hands on templates and assistance with
students’ disposition.
Course content: Created and used rubrics for all
assignments. Made only one case compulsory for the
undergraduate students. The second case and website
assessment are offered as extra credit.
Qureshi
January
2009
-264-
Qureshi
components of the
business online.
The Google case also
enables the legal and
ethical concerns in
eCommerce to be
addressed.
The templates
increased the use of
class time to enhance
learning.
These changes were
made to address the
high workload that the
students were facing.
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 4180
Electronic Commerce
Sajda Qureshi
3
5/26/09
S – Strong relationship
X – Contributing relationship
X
S
X
S
-265-
X
X
S
X
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
To learn about Electronic Commerce
concepts and business models;
To familiarize individuals with current and
emerging Electronic Commerce
technologies;
To be able to apply electronic commerce
practices by producing and presenting an
e-business plan, and create a web site for
a client organization.
1. Local and global role of iS
BIS Program Outcomes
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-266-
ISQA 4190 Process Reengineering with Information Technology
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 8196
Process Reengineering with Information Technology
Lotfollah Najjar
3
03/31/09
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
Business process reengineering issues are examined. Reengineering concepts and methods
are introduced. Additional special project(s) are required. SAP will be introduced.
1.2
For whom course is intended.
This course is intended for students in management information systems, business or
computer science who are interested in the use of technology to improve organizational
efficiency and effectiveness.
1.3
Prerequisites of the course (Courses).
1.3.1
1.3.2
1.4
Prerequisites of the course (Topics):
1.4.1
1.4.2
1.5
CIST 2500 Introduction to Applied Statistics for IS&T
ISQA 4110 Information Systems Analysis or equivalent.
Introductory statistics
principles of information systems analysis
Unusual circumstances of the course.
None.
2.0
Objectives:
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
Understand the concept of cultural requirements for an organization to begin a process
improvements
Understand the concept of Total Quality Management
Understand the concept of Benchmarking
Understand the concept of Statistical Process Control
Understand reengineering design
Understand Process reengineering practices for IT enabled change
Understand the process whereby process reengineering is accepted and supported throughout
the organization
Get familiar with SAP to integrate with the process improvements
-267-
3.0
Content and Organization:
List of topics to be covered in chronological sequence
Contact Hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13
3.14
3.15
3.16
3.17
3.18
3.19
3.20
4.0
Quick Reference Guide to Process Redesign
Process Management
Leadership
Organizational Assessment
Define and Classify Process
Identify Core Process
Measure Performance
Statistical Process Control
Measure Efficiency
Understanding the Customer
Document Process
Assesses the Process
Planning the Improvement
Continuous Improvement
Understanding BPR for e-Business
How To Redesign Enterprise Process with BPR software
Business process Modeling with BPR software
Analysis and Redesign of an Enterprise Process
Designing Collaborative Supply Chain Processes for e-Business
IT Integration Options for e-Business Processes
1
1
1
1
1
1
2
2
2
1
1
2
1
1
1
1
1
1
1
1
Teaching Methodology:
4.1
Methods to be used
The primary teaching method will be discussion, case studies, lecture, guest speakers,
using SAP, and demonstration.
4.2
Student role in the course
The student will attend lectures and demonstrations, participate in discussion on assigned
readings, complete assigned projects and papers, and complete required examinations.
4.3
Contact hours
Three (3) hours per week.
5.0
Evaluation:
-268-
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
Participation in class discussion:
The students are required to prepare a discussion outline for the readings that has been assigned
each week. The discussions outlines will be counted toward the class participation part of your
grade. Please use a word processor to create your outlines.
Exams:
Three one-hour exams will be given covering the assigned readings, lectures, and in class
discussion. The exams will not be cumulative.
Presentations:
Students are required to select a current journal article from the referred literature such as CAIS
(online), JAIS (online), Communications of the ACM (digital library), IEEE (digital library), etc. The
article must address some aspect of IT Process Reengineering. Students have to prepare a
PowerPoint presentation of their articles for the class.
Projects:
Students are expected to select a process for reengineering. Using the tools and techniques
taught in class they will describe the original process using process drawings and redesign the old
processes for greater efficiency. Students will be looking for the elimination of paper, steps,
useless processes, etc. They will create a reengineered process and a list of the costs savings and
the productivity gains (quantified in dollars and hours) obtained from your process reengineering
work.
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
Exam 1
100
Exam 2
100
Exam 3
100
Assignments
100
Journal Article Presentation
Process Reengineering Project
Class Participation
50
100
50
-269-
Total
5.3
600
Grading scale and criteria.
Points
97-100%
92-96%
90-91%
86-89%
82-85%
80-81%
76-79%
72-75%
70-71%
66-69%
62-65%
60-61%
<60%
6.0
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
6.1
The latest editions of textbook(s) or other required readings used in the course, or equivalent
examples such as the following:
6.1.1
6.1.2
6.2
Other suggested reading materials or equivalent
6.2.1
6.2.2
6.2.3
6.2.4
6.2.5
6.3
Tenner A.R and DeToro I.J. Process Redesign: The Implementation Guide for Managers.
2000, Prentice-Hall PTR.
EL Sawy A. Omar. Redesigning Enterprise Processes for E-Business. 2001, McGraw- Hill
Higher Education.
Michael Hammer and James Champy. “ Reengineering the Corporation: A Manifesto for
Business Revolution .” 2003. Collins Business Essentials.
Johansson, Henry J., McHugh, Patrick, and Pendlebury, A. John. “Business Process
Reengineering: Breakpoint Strategies for Market Dominance.” 1993. John Wiley, Sons Inc.
Patrick McHugh and Giorgio Merli.”Beyond Business Process Reengineering: Toward the
Holonic Enterprise.” 1995. Wiley.
Dan Madison. “Process Mapping, Process Improvement and Process Management.” 2005.
Paton Press.
Paul Harmon. “Business Process Change, Second Edition: A Guide for Business Managers
and BPM and Six Sigma Professionals”.Second Eddition. (The MK/OMG Press). 2007.
Other sources for gathering information or equivalent
6.3.1
Students are encouraged to collect articles in current professional and trade
-270-
journals that are relevant to topics in systems analysis and design. The process
is particularly important in keeping current with technology and new
methodologies.
7.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Core
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Advanced
10
10
Oral and Written Communication
Every student is required to submit at least __3__ written reports (not including exams, tests, quizzes, or
commented programs) to typically ___5__ pages and to make __1___ oral presentations of typically
___20__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as
well as for technical content, completeness, and accuracy.
9.0
Social and Ethical Issues
9.1
9.2
9.3
9.4
10.0
11.0
Theoretical Content
Hours
10.1
3
Salience determination
Problem Analysis
11.1
11.2
12.0
Emphasis on open and honest communication.
Emphasis on understanding and honestly communicating and managing the impact and disruption
to the organization
Emphasis on the customers needs both explicit and requirements and implicit.
Emphasis on accurate and consistent project tracking and reporting to management.
Work flow analysis
Analysis for redundancy, and unproductive and wasteful processes
Solution Design
Redesign organizational processes
CHANGE HISTORY
Date
11/11/02
6/25/03
Change
Initial ABET version
ABET cleanup
By whom
Dufner
Wolcott
-271-
Comments
7/10/03
11/22/05
03/31/09
Change prerequisites – Course Change
Form – 5-15-03
Change prerequisites – Course Change
Form – 7/10/03
Wild
Update course prerequisites
Najjar
Change prerequisites – Course Change
Form – 11/22/05
Najjar
Update course prerequisites,
Changing the text, and integration of
the course with SAP.
Update course prerequisites and
added Bibliography.
-272-
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 4190
Process Reengineering with Information Technology
Lotfollah Najjar
3
5/26/09
S – Strong relationship
X – Contributing relationship
X
X
S
X
S
S
S
X
X
S
X
-273-
S
S
S
X
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
Understand the concept of cultural
requirements for an organization to begin
a process improvements
Understand the concept of Total Quality
Management
Understand the concept of Benchmarking
Understand the concept of Statistical
Process Control
Understand reengineering design
Understand Process reengineering
practices for IT enabled change
Understand the process whereby process
reengineering is accepted and supported
through out the organization
Get familiar with SAP to integrate with
the process improvements
1. Local and global role of iS
BIS Program Outcomes
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-274-
ISQA 4200 Information and Data Quality Management
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 4200
Information and Data Quality Management
Lotfollah Najjar
3
03/10/06
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
This course introduces the role and importance of data quality and information quality in
databases and data warehouses. The intent of the course is to provide students with the concepts
and tools necessary to effectively manage information and data quality .In particular, the course
examines the various roles, responsibilities, and skills essential to manage databases and data
warehouses.
1.2
For whom course is intended.
The course is intended for undergraduate students in Information Systems, Computer Science and
related areas who are interested in managing information and data quality for better decision
making.
1.3
Prerequisites of the course (Courses).
1.3.1
1.3.2
1.4
Prerequisites of the course (Topics):
1.4.1
1.4.2
1.5
CIST 2500
ISQA 3310
Introductory statistics
Managing the Data Base Environment
Unusual circumstances of the course.
None.
2.0
Objectives:
2.1
2.2
2.3
2.4
Develop in-depth understanding of Data and Information Quality (DQ and IQ)
Understand and use DQ and IQ Concepts in Information Systems projects
Be able to recognize various patterns of Data and Design Deficiencies in Systems
Be able to suggest appropriate DQ and IQ improvement plans in light of known deficiencies in
systems
-275-
2.5
2.6
3.0
Develop an understanding of the role and importance of DQ and IQ in databases and Data
warehouses
Be able to discuss the role and importance of DQ in DSS
Content and Organization:
List of topics to be covered in chronological sequence
Contact Hours
3.1
Principles of information quality improvement
3.1.1
3.1.2
3.1.3
3.1.4
3.2
1
1
2
3
Processes for improving information quality
3.2.1
3.2.2
3.2.3
3.2.4
3.2.5
3.2.6
3.2.7
3.2.8
4.0
Supplement (TQM)
The high costs of low quality data
Defining information quality
Applying quality management principles to information
An overview of total quality data management
Assigning data definition and information architecture quality
Supplement (SPC)
Information quality assessment
Measuring nonquality information costs
Information product improvement: data reeingineering
and cleansing
Improving information process quality: data defect prevention
Information quality tools and techniques
4
5
4
5
5
4
6
5
Teaching Methodology:
4.1
Methods to be used
The primary teaching methods will include class discussion, case study, lecture, and guest
speakers.
4.2
Student role in the course.
The student will attend lectures and demonstrations, participate in discussion on assigned
readings, complete assigned projects and papers, and complete required examinations.
4.3
Contact hours
Three (3) hours per week.
5.0
Evaluation:
-276-
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
5.1.1
5.1.2
5.1.3
5.1.4
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable
5.2.1
5.2.2
5.2.3
5.2.4
5.2.5
5.3
Assignments
Team Presentations: In teams of 2-3 members students are required to research a
contemporary issue facing the information quality systems
Mid-Term Examination
Final Examination
Assignments (20%)
Team Presentations: In teams of 2-3 members students are required to research a
contemporary issue facing the information quality systems (20%)
Mid-Term Examination (25%)
Final Examination (25%)
Participation (10%)
Grading scale and criteria.
Points
97-100%
92-96%
90-91%
86-89%
82-85%
80-81%
76-79%
72-75%
70-71%
66-69%
62-65%
60-61%
<60%
6.0
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
6.1
The latest editions of textbook(s) or other required readings used in the course, or equivalent
examples such as the following:
6.1.1
6.2
Improving Data Warehouse and Business Information Quality. Larry P.
1999. Wiley.
Other suggested reading materials or equivalent
-277-
English.
Additional articles that have been collected for various topics are available at the UNO Library.
These articles are used to supplement topics presented in various chapters.
6.3
Other sources for gathering information or equivalent
Students are encouraged to collect articles in current professional and trade journals that are
relevant to DQ/IQ topics.
7.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
Advanced
17
Oral and Written Communication
Every student is required to submit at least __3__ written reports (not including exams, tests, quizzes, or
commented programs) to typically ___5__ pages and to make __1___ oral presentations of typically
___20__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,
as well as for technical content, completeness, and accuracy.
9.0
Social and Ethical Issues
9.1
9.2
9.3
9.4
10.0
Theoretical Content
10.1
11.0
Hours
Salience determination
3
Problem Analysis
11.1
11.2
12.0
Emphasis on open and honest communication.
Emphasis on understanding and honestly communicating and managing the impact and disruption
to the organization
Emphasis on the customer’s needs both explicit and requirements and implicit.
Emphasis on accurate and consistent project tracking and reporting to management.
Work flow analysis
Analysis for redundancy, and unproductive and wasteful processes
Solution Design
12.1
Redesign organizational processes
-278-
CHANGE HISTORY
Date
03/10/06
Change
Initial ABET version
ABET cleanup
By whom
Najjar
Wolcott
-279-
Comments
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 4200
Information and Data Quality Management
Lotfollah Najjar
3
5/26/09
S – Strong relationship
X – Contributing relationship
S
X
S
X
S
X
S
S
X
S
X
X
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
-280-
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
Develop in-depth understanding of Data
and Information Quality (DQ and IQ)
Understand and use DQ and IQ Concepts
in Information Systems projects
Be able to recognize various patterns of
Data and Design Deficiencies in Systems
Be able to suggest appropriate DQ and IQ
improvement plans in light of known
deficiencies in systems
Develop an understanding of the role and
importance of DQ and IQ in databases
and Data warehouses
Be able to discuss the role and
importance of DQ in DSS
BIS Program Outcomes (2009)
1. Local and global role of iS
BIS Program Outcomes
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-281-
-282-
ISQA 4300 Database Administration
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 4300
Database Administration
Peter Wolcott
3
10/3/07
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
This course is designed to give students an applied, practical introduction to database
administration. Students will gain an understanding of the functioning of a database management
system and its relationship to the computing environment in which it runs. They will learn the
concepts, principles, and techniques necessary to carry out such functions as database object
creation, storage management, capacity planning, performance tuning, backup and recovery, and
security management. Each semester the course will focus on one commercial DBMS, such as
Oracle.
1.2
For whom course is intended.
The course is intended for upper division undergraduate MIS or CS majors who wish to pursue the
topic of database and data administration beyond the level of an introductory database course.
1.3
Prerequisites of the course (Courses)
1.3.1
1.3.2
1.4
Prerequisites of the course (Topics)
1.4.1
1.4.2
1.4.3
1.4.4
1.5
ISQA 3300
ISQA 3310 or CSCI 4850
Relational Model
Structured Query Language (SQL)
Secondary storage & I/O
Indexing
Unusual circumstances of the course.
None
2.0
Objectives:
2.1
2.2
Understand the roles, issues, and tasks associated with the database administration function.
Understand computer system and DBMS architecture and how the DBMS stores and maintains
data, executes queries, and performs other data management tasks.
-283-
2.3
2.4
2.5
2.6
2.7
2.8
2.9
3.0
Create a variety of database objects, such as tablespaces, indexes, and user objects.
Plan and implement the physical organization of a database.
Understand and use the system catalog in a variety of database administration tasks.
Gather, interpret, and act on database statistics to monitor database activity and tune for
performance.
Plan and execute backup and recovery activities.
Secure the database and manage users.
Develop good database management discipline
Content and Organization:
Contact hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13
3.14
3.15
4.0
Overview of Database Administration
System architecture
DBMS architecture
Data Dictionary
Control Files
Redo log files
Basic Storage Concepts
Database object creation
Concurrency Control and Lock management
Query processing
User administration and security
Managing Data with exports, imports, and loading
Network services
Performance monitoring and tuning
Backup & recovery
1.5
4.5
3.0
1.0
1.0
1.0
4.5
4.5
6.0
1.5
3.0
1.5
1.5
3.0
3.0
Teaching Methodology:
4.1
Methods to be used.
The primary teaching methods will be lecture, in-class demonstrations, and in-class
exercises
4.2
Student role in the course.
The student will attend lectures and demonstration, participate in discussion on assigned
readings, complete assigned projects, and complete required examinations
4.3
Contact hours.
Three (3) hours per week.
5.0
Evaluation:
-284-
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
Students will complete a sequence of assignments desired to provide hands-on exposure to
the topics discussed in class, and take two examinations.
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
Component Grading
Exams
35%
Assignments
60%
Participation
5%
5.3
Grading scale and criteria.
Points
97-100%
93-96%
90-92%
87-89%
83-86%
80-82%
77-79%
73-76%
70-72%
67-69%
63-66%
60-62%
6.0
Grade
A+
A
AB+
B
BC+
C
CD+
D
D-
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1
6.2
Watson, J. 2008. OCA Oracle Database 11g: Administration I Exam Guide. McGraw-Hill.
Other suggested reading materials, if any.
6.2.1
6.2.2
6.2.3
6.2.4
Greenwald, R., Stackowiak, R., and Stern, J. 2008. Oracle Essentials: Oracle Database 11g.
Sebastopol, CA: O'Reilly Media, Inc.
Powell, G., and McCullough-Dieter, C. 2007. Oracle 10g Database Administrator:
Implementation & Administration. Boston, MA: Thomson Course Technology.
Loney, K. and Bryla, B. Oracle Database 10g DBA Handbook, Oracle Press, 2005.
Whalen, E. Oracle Database 10g Linux Administration, Oracle Press, 2005.
-285-
6.3
Other sources of information.
6.3.1
6.3.2
6.3.3
6.4
Current bibliography of resource for student’s information.
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
6.4.6
6.4.7
7.0
Oracle Technet: http://technet.oracle.com
http://pipetalk.revealnet.com/~dba
http://www.lazydba.com/
Bryla, Bob, and Kevin Loney. Oracle Database 11g Dba Handbook: The McGraw-Hill
Companies, Inc., 2008.
Fernandez, Iggy. Beginning Oracle Database 11g Administration: From Novice to
Professional: Apress, 2008.
Afyouni, H.A. Database Security and Auditing: Protecting Data Integrity and Accessibility,
Thomson Course Technology, Boston, MA, 2006.
Morris-Murphy, L.L. Oracle9i Database Administrator II: Backup/Recovery & Network
Administration, Thomson Course Technology, Boston, 2004.
Oracle Security Handbook, by Marlene Theriault & Aaron Newman, Osborne/McGrawHill, 2001.
Sharma, V. Bitmap Index vs. B-tree Index: Which and When?, Oracle Corp., 2005.
http://www.oracle.com/technology/pub/articles/sharma_indexes.html, Current
September 27, 2005.
Morrison, J., Morrison, M. and Conrad, R. Guide to Oracle10g, Thomson Course
Technology, Boston, 2006.
(IS Program) Estimate Computing Accreditation Commission Category Content (class time in hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
Advanced
27
15
Oral and Written Communications:
Every student is required to submit at least __0___ written reports (not including exams, tests, quizzes, or
commented programs) to typically _____ pages and to make ___0__ oral presentations of typically _____
minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as well as
for technical content, completeness, and accuracy.
9.0
Social and Ethical Issues:
No coverage.
-286-
10.0
Theoretical content:
This course deals mostly with physical, not logical design, and includes a number of topics included in
IS’97 Information Systems Theory and Practice:
10.1
10.2
Implementation and evaluation of system performance 3
Theory of concurrency control
4.5
11.0
Problem analysis:
Students learn to analyze the state of the database in three areas in particular: storage management,
user administration, and performance management. In storage management, students learn to
determine the placement of database objects within data files in order to be able to detect fragmentation
of files and of database objects. In user administration, students learn to identify the privileges given to
users to detect potential security issues. In performance management, students learn about key
performance indicators and a process for isolating and resolving performance problems.
12.0
Solution design:
Students learn to make and implement a variety of physical design decisions, including: creation of
tablespaces and files of appropriate size with appropriate storage allocation patterns, determination of
block structure for tables and indexes, and creation of indexes. Students also learn to determine an
appropriate basket of privileges for various types of users.
CHANGE HISTORY
Date
5/21/02
6/25/03
10/3/07
9/30/08
Change
Initial ABET version
ABET cleanup
Updated resource material
Minor updates to content & organization
Update of the reading list & reference list
By whom
Wolcott
Wolcott
Wolcott
Wolcott
-287-
Comments
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 4300
Database Administration
Peter Wolcott
3
5/26/09
S – Strong relationship
X – Contributing relationship
X
X
S
S
S
X
S
X
-288-
S
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
Understand the roles, issues, and tasks
associated with the database
administration function.
Understand computer system and DBMS
architecture and how the DBMS stores
and maintains data, executes queries,
and performs other data management
tasks.
Create a variety of database objects, such
as tablespaces, indexes, and user objects.
Plan and implement the physical
organization of a database.
Understand and use the system catalog in
a variety of database administration
tasks.
Gather, interpret, and act on database
statistics to monitor database activity and
tune for performance.
Plan and execute backup and recovery
1. Local and global role of iS
BIS Program Outcomes
activities.
Secure the database and manage users.
X
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-289-
-290-
ISQA 4380 Distributed Technologies and Systems
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 4380
Distributed Technologies and Systems
Peter Wolcott
3
10/09/2008
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
The course introduces students to concepts, issues and tools needed to develop distributed
computing systems. Topics include distributed systems architecture, middleware, Internet-based
systems development, security and performance. Hands-on systems development using current
technologies is provided.
1.2
For whom course is intended.
This course is intended for upper division undergraduate MIS majors who wish to study topics
pertaining to the client/server environment. It is the capstone course course for the I-Business
Application Development & Management concentration.
1.3
Prerequisites of the course (Courses).
1.3.1
1.3.2
1.3.3
1.3.4
1.4
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.4.6
1.5
ISQA 3400 - Business Data Communications
ISQA 3310 - Managing the Data Base Environment
ISQA 3210 - Advanced Technology for Personal Productivity
CSCI 2850 - Programming on the Internet or equivalent
OSI reference model
TCP/IP
HTTP
HTML
Database design
SQL
Unusual circumstances of the course.
None
2.0
Objectives:
1.1
Define the terms Distributed Computing System and Internet Technology;
-291-
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.10
3.0
Understand the concept of Middleware and types of middleware software;
Identify distributed computing objects and how they work;
Develop a modest size web application with access to a database;
Integrate a web application to available open web services;
Develop a web service and consume it in a web application;
Understand the architecture of web based systems;
Describe transaction processing and how it works on the Internet;
Decribe how businesses integrate with other businesses using modern forms of B2B integration
Describe how to implement a modest size web application.
Content and Organization:
Contact hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
4.0
Overview of Client Server and the Internet
Distributed System Fundamentals
Introduction to Middleware
Communications Middleware
Database Middleware
Web technologies and XML
Distributed integration technologies and models
3.7.1 COM/DCOM/.NET integration models
3.7.2 Java Object and integration models
3.7.3 Web Services
3.7.4 REST/POX and Mashup Integration
Service Oriented Architecture
PHP
1.5
1.5
3.0
3.0
3.0
6.0
7.0
5
9.0
Teaching Methodology:
4.1
Methods to be used.
The primary teaching methods will be in-class lectures sample integration problems done in
groups and demonstrations.
4.2
Student role in the course.
Students will attend the class, participate in the in-class discussion, solve integration problems in
class as a group and present results, complete exams, assignments, and projects
4.3
Contact hours.
Three (3) hours per week.
5.0
Evaluation:
-292-
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
Students will complete exams, assignments, and projects.
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
Components
Exams
Assignments
Project
Participation
5.3
Grading scale and criteria.
Points
97-100%
93-96%
90-92%
87-89%
83-86%
80-82%
77-79%
73-76%
70-72%
67-69%
63-66%
60-62%
<60%
6.0
Grading
40%
35%
22%
3%
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1
6.1.2
6.2
Umar, Amjad, “eBusiness and Distributed Systems Handbook,” 2004.
http://www.amjadumar.com.
Newcomer, Eric and Lomow, “Understanding SOA and Web Services” 2007. ISBN 0-32118086-0.
Other suggested reading materials, if any.
6.2.1
Meloni, Julie, “PHP, MySQL and Apache All in One,” 2005 ISBN 0-672-32725-2
-293-
6.3
Other sources of information.
None
6.4
Current bibliography of resource for student’s information.
6.4.1
R. Gleghorn, Enterprise Application Integration: A Manager’s Perspective, IT Professional.
November, 2005, pp 17-23.
6.4.2 F. Leyman, D. Roller and M.Schmidt, Web Services and Business Process Management.
IBM Systems Journal. Vol 41, No 2, 2002. pp 198-211.
6.4.3 D. Margulius, Banking on SOA. Infoworld, July 17th, 2006. Pages 27-31
6.4.4 J. Kobielus, Enterprise Service Bus: Web Services Meet Message-Oriented Middleware.
Business Communications Review. April, 2006. pp 30-36.
6.4.5 K. Braskasan, Websphere Business Integration: An Architectural Overview. Vol 43, No 2,
2005. pp 238-254.
6.4.6 T. Prushman, R. Alt. Process Portals – Architecture and Integration. Proceeding of the 37th
Hawaii International Conference onSystems Sciences – 2004. pp 1-10.
6.4.7 Anton Fricko, SOAs Require Culture Change and Service Reuse. Business Communications
Review. May 2006. pp 58-64.
6.4.8 Newcomer, Eric and Lomow, Greg, “Understanding SOA and Web Services” 2007. ISBN: 0321-18086-0.
6.4.9 Margolis, Ben, “SOA for the Business Developer” 2007. ISBN: 1-58347-065-4.
6.4.10 Juneja, Girish, et al, “Service Oriented Architecture Demystified” 2007. ISBN: 1-93405302-3.
7.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
Advanced
12
6
9
3
9
Oral and Written Communications:
Every student is required to submit at least __1__ written reports (not including exams, tests, quizzes, or
commented programs) to typically __4-5___ pages and to make ___1__ oral presentations (podcast) of
typically _10-12____ minutes duration. Include only material that is graded for grammar, spelling, style,
and so forth, as well as for technical content, completeness, and accuracy.
9.0
Social and Ethical Issues:
-294-
No coverage.
10.0
Theoretical content:
Hours
10.1
11.0
Distributed Systems Fundamentals
3.0
Problem analysis:
The course involves learning to use various middleware and web-development tools. The students are
challenged to apply the tools and techniques to solve specified problems rather than analyze the problem
itself.
12.0
Solution design:
The course will allow students the opportunity to learn some of the development tools available for
distributed systems application development. Students will have the opportunity to gain hands-on
experience with some of these tools.
-295-
CHANGE HISTORY
Date
Change
By whom
Comments
4/30/02
Updated course content section to
deemphasize scripting and indicate switch
to PHP as an implementation platform
ISQA 3210 added as a prerequisite
Wolcott
ISQA 3210 covers the scripting
portions well.
Wolcott
10/28/02
Title changed from “Managing the
Client/Server Environment” to “Distributed
Technologies and Systems”
Wolcott
5/15/03
CSCI 2850 added as a prerequisite. Course
Catalog Management System change for
5/15/03
ABET cleanup
ABET cleanup - Prerequisite course titles
added
Updating to include objectives on web
services and service oriented concepts.
Also updated content and organization and
bibliography
Updated text and references
Wolcott
Students need to have had exposure
to HTML and some scripting.
“Client/Server” is a somewhat
outdated term. The new title is
general enough to include both
Internet and non-Internet
technologies
CSCI 2850 gives students a start with
PHP, which can be built upon in
ISQA 4380
10/28/02
6/25/03
7/10/03
10/14/07
10/9/2008
Wolcott
Wild
Royce
Royce
-296-
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 4380
Distributed Technologies and Systems
Peter Wolcott
3
5/26/09
S – Strong relationship
X – Contributing relationship
X
S
S
X
X
X
X
S
S
S
S
S
S
S
S
S
S
S
S
X
X
X
X
X
X
X
X
X
-297-
X
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
Define the terms Distributed Computing
System and Internet Technology
Understand the concept of Middleware
and types of middleware software
Identify distributed computing objects
and how they work
Develop a modest size web application
with access to a database
Integrate a web application to available
open web services
Develop a web service and consume it in
a web application
Understand the architecture of web
based systems
Describe transaction processing and how
it works on the Internet
Decribe how businesses integrate with
other businesses using modern forms of
B2B integration
1. Local and global role of iS
BIS Program Outcomes
Describe how to implement a modest size
web application
X
X
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-298-
ISQA 4590 IT Audit and Control
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 4590/ISQA 8596
IT Audit and Control
Deepak Khazanchi
3
10/1/2008
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
This course explores organizational and managerial issues relevant to planning and conducting IT
audit and control activities. The course covers the following conceptual areas: business risks and
the management of business risk, IT risk as a component of business risk, the need to manage IT
risks, and the basic type of controls required in a business system in order to control IT risks.
Issues associated with new risks created by the use of the internet for business applications and
electronic business are also covered.
1.2
For whom course is intended.
The course is intended for graduate and undergraduate students (juniors and seniors) in
Information Systems or Business Administration or related areas who have an interest in IT audit
and control issues.
1.3
Prerequisites of the course (Courses).
A solid understanding of business foundations such as accounting and introductory auditing and
exposure to the IS discipline is essential for success in this course. Permission of instructor is
required to enroll.
1.4
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.4.3
1.5
Basic Accounting
Introduction to Auditing
Information Security and Policy
Unusual circumstances of the course.
None
2.0
Objectives:
List of performance objectives stated in terms of the student educational outcomes.
2.1
Understand the concept of business risks and the management of business risk
-299-
2.2
2.3
2.4
2.5
2.6
2.7
3.0
Understand IT risk as a component of business risk
Gain an appreciation of the need to manage IT risks
Gain an understanding of the basic type of controls required in a business system in order to
control IT risks
Learn concepts and applications of the following types of IT controls: top management, system
development, programming, data resource management, database, security, operations
management, quality assurance, boundary controls, and communications.
Gain an appreciation for the difficulties in assessing systems effectiveness and efficiency.
Understand the new system control risks created by the use of the internet for business
applications and electronic business.
Content and Organization:
List of major topics to be covered in chronological sequence (specify number of Contact Hours on each).
Contact Hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13
3.14
4.0
Introduction
Top Management Controls
Systems Development Management Controls
Programming Management Controls
Data Resource Management Controls
Security Management Controls
Operations Management Controls
Quality Assurance Management Controls
Boundary Controls
Communication Controls
Database & ERP Controls
Evaluating System Effectiveness & Efficiency
Trust Services (AICPA/CICA/IIA Reports)
B2B Assurance Framework (Khazanchi and Sutton)
3
3
3
3
3
3
3
3
3
3
3
3
3
3
Teaching Methodology:
4.1
Methods to be used.
The primary teaching methods will include class discussion, case studies, lecture, guest speakers,
and demonstration.
4.2
Student role in the course.
The student will attend lectures and demonstrations, participate in discussion on assigned
readings, complete assigned projects and papers, and complete required examinations.
4.3
Contact hours.
3 hours
-300-
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
Students will be evaluated on the following basis.
Class participation: Students are expected to attend each and every class and be prepared to
actively participate in the discussion. Much of the class will be conducted using an open
discussion approach, and the success of the class will be dependent on students’ ability to identify
and discuss relevant issues. Each student will choose a chapter from the text and lead the
instruction of the rest of the class on that chapter. This includes a summary of key components of
the chapter, and facilitation of discussion of the chapter.
Individual Case Study: Each student will complete three case studies which will involve reading a
case study and preparing a 5-7 page evaluation of the case from the viewpoint of an IT Auditor. All
cases will be graded for depth of analysis, originality, quality of writing, and professional
impression. Most questions will involve subjective issues for which multiple views can be
defended. As in a professional career, it is important to be both complete and concise.
Group Case Presentation: Each person will be assigned to a learning group to complete a case
study related to each topic. Students will choose one of the three required case studies and work
in their team to provide a presentation to the class on that case. This 20-30 minute presentation
should include a summary of the case, the challenge(s) facing the organization, and their
interpretation and/or resolution of the challenges from an IT Audit perspective.
Computer-aided Auditing Project (ACL Assignment): This project will provide students a chance
to gain hands-on experience with computer assisted audit tools and techniques (CAATTS). The
software to be used in this assignment, ACL, comes with the textbook. Specifications for the
project will be provided in class.
Exams: There will be one comprehensive final examination.
Current News Articles: Each class member will be responsible for summarizing and presenting
two news articles during the course of the semester. These articles should relate in some fashion
to risk and controls and should represent a current news event related to the subject to be
covered in a given week. All students are required to participate on a regular basis in the
discussion.
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
The grade base for the course for undergraduate students will consist of the following:
-301-
Available points
Individual Case Studies (3)
Group Case Study
Comprehensive final exam
ACL project
Current news articles
Individual class participation
5.3
45%
5%
20%
15%
5%
10%
Grading scale and criteria.
The grading scale is as follows:
GRADE POINT VALUE
A
92% <= x % <= 100%
A89% <= x <= 92%
B+
86% <= x <= 89%
B
82% <= x <= 86%
B79% <= x <= 82%
C+
76% <= x <= 79%
C
72% <= x <= 76%
C69% <= x <= 72%
D+
66% <= x <= 69%
D
62% <= x <= 66%
D59% <= x <= 62%
F
Less than 59%
An “I” or “IP” will be awarded only if a student is unable to complete the course requirements due to
circumstances beyond her/his control as specified in the UNO catalog. The student must also have
substantially completed the course and have a passing grade when the grade of “I” is requested.
6.0
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1
6.1.2
6.1.3
6.1.4
6.1.5
6.2
Core Concepts of Information Technology Auditing, James Hunton, Stephanie Bryant,
Nancy Bagranoff, 2004, John Wiley & Sons, Inc. ISBN# is 0-471-22293-3.
CobIT Student Handbook Book (ISACA_
IS Standards, Guidelines and Procedures for Auditing and Control Professionals. (ISACA).
IT Control Objectives for Sarbanes-Oxley, 2nd Edition (ISACA)
Harvard Business Review Cases. To be purchased at
http://harvardbusinessonline.hbsp.harvard.edu.
Readings:
-302-
6.2.1
“To Caatch a Thief”. Paul R Brazina, Bruce A Leauby. Pennsylvania CPA Journal.
Philadelphia: Spring 2004.Vol.75, Iss. 1; pg. 30, 4 pgs. To be referred to as ACL1 in
syllabus.
6.2.2 “Computer-assisted audit tools and techniques: analysis and perspectives.” Robert L
Braun, Harold E Davis. Managerial Auditing Journal. Bradford: 2003.Vol.18, Iss. 9; pg.
725, 7 pgs. Referred to as ACL2 in syllabus.
6.2.3 “Trust Services Principles, Criteria and Illustrations for Security, Availability, Processing
Integrity, Confidentiality, and Privacy (Including WebTrust® and SysTrust®)”. American
Institute of Certified Public Accountants, Inc. and Canadian Institute of Chartered
Accountants. Referred to as WebTrust in syllabus.
6.2.4 “E-Commerce’s Impact on Audit Practices.” Michael D Harkness; Brian Patrick Green.
Internal Auditing; Mar/Apr 2004; 19, 2; ABI/INFORM Global pg. 28. To be referred to as
Harkness in syllabus.
6.2.5 “The keys to effective IT auditing”. Mark Petterson. Journal of Corporate Accounting &
Finance; Volume 16, Issue 5 , Pages 41 – 46. To be referred to as Petterson in syllabus.
6.2.6 CobIT Generic Audit Guidelines & Process. To be provided by instructor on Blackboard. To
be referred to as CobIT Guidelines & Process in syllabus.
6.2.7 “Auditing in the E-Commerce Era.” Ning Zhao; David C Yen; I-Chiu Chang. Information
Management & Computer Security; 2004; 12, 5; ABI/INFORM Global. pg. 389. To be
referred to as Zhao in syllabus.
6.2.8 “Risks, Benefits, and Challenges in Global IT Outsourcing: Perspectives and Practices.”
Subhankar Dhar & Bindu Balakrishnan. Journal of Global Information Management, vol.
14, issue 3. To be referred to as Dhar in syllabus.
6.2.9 “Critical Risks in Outsourced IT Projects: The Intractable and the Unseen.” Hazel Taylor.
Communications of the ACM; November 2006/Vol. 49, No. 11. To be referred to as Taylor
in syllabus.
6.2.10 “A Continuous View of Accounts” David Coderre. The Internal Auditor; Apr 2006; 63, 2;
ABI/INFORM Global pg. 25. To be referred to as Coderre in syllabus.
6.2.11 “Continuous Auditing: An Effective Tool For Internal Auditors.” J Donald Warren Jr; L
Murphy Smith. Internal Auditing; Mar/Apr 2006; 21, 2; ABI/INFORM Global pg. 27. To be
referred to as Warren in syllabus.
Other references will be provided as needed. Students are also encouraged to bring related press articles
to class for discussion.
6.3
Other suggested reading materials, if any.
6.3.1
6.4
Other sources of information.
6.4.1
6.5
Hollander, Denna, and Cherrington (1996). Accounting, IT and Business Solutions. Irwin.
AICPA/CICA/IIA web sites
Current bibliography of resources for student’s information.
6.5.1
6.5.2
Stoll, C. (1990). “The Cuckoo's Egg: Tracking a Spy through the Maze of Computer
Espionage," New York, NY: Pocket Books.
“Auditing Information Systems,” Jack Champlain, John Wiley & Sons, Inc., One Wiley
Drive, Somerset, NJ 08875
-303-
6.5.3
6.5.4
6.5.5
7.0
“An e-Risk Primer,” Xenia Ley Parker, CISA, CFSA, The Institute of Internal Auditors
Research Foundation
“Electronic Commerce, Control Issues for Securing Virtual Enterprises,” Albert J. Marcella,
Jr., Ph.D., COAP, CSP, CQA, CFSA, CDP, CISA, Larry Stone, CISA, CCP; and William J.
Sampias, CISA.
“www.StopThief.net – Protecting Your Identity on the Web,” Albert J. Marcella Jr., Ph.D.,
COAP, CSP, CQA, CDP, CFSA, CISA.
(Fill out for ISQA and CIST courses) Estimate Computing Accreditation Commission (CAC) Category
Content (class time in hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
5
5
Advanced
5
15
15
Oral and Written Communications:
Every student is required to submit at least __5___ written reports (not including exams, tests, quizzes, or
commented programs) to typically __5___ pages and to make __1___ oral presentations of typically
__30___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,
as well as for technical content, completeness, and accuracy.
9.0
Social and Ethical Issues:
Please list the topics that address the social and ethical implications of computing covered in all course
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded
on their understanding of these topics (e.g. test questions, essays, oral presentations, and so forth?).
We will cover the standards for IT audit and control established by professional associations such as ISACA
and AICPA. (Time: 6 hours).
10.0
Theoretical content:
Please list the types of theoretical material covered, and estimate the time devoted to such coverage.
11.0
Problem analysis:
Please describe the analysis experiences common to all course sections.
12.0
Solution design:
Please describe the design experiences common to all course sections.
-304-
CHANGE HISTORY
Date
10/1/2008
Change
Minor changes to description of
assignments, adjustments to readings
list and required texts based on an
implemented version of the original
formal syllabus.
By whom
Deepak
Khazanchi
-305-
Comments
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 4590
IT Audit and Control
Deepak Khazanchi
3
5/26/09
S – Strong relationship
X – Contributing relationship
X
X
X
-306-
X
X
S
X
X
S
X
S
S
X
X
X
X
S
13. Recognize need for prof. develop.
12. Manage change
S
X
X
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
Understand the concept of business risks
and the management of business risk
Understand IT risk as a component of
business risk
Gain an appreciation of the need to
manage IT risks
Gain an understanding of the basic type
of controls required in a business system
in order to control IT risks
Learn concepts and applications of the
following types of IT controls: top
management, system development,
programming, data resource
management, database, security,
operations management, quality
assurance, boundary controls, and
communications.
Gain an appreciation for the difficulties in
assessing systems effectiveness and
1. Local and global role of iS
BIS Program Outcomes
efficiency.
Understand the new system control risks
created by the use of the internet for
business applications and electronic
business.
S
X
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-307-
-308-
ISQA 4730 Decision Support Systems
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 4730
Decision Support Systems
Paul J.A. van Vliet
3
10/12/2008
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
This course examines a set of information systems which specifically support managerial
decision makers: Decision Support Systems, Group Decision Support Systems, Executive
Information Systems, Data Warehouses, Expert Systems, and Neural Networks. This
course explores the development, implementation, and application of these systems,
how these systems can be applied to current business problems, as well as how
organizational issues impact the implementation and usage of these systems.
1.2
For whom course is intended.
This course is intended for upper division undergraduate MIS majors and graduate MIS
majors who wish to understand a set of information systems which specifically support
managerial decision.
1.3
Prerequisites of the course (Courses).
1.3.1 CIST 3100 or equivalent
1.4
Prerequisites of the course (Topics).
1.4.1 Working knowledge of business foundations.
1.4.2 Working knowledge of computer information systems.
1.5
Unusual circumstances of the course.
None
2.0
Objectives:
2.1
Understand the nature of decision making and of decision makers, as well as the need for decision
support.
-309-
2.2
2.3
2.4
3.0
Investigate the application Decision Support Systems, Business Intelligence, Group Decision
Support Systems, Executive Information Systems, Data Warehouses, Expert Systems, and Neural
Networks to both common and unique organizational decision problems.
Understand how organizational issues impact the implementation and usage of these systems.
Apply course concepts in hands-on assignments with a strong real-world orientation.
Content and Organization:
Contact Hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13
3.14
3.15
3.16
3.17
3.18
3.19
3.20
4.0
Decision Support Systems and Business Intelligence
Decision Making Systems, Modeling, and Support
Modeling and Analysis
Decision Support Systems Concepts, Methodologies and
Technologies: An Overview
System Development and Acquisition
The Essentials of Business Intelligence
Business Analytics and Data Visualization
Data Warehousing
Data, Text, and Web Mining
Collaborative Computer-Supported Technologies and
Group Support Systems
Knowledge Management
Business Performance Management
Enterprise Systems
Artificial Intelligence and Expert Systems
Knowledge Acquisition, Representation and Reasoning
Advanced Intelligent Systems
Neural Networks for Data Mining
Intelligent Systems over the Internet
Integration, Impacts, and the Future of Management
Support Systems
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
3.0
Teaching Methodology:
4.1
Methods to be used.
The primary teaching methods will be lectures and the in-class discussion.
4.2
Student role in the course.
The student will attend lectures, participate in the discussion on assigned readings,
complete the individual assignments and exams, and participate in a group project.
4.3
Contact hours.
Three (3) hours per week.
-310-
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance,
specifying distinction between undergraduate and graduate, if applicable. For Laboratory
projects, specify the number of weeks spent on each project).
The student will participate in the discussion on assigned readings. The student will
complete a set of individual assignments as well as two individual exams. Students – in
groups of 2 or 3 - will participate in the completion of a group project. Undergraduate
students will construct a small decision support system to solve an actual decision
problem. Graduate students will research a decision support implementation project and
write a formal research paper on this topic.
5.2
Basis for determining the final grade (Course requirements and grading standards)
specifying distinction between undergraduate and graduate, if applicable.
Component
Exams
Assignments
Team Project
5.3
Grading scale and criteria.
Points
96% - 100%
92% - 95%
89% - 91%
86% - 88%
82% - 85%
79% - 81%
76% - 78%
72% - 75%
69% - 71%
66% - 68%
62% - 65%
59% - 61%
00% - 58%
6.0
Grading
33.3%
33.3%
33.3%
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
6.1
Textbooks and/or other required readings used in course.
-311-
6.1.1 Turban, E., Aronson, J.E., Liang, T.P., & Sharda, R. (2007) Decision Support and
Business Intelligence Systems, 8th Edition, Upper Saddle River, NJ, PearsonPrentice Hall.
6.2
Other suggested reading materials, if any.
6.2.1 On-line: Different Drummers by David Keirsey
(http://keirsey.com/Drummers.html)
6.2.2 On-line: Keirsey Temperament Sorter
(http://www.advisorteam.com/user/ktsintro1.asp)
6.2.3 On-line: Decision Making overview (http://cognet.mit.edu/MITECS/Entry/shafir3)
6.2.4 On-line: Problem Solving and Decision Making: Consideration of Individual
Differences Using the Myers-Briggs Type Indicator
(http://teach.valdosta.edu/whuitt/files/prbsmbti.html)
6.2.5 On-line: Decision Making and Problem Solving, by Herbert A. Simon and Associates
(http://www.dieoff.org/page163.htm)
6.2.6 On-line: Data Warehousing Technology, a White Paper by Ken Orr
6.2.7 On-line: Linear Programming thwarts the Soviet Blockage of Berlin
(http://members.fortunecity.com/jonhays/linear.htm)
6.2.8 On-line: A primer on Linear Programming
6.2.9 On-line: "As We May Think", a pivotal article by Vannevar Bush. The basic ideas
which underly Hypertext and the World Wide Web as foretold in 1945.
(http://www.theatlantic.com/unbound/flashbks/computer/bushf.htm)
6.2.10 On-line: An Atlas of Cyberspaces - fine examples of data visualization.
(http://www.cybergeography.org/atlas/atlas.html)
6.2.11 On-line: Computer-Supported Cooperative Work
(http://pespmc1.vub.ac.be/CSCW.html)
6.2.12 On-line: Group Think, an article on groupware by Anne Field
(http://www.inc.com/incmagazine/article/0,,ART1995,00.html)
6.2.13 On-line: CSCW & Groupware index
(http://www.usabilityfirst.com/groupware/cscw.txl)
6.2.14 On-line: CIO Magazine(http://64.28.79.79/resources/)
6.2.15 On-line: Knowledge Roles: The CKO and Beyond
(http://www.cio.com/archive/040196_davenport_content.html)
6.2.16 On-line: The Value Chain (http://www.informationweek.com/700/00iuer4.htm)
6.2.17 On-line: Feds ponder CKO role
(http://www.fcw.com/fcw/articles/1999/FCW_062899_694.asp)
6.2.18 On-line: The CKO -- vision, strategy, ambassadorial skills, and a certain je ne sais
quoi ( http://www.ktic.com/topic6/13_CKO.HTM)
6.2.19 On-line: PC AI - Expert Systems
(http://www.pcai.com/web/ai_info/expert_systems.html)
6.2.20 On-line: Legal Liability for Expert System Software
(http://www.daiglehancock.com/Strict.liability.htm)
-312-
6.2.21 On-line: AI Timeline
(http://www2.kenyon.edu/depts/biology/slonc/bio3/AI/timeline/timeline.html)
6.2.22 On-line: JESS - a Java-based Expert System Shell
(http://herzberg.ca.sandia.gov/jess/)
6.2.23 On-line: WebGrid: Knowledge Modeling and Inference through the World Wide
Web (http://ksi.cpsc.ucalgary.ca/KAW/KAW96/gaines/KMD.html)
6.2.24 On-line: A list of Knowledge Representation resources
(http://www.cs.man.ac.uk/~franconi/kr.html)
6.2.25 On-line: A Manager's Guide to Neural Networks
(http://www.zsolutions.com/amanager.htm)
6.2.26 On-line: A short Introduction to Neural Networks
6.2.27 On-line: Travelling Salesman Problem Using Genetic Algorithms
(http://www.lalena.com/ai/tsp/)
6.2.28 On-line: Genetic Algorithm: Maze Solver - Java-based
(http://home.online.no/~bergar/mazega.htm)
6.2.29 On-line: "Intelligent Agents" Make a Comeback
(http://abcnews.go.com/sections/tech/CNET/cnet_intagents991028.html)
6.2.30 On-line: Agents at your service (http://www.infoworld.com/cgibin/displayStory.pl?/features/980216agents.htm)
6.2.31 On-line: Organizational Learning and Memory
(http://trochim.human.cornell.edu/gallery/cho/cho.htm)
6.2.32 On-line: Electronic Privacy Information Center (http://www.epic.org/)
6.2.33 On-line: What Company Spies Really Want
(http://www.wired.com/news/infostructure/0,1377,32672,00.html)
6.2.34 On-line: Why the future doesn't need us, by Bill Joy
(http://www.wired.com/wired/archive/8.04/joy_pr.html)
6.3
Other sources of information.
Additional handouts may be used when deemed necessary by the instructor.
6.4
Current bibliography of resource for student’s information.
None
1.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time
in hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Core
Advanced
12
3
9
9
-313-
Role of IS in Organizations
7.0
9
Oral and Written Communications:
Every student is required to submit at least 3 written reports (not including exams, tests, quizzes,
or commented programs) to typically 4-20 pages. Due to time-constraints students do not make
presentations in class. Students’ oral and other professional communication skills are an
important aspect of the group projects in which the students participate.
8.0
Social and Ethical Issues:
The course explores the impact of Decision Support Systems and Management Support Systems
on the decisions in the organization. Among other issues, this course explores the ethical issue
of the use of artificial intelligence and computer-based reasoning in decisions which affect
individuals.
9.0
Theoretical content:
Hours
9.1
9.2
9.3
10.0
Decision Theory
Quantitative Analysis, basic statistics, linear programming.
Principles of artificial intelligence
3
3
3
Problem analysis:
Please describe the analysis experiences common to all course sections.
Students will examine case problems for the application of decision support methods. Students
will investigate a specific decision problem in a real-world organization for the purpose of
designing a computer-based solution.
11.0
Solution design:
Student will gain practical experience with several software packages for decision support system
and expert system development. Students will develop a small decision support system for
application to a specific decision problem in a real-world organization.
CHANGE HISTORY
Date
10/10/02
6/25/03
9/13/2007
Change
Initial ABET version
ABET cleanup
Updated syllabus contents; changed
-314-
By whom
Van Vliet
Wolcott
Van Vliet
Comments
prerequisite from CIST 2110 to CIST
3100 as this course was renumbered.
10/12/2008 Instructor reorganized course content
for improved presentation to students;
this reorganization is reflected in
section 3.0
10/12/2008 Updated section 8.0 to reflect current
course more accurately
-315-
Van Vliet
Van Vliet
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 4730
Decision Support Systems
Paul J.A. van Vliet
3
10/12/08
S – Strong relationship
X – Contributing relationship
S
X
S
S
X
S
X
X
S
BIS Program Outcomes (2009)
-316-
S
X
X
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
Understand the nature of decision
making and of decision makers, as well as
the need for decision support.
Investigate the application Decision
Support Systems, Business Intelligence,
Group Decision Support Systems,
Executive Information Systems, Data
Warehouses, Expert Systems, and Neural
Networks to both common and unique
organizational decision problems.
Understand how organizational issues
impact the implementation and usage of
these systems
Apply course concepts in hands-on
assignments with a strong real-world
orientation.
1. Local and global role of iS
BIS Program Outcomes
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-317-
-318-
ISQA 4880 Systems Simulation and Modeling
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 4880
System Simulation and Modeling
Yong Shi and Lotfollah Najjar
3
10/09/07
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
Simulation modeling of manufacturing and service operations through the use of computer
software for operational analysis and decision making. This course is designed to provide the
future engineers with an understanding of the analytical models of simulation. The underlying
assumptions of these models are emphasized in order to critically ascertain their limitations and
applicability. How models behave in practice under variety of manufacturing and service
environments will also be examined.
1.2
For whom course is intended.
This course is intended for upper division undergraduate MIS majors who wish to understand the
analytical models of simulation. It is one of elective courses for undergraduates who wish to
pursue Knowledge Engineering and Decision Support Track
1.3
Prerequisites of the course (Courses)
1.3.1
1.3.2
1.3.3
1.4
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.5
CIST 1400
ISQA 3400
CIST 2500 or equivalent
Basic computer programming
Basic applied statistics for IS&T
Unusual circumstances of the course.
None
2.0
Objectives:
2.1
2.2
2.3
2.4
Recognize situations where simulation can be used as a an analysis tool
Answer questions by simulation analysis
Analyze, design and develop appropriate and effective simulation models
Design, develop and run efficient simulation experiments
-319-
2.5
2.6
2.7
3.0
Evaluate and draw conclusions from a simulation output
Formulate constructive opinions, and present the results in a practical manner
Present the results clearly.
Content and Organization:
Contact Hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
4.0
Introduction to Locations, Entities, Arrivals, Processing,
Output Editor, and Menus
What is Simulation?
Why Simulation?
How Does Simulation Work?
An Introduction to Promodel
The Simulation Project
Understanding Probability Distributions
Finding the Right Distribution
Extracting Values From Probability Distributions
Output Analysis
3
3
6
6
3
3
3
3
3
3
Teaching Methodology:
4.1
Methods to be used.
The teaching methods include lectures, discussions, and actual cases.
4.2
Student role in the course.
Students will attend the lectures, participate in in-class discussions, complete exams and projects.
4.3
Contact hours.
Three (3) hours per week.
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance, specifying
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify
the number of weeks spent on each project).
Students will complete two regular take-home exams, class projects and reports.
5.2
Basis for determining the final grade (Course requirements and grading standards) specifying
distinction between undergraduate and graduate, if applicable.
Component
Exams
Class Projects
Grading
25.0%
37.5%
-320-
Class Participation
Class Project Report
5.3
Grading scale and criteria
Points
98 – 100%
90 – 97%
87 – 89%
84 – 86%
80 – 83%
77 – 79%
74 – 76%
70 – 73%
67 – 69%
64 – 66%
60 – 63%
57 – 59%
<= 56%
6.0
12.5%
25.0%
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
6.1
Textbooks and/or other required readings used in course.
6.1.1
6.2
Other suggested reading materials, if any.
6.2.1
6.2.2
6.2.3
6.3
Similation Using Promodel, by Charles R. Harrell, Biman K. Ghosh and Royce O. Bowden,
Published 2004, McGraw-Hill Professional
Simulation Modeling & Analysis, by: Averill M. Law and W. David Kelton, McGraw Hill.
Applied Production & Operations Management, J. R. Evans, D. R. Anderson, D. J. Sweeney,
T. A. Williams, Sixth Edition, West Publishing Company.
An Introduction to Management Science, Quantitative Approaches to Decision Making, D.
R. Anderson, D. J. Sweeney, and T. A. Williams, Sixth Edition, West Publishing Company.
Other sources of information.
Handouts
6.4
Current bibliography of resource for student’s information.
None
7.0
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in
hours):
-321-
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
Advanced
36
Oral and Written Communications:
Every student is required to submit at least ___1_ written reports (not including exams, tests, quizzes, or
commented programs) to typically __10___ pages and to make __1___ oral presentations of typically
__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,
as well as for technical content, completeness, and accuracy.
9.0
Social and Ethical Issues:
No coverage
10.0
Theoretical content:
Please list the types of theoretical material covered, and estimate the time devoted to such coverage.
Hours
10.1
10.2
11.0
Simulation principles
Probability Distributions
15
3
Problem analysis:
Students learn and understand simulation modeling of manufacturing and service operations through the
use of computer software for operational analysis and decision making. Student also examine the
assumptions underlying these analytical models and how models behave in practice under a variety of
manufacturing and service environments.
12.0
Solution design:
Please describe the design experiences common to all course sections.
CHANGE HISTORY
Date
Spring 2002
6/25/03
10/9/07
Change
Initial ABET version
ABET cleanup
Update of resource material and course
coordinator
-322-
By whom
Ghahramani
Wolcott
Shi
Comments
-323-
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 4880
System Simulation and Modeling
Yong Shi and Lotfollah Najjar
3
5/26/09
S – Strong relationship
X – Contributing relationship
S
S
S
X
S
X
S
X
X
S
S
-324-
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
X
5. Computer-based tools
3. Analysis and design
S
4. Communication
2. Knowledge of computing
Course objective
Recognize situations where simulation
can be used as a an analysis tool
Answer questions by simulation analysis
Analyze, design and develop appropriate
and effective simulation models
Design, develop and run efficient
simulation experiments
Evaluate and draw conclusions from a
simulation output
Formulate constructive opinions, and
present the results in a practical manner
Present the results clearly.
1. Local and global role of iS
BIS Program Outcomes
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-325-
-326-
ISQA 4890 Data Warehousing and Data Mining
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA/CSCI 4890
Data Warehousing and Data Mining
Yong Shi
3
10/02/08
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
This course provides students theoretical issues as well as practical methods for designing
and constructing data warehouse and implementing data mining. After covering the
essential concepts, issues, techniques to build an effective data warehouse, this course
emphasizes the various techniques of data mining, such as association, classification,
clustering and prediction for on-line analyses within the framework of data warehouse
architectures. This course also promotes students to conduct a real-life data analyzing
project.
1.2
For whom course is intended.
This course is intended for undergraduate management information systems (MIS) and
computer science (CS) majors who choose Data Mining and Business Intelligence
concentration. It is also recommended to a senior undergraduate level in MIS or CS.
1.3
Prerequisites of the course (Courses)
1.3.1 ISQA 3310 or CSCI 4850
1.4
Prerequisites of the course (Topics).
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.5
The conceptual and practical foundation to database management systems
Relational Database Systems
The hierarchical models
The network models
Basic SQL
Unusual circumstances of the course.
None
-327-
2.0
Objectives:
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
2.10
3.0
Understand the fundamental principles of data warehousing and data mining
Describe the difference between transactional databases and data warehouses
Describe the relationship between OLAP and Data Warehousing
Use SQL to manage data in data warehousing and data mining
Build a data mart
Design and implement a data warehouse
Carry out data integration and transformation
Use and create simple data mining algorithms
Apply some commercial tools to conduct data mining
Interpret of data mining results
Content and Organization:
Hours
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
4.0
Introduction to Data Warehousing and Data Mining
Data Warehouse and OLAP
Data Preprocessing
Data Mining Basis
Data Characterization and Comparison
Mining Association Rules
Classification and Prediction
Cluster Analysis
Integrated Methods of Data Mining
Advances of Data Warehousing and Data Mining
3
3
3
3
4
4
6
4
3
3
Teaching Methodology:
4.1
Methods to be used.
The basic teaching method will be lectures, discussion, real-life cases, guest speakers. The
existing software from the literature or produced by the instructor and commercial products
will be used in the class.
4.2
Student role in the course
The students will attend lectures, participate in discussion in the class, complete
assignments and projects, and complete all exams. The projects can be either individual
or group work depending on the situation of each class.
4.3
Contact hours.
Three (3) hours per week.
-328-
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance,
specifying distinction between undergraduate and graduate, if applicable. For Laboratory
projects, specify the number of weeks spent on each project).
The student products will be the assignments, group discussion, projects, examinations,
and project presentations.
5.2
Basis for determining the final grade (Course requirements and grading standards)
specifying distinction between undergraduate and graduate, if applicable.
Components
Participation
Homework
Projects
Exams
5.3
Grading scale and criteria.
Points
98-100
95-97
90-94
88-89
85-87
80-84
78-79
75-77
70-74
68-69
65-67
60-64
<=59
6.0
Grading
5%
10%
35%
50%
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
6.1
Textbooks and/or other required readings used in course.
The following textbooks, as examples, can be the required readings in the course. The
instructor can also use the cited references in these books as supplementary materials for
the course. There is no specific text for the course.
-329-
6.1.1 David Olson and Yong Shi, Introduction to Business Data Mining, McGraw-Hill,
2007.
6.1.2 J. Han and M. Kamber, Data Mining: Concepts and Techniques, Morgan Kaufmann,
2001.
6.2
Other suggested reading materials, if any.
6.2.1 Agrawal, R., Imielinski, T. and Swami, A. (1993) ‘Data mining: A performance
perspective’, IEEE Transactions on Knowledge and Data Engineering, Vol. 5, 914925.
6.2.2 Bajgier, S. M. and Hill, A. V. (1982) ‘An experimental comparison of statistical and
linear programming approaches to the discriminant problems’, Decision Sciences,
Vol.13, 604-618.
6.2.3 Breiman, L., Friedman, J., Olshen, R. and Stone, C. (1984), Classification and
Regression Trees, Wadswroth, Belmont.
6.2.4 Carpenter, G.A., Grossberg, S., Reynolds, J.H., Markuzon, N., and Rosen, D.B.
(1992) ‘Fuzzy ARTMAP: A Neural Network Architecture for Incremental
Supervised Learning of Analog Multidimensional Maps’, IEEE Transactions on
Neural Networks, 3, 698-713.
6.2.5 Carpenter, G.A., Grossberg, S., and Rosen, D.B. (1991) ‘Fuzzy ART: Fast stable
learning and categorization of analog patterns by an adaptive resonance system’,
Neural Networks, 4, 759-771.
6.2.6 Chen, M., Han, J. and Yu, P. (1996) ‘Data mining: An overview from a database
perspective’, IEEE Transactions on Knowledge and Data Engineering, Vol. 8, 866883.
6.2.7 Freed, N. and Glover, F. (1981) ‘Simple but powerful goal programming models for
discriminant problems’, European Journal of Operational Research, Vol. 7, 44-60.
6.2.8 Freed, N. and Glover, F. (1986) ‘Evaluating alternative linear programming models
to solve the two-group discriminant problem’, Decision Science, Vol. 17, 151-162.
6.2.9 Glover, F. (1990) ‘Improve linear programming models for discriminant analysis’,
Decision Sciences, Vol. 21, 771-785.
6.2.10 Guo, H. and Gelfand, S.B. (1992) ‘Classification trees with neural network feature
extraction’, IEEE Transactions on Neural Netwroks, Vol. 3, 923-933.
6.2.11 Jang, J.-S. R., Sun, C.-T. and Mizutani, E. (1997), Neuro-Fuzzy and Soft Computing,
Prentice Hall, Upper Saddle River, New Jersey.
6.2.12 Joachimsthaler, E.A. and Stam, A. (1988) ‘Four approaches to the classification
problem in discriminant analysis: An experimental study’, Decision Sciences,
Vol.19, 322-333.
6.2.13 Koehler, G. J. and Erenguc, S. S. (1990) ‘Minimizing misclassifications in linear
discriminant analysis’, Decision Science, Vol. 21, 63-85.
6.2.14 Kosko, B. (1992), Neural Networks And Fuzzy Systems: A Dynamical Systems
Approach To Machine Intelligence, Prentice Hall, Englewood Cliffs, New Jersey.
-330-
6.2.15 Markowski, E. P. and Markowski, C. A. (1985) ‘Some difficulties and improvements
in applying linear programming formulations to the discriminant problem’,
Decision Science, Vol. 16, 237-247.
6.2.16 Pass, S. (1997) ‘Discovering in a value mountain of data’, ORMS Today, October,
24-28.
6.2.17 Quinlan, J. (1986) ‘Induction of decision trees’, Machine Learning, Vol. 1, 81-106.
6.2.18 Rymon, R. (1993), Search through systematic set enumeration, Proceedings of the
third international conference on principle of knowledge representation and
reasoning. Cambridge, MA, 539-550.
6.2.19 Shi, Y, Peng, Y., Xu, X and Tang, X. (2002) ‘Data mining via multiple criteria linear
programming: Applications in credit card portfolio management’, International
Journal of Information Technology and Decision Making, Vol. 1, 145-166.
6.2.20 Shi, Y., Wise, M., Luo, M. and Lin, Y. (2001) ‘Data mining in credit card portfolio
management: a multiple criteria decision making approach’, in M. Koksalan and S.
Zionts, eds., Multiple Criteria Decision Making in the New Millennium, Springer,
Berlin, 427-436.
6.2.21 Shi, Y. (1999) ‘Data Mining’, in IEBM Handbook of Information Technology in
Business, Edited by M. Zeleny, International Thomson Publishing Europe.
7.0
6.3
Other sources of information.
6.4
Current bibliography of resource for student’s information.
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time
in hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Analysis and Design
Data management
Role of IS in Organizations
8.0
Core
Advanced
3
36
3
Oral and Written Communications:
Every student is required to submit at least ___9__ written reports (not including exams, tests,
quizzes, or commented programs) to typically ___5__ pages and to make __1___ oral
presentations of typically __10___ minutes duration. Include only material that is graded for
grammar, spelling, style, and so forth, as well as for technical content, completeness, and
accuracy.
9.0
Social and Ethical Issues:
-331-
No coverage
10.0
Theoretical content:
Please list the types of theoretical material covered, and estimate the time devoted to such
coverage.
This course provides students theoretical issues for designing and constructing data warehouse
and implementing data mining.
Hours
10.1
11.0
The fundamental principles of Data Warehousing and Data Mining
5
Problem analysis:
Students learn theoretical and practical methods to design and construct data warehouse and
implementing data mining. After covering the essential concepts, issues, techniques to build an
effective data warehouse, this course emphasizes the various techniques of data mining, such as
association, classification, clustering and prediction for on-line analyses within the framework of
a data warehouse architectures. This course also promotes students to conduct a real-life data
analyzing project.
12.0
Solution design:
Please describe the design experiences common to all course sections.
CHANGE HISTORY
Date
10/7/03
6/25/03
10/09/07
10/2/08
Change
Initial ABET version
ABET cleanup
Update of resource material
Review completed
By whom
Shi
Wolcott
Shi
Shi
-332-
Comments
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 4890/ CSCI 4890
Data Warehousing and Data Mining
Yong Shi
3
5/26/09
S – Strong relationship
X – Contributing relationship
X
X
X
X
X
S
S
X
X
X
X
-333-
X
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
Understand the fundamental principles of
data warehousing and data mining
Describe the difference between
transactional databases and data
warehouses
Describe the relationship between OLAP
and Data Warehousing
Use SQL to manage data in data
warehousing and data mining
Build a data mart
Design and implement a data warehouse
Carry out data integration and
transformation
Use and create simple data mining
algorithms
Apply some commercial tools to conduct
data mining
Interpret of data mining results
1. Local and global role of iS
BIS Program Outcomes
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-334-
ISQA 4900 Internet Systems Development
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA-4900/CSCI-4900
Internet Systems Development
Matt Payne
3
10/13/08
Course Description:
1.1
Overview of content and purpose of the course (Catalog description).
This course focuses on contemporary techniques and technologies in the design,
development, and integration of web-enabled information systems. Topics include:
Multi-tiered systems architecture; rapid application development; object-oriented
analysis and design; prototyping; testing, verification, and validation; lifecycle models;
and component-based development. This is a rapidly moving, hands-on course that
mirrors real-world development.
1.2
For whom course is intended.
Students pursing either a BIS or BCS degree with the Internet Technologies (iT)
concentration who have achieved junior or senior standing.
1.3
Prerequisites of the course (Courses).
1.3.1 CSCI 2850
Programming on the Internet
1.3.2 CSCI 2830
Java I
1.3.3 Completion of two additional courses within the iT concentration
1.4
Prerequisites of the course (Topics).
1.4.1 The equivalent of one semester’s exposure to Java programming
1.4.2 Introductory experience creating simple web-based applications using server-side
technologies such as PHP, CGI, ASP, or Cold Fusion
1.4.3 General understanding of networking concepts such as OSI reference model and
TCP/IP.
1.5
Unusual circumstances of the course.
None
2.0
Objectives:
-335-
2.1
2.2
2.3
2.4
2.5
3.0
Manage change in the context of distributed systems development & maintenance;
Define appropriate architectures for distributed applications systems and the
infrastructure supporting them;
Apply appropriate methodologies for distributed systems development;
Conduct analysis, design, and implementation using an object-oriented paradigm; and
Create Internet-based, distributed systems.
Content and Organization:
Contact hours
3.1
Introduction
6
3.1.1 Introduction : Speed, change, and integration:
the impact of current trends on systems development.
3.1.2 Technical Architectures
3.1.3 Multi-tiered Architecture
3.1.4 Client-server systems
3.1.5 Internet-based architecture
3.1.6 Object-based architecture
3.2
Middleware
9
3.2.1 Distributed Services
3.2.2 Integration
3.2.3 Web services
3.3
Methodology
9
3.3.1 Extreme Programming
3.3.2 Other agile methodologies
3.4
Object-oriented technologies
3.4.1
3.4.2
3.4.3
3.4.4
3.5
6
Analysis
Design
Unified Modeling Language
Use cases
Modern Enabling Technologies
3.5.1
3.5.2
3.5.3
3.5.4
3.5.5
3.5.6
14
Java
J2EE
Web Services & Service Oriented Architectures
Wireless
Component Models & Components
Application Servers
-336-
4.0
Teaching Methodology:
4.1
Methods to be used.
The course will employ a variety of teaching methods including lectures and hands-on
guided projects. Assignments will include a combination of individual and group
components. The course may be team taught by two or more professors.
4.2
Student role in the course.
The student will attend lectures, participate in discussions, complete programming
assignments, evaluate a web programming framework (e.g. struts, spring, etc) and
complete both individual and group elements of a semester project.
4.3
4.3
Contact hours.
Three (3) hours per week.
5.0
Evaluation:
5.1
Type of student projects that will be the basis for evaluating student performance,
specifying distinction between undergraduate and graduate, if applicable. For Laboratory
projects, specify the number of weeks spent on each project).
Students will work on a capstone systems development project throughout the semester.
The project will be broken down into a number of modules that reflect the topics covered
in the course, but will also draw on material learned in the prerequisite courses.
5.2
Basis for determining the final grade (Course requirements and grading standards)
specifying distinction between undergraduate and graduate, if applicable.
Component
Exams
Homework
Final Exam
Project
5.3
Grading
20%
30%
20%
30%
Grading scale and criteria.
-337-
Points
97-100%
92-96%
89-91%
86-88%
82-85%
79-81%
76-78%
72-75%
69-71%
66-68%
62-65%
59-61%
<59%
6.0
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
6.1
Textbooks and/or other required readings used in course.
The critically acclaimed Head First Servlets and JSP published by
O’Reilly is used as a text. This book is anchored in the Sun Certified Web Component
Developer exam which emphasizes core concepts of Internet systems development and
Servlet/JSP containers.
Additionally, students will be assigned readings drawn from the current bibliography or
similar sources.
6.2
Other suggested reading materials, if any.
None
6.3
Other sources of information.
Students will read industry white papers, tutorials, and on-line discussion forums on
subjects related to this course.
6.4
Current bibliography of resource for student’s information.
6.4.1 Alur, D., Crupi, J & Malks, D (2001) “Core J2EE Patterns: Best Practices and Design
Strategies”, Prentice Hall, Upper Saddle River, NJ.
6.4.2 Arlow, J., Neustadt, I. (2001). UML and the unified process: Practical objectoriented analysis and Design. Addison Wesley.
6.4.3 Bouchard, G.; Cutkosky, M.; Johnson, R.: Kuokka, D.; Lewis, L. Regli, B. (1997)
“Roundtable: Engineering Meets the Internet: How Will the New Technology
-338-
7.0
Affect Engineering Practice?” Internet Computing, IEEE, Piscataway: NJ. Vol. 1, No.
1; January-February, pp. 30-38.
6.4.4 Britton, C. (2001) “IT Architectures and Middleware: Strategies for Building Large,
Integrated Systems,” Addison-Wesley, Upper Saddle River: NJ
6.4.5 Christensen, M.J. and Thayer, R.H. (2002) The Project Manager's Guide to
Software Engineering's Best Practices, IEEE, Piscataway: NJ.
6.4.6 Cusumano, M. and Yoffie. D. (1998) Competing on Internet Time: Lessons from
Netscape and Its Battle with Microsoft. Free Press/Simon & Schuster, New York.
6.4.7 Cusumano, M. and Yoffie. D. (1999) “Software Development on Internet Time,”
Internet Computing, IEEE, Piscataway: NJ. Vol. 32, No. 10; OCTOBER 1999, pp. 6069
6.4.8 Goldmann S. & Kötting, B. (July-August 1999) “Collaborative Work Software
Engineering over the Internet” Internet Computing, IEEE, Piscataway: NJ. Vol. 3,
No. 4; pp. 93-94.
6.4.9 Guide to the Software Engineering Body of Knowledge SWEBOK (December 2001),
Executive Editors: Alain Abran and James W. Moore, Editors: Pierre Bourque and
Robert Dupuis. IEEE, Piscataway: NJ.
6.4.10 Harmon, P, Rosen M, & Guttman, M. (2001) “Developing E-Business Systems and
Architectures,” Morgan Kaufmann, San Francisco: CA.
6.4.11 Ince, D. (2002), “Developing Distributed and E-Commerce Applications,” AddisonWesley, Upper Saddle River: NJ.
6.4.12 “Internet Watch: The Network Maturity Model for Internet Development
Network Maturity Model Development Team,” (October 1999) Ed. Ron Vetter,
Computer , IEEE, Piscataway: NJ Vol. 32, No. 10; pp. 117-118.
6.4.13 Knoernschild, K. (2002). Java Design: Objects, UML, & Process. Addison Wesley.
6.4.14 Linthicum, D. (2000), “Enterprise Application Integration,” Addison Wesley, Upper
Saddle River: NJ.
6.4.15 Matena, V & Stearns, B (2001) “Applying Enterprise JavaBeans(TM): ComponentBased Development for the J2EE(TM) Platform,” Sun Microsystems.
6.4.16 Szyperski, C (1999) “Component Software: Beyond Object-Oriented
Programming,” Addison-Wesley, Harlow: England.
6.4.17 Wampler, B.E. (2002). The essence of object-oriented programming with Java and
UML. Addison-Wesley.
6.4.18 Läufer, Konstantin“A Hike through Post-EJB J2EE Web Application Architecture”
Computing in Science & Engineering Sept/Oct 2005. On 10/13/08 online at
http://tinyurl.com/5xyo6y (which redirects to computer.org)
(IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time
in hours):
CAC Category
Hardware and software
Networking and telecommunications
Modern programming language
Core
Advanced
14
6
-339-
Analysis and Design
Data management
Role of IS in Organizations
8.0
6
Oral and Written Communications:
Every student is required to submit at least __1___ written reports (not including exams, tests,
quizzes, or commented programs) to typically _____ pages and to make __1___ oral
presentations of typically __15___ minutes duration. Include only material that is graded for
grammar, spelling, style, and so forth, as well as for technical content, completeness, and
accuracy.
9.0
Social and Ethical Issues:
No coverage.
10.0
Theoretical content:
Concepts of applications and infrastructure architecture, including physical and logical
architecture, and component-based construction of software systems (6 hours)
11.0
Problem analysis:
Students will learn to conduct analysis using an object-oriented paradigm.
12.0
Solution design:
Students will learn contemporary techniques and technologies in the design, development, and
integration of web-enabled information systems. Specifically, students will learn to define
appropriate architectures for distributed applications systems and the infrastructure supporting
them, conduct design, and implementation using an object-oriented paradigm; and they will
create Internet-based, distributed systems.
CHANGE HISTORY
Date
Change
4/30/2003 In the methodologies unit, replace
JAD, RAD, prototyping, and system
life-cycle with agile methodologies,
particularly extreme programming.
6/25/03
ABET clean-up
10/13/08 Added homework, presentation, and
textbook. Replaced ORBs with SOA.
By whom
Wolcott
Wolcott
Matt
Payne
-340-
Comments
JAD, RAD, prototyping, and
system life-cycle are covered
adequately in ISQA 4110 and
ISQA 4120.
Currently, web services and
SOA are more common than
ORBs in the field.
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA-4900/CSCI-4900
Internet Systems Development
Matt Payne
3
5/26/09
S – Strong relationship
X – Contributing relationship
S
X
S
X
S
S
S
S
-341-
13. Recognize need for prof. develop.
12. Manage change
11. Manage IS within application env.
10. Manage projects
9. Design, implement, evaluation IS
8. Model processes and data
7. Professional, legal, ethical standards
6. Work on a team
5. Computer-based tools
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
Manage change in the context of
distributed systems development &
maintenance;
Define appropriate architectures for
distributed applications systems and the
infrastructure supporting them;
Apply appropriate methodologies for
distributed systems development;
Conduct analysis, design, and
implementation using an object-oriented
paradigm; and
Create Internet-based, distributed
systems.
1. Local and global role of iS
BIS Program Outcomes
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-342-
ISQA 4910 Introduction to Project Management
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
1.0
ISQA 4910
Introduction to Project Management
Donna Dufner
3
10/13/08
Course Description
1.1
Overview of content and purpose of the course
This course will cover the basics of project planning, scheduling and control. Earned value
management techniques and project quality will be covered. Risk management will also be
covered. The student will be introduced to the IEEE Standards for Project Management. The
purpose of the course is to provide students with an introduction to the tools and techniques
used to manage projects to achieve successful completion. The project management methods
taught are suitable for a wide variety of project types such as software development or
engineering projects (e.g. construction).
1.2
For whom course is intended
The course is intended for undergraduate students in the schools of IS&T, Business Administration
and Engineering who need to learn the fundamentals of project management.
1.3
Prerequisites of the course
1.3.1
1.3.2
1.3.3
1.4
CIST 2500 Introduction to Applied Statistics for IS&T
CIST 2110 Organizations, Applications, and Technology
Or equivalent
Unusual circumstances of the course
None
2.0
Objectives
2.1
2.2
2.3
2.4
2.5
Understand the fundamentals of project planning, project scheduling, and project control,
Understand earned value project management,
Understand quality issues for project management,
Understand the fundamentals of the management of risk
Apply the fundamentals earned value project management tools and techniques,
-343-
2.6
2.7
2.8
2.9
2.10
3.0
Create Work break down structures,
Manage projects using the Critical Path Methodology,
Manage projects using the Cost performance index (CPI) as a performance and forecasting metric,
Manage projects using the Schedule performance index (SPI) as a performance and forecasting
metric, and
Calculate and evaluate the actual performance against baseline metrics for project management
and control.
Content and Organization
List of topics to be covered in chronological sequence
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
4.0
Fundamentals of project planning, scheduling and control
3.1.1 Introduction to Project Management
3.1.2 The role of the project manager
3.1.3 Project Definition
3.1.4 Project Planning
3.1.5 Developing the Implementation Plan
3.1.6 Managing Project Risk
3.1.7 Project Scheduling
3.1.8 Project Control
3.1.9 Managing people and teams
Introduction and overview of earned value project management
The genesis and evolution of earned value and the earned value
body of knowledge
Project management as performed in a major Omaha corporation
(guest Speaker)
Establishing the earned value baseline
Earned value baseline preparation and evaluation
Performance Monitoring using the project baseline
Forecasting final cost and schedule results
Customer requirements and planning for quality
Achieving project quality.
Contact Hours
2
2
1.5
3
2
3
5
3
3
3
3
2
2
2
2
2
1
1
Teaching Methodology
4.1
Methods to be used
The primary teaching method will be discussion, case studies, lecture, guest speakers, and
demonstration.
4.2
Student role in the course
The student will attend lectures and demonstrations, participate in discussion on assigned
readings, complete assigned projects and papers, and complete required examinations
4.3
Contact hours
Three (3) hours per week.
-344-
5.0
Evaluation
5.1
Types of student products
The student products will be: two examinations (a midterm and final), a ten-page research paper,
and an oral presentation.
5.2
Basis for determining the final grade
Grades will be determined on the basis of the student’s participation in class (10%) development
of a ten page research paper based on readings from the trade and the empirical, peer reviewed
literature (30%), and achievement on examinations (60 % of final grade). The specific weights
shall be specified in the outline for the particular class.
Component
Examinations
Research Report
Participation
Presentation
5.3
Grading Scale and Criteria
Points
97-100%
93-96%
90-92%
87-89%
83-86%
80-82%
77-79%
73-76%
70-72%
67-69%
63-66%
60-62%
<60%
6.0
Grading
50%
30%
10%
10%
Grade
A+
A
AB+
B
BC+
C
CD+
D
DF
Resource Material
6.1
The latest editions of textbook(s) or other required readings used in the course, or equivalent
examples such as the following:
6.1.1
6.1.2
Fleming, Q. and Hoppelman, J. Earned Value Project Management. Newton Square, PA:
Project Management Institute, 2000.
Ireland, L. Quality Management for Projects and Programs. Newton Square, PA: Project
Management Institute, 1991.
-345-
6.1.3
6.2
Guide to the Project Management Body of Knowledge (PMBOK Guide) by the Project
Management Institute Standards Committee, Newton Square, PA. 2004.
Other suggested reading materials or equivalent
Additional articles that have been collected for various topics are available at the UNO Library.
These articles are used to supplement topics presented in various chapters.
6.3
Other sources for gathering information or equivalent
Students are encouraged to collect articles in current professional and trade journals that are
relevant to topics in systems analysis and design. The process is particularly important in keeping
current with technology and new methodologies.
6.4
Current bibliography or equivalent.
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
6.4.6
6.4.7
6.4.8
6.4.9
6.4.10
6.4.11
6.4.12
6.4.13
6.4.14
6.4.15
6.4.16
Adams, John, R., Principles of Project Management. Newtown Square, PA: Project
Management Institute, 1997.
Bicknill, D. The Politics of Failure. Computer Weekly. (July 6, 1995): 28-30.
Garner, R. “Captain of Crunch.” Computerworld. 31, 40 (Oct. 6, 1997): 81-83.
Gautschi, T. Three keys to successful design products. Design News. Aug. 11, 1997 v52
n15 p188 (1).
Hebert B., “Tracking progress: More companies are recognizing the value of project
management as part of their overall strategy – particularly in times of changes”, CMA
management, Feb. 2002, v75, i10, p. 24-27.
Hillier F., Hillier M., Lieberman G., Introduction to management science, Chapter 7,
McGraw Hill, Primis Online, 2000.
Meyer A., Loch C., Pich M., “Managing project uncertainty: from variation to chaos;
project managers can’t predict the future, but accurately gauging the degree of
uncertainty inherent in their projects can help them quickly adapt to it”, MIT Sloan
Management Review, Winter 2002, v43, i2, p. 60-67.
Mourier P., Smith M., “Restarting a stalled project”, Security Management, Oct. 2001,
v45, i10, p. 32-35.
O’Connell, E., & Saiedian, H. “Can You Trust Software Capability Evaluations.”
Perspectives. Feb. 2000.
Organizing projects for success. Project Management Institute, Inc., Newton Square, PA.
2000.
Pinto, J. and Kharbanda, O. “How to fail in project management.” Business Horizons. 39,
4 (July-Aug. 1996): 45-54.
PMI Standards Committee, Guide to the PMBOK. Newtown Square, PA: Project
Management Institute, 2004.
Robert, R.W. “Creating an Environment for Project Success.” Project Management. 1997.
Verma, V., Organizing Projects for Success. Newtown Square, PA: Project Management
Institute, 1995.
Verma, V. Human Resource Skills for the Project Manager. Newtown Square, PA: Project
Management Institute, 1996.
Wideman, R. (ed.) Project & Program Risk Management. Newtown Square, PA: Project
Management Institute, 1992.
-346-
7.0
(IS Program) Estimate Computing Accreditation (CAC) Category
CAC Category
Hardware and software
Core
Advanced
Networking and telecommunications
Modern programming language
Analysis and Design
Data Management
Role of IS in Organizations
8.0
15
3
Oral and Written Communication
Every student is required to submit at least __1___ written reports (not including exams, tests, quizzes, or
commented programs) to typically __10+___ pages and to make __1___ oral presentations of typically
___20__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,
as well as for technical content, completeness, and accuracy.
9.0
Social and Ethical Issues
9.1
9.2
9.3
10.0
Emphasis on open and honest communication with all project stakeholders.
Emphasis on the customer’s needs both explicit and requirements and implicit.
Emphasis on accurate and consistent project tracking and reporting to management.
Theoretical Content
Hours
10.1
11.0
2
Problem Analysis
11.1
11.2
12.0
Earned Value Analysis
Critical Path
Earned Value Analysis
Solution Design
12.1
12.2
12.3
12.4
Project Plan
Risk Assessment and control
Project schedule control through earned value analysis
Lifecycle development
CHANGE HISTORY
Date
5/1/2003
6/10/2003
Change
Textbook added
Added CIST 2500 and CIST 2110 as
prerequisites
By whom
Dufner
Wolcott
-347-
Comments
These two courses were listed as
prerequisites in the catalog, but not
on the formal syllabus.
7/10/03
10/16/08
Change course description – Course Change
form 10-15-02
Changed description, objectives. Updated
reference list
Wild
Dufner
-348-
Mapping of IS Program Outcomes vs. course objectives
Department and Course Number
Course Title
Course Coordinator
Total Credits
Date of Last Revision
ISQA 4910
Introduction to Project Management
Donna Dufner
3
5/26/09
S – Strong relationship
X – Contributing relationship
S
S
S
S
S
X
S
S
X
X
S
S
X
S
X
X
S
X
S
S
-349-
S
S
13. Recognize need for prof. develop.
X
12. Manage change
11. Manage IS within application env.
S
X
9. Design, implement, evaluation IS
S
8. Model processes and data
10. Manage projects
7. Professional, legal, ethical standards
S
6. Work on a team
S
X
5. Computer-based tools
S
4. Communication
3. Analysis and design
2. Knowledge of computing
Course objective
Understand the fundamentals of project
planning, project scheduling, and project
control
Understand earned value project
management
Understand quality issues for project
management
Understand the fundamentals of the
management of risk
Apply the fundamentals earned value
project management tools and
techniques
Create Work break down structures
Manage projects using the Critical Path
Methodology
Manage projects using the Cost
1. Local and global role of iS
BIS Program Outcomes
performance index (CPI) as a
performance and forecasting metric
Manage projects using the Schedule
performance index (SPI) as a
performance and forecasting metric
Calculate and evaluate the actual
performance against baseline metrics for
project management and control
-350-
S
S
X
S
S
S
X
S
BIS Program Outcomes (2009)
1. understand the local and global role of information systems in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
2. have an ability to apply knowledge of computing and mathematics appropriate to the discipline.
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational
problems or opportunities, formulate appropriate strategies and solutions using information
technologies, and evaluate the effectiveness of proposed solutions
4. communicate effectively to a range of audiences through listening and through oral, written, and visual
presentation.
5. understand and apply appropriate types of computer-based tools to support communication.
6. work effectively in a team environment and collaborate with others to accomplish a common goal.
7. understand and apply professional, legal, and ethical standards of conduct.
8. understand and model organizational processes and data.
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to
meet desired needs.
10. manage projects.
11. manage information systems within a specific application environment.
12. manage change.
13. recognize the need for continuing professional development
-351-
-352-
APPENDIX 3 – FACULTY VITAE
On separate pages, please furnish the following information for all faculty members who teach courses allowed
for the major, including those who have administrative positions in the department (chair, associate chair, etc.).
Use the form given below as guidance. This form need not be followed exactly, but all requested information
should be supplied. Use a common format for all faculty members. Limit information to no more than three
pages per person, providing only the most recent information if needed to limit space. Place the form(s) for
administrators first, followed by the others in alphabetical order.
If you are having more than one program evaluated, particularly if the programs are on separate campuses,
indicate clearly the program(s) and/or campus(es) to which an individual is assigned, and the percentage of time
to each, if more than one.
-353-
-354-
Hesham Ali, Dean
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Hesham H. Ali
Professor
Tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Associate Dean for
Academic Affairs,
College of Information
Science and Technology
Professor, Department
of Computer Science
Associate Professor,
Department of
Computer Science
Assistant Professor,
Department of
Computer Science
Dates Held
January 2000 – July 2006
August 2000 – Present.
August 1994 – August 2000.
August 1988 – August 1994
3. Degrees with fields, institutions, and dates
Degree
Ph. D
M. Sc
B. Sc
Field
Computer Science
Computer Science
Computer Science
Institution
University of Nebraska-Lincoln
Alexandria University, Egypt
Alexandria University, Egypt
Date
1988
1985
1982
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
-355-
Dates
June 2000 –
Present
October 2001 –
Present
2002 – Present
August 1996 August 1997
Where
Department of Pathology and
Microbiology, University of
Nebraska Medical Center
Nebraska Informatics Center
for Life Sciences (NICLS)
Nebraska Center for Biosecurity (NCB), University of
Nebraska
Department of Computer
Science, SQU, Muscat, Oman
Duties
Associate Professor (courtesy)
Deputy Director for Computational sciences
Member
Visiting Associate Professor (Acting Department
Head January 1997 – August 1997).
7. Consulting—list agencies and dates, and briefly describe each project:
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Lee D. and Willa Seemann Distinguished Dean, College of Information Science and Technology,
University of Nebraska at Omaha
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
-356-
P. Ciborowski and H. Ali, Bioinformatics In: Proteomics for Undergraduates. Book Chapter in A. Kraj and
J. Silberring (eds.), Wiley Inc., 2008.
H. Ali and N. Sherwani, Introduction to Graph Algorithms, to be published by Wiley & Sons, 2008.
X. Deng , H. Geng and H. Ali, “A Hidden Markov Model Approach to Predicting Yeast Gene Function from
Sequential Gene Expression Data,” The International Journal of Bioinformatics Research and
Applications, 2008.
X. Deng , H. Geng and H. Ali, “Cross-platform Analysis of Cancer Biomarkers: A Bayesian Network
Approach to Incorporating Mass Spectrometry and Microarray Data,” Journal of Cancer Informatics,
2007.
A. Sadanandam, M. Varney, L. Kinarsky, H. Ali, R. Lee Mosley, R. Singh, “Identification of Functional Cell
Adhesion Molecules with a Potential Role in Metastasis by a Combination of in vivo Phage Display and in
silico Analysis,” OMICS: A Journal of Integrative Biology, Mar 2007, Vol. 11, No. 1: 41-57.
X. Huang and H. Ali, “High Sensitivity RNA Pseudoknot Prediction,” Nucleic Acid Research, 2007.
H. Geng, X. Deng and H. Ali, “MPC: a Knowledge-based Framework for Clustering under Biological
Constraints,” Int. J. Data Mining and Bioinformatics, Volume 2, Number 2, 2007.
A. Abdelaal, H. Ali and H. Sharif, A Coarse-Grain Analysis for the Performance of Measurement-based
Admission Control Algorithms. Journal of Computational Methods in Science and Engineerning, Volume
6, Number 5-6, pp. S349-S358, 2006.
X. Deng, H. Geng, D. Bastola and H. Ali, “Link Test — A Statistical Method for Finding Prostate Cancer
Biomarkers," Journal of Computational Biology and Chemistry, 2006.
A. Churbanov, I. Rogozine, J. Deogun, and H. Ali, “Method of Predicting Splice Sites Based on Signal
Interactions,” Biology Direct, 2006.
X. Deng, H. Geng, and H. Ali, “Joint Learning of Gene Functions--A Bayesian Network Model Approach".
Journal of Bioinformatics and Computational Biology, Vol. 4, No. 2, pp. 217-239, 2006.
X. Deng and H. Ali, EXAMINE, “A Computational Approach to Reconstructing Gene Regulatory
Networks,” Journal of BioSystems, 81:125-136, 2005.
A. Churbanov, M. Pauley, D. Quest and H. Ali, “A method of precise mRNA/DNA homology-based gene
structure prediction,” BMC Bioinformatics, 6:261, 2005.
A. Mohamed, D. Kuyper, P. Iwen, H. Ali, D. Bastola and S. Hinrichs, “Computational approach for the
identification of Mycobacterium species using the internal transcribed spacer-1 region,” Journal of
Clinical Microbiology, Vol. 43, No. 8: 3811-3817, 2005.
-357-
A. Churbanov, I. Rogozin, V. Babenko, H. Ali and E. Koonin, Evolutionary conservation suggests a
regulatory function of AUG triplets in 5'UTRs of eukaryotic genes, Nucleic Acid Research, 33(17), pp.
5512-20, Sep 2005.
D. Plum and H. Ali, An Evolutionary Approach to Vehicle Routing Problem with dynamic time and
Precedence Relationships. Journal of Computational Methods in Science and Engineerning, Volume 5,
Number1, pp. S57-S66, 2005.
N. Sharma, J. Youn, N. Shrestha and H. Ali, “Direction Finding Signage System using RFID for Healthcare
Applications,” Proceedings of The International Conference on BioMedical Engineering and Informatics
(BMEI2008), Sanya, Hainan, China, May 27-30, 2008.
J. Uher, D. Sadofsky, J. Youn, H. Ali, H. Sharif, J. Deogun, and S. Hinrichs, “I2MeDS: Intelligent Integrated
Medical Data System,” Proceedings of The International Conference on BioMedical Engineering and
Informatics (BMEI2008), Sanya, Hainan, China, May 27-30, 2008.
H. Geng, H. Ali and J. Chan, “A Hidden Markov Model Approach for Prediction of Genomic Alterations from
Gene Expression Profiling,” Proceedings of the fourth International Symposium on Bioinformatics Research
and Applications (ISBRA), Atlanta, Georgia, May 6-9, 2008.
D. Qwest, K. Dempsey, D. Bastola and H. Ali, “A Parallel Architecture for Regulatory Motif Algorithm
Assessment,” Proceedings of the Seventh IEEE International Workshop on High Performance Computational
Biology (HiCOMP 2008), in conjunction with IPDPS 2008. Miami, Florida, April 24-30, 2008.
S. Pawaskar and H. Ali, “Dynamic Energy Aware Task Scheduling for Periodic Tasks using Expected
Execution Time Feedback,” Proceedings of the International Conference on Parallel Computing and
Networks (PDCN 2008), Innsbruck, Austria, Feb 12-14, 2008.
Y. Mohsenin and H. Ali, “A New Genetic Algorithm for Resource Constrained Project Scheduling,”
Proceedings of the International Conference on Artificial Intelligence and Applications (AIA 2008),
Innsbruck, Austria, Feb 11-13, 2008.
D. Bastola, S. Chandio, P. Iwen, S. Hinrichs and H. Ali, “RFLP-WAVE Analysis for Rapid Identification of
Medically Important Fungi,” Proceedings of the 2008 Hawaii International Conference on System Sciences
(HICSS-41), Kona, January 7-10, 2008.
S. Kanapuram and H. Ali, “On the Impact of configuration of Access Points on the Performance of Wireless
Networks,” Proceedings of the International Conference on Parallel and Distributed Computing and Systems
(PDCS 2007), Cambridge, November 19-21, 2007.
X. Huang and H. Ali, “Reducing Folding Scenario Candidates in Pseudoknots Detection Using Highly
Sensitive PLMM_DPSS Algorithm Integrated With Energy Filters,” Proceedings of the 7th IEEE
International Conf on Bio-Informatics and Bio-Engineering (BIBE 2007), pp. 1299 -1303, Boston, October
14-17, 2007.
J. Youn, H. Ali, H. Sharif, J. Deogun, J. Uher and S. Hinrichs, “WLAN-based Real-time Tracking System in
Healthcare,” Proceedings of IEEE Wireless and Mobile Computing, Networking and Communications
(WiMob 2007), White Plain, New York, October 8-10, 2007.
S. Mudundi and H. Ali, “A Robust Scalable Cluster-Based Multihop Routing Protocol for Wireless Sensor
Networks,” Proceedings of the Fifth International Symposium on Parallel and Distributed Processing and
Applications (ISPA07), Niagara Falls, Canada, August 29-31, 2007.
D. Quest, W. Tapprich and H. Ali, “A Grammar Based Methodology for Structural Motif Finding in ncRNA
Database Search, Proceedings of the 2007,” IEEE Computer Society Bioinformatics Conference (CSB 2007),
-358-
University of California, San Diego, USA, August 13-17, 2007.
A. Abdelaal and H. Ali, “A Typology for Community Wireless Networks Business Models,” Proceedings of
2007 Americas Conference on Information Systems (AMCIS-13 2007), Keystone, Colorado, August 9-12,
2007.
S. Mudundi and H. Ali, “A New Robust Genetic Algorithm for Dynamic Cluster Formation in Wireless
Sensor Networks,” Proceedings of the International Conference on Wireless and Optical Communication
(WOC 2007), Montréal, Canada, May 30- June 01, 2007.
S. Pawaskar and H. Ali, “Dynamic Energy Aware Task Scheduling using Run-Queue Peek,” Proceedings of
the International Conference on Parallel Computing and Networks (PDCN 2007), Innsbruck, Austria, Feb 1315, 2007.
H. Geng, J. Iqbal, X. Deng, W. Chan and H. Ali, “Virtual CGH: Prediction of Novel Regions of
Chromosomal Alterations in Natural Killer Cell Lymphoma from Gene Expression Profiling,” Proceedings of
the 2007 Hawaii International Conference on System Sciences (HICSS-40), Kona, January 3-6, 2007.
S. Kanapuram, H. Ali and G. de Vreede, “On Effective Utilization of Wireless Networks in Collaborative
Applications,” Proceedings of the Second International Conference on Collaborative Computing
(CollaborateCom 2006), Atlanta, Georgia, November 17-20, 2006.
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
“CCLI: Integrating Bioinformatics into the Life Sciences,” Co-PI, National Science Foundation (NSF), total
Award at UNO: $149,807, January 15, 2008 – December 31, 2009.
“Design and Development of Secure and Robust Network Infrastructure for Critical Medical
Applications,” PI, Nebraska Research Initiative (NRI), total Award at UNO: $367,671, July 1, 2006 – June
30, 2008.
“Center for Mobile Computing,” PI, NSF EPSCoR, total Award at UNO: $500,000, February 1, 2004 –
January 31, 2007.
“Nebraska High Performance Wireless Research and Education Network,” PI, Nebraska Research
Initiative (NRI), total Award at UNO: $681,232, July 1, 2004 – June 30, 2006.
“IDeA Networks for Biomedical Research Excellence,” Co-I: (PI of UNO component), NIH INBRE, total
Award at UNO: $1,382,586, June 1, 2004 – May 31, 2009.
“Center for Mobile Computing,” PI, Supplement Grant, NSF EPSCoR, total Award at UNO: $35,000,
February 1, 2005 – January 31, 2006.
“The Development of Med-IT Cancer Data Management System,” MaCallie & Associates, PI, $44,000,
March 1, 2005 – May 5, 2006.
“Study of Innovative Approaches for Efficient Satellite Communications,” Co-PI, A Joint IST and CET (PKI)
-359-
Project, L-3 Compcept, $300,000, March 25, 2005 – March 25, 2006.
“Nebraska Research Network in Functional Genomics,” Co-I (PI of UNO Component), Supplement Grant,
NIH, total Award at UNO: $195,190, June 1, 2005 – April 30, 2006.
“High-Technology Workforce Support for Baccalaureate Degree Seeking Students,” Co-PI, NSF STEP,
total Award at UNO: $1,999,416, June 1, 2004 – May 31, 2009.
“Construction of a Targeted Rhesus Macaque Microarray,” Co-PI (PI of UNO Component), NIH, total
Award at UNO: $239,282, June 18, 2003 – April 30, 2006.
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Course
number
Course title
Semester
hrs
Class
size
CSCI
4150/8156
Graph Theory and Applications
3
17
MATH
4150/8156
Graph Theory and Applications
3
4
Fall 2008
BIO
4860/8866
Bioinformatics Algorithms
3
11
Summer 2008
CSCI 8325
Data Structures
3
1
Spring 2008
CSCI
4150/8156
Graph Theory and Applications
3
23
MATH
4150/8156
Graph Theory and Applications
3
13
Spring 2009
13. Estimate the percentage of your time devoted to scholarly and/or research activities: _____%. Please give a
brief description of your major research and scholarly activities:
-360-
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-361-
-362-
Deepak Khazanchi, Associate Dean
Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Deepak Khazanchi
Professor
Tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Associate Professor of Information Systems and Quantitative Analysis
Full Professor of Information Systems and Quantitative Analysis
Associate Professor of Information Systems and Quantitative Analysis
Interim Department Chair, Information Systems and Quantitative Analysis
Peter Kiewit Distinguished Professor (Discontinued due to the move to an
administrative position)
Department Chair, Information Systems and Quantitative Analysis
Dates Held
7/2000 - 7/2001
8/2001 - till date
7/2000 – 7/ 2001
6/2001 - 4/2002
8/2005 - 11/ 2006
4/2002 -11/2006
3. Degrees with fields, institutions, and dates
Degree
Field
Ph.D.
Management Information Systems
M.B.A
B. Tech
Civil Engineering
(Honors)
Institution
Texas Tech University, Lubbock
Southern Illinois University- Carbondale, Carbondale
Indian Institute of Technology, Kharagpur, India
Date
1991
1988
1981
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
N/A
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
Abdelaal, A., Ali, H. and Khazanchi, D. (2009, Jan 5-8). “The Role of Social Capital in the Creation of
Community Wireless Networks.” Proceedings of the forty-second Annual Hawaii International
Conference on Systems Sciences (HICSS-42). [PDF]
Davis, A. and Khazanchi, D. (2008, June 9-11). An exploratory investigation of the development of
mutual knowledge in global virtual project teams. Proceedings of the 16th European Conference on
Information Systems (ECIS-16), Galway, Ireland.
Khazanchi, D., Murphy, John and Petter, S. (2008, May 23-24). "Guidelines for Evaluating Patterns in
-363-
the IS Domain", Proceedings of the 2nd Midwest United States Association for Information Systems
Conference (MWAIS08), Eau Claire, Wisconsin.
Petter, S., Khazanchi, D. and Murphy, J. (2008, May 7-9). "A Design Science Based Evaluation
Framework for Patterns", In: V. Vaishnavi & R. Baskerville (Eds). Proceedings of the Third
International Conference on Design Science Research in Information Systems and Technology
(DESRIT 2008), May 7- 9, 2008, Atlanta, Georgia: Georgia State University.
Davis, A. and Khazanchi, D. (2007, August 9-12). The influence of online word of mouth on product
sales in retail e-commerce: An empirical investigation . Proceedings of the 13th Annual Americas
Conference on Information Systems (AMCIS-13), Keystone, Colorado.
Murphy, J. D. and Khazanchi, D. (2007, May 18-19th). "The Effects of Pairing Participants in
Facilitated Group Support Systems Sessions." Proceedings of the 2nd Midwest United States
Association for Information Systems Conference (MWAIS07), Springfield, Illinois. Awarded 2nd Best
Paper.
Davis, A. and Khazanchi, D. (2007, May 18-19th). "The Influence of Transactive Memory on Mutual
Knowledge in Virtual Teams: A Theoretical Proposal." Proceedings of the 2nd Midwest United States
Association for Information Systems Conference (MWAIS07), Springfield, Illinois.
Zigurs, I. and Khazanchi, D. (2007, May 18-19, 2007). Panel on “Transforming education in
information systems and technology,” the 2nd Midwest United States Association for Information
Systems Conference (MWAIS 2007), Springfield, Illinois. Also participated as a panelist.
Peng, Y., Kou, G., Sabatka, A., Matza, J., Chen, Z., Khazanchi, D. and Shi, Y. (2007, May 27-30).
"Application of Classification Methods to Individual Disability Income Insurance Fraud Detection".
International Conference on Computational Science (ICCS 2007), Beijing, China.
Yan, Nian and Khazanchi, D. (2007, May 27-30). "Concept Level Web Search via Semantic
Clustering". International Conference on Computational Science (ICCS 2007), Beijing, China.
Khazanchi, D. and Zigurs, I. (2007, January 3-7). "An Assessment Framework for Developing and
Using Patterns for the Effective Management of Virtual Projects." Proceedings of the Hawaii
International Conference on System Sciences (HICSS-40).
Arnold, V., Hampton, C., Khazanchi, D. and Sutton, S. (2006; September 7-8th). "Risk Analysis in
Extended Enterprise Environments: Identification of Critical Risk Factors in B2b E-Commerce
Relationships". Proceedings of the Fourth Annual CABIT (Center for Advancing Business through
Information Technology) Symposium, Phoenix, AZ, http://symposium.cabit.wpcarey.asu.edu.
Ni, Jinlan and Khazanchi, D. (2006; November 18-21). "Asymmetric Information and New IT
Investment", Proceedings of the Decision Sciences Institute's 37th Annual Meeting, San Antonio, TX.
Peng, Y., Kou, G., Sabatka, A., Chen, Z., Khazanchi, D. and Shi, Y. (2006, October 25-27th).
"Application of Clustering Methods to Health Insurance Fraud Detection", Proceedings of the IEEE
International Conference on Services Systems and Services Management (ICSSSM06), Université de
Technologie de Troyes, France (http://www.utt.fr/icsssm06/).
Martin, A. and Khazanchi, D. (2006, August 4-6th). "Information Availability and Security Policy".
Proceedings of the Americas Conference on Information Systems (AMCIS 2006), Acapulco, Mexico.
Tarmizi, H., Khazanchi, D. and Noteboom, C. (2006, May 5-6th). "Electronic Medical Records:
Barriers to Adoption and Diffusion." Proceedings of the 1st Midwest United States Association for
Information Systems Conference (MWAIS06), Grand Rapids, Michigan.
Davis, A. and Khazanchi, D. (2006, May 5-6th). "Mutual Knowledge and its Impact on Virtual Team
Performance." Proceedings of the 1st Midwest United States Association for Information Systems
Conference (MWAIS06), Grand Rapids, Michigan.
Attended AMCIS 2004 NYC as a delegate and AMCIS 2005 conference co-chair
-364-
Khazanchi, D. and Zigurs, I. (2005, May 21st, 2005). "Patterns of Virtual Projects", PMI Project
Management Research Programme Working Session", Edinburgh, Scotland, UK (part of the PMI
Global Congress-EMEA).
V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton (2005, August 7-10th). "B2B E-Commerce
Assurance: The Influence of Partner Risk on Assurance Desirability & Relationship Satisfaction."
American Accounting Association (AAA) Annual Meeting, San Francisco, California.
V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton. (2004, August 8-11th). "Risk Analysis in an
Extended Enterprise Environment: Identification of Key Risk Factors in B2B E-Commerce
Relationships." Proceedings of the American Accounting Association (AAA) Annual Meeting,
Orlando, Florida.
V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton (2004, November 5-6th). "B2B E-Commerce
Assurance: The Influence of Partner Risks On Continuous Assurance Desirability & Relationship
Satisfaction." The Eighth Rutgers Continuous Auditing & Reporting Symposium
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
N/A
7. Consulting—list agencies and dates, and briefly describe each project:
N/A
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Committee membership – 5 hours/week
Advising – 3 hours/week
Associate Dean for Academic Affairs – 20 hours/week (carries an additional stipend)
Grant Administration, Writing and Development – 5 hours/week
Supervision of Graduate students (including MS and PhD)– 3 hours/week
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
UNMC Interoperability Standards Task Force (2009-).
Chair, IS&T Scholarship Committee (2009-).
Chair, IA Faculty Search Committee (2009-)
Peter Kiewit Institute (PKI) Executive Director Search Committee (2008-09).
UNMC Clinical Data Standards (CDR) Committee (2007-08)
Chancellor Search Committee (2006-07)
-365-
IS&T ABET Steering Committee (2003-till date)
General Education Think Tank (2006-till date)
College of IST Grant Writer Search Committee, 2006
General Education Review Task Force (2006-till date)
Scott Scholarship Selection Committee (2003-until date)
Academy of Excellence Selection Committee (2004-till date)
Walter Scott Entrepreneurship Award Committee (2005-2007; Committee Chair, 2006)
Peter Kiewit Institute Student Entrepreneurship Award Committee (2005-2007; Committee Chair, 2006)
PKI Chairs Committee (2001-2005)
IS&T Academic Prioritization Report Task Force, (2005)
IS&T IT Steering Committee (2005-2006)
IS&T Dean's Expanded Executive Committee (2001-till date)
Academy of Excellence (AOE) Committee (2005-till date)
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
Owens, D., Davis, A., Murphy, J., Khazanchi, D. and Zigurs, I. (2009, March-April). "Moving First Life into
Second Life: Real World Opportunities for Virtual Teams and Virtual World Project Management." IT
Professional (a IEEE Publication), Volume 11, Issue 2, pp. 34-41.
Davis, A., Owens, D., Murphy, J., Khazanchi, D. and Zigurs, I. (2009, February). "Avatars, People, and Virtual
Worlds: Foundations for Research in Metaverses." Journal of the Association for Information Systems, Volume
10, Issue 2 , Article 2, pp. 90-117.
Ni, J. and Khazanchi, D. (2009, March, Forthcoming). "Information Technology (IT) Investment Decisions
Under Asymmetric Information: A Modified Rational Expectation Model." International Journal of Information
Technology and Decision Making (IT&DM), Volume 8, Issue 1. [Pre-Print Draft PDF].
Murphy, J. and Khazanchi, D. (2008, Fall). "Synergistic Ideation through Pairing Participants in Facilitated
Group Support Systems Sessions." American Journal of Business, Volume 23, No. 2, pp. 27-35. [PDF].
Davis, A. and Khazanchi, D. (2008, May). "An Empirical Study of Online Word of Mouth as a Predictor for
Multi-product Category E-commerce Sales", Electronic Markets, Volume18, Issue 2, pp. 130-141. [PDF]
Zigurs, I. and Khazanchi, D. (2008, Spring). "From Profiles to Patterns: A New View of Task-Technology Fit."
Information Systems Management, Volume 25 Issue 1, pp. 8 –13. [PDF].
Sutton, S., Khazanchi, D., Hampton, C. and Arnold, V. (2008, Special Issue). "Risk Analysis in Extended
Enterprise Environments: Identification of Critical Risk Factors in B2B E-Commerce Relationships." Journal of
the Association of Information Systems (JAIS), Volume 9, Issue 3/4, Article 4, pp. 151-174. [PDF].
Davis, A. and Khazanchi, D. (2007, Fall). "Does Mutual Knowledge Affect Virtual Team Performance?
Theoretical Analysis and Anecdotal Evidence." American Journal of Business (AJB), Volume 22, No. 2, pp. 5765. [PDF].
Khazanchi, D. and Zigurs, I. (2006, July-September). "Patterns for Effective Management of Virtual Projects:
Theory and Evidence." International Journal of electronic Collaboration (IJeC) -- Special Issue on Collaborative
Project Management, Volume 2, No. 3, pp. 25-49. [PDF].
Dasgupta, P. and Khazanchi, D. (2005). "An Adaptive Decision Support System for Academic Course
Scheduling Using Software Agents." International Journal of Technology in Teaching and Learning (IJTTL),
Volume 1, Issue 2, 63-78. [PDF].
Khazanchi, D. (2005, Spring). "Information Technology (IT) Appropriateness: The Contingency Theory of “Fit”
-366-
and IT Implementation in Small and Medium Enterprises". Journal of Computer Information Systems, Volume
XLV, No. 3, pp. 88-95.
Owens, D. and Khazanchi, D. (2009; Forthcoming). "Software Quality Assurance." In: Kidd, T.T. (2009),
Handbook of Research on Technology Project Management, Planning and Operations, Hershey, PA:
Information Science Reference (an imprint of IGI Global).
Khazanchi, D. and Martin, A. (2009). "Information Availability." In: Gupta, J.D. and Sharma, S. Editors (2009),
Handbook of Research on Information Security and Assurance, Hershey, PA: IGI Global, Chapter XIX, pp. 230239.
Zigurs, I. and Khazanchi, D. (2008). "Applying Pattern Theory in the Effective Management of Virtual Projects."
In: Kock, N., Editor (2008), E-Collaboration in Modern Organizations: Initiating and Managing Distributed
Projects, Advances in e-Collaboration Series, Volume 2, Hershey, PA: IGI Global, Chapter VII, pp. 93-112.
Zigurs, I., Khazanchi, D. and Mametjanov, A. (2007). "The Practice and Promise of Virtual Project
Management." In: Kock, N., Editor (2007, December), Encyclopedia of E-Collaboration, Hershey, PA:
Information Science Reference (an imprint of IGI Global), ISBN: 978-1-59904-000-4, Chapter 116, pp. 1-7.
[PDF]. Also published in Kisielnicki, J., Editor (2008, June), Virtual Technologies: Concepts, Methodologies,
Tools, and Applications, Hershey, PA: Information Science Reference (an imprint of IGI Global), ISBN: 978-159904-955-7, Chapter 1.13, pp. 177-184.
Khazanchi, D. and Zigurs, I. (2008). "Patterns for Effective Management of Virtual Projects: Theory and
Evidence." Also published in Kisielnicki, J., Editor (2008, June), Virtual Technologies: Concepts, Methodologies,
Tools, and Applications, Hershey, PA: Information Science Reference (an imprint of IGI Global), ISBN: 978-159904-955-7, Chapter 7.2, pp. 1368-1389.
Khazanchi, D. & Zigurs, I. (2005). Patterns of effective management of virtual projects: An exploratory study.
Newtown Square, PA: Project Management Institute. ISBN: 1930699832.
V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton. (2004). Enterprise Risk Management: Identifying Risk in
B2B E-Commerce Relationships. Altamonte Springs, Fl: The Institute of Internal Auditors (IIA) Research
Foundation. ISBN: 0-89413-554-6. [To purchase this book, please visit the IIA book store]. 102 pages.
Khazanchi, D. and Reich, B.H. (2008, October). "Achieving IT project success through control, measurement,
managing expectations, and top management support," (Guest Editorial), International Journal of Project
Management (IJPM). Volume 26, Issue 7 , pp. 699.
Davis, A. , Khazanchi, D., Murphy, J., Owens, D., & Zigurs, I. (2008). "Challenges and lessons learned from
virtual world research," Midwest Association for Information System (MWAIS) Newsletter, 2 (2), pp. 3.
Khazanchi, D. and Petter, S. (2006; Fall). "The Need for Improved IT Project Manegemnet in e-Service Projects
and Beyond" (Guest Editors' Column), e-Service Journal (e-SJ), 5:1, pp. 1-3.
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
Gouttierre, T. (PI) and Khazanchi, D. (IT-coordinator) (1/1/2009-12/31/2010; In progress). "US-Russia Partnership
for Technology, Language, and Cultural Exchange", $398,103 grant from the US Department of Education.
Khazanchi, D. and Zigurs, I. (2008). "Metaverse Research Lab", funded by the University of Nebraska Foundation
for $20,000.
Khazanchi, D., Najjar, L. and Wolcott, P. (1/1/2008-3/2009). "Business Database Competitive Audit Project".
Awarded a grant of $17,603 for conducting a comparative business database audit for InfoUSA.
Munkvold, B.E., Moe, C.E, Khazanchi, D. and Zigurs, I. (2008-2011; In progress). " Partnerships in Higher Education
Norway - North America 2008-2011". University of Agder (UiA), Kristiansand, Norway and UNO's IS&T
-367-
collaborated to obtain a grant of nearly $100,000 per year for 3.5 years from the Norwegian Centre for
International Cooperation in Higher Education (an agency under the Ministry of Education and Research) to
continue and extend the partnership between UiA and UNO. Khazanchi will serve as the Project Director for
administering the grant on the UNO campus. The grant will fund large student exchanges between the two
universities (35 students each way) and allow faculty and researchers to visit each campus for workshops and to
establish and expand research collaborations.
Davis, A., Zigurs, I., Khazanchi, D. and Munkvold, B. (June – August 2007). "Teaching and learning virtual
collaboration across cultures and technologies,” funded by University of Nebraska at Omaha Institute for
Collaboration Science (ICS) Summer Seed Grant, $1000.
Khazanchi, D. (3/2007). "infoUSA: Spring Break in India " Awarded $45,000 by infoUSA for UNO/UNL students visit
to India to learn about Indian businesses, culture and educational workshops at UNO's sibling university, IIT
Kharagpur.
Buchanan, L. (PI; 2007) and Khazanchi, D. (Consultant). "Follow-up Relationships Intended to END Smoking
(Portable Electronic Device Study)". $40,000 award from Nebraska Dept of Health and Human Services Cancer and
Smoking Grants (LB 506).
Khazanchi, D. (2006). UNMC (University Medical Center - College of Nursing) sub-grant for $3000 to develop a
"Portable Electronic Device Application" for Buchanan, L. (2006) for her "Follow-up Relationships Intended to END
Smoking (Portable Electronic Device Study)" research initiative.
Khazanchi, D., Chen, Z. and Shi, Y. (6/26/2006 to 7/26/2006; Completed). "Mutual of Omaha Special Investigation
Department (SID) Data Mining Project – Individual Disability Income Product". Awarded $23,900 by Mutual of
Omaha.
de Vreede, Gert-Jan, Jones, E., Khazanchi, D., Rilett, L. and Zigurs, I. (2005; Completed). "Applying Patterns of
Technology-Enabled Distributed Collaboration: Improving Multi-Actor Decision-Making in Traffic Systems."
Awarded $10,000 by the PKI Coordinating Council, University of Nebraska.
Khazanchi, D. and Shi, Y. (7/1/2005 to 8/31/2005; Completed). "SID-Data Classification for Disability Income
Product". Awarded $22,500 by Mutual of Omaha.
Khazanchi, D. (7/1/2005-7/12006). "infoUSA: PKI-IIT-VGSOM Student/Faculty Exchange Grant." Awarded $35,000
by infoUSA.
Najjar, L., Khazanchi, D., and Wolcott, P. (1/1/2005 to 3/1/2005; Completed). "Business Database Competitive
Audit Project". Awarded a grant of $14,575 for conducting a business database audit for InfoUSA. This project is
being conducted under the auspices of the PKI Technology Development Corp (PKITDC).
Harvey, D. and Khazanchi, D. (11/2004 to 7/2005; Completed). “Union Pacific -- Engineering Management Group
Systems Project.” Awarded a grant of $94,655 for the systems analysis for EMG's information systems needs. This
project was conducted with the assistance of a Scott incubator partner, DOCenter Inc. under the auspices of the
PKI Technology Development Corp (PKITDC).
Khazanchi, D. and Zigurs I. (October 1st-April 15th, 2005; Completed). "Mutual of Omaha Simulation Project -Phase II." Awarded $16,100 by Mutual of Omaha.
Khazanchi, D. (9/1/2004-8/2007). "Web-based Reentry Case Management System." Award for $70,910 as a as a
part (sub-grant) of the Nebraska Department of Corrections grant to Sample, L and Spohn, C. (2004), "Nebraska's
Serious and Violent Offender Reentry Program".
Khazanchi, D. (7/1/2004; Completed). "infoUSA: PKI-IIT-VGOSM Student/Faculty Exchange Grant." Awarded
$30,000 by infoUSA.
Khazanchi, D. and Zigurs, I. (1/2004-12/2004; Completed). “Patterns of Virtual Projects: Identifying Effective
Blueprints for Virtual Project Management”. Report submitted in fulfillment of a grant sponsored by the Project
Management Institute’s (PMI) Project Management Research Program. The total grant was for $63,000 ($30,000
from PMI and the remainder in matching funds in the form of computing resources and faculty time from the
-368-
College of IS&T, University of Nebraska at Omaha).
Harvey, D. and Khazanchi, D. (3/2004 to 7/2004; Completed). “Union Pacific -- Medical Systems Project.” Awarded
a grant of $75,240 for the systems analysis of medical systems integration with HR at Union Pacific. This project
was conducted with the assistance of a Scott incubator partner, DOCenter Inc. under the auspices of the PKI
Technology Development Corp (PKITDC).
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Fall/2007
Course
number
ISQA 9900
Spring/2008 ISQA 9010
Fall/2008
ISQA 9020
Spring/2009 ISQA 9010
Course title
Advanced Research in Virtual Project Management
(Doctoral Seminar)
Foundations of IS Research (Doctoral Seminar)
Technical and Process Issues in IS Research (Doctoral
Seminar)
Foundations of IS Research (Doctoral Seminar)
Semester
hrs
Class
size
3
4
3
3
5
5
3
1
13. Estimate the percentage of your time devoted to scholarly and/or research activities: __33___%. Please give
a brief description of your major research and scholarly activities:
Business to Business (B2B) Electronic Commerce & Risk Management
o EDI Impacts on Small and Medium Sized Enterprises (SMEs)
o B2B Risk Management
o B2B Assurance
o Risk Management in the Extended Enterprise Environment
IT Project Management
o Virtual Project Management/Virtual World Project Management
o Best Practices in Project Management
o Project Management Training
o Project Management Assurance
Application of Philosophy Science to IS/T Research
o Relevance of IS Research
o Scientific Realism in IS Research
o Truth in IS Research
o Patterns Theory and Design Science
o Validation of Concepts
Mutual Knowledge in Virtual Teams
Metaverses, Virtual Worlds and Other Reality Environments
-369-
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-370-
Ilze Zigurs, ISQA Department Chair
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Ilze Zigurs
Professor
Tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Professor
Dates Held
August 2001 - Present
3. Degrees with fields, institutions, and dates
Degree
Ph.D.
M.B.A.
B.A.
Field
Business
Administration/ MIS
English Literature
Institution
University of Minnesota
Date
1987
University of Nebraska at Omaha
University of Washington, Seattle
1981
1971
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
Teaching Circles, "Chairs & Directors Teaching Circle", UNO, Omaha, NE, USA. (October 2008 - May
2009). Served as coordinator of teaching circle.
Teaching Circles Participant, "Web Collaboration", UNO, Omaha, NE, USA. (October 2008 - May 2009).
Workshop Attended, "The Pedagogical Potential of Second Life for Higher Education", UNO Faculty
Development, Omaha, NE, USA. (September 25, 2008).
Conference Attendance, "International Conference on Information Systems". (December 2008).
Conference Attendance, "Nebraska Research and Innovation Conference", EPSCoR, Lincoln, NE, USA.
(October 28, 2008).
Conference Attendance, "CRIWG 2008", Omaha, NE, USA. (September 14, 2008 - September 18, 2008).
-371-
Seminar, "XBRL: Opportunities and Challenges", Creighton University, Omaha, NE, USA. (September 8,
2008).
Conference Attendance, "Americas Conference on Information Systems". (August 2008).
Conference Attendance, "MWAIS Third Annual Conference", Eau-Claire, Wisconsin, USA. (May 2008).
Attended ICAN Women's Leadership Conference, Qwest Center, April 2006
Attended Americas Conference on Information Systems (AMCIS), August 2006
Attended International Conference on Information Systems (ICIS), December 2006
Attended Special Interest Group in Project Management, all-day workshop prior to ICIS Conference,
December 2006
Attended sessions at 11th Annual Americas Conference on Information Systems, Omaha, Nebraska,
August 11-14, 2005
Attended sessions at International Conference on Information Systems, Las Vegas, Nevada, December 913, 2006
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
7. Consulting—list agencies and dates, and briefly describe each project:
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
PKI Executive Director Search Committee, Committee Member, 1 hour
College Representatives Committee, Center for Collaboration Science, Committee Chair, 1 hour
Statewide EPSCoR Committee, Committee Member, 1 hour
Adobe Connect Pilot Project, Program Coordinator, 1 hour
Selection Committee for IDEA award, Committee Chair, 0.5 hours
Twelve-Month Operational Plan Task Force Committee, Committee Member, 0.5 hours
ABET Steering Committee, Committee Member, 2 hours
Distance Education Steering Committee, Ex-officio member, 1. hour
Women in IT, Faculty Mentor, 1 hour
CIST Roundtable, Co-coordinator of CIST Roundtable series, 1 hour
Workshop on Partnership Opportunities, UiA/UNO, Co-Coordinator of workshop, 1 hour
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
Chair, ISQA Professional Development and Concerns Committee, Spring 2006
-372-
Nebraska EPSCoR Committee, appointed by Governor of State of Nebraska, through November 2007
College Representatives Committee, Institute for Collaboration Science, 2006 - present
Search Committee for Dean of College of IS&T, 2006
Selection Committee for Award for Distinguished Research or Creative Activity, 2006 - 2007
University Professorship Committee, 2005-2006
College Personnel Committee, 2005-2006
ISQA Graduate Program Committee through December 2005
ISQA Recruiting Committee, Summer and Fall 2005
Department personnel committee, 2005-2006
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
Davis, A., & Zigurs, I. (forthcoming). Trust in virtual teams: Solved or still a mystery? Database for
Advances in Information Systems.
Owens, D., Davis, A., Murphy, J., Khazanchi, D., & Zigurs, I. (2009). Moving first life into Second Life: Real
world opportunities for virtual teams and virtual world project management, IT Professional, May/June,
27-34.
Davis, A., Murphy, J., Owens, D., Khazanchi, D., & Zigurs, I. (February 2009). Avatars, people, and
metaverses: Foundations for research in virtual worlds, Journal of the Association for Information
Systems, 10(2), Article 2, 90-117.
Germonprez, M., & Zigurs, I. (January 2009). Task, technology, and tailoring in communicative action: An
in-depth analysis of group communication, Information and Organization, 19(1), 22-46.
DeSanctis, G., Poole, M.S., Zigurs, I., DeSharnais, G., D’Onofrio, M., Gallupe, B., Holmes, M., Jackson, B.,
Jackson, M., Lewis, H., Limayem, M., Lee-Partridge, J., Niederman, F., Sambamurthy, V., Vician, C.,
Watson, R., Billingsley, J., Kirsch, L., Lind, R., and Shannon, D., (Special Issue 2008). The Minnesota GDSS
research project: Group support systems, group processes, and outcomes, Journal of the Association for
Information Systems, 9(10/11), 551-608.
Zigurs, I., and Khazanchi, D. (2008). From profiles to patterns: A new view of task-technology fit.
Information Systems Management, 25(1), 8-13.
Cousins, K., Robey, D., & Zigurs, I. (2007). Managing strategic contradictions in hybrid teams, European
Journal of Information Systems, 16(4), 460-478.
Tarmizi, H., Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., de Vreede, G.-J., & Zigurs, I. (2007).
Collaboration engineering in distributed environments, e-Service Journal, 6(1), 76-97.
Munkvold, B.E., & Zigurs, I. (2007). Process and technology challenges in swift-starting virtual teams,
Information & Management, 44, 287-299.
Tarmizi, H., de Vreede, G-J., & Zigurs, I. (January-March, 2007). Leadership challenges in communities of
practice: Supporting facilitators via design and technology, International Journal of e-Collaboration, 3(1),
18-39.
Khazanchi, D. & Zigurs, I. (July-Sept 2006). Patterns for effective management of virtual projects: Theory
and evidence, International Journal of e-Collaboration, 2(3), 25-48.
Munkvold, B. E. & Zigurs, I. (April-June 2005). Integration of e-collaboration technologies: Research
opportunities and challenges, International Journal of e-Collaboration, 1(2), 1-24 (invited paper,
-373-
editorially reviewed).
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
“Applying Patterns of Technology-Enabled Distributed Collaboration: Improving Multi-Actor DecisionMaking in Traffic Systems,” funded by University of Nebraska, Research Collaboration Seed Grant,
$10,000, April – December, 2005.
“Mutual of Omaha Simulation Project – Phase Two,” funded by Mutual of Omaha Corporation through
The Peter Kiewit Institute Technology Development Corporation, $16,160, September 27 – December
20, 2004 (with D. Khazanchi).
“Patterns of Virtual Projects: Identifying Effective Blueprints for Virtual Project Management,” funded by
Project Management Institute, $30,000, January – December, 2004 (with D. Khazanchi).
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Fall 2008
Fall 2008
Spring
2008
Fall 2007
Course
number
CIST 1010001
CIST 1010002
ISQA
9030-001
ISQA
9900-001
Course title
Foundations of Information Science and
Technology
Foundations of Information Science and
Technology
Behavioral/Organizational Issues
Advanced Research in Information Systems
Semester
hrs
1
Class
size
35
1
29
3
2
3
3
13. Estimate the percentage of your time devoted to scholarly and/or research activities: _____%. Please give a
brief description of your major research and scholarly activities:
-374-
40%
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _n/a___%.
-375-
-376-
John Clark
1. Name, current academic rank, and tenure status:
Name:
John W. Clark
Rank:
Instructor
Tenure Status:
n/a
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Dates Held
Instructor
January 1999-Present
3. Degrees with fields, institutions, and dates
Degree
Field
Institution
Date
B.S.
Computer
Science
University of Nebraska at Omaha
September 1994 May 1998
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
-377-
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
Dates
December
1994-present
Where
Clark Software Solutions
August 1997 - Technical Support Inc.
December
1998
July 1995August 1997
HKS Medical Information
Systems
Duties
Self employed as a software consultant / programmer
Designing and writing software mostly for the
Department of Defense, and the Department of the
Army, as well as NASA. This has ranged from large scale
Java database applications to embedded C and C++ for
handheld devices. This work has included several
applications of graph theory as well as image and video
processing in real-time. This business grew from doing
desktop support, networking and troubleshooting for
individuals and small business.
Software Engineer
Duties included consultant programming to customer
specifications, design and recommendation on custom
software, project management, and customer relations.
Part-time programmer
Duties include writing data-feed parsers, web pages used
for remote patient tracking, dynamically generated
patient reports, Unix system administration, database
management, on site and remote technical support for
several hospitals, and Intel based hardware repair and
construction.
7. Consulting—list agencies and dates, and briefly describe each project:
See Item #6 above.
-378-
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Spring 2009
Fall 2008
Course
number
CSCI 1620001
CSCI 1620002
CSCI 2840
CSCI 3320
CSCI 1620001
CSCI 1620002
CSCI 1840
Course title
Introduction to Computer Science II
Semester
hrs
3
Class
size
11
Introduction to Computer Science II
3
18
C++ & Object Oriented Programming
Data Structures
Introduction to Computer Science II
3
3
3
6
20
26
Introduction to Computer Science II
3
29
Advanced Topics in C
3
32
-379-
Summer 2008
Spring 2008
Fall 2007
CSCI 3320
CSCI 1620
CSCI 3320
CSCI 1620001
CSCI 1620002
CSCI 1620003
CSCI 2840
CSCI 1620001
CSCI 1620002
CSCI 1840
CSCI 3320
Data Structures
Introduction to Computer Science II
Data Structures
Introduction to Computer Science II
3
3
3
3
29
15
22
23
Introduction to Computer Science II
3
28
Introduction to Computer Science II
3
14
C++ & Object Oriented Programming
Introduction to Computer Science II
3
3
13
22
Introduction to Computer Science II
3
30
Advanced Topics in C
Data Structures
3
3
25
24
13. Estimate the percentage of your time devoted to scholarly and/or research activities: __0___%. Please give a
brief description of your major research and scholarly activities:
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: 50% CIST core; 50% CS.
-380-
Sidney Davis
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Sidney Davis
Associate Professor
Tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Assistant Professor
Associate Professor
Dates Held
August 2000 – March 2003
March 2003 -- present
3. Degrees with fields, institutions, and dates
Degree
Field
Institution
Date
B.M.
MBA
Ph.D.
Music
Business
MIS
Indiana University
Southern Illinois University -- Carbondale
Indiana University
1974
1983
1989
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
December 2005, HCI Research in MIS Workshop, Las Vegas Nevada
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
-381-
7. Consulting—list agencies and dates, and briefly describe each project:
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Committee member Undergraduate Program Committee 1.5 hours every 2 weeks
Thesis committee for Thomas Bronieki, Master’s student, 3-4 hours prior to defense (Spring 2009)
Senior editor, eService Journal, 3-4 hours for each paper that I receive for review
Editorial Review Board member, Journal of Database Mgt., 2-3 hours for each review
Ad hoc reviewer for Behaviour and Information Technology, 2-3 hours for each review
Associate Editor for HCI track of ICIS 2009 (10-12 hours total)
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
Graduate Council 2003-2004 (Committee B, Courses, Programs, and Evaluations)
Writing Across the Curriculum Committee (WAC, Fall 2007 – Fall 2008)
College of IS&T RP&T Committee, 2005-2008
College of IS&T Technology Committee, 2006 - 2007
ISQA Dept. PD&C Committee, 2005-2008
Undergraduate Program Committee, 2005-2008
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
-382-
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Fall 2007
Fall 2007
Fall 2007
Spring 2008
Spring 2008
Spring 2008
Fall 2008
Fall 2008
Fall 2008
Spring 2009
Spring 2009
Spring 2009
Course
number
ISQA 3520
ISQA 8525
CIST 2910
ISQA 3400
ISQA 3520
ISQA 8525
ISQA 3520
ISQA 8525
CIST 3100
ISQA 3400
ISQA 3520
ISQA 8525
Course title
User Interface Design
User Interface Design
Multimedia Systems
Data Communications
User Interface Design
User Interface Design
User Interface Design
User Interface Design
Organizations, Applications, and Technology
Data Communications
User Interface Design
User Interface Design
Semester
hrs
3
3
3
3
3
3
3
3
3
3
3
3
Class
size
11
5
6
11
11
5
16
2
24
23
10
3
13. Estimate the percentage of your time devoted to scholarly and/or research activities: __15___%. Please give
a brief description of your major research and scholarly activities:
Editor and reviewer for 3 journals. Ad hoc reviewer for some journals. Served as committee chair for
Master’s student.
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-383-
-384-
G J de Vreede
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Gert-Jan de Vreede
Professor
Tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Professor
Dates Held
2002-Present
3. Degrees with fields, institutions, and dates
Degree
PhD
MSc
Field
Information
Systems
Institution
Delft University of Technology
Delft University of Technology
Date
1991-1995
1986-1991
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
Program chair of GDN2010 (2008-2009)
Co-chair of ECIS2010, Research in Progress track (2008-2009)
Co-chair of Center for Collaboration Science’s 3rd Research Seminar, Omaha, NE. (2008-2009)
Co-chair of HICSS09 & HICSS10 minitrack on Designing Collaboration Processes and Systems.
Co-chair of GDN09 sessions on Collaborative Requirements Engineering in Group Decision Making &
Negotiation (2008-2009)
Co-chair of EuroPLOP’s 2008 Thematic track on Patterns
Program committee member of ISD2008, CRIWG08-09, GDN2009
Organization committee chair for CRIWG 2008, Omaha, NE
Co-chair of ICS 2nd Research Seminar, Omaha, NE. (2007-2008)
Co-chair of HICSS08 & HICSS09 minitrack on Designing Collaboration Processes and Systems.
-385-
Co-chair of GDN08 sessions on Facilitation in Group Decision Making & Negotiation
Co-chair of EuroPLOP’s Thematic track on Patterns (2007-2008)
Program committee member of ISD2007-2008, CRIWG07-08, Group Decision & Negotiation (GDN20072008), ICGSE 2007 workshop on “Tools for Globally Distributed Software Development”
Organization committee chair for CRIWG 2008, Omaha, NE.
Co-chair of HICSS06 & HICSS07 minitrack on Designing Collaboration Processes and Systems.
Co-chair of AMCIS06 & AMCIS07 minitrack on Collaboration Engineering.
Co-chair of GDN06 sessions on Facilitation and Collaboration Engineering of Group Decision Making &
Negotiation
Co-chair of GDN07 sessions on Facilitation in Group Decision Making & Negotiation
Program committee member of ISD2006-2007, CRIWG06-07, Group Decision & Negotiation (GDN20062007),
Member of International Association of Science and Technology for Development (IASTED) Technical
Committee on Information Systems (2006-2007)
Co-chair of HICSS05 & HICSS06 minitrack on Designing Collaboration Processes and Systems.
Co-chair of AMCIS05 & AMCIS06 minitrack on Collaboration Engineering.
Co-chair of GDN05 sessions on Facilitation Support in GSS
Co-chair of GDN06 sessions on Facilitation and Collaboration Engineering of Group Decision Making &
Negotiation
Program committee member of ISD2006, CRIWG05-06, Context2005, International Conference on
Knowledge Sharing and Collaborative Engineering (KSCE 2004), Group Decision & Negotiation
(GDN2005-2006), ISCRAM2006, 1st International Conference on “Future Challenges And Current Issues
In Business Information, Organisation And Process Management”.
Member of International Association of Science and Technology for Development (IASTED) Technical
Committee on Information Systems (2005-2006)
Program co-chair of CRIWG2004 conference, Costa Rica, September 2004.
Co-chair of HICSS05 minitrack on Research Methods and Approaches in Organizational Systems
Research.
Co-chair of HICSS05 & HICSS06 minitrack on Designing Collaboration Processes and Systems.
Co-chair of AMCIS05 minitrack on Collaboration Engineering.
Co-chair of GDN05 sessions on Facilitation Support in GSS
Program committee member of International Conference on Electronic Commerce (ICEC2004), ISD2005,
CRIWG05, Context2005, International Conference on Knowledge Sharing and Collaborative Engineering
(KSCE 2004), Group Decision & Negotiation (GDN2005).
Member of International Association of Science and Technology for Development (IASTED) Technical
Committee on Information Systems (2004-2005)
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
Dates
20062006
Where
Director, Center for
Collaboration Science
University of Pretoria
Duties
Visiting Professor
-386-
7. Consulting—list agencies and dates, and briefly describe each project:
Dates
1997-1999
1991
Agency
Multimedia Skills
Hoogovens
1991
Sint Franciscus Gasthuis
1991
Heineken Bierbrouwerijen
1991
Hoogovens
1989
Rijnconsult
1989
Van Nelle
1987
Dr. Neher Laboratories of
the PTT
Project
Part time senior consultant
Simulation study to evaluate the maintenance process in
the Oxy-2 factory of the Hoogovens steel mill factory
Analysis of the design, development, and
implementation of a maintenance information system at
a Rotterdam hospital
Analysis of the design, development, and
implementation of a maintenance information system at
Heineken Breweries in Zoeterwoude
Analysis of the design, development, and
implementation of a maintenance information system at
the Hoogovens steel mill factory
Design, development, and implementation of an
information system for analyzing the organization of
maintenance departments
Evaluation of the maintenance processes at Van Nelle
Rotterdam, a coffee, tea, and tabacco factory
Design and implementation of an information system for
managing book orders in a library
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Director of UNO’s Center for Collaboration Science, a multi-college, multi-disciplinary effort involving
about 40 researchers across all UNO’s colleges.
Member of the CBA Recruiting Committee for Marketing & Management.
Facilitator for Vice Chancellor Hynes’ Budget Task Force
Member of the IS&T Executive Committee
Coordinated the re-design of PKI279 (ongoing)
Facilitator for IS&T Advisory Board Strategic Planning
Member of the ISQA Graduate Program Committee
Member of the ISQA Professional Development Committee
-387-
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
Director of UNO’s Institute for Collaboration Science, a multi-college, multi-disciplinary efforts involving
faculty across all UNO’s colleges. (2006-)
Member of the ISQA Professional Development Committee (2006-)
Coordinated the re-design of PKI279 (2006-)
Member and secretary of the IS&T Doctoral Program Committee (2003-)
Member of the ISQA Graduate Program Committee (2003-)
Member of the IS&T Executive Committee (2002-)
Director of the Peter Kiewit Institute’s Program on Collaboration Engineering (2002-)
Designed collaborative grant writing workshop for the College of Public Health (2007-2008)
General Education Task Force: Designed and executed various workshops for the General Education
task force. Point of contact: Associate Vice Chancellor Smith-Howell. (2006-2008)
Facilitator for strategic discussions of Grad Council A. (2007-2008)
Member of the ISQA Recruiting Committee (2006-2007)
Designed and facilitated workshop for the University of Nebraska Federal Team to identify and discuss
ways to achieve their priority goals concerning federal funding, 1 September 2005
Designed and facilitated workshop for the School of Communication to prepare their self-study report,
6 October 2005
Honors Program contact for the ISQA Department (2005-2006)
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
Agres, A., Vreede, G.J. de, Briggs, R.O. (2005), A Tale of Two Cities – Case Studies on GSS Transition in
Two Organizations, Group Decision & Negotiation, 14(4), 267-284.
Briggs, R.O., Reinig, B., Vreede, G.J. de (2006), Meeting Satisfaction for Technology Supported Groups:
An Empirical Validation of a Goal-Attainment Model, Small Group Research, 37(6), 1-26.
Briggs, R.O., Reinig, B., Vreede, G.J. de (2008), The Yield Shift Theory of Satisfaction and its Application to
IS/IT Domain, Journal of the Association for Information Systems, 9(5), 267-293.
Davison, R., Vreede, G.J. de, Briggs, R.O. (2005), On Peer Review Standards for the Information Systems
Literature, Communications of the AIS, 16(49), 967-980.
Deokar, A., Kolfschoten, G.L., Vreede, G.J. de (2008), Prescriptive Workflow Design for Collaborationintensive Processes using the Collaboration Engineering Approach, Global Journal of Flexible Systems
Management, 9(4), 13-24.
Fruhling, A.L., Vreede, G.J. de (2006), Field Experiences with eXtreme Programming: Developing an
Emergency Response System, Journal of Management Information Systems, 22(4), 39-68.
Giaglis, G.M., Hlupic, V., Vreede, G.J. de, Verbraeck, A. (2005), Synchronous Design of Business Processes
and Information Systems Using Dynamic Process Modelling, Business Process Management Journal,
11(5), 488-500.
Hengst, M. den, Vreede, G.J. de (2004), Collaborative Business Engineering: A Decade of Lessons from
the Field, Journal of Management Information Systems, 20, 4, 87-115.
Hengst, M. den, Vreede, G.J. de, Maghnouji (2007), R., Using Soft OR Principles for Collaborative
-388-
Simulation: A Case Study in the Dutch Airline Industry, Journal of the OR Society advance online
publication, 7 February 2007, (DOI 10.1057/palgrave.jors.2602353).
Hlupic, V., Vreede, G.J. de (2005), Business Process Modelling using Discrete-Event Simulation: Current
Opportunities and Future Trends, International Journal of Simulation and Process Modelling, 1(1/2), 7281.
Hlupic, V., Vreede, G.J. de, Orsoni, A. (2006), Modelling and Simulation Techniques for Business Process
Analysis and Re-Engineering, International Journal of Simulation Systems, Science & Technology, 7(4-5),
1-8.
Kolfschoten, G.L., Briggs, R.O., Vreede, G.J., de, Jacobs, P.H.M., and Appelman, J.H. (2006). Conceptual
Foundation of the ThinkLet Concept for Collaboration Engineering, International Journal of Human
Computer Science 64, 611-621.
Kolfschoten, G.L., Hengst, M. den, Vreede, G.J. de (2007), Issues in the Design of Facilitated
Collaboration Processes, Group Decision & Negotiation, 16, 347-361.
Laere, J. van, Vreede, G.J. de, Sol, H.G. (2006), A social simulation game to explore future network
coordination at the Amsterdam Police Force, Journal of Production, Planning, and Control, 17(6), 558568.
Niederman, F., Briggs, R.O., Vreede, G.J. de, Kolfschoten, G.L. (2008), Purposive Adaptive Structuration:
The role of conscious agents in creating and utilizing new structures in collaboration, Journal of the
Association for Information Systems, 9(10).
Reinig, B., Briggs, R.O., Vreede, G.J. de (2009), A Cross-cultural study of the Relationship between
Perceived Changes in Likelihood of Goal Attainment and Satisfaction with Technology Supported
Collaboration, International Journal for e-Collaboration, 5(2), 61-74.
Santanen, E., Briggs, R.O., Vreede, G.J. de (2004), Causal Relationships in Creative Problem Solving: The
role of active facilitation in EBS, Journal of Management Information Systems, 20, 4 169-200.
Smith, P.W., Anderson, A.O., Christopher, G.W., Cieslak, T.J., De Vreede, G.J., Fosdick, G.A., Greiner, C.B.,
Hauser, J.M., Hinrichs, S.H., Huebner, K.D., Iwen, P.C., Jourdan, D.R., Kortepeter, M.G., Landon, V.P.,
Lenaghan, P.A., Leopold, R.E., Marklund, A., Martin, J.W., Medcalf, S.J., Mussack, R.J., Neal, R.H., Ribner,
B.S., Richmond, J.Y., Rogge, C., Roselle, G.A., Rupp, M.E., Sambol, A.R., Schaefer, J.E., Sibley, J., Streifel,
A.J., Von Essen, S.G., Warfield, K.L. (2006), Designing a Biocontainment Unit to Care for Patients with
Serious Communicable Diseases: A Consensus Statement, Biosecurity and Bioterrorism: Biodefense
Strategy, Practice and Science, 4(4), 351-365.
Tarmizi, H., Vreede, G.J. de, Zigurs, I. (2007), Leadership Challenges In Communities Of Practice:
Supporting Facilitators Via Design And Technology, International Journal of e-Collaboration, 3(1), 18-39.
Tarmizi, H., Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., Vreede, G.J. de, Zigurs, I. (2007),
Collaboration Engineering in Virtual Teams, e-Services Journal, 76-97.
Topi, H., Valacich, J.S., Kaiser, K., Nunamaker, J.F. Jr., Sipior, J.C., Vreede, G.J. de, Wright, R.T. (2007),
Revising the IS Model Curriculum: Rethinking the Approach and the Process, Communications of the AIS,
(20), 728-740.
Topi, H., Valacich, J.S., Wright, R.T., Kaiser, K., Nunamaker, J.F. Jr., Sipior, J.C., Vreede, G.J. de (2008),
Revising Undergraduate IS Model Curriculum: New Outcome Expectations, Communications of the
Association for Information Systems, 23, 591- 602.
Vreede, G.J. de, Kolfschoten, G.L., Briggs, R.O. (2006), ThinkLets: A Collaboration Engineering Pattern
Language, International Journal of Computer Applications in Technology, 25(2/3), 140-154.
Vreede, G.J. de, Koneri, P.G., Dean, D.L., Fruhling, A.L., Wolcott, P. (2006), Collaborative Software Code
Inspection: The Design and Evaluation of a Repeatable Collaborative Process in the Field, International
Journal of Cooperative Information Systems, 15(2), 205-228.
-389-
Vreede, G.J. de, Mgaya, R.J.S. (2006), Technology Supported Collaborative Learning for Higher
Education: Comparative Case Studies in Tanzania, Information Technology for Development, 12(2), 113130.
Vreede, G.J. de, Mgaya, R.J.S., Qureshi, S. (2004), Field Experiences with Collaboration Technology: A
Comparative Study in Tanzania and South Africa, Information Technology for Development, 10(3), 201219.
Agres, A., Vreede, G.J. de, Briggs, R.O. (2004), A Tale of Two Cities –Case Studies on GSS Transition in
Two Organizations, Proceedings of the 37th Hawaiian International Conference on System Sciences, Los
Alamitos: IEEE Computer Society Press. (Best paper finalist)
Ali, H., Vreede, G.J. de, Ramachandra, K., Sidahmed, E., Sreenivas, H. (2004), Evaluating Wireless
Architectures for GDS Applications, Proceedings of the 37th Hawaiian International Conference on
System Sciences, Los Alamitos: IEEE Computer Society Press.
Briggs, R.O., Kolfschoten, G.L, Vreede, G.J. de (2005), Toward a Theoretical Model of Consensus Building,
Proceedings of AMCIS 2005, Omaha, NE.
Briggs, R.O., Kolfschoten, G.L., Vreede, G.J. de, Dean, D.L. (2006), Defining Key Concepts for
Collaboration Engineering, in: Irma Garcia, Raúl Trejo (eds.), Proceedings of the 12th Americas
Conference on Information Systems, Acapulco, Mexico, August 4th-6th 2006, 121-128.
Briggs, R.O., Reinig, B.R., Vreede, G.J. de (2006), Satisfaction with groupware-supported work practices,
in: Bongsik Shin (ed.), Proceedings of the San Diego International Systems Conference, San Diego, July
14-16, 2006.
Dao, V., Chidambaram, L., Vreede, G.J. de (2006), The Invisible Pilot in Virtual Teams: An Investigation of
the Impact of Facilitation on Virtual Teams, Proceedings of AMCIS2006, Acapulco, Mexico, August 2006.
Davis, A., Kamal, M., Schoonover, T., Nabukenya, J., Pietron, L.R., Vreede, G.J. de, Incident Response
Planning Using Collaboration Engineering Process Development and Validation, WISA: SIGSEC Workshop
2006, Milwaukee, WI, 10 December 2006.
Davis, A., Badura, V., Vreede, G.J. de (2008), Understanding Methodological Differences to Study
Convergence in Group Support System Sessions, CRIWG 2008, September 14-18, Omaha, Nebraska.
Fruhling, A.L., Sambol, A., Hinrichs, S., Vreede, G.J. de (2006), Designing An Emergency Response System
for Electronic Laboratory Diagnostics Consultation, Proceedings of the 39th Hawaiian International
Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.
Fruhling, A., Tyser, K., Vreede, G.J. de (2005), Experiences with Extreme Programming in Telehealth:
Developing and Implementing a Biosecurity Health Care Application, Proceedings of the 38th Hawaiian
International Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.
Hlupic, V., Vreede, G.J. de, Orsoni, A. (2006), The Role of Discrete Event Simulation in Business Process
Analysis and Re-Engineering, Proceedings of the 9th International Conference on Computer Modelling
and Simulation (UKSim06), Oxford, April 2006.
Kamal, M., Davis, A.J., Nabukenya, J., Schoonover, T.V., Pietron, L.R., Vreede, G.J. de, (2007),
Collaboration Engineering for Incident Response Planning: Process Development and Validation,
Proceedings of the 40th Hawaiian International Conference on System Sciences, Los Alamitos: IEEE
Computer Society Press.
Kanapuram, S., Ali, H.H., Vreede, G.J. de (2006), On Effective Utilization of Wireless Networks in
Collaborative Applications, Proceedings of the 2nd International Conference on Collaborative
Computing: Networking, Applications and Worksharing, Atlanta, November 2006.
Kolfschoten, G.L., Appelman, J.H., Briggs, R.O., Vreede, G.J. de (2004), Recurring Patterns of Facilitation
Interventions in GSS Sessions, Proceedings of the 37th Hawaiian International Conference on System
Sciences, Los Alamitos: IEEE Computer Society Press.
-390-
Kolfschoten, G.L, Briggs, R.O., Appelman, J.H., Vreede, G.J. de (2004), ThinkLets as Building Blocks for
Collaboration Processes: A Further Conceptualization, Lecture Notes in Computer Science, Berlin,
Springer Verlag, 2004.
Kolfschoten, G.L., Duivenvoorde, G., Briggs, R.O., Vreede, G.J. de (2009), Towards an instrument to
measure Successfulness of collaborative effort from a participant perspective, Proceedings of the 42nd
Hawaiian International Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.
Kolfschoten, G.L., Duivenvoorde, G., Briggs, R.O., Vreede, G.J. de (2009), Practitioners vs Facilitators a
comparison of participant perceptions on success, Proceedings of the 42nd Hawaiian International
Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.
Kolfschoten, G.L., Niederman, F., Briggs, R.O., Vreede, G.J. de (2006), Understanding the Job
Requirements for Collaboration Technology Support through a Hybrid IT-End User Job Classification
Model: The Case of Collaboration Engineering and Facilitation, SIGCPR Conference.
Kolfschoten, G.L., Niederman, F., Briggs, R.O., Vreede, G.J. de (2008), Role Separation in Strategies for
Collaboration Support, Proceedings of the 41st Hawaiian International Conference on System Sciences,
Los Alamitos: IEEE Computer Society Press.
Kolfschoten, G.L., Valentin, E., Verbraeck, A., Vreede, G.J. de (2006), Cognitive load reduction through
the use of building blocks in the design of decision support systems, Proceedings of AMCIS2006,
Acapulco, Mexico, August 2006.
Kolfschoten, G.L., Hengst, M. den, Vreede, G.J. de (2005), Issues in the Design of Facilitated
Collaboration Processes, Proceedings of Group Decision & Negotiation 2005, Vienna, Austria, July 10-13,
1-17.
Kolfschoten, G.L., Vreede, G.J. de, Pietron, L.R. (2006), A training approach for the transition of
repeatable collaboration processes to practitioners, Proceedings of Group Decision & Negotiation 2006,
Karlsruhe, June 2006.
Kolfschoten, G.L., Vreede, G.J. de, The Collaboration Engineering Approach for Designing Collaboration
Processes, Proceedings of CRIWG 2007, Bariloche, Argentina, September 16-20.
Kolfschoten, G.L., Vreede, G.J. de, Briggs, R.O., Computer Aided Pattern-Based Collaboration Process
Design: A Computer Aided Collaboration Engineering Tool, Proceedings of CRIWG 2007, Bariloche,
Argentina, September 16-20.
Koneri, P.G., Vreede, G.J. de, Dean, D.L., Fruhling, A.L., Wolcott, P. (2005), The Design and Field
Evaluation of a Repeatable Collaborative Software Code Inspection Process, in: Fuks, H., Lukosch, S.,
Salgado, A.C. (eds.), Proceedings of CRIWG 2005, LNCS3706, pp. 325-340, Springer Verlag Berlin
Heidelberg.
Laere, J. van, Vreede, G.J. de, Sol, H.G. (2004), Exploring new coordination scenarios for workflows in the
Amsterdam Police Force: Simulation-games as organizational change instruments, Proceedings of IFIP
WG 5.7 8th workshop on Experiential learning in chains and networks', Wageningen, the Netherlands,
24-27 May 2004.
Laere, J. van, Vreede, G.J. de, Sol, H.G. (2005), A Coordination Framework for Analysis and Improvement
of ICT Supported Distributed Work, Proceedings of the IRIS28, Kristiansand, Norway, August 6-9.
Laere, J. van, Vreede, G.J. de, Sol, H.G. (2006), Designing simulation-games for organizational
prototyping, in: A.G. Nilsson et al (eds), Advances in information systems development – Bridging the
gap between academia and practice, Proceedings of ISD 2005 (the fourteenth international conference
on Information Systems Development), August 15-17, Karlstad, Sweden, 373-385.
Laere, J. van, Vreede, G.J. de, Sol, H.G. (2005). Dealing with Paradox in business engineering, simulationgames as learning environments. In Backlund, P., Carlsson S. and Söderstrom S. (eds.), Proceedings of
the forum poster session in conjunction with Business Informatics Research (BIR) 2005, Skövde, 3-4
-391-
October, 2005, pp. 59-68.
Laere, J. van, Vreede, G.J. de, Sol, H.G. (2006), Developing paradoxical guidelines for communities of
practice in organizations, Proceedings of the European Conference on Information Systems, Göteborg,
Sweden, 2006.
Noteboom, C., Zhang, C., Tarmizi, H., Steinhauser, L., Payne, M., Vreede, G.J. de, Zigurs, I. (2006),
Research as Teaching and Teaching as Research: Reflections on a Virtual Team Project, Mid-West
Association of Information Systems Conference.
Read, A.S., Renger, D.R.M., Briggs, R.O., Vreede, G.J. de (2009), Fundamental Topics of Organizing: A
Research Agenda, Proceedings of the 42nd Hawaiian International Conference on System Sciences, Los
Alamitos: IEEE Computer Society Press.
Reinig, B., Briggs, R.O., Vreede, G.J. de (2008), A cross-cultural investigation of the goal-attainmentlikelihood construct and its effect on satisfaction with technology supported collaboration, Proceedings
of the 41st Hawaiian International Conference on System Sciences, Los Alamitos: IEEE Computer Society
Press.
Renger, M., Kolfschoten, G.L., Vreede, G.J. de (2008), Patterns in Collaborative Modeling: A Literature
Review, in: Costa, J. (ed.), Proceedings of Group Decision & Negotiation 2008, Coimbra, Portugal.
Renger, M., Kolfschoten, G.L., Vreede, G.J. de (2008), Challenges with Collaborative Modeling: A
Literature Review, in: Jan L.G. Dietz, Antonia Albani, Joseph Barjis, Peter Rittgen (eds), Advanced
Enterprise Engineering, Lecture Notes in Business Information Processing, Berlin: Springer-Verlag (AIS
SIGMAS Best Paper Award).
Renger, M., Kolfschoten, G.L., Vreede, G.J. de (2008), Using Interactive Whiteboard Technology to
Support Collaborative Modeling, CRIWG 2008, September 14-18, Omaha, Nebraska.
Santanen, E., Vreede, G.J. de, (2004) Creative Approaches to Measuring Creativity: Comparing the
Effectiveness of Four Divergence thinkLets, Proceedings of the 37th Hawaiian International Conference
on System Sciences, Los Alamitos: IEEE Computer Society Press.
Steinhauser, L., Read, A., Vreede, G.J. de (2008), Studying the Adoption of Collaborative Work Practices
Using the Value Frequency Model, in: Germonprez, M., Iversen, J. (eds), Proceedings of the Midwest
United States Association for Information Systems 3rd Annual Conference, Eau Claire, Wisconsin, May
2008.
Tarmizi, H., Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., Vreede, G.J. de, Zigurs, I. (2006),
Technical and Environmental Challenges of Collaboration Engineering in Distributed Environments,
Proceedings of CRIWG 2006, Medina del Campo, Spain, September 2006, 38-53.
Tarmizi, H., Vreede, G.J. de (2005), A Facilitation Task Taxonomy for Communities of Practice,
Proceedings of AMCIS 2005, Omaha, NE.
Tarmizi, H., Vreede, G.J. de, Zigurs, I. (2006), Identifying Challenges in communities of practice
facilitation, Proceedings of the 39th Hawaiian International Conference on System Sciences, Los
Alamitos: IEEE Computer Society Press.
Tarmizi, H., Zigurs, I., Vreede, G.J. de (2006), Understanding E-Leadership In Distributed Crisis Response
Teams, Gallup Leadership Institute Summit, Washington DC, October.
Tarmizi, H., Vreede, G.J. de, Zigurs, I. (2007). A Facilitators’ Perspective on Successful Virtual
Communities of Practice. The thirteenth Americas Conference on Information Systems, August 9-12,
Keystone, Colorado.
Vreede, G.J. de, Briggs, R.O. (2005), Collaboration Engineering: Designing Repeatable Processes for HighValue Collaborative Tasks, Proceedings of the 38th Hawaiian International Conference on System
Sciences, Los Alamitos: IEEE Computer Society Press.
Vreede, G.J. de, Briggs, R.O. Reinig, B. (2008), e-Collaboration Satisfaction: Empirical Field Studies of
-392-
Disconfirmation Theory Across Two Countries, Proceedings of AMCIS.
Vreede, G.J. de, Fruhling, A., Chakrapani, A. (2005), A Repeatable Collaboration Process for Usability
Testing, Proceedings of the 38th Hawaiian International Conference on System Sciences, Los Alamitos:
IEEE Computer Society Press.
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Spring 2009
Fall 2008
Course
number
ISQA 8950
ISQA 9900
ISQA8080
ISQA9900
Spring 2008
Fall 2007
ISQA 8220
ISQA 8950
ISQA 8080
ISQA 8220
ISQA 9900
Course title
Capstone MIS
Advanced Research in Collaboration Science
Facilitation of Collaborative Problem Solving
with Groupware
Facilitation of Collaborative Problem Solving
with Groupware
Advanced System Analysis & Design
Capstone MIS
Seminar: Facilitation of Collaboration
Advanced System Analysis & Design
Facilitation of Collaborative Problem Solving
with Groupware
Semester
hrs
3
3
3
Class
size
12
3
6
3
3
3
3
3
3
3
18
10
7
25
4
13. Estimate the percentage of your time devoted to scholarly and/or research activities: _____%. Please give a
brief description of your major research and scholarly activities:
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-393-
-394-
Ken Dick
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Kenneth L. Dick
Senior Research Fellow
Not tenure track
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Dates Held
3. Degrees with fields, institutions, and dates
Degree
Bachelor of
Science
Master of
Science
Doctor of
Philosophy
Field
Mathematics
Institution
University of Nebraska at Lincoln
Date
1972
Guidance and
Counseling
Administration,
Curriculum and
Instruction
Creighton University
1975
University of Nebraska at Lincoln
1983
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
-395-
Dates
1998-Present
1994-1998
1989-1994
1979-1984
1979-1989
1975-1979
Where
University of Nebraska at
Omaha
PKS / MFS / WorldCom, Omaha,
NE
First Data Corp, Omaha, NE
Creighton University
USWest, Omaha, NE
Papillion Public Schools
Duties
Senior Research Fellow in Telecommunications
Director,-Strategic Enterprise Direction /
Architecture & Standards
Director-Management Information Systems
Adjunct Professor
Systems Manager
Director-Alternative School
7. Consulting—list agencies and dates, and briefly describe each project:
Dates
Agency
David City Hospital
City Stream
Odin Capital
MCIWorldcom
Orillion
Alvine & Associates
Engineering
Union Pacific Railroad
Odin Financial
Telesuite
Quantum Dynamics
Omaha Police Department
Omaha Public Schools
Relapoint
DiscoverWhy
Project
communications
CLEC / DLEC IP networking
IT Architecture for local deployment
IT Architecture for next generation OSS
telecommunications practice
Communications
Due Diligence
Technical Architecture
IT Architectural Review
System & Communications Review
Network Infrastructure
System Standards
Operational Standards
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
IS & T, Executive Committee
IST & E, New Building Committee
IST & E, Joint Chair Committee
IS&T / Metropolitan Community College Collaboration
-396-
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
IS & T, Executive Committee (1998-Present)
IST & E, New Building Committee, (1998-Present)
IST & E, Joint Chair Committee, (1999-Present)
IS&T / Metropolitan Community College Collaboration, (2000-Present)
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
UNMC Smoking Cessation PDA program. (2006-2007)
Teaching American History, DOE grant for Web site development. $50,000 over three years. (2004-2007)
National Park Service, Lewis and Clark Bicentennial Web site, $1,000,000 over four years plus an
additional $3-5M in hardware & services donations. (2002-2007)
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Spring 2009
Fall 2008
Summer 2008
Course
number
CSCI 3550
CSCI 8220
CSCI 8555
ISQA 8310
CSCI 8210
ISQA 8310
CSCI 3550
CSCI 8555
ISQA 3400
Course title
Communication Networks
Telecommunications Management
Communication Networks
Data Communications
Advanced Communication Networks
Data Communications
Communication Networks
Communication Networks
Business Data Communications
-397-
Semester
hrs
3
3
3
3
3
3
3
3
3
Class
size
23
9
8
17
9
28
11
1
3
Spring 2008
Fall 2007
CSCI 8220
CSCI 8410
ISQA 8230
CSCI 8210
ISQA 8310
Telecommunications Management
Distributed Systems and Network Security
Telecommunications Management
Advanced Communication Networks
Data Communications
3
1.5
3
3
3
6
8
7
16
25
13. Estimate the percentage of your time devoted to scholarly and/or research activities: _____%. Please give a
brief description of your major research and scholarly activities:
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-398-
Donna Dufner
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Donna Dufner
Associate Professor
Tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Assistant Professor
Associate Professor
Distinguished Teacher
Ad Perpetuum
Professional Project
Manager (PMP® )
Senior Member IEEE
Dates Held
Jan. 2000 – Aug. 2003
Aug 2003 - present
Title is given in perpetuity to recipients of
the University-wide Outstanding Teaching
and Instructional Creativity Award (OTICA)
2008
2004 – current
2007 – Completed recertification
successfully1
Advanced 2007
3. Degrees with fields, institutions, and dates
Degree
Ph.D.
Field
Computer and Information Science
M.S.
Computer and Information Science
M.B.A.
Market Research
B.A.
Sociology
Institution
Rutgers University,
Management
The New Jersey Institute of
Technology
The University of Chicago,
Graduate School of Business
DePaul University
1
Date
1995
1995
1977
1975
To maintain PMP certification each certified PMP must go through a recertification process. The objective is maintain and
improve skills through learning about new and changing best practices in the field of project management.
-399-
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
Professional Development in Chronoligical Order:
2005 - present: Volunteer Training at the Douglas County Department of Corrections
Attend Volunteer Training at the Douglas County Department of Corrections each semester with my
students in preparation for the Service-Learning Course I teach at the Douglas County Department of
Correction, Teaching Computer Basics to Inmates. I attend the training each semester to refresh and
reinforce my preparation to work with inmates and my UNO students in the jail environment. I also
want to begin the course by demonstrating that I will be available to my UNO students at all times
during this very intensive, demanding, and extremely rewarding growth experience. The training is
conducted once per semester on the Saturday morning before the semester begins.
2009 - Conference: American Jail Association JA's 28th Annual Training Conference & Jail Expo, April 26 29, Louisville, Kentucky.
2008 - Teaching Circle: to evaluate and adopt advanced educational techniques.
2007 - Conference: CUMU Conference, Florida International University, Miami FL, October 21-24.
2007 - Project Management Professional (PMP®) Re-certification: successfully completed as required by
the Project Management Institute.
2004 - Project Management Professional (PMP®) Certification: “The PMP Certification is the project
management profession’s most recognized and respected global credential. To obtain PMP certification,
an individual must satisfy education and experience requirements, agree to adhere to a Professional
Code of Conduct and pass the PMP Certification Examination. The Project Management Institute (PMI)
Certification Department is the first professional certification program of its kind in the world to receive
the ISO 9001 certification, a globally recognized mark of a quality management system (Project
Management Institute).”
2004-2005 - Leadership Omaha: One person from the University is nominated by the chancellor and a
team of community leaders selects those who will constitute that year’s class. Leadership Omaha, then
in its 27th year, is one of the oldest and most respected community leadership programs in the nation.
The program consisted of once per month meetings from 7:30 AM to 7:30 PM during which,
economic, social, educational, health, etc. issues were covered. We learned about Omaha and Nebraska
and the cultural and community service opportunities available. The program also exposed the class to
the services made available such as homeless shelters, dental clinics, nursing home facilities for those
with disabilities; and, to the need for additional services for those in need in Omaha and Nebraska. In
addition we were taught about the political promise, the inequities and political issues, and the
economic and political challenges in Nebraska.
As a part of the program I also served on a team with other members of the Leadership Omaha
Class. We were charged with performing a project that would contribute to the health of Omaha. The
team elected to perform a sustainable project and develop a Web based service to enable citizens,
visitors and individuals who might relocate to Omaha to easily find entertainment and cultural
opportunities at a glance. The objective of our project is demonstrate that Nebraska can be fun and
offers wonderful cultural opportunities. KETV sponsored the project and IN-The-O continues to benefit
Nebraska. The project was launched at the Peter Kiewit Institute in the Atrium in the spring of 2005 (I
served as the hostess). Several hundred people attended. You can view KETV.com –In-the-O located at
the following URL: http://www.ketv.com/intheo/index.html
Summer 2005 - Leadership Omaha –Gazing and Grazing Program
-400-
Participated in the Gazing and Grazing Program with my class from Leadership Omaha. We traveled all
over Nebraska by bus. The program is designed to teach about the economic drivers, educational,
political, cultural, etc. issues confronting Nebraskans. We also we shown and given the opportunity to
enjoy the immense beauty and amazing natural resources of Nebraska. As the bus traveled throughout
the state over a period of several days, speakers would board and give lectures and answer questions.
We visited ranches, natural resources, and schools to mention a few.
2004-2005 - Women’s Leadership Institute: Selected by the chancellor to participate in the Women’s
Leadership Institute at the University of Nebraska at Omaha (UNO). Candidates from various educational
institutions are nominated for participation by the Deans of their schools and selected by the Chancellor
from the pool of nominees. The Institute gave me the opportunity to learn about the University. Since I
spent approximately 15 years of my career in the business world at major corporations such as AT&T,
Chemical Bank Corp., ARDIS (a joint venture of IBM and Motorola), Bell Atlantic Nynex, before coming to
academia; learning about inner workings of the University was especially important for me.
2005 - Research Triangle: “UNO Government Information Systems Management,” University of
Nebraska at Omaha, Omaha, NE.
2005 - Conference: XVII Asian Pacific Conference on International Accounting Issues, Wellington, New
Zealand, November 20-23.
2005-Conference: 38th Annual Hawaii International Conference on System Sciences.
2004-Conference: Human Factors in Computing Systems, Special Interest Groups (SIGs), SIGCHI ACM,
April 24-29, Vienna, Austria.
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
2009-on-going Project
Management for the Douglas
County Department of
Corrections
community outreach
Serve as the Project Manager
of a multi-million dollar
project for the Douglas
County Department of
Corrections with the support
of student interns.
2008 – present
Prospect Hills Cemetery
Board
Board Member
The project is an Enterprise-wide Information
Technology development and implementation for
the Douglas County Department of Corrections.
My work is Pro Bono2. Field work provides an
opportunity for me to keep my practical skills up to
date and for students to work in the field with a
seasoned project manager on a system of
substantial impact and importance.
The project is
providing
funding of
approximately
$59,364 for
student
internships. One
summer intern
and two fall and
spring 20092010.
Prospect Hills Cemetery is one of the oldest and
most historic cemeteries in the nation.
Provide technical support and advice as a board
member.
community outreach
2007 South Korea
Invited Expert in Project
Title of my talk: “Practical Applications in Project
Management: Knowing What Questions to Ask.”,
-401-
Only nine
individuals were
Management
Conference all Korean Universities Hosted by the
Government of South Korea, Nov. 2. (All travel
expenses paid by the host).
invited from all
over the world
to present at
this event. I was
the only woman
and the only
American.
2005 Mutual of Omaha
community outreach
Teaching at Mutual of Omaha
Taught a session for the PMP Study Group at
Mutual of Omaha, Omaha, NE. Project
Communications Management and Human
Resource Management
Taught PMP
study group
hosted by
Mutual but
open to the
community of
Omaha Pro
Bono
The course was
provided Pro
Bono as out
reach to the
business
community.
"Rave Reviews”
were received
from the
students.
2007 Booz, Allen and
Hamilton
community outreach
Intensive Project Management Course)
Developed and taught a four day (8 hours per day)
intensive project management course for
managers working on contracts at USSTRATCOM.
Contractors will be expected to use the Project
Management Institute best practices and be
certified. The Department of Defense uses the IEEE
Standards coupled with the PMI best practices
embodied in the Project Management Body of
Knowledge (PMBOK) for software engineering. In
all of my courses I teach Best Practices using the
PMBOK, the IEEE Standards, and the mathematical
foundation of project management based on
Management Science using Hillier, Hillier and
Lieberman, Introduction to OR/MS.
Assistant Professor, MIS
University of Illinois at Springfield
07/96-01/00
Taught twenty-four Management Information Systems, Systems Analysis and Design, CASE,
Telecommunications and COBOL at the graduate and undergraduate level.
Supervised approximately 10 graduate projects, served on the project committees of 6 students,
served as the sole academic advisor for approximately 40 students.
Assistant Professor, MIS
Polytechnic University
01/95-07/96
Taught Information Technology (IT), IT Strategy, Telecommunications, MIS, DSS, at the graduate and
Executive Program level.
Project Manager
ARDIS, (a joint venture of IBM and Motorola
07/91-11/93
specializing in wireless data transmission)
Project manager responsible for determining economic, technical, and organizational feasibility of
wireless access to production systems data in a diversity of hardware, software, and
telecommunications environments. Managed all stages of systems design, development, and
implementation for customers such as UNISYS and Bell Atlantic Business Systems.
Assistant Vice President,
Chemical New York Corporation
03/85-12/88
Information and Technology
-402-
Management Division
Responsible for: providing financial systems support for the controller of the Information and
Technology Management Division; and providing on-site office systems support to all senior
executives, their staffs, and executive support groups (training, programming, hardware and
operations support, etc.).
Project Manager/Systems
AT&T
01/79-11/83
Analyst
Responsible for: applications software development, selection of software packages and computer
hardware, and installation of hardware and software. Held both line and staff positions in various
subsidiaries within the company.
7. Consulting—list agencies and dates, and briefly describe each project:
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Honors Coordinator including, Honors advising and honors colloquia planning for the college: 10 hrs
Thesis advising: 10 hrs per week
Independent studies: 10 hrs per week
Committee work: Graduate Committee, Graduate Committee A, Honors Committee work: 4 hours per
week.
Course Coordination for ISQA 4910, ISQA 8820 and ISQA 8810: 3 hour per week
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
2004-2005: Chair of the Faculty Search Committee
2004-2007: Serve on the Undergraduate Program Committee for ISQA:
2004- present: Honors Committee –
2003-2007: Faculty Senate Professional Conduct Committee
2006-2009: Graduate Council
2006-2009: Graduate Council Committee B
2007: Chancellor’s Commission on Multi-cultural Affairs
2004 – present: Honor’s Coordinator for the College
2007- present: AAUP Executive Board
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
-403-
Book Chapters
Dufner, D. Alavi, M. and Caroline Howard (2009) “Evolving Technologies Supportive of Collaborative
Learning”, (Eds) Caroline Howard, Judith V. Boettecher, Lorraine Justice, Karen D. Schenk, Gary A. Berg,
Patricia L. Rogers, Encyclopedia of Distance Learning, Hershey, PA: Idea Group Publishing.
Reed, B.J., Holley, L. and Dufner, D. (2007) “The Performance Challenge: Integrating Uncoupled
Government Information Technology”, In Government Performance Project Findings, Jessica M.
Crawford, Ed, Baltimore, MD: Johns Hopkins University Press.
Alavi, M., D. Dufner, and C. Howard, (2005) "Collaborative Learning Technologies". (Eds) Caroline
Howard, Judith V. Boettecher, Lorraine Justice, Karen D. Schenk, Gary A. Berg, Patricia L. Rogers,
Encyclopedia of Distance Learning, Hershey, PA: Idea Group Publishing.
Alavi, M. and Dufner, D. (2004) “Technology-Mediated Collaborative Learning: A Research Perspective”,
S. R. Hiltz and R. Goldman, Eds. In Learning Together Online: Research on Asynchronous Learning
Networks. Mahwah, NJ: Lawrence Erlbaum Associates, Inc., 191-213.
Refereed Journal Articles:
Holley, L., Dufner, D., and Reed, B.J. (2004) “Strategic Information Systems Planning (SISP) in US County
Governments”, Public Performance and Management Review. March, 27 (3): 102-126.
Presentations:
Foxall, Mark and Dufner, Donna (2009) “Building Strategic Opportunities through University ServiceLearning Programs and Volunteerism”, American Jail Association JA's 28th Annual Training Conference &
Jail Expo, April 26 - 29, Louisville, Kentucky. Presentation and panel discussion.
Dufner, D. (2008) “Play Ball! - Hitting Home Runs Using Project Management Techniques”, ProDev, A
Conference for Project Professionals, September 22, Scott Conference Center, Omaha, NE.
Dufner, D. (2007) “Practical Applications in Project Management: Knowing What Questions to Ask.”,
Conference Hosted by the Government of South Korea, Nov. 2. (All expenses paid by the host).
Dufner, D. (2007) “Service-Learning: Catching the Attention of the IPod Generation”, Midwest
Consortium for Service-Learning in Higher Education, Fourth Annual Conference, University of Nebraska
at Kearney, Sept. 27-29.
Dufner, D. (2007) “Service-Learning in Jail: Bridging the Digital Divide”, Institute for Metropolitan Affairs,
Roosevelt University, 430 S. Michigan Avenue, Chicago, IL. (Oct. 18).
Dufner, D. and Kelsey, J. (2006) Service Learning: IT Projects for Micro Businesses in South Omaha, South
Omaha Seminar, Omaha, NE , May 8-12.
Dufner, D. (2005) “Risk Management: Looking Back at the Challenger Disaster, Enron’s Collapse, and the
Anthrax Clean-up at the State Department”, Graduate School of Business, University of Nebraska –
Omaha, Omaha, NE. October.
Schwer, A., Dufner, D., Morcous G., (2005) Project Management Informatics, Conference proceedings of
the Midwest Section of the American Society for Engineering Education, Fayetteville, AR. Sept.
Dufner, D. Holley, L., and Reed, B.J. (2005) “Using Strategic Information Systems Planning (SISP) to
Bridge the Gap between State Resources and the Needs of Aging Americans”, In Proceedings of the 38th
Annual Hawaii International Conference on System Sciences, IEEE Computer Society Press: Los Alamitos,
California.
Shah, P., Peters, J. and Dufner, D. (2005): “The Mayor’s Hotline”, Poster Session, The Spring Strategic
Planning Advance, University of Nebraska – Omaha, April. (Attendees included Lt. Gov. Sheehy,
President Milliken, Mayor Fahey, and other dignitaries).
Dufner, D. (2005) “Risk Management: Looking Back at the Challenger Disaster, Enron’s Collapse, and the
Anthrax Clean-up at the State Department”, Graduate School of Business, University of Nebraska –
Omaha, Omaha, NE. October.
-404-
Hiltz, S.R., Alavi, M. and Dufner, D. (2004) Asynchronous Learning Networks (“ALN’s”) for E-Learning:
Priorities for Future Software Development, Panel Discussion, Conference on Human Factors in
Computing Systems, Special Interest Groups (SIGs), SIGCHI ACM, April 24-29, Vienna, Austria.
Dufner, D. (2004) “Information Systems Tips for Social Workers”, School of Social Work, University of
Nebraska at Omaha, Nov. 2.
Other
Dufner, D. (2007) “Teaching Computer Basics at the Jail: Outcomes”, Presentation to the Douglas
County Board of Corrections, City-County Building, Omaha, NE,. (Invited, January 9).
http://www.co.douglas.ne.us/boardmeetings.php
Dufner, D. (2006) “Teaching Computer Basics at the Jail”, Presentation to the Douglas County Board of
Corrections, City-County Building Omaha, NE,. (Invited, October 17).
http://www.co.douglas.ne.us/boardmeetings.php
KFAB Radio Interview Spring 2007
Dufner, D. with M. Foxall. Interviewed on KFAB, Husker Radio, (Invited to speak about “Community
Outreach – UNO Students Teaching Computer Basics at the Douglas County Jail”. KFAB Radio reaches all
of Nebraska and on Husker game day most people in Nebraska are listening. Also, invited to the NU
President Milliken’s Tailgate Party and given Husker Tickets for the community out reach performed for
the Douglas Couny Department of Corrections.
Interviewed on KETV 5 PM News, Students, Inmates Are Improving Futures 1 Keystroke At A Time : A
program helping to rehabilitate inmates at the Douglas County Correctional Facility puts students inside
the jail to do some teaching of their own.
http://www.ketv.com/news/10121088/detail.html, Oct. 20, 2006.
Dufner, D. (January 2007) “PKI Students Debunk Myth that Technical People are not People, People”, PKI
Newsletter, Peter Kiewit Institute, Omaha, NE.
Dufner, D. (January 2007) “UNO Students Teach Computer Basics at the Douglas County Department of
Corrections”, Honors Program Newsletter, University of Nebraska at Omaha, Omaha, NE.
2007 Developed an external research lab at the Douglas County Department of Corrections
Editorial Work
Served on the Editorial Board of Communications of the Association of Information Systems (CAIS) and
as an Associate Editor (Ranked 18th of the top 50 IS Journals by CACM) Sept. 2001 to 2005
Professional Memberships
IEEE, PMI
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
2009 Information Technology Development and Implementation Douglas County Department of
Corrections Enterprise-wide Information Technology Development and Implementation, Graduate
Student Internships for 2009-2010 $ $59,364
2009 Information Technology Development and Implementation Douglas County Department of
Corrections Enterprise-wide Information Technology Development and Implementation, Graduate
Student Summer Internship $9,000
Dufner, D., Morcous, M., and Schwer, A. (2005) “Project Management Informatics for Engineering,” PKIUNL-UNO Collaborative Research Grants, $5,000.
Dufner, D. (2005) “Cross-cultural Collaboration: Extending the Reach and Scope of Immigrant Owned
-405-
Businesses in South Omaha through Web and Computer Based Technologies,” Faculty Course
Development Sub-grant, Midwest Consortium for Service-Learning in Higher Education, A Learn & Serve
America Grant from the Corporation for National Service, $2,000.
Holley, L.M., Reed, B.J., and Dufner, D., (2005) “UNO Government Information Systems Management
Research Triangle,” University of Nebraska at Omaha, Omaha, NE. $300.
2004-2005 Obtained funding from the Mayor’s office for a graduate internship to develop and
implement the Mayor’s Hotline System Hotline system. The Hotline System enables citizens of Omaha to
have fast and easy Web based access to the Mayor and city departments for problem resolution. At the
invitation of the Mayor attended with graduate intern, Piyush Shah, a press conference where the new
Hotline was presented by the Mayor and Piyush. $16,442
2005 Learn & Serve America Grant entitled Cross-cultural Collaboration: Extending the Reach and Scope
of Immigrant Owned Businesses through Web and Computer Based Technologies, to the Midwest
Consortium for Service-Learning in Higher Education for funds to assist in developing a service learning
course over the summer. $2,000
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Spring
2007
Spring
2007
Fall 2007
Fall
2007
Spring
Course
number
ISQA 8820
ISQA 4000001
002
098
099
ISQA 8810
ISQA 4000001
002
098
099
ISQA 8810
Semester
hrs
3
Class
size
8
Teaching Computer Basics at the Douglas
County Department of Corrections3
3
12
Introduction to Project Management
Teaching Computer Basics at the Douglas
County Department of Corrections (see
footnote 3)
3
3
11
10
Introduction to Project Management
3
15
Course title
Project Risk Management
3
Teach two sections at the Douglas County Department of Corrections (DCDC), one for the males and the other for the
females. Each semester the classes are taught from 8:00 AM- 9:30 Monday and Wednesday and from 10:00 – 11:30.
Students are assigned to the early class or the later class. I teach at the DCDC from 8 -11:30 Monday and 8 -11:30 Wednesday
approximately 6 hours every week in order to be in class with my students and to be able to offer the class to both male and
female inmates.
-406-
2008
Spring
2008
ISQA
4000-001
and 099
Service
Learning
Fall 2008
ISQA 400099
3
3
5
Teaching Computer Basics at the Douglas
County Department of Corrections (see
footnote 3)
3
3
4
Project Risk Management
Introduction to Project Management
3
3
6
18
3
3
8
Teaching Computer Basics at the Douglas
County Department of Corrections (see
footnote 3)
Honors
Colloquium
ServiceLearning
Fall 2008
Spring
2009
Spring
2009
ISQA 8820
ISQA 8810
ISQA
4000-001
and 099
Service
Learning
Teaching Computer Basics at the Douglas
County Department of Corrections (see
footnote 3)
13. Estimate the percentage of your time devoted to scholarly and/or research activities: __25%___%. Please
give a brief description of your major research and scholarly activities:
Project Management (domain of expertise ― Software Engineering and Telecommunications), ServiceLearning; and Private and Public Sector Information Technology.
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: __IS 100_%.
-407-
-408-
Robert Fulkerson
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Robert A. Fulkerson
Assistant Instructor
Not Applicable
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Assistant Instructor
Dates Held
8/1995
3. Degrees with fields, institutions, and dates
Degree
BS
Field
CompSci
Institution
Creighton University
Date
5/1993
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
Additional work toward MS in Computer Science at Creighton University, 1993 - 1995. All coursework
completed except for 6 hours.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
Learn Perl for CGI Programming / O’Reilly School of Technology / July 2006
Learn SQL for Database Programming / O’Reilly School of Technology / July 2006
Learn PHP / O’Reilly School of Technology / July 2006
Linux/Unix 1 : The Unix File System / O’Reilly School of Technology / July 2006
-409-
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
7. Consulting—list agencies and dates, and briefly describe each project:
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Course Coordinator : CIST 1400, Introduction to Computer Programming (5 hours/week)
Course Coordinator : CIST 1300, Introduction to Web Programming (2 hours/week)
Course Coordinator : CIST 1404, Introduction to Computer Programming Lab (1 hour/week)
Course Coordination for CIST 1400 and CIST 1404 carries additional compensation
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
Computer Science Undergraduate Programming Committee, Fall 2004 – Spring 2008
Computer Science Merit Raise Committee, Spring 2008
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
Maintenance and development of websites at http://morpo.com/ and http://morpo.com/movies/.
Research and development of distance learning course, CIST 1400, for delivery in Spring 2009.
-410-
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Fall 2007
Fall 2007
Fall 2007
Spring 2008
Spring 2008
Spring 2008
Fall 2008
Fall 2008
Fall 2008
Spring 2009
Spring 2009
Spring 2009
Course
number
CIST 1300
CIST 1400
CSCI 2850
CIST 1300
CIST 1400
CSCI 2850
CIST 1300
CIST 1400
CSCI 2850
CIST 1300
CIST 1400
CSCI 2850
Course title
Intro to Web Development
Intro to Computer Programming
Programming on the Internet
Intro to Web Development
Intro to Computer Programming
Programming on the Internet
Intro to Web Development
Intro to Computer Programming
Programming on the Internet
Intro to Web Development
Intro to Computer Programming
Programming on the Internet
Semester
hrs
3
3
3
3
3
3
3
3
3
3
3
3
Class
size
25
56
19
27
47
21
27
56
32
14
24
37
13. Estimate the percentage of your time devoted to scholarly and/or research activities: _10__%. Please give a
brief description of your major research and scholarly activities:
I am working with Drs. Wolcott, Haworth and Pietron researching the use of rubrics in grading CIST 1400
programs.
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-411-
-412-
Ann Fruhling
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Ann L. Fruhling
Associate Professor
Tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Instuctor
Assistant Professor
Associate Professor
Dates Held
Fall, 1998
Fall, 2003
Fall, 2008
3. Degrees with fields, institutions, and dates
Degree
Ph. D.,
M.B.A.
B.S.
Field
Major: MIS Minors:
Computer Science,
Marketing, Strategy
Thesis: “Comprehensive
Business Study and
Strategic Plan for a Rural
Dentist Practice”
BUS. ADMIN
Institution
University of Nebraska – Lincoln,
Date
2003
University of Nebraska-Omaha
1991
Colorado State University
1983
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
Hawaiian International Conference for System Sciences – 2003-2009
-413-
America Conferences for Information Systems – 2002 – 2009
International Conference for Information Systems 2006, 2008
American Medical Informatics Association conference 2005
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
Dates
1983-1986
1986-1987
1987-1988
1988-1990
1990-1998
Where
Texas Instruments
Mutual of Omaha
Commercial Federal Bank
AT&T
College of Saint Mary
Duties
Programmer Analyst
Programmer Analyst
Sr. Programmer Analyst
Member Technical Staff
Director, Computer Information Management and
Telecommunications Systems Management programs,
Associate Professor
7. Consulting—list agencies and dates, and briefly describe each project:
Dates
2004-2008
Agency
Northrup Grumman
Project
USSTRATCom C2SES – Innovation Team – Research
Scholar
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Undergraduate Program Committee
Doctoral Program Committee
Chair, First IS&T Graduation Honors Ceremony
Academic Committee
Technology Committee
RPT Committee
ADROCA, ORTICA
-414-
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
Undergraduate Program Committee
Doctoral Program Committee
Academic Committee
UCAT
University – wide Gender Equity committee
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
Fruhling, A, Siau, K. (2007) Assessing Organizational Innovation Capability and Its Effect on E-Commerce
Initiatives, Journal of Computer Information Systems, 47(4), pp. 91-104.
Fruhling, A. (2006). Examining the Critical Requirements, Design Approaches and Evaluation Methods for
a Public Health Emergency Response System, Communications of the Association for Information
Systems, 18, pp. 431-450.
Fruhling, A., Vreede, G. J., de. (2006). Field Experiences with eXtreme Programming: Developing an
Emergency Response System, Journal of Management Information Systems, 22(4).
Fruhling, A., Lee, S. (2006).The Influence of User Interface Usability on Rural Consumers’ Trust of eHealth Services, International Journal of Electronic Health Care, 2(4), pp.305-321, ISSN Print: 1741-8453,
ISSN: 1741-8461.
Vreede, G.J. de, Koneri, P.G., Dean, D.L., Fruhling, A.L., Wolcott, P. (2006). A Collaborative Software Code
Inspection: The Design and Evaluation of a Repeatable Collaboration Process in the Field, International
Journal of Cooperative information Systems, 15(2), pp. 205-228.
http://www.worldscinet.com/ijcis/ijcis.shtml.
Fruhling, A., McDonald, P., Dunbar, C. (2008). A Case Study: Introducing eXtreme Programming in a
Command and Control System for the US Military, Fortieth-first Hawaii International Conference System
Sciences (85% contribution).
Fruhling, A., Zhang, D. (2007). An Empirical Study Examining the Usage and Perceived Importance of XP
Practices, Proceedings of the Twelfth Americas Conference on Information Systems, AMCIS (85%
contribution).
Fruhling, A., Steinhauser, L., Hoff, G. (2007). Designing and Evaluating Collaborative Processes for
Requirements Elicitation and Validation, Fortieth Hawaii International Conference System Sciences.
(85% contribution).
Johnson, N., Fruhling, A., Sambol, A., Hinrichs, S. (2006). Towards an Evaluation of a Microbiology
Laboratory Electronic Diagnostic System for Public Health, Proceedings of the Twelfth Americas
Conference on Information Systems. (40% contribution).
Johnson, N., Fruhling, A. (2006). Development and Assessment of the STATPack Emergency Response
System, International Conference Information Systems for Crisis Response and Management (ISCRAM),
-415-
Newark, New Jersey, NJIT (50% contribution).
Fruhling, A., Sambol, A., Hinrichs, S., Vreede, G.J. de. (2006). Designing an Emergency Response System
for Electronic Laboratory Diagnostics Consultation, Thirty-ninth Hawaii International Conference System
Sciences (95% contribution).
Koneri, P.G., Vreede, G.J. de, Dean, D.L., Fruhling, A.L., Wolcott, P. (2005). “The Design and Field
Evaluation of a Repeatable Collaborative Software Code Inspection Process” in Fuks, H., Lukosch, S.,
Salgado, A.C. (eds.), Proceedings of CRIWG 2005, LNCS3706, pp. 325-340, Springer Verlag Berlin
Heidelberg, (20% contribution).
Press, L., Qureshi, S., Wolcott, P., Fruhling, A. (2005). A Grand Challenge: Connecting the World’s Rural
Villages (panel), Proceedings of the Eleventh Americas Conference on Information Systems, AMCIS (25%
contribution).
Fruhling, A., Lee, S. (2005). Assessing the Reliability, Validity, and Adaptability of PSSUQ, Proceedings of
the Eleventh Americas Conference on Information Systems, AMCIS (95% contribution).
Fruhling, A, Tyser, K, Vreede, G.J. de. (2005). Experiences with Extreme Programming in Telehealth:
Developing and Implementing a Biosecurity Health Care Application, Thirty-eighth Hawaii International
Conference System Sciences (88% contribution).
deVreede, G.J., Fruhling, A., Chakrapani, A. (2005). A Repeatable Collaboration Process for Usability
Testing, Thirty-eighth Hawaii International Conference System Sciences (40% contribution).
Fruhling, A., and Lee, S. M. (2004). Designing Trustworthy e-Health Services for Rural Consumers,
American Medical Informatics Association Proceedings (95% contribution).
Fruhling, A., deVreede, G.J., Chakrapani, A. (2004). A Repeatable Collaboration Process for Usability
Testing, CORS/INFORMS International Joint Meeting Proceedings (40% contribution).
Fruhling, A., and Lee, S. M. (2004). Examining HCI Usability Factors Affecting Consumers’ Trust in Ehealth Services, Hawaii International Conferences on Computer Sciences Proceedings (95%
contribution).
Fruhling, A., Vreede, G.J. de. (2005). Collaborative Usability Testing to Facilitate Stakeholder
Involvement in S. Biffle, A. Aurum, B. Boehm, H. Erdogmus, P. Gruenbacher (eds), Value Based Software
Engineering, Berlin: Springer-Verlag (in press) (50% contribution).
Fruhling, A. (2007). “Best Practices in Implementing and Managing Agile Information System
Development Processes for Command and Control Operations”, IBM Center for the Business of
Government (proposal accepted), paper in-progress.
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
3.5.1 Internal to UNO
PI
X
Co-PIs
Title of Grant
Amount of
Grant
Funding Entity
Improving System
Requirement
Elicitation and
Traceability of
System Test Plan
Development –
$9,800
NASA Research
-416-
Your
Contribution (%)
100%
Outcomes from the
Award
1 Graduate Student,
Research Paper
2006
3.5.2 External to UNO
PI
CoPIs
Title of Grant
Amount of
Grant
Funding Entity
Your
Contribution
(%)
100%
X
Oklahoma, STATPack™, Laboratory
$23,000
Response
Project continuation -2007
Oklahoma
Health and
Human Services
X
KSU STATPack™,
Laboratory Response
project – 2006
Kansas STATPack™,
Laboratory Response
project - 2006
$25,700
KSU Veterinary
100%
$211,907
Kansas Health
and Human
Services
100%
X
Outcomes from the
Award
X
Oklahoma STATPack™, Laboratory
$185,000
Response
project - 2006
Oklahoma
Health and
Human Services
100%
5 students and two FTE I
IT professionals,
X
Nebraska STATPack™, Laboratory
$37,500
Response
project -2006
Nebraska Health
and Human
Services
100%
STATPack™, Laboratory
Response project
Northrup Gruman C2SES
DoD Research – 4 years
(Fruhling & Zhu) – 2005
Northrup
Gruman
50%
2 graduate/PhD
students for 4 years,
stipend and tuition
X
$555,466
2 Research Papers
completed
X
X
STATPack™ Laboratory
Response project – 2005
continuation
STATPack™ Laboratory
Response project –
Expansion. - 2005
$82,500
Nebraska Health
and Human
Services
Nebraska Health
and Human
Services
$3,700
-417-
100%
100%
2 Research Studies
presented to
STRATCOM Colonels
STATPack™ Laboratory
Response project – 2006
continuation
STATPack™ Laboratory
X
X
X
X
Research Proposal –
(Fruhling, deVreede,
Henninger) “Collaborative
Test Plan Creation to
Accomodate Stakeholders’
Value Propositions in ValueBased Software Engineering”
– Spring, 2005
STATPack™ Laboratory
Response project – Aug 2004
$25,000
STATPack™ Laboratory
Response project – Sept
2004
Information Technology in
Sustaining Rural Health
Delivery Systems - 2002
$36,200
$132,250
$412,538
UNO/UNL
Research
Collaboration
Proposal
Request from
UNL Vice
Chancellor Prem
Paul
Nebraska Health
and Human
Services
Association
Public Health
Labs grant
Nebraska
Research
Initiative
50%
Supported research
funding for two
graduate students
100%
100%
100%
39 proposals were
submitted, 12 proposals
were selected.
2 years funding – year 1
funding for 8
undergraduate and
graduate students each
year.
Provided a prototype to
continue to get grant
funding.
See portfolio
Funded dissertation
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Spring 2009
Fall 2008
Spring 2008
Course
number
ISQA 8080
ISQA 8950
ISQA 8950
ISQA 8040
ISQA 8950
Course title
Seminar: Public Health Informatics
Capstone Management Information Systems
Capstone Management Information Systems
An Overview of System Development
Capstone Management Information Systems
-418-
Semester
hrs
3
3
Class
size
6
12
7
8
10
Fall 2007
CIST 3100
ISQA 8040
Organizations, Applications, and Technology
3
An Overview of System Development
3
Supervise – 6 to 8 research students every year
through my grants.
22
16
13. Estimate the percentage of your time devoted to scholarly and/or research activities: __50___%. Please give
a brief description of your major research and scholarly activities:
Grant, NPHL STATPack - Ongoing Research and System Support, UNMC, Fruhling, A., $98,837, Funded,
(October 1, 2008 - September 30, 2009).
Contract, Kansas STATPack - Research, Development and Support, Kansas Department of Health and
Environment, Fruhling, A., $25,000, Funded, (August 8, 2008 - August 8, 2009).
Grant, Empirical Research on the Transition to an Agile System Development Environment, NASA,
Fruhling, A., $7,500, Funded, (October 2008 - July 31, 2009).
Financial support is requested to support a half-time graduate student to work on a research study to
explore and examine the best practices the transition to agile system development methods namely,
eXtreme Programming (XP) and SCRUM. This research is important because it will help practitioners
successfully introduce and implement the principles and practices of Agile methods into traditional
software development environments.
Grant, Public/Private Laboratory Integration Oklahoma STATPack, Oklahoma, State of, Fruhling, A.,
$24,150, Funded, (April 1, 2008 - May 31, 2009).
Grant, Center for Public Health Informatics, NU Foundation, Fruhling, A., $136,000, Funded, (July 2008 July 2009).
The Center will create a Nebraska-focused information portal designed to provide real time, interactive
access to public health data. This publicly available web site and database will be designed in accordance
with the needs of a wide array of potential users including public health policy makers, public health
workers, academics, and the general public. Members of the UNMC CoPH have developed a number of
important relationships with public health data holders, both in state government and private industry.
Those relationships will allow UNMC to negotiate the appropriate access to information in forms that
would meet the needs of the user community while continuing to satisfy the security and confidentiality
requirements of the original data stewards.
CPHI will conduct a formalized information analysis and data availability assessment to support
current/emerging public health issues. This will include a needs analysis, cataloging existing data
sources, identifying gaps therein, and developing proposals to address those gaps. Focus groups
comprised of stakeholders and potential users will be conducted to determine the level of interest,
-419-
technical ability, and desired scope of content. This will be a critical step to the design of a useful
system. In addition, the CPHI will research appropriate tools, including data formats, and visualization
and reporting tools, to maximize the flexibility and utility of the information portal. The Center will then
pursue national grants (e.g. NIH, NSF, etc.) to gain assistance in addressing both data and technology
voids.
The Center will provide access to a think tank of UNO/UNMC IT, GIS and Public Health researchers and
experts. This human infrastructure will provide assistance on how IT and GIS capabilities can be used to
integrate, visualize, analyze, and disseminate public health information and further research. Both, UNO
and UNMC strategic plans have major outreach components that can be easily incorporated into these
activities.
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%. Not applicable
-420-
Martina Greiner
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Martina E. Greiner
Assistant Professor
Non-tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Assistant Professor
Dates Held
8/18/2008 - Present
3. Degrees with fields, institutions, and dates
Degree
PhD
Dipl.
Oec
Field
Business
Administration
Business
Administration
and Economics
Institution
The University of Georgia
Date
2008
The University of Hohenheim, Germany
2000
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
Joined Clicker-Circle, UNO Academic Year 2008-2009
Evaluating and Learning Adobe Connect for use in the Classroom/ Virtual Office Hours
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
7. Consulting—list agencies and dates, and briefly describe each project:
-421-
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
ISQA Professional Development Committee (2009)
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
“The Business of Open Source”, Richard T. Watson, Marie-Claude Boudreau, Donald Wynn, Martina
Greiner, Paul York; Communications of the ACM, 51 (4), 2008, 41-46
“Opening the Classroom”, Richard T. Watson, Marie-Claude Boudreau, Paul York, Martina Greiner,
Donald Wynn; Journal of IS Education, 19 (1), 2008, 75-85
“A Strategy for Knowledge Management”, Martina Greiner, Thilo Böhmann, Helmut Krcmar; Journal of
Knowledge Management, 11 (6), 2007, 3-15
“A Research Agenda for Studying Open Source I: A Multi-Level Framework”, Fred Niederman, Ashley
Davis, Martina E. Greiner, Donald Wynn, Paul T. York; Communications of the AIS, 18, 2006, 129-149
“A Research Agenda for Studying Open Source II: View Through the Lens of Referent Discipline
Theories”, Fred Niederman, Ashley Davis, Martina E. Greiner, Donald Wynn, Paul T. York;
Communications of the AIS, 18, 2006, 150-175
“Governance and Global Communities”, Richard T. Watson, Marie-Claude Boudreau, Martina Greiner,
Donald Wynn, Paul York, Rusen Gul; Journal of International Management, 11, 2005, 125-142
“Understanding Music Sharing Behavior in China: Development of an Instrument”, Donald Amoroso;
Pamila Dembla; Hui Wang; Martina Greiner; Pengpeng Liu; Americas Conference on Information
Systems (AMCIS) 2008
“Building Consumer-to-Consumer Trust in e-Finance Marketplaces”, Martina Greiner, Hui Wang;
Americas Conference on Information Systems (AMCIS) 2007
“The Benefits of Transaction Cost Economics: The Beginning of a New Direction”, Marie-Claude
Boudreau, Richard T. Watson, Adela J.W. Chen, Martina Greiner, and Peter Sclavos; European
Conference on Information Systems (ECIS) June 07-09, 2007
“Make-or-Buy in the Age of Open Source: A Transaction Cost Analysis”, Martina Greiner, Dale Goodhue;
International Conference on Information Systems (ICIS) Dec 11-14, 2005
“Governance and Global Communities”, Richard T. Watson, Marie-Claude Boudreau, Martina Greiner,
Donald Wynn, Paul York, Rusen Gul; The fifth Annual International Business Research Forum, March 27,
2004
“Governance, Leadership, And Management In Adaptive And Inventive Digital Communities: A Research
Agenda To Reduce Waste In Graduate Education”, Richard T. Watson, Marie-Claude Boudreau, Martina
Greiner, Donald Wynn, Paul York, Rusen Gul; Seventh Bled Conference, June 21-23, 2004
“Leadership Behavior in Virtual Communities”, Martina Greiner; Seventh Annual Conference of the
-422-
Southern Association for Information Systems (SAIS) Feb 27-28, 2004
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Spring 2009
Fall 2008
Course
number
ISQA 8220
ISQA 3310
ISQA 8220
Course title
Advanced Systems Analysis and Design
Managing the Database Environment
Advanced Systems Analysis and Design
Semester
hrs
3
3
3
Class
size
27
18
28
13. Estimate the percentage of your time devoted to scholarly and/or research activities: __60___%. Please give
a brief description of your major research and scholarly activities:
I am currently working on two research streams. The first research stream includes applying
organizational theories to IS issues. In particularly, I am refining Transaction Cost Theory to gain insights
into software procurement decisions. The second research stream is concerned about people-to-people
lending marketplaces and the unique IS and management challenges of these marketplaces.
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-423-
-424-
Dwight Haworth
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Dwight A. Haworth
Associate Professor
Tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Associate Professor
Dates Held
1990-Present
3. Degrees with fields, institutions, and dates
Degree
Ph.D.
B.S.
Field
MIS
General
Science
Institution
Texas Tech University
United States Air Force Academy, Colorado
Date
1990
1963
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
Eighth Annual IBER & TLC Conference, 2008
Distance-Education Workshop, Fall 2007
Teaching and Learning Conference, Oahu, Hawaii, January 2-6
Teaching and Learning Conference, Cancun, Mexico, March 20-25, 2006
Teaching and Learning Conference, Puerto Vallarta, Mexico, March 12-19, 2005
-425-
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
Dates
1986-1990
1984-1986
1982-1984
1982-1984
Where
College of Business
Administration, Texas Tech
University
College of Business
Administration, Texas Tech
University
Central Texas College
Overseas, Yongsan Garrison,
Korea
Far East District, Corps of
Engineers, Seoul, Korea
Duties
Teaching assistant. Taught business communication,
introductory management science, and file structures
courses.
Teaching assistant. Assisted faculty with grading,
proctoring, and preparation for audio-visual materials
for undergraduate business communication.
Instructor. Instructed in computer programming,
systems analysis and design, and computer operating
systems.
Programmer-analyst. Automated the preparation and
update of Current Working Estimates for major and
minor military construction projects throughout Korea.
7. Consulting—list agencies and dates, and briefly describe each project:
Dates
1981-1982
Agency
Gyeong-Gi, Seoul, Korea
Technical Education
Research Center
Project
Curriculum Consultant. Designed and assisted with
implementation of undergraduate computer information
systems curriculum.
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Member of Faculty Senate
Member of Faculty Senate Professional Development Committee
Member of Faculty Academic Policy Committee of the division of Continuing Studies
Working Member of NUCIA
Member of Distance Education Steering Committee
Member of the Academic Committee
Member of the ABET Steering Committee
Chairman of UPC for Bachelors in MIS
-426-
Library Representative for Department
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
Library Representative for Department (2004- )
Member of Distance Education Steering Committee (2007- )
Member of the ABET Steering Committee (2007- )
IA Undergraduate Program Committee (2007-2008)
NDU MOU (2007-2008)
Faculty Academic Policy Committee (2004-2008)
ISQA Undergraduate Program Committee (2004-2008)
Library and Learning Resources Committee (2005-2007)
University Committee on Research (2004-2007)
Recruiting Committee Member (2004-2005)
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
Haworth, D.A. and Pietron, L.R. Sarbanes-Oxley: Achieving compliance by starting with ISO 17799.
Information Systems Management, 23 (2006), 1, 73-87
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Spring 2009
Course
number
ISQA 3300
ISQA 8546
Course title
File Structures for Information Systems
Computer Security Management
-427-
Semester
hrs
3
3
Class
size
25
8
Fall 2008
Summer
2008
Spring 2008
Fall 2007
ISQA 8560
CIST 4540
ISQA 3300
ISQA 8546
ISQA 8560
CIST 4540
CIST 2500
Information Warfare & Security
Computer Security Management
File Structures for Information Systems
Computer Security Management
Information Warfare & Security
Computer Security Management
Intro to Appliet Stats for IS & T
3
3
3
3
3
3
3
3
6
13
13
12
5
11
ISQA 3300
ISQA 8546
ISQA 8560
CIST 4540
ISQA 3300
ISQA 8546
ISQA 8560
CIST 4540
File Structures for Information Systems
Computer Security Management
Information Warfare & Security
Computer Security Management
File Structures for Information Systems
Computer Security Management
Information Warfare & Security
Computer Security Management
3
3
3
3
3
3
3
3
4
4
10
10
7
7
12
9
13. Estimate the percentage of your time devoted to scholarly and/or research activities: _____%. Please give a
brief description of your major research and scholarly activities:
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-428-
Mary Levesque
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Mary L. Levesque
Assistant Instructor
NA
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Temporary Assistant
Instructor
Assistant Instructor
Dates Held
01/01/2000 – 08/31/2002
09/01/2002 – present
3. Degrees with fields, institutions, and dates
Degree
BA
Field
Music
Institution
Duchesne College of the Sacred Heart, Omaha
Date
Aug. 1968
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
15 years of programming and instruction at Mutual of Omaha
Completed CIST 1100 (C++ version) at UNO
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
None
-429-
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
Dates
1972-1973
1974-1978
Where
Mutual of Omaha
Mutual of Omaha
1983-1985
1985-1994
1994-1996
Various for-profit schools
Mutual of Omaha
Mutual of Omaha
Duties
Software Development
Teaching; developing custom courses related to
mainframe programming – use of utilities, JCL,
debugging
Taught COBOL
Developed and taught PC courses
Production support
7. Consulting—list agencies and dates, and briefly describe each project:
Dates
Agency
Project
Act as informal consultant for colleagues regarding Excel
and Word formatting problems, as well as for an
occasional outside person who calls UNO for help.
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Course Coordinator for CIST 1100
Course Coordinator for CSCI 1000
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
-430-
None
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
None, although I authored one article for a genealogy magazine and assisted with another.
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
None
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Fall 2007
Fall 2007
Fall 2007
Fall 2007
Spring 08
Spring 08
Spring 08
Spring 08
Fall 2008
Fall 2008
Fall 2008
Fall 2008
Spring 09
Spring 09
Spring 09
Spring 09
Spring 09
Course number
CIST 1100 001
CIST 1100 002
CIST 1100 003
CSCI 1000 004
CIST 1100 001
CIST 1100 850
CSCI 1000 004
CSCI 1000 005
CIST 1100 001
CIST 1100 002
CIST 1100 850
CSCI 1000 006
CIST 1100 001
CIST 1100 850
CSCI 1000 004
CSCI 1000 005
CSCI 1000 850
Course title
Introduction to Computing
Introduction to Computing
Introduction to Computing
Computer Literacy with Applications
Introduction to Computing
Introduction to Computing
Computer Literacy with Applications
Computer Literacy with Applications
Introduction to Computing
Introduction to Computing
Introduction to Computing
Computer Literacy with Applications
Introduction to Computing
Introduction to Computing
Computer Literacy with Applications
Computer Literacy with Applications
Computer Literacy with Applications
-431-
Semester
hrs
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
Class
size
22
39
16
14
18
14
15
19
24
21
13
30
14
9
7
10
15
13. Estimate the percentage of your time devoted to scholarly and/or research activities: 10%. Please give a brief
description of your major research and scholarly activities:
I use my computer skills to help others research their genealogy. Most of this is done after hours,
however.
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-432-
Lotfollah Najjar
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Lotfollah Najjar
Associate Professor
Tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Instructor
Lecturer
Assistant Professor
Associate Professor
Dates Held
8/89-8/99
8/99-8/01
08/01 – 08/07
08/07- Present
3. Degrees with fields, institutions, and dates
Degree
Ph.D.
Ph.D.
Student
MS
BS
Field
Major: Industrial Engineering and
Management Systems
Minor: MIS and Operation
Management
Statistics and Mathematics
Statistics and Mathematics
Industrial Engineering and Management
Systems
Institution
University of NebraskaLincoln
Date
University of NebraskaLincoln
University of NebraskaLincoln
University of NebraskaLincoln
01/19885/1992
05/1987
-433-
08/2002
05/1984
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
PhD. with major in Industrial Engineering and Management Systems and minor in MIS (took 7 courses in
MIS field) Have taken 21 hours MIS courses: System Analysis and Design, Database, Decision Support
Systems, Data Communications, Management Information Systems, Seminar in MIS, and Artificial
Intelligence.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
Kamal, M., Qureshi, S. , and Najjar, L. (2008).“ a Global Analysis of the Effect of IT Capacity on
Development-Undrestanding Sourcing of Skills.” International Conference on Information Resources
Management (Conf-IRM) May 18-20, 2008 .Niagara Falls, Ontario, Canada.
Tarmizi H. and Najjar, L. (2007). “Rethinking E-Comerce Research by Connecting IT to Activities on Line
Community”. MWAIS, May 18-19, Springfield, IL.
Kamal, M., Zhang, Chi, Najjar, L., & Qureshi, S. (2007). “Human Development through Information &
Communication Technologies: Theoretical & Empirical Support.” Second Annual Midwest United States
Association for Information Systems Conference (MWAIS-02), May 18-19, Springfield, Illinois.
Kamal M., Zhang C., Najjar, L. and Qureshi S. (2007). “Human Development through Information &
Communication Technologies: Theoretical & Empirical Support”. MWAIS, May 18-19, Springfield, IL.
Tarmizi H. and Najjar, L. (2006). “Empirical study on Communities of Practice and E-commerce: influence
of community of practice on pricing on eBay”. (AMCIS 2006), August 10-13, Acapulco, Mexico.
Uttamchandani, R, Najjar, L, and Bishu, R.R. (2005) “Alternate Training Methods for an Optically
Measuring Inspection Device: A Comparative Study.” In the Proceedings of the 10th Annual International
Conference on Industrial Engineering – Theory, Applications and Practice Clearwater, Florida, USA.
December 7-9. pp. 474-478.
Najjar, L.and Bishu, R. (2005).” Information Quality in the Banking Industries”. Proceedings of the
Eleventh American Conference on Information Systems (AMCIS), August 10-13. Omaha, Nebraska, pp.
3190-3198.
Najjar, L. Eftekari, H. (2005). “Consumers’ Perception of the Quality Internet Banking”. Midwest
Economics Association Meetings, 69th Annual Meetings, Milwaukee, WI. March 14-17.
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
Dates
Where
Duties
-434-
08/96-08/02
2/95-6/95
2/89-8/89
Department of Industrial Engineering
and Management Systems, University
of Nebraska-Lincoln
Department of Biometry, University
of Nebraska-Lincoln
Veterinary Diagnostic Center,
University of Nebraska- Lincoln
January 2005
Baton Rouge, LA
June 2004
Scott Center Hall, PKI
Project Management Institute (PMI).
Guest Lecturer:
Courses taught have included Quality Control
(821), and Applied Statistics (822).
SAS Programmer:
Performed SAS programs for statistical
analysis for faculty and client research.
Involved in many projects for the College of
Dentistry and College of Agriculture.
Consulted on and performed projects
(statistical analysis and SAS programming)
for private industry in conjunction with
faculty of Biometry Department.
Analyst III:
Performed statistical analysis in
toxicology lab using Experimental
design, regression analysis (linear and
nonlinear) and non-parametric analysis
to test and validate the specific effects
of different substances on cattle.
Involved in many projects in
conjunction with Pharmaceutical
College at the University of Nebraska
Medical Center.
Attending 6-day class (SAP software on
Business Process Reengineering). LSU
Project Management Institute (PMI).
Work Shop on :
“Business Process Reengineering with IT”
7. Consulting—list agencies and dates, and briefly describe each project:
Dates
1996 and
2000
Agency
Nebraska Printing and
Lithography. Fremont Nebraska
Project
Quality improvement and data analysis.
-435-
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Course Coordinator for :
CIST 2500 and ISQA 4150/8206
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
Committee
Library Dean Search Committee
Technology Committee
UNO Judicial Committee
IS&T Academic Committee
ISQA Undergraduate Program Committee
UNO Professional Development & Concerns Committee
Position
Member
Member
Member
Member
Member
Member Chair
ISQA Undergraduate Program Committee
Member
Date
2004-2007
2003-2007
2002-2006
2002-2005
2002-2006
2002-2005
2006-2008
2009-present
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
10.1 Refereed Journals
Aghazadeh M., Najjar L., and Huq, Z. “Environment and Resolutions to Avoid Discontinuity in Supply
Chain Management” International Journal of Risk Assessment and Management. Forthcoming, 2008.
Azadmanesh A., A. Farahani, L. Najjar, “Fault Tolerant Weighted Voting Algorithms”, Int’l Journal of
Network Security, Forthcoming, 2008.
Luo, Mingchu , Najjar, L and Huang, Wenmin. “The Impact of Chinese Student School Performanceon
their Perceptions of School Ethical Climate”. Journal of Moral Education. Accepted with minor revision.
(August 2006).
Najjar, L., Schniederjans, Marc. J. (2006). “Information Quality Benchmarking: A Banking Industry Case
Study in the Product and Service Performance.” Quality and Quantity, International Journal of
Methodology. Vol. 40, No. 3, pp. 419-434.
-436-
Luo, Mingchu , Najjar, L (2006). “The Chinese Principal Leadership Capacities as Perceived by Master
Teachers.” The Academic Leadership Journal, 4(3). Summer 2006.
Najjar, L.and Bishu, R. (2005). “Service Quality in Banking Industries”. Quality Management Journal.
Volume 12(3), pp 35-44.
Liu, L., Bishu, R., and Najjar, L. (2005). “Using the Analytical Hierarchy Process as a Tool for Assessing
Service Quality.” International Journal of Industrial Engineering and Management Systems. Vol. 4(2),
pp.129-135.
10.2 Refereed Proceedings:
Kamal, M., Qureshi, S. , and Najjar, L. (2008).“ a Global Analysis of the Effect of IT Capacity on
Development-Undrestanding Sourcing of Skills.” International Conference on Information Resources
Management (Conf-IRM) May 18-20, 2008 .Niagara Falls, Ontario, Canada.
Tarmizi H. and Najjar, L. (2007). “Rethinking E-Comerce Research by Connecting IT to Activities on Line
Community”. MWAIS, May 18-19, Springfield, IL.
Kamal, M., Zhang, Chi, Najjar, L., & Qureshi, S. (2007). “Human Development through Information &
Communication Technologies: Theoretical & Empirical Support.” Second Annual Midwest United States
Association for Information Systems Conference (MWAIS-02), May 18-19, Springfield, Illinois.
Kamal M., Zhang C., Najjar, L. and Qureshi S. (2007). “Human Development through Information &
Communication Technologies: Theoretical & Empirical Support”. MWAIS, May 18-19, Springfield, IL.
Tarmizi H. and Najjar, L. (2006). “Empirical study on Communities of Practice and E-commerce: influence
of community of practice on pricing on eBay”. (AMCIS 2006), August 10-13, Acapulco, Mexico.
Uttamchandani, R, Najjar, L, and Bishu, R.R. (2005) “Alternate Training Methods for an Optically
Measuring Inspection Device: A Comparative Study.” In the Proceedings of the 10th Annual International
Conference on Industrial Engineering – Theory, Applications and Practice Clearwater, Florida, USA.
December 7-9. pp. 474-478.
Najjar, L.and Bishu, R. (2005).” Information Quality in the Banking Industries”. Proceedings of the
Eleventh American Conference on Information Systems (AMCIS), August 10-13. Omaha, Nebraska, pp.
3190-3198.
Najjar, L. Eftekari, H. (2005). “Consumers’ Perception of the Quality Internet Banking”. Midwest
Economics Association Meetings, 69th Annual Meetings, Milwaukee, WI. March 14-17.
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
11.1 Sabbatical:
Fall 2008-Present: University of Jibail, Saudi Arabia. Department of Business Administration. Teaching
courses in MIS.
-437-
11.2 Manuscript Reviewer
Year
Journal’s (or Conference) Name
Topic of the articles
March 2009
2009 International Conference on
Information Resources Management (ConfIRM)
2009 International Conference on
Information Resources Management (ConfIRM)
2009 International Conference on
Information Resources Management (ConfIRM)
Journal of Management Information
Systems (JMIS)
International Conferences On Information
Systems (ICIS 2007)
American Conferences On Information
Systems (AMCIS 2007)
American Conferences On Information
Systems (AMCIS 2007)
American Conferences On Information
Systems (AMCIS 2006)
Affect and Aesthetics in ICT Design and Use.
March 2006
American Conferences On Information
Systems (AMCIS 2006)
Paradox of Information Quality: Do Consumers Pay More for
Premium Information on Products on E-commerce Sites?
June 2005
IEEE Transactions on Engineering
Management
International Journal of Information
Technology and Decision Making
IEEE Transactions on Engineering
Management
2004 DSI Annual Meeting
Information-Centric Assessment of Software Metrics Practices
(second revision).
SFTIS: A Decision Support System for Tourism Demand Analys
and Forecasting.
Information-Centric Assessment of Software Metrics Practices
March 2009
March 2009
July 2007
May 2007
May 2007
May 2007
March 2006
July 2004
June 2004
May 2004
Inter Process Communication & Prioritization to Enable Deskt
Advertisement Mechanism.
The Challenges in Establishing a Government Interoperability
Framework: The e-PING Brazilian Case
A Principal Component Analysis Approach to Web Page
Categorization.
Participants’ Repeat-Visiting Behavior in an Online Community
of Practice.
Reliability Generalization of Perceived Ease of use, Usefulness
and Behavioral Intentions.
Context, Process and Outcomes of ISD: An Allegorical Tale.
The News: Examining perceptions of information product
quality (IPQ).
1. An Implication of using Open Software (OSS): an
overview of OSS, and users’ and developers’
benefits and challenges.
2. Effect of Interface Style on User Perception and
Behavioral Intention.
3. Electronic Payment Systems: Foundations,
Taxonomies and Implementation Issues.
4. Personal Web Usage at the workplace: Can
it improve job satisfaction?
5. Two approaches to extract related information
from Web pages.
11.3 Research and Development Grants funded and/or completed:
-438-
Najjar, L., Khazanchi, D., and Wolcott, P. (3/1/2008 to 3/20/2009; Completed) ."Business Database
Competitive Audit Project". Awarded a grant of $20,000 for conducting a business database audit for
InfoUSA. This project is being conducted under the auspices of the PKI Technology Development Corp
(PKITDC).
Najjar, L., Khazanchi, D., and Wolcott, P. (1/1/2005 to 3/1/2005; Completed) "Business Database
Competitive Audit Project". Awarded a grant of $14,575 for conducting a business database audit for
InfoUSA. This project is being conducted under the auspices of the PKI Technology Development Corp
(PKITDC).
11.4 Research Grants submitted and under review:
Azad Azadmanesh, Computer Science, College of IST, UNO, Lotfollah Najjar, Information Systems &
Quantitative Analysis (ISQA), College of IST, UNO. “Electronic Student Companion.” (University of
Nebraska Foundation and Student Technol;ogy Fees). February, 2007.
Azad Azadmanesh, Computer Science, College of IST, UNO, Lotfollah Najjar, Information Systems &
Quantitative Analysis (ISQA), College of IST, UNO , and Krings , director of the Survivability Laboratory
Testing at University of Idaho . “Consensus in Wireless Networks.” (NSF). March, 2006.
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Year/term
2006/Fall
2007/ Spring
Course number
ISQA 9130
ISQA 8196
2007/Spring
ISQA 4190
2007/Spring
ISQA 8340
2007/Spring
ISQA 8206
2007/Spring
2007/Spring
ISQA 4200
ISQA 9080
2007/Summer
ISQA 9120
Credit
s
3
3
No. of
students
9
7
3
4
Advanced Regression Analysis
3
3
Information Quality and data
management
//
Research Directions in
Information Technology
Application Of Design of
Experiment
3
2
3
3
5
8
3
3
Course title
Multivariate Data Analysis
Process Reengineering with IT
//
-439-
2007/Fall
2007/Fall
ISQA 9130
Cist 2500
2008/Spring
2008/Spring
CIST 2500
ISQA 9080
2008/Spring
2008/Spring
2008/Summer
ISQA 8196
ISQA 4190
ISQA 9120
Multivariate Data Analysis
Introduction to Applies Statistics
for IS&T
// (Distancd Education)
Research Directions in
Information Technology
Process Reengineering with IT
//
Application Of Design of
Experiment
3
3
4
21
3
3
6
15
3
3
3
10
3
3
13. Estimate the percentage of your time devoted to scholarly and/or research activities: ____50_%. Please give
a brief description of your major research and scholarly activities:
Information Quality, Quality Management, Data Mining, and Process Reengineering.
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-440-
Stacie Petter
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Stacie Petter
Assistant Professor
Untenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Assistant Professor
Dates Held
2006 – Current
3. Degrees with fields, institutions, and dates
Degree
Ph.D.
M.B.A.
B.S.
Field
Computer
Information
Systems
Computer
Information
Systems
Computer
Science
Institution
Georgia State University
Date
5/2006
Georgia State University
8/2002
Berry College
12/1999
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
Americas Conference on Information Systems (8/2004)
Americas Conference on Information Systems (8/2005)
Seattle Innovation Symposium (10/2005)
-441-
International Conference on Information Systems (12/2005)
International Conference on Information Systems (12/2006)
International Research Workshop on IT Project Management (12/2006)
Clicker Teaching Circle (AY 2007-2008)
Americas Conference on Information Systems (8/2007)
Project Management Institute Heartland Chapter ProDev (9/2007)
International Research Workshop on IT Project Management (12/2007)
International Conference on Information Systems (12/2007)
Clicker Teaching Circle (AY 2008-2009)
International Conference on Design Science and Information Systems & Technology (5/2008)
Midwest Conference for the Association of Information Systems (5/2008)
International Research Workshop on IT Project Management (12/2008)
International Conference on Information Systems (12/2008)
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
Dates
6/2003 –
3/2006
Where
Georgia State University
8/2002 –
5/2006
Georgia State University
6/2000 –
4/2002
11/1999 –
5/2000
Vista IT
1/1999 –
10/1999
Berry College
Network One
Duties
Graduate Teaching Assistant – responsible for teaching
undergraduate and graduate courses; teaching assistant
for graduate and executive MBA course
Graduate Research Assistant – responsible for
conducting research, performing literature reviews, and
writing papers with various professors in the area of
computer information systems
Senior Consultant – developed applications for clients,
performed requirements analysis and system design
Application Developer – developed and maintained
applications for internal use, performed requirements
analysis and system design
Help Desk Coordinator – managed a help desk for
centralized IT department, developed applications and
processes to support help desk
7. Consulting—list agencies and dates, and briefly describe each project:
-442-
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
ISQA Graduate Program Committee (0.5 hours/week)
Graduate Council (0.5 hours/week)
Graduate Council Committee B (0.5 hours/week)
Graduate Council Scholarship Committee (0.5 hours/week)
ISQA Reappointment, Promotion, and Tenure Committee (0.1 hours/week)
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
ISQA Graduate Program Committee (2008 – Current)
ISQA Reappointment, Promotion, and Tenure Committee (2006 – 2008)
ISQA Faculty Recruitment Committee (2007-2008)
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
Petter, S. (2008) Managing User Expectations on Software Projects: Lessons from the Trenches,
International Journal of Project Management, 26(7).
Petter, S., DeLone, W. and McLean, E. (2008) Measuring Information Systems Success: Models,
Dimensions, Measures, and Interrelationships, European Journal of Information Systems, 17(3).
Petter, S. and Vaishnavi, V. (2008) Facilitating Experience Reuse among Software Project Managers,
Information Sciences. 178(7).
Khazanchi, D., Murphy, J.D., and Petter,S. (2008) Guidelines for Evaluating Patterns in the IS Domain,
Midwest Association for Information Systems Conference, Eau Claire, WI.
Murphy, J.D., Petter, S., Cheng, K., and Briggs, R.O. (2008) Hitting the Collaboration Target: ComputerGuided thinkLet Selection, International Conference on Design Science Research in Information Systems
and Technology, Atlanta, GA.
Petter, S. Khazanchi, D., and Murphy, J.D. (2008) A Design Science Based Evaluation Framework for
Patterns, International Conference on Design Science Research in Information Systems and Technology,
Atlanta, GA.
Randolph, A. and Petter, S. (2008) Is it Who You Know or What You Know: Social Capital Theory in IT
Project Management, International Research Workshop on IT Project Management, Paris, France.
Petter, S., Straub, D., and Rai, A. (2007) Specifying Formative Constructs in Information Systems
Research, MIS Quarterly, 31(4).
Petter, S., Mathiassen, L, and Vaishnavi, V. (2007) Five Keys to Project Knowledge Sharing, IT
-443-
Professional, May/June.
Petter, S. (2007) Managing User Expectations on Software Projects: Lessons from the Trenches,
International Research Workshop on IT Project Management, Montreal, Quebec, Canada.
Petter, S. (2007). A Process to Reuse Experiences via Written Narratives among Software Project
Managers, A Design Science Research Proposal Improving and Innovating Information & Communication
Technology: Design Science Research Methods and Patterns, V. Vaishnavi and W. Kuechler (Eds.), Taylor
and Francis.
Petter, S. and Vaishnavi, V. (2007) A Generic Process for Individual Knowledge Reuse: Potential
Problems and Solutions, Americas Conference on Information Systems, Keystone, CO.
Khazanchi, D. and Petter, S. (2006). “The Need for Improved IT Project Management in e-Service
Projects and Beyond,” e-Service Journal, (5:1).
DeLone, W., McLean, E., and Petter, S. (2005). Success of Information Systems: Measuring the
Effectiveness of Information Systems, Blackwell Encyclopedia of Management, 2nd edition, G.B. Davis
(Ed.), Blackwell Publishing.
Kuechler, W., Vaishnavi, V. and Petter, S. (2005). The Aggregate General Design Cycle as a Perspective
on the Evolution of Computing Communities of Interest, Computing Letters, 1(3).
Petter, S., Sevcik, G. and Straub, D. (2005). Transferring Technology to the Developing World,
Encyclopedia of Information Science and Technology, M. Khosrow-Pour (Ed.), Idea Group Publishing.
Petter, S. and Gallivan, M. (2004). Toward a Framework for Classifying and Guiding Mixed Method
Research in Information Systems, Hawai'i International Conference on System Sciences, Waikoloa, HI.
Petter, S. and Vaishnavi, V. (2004) Towards a Model to Support Knowledge Transfer among Software
Project Managers, Americas Conference on Information Systems, New York, NY.
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
Managing in a Digital World STEM Grant for $4500 (2007)
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Fall/2007
Fall/2007
Spring/
2007
Spring/
2007
Fall/2008
Fall/2008
Course
number
ISQA 3420
ISQA 8210
ISQA 3420
Course title
Managing in a Digital World
Management of Software Development
Managing in a Digital World
Semester
hrs
3
3
3
Class
size
17
21
26
ISQA 8210
Management of Software Development
3
24
ISQA 3420
ISQA 8210
Managing in a Digital World
Management of Software Development
3
3
19
27
-444-
Spring/
2009
Spring/
2009
ISQA 3420
Managing in a Digital World
3
22
ISQA 8210
Management of Software Development
3
26
13. Estimate the percentage of your time devoted to scholarly and/or research activities: __45___%. Please give
a brief description of your major research and scholarly activities:
Conducting research related to sharing experiences related to software project management.
Examining measures and predictors of information system success.
Developing approaches and guidelines for research methods.
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: ___IS - 100__%.
-445-
-446-
Leah Pietron
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Leah R. Pietron
Associate Professor
Tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Associate Professor
Assistant Professor
Dates Held
Fall 1991 to Present
Fall 1985 to Fall 1991
3. Degrees with fields, institutions, and dates
Degree
PhD
MBA
MS
BS
Field
Business Education/
Information Systems
Business Administration/
Economics
Business Education/
Vocational Education
Comprehensive Business
Education/ Physical
Education
Institution
University of North Dakota
University of North Dakota
Date
August
1979
August
1985
May 1977
Mayville State College
May 1972
Northwest Missouri State University
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
Advanced Information Systems Faculty Development Institute, Indiana University, Bloomington, IN. July
7-July 31, 1989. Certificate of Attendance. Sponsored by the American Assembly of Collegiate Schools
of Business (AACSB).
Information Systems Faculty Development Institute, St. Paul, MN. July 6-August 7, 1987. Certificate of
Attendance. Sponsored by the American Assembly of Collegiate Schools of Business (AACSB).
Continuous enrollment in courses at UNO, SANs Security Training, Seminars, etc
-447-
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
Teaching Circles, "Web Collaboration". (2008 - 2009).
Rubrics Research Triangle (2008 to Current)
Completed the CISSP Certification Examination on November 18, 2006
Attempting the CISA Certification Examination on December 10, 2006
Attended CISSP Certification Session at PKI, Summer 2006
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
Dates
Summer
2007
May 2006
Where
Lockheed Martin
Summer/Fall
2004
Union Pacific Railroad
Company
Summer
2002
Fall 2001
December
2000
City of Omaha
Summer
2003
Fall and
Spring 2000
Fall 1999 and
Spring 2000
College of IS & T
StatPak, UNO
Pamida and ShopKo
MSI Systems Integrators
Duties
Worked on a Service-Oriented Architecture project. My
focus was on IT Goverance and SOA Policy.
Conducting a vulnerability assessment with Dwight
Haworth on the application.
Sarbanes-Oxley Compliance Review – worked with
Dwight Haworth on
evaluation of the ISO/IEC
17799 evaluation and identifying deficiencies in their
documentation and controls for Sarbanes-Oxley
compliance.
Created the Geographical Information Systems Strategic
Plan for Omaha Police Department
PeopleSoft Security Tree Manager - Faculty Internship
Consultant – worked on the PeopleSoft installation –
focused on Human Resources application
Faculty Internship with Steve Stock developing Security
Policies and Procedures for the
CASE Training for PMIC – user training for analysts on
the use of Excelerator
Created and delivered faculty development workshops
on the use of media in classrooms for the College of
Business Administration
7. Consulting—list agencies and dates, and briefly describe each project:
Dates
Summer-Fall
2005
Spring 2004
Agency
Union Pacific
Project
Completed Sarbanes-Oxley Compliance Asssessment
Werner Trucking Company
Conducted a Physical Security Review
-448-
Spring 2002Fall 2002
Omaha Police Department
Fall 2000Spring 2001
Pamida and ShopKo
PeoplePlus
Fall 2000Spring 2001
City of Omaha
Developed Strategic Plan for the Geographical
Information Systems
Developed a Security Model for PeopleSoft
Worked a faculty internship and created the security
tree
PeopleSoft Consulting – created documentation for the
Project Management
Worked with Peter Wolcott, Donna Dufner, and Ilze
Zigurs defining the project for the City of Omaha’s
Mayor’s Hotline – this project became a service learning
project
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
University of Nebraska Online Worldwide Instructional Designers and Faculty Steering Committee
University Committee on the Advancement of Teaching
MIS Graduate Program Committee
Undergraduate Program Committee
Academic Program Committee
Proposed MS in Information Assurance
Distance Education Steering Committee
Information Assurance Undergraduate Program Committee
Information Assurance Undergraduate Program Committee
IS&T ABET Committee
Information Assurance Recruitment Committee
ISQA Assistant Professor Recruitment Committee
UNO ISACA Education Advocate
Educational Policy Advisory Committee
Distance Education Advisory Committee
Academic Planning Council
Academic Program Review for the Computer Science Department
Distance Education Director's Forum
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
IS & T Technology Committee (2003-Present)
Dean’s Expanded Executive Committee (2002-Present)
University Committee on the Excellence Teaching Award (2005-2007)
-449-
Computer Usage and Technology Committee (2002-2005)
UNO Athletic Committee (2002-2005)
Academic Subcommittee of the Computer Usage Committee (2002-2005)
Strategic Planning Committee (2005-2008)
Accreditation and Program Committee (2005-Current)
IS & T Dean’s Search Committee (2005-2008)
ISQA Undergraduate Program Committee (2002-2007)
ISQA Graduate Program Committee (2004-2008)
ISQA Faculty Recruitment Committee (2005-2008)
Member, Colloquium for Integrative Media (2004-2005)
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
"Synchronous Collaboration in Systems Development Education – Issues and Recommendations for the
Virtual Classroom.", Van Vliet, P., Pietron, L., Decision Sciences Institute.
Structured Systems Analysis, Information Warfare Journal, March 2006, by Dwight A. Haworth and Leah
R. Pietron.
Sarbanes-Oxley: Achieving Compliance by Starting with ISO 17799 by Dwight A. Haworth and Leah R.
Pietron, Published in Information Systems Management, Vol.23, No. 1, pp. 73-87. Refereed.
Alanah J. David, Mehruz Kamal, Terrance V. Schoonover, Josephine Nabukenya, Leah R. Pietron, Gert-Jan
de Vreede, Collaboration Engineering For Incident Response Planning: Process Development and
Validation, HICCS Conference, Refereed publication, January 2007.
Alanah J. David, Mehruz Kamal, Terrance V. Schoonover, Josephine Nabukenya, Leah R. Pietron, Gert-Jan
de Vreede, Incident Response Planning Using Collaboration Engineering Process Development and
Validation, ICIS Conference, WISA 2006 Workshop, Refereed publication December 2006.
Gwendolyn Kolfschoten, Gert-Jan de Vreede, and Leah Pietron, "A Training Approach for the Transition
of RepeatableCollaboration Processes to Practitioners", Refereed Proceedings for the Conference, GDN
Conference, Karlsruhe, Germany, June 2006.
Alanah J. David, Mehruz Kamal, Terrance V. Schoonover, Josephine Nabukenya, Leah R. Pietron, Gert-Jan
de Vreede, Collaboration Engineering For Incident Response Planning: Process Development and
Validation, Journal of Information Security, Refereed publication, January 2008.
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
Grant, UNO Technology Grant, Development of a HDTV Classroom, $50,000, College of Information
Technology & Science, Funded ($25,000)
Grant, Distance Education Development Grant, College of Information Technology & Science, Pietron, L.,
$1,000.00, Funded, (January 11, 2009 - May 9, 2009).
Grant, Distance Education Development Grant, College of Information Technology & Science, Pietron, L.,
$1,000.00, Funded, (January 11, 2009 - May 9, 2009).
-450-
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Spring 2009
Fall 2008
Summer 2008
Spring 2008
Fall 2007
Course
number
CIST 3600
ISQA 8570
ISQA 8580
ISQA 4110001
ISQA 4110002
ISQA 8040
ISQA 4110
CIST 3600
ISQA 8570
ISQA 8580
CIST 3600
ISQA 4110001
ISQA 4110002
Course title
Information Security and Policy
Info Security, Policy, and Ethics
Security Risk Management and Assessment
Information System Analysis
Semester
hrs
3
3
3
3
Class
size
24
11
10
20
Information System Analysis
3
26
An Overview of System Development
Information System Analysis
Information Security and Policy
Info Security, Policy, and Ethics
Security Risk Management and Assessment
Information Security and Policy
Information System Analysis
3
3
3
3
3
3
3
14
10
17
12
10
13
18
Information System Analysis
3
30
13. Estimate the percentage of your time devoted to scholarly and/or research activities: 25__%. Please give a
brief description of your major research and scholarly activities:
My research focus is on pedagogical issues in systems development and information security. I have
been working on two distance education articles, one virtual communities for information security, and
use of rubrics in programming classes.
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%
-451-
-452-
Sajda Qureshi
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Sajda Qureshi
Associate Professor
Tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Associate Professor
Dates Held
2002-Present
3. Degrees with fields, institutions, and dates
Degree
Ph.D
M.S
Postgrad
uate
Diploma
MBA
Field
Analysis, Design
and
Management of
Information
Systems
MIS
Business
Administration
GCE Ordinary
Level (10
Subjects),
GCE Advanced
Level (3
Subjects).
Institution
London School of Economics and Political Science
London School of Economics and Political Science
Date
1991-95
1989-91
London School of Economics and Political Science
1988-89
John Cabot University
1985-88
St. Georges English School
1980-85
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
-453-
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
Teaching Assessment By Students, Spring 2008
Teaching Circle: Continuous Improvement in Teaching Fall 2007
HICSS 2008
HICSS 2006-2007
HICSS 2005-2006
WSIS 2005
HICSS 2004-2005
AMCIS 2005
ICIS 2005
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
Dates
2009
2005
1997-2004
1996
1996
1992-1995
Where
University of Washington
Westminster Business
School
Erasmus University.
Rotterdam School of
Management
University of Arizona, School
of Business and Public
Administration
Erasmus University.
Rotterdam School of
Management
Commonwealth Secretariat
1990-1992
London School of Economics
and Political Science
1988-1989
F.S. Tyabji Chartered
Accountants
Duties
Visiting Scholar, the Information School
Visiting Scholar, Department of Business Information
Management and Operations
Assistant Professor, Department of Information and
Decision Sciences. Taught MSc Information Management
and PhD courses, research and thesis supervision.
Visiting Professor, Rotterdam School of Management.
Taught MIS related courses for the MBA/MBI program.
Fellow, Erasmus Research in Management (ERIM).
Responsibility for research and publication.
Visiting Professor
Research Fellow
Supported electronic communication, supervised and
managed projects implementing computer networks,
and the development and application of electronic group
support.
Research Assistant, LSE Research and Consultancy.
Worked on an MRC-EEC project developing an
organisational modelling tool using Coloured Petri-nets.
Information Technology Consultant. Designed
accounting system
-454-
1986-1987
John Cabot University
Manager, University Library. Supervised and trained
library assistants. General administration and
accounting. Developed library computer system.
7. Consulting—list agencies and dates, and briefly describe each project:
Dates
2001-2007
1988
Agency
V.O.F. Innovative Group
Support
ITALSTAT
Project
Director. Collaborative work consulting
Consultant, Finance Department. Implemented Monte
Carlo simulation as a method of risk analysis on the
capital budgeting system of an investment project.
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Dean's Executive Committee
Doctoral Program Committee
College Personnel Committee
Reappointment and Tenure Committee
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
Graduate Council Committee B, 2005-2008
Dean's Executive Committee, 2007-2008
Doctoral Program Committee, 2007-2008
College Personnel Committee, 2006-2008
Reappointment and Tenure Committee, 2005-2008
Member Professional Development Committee, 2002-2005
Member Chancellor’s Strategic Planning Committee, 2004-2005
Chair Academic Excellence Sub-Committee, 2004-2005
Facilitator and Presenter Strategic Planning Advance, 2004-2005
Member University Committee on Research , 2004-2005
-455-
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
Qureshi, S., Kamal, M., and P. Wolcott “Information Technology Therapy for Competitiveness in MicroEnterprises.” International Journal of E-Business Research. Idea Group International. Vol. 5, Issue 1.
January 2009.
Wolcott, P., Kamal, M. and S. Qureshi ”Meeting the Challenges of ICT Adoption by Micro-enterprises“.
Journal of Enterprise Information Management. Emerald. Volume 21, Issue 6. 2008.
Qureshi, S., Briggs, B. and V. Hlupic. “Value Creation from Intellectual Capital: Convergence of
Knowledge Management and Collaboration in the Intellectual Bandwidth Model”. Group Decision and
Negotiation. Vol 15, No 3. Pp:197-220. 2006.
Qureshi, S., Liu, M. and D. Vogel, "The Effects of Electronic Collaboration in Distributed Project
Management". Group Decision and Negotiation. Vol 15, No1. Pp55-75 2006.
Qureshi, S. and P. Keen. “Activating Knowledge through Electronic Collaboration: Vanquishing the
Knowledge Paradox”. IEEE Transactions in Professional Communication. Vol 48, Issue 1. Pp: 40- 54 2005.
de Vreede, G.J., Mgaya, R. and S. Qureshi. “Field Experiences with Collaboration Technology: A
Comparative Study in Tanzania and South Africa” Journal of Information Technology for Development.
Vol 10, no 3. 2004.
Qureshi, S. “Social and Economic Perspectives on the role of Information and Communication
Technology on Development.” Journal of Information Technology for Development. Vol 15, No 1. 2009.
Qureshi, S. “Assessing the Effects of Information and Communication Technologies on Development.”
Journal of Information Technology for Development. Vol 14, No 4. 2008.
Qureshi, S. " Information technology innovations for development" Journal of Information Technology
for Development. Vol 13, No 4. (p 311-313) 2007.
Qureshi, S. "Information Technology Application in Emerging Economies" Journal of Information
Technology for Development. Vol 13, No 2. 2007.
Qureshi, S. "Collaboration for knowledge networking in development." Journal of Information
Technology for Development. Vol 12, No 2. (p 87-89) 2006.
Qureshi, S. "Why is the information society important to us? The World Summit on the Information
Society in Tunis." Journal of Information Technology for Development. Vol 12, No 1. 2006.
Qureshi, S. “Off-Shore Outsourcing Across the Digital Divide”. Journal of Information Technology for
Development. Vol 11, No 1. 2005.
Qureshi, S. “E-Government and IT Policy: Choices for government outreach and policy making”. Journal
of Information Technology for Development. Vol 11, No 2. 2005.
Qureshi, S. “Movement in the Information Technology for Development Debate: How can it meet the
challenges of global competition?”. Journal of Information Technology for Development. Vol 10, No 3.
2004.
Qureshi, S., Kamal, S., and P. Keen “Knowledge Networking to overcome the Digital Divide” in King, B.
“Knowledge Management and Organizational Learning” Series on Annals of Information System
Springer. Forthcoming.
Qureshi, Sajda, and Vogel, Doug, Information Technology Application in Emerging Economies: A
Monograph of a Symposium at HICSS-40, January 2007, 72 pp ISBN TBA.
http://www.hicss.hawaii.edu/reports.htm
Qureshi, S. and P. Keen "Organizational Transformation by Activating Knowledge: The Mediating Role of
Collaboration Technologies" in Handbook of Information Technology in A. Salazar and S. Sawyer (Eds)
Organizations and Electronic Markets. World Scientific Press. Accepted for publication. 2006.
-456-
Qureshi, S. "The Role of Information Technology for Development: Global Development Through Local
Empowerment" in Networking the Commonwealth for Development: Moving from Digital Divide to
Digital Opportunity. NDD New Media. November 2005. Pp49-52.
Davison, R.M., Harris, R.H., Qureshi, S., Vogel, D.R. and Vreede, G.J. de (Eds) Information Systems in
Developing Countries: Theory and Practice, City University of Hong Kong Press. 2005.
Qureshi, S., “Information Technology Infrastructures for Developing Countries: Key Concepts and Cases”
in Davison, R.M., Harris, R.H., Qureshi, S., Vogel, D.R. and Vreede, G.J. de (Eds) Information Systems in
Developing Countries: Theory and Practice, City University of Hong Kong Press. 2005.
Qureshi, S., Hlupic, V. and B. Briggs, “On the Convergence of Knowledge Management and Groupware”.
In: Vreede, de. G.J., Guerrero, L.A. and G.M. Raventos (Eds). Groupware: Design, Implementation, and
Use. Springer. 2004. pp25-34.
Kamal, M., Good, T.G., & Qureshi, S. Development Outcomes from IT adoption in Micro-Enterprises.
Proceedings of the 42nd Annual Hawaii International Conference on System Sciences (HICSS-42),
Waikoloa, Hawaii. January 5 – 8. 2009.
Qureshi, S., Kamal, M., and Good, T.G.. Adoption of Information Technology by Micro-enterprises:
Insights from a rural community. Proceedings of the 14th Annual Americas Conference on Information
Systems (AMCIS-14), Toronto, Canada. August 14-17, 2008.
Kamal, M., Qureshi, S. and L. Najjar “A Global Analysis of the Effect of IT Capacity on Development –
Understanding Sourcing of Skills”. 2008 International Conference on Information Resources
Management (Conf-IRM). May 18-20, 2008. Niagara Falls, Ontario, Canada.
Qureshi, S., Wolcott, P. and M. Kamal “Information Technology Therapy for Micro-enterprise Success:
Directions for Sustainable Development”. 41th Annual Hawaii International Conference on System
Sciences (HICSS'08), 2008.
Qureshi, S. and A. York, “IT Adoption by Small Businesses in Underserved Communities”. 41th Annual
Hawaii International Conference on System Sciences (HICSS'08), 2008.
Qureshi, S. and T. Lamsam-Trumbly, “Transcending the Digital Divide in Native America: A Framing
Analysis of the Effects of Information and Communication Technologies and Media on Empowerment
and Development”. 41th Annual Hawaii International Conference on System Sciences (HICSS'08), 2008.
Qureshi, S. and A. Laure-Fayard, “Virtual Teams and Development: A Language Games Perspective”.
41th Annual Hawaii International Conference on System Sciences (HICSS'08), 2008.
Qureshi, S., Keen, P. and M. Kamal." Knowledge Networking across the Social Divide: A Model for
Distributed Decision Making " Proceedings of the Thirteenth Americas Conference on Information
Systems, Keystone, USA August 9th-12th 2007.
Wolcott, P., Qureshi, S. and M. Kamal " An Information Technology Therapy Approach to Microenterprise Adoption of ICTs". Proceedings of the Thirteenth Americas Conference on Information
Systems, Keystone, USA August 9th-12th 2007. Nominated for Best Paper Award.
Kamal, M., Zhang, Chi, Najjar, L., & Qureshi, S. Human Development through Information &
Communication Technologies: Theoretical & Empirical Support. Paper presented at the Second Annual
Midwest United States Association for Information Systems Conference (MWAIS-02), Springfield, Illinois.
May 18-19. 2007.
Qureshi, S. and A. Davis, "Managing Resistance to Organizational Change: How GSS Can Reveal Role
Related Resistance Behaviors," hicss, p. 248b, 40th Annual Hawaii International Conference on System
Sciences (HICSS'07), 2007. Nominated for Best Paper Award.
Qureshi, S., and A. Davis, " Overcoming the Digital Divide through Electronic Commerce: Harnessing
opportunities in IT for Development" 40th Annual Hawaii International Conference on System Sciences
(HICSS'07), 2007.
-457-
Qureshi, S., Keen, P. and M. Kamal. "Knowledge Networking for Development: Building Bridges across
the Digital Divide" hicss, p. 226c In (eds) R. Sprague and J. Nunamaker The Fortieth Annual Hawaii
International Conference on Systems Sciences. IEEE Computer Society Press.2007.
Qureshi, S. and A. Davis. "The Effect of e-Commerce Development". Proceedings of the Twelfth
Americas Conference on Information Systems, Acapulco, Mexico, August 4th-6th 2006.
Qureshi, S. and A. Davis. "Assessing Resistance to Change in a Multinational Organization Using a GSS
Game". Proceedings of the Twelfth Americas Conference on Information Systems, Acapulco, Mexico,
August 4th-6th 2006.
Qureshi, S. and A. de Leeuwe., "Mobilizing Intellectual Bandwidth in a Distributed Virtual Organization:
The Missing Links." In (eds) R. Sprague and J. Nunamaker The Thirty Ninth Annual Hawaii International
Conference on Systems Sciences. IEEE Computer Society Press. 2006.
Keen, P. and S. Qureshi, "Organizational Transformation through Business Models: A Framework for
Business Model Design." In (eds) R. Sprague and J. Nunamaker The Thirty Ninth Annual Hawaii
International Conference on Systems Sciences. IEEE Computer Society Press. Best Paper Award. 2006.
Qureshi, S. and C. "Noteboom. Adaptation in Distributed Projects: Collaborative Processes in Digital
Natives and Digital Immigrants." In (eds) R. Sprague and J. Nunamaker The Thirty Ninth Annual Hawaii
International Conference on Systems Sciences. IEEE Computer Society Press. 2006.
Qureshi, S. and C. Noteboom. "An Investigation of Episodes of Global Interactivity: What Collaborative
Processes Effect the Success of Distributed Projects?." Proceedings of the Eleventh Americas Conference
on Information Systems, Omaha, NE, USA August 11th-14th 2005.
Qureshi, S. "How does Information Technology Effect Development? Integrating Theory and Practice
into a Process Model." Proceedings of the Eleventh Americas Conference on Information Systems,
Omaha, NE, USA August 11th-14th 2005.
Qureshi, S. and P. Keen, “How to Overcome the Knowledge Paradox: Activate Knowledge Identity, Not
Just Organize Information.” In (eds) R. Sprague and J. Nunamaker The Thirty Eight Annual Hawaii
International Conference on Systems Sciences. IEEE Computer Society Press. 2005.
Qureshi, S., Liu, M. and D. Vogel, “A Grounded Theory Analysis of E-Collaboration Effects for Distributed
Project Management ”. In (eds) R. Sprague and J. Nunamaker The Thirty Eight Annual Hawaii
International Conference on Systems Sciences. IEEE Computer Society Press. 2005.
Verhoef, R. and S. Qureshi, “Collaborative Infrastructures for Mobilizing Intellectual Resources:
Assessing Intellectual Bandwidth in a Knowledge Intensive Organization.”In (eds) R. Sprague and J.
Nunamaker The Thirty Eigth Annual Hawaii International Conference on Systems Sciences. IEEE
Computer Society Press. 2005.
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Course
Course title
Semester
-458-
Class
Spring 2009
Fall 2008
Spring 2008
Fall 2007
number
ISQA
4180/8186
ISQA 8420
ISQA 4000
ISQA 8080
ISQA 8420
ISQA 8060
ISQA
4180/8186
ISQA 8060
ISQA 8080
hrs
3
size
20
Managing the IS Function
Information Technology for Development
Independent Study
Managing the IS Function
Research Methods in MIS
Electronic Commerce
3
3
24
5
3
3
3
8
20
19
Research Methods in MIS
Independent Study
3
22
Electronic Commerce
13. Estimate the percentage of your time devoted to scholarly and/or research activities: _____%. Please give a
brief description of your major research and scholarly activities:
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-459-
-460-
Maury Schoof
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Maury Schooff
Lecturer
n/a
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Instructor
Lecturer
Dates Held
1996 - 2002
2002 - present
3. Degrees with fields, institutions, and dates
Degree
Field
Institution
Date
MS
Operations
Research and
Systems
Analysis
Chemistry
Naval Postgraduate School
1970
Utah State University
1959
BS
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
Fifteen of twenty-five years of Army career using and teaching the use of computers
Eleven years as a manager in a corporate information systems department
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
-461-
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
Dates
1995 - 1996
1993 - 1995
1978 - 1982
1977 - 1978
1985 – 1996
1960 -1985
Where
Bellevue University
Embry-Riddle Aeronautical
University, Offutt Air Force
Base Campus
Kansas City Community
College, Fort Leavenworth
Campus
University of Maryland,
Korea Campus
Fortune 50 company,
Omaha
Army Command and
General Staff
College
Duties
Adjunct Faculty
Instructor
Instructor
Adjunct Faculty
Senior operations research analyst / Director of
Operations Analysis /
Internal consultant /
Director of Strategic Information and Financial Systems
Career Army Officer
Division Finance Officer
Installation Finance and
Accounting Officer
Deputy Director of
War Games and Analysis
Chairman, Management Committee
7. Consulting—list agencies and dates, and briefly describe each project:
Dates
Agency
Project
11 years of consulting in applications of information
systems to real world business problems including
software design, systems integration, installation of
systems, selection of hardware, selection of commercial
software. Consulting was done both domestically and
internationally
-462-
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Spring 2009
Fall 2008
Spring 2008
Course
number
CIST 3100001
CIST 3110001
CIST 3110002
CIST 3110850
CIST 3110001
CIST 3110002
CIST 3110003
CIST 3100850
CIST 3110001
CIST 3110002
Course title
Organizations, Applications, and Technology
Semester
hrs
3
Class
size
20
Information Technology Ethics
3
27
Information Technology Ethics
3
28
Information Technology Ethics
3
11
Information Technology Ethics
3
29
Information Technology Ethics
3
22
Information Technology Ethics
3
22
Organizations, Applications, and Technology
3
26
Information Technology Ethics
3
25
Information Technology Ethics
3
31
-463-
Fall 2007
ISQA 8420
CIST 1010001
CIST 1010002
CIST 3100002
CIST 3100003
Managing the I.S. Function
Foundation of IS & T
3
1
26
24
Foundation of IS & T
1
11
Organizations, Applications, and Technology
3
22
Organizations, Applications, and Technology
3
25
13. Estimate the percentage of your time devoted to scholarly and/or research activities: _____%. Please give a
brief description of your major research and scholarly activities:
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-464-
Yong Shi
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Yong Shi
Charles W. and Margre H. Durham Distinguished
Professor of Information Technology
Tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Charles W. and Margre H. Durham Distinguished
Professor of Information Technology
Professor
Associate Professor
Assistant Professor
Dates Held
August 1999
August 1998
August 1996
August 1991
3. Degrees with fields, institutions, and dates
Degree
Field
Institution
Date
Ph.D.
Management Science
with minor in Computer
and Production System
Design
Mathematics
University of Kansas
1991
Southwest Petroleum Institute,
Sichuan, China
1982
B.S.
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
May 27-30, 2007, organized and co-chaired the 7th International Conference on Computational Science,
-465-
Beijing, where more than 600 scholars have participated from 48 different countries.
Oct. 28-31, 2007, organized and co-chaired the 2007 IEEE International Conference on Data Mining
(ICDM 2007), Omaha, NE, USA, where more than 350 scholars have participated from 47 different
countries.
May 24-26, 2009, organized and co-chaired the International Conference on Linear Programming
Algorithms and Extensions, Haikou, Hainan, where more than 25 international leading scholars in the
field will participate.
June 21-26, 2009, organized and co-chaired the 20th International Conference on Multiple Criteria
Decision Making, where more than 250 scholars participants
Chaired Workshop on “Optimization-based Data Mining Techniques and Applications” at IEEE
International Conference on Data Mining, 2005, 2006, 2007.
Chaired Workshop on “Computational Finance and Business Intelligence” at International Conference on
Computational Science, 2004, 2005, 2006, 2007, 2008.
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
7. Consulting—list agencies and dates, and briefly describe each project:
Dates
September 2003Oct. 2005
Agency
Consulting Northrop
Grumman Corporation
Project
Information Intrusion and detection
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Committee of Doctoral Program in IT
Organized 14 committee meetings
Admitted 2 new Ph.D. students
Managed the Comps Exams
Organized committee meeting to revise the Plan of Study for the program. (Spring 2009)
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
-466-
Doctoral Program Committee (2003-present)
Graduate Program Committee (2006-2007)
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
Zhang, W. R., J. H. Zhang, Y. Shi and S. S. Chen, “Bipolar Linear Algebra and YinYang-N-Element Cellular
Networks for Equilibrium-Based Biosystem Simulation and Regulation”, Journal of Biological Systems,
(Forthcoming) 2009. Refereed Journal. 33% contribution.
Yan, N., Z. Chen, Y. Shi and R. Liu “An Optimization-Based Classification Approach with the Non-additive
Measure”, International Journal of Operations and Quantitative Management, (Forthcoming) 2009.
Refereed Journal. 33% contribution.
Zhang, Z., P. Zhang and Y. Shi “A Rough Set-based Multiple Criteria Linear Programming Approach for
Improving Classification Performance”, International Journal of Operations and Quantitative
Management, (Forthcoming) 2009. Refereed Journal. 33% contribution.
Zhang, P., Y. Tian, Z. Zhang, X. Li and Y. Shi “Supportive instances for Regularized Multiple Criteria Linear
Programming Classification”, International Journal of Operations and Quantitative Management,
(Forthcoming) 2009. Refereed Journal. 33% contribution.
Zhang P., Z. Zhang, A. Li, Y. Shi, “Global and Local (Glocal) Bagging Approach for Classifying Noisy
Dataset”, International Journal of Software and Informatics, Vol.2, No.2, 181-197, 2008. Refereed
Journal. 33% contribution.
Zheng, X., L. Zhang, G. Nie and Y. Shi, “A Way to Accelerate Knowledge Management: from the
Perspective of Knowledge Potential,” Journal of Service Science and Management (Forthcoming) 2008.
Refereed Journal. 33% contribution.
Peng, Y., Kou, G., Shi, Y., and Chen, Z.,A Descriptive Framework for the Field of Data Mining and
Knowledge Discovery , International Journal of Information Technology and Decision Making, Vol. 7,
No.4, 639-682, 2008. Refereed Journal. 33% contribution.
Kou, G., Y. Peng, Z. Chen and Y. Shi “Multiple Criteria Mathematical Programming for Multi-Class
Classification and Application in Network Intrusion Detection,” Information Sciences, Vol. 179, 371–
381, 2009. Refereed Journal. 33% contribution.
Li., X., L. Zhang, P. Zhang and Y. Shi “Problems and Systematic Solutions in Data Quality,” International
Journal of Services Sciences, (Forthcoming) 2008. Refereed Journal. 33% contribution.
Peng, Y., G. Kou, Y. Shi, and Z. Chen “A Multi-Criteria Convex Quadratic Programming Model for Credit
Data Analysis,” Decision Support Systems, Vol. 44, 1016-1030, 2008. Refereed Journal. 33% contribution.
Zhang, Y., L. Chen, Z. Zhou and Y. Shi, “A Geometrical Method on Multidimensional Dynamic Credit
Evaluation”, International Journal of Information Technology and Decision Making, Vol. 7, No. 1, 103114, 2008. Refereed Journal. 33% contribution.
Liu, G., Z. Zhou and Y. Shi, “A Multi-Dimensional Forward Selection Method for Firms’ Credit Sale,”
Computers & Mathematics with Applications, Vol. 54, 1228-1233, 2007. Refereed Journal. 33%
contribution.
Shi, Y., X. Zhang, J. Wan, G. Kou, Y. Peng, and Y. Guo, “Comparison study of two kernel-based learning
algorithms for predicting the distance range between antibody interface residues and antigen surface”,
-467-
International Journal of Computer Mathematics, Vol.84, 690-707,2007. Refereed Journal. 33%
contribution.
Shi, Y., X. Zhang, J. Wan, Y. Wang, W. Ying, Z. Cao, Y. Guo, “Predicting the Distance between Antibody’s
Interface Residue And Antigen To Recognize Antigen Types By Support Vector Machine”, Neural
Computing & Applications, Vol.16, 481-490, 2007. Refereed Journal. 33% contribution.
Zhang, L., Y. Shi, and X. Yang, “Association-Rule Knowledge Discovery by Using A Fuzzy Mining
Approach,” International Journal of Data Mining and Business Intelligence, (Forthcoming), Refereed
Journal. 33% contribution.
Kwak, W., Y. Shi, S. Eldridge and G Kou, “Bankruptcy Prediction for Japanese Firms: Using Multiple
Criteria Linear Programming Data Mining Approach,” International Journal of Data Mining and Business
Intelligence, (Forthcoming), Refereed Journal. 33% contribution.
Shi, Y, Y. Peng, G. Kou and Z. Chen, “Classifying Credit Card Accounts for Business Intelligence and
Decision Making: A Multiple-Criteria Quadratic Programming Approach,” International Journal of
Information Technology and Decision Making, Vol. 4, 581-600, 2005, Refereed Journal (SCI). 33%
contribution.
Zhou, Z., T. Mou and Y. Shi, “The Mathematical Structure of Credit Evaluation,” Far East Journal of
Applied Mathematics, Vol. 20, 113-119, 2005, Refereed Journal. 33% contribution.
Shi, Y., H. Yang and L. Zhang, “Promoting China’s National Competitiveness by Using Knowledge
Management and Data Mining,” China Soft Science, Vol. 176, 46-51, 2005 (in Chinese), Refereed Journal.
33% contribution.
Shi, Y., J. He, L. Wang and W. Fan, “Computer-based Algorithms for Multiple Criteria and Multiple
Constraint Levels Integer Linear Programming,” Computers & Mathematics with Applications, Vol. 49,
903-921, 2005, Major Refereed Journal (SCI). 50% contribution.
Kou, G., Y. Peng, Y. Shi, M. Wise and W. Xu, "Discovering Credit Cardholders’ Behavior by Multiple
Criteria Linear Programming", Annals of Operations Research, Vol.135, 261-274, 2005, Major Refereed
Journal (SCI). 30% contribution.
Shi, Y., R. Liu, N. Yan, and Z. Chen, “A Family of Optimization Based Data Mining Methods,” Zhang, Y
(eds.), ApWeb 2008, Progress in WWW Research and Development, LNCS 4976, pp. 26-38, 2008.
Shi, Y., R. Liu, N. Yan, and Z. Chen, “Multiple Criteria Mathematical Programming and Data Mining,” ICCS
2008, Part I: 7-17. (EI, ISTP)
Zhang, P., Y. Tian, X. Li, Z. Zhang, and Y. Shi, “Select Representative Samples for Regularized MultipleCriteria Linear Programming Classification,” ICCS 2008, Part II: 436-440. (EI, ISTP).
Yan, N., Z. Chen, R. Liu, and Y. Shi, “An Optimization-Based Classification Approach with the Non-additive
Measure,” ICCS 2008, Part II: 450-458. (EI, ISTP).
Zhang, Y., Z. Zhou, and Y. Shi, “A Selection Method of ETF’s Credit Risk Evaluation Indicators ,” ICCS 2008,
Part II: 459-465. (EI, ISTP).
Zhang, Z., Y. Shi, P. Zhang, and G. Gao, “A Rough Set-Based Multiple Criteria Linear Programming
Approach for Classification,” ICCS 2008, Part II: 476-485. (EI, ISTP).
Zhang, J. and Y. Shi “A Framework of Optimization Method for Classification,” Lecture Notes in OR: The
First International Symposium on Optimization and Systems Biology (OSB’07), Beijing, China, August 8–
10, 2007, 391–396. (ISPT).
Liu, R. and Y. Shi “Succinct Matrix Approximation and Efficient k-NN Classification,” IEEE ICDM 2007
Proceedings, 213-222. (EI).
Zhu, X., P. Zhang, X. Lin and Y. Shi “Active Learning from Data Streams,” IEEE ICDM 2007 Proceedings,
757-762. (EI).
He, J., G. Huang, Y. Zhang and Y. Shi “Cluster Analysis and Optimization in Color-Based Clustering for
-468-
Image,” Workshop on Knowledge Discovery and Data Mining from Multimedia Data and Multimedia
Applications, Workshop at IEEE ICDM 2007, 213-218. (EI).
Gang, K., Y.Peng, Y. Shi, and Z. Chen, “Epsilon-Support Vector and Large-Scale Data Mining Problems”,
ICCS 2007, Part III: 874-881. (EI, ISTP)
Zhou, L., Y. Liu, J. Wang and Y. Shi “Utility-based Web Path Traversal Pattern Mining,” Workshop at IEEE
ICDM 2007, 373-378. (EI).
He, J., Y. Zhang, Y Shi, G. Huang “A Multi-criteria Decision Support System of Water Resource Allocation
Scenarios, KSEM2007. (Accepted) (LNAI) (EI, ISTP, DBLP)
He, J., G. Huang, Y. Zhang and Y. Shi “Cluster Analysis and Optimization in Color-Based Clustering for
Image,” Workshop on Knowledge Discovery and Data Mining from Multimedia Data and Multimedia
Applications, ICDM 2007. (IEEE conference)
He, J., Y. Zhang, G. Huang, Y. Shi, “Network Lifetime of Application-Specific Randomly Deployed Wireless
Sensor Networks in Arbitrary Sensor Density,” ACIS-ICIS 2007: 352-357. (EI, ISTP, DBLP)
Shi, Y., Y. Tian, X. Chen and P. Zhang “A Regularized Multiple Criteria Linear Program for Classification,”
Workshop at IEEE ICDM 2007, 253-258. (EI).
Shi, Y. and X. Li "Knowledge Management Plantforms and Intelligence Knowledge beyond Data Mining,"
in Y. Shi, D. Olson and A. Stam, eds., Advance in Multiple Criteria Decision Making and Human Systems
Management, IOS Press, Amsterdam, 272-288, 2007.
Peng, Z., Zhang , J., and Y. Shi, “A New Multi-Criteria Quadratic-Programming Linear Classification Model
for VIP E-Mail Analysis”, ICCS 2007, Part II: 499-502. (EI, ISTP)
Meihong ,Z., Y. Shi, A. Li and J. He, “A Dynamic Committee Sheme on Multiple-Criteria Linear
Programming Classification Method”, ICCS 2007, Part II: 401-480. (EI, ISTP)
Yaohui, C., A. Li, Y. Shi, “Kimberlites Identification by Classification Methods”, ICCS 2007, Part II: 409-414.
(EI, ISTP)
Zhiwang, Z., Y. Shi, “The Characteristic Analysis of Web User Clusters based on Frequent Browsing
Patterns”, ICCS 2007, Part II: 490-493. (EI, ISTP)
Jing W., Y. Liu, L. Zhou, Y. Shi, “Pushing Frequency Constraint to Utility Mining Model”. ICCS 2007, Part
III: 689-692. (EI, ISTP)
Zhan, Z., Y.Tian and Y. Shi, “Feature Selection for VIP E-Mail Accounts Analysis”, ICCS 2007, Part III: 493700. (EI, ISTP)
Peng,Y., G. Kou, J. Matza, Z. Chen, D. Khazanchi and Yong Shi, “Application of Classification Methods to
Individual Disability Income Insurance Fraud Detection”, ICCS 2007, Part III: 852-858. (EI, ISTP)
Li., X, L.Zhang, M. Ding, Y. Shi, J. Li, “A Combined Web Mining Model and Its Application in Crisis
Management”, ICCS 2007, Part III: 906-910. (EI, ISTP)
Li., G., Z. Zhou, X. Song, and Y. Shi, “A Fuzzy Comprehensive Evaluation Method on Firms' Credit Sale
Risk”, ICCS 2007, Part III:1062-1068. (EI, ISTP)
Zhang, L., J. Li and Y. Shi “Study on Improving Efficiency of Knowledge Sharing in Knowledge-Intensive
Organization,” WINE 2005: 816-825. 30% contribution.
Li, A. and Y. Shi “An Integrated Classification Method: Combination of LP and LDA,” WINE 2005: 758-767.
50% contribution.
Kou, G., N. Yan, Y. Peng, N. Yan, Y. Shi and Z. Chen "Network Surveillance and Multi-Group Intrusion
Classification," in J. Chen, ed., IEEE Service Systems and Service Management, International Academic
Publishers, Beijing, 841-848, 2005. 20% contribution.
Li, J. , W. Xu and Y. Shi "Credit Scoring via PCALWM" in V. S. Sunderam et al, eds., ICCS 2005, LNCS 3516,
Springer, Berlin, 531-538, 2005. 30% contribution.
Peng, Y. , G. Kou, Y. Shi, and Z. Chen "Improving Clustering Analysis for Credit Card Accounts
-469-
Classification" in V. S. Sunderam et al, eds., ICCS 2005, LNCS 3516, Springer, Berlin, 548-553, 2005. 30%
contribution.
Peng, Y., G. Kou, Y. Shi, Z. Chen and H. Yang, ``A Comparison Study of Multiclass Classification between
Multiple Criteria Mathematical Programming and Hierarchical Method for Support Vector Machines,"
2005 ICDM Workshop: Optimization-based Data Mining Techniques with Applications, pp. 30-36, U.S.A.,
2005.
He, J., W. Yue and Y. Shi, ``Pattern Recognition for Multimedia Communication Networks Using New
Connection Models," 2005 ICDM Workshop: Optimization-based Data Mining Techniques with
Applications, pp. 37-42, U.S.A., 2005.
He, J., W. Yue and Y. Shi, ``Identification Mining of Unusual Patterns for Multimedia Communication
Networks," Abstract Proc. of Autumn Conference 2005 of Operations Research Society of Japan, pp.
262-263, 2005.
He, J., W.Yue and Y. Shi, ``A Double Helix Architecture of Knowledge Discovery System Based on Data
Grid and Knowledge Grid for Multimedia Communication Networks," Proc. of 1st Intel. Cong. of the
Intel. Federation for Systems Research, pp. 123-124, Japan, 2005
He, J., W. Yue and Y. Shi, ``Data Mining Systems of QoS Integrated Evaluation for Multimedia
Communication Networks," Proc. of IICT Symposium, Konan University, pp. 14-pp. 21, 2005.
Wang, M., J. Zheng, Z. Chen, and Y. Shi, “Classification Methods for HIV-1 Medicated Neuronal Damage,”
IEEE CSB 2005 Workshops and Poster Abstracts, Aug. 8-11, 2005, Stanford University, California, 31-32.
Pi, J., Y. Shi and Z. Chen, “Similarity and Cluster Analysis Algorithms for Microarrays Using R*-Trees,”
IEEE CSB 2005 Workshops and Poster Abstracts, Aug. 8-11, 2005, Stanford University, California, 91-92.
Peng, Y, N. Yan, G. Kou, Z. Chen and Y. Shi “Document Clustering in Antimicrobial Peptides Research,”
Proceedings of the Eleventh Americas Conference on Information Systems, Omaha, NE, USA August
11th-14th 2005, 878-887.
Peng, Y, G. Kou, Y. Shi and Z. Chen “Using Optimization-Based Classification Method for Massive
Datasets,” Proceedings of the Eleventh Americas Conference on Information Systems, Omaha, NE, USA
August 11th-14th 2005, 1446-1452.
Zhang, L., Y. Shi and X. Yang “A Fuzzy Mining Algorithm for Association-Rule Knowledge Discovery,”
Proceedings of the Eleventh America Conference on Information Systems, Omaha, NE, USA August 11th14th 2005, 1487-1496.
Shi, Y., W. Xu and Z. Chen, Chinese Academy of Sciences Symposium on Data Mining and Knowledge
Management (CASDMKM 2004), LNAI 3327, Springer-Verlag, 2004, 263 pages. 33% contribution.
Shi, Y., J. He, L. Wang and W. Fan, “Computer-based Algorithms for Multiple Criteria and Multiple
Constraint Levels Integer Linear Programming,” Computers & Mathematics with Applications
(forthcoming). Major Refereed Journal (SCI). 50% contribution.
Kou, G., Y. Peng, Y. Shi, M. Wise and W. Xu, "Discovering Credit Cardholders’ Behavior by Multiple
Criteria Linear Programming", Annals of Operations Research (forthcoming). Major Refereed Journal
(SCI). 40% contribution.
He, J., X. Liu, Y. Shi, W. Xu and N. Yan "Classifications of Credit Cardholder Behavior by using Fuzzy Linear
Programming", International Journal of Information Technology and Decision Making, Vol. 3, No. 4, 633650, 2004. Refereed Journal (SCI). 40% contribution.
Zheng, J., W. Zhuang, N. Yan, G. Kou, D. Erichsen, C. McNally, H. Peng, A. Cheloha, C.Shi, and Y. Shi,
"Classification of HIV-1 Mediated Neuronal Dendritic and Synaptic Damage Using Multiple Criteria Linear
Programming," Neuroinformatics, Vol. 2, 303-326, 2004. Major Refereed Journal (SCI). 30%
contribution.
Tang, X., Z. Zhou, C. Zhang and Y. Shi, "Multi-Objective Constrained Nonlinear Optimization: An ODE
-470-
Approach," Information – International Inter-discipline Journal, Vol. 7, 487-495, 2004. Refereed Journal.
30% contribution.
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
“Data Mining for Petroleum Exploration-Phase II,” $300,000, by BHP Billiton Co., Australia, 2008-2010.
“The attributes Structure and Measurements in the Process of Building Trust-worth Software” $100,000,
by National Science Foundation of China, Key Project,#73662243, 2008-2010.
“Revolving Charge Accounts Receivable Retrospective Analysis,” $64,959, by Nebraska Furniture Market
- a unit of Berkshire Hathaway Investment Co., Omaha, Nebraska 2008-2009.
“Data Mining for Petroleum Exploration-Phase II,” $300,000, by BHP Billiton Co., Australia, 2008-2010.
“Data Mining and Intelligent Knowledge Management: Theory and Applications,” $1,423,077, by
National Science Foundation of China, Innovative Grant,#70621001, 2007-2015.
“Data Mining and Optimization,” $150,000, by National Science Foundation of China, Key Project,
#70531040, 2006-2009.
“Data Mining for Petroleum Exploration-Phase I,” $54,500, by BHP Billiton Co., Australia, 2005-2007.
“Multiple Criteria Non-linear based Data Mining Methods and Applications,” $25,000, by National
Science Foundation of China, #70472074, 2005-2007.
“Bio-informatics Study in the Process and Changes of Antigen and Antibody,” (with Z. Cao et al.)
$316,000, by 973 Project, Chinese Department of Science and Technology, #2004CB720103, 2005-2009.
"Proactive and Predictive Information Assurance for Next Generation Systems (P2INGS),"(with J. Huff, Z.
Chen and Q. Zhu) $800,000, US Air Force Research Laboratory, Contract # F30602-03-C-0247, October
2003-April 2005.
“Data Mining and Data Warehousing: Theory and Applications in Financial Fields”, $158,536 (1.3 million
Chinese Yuan) by Chinese Department of Science and Technology, #01C26225120981, 2002-2004.
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Spring 2009
Fall 2008
Course
number
CIST 9990
ISQA 8700
CIST 9040
CIST 9050
CIST 9060
CIST 9990
ISQA 4890
Course title
Dissertation
Data Warehousing: Theory and Practice
Colloquium on IT Profession
Colloquium on IT Profession
Colloquium on IT Profession
Dissertation
Data Warehousing and Data Mining
-471-
Semester
hrs
1
3
1
1
1
1
3
Class
size
13
22
5
5
5
13
11
Spring 2008
Fall 2007
ISQA 8700
ISQA 4010
ISQA 4890
Data Warehousing: Theory and Practice
Business Intelligence
Data Warehousing and Data Mining
3
3
3
6
12
6
13. Estimate the percentage of your time devoted to scholarly and/or research activities: __50___%. Please give
a brief description of your major research and scholarly activities:
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-472-
Paul van Vliet
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Paul J.A. van Vliet
Associate Professor
Tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Associate Professor
Assistant Professor
Dates Held
(8/01 – present)
(1/95 – 8/01)
3. Degrees with fields, institutions, and dates
Degree
Field
Institution
Date
Ph.D.
M.B.A.
MIS
Business
Administration
Business
Informatics
Oklahoma State University
Moorhead State University, Moorhead
1994
1990
Gelders Instituut voor HEAO, Arnhem, The
Netherlands
June 1987
B.BI.
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
Van Vliet, P.J.A. & Pietron, L.R. (2008) Synchronous Collaboration in Systems Development Education –
Issues and Recommendations for the Virtual Classroom. 39th Annual Meeting of the Decision Sciences
Institute, Baltimore, November 22-25, 2008.
October 31, 2008: Presented at the CIST Roundtable "Using Adobe Connect for Distance and Hybrid
Courses" with Ilze Zigurs and Leah Pietron.
-473-
August 23, 2008: Taught guest lecture titled “Overview of Decision Support Systems” to graduate
students enrolled in the Executive MBA program. Contact: Dr. Birud Sindhav, Assistant Professor of
marketing, Department of Marketing & Management, College of Business Administration.
October 22, 2008: Taught guest lecture titled “Student Groupwork: Building, Nurturing and Managing
Team Projects” to doctoral students enrolled in CIST 9050 - Colloquium on IT Teaching.
Pietron, L.R. & Van Vliet, P.J.A. (2008) Converting A Project-Based Class to An Online Class: The Dilemma
of Systems Analysis and Design. Clute Institute For Academic Research - College Teaching & Learning
Conference, Orlando, Florida, January 2-5, 2008.
Van Vliet, P.J.A. (2007) Zachman in the Classroom - Incorporating the Zachman Framework into
Information Systems Education. 38th Annual Meeting of the Decision Sciences Institute, Phoenix,
November 17-20, 2007.
March 16, 2007: Presented "Distance Education in Practice - Teaching CIST 3100" at distance education
workshop sponsored by IS&T Distance Education Steering Committee.
December 7, 2007: Presented "Succeeding (in Distance Education) with Blackboard" with Dwight
Haworth at distance education workshop sponsored by IS&T Distance Education Steering Committee.
June 20, 2007 – Guest lecturer in PSCI 8926 Advanced Topics in Political Science, Prof Steve Bullock.
Presented “The History of the Internet.”
Van Vliet, P.J.A. (2006) The Benefits of Using Real-World Projects for Systems Development Courses Experience & Assessment. 37th Annual Meeting of the Decision Sciences Institute, San Antonio,
November 18-21, 2006.
On April 15, 2006, in collaboration with Dr. Leah Pietron, presented a workshop on Student Groupwork
to IS&T and CBA faculty.
Van Vliet, P.J.A. (2005) Information Systems Development Courses as Preparation for the Workplace An Assessment. 36th Annual Meeting of the Decision Sciences Institute, San Francisco, November 19-22,
2005.
On November 8, 2005, presented “Student Groupwork: Building, Nurturing, and Managing Team
Projects” to IS&T doctoral students.
Paul J.A. van Vliet (2004) Maintaining the Relevance of Information Systems Development Education.
35th Annual Meeting of the Decision Sciences Institute, Boston, MA, November 20-23, 2004.
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
Dates
(8/91-12/94)
(1/91-12/93)
(8/86-6/87)
Where
Oklahoma State University
Oklahoma State University
KLM - Royal Dutch Airlines,
Amsterdam
Duties
Teaching Assistant
Research Assistant
Data Management Intern
7. Consulting—list agencies and dates, and briefly describe each project:
-474-
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Laboratory Director, PKI Group Decision Support Laboratory, located in PKI 279
Invited by Lanyce Keel to serve on UNO Distance Education Mini-Grant Evaluation Committee.
Member and Chair, IS&T Academic Committee. Re-elected as Chair, Spring 2009.
Member, IS&T Distance Education Steering Committee.
Participated in the Peter Kiewit Institute open house in February 21, 2009 by representing ISQA faculty
and programs and MIS Student Organization.
Participated in the Peter Kiewit Institute open house in October 26, 2008, by representing ISQA faculty
and programs and MIS Student Organization.
Website Administrator, ISQA Department
Coordinator for the comprehensive exams for the Masters of Science in Management Information
Systems program
Faculty advisor for the Management Information Systems Students Organization
Member, ISQA Annual Review Committee.
Member, ISQA Professional Development Committee
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
Website Administrator, ISQA Department ( 2004- present)
Member, ISQA Professional Development Committee (2004-present)
Member and Chair, IS&T Academic Committee. (2005-present)
Member, IS&T Distance Education Steering Committee. (2006-present)
Laboratory Director, PKI Group Decision Support Laboratory, located in PKI 279 (2004-present)
Faculty advisor for the Management Information Systems Students Organization (2004-present)
Coordinator for the comprehensive exams for the Masters of Science in Management Information
Systems program (2004-present)
Member, ISQA Annual Review Committee (2004-present)
Member, ISQA Departmental Teaching Award Committee. (2004-2008)
Participated in the Peter Kiewit Institute open house on February 23, 2008, by representing ISQA faculty
and programs in the Group Decision Support Laboratory.
Participated in the Peter Kiewit Institute open house in February 24, 2007 and October 27, 2007, by
demonstrating the Group Decision Support Laboratory to visitors
Interviewed candidates for ISQA position at Decision Sciences Institute annual conference. (Fall 2007)
Participated in the Peter Kiewit Institute open house in October 29, 2006, by staffing the MISSO table in
the PKI atrium.
Participated in the Peter Kiewit Institute open house in February 25, 2006, by demonstrating the Group
-475-
Decision Support Laboratory to visitors.
February 20-23, 2006; participated in IS&T shadow week, meeting with potential IS&T students.
Participated in the Peter Kiewit Institute open house in October 30, 2005, by staffing the MISSO table in
the PKI atrium.
Participated in the Peter Kiewit Institute open house in February 28, 2005, by demonstrating the Group
Decision Support Laboratory to visitors.
February 22-24, 2005; participated in IS&T shadow week, providing a tour of the PKI facility for three
potential IS&T students.
Member, ISQA Recruiting Committee. Participated extensively in interviewing 28 candidates at the
AMCIS Conference in Omaha, NE (Summer and Fall 2005)
Member, Advisory Committee for the graduate specialty track in the field of Bioinformatics of the
Pathology and Microbiology department at UNMC (2004-2005 year)
Website administrator, UNMC & UNO Bioinformatics program (2004-2005 year)
Member, ISQA Undergraduate Program Committee (Fall 2004)
Member, ISQA Graduate Program Committee (Fall 2004)
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
Van Vliet, P.J.A. & Leah R. Pietron (2006). Information Systems Development Education in the Real
World - A project Methodology and Assessment. Journal of Information Systems Education. Vol. 17, Nr.
3.
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
University of Nebraska at Omaha, Information Technology Services, E-learning Course/Project Minigrant, May 2006. Awarded $2,500 for the 2006-07 fiscal year
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Spring 2009
Fall 2008
Course
number
ISQA 4120001
ISQA 4120002
CIST 3100
ISQA
4100/8106
Course title
System Design and Implementation
Semester
hrs
3
Class
size
25
System Design and Implementation
3
18
Organizations, Application, and Technology
Information Systems Architecture and
Organization
3
3
25
11
-476-
Summer 2008
Spring 2008
Fall 2007
ISQA
4730/8736
ISQA 4120
ISQA 4120001
ISQA 4120002
CIST 3100
ISQA
4100/8106
ISQA
4730/8736
Decision Support Systems
3
19
System Design and Implementation
System Design and Implementation
3
3
10
27
System Design and Implementation
3
16
Organizations, Application, and Technology
Information Systems Architecture and
Organization
Decision Support Systems
3
3
23
10
3
14
13. Estimate the percentage of your time devoted to scholarly and/or research activities: 25 %. Please give a
brief description of your major research and scholarly activities:
My research activities focus on systems development education, the assessment of its quality, its best
practices, the development methodologies, and – lately – the transition into online education.
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-477-
-478-
Sandy Vlasnik
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Sandra Vlasnik
Lecturer
n/a
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Adjunct Instructor
Adjunct Instructor
Lecturer
Dates Held
January 1998 – May 1999
August 2001 – July 2005
August 2005 - Present
3. Degrees with fields, institutions, and dates
Degree
BS
Field
CS
Institution
University of Nebraska at Omaha
Date
Dec. 1988
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
Masters in Computer Science in progress at University of Nebraska at Omaha.
Coursework completed includes:
Advanced Operating Systems
Software Specification and Design
Design and Analysis of Algorithms
Human Computer Interaction
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
Workshops Attended: Reflection, Adobe Connect, Distance Learning and Rubrics
Participated in the Adobe Connect/Web Collaboration Teaching Circle (2008-2009)
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
-479-
Dates
2/1999 –
11/2001 and
6/2003 –
11/2003 and
1/2004 –
11/2005
Where
Bellevue University,
Bellevue Nebraska
Duties
Instructed undergraduate introduction to programming
courses using C, C++, Java and Visual Basic.Net.
Instructed an online introduction to programming course
in Java.
Developed lesson plans, examinations, and student
projects and evaluate course work.
1/20072/2007
STATPack Project, University
of Nebraska at Omaha
Utilized C++, MySQL and GTK to upgrade the STATPack
software package for use in the digital image acquisition
of lab specimens for transfer from remote sites to
central evaluation laboratories.
1989 - 1996
Harris Corporation, Bellevue
Nebraska
Employed as a Senior Software Engineer (promoted from
Software Engineer)
Analyzes, designed, implemented, tested and
maintained complex systems for the support of
electronic intelligence gathering, flight planning and
weather forecasting tasks.
7. Consulting—list agencies and dates, and briefly describe each project:
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
ISQA – UPC – committee member
Committee meets approximately twice monthly during the academic year
Evaluate issues related to the undergraduate program in MIS as needed
IS & T Technology - committee member
Committee meets once per year at a minimum
IS & T Scholarship Committee – member
Committee meets periodically to evaluate available scholarships and scholarship applicants as
needed by the college
Committee meets as needed – up to four times per month during the Spring semester
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
-480-
ISQA UPC – January, 2008 to present
IS & T Technology Committee – January, 2007 – Present
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
none
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
none
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Fall/ 2007
Fall 2007
Fall 2007
Fall 2007
Spring
2008
Spring
2008
Spring
2008
Spring
2008
Summer
2008
Fall 2008
Fall 2008
Fall 2008
Fall 2008
Spring
2009
Spring
Course
number
CSCI 1620
ISQA 3300
ISQA 3310
ISQA 8050
CSCI 1620
Course title
Introduction to Programming II
File Structures
Managing the Database Environment
Data Organization and Storage
Introduction to Programming II
Semester
hrs
3
3
3
3
3
Class
size
31
22
22
7
18
CSCI 1620
Introduction to Programming II
3
15
ISQA 3310
Managing the Database Environment
3
20
ISQA 8050
Data Organization and Storage
3
11
ISQA 3310
Managing the Database Environment
3
10
CSCI 1620
CSCI 1620
ISQA 3300
ISQA 8050
CSCI 1620
Introduction to Programming II
Introduction to Programming II
File Structures
Data Organization and Storage
Introduction to Programming II
3
3
3
3
3
30
15
14
11
41
CSCI 1620
Introduction to Programming II
3
32
-481-
2009
Spring
2009
Spring
2009
ISQA 3310
Managing the Database Environment
3
20
ISQA 8050
Data Organization and Storage
3
5
13. Estimate the percentage of your time devoted to scholarly and/or research activities: __0___%. Please give a
brief description of your major research and scholarly activities:
N/A
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-482-
Gerald Wagner
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
G. R. WAGNER
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Distinguished Research
Fellow
Dates Held
September 2001 to date.
3. Degrees with fields, institutions, and dates
Degree
Bachelor of
Science
Field
Institution
Pre-Veterinary University of Nebraska, Lincoln, Nebraska
Medicine
Date
1958
Master of
Science
Doctor of
Philosophy
with Honors
Nutrition and
Biochemistry
Statistics,
Nutrition, and
Physiology
University of Nebraska, Lincoln, Nebraska
1960
Iowa State University, Ames, Iowa, 1964
1964
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area:
Founded the International Academy for Advanced Decision Support (IAADS), organized IAADS Thought
Leaders Conferences, keynote speaker at, presentations at the Decision Sciences Institute.
Systemics, Cybertics and Informatics conference, Keynote Speaker, 2007 and 2009.
-483-
Nebraska Educational Technology Conference, speaker, 2009.
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
Dates
July 1964 to July 1966
Where
Swift and Company
(Esmark), Chicago,
Illinois
August 1966 to July
1968
Swift and Company
(Esmark), Chicago,
Illinois
August 1968 to August
1969
MRI Systems, Austin, TX
August 1969 to June
1978
College of Engineering,
University of Texas
Duties
Head, Experimental Statistics, R&D Laboratories
Experimental design of research laboratory
experiments.
Analysis of research data.
Documentation and presentation of research
results.
Recommended new products based upon
scientific research results.
Managed staff of 5 research statisticians.
Manager, Corporate Operations Research
Department
Started corporate Operations
Research/Management Sciences Department.
One of the first corporate OR departments in the
world.
Recruited and managed staff of 7 professional
staff members.
Initiated and implemented several large-scale
corporate modeling projects.
Vice President Consulting Services
In charge of consulting and training services for
software start-up.
Education support for enterprise database
management software product.
Developed and taught executive workshops on
Computer Based Computer Decision Making.
Head, Operations Research
Managed all departmental activities for staff of 6
Professors and administrative staff.
Taught graduate level Statistics courses.
Received several teaching honors.
Awarded several research grants.
Pioneer research on:
Computer based education.
Expert Systems.
Artificial Intelligence.
Electronic “War Rooms”.
English-like modeling systems.
-484-
July 1978 to June 1984
Execucom Systems, Inc.,
Austin, TX
Spring Semester, 1987
University of Texas,
Management Science
and Information
Systems, Austin, TX
Collaborative
Technologies, Inc.,
Austin TX
January 1989 to August
1991
Spring Semester 1990
Texas A&M University,
College Station, TX
September 1992 to July
1996
Milagro Systems, Inc.,
Santa Fe, New Mexico
July 1999 to November
WebIQ, Inc., Austin,
Founder and CEO
Designed and developed the Interactive Financial
Planning System (IFPS™).
Built and managed company from start up to 275
employees and $22 million in sales.
Worldwide sales channels.
Twelve hundred corporate customers in the
Fortune 1500.
Fifteen hundred academic customers worldwide.
First University Support Program for a software
company.
Venture capital investments after achieving $10
million in revenue.
Legendary success in innovative products,
recruiting and retaining exceptional people and
customer satisfaction.
Original prototypes of “electronic war rooms”
and Group Decision Support Systems.
Company acquired by GTE in 1984.
Distinguished Visiting Professor
Developed and taught graduate course on Group
Decision Support Systems.
Founder and CEO
Designed and built one of the first
groupware/group collaboration software
products (VisionQuest™ for real time electronic
meetings).
Built corporate infrastructure including direct
sales organization.
Venture capital backed.
Acquired by leading competitor.
Distinguished Visiting Professor
Developed and taught graduate course on Group
Decision Support Systems.
Obtained research grant to build Group Decision
Support Facility.
Supervisor and committee member on PhD
dissertation.
Faculty and student seminar series on software
entrepreneurship.
Founder and CEO
Designed software for novice computer users to
create multi-media books.
Web development tools and the Internet caused
the product to be non competitive.
Founder and CEO
-485-
2000
Texas
Designed and developed Web based group
decision support software.
Recruited employees and built infrastructure.
Delivered highly regarded product in 6 months.
Built selling partner channel that produced
$100,000 in revenue 3 months after start up of
marketing strategy.
Fulfilled all roles of President, CEO, VP of Sales
and VP of Marketing.
Venture capital backed.
7. Consulting—list agencies and dates, and briefly describe each project:
Dates
2005
2005
2006
2007
Agency
STRATCOM
Union Pacific
Northrop Grumman
Gallup
Project
Advanced Decision Support Systems Workshop
Train Scheduling Simulator
Homeland Security Proposal
Design and Develop Visualization Lab
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
Developed the proposal for the new Bachelor of Science degree in IT Innovation.
Developed the Entrepreneurs Track for Infotec ’09.
Developed and offered the Gallup/AIM Institute/CIS&T seminars and workshops on Web 2.0.
Developed and offered the Gallup/AIM Institute/CIS&T seminars and workshops on Data Visualization.
Formed and lead the Heartland Student Entrepreneurs group.
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
10. Principal publications during the last five years. Give in standard bibliographic format.
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.:
Developed simulation and visualization software that is being used by several Universities in many
countries.
Wrote chapter for book on Decision Support Systems and Business Intelligence to be published by
Prentice Hall in 2010.
Wrote chapter for book on Intelligent Systems published b Springer, 2007.
-486-
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
Term/year
Spring 2009
Fall 2008
Spring 2008
Fall 2007
Course
number
ISQA 4000
ISQA 8080
MGMT 4000
ECON 8916
ISQA 4000
ISQA 8080
MGMT 4000
ECON 8916
ISQA 4000
ISQA 8080
MGMT 4000
ECON 8916
ISQA 4000
ISQA 8080
Course title
Applied Consulting and Model Visualization
Semester
hrs
3
Class
size
20
Applied Simulation and Visualization
3
20
Business Simulation Application
3
20
Adv in Data Visualization
Adv in Data Visualization
3
3
17
3
13. Estimate the percentage of your time devoted to scholarly and/or research activities: 65%. Please give a brief
description of your major research and scholarly activities:
Mentor the One Innovation Place student intern program; Financial planning software targeted at
become the de facto standard for financial literacy training and counseling offered by nonprofits;
Simulation modeling and visualization software for use of Universities; International Academy for
Advanced Decision Support; Business Strategy Visioning.
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the IS program: 90 % for academic year and
none in summer months.
-487-
-488-
Kerry Ward
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Kerry Ward
Assistant Professor
Non-tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Associate Professor
3. Degrees with fields, institutions, and dates
Dates Held
August 2005 – Present
Degree
Field
Institution
Date
PhD
MBA
BS
MIS
Finance/MIS
Business
(Accounting)
Psychology
Indiana University, Bloomington, IN,
University of Notre Dame, Notre Dame, IN
Indiana University, Indianapolis, IN
Dec. 2005
May 1999
May 1992
Wabash College, Crawfordsville, IN
May 1985
BA
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
International Conference on Information Systems (2008)
Academy of Management Annual Meeting (2008)
Third Annual Midwest Conference of the Association for Information Systems (2008)
International Conference on Information Systems (2007)
Academy of Management Annual Meeting (2007)
International Conference on Information Systems (2006)
International Conference on Information Systems (2005)
Teaching Circle on Information Technology for Instruction (2005-2006)
Americas Conference on Information Systems (2005)
International Conference on Information Systems (2004)
-489-
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
Dates
2000 – 2005
1997 – 2002
1996 – 1998
Where
Kelley School of Business
Avarus Network Solutions
Slattery and Holman, P.C.,
Indianapolis, IN
Duties
Associate Instructor
CFO and part owner
Senior Accountant
Implemented accounting systems for clients,
including establishment of chart accounts,
set up of prior accounting information and
training of client personnel
In charge responsibilities for clients including
budgeting, quarterly compilation, review of
payroll and other tax and accounting
functions
7. Consulting—list agencies and dates, and briefly describe each project:
Dates
1999 – 2000
Agency
Management Solutions
Group, Deloitte & Touché,
LLC, Dallas TX
Project
Senior Consultant
Performed package selection projects
Cleaned up dysfunctional ERP
implementations
Worked with computer forensic group
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Member of the University Committee on for the Advancement of Teaching (UCAT)
Member of the professional development committee
Member of graduate program committee
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
Member of the University Committee on for the Advancement of Teaching (UCAT) (2006 – 2009)
Member of the professional development committee (2007-2010)
-490-
Member of graduate program committee (2006-2009)
IA Recruiting Committee (2007-2008)
ISQA Recruiting Committee (2007-2008)
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
Ward, Kerry W. Brown, Susan A. and Massey, Anne P. (2005) Organizational Influences on Attitudes in
Mandatory Systems Use Environments: A Longitudinal Study, International Journal of Business
Information Systems. 1(1&2), (33% Contribution)
Hoff, Greg, Fruhling, Ann and Ward, Kerry W. (2008) Requirement Prioritization Decision Factors for
Agile Development Environments, Proceedings of the 2008 Americas Conference on Information
Systems, (Toronto). (10% Contribution)
Ward, Kerry W., Rees, Jackie and Adu, Prince (2008) Research in Progress: Evaluating the Role of Risk
Models in Information Assurance, Proceedings of the Third Midwest United States Association for
Information Systems, (Eau Claire) (50%)
Street, Christopher T. and Ward, Kerry W. (2007) Threats to Validity and Reliability in Longitudinal Case
Study Timelines, Proceedings of the Academy of Management Annual Meeting, Philadelphia, PA. (50%
Contribution) – Nominated for Best Paper Award and included in Conference Proceedings
Ward, Kerry W. (2004) Generalizing the Theory of Alignment as Guided Adaptation and the Role of
External Change in the Alignment Factor Adaptation Process, International Conference on Information
Systems (ICIS) Doctoral Consortium, (Washington, D.C.)
Ward, Kerry W. (2001) Impact of Industry and Industry Position on IT Focus: An Alternative IT Value
Model, Proceedings of the 2001 Americas Conference on Information Systems, (Boston).
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
4/05 – 12/05 Doctoral Student Grant in Aid of Research $1,000
9/04 – 12/04 Center for International Business Education Research $2,500
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Spring 2009
Course
number
ISQA 3400
Course title
Business Data Communications
-491-
Semester
hrs
3
Class
size
20
Fall 2008
Spring 2008
Fall 2007
ISQA 8060
ISQA 3400
ISQA 8060
ISQA 3400
ISQA 8060
CIST 3110001
CIST 3110002
Research in MIS
Business Data Communications
Research in MIS
Business Data Communications
Research in MIS
Information Technology Ethics
3
3
3
3
3
3
26
16
29
24
20
28
Information Technology Ethics
3
27
13. Estimate the percentage of your time devoted to scholarly and/or research activities: ___50__%. Please give
a brief description of your major research and scholarly activities:
Research interests include IS strategy, Information Assurance, IT infrastructure, and organizational
impacts of information technology. Experience includes seven years consulting and public accounting
with Deloitte and Touché and PriceWaterhouseCoopers.
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-492-
Peter Wolcott
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Peter Wolcott
Associate Professor
Tenured
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Associate Professor
Assistant Professor
Dates Held
August 2001-present
August 1995 – August 2001
3. Degrees with fields, institutions, and dates
Degree
Ph.D.
B.A.
Field
MIS
Computer
Science
Institution
University of Arizona
Dartmouth College
Date
1993
1984
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
Difficult Dialogue “Begin to Develop Cross-Cultural Relationships”, April 8, 2008.
2008 National CASTL Summer Institute: Developing Scholars of Teaching and Learning. June 5-7, 2008
Attended a three-day workshop “GIS for Web Developers” led by Scott Davis and hosted by Raytheon.
August 26-28, 2008.
Attended ½ day workshop entitled “XBRL: Opportunities and Challenges”, Creighton University, College
of Business, September 8, 2008.
“Best Assessment Practices Symposium IX” at Rose-Hulman Institute of Technology, Terre Haute,
Indiana, April 12-13, 2007. Learned a great deal about ABET-accreditation related assessment practices.
Conducted a 20-hour workshop on Database Administration for a group from ITS, April 30-May 3
“The Learning Horizon: Blending Design, Assessment, and Technology” at UNO, May 15-16, 2007.
“CSAB Computing Accreditation Workshop”, October 5, 2007, Tampa, FL. The workshop was designed
to familiarize those involved with accreditation of the new accreditation criteria.
“Cultural Competency 101: Starting Points and Definitions”, at the Center for Human Diversity, Feb. 13,
2008, Omaha, NE. I attended the workshop to gain new skills and insights that would help me and my
students develop relationships with microenterprise owners and others in North Omaha and elsewhere
in the city.
UNO Speech Center workshop “Incorporating Student Presentations Into Your Class”, presented by
-493-
Marlina Howe, January 26, 2007
EDUCAUSE workshop “Assessing the Efficacy of Technology in Promoting Student Learning: Principles
That Anchor Effective Inquiry”, presented by Peggy L. Maki (LSU), September 15, 2006
Oracle Technical Exchange Meeting “Oracle 10g Technology Update: Oracle Service Oriented
Architecture and Oracle Times Ten In-Memory Database,” hosted by Northrup Grumman, Sept. 27,
2006.
Developed three-part on-line lectures on “Data Warehousing, OLAP, and Related Topics” using Camtasia
and Flash. These lectures were designed for and delivered to Agder University College as a guest lecture
in a course entitled “Advanced Database Systems”. 2006
Defining graduate certificates in Project Management, Information Assurance, and Systems Analysis and
Design. There certificates were approved and went into effect Fall 2006.
Developed a dual-degree MBA/MS MIS in conjunction with the College of Business. Proposal approved
& went into effect Fall 2006.
Organized a “GIS Curriculum Workshop” that drew together two dozen GIS practitioners and educators
from the private and public sectors, at the municipal, county, state, and national levels for a 4-hour
workshop to discuss the requirements for a geographic information systems curriculum. Workshop was
held on December 9, 2005
January 18, 2005. Attended the faculty development workshop entitled “Digital Natives”
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
7. Consulting—list agencies and dates, and briefly describe each project
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Member, Distance Education Advisory Council
Member, UNO Assessment Team
Chair, University-wide selection committee for the Peter Kiewit Student Entrepreneurial Award and the
Walter Scott Entrepreneurial Business Award
Chair, ABET Accreditation Steering Committee
Member, Distance Education Steering Committee
Member, Recruiting Committee, CS HPC Position
Director of the Masters of MIS Program
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
Faculty Senate (2005-2007)
-494-
Co-Chair, Library and Learning Resources Committee (Spring 2007)
Member, Distance Education Advisory Council (2005-2007)
Faculty Senate liason to the Faculty Task Force to Design a Common Course Evaluation Instrument
(Spring, 2007)
Assessment mentor for Academic and Student Affairs (Spring 2007)
IT for Development poster presented at the UNO Strategic Planning Forum, March 2, 2007
Member, Institutional Research Advisory Council (AY 2007)
Member, University-wide selection committee for the Peter Kiewit Student Entrepreneurial Award and
the Walter Scott Entrepreneurial Business Award (CY 2008)
Chair, ABET Accreditation Steering Committee (2004-present)
IS&T Personnel Committee (2007-2008)
Distance Education Steering Committee (2007-2008)
Director of the Masters of MIS Program (2005-)
Member, AQIP Advisory Committee for the myMAPP ePortfolio Action Project (2005-2007)
IS&T Academic Committee (2004-2006)
IS&T Personnel Committee (2004-2006)
IS&T Technology Committee (2004-2006)
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
Qureshi, S., Kamal, M., and P. Wolcott “Information Technology Therapy for Competitiveness in MicroEnterprises.” International Journal of E-Business Research. Idea Group International. 5(1), 117-140
January-March 2009.
Wolcott, P., Kamal, M. and S. Qureshi “Meeting the Challenges of ICT Adoption by Micro-enterprises”.
Journal of Enterprise Information Management. Emerald. Volume 21, Issue 6. 2008.
Qureshi, S., Kamal, M., & Wolcott, P. (2008). Information Technology Therapy for Micro-enterprise
Success: Directions for Sustainable Development. Hawaii International Conference on System Sciences,
Hawaii. Jan. 7-10.
Wolcott, P., Qureshi, S., & Kamal, M. (2007). An Information Technology Therapy Approach to Microenterprse Adoption of ICTs. Americas Conference on Information Systems (AMCIS), Keystone, CO. Aug.
10-12.
Abdelaal, A, Kalmal, M., and Wolcott, P. “Employing Social Capital by Small & Medium Enterprises to
Bear Fruit from Wireless Communications,” Midwest AIS 2007.
"Local E-Government in Norway: Current Status and Emerging Issues," Scandinavian Journal of
Information Systems, (17, 2), 2005, pp.41-84.
http://www.cs.aau.dk/SJIS/journal/volumes/volume17/no2/05flaketal.pdf. (with Leif Flak, Dag Olsen)
"The Provision of Internet Services in India," In Information Systems in Developing Countries, Davison,
R.M., Harris, R.W., Qureshi, S., Vogel, D.R. and de Vreede, G.J. Eds.), University of Hong Kong Press, Hong
Kong, 2004.
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
-495-
“Nebraska eTeams for Microenterprise Economic Development” with Sajda Qureshi, Teresa Lamsam,
John Bartle, Ken Kriz, Scott Tarry, Bob Bernier. University of Nebraska Foundation. ($114,494).
Najjar, L., Khazanchi, D. and Wolcott, P. (12/15/2008 to 5/13/2009). "Business Database Competitive
Audit Project". Awarded a grant of $17,603 for conducting a business database audit for InfoUSA.
UCAT funding (2008) to purchase ABET material on rubric development ($149) with Leah Pietron and
Dwight Haworth.
UCAT funding to attend the 2008 National CASTL Institute, June 4-7th, Omaha, NE. ($350)
Najjar, L., Khazanchi, D. and Wolcott, P. (1/1/2005 to 5/31/2005). "Business Database Competitive Audit
Project". Awarded a grant of $14,575 for conducting a business database audit for InfoUSA. This project
was conducted under the auspices of the PKI Technology Development Corp (PKITDC).
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Spring 2009
Fall 2008
Summer 2008
Spring 2008
Fall 2007
Course number
ISQA 8410-001
ISQA 4300/8306
ISQA 4000/8080
ISQA 8410-101
ISQA 8410-001
ISQA 8410-850
ISQA 4300/8306
ISQA 4000/8080
Course title
Database Management
Database Administration
IT for Development
Database Management
Database Management
Database Management
Database Administration
IT for Development
Semester
hrs
3
3
3
3
3
3
3
3
Class
size
25
20
10
24
17
6
15
5
13. Estimate the percentage of your time devoted to scholarly and/or research activities: __100___%. Please
give a brief description of your major research and scholarly activities:
Research: My major stream of research at the moment is in the area of IT for Development. The focus
of the research is on how to facilitate the adoption of information technologies by microenterprises to
bring about economic, social, and human development.
Scholarly activities: In addition to teaching responsibilities, primarily in the area of database
management and administration, and IT for development, I am the director of the MS MIS program and
the chair of the ABET accreditation steering committee. In the latter role, I manage assessment and
accreditation activities for the College of IS&T.
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-496-
Chi Zhang
1. Name, current academic rank, and tenure status:
Name:
Rank:
Tenure Status:
Chi Zhang
Lecturer
n/a
2. Date of original appointment to this faculty, followed by dates and ranks of advancement:
Title
Lecturer
Instructor
Adjunct Faculty
Graduate Assistant
Dates Held
August 2007-Present
August 2001-May 2007
May 2001-June 2001
May 1999-May 2001
3. Degrees with fields, institutions, and dates
Degree
Ph.D.
M.Sc.
M.S.Ed.
B.Sc.
Field
Candidate in
Information
Technology
Computer
Science
Instructional
Technology
Educational
Technologies
Institution
University of Nebraska at Omaha
Date
2004Present
University of Nebraska at Omaha
2000
University of Nebraska at Kearney
1998
Beijing Normal University, China
1990
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or
other ways in which you have achieved competence in the program area; there is no necessity to repeat
information here that is contained in later sections of this document.
5. Conferences, workshops, and professional development programs in which you have participated in the last 5
years to improve teaching and professional competence in the program area: (LIST DATA FOR Fall 2004 –
Spring 2009)
-497-
Presented and Attended research conferences (AMCIS 2005, 2007, 2008; ICIS 2007, PACIS 2008, MWAIS
2006, 2007, 2008; Big XII+ IS doctoral students Symposium 2008)
Attended research development activities (UNL Research Fair 2005)
Attended faculty development workshops (Adobe Connect Workshop 2008, Second Life 2008)
Attended CS workshops and CMIT research round table sessions to get to know colleagues’ research
interests (2005-2006)
Participated in blackboard training programs
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,
description and scope of duties):
Dates
August 1996May 1998
Where
University of Nebraska at
Kearney
Duties
Graduate Assistant
Providing technology assistance in Instructional
Technology Center and providing trainings to faculty,
staff and students. Maintaining department web pages.
7. Consulting—list agencies and dates, and briefly describe each project:
Dates
May 1997August 1998
Agency
University of Nebraska at
Kearney
Project
Computer Consultant
Providing technology assistance, updating office
computer systems, recommending purchases, providing
new application trainings to staff, working with public
computer labs, and creating web pages for the Nebraska
Student Union and student organizations.
8. For the academic year in which the Self Study was written list your assigned duties other than for teaching,
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,
please indicate here which courses.
(LIST DATA FOR Fall 2008 – Spring 2009)
Undergraduate Program Committee Member, Department of Computer Science
-498-
9. For the four years preceding the Self Study, list all department, college, and/or university committees of which
you are/were a member including year(s) served:
(LIST DATA FOR Fall 2004 – Spring 2008)
Undergraduate Program Committee Member, Department of Computer Science (2007 - Present)
Peer Review Committee Member (2007)
IS&T Graduate Affairs (2005)
Merit Raise Committee (2005)
10. Principal publications during the last five years. Give in standard bibliographic format.
(LIST DATA FOR Fall 2004 – Spring 2009)
Zhang, C & Zigurs, I (2009), An Exploratory Study of the Impact of a Virtual Learning World Learning
Environment on Student Interaction and Learning Satisfaction, America’s Conference on Information
Systems, AMCIS 2009, San Francisco, CA. August 6-9, 2008.
Zhang, C (2009), Comparing Sense of Classroom Community and Learning Satisfaction in a Virtual World
Learning Environment, Midwest Association for Information Systems Conference, MWAIS 2009,
Madison, SD. May 22-23, 2008.
Zhang, C (2009), An Exploratory Study of the Impact of a Virtual Learning World Learning Environment
on Sense of Classroom Community and Learning Satisfaction, China Summer Workshop on Information
Management, CSWIM 2009, Guangzhou, China. June 27-28, 2009.
Zhang, C & Zigurs, I (2008), Learning in Virtual Worlds: Understanding the Impact on Social and Cognitive
Processes in Learning, Midwest Association for Information Systems Conference, MWAIS 2008, Eau
Claire, WI. May 23-24, 2008.
Tarmizi, H, Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., Vreede, G.-J. de and Zigurs, I. (2007)
Technical and Environmental Challenge of Collaboration Engineering in Distributed Environments. EService Journal, Vol 6, No.1, Fall 2007.
Zhang, C. (2007). Theory and Practice: Review Technology-Mediated Learning Research. Midwest
Association for Information Systems Conference, MWAIS 2007, Springfield, Illinois.
Kamal, M., Zhang, C., Najjar, L., and Qureshi, S. (2007). Human Development through Information &
Communication Technologies: Theoretical & Empirical Support. Midwest Association for Information
Systems Conference, MWAIS 2007, Springfield Illinios.
Tarmizi, H., Payne, M., Noteboom, C., Steinhauser, L., Vreede, G.-J. de and Zigurs, I. (2006). Technical
and Environmental Challenge of Collaboration Engineering in Distributed Environments. Proceedings of
the 12th International Workshop, CRIWG 2006, September 17-21, 2006, Medina del Camp, Spain.
Noteboom, C., Zhang, C., Tarmizi, H., Steinhauser, L., Payne, M., Vreede, G.-J. de and Zigurs, I. (2006).
Research as Teaching and Teaching as Research: Reflections on a Virtual Team Project. Midwest
Association for Information Systems Conference, MWAIS 2006, May 5-6, Grand Rapids, Michigan.
Tarmizi, H., Steinhauser, L., Payne, M., Noteboom, C., Zhang, C., Vreede, G.-J. de and Zigurs, I. (2006). A
Gaming Laboratory to Study Distributed Collaboration Processes. Proceedings of Collaboration
Engineering Workshop at Hawaii International Conference on System Sciences, HICSS 2006, Kauai, HI.
11. Other scholarly activity during the last 5 years: grants, sabbaticals, software development, etc.: (LIST DATA
FOR Fall 2004 – Spring 2009)
-499-
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this SelfStudy report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter
the information for the year prior to the sabbatical. Please list each section of the same course separately.
(LIST DATA FOR Fall 2007 – Spring 2009)
Term/year
Spring 2009
Fall 2008
Summer
2008
Spring 2008
Fall 2007
Course
number
CIST 2500001
CIST 2500002
CSCI 2710
CIST 2500850
CIST 3100850
CSCI 2710001
CSCI 2710002
CSCI 2710
CSCI 2710001
CSCI 2710002
CIST 2500
CSCI 1500
CSCI 2710001
CSCI 2710002
Course title
Intro to Applied Stats for IS&T
Semester
hrs
3
Class
size
23
Intro to Applied Stats for IS&T
3
22
Intro to Digital Design Principles
Intro to Applied Stats for IS&T
3
3
10
24
Organizations, Applications and Technology
3
25
Intro to Digital Design Principles
3
13
Intro to Digital Design Principles
3
7
Intro to Digital Design Principles
3
11
Intro to Digital Design Principles
3
19
Intro to Digital Design Principles
3
16
Intro to Applied Stats for IS&T
Beginning Programming
Intro to Digital Design Principles
3
3
3
25
11
13
Intro to Digital Design Principles
3
11
13. Estimate the percentage of your time devoted to scholarly and/or research activities: _____%. Please give a
brief description of your major research and scholarly activities:
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the
program, state what percentage of full-time you are assigned to the <indicate which program: IS or CS. If
both, indicate the percentage for each> program: _____%.
-500-
APPENDIX 4 – CURRENT LIST OF SERIALS TITLES
Current List of Serials Titles for Information Science & Quantitative Analysis (ISQA)
Communications of the Association for Information Systems
Computer Security Journal
Data Base for Advances in Information Systems
DECISION SCIENCES - Membership
DECISION SCIENCESDecision support systems.
Electronic Commerce World
E-Service Journal
IEEE transactions on engineering management.
Information & management.
Information economics and policy.
Information resources management journal.
Information systems management.
Information systems research : ISR : a journal of the Institute of
INFORMS journal on computing.
Intelligent enterprise.
International Journal of E-collaboration
International Journal of Electronic Commerce
International Journal of Information Technology and Decision Making
International journal of operations and quantitative management : IJOQM.
International Journal of Project Management
Journal of Computer Information Systems
Journal of Information Warfare
Journal of management information systems : JMIS.Journal of organizational and end user computing.
(ONLINE ONLY).
Journal of software maintenance and evolution.
Journal of the Association for Information Systems
Management science.
MIS quarterly.
Omega.
Telecommunications policy.
Select Engineering Titles
Computer (ONLINE ONLY).
Electronic Design (ONLINE ONLY).IEEE Computer Graphics and Applications (ONLINE ONLY).
IEEE Spectrum (ONLINE ONLY).
-501-
-502-
APPENDIX 5 – STRATEGIC PLAN FOR INFORMATION TECHNOLOGY SERVICE
-503-
INFORMATION TECHNOLOGY SERVICES
Information Technology Services
Strategic Plan
September 2008
through
September 2010
-504-
-505-
AGENCY CONTACT INFORMATION
Primary Agency IT Contact
(List the person responsible for IT in the agency.)
Name John Fiene
Title Associate Vice Chancellor for Technology
Phone 402-554-3670
Email jfiene@unomaha.edu
Information Technology Services (ITS) Contact List
Title
Name
Email Address
Director of
Academic
Computing
Lanyce Keel
lkeel@unomaha.edu
Director of
Administrative
Services
Bret Blackman
bblackma@unomaha.edu
Director of
Information
Technology
Infrastructure
Steve Lendt
slendt@unomaha.edu
Director of IT Project
Management
Joyce Crockett
jcrocket@unomaha.edu
Assistant Director of
Academic
Jay Killion
jaykillion@unomaha.edu
-506-
Computing
Business Manager
Alice Villone
avillone@unomaha.edu
Manager of
Academic
Partnership in
Instruction and
Distance Education
Shelley Schafer
sschafer@mail.unomaha.edu
Manager of
Customer Services
Matt Galardi
mgalardi@unomaha.edu
-507-
Information Technology Services Mission, Vision and Values
Mission
Information Technology Services (ITS) provides technology leadership by bringing the knowledge
assets of the world to the campus via high-speed computer networks. ITS facilitates the innovative
use of technology for instruction, research, and outreach via user-centered services and by
stimulating a culture of academic discovery that contributes to the world-wide academic community.
Vision
ITS develops effective partnerships with the colleges, administrative units, student organizations, and
central administration to provide needed collaboration for building technology infrastructure, and
providing complementary services. These partnerships address both the principles of economies of
scale and personalized services through the coordination of centralized and distributed IT
professionals at UNO. Although our goal is innovation, work is done simultaneously at four levels to
build the necessary infrastructure as a foundation. Today’s innovation becomes tomorrow’s
integration.
The application of technology is simultaneously performed at four levels:
Automation:
creating efficient methods of handling routine tasks that allow greater effort to be
focused on the UNO academic mission.
Integration:
re-engineering to effectively combine shared functions into streamlined
processes that fulfill multiple purposes and reduce redundant efforts.
Communication:
enhancing collaboration by diminishing the effect of geographical distances for
both synchronous and asynchronous dialog: one to one, in groups, and to the
world.
Innovation:
simply using technology to achieve what was previously not possible.
Values
ITS shares the values of the office of Academic and Student Affairs and holds the following values:
Measuring success through the achievements of students, faculty, and staff.
-508-
Creating flexible partnerships with campus units to achieve the appropriate balance of
complimentary centralized and de-centralized functions and services.
Extending the principles of shared governance and shared accomplishments.
Enhancing the welfare, talents, and futures of ITS employees and expanding professional
development.
Encouraging involvement in professional IT associations in education and industry consistent
with staff development plans.
Promoting good stewardship through efficient utilization of resources.
Exercising good judgment through effective applications of technology.
Facilitating meaningful partnerships in our community to enhance learning through the
appropriate use of technology.
Leading proactively in the use of technology to solve problems.
Encouraging the use of technology as a communication tool.
Fostering the use of technology in support of lifelong learning.
Embracing diversity as an effective model of the university’s working environment.
Aligning ITS policies, procedures, and behaviors with the highest professional ideals of ethics
and legality.
Protecting the privacy and integrity of the information resources of the academic community
1. Current Assets (Sections 1.1 through 1.4)
Overview of the UNO Campus and Technology Services
UNO is a comprehensive public university located on 89 acres in the heart of Nebraska’s biggest city
with more than 400 faculty offering 95 baccalaureate degrees, 66 advanced degrees including 6 doctoral
programs. UNO is the NU system’s metropolitan university, which means it provides a multitude of
activities and service learning opportunities in a wide variety of settings that are designed to meet the
needs of the UNO students and the community.
The value of UNO investment in information technology is substantial and must be considered critical to
the daily operations of the organization. Technology is thoroughly integrated into every function of the
university and it is critically important to accomplish the university mission. The most valuable assets are
the knowledge and social capital that are developed in our information technology professionals and
users of information technology that allow the university to work together to perform our mission.
UNO Information Technology Services (ITS) is responsible for providing technology leadership by
facilitating the UNO community’s access to network resources that enhance academic excellence and
-509-
administrative effectiveness. ITS strives to achieve effective partnerships with the colleges,
administrative units, and student organizations. These partnerships simultaneously address the principle
of economies of scale and personalized services to students, faculty, staff, and community.
-510-
Campus Customers/Partners
Statistics in this section copied from the UNO 2007 Fact Book published by UNO Institutional Research
14,156 Undergrad & Grad Students
235 Graduate Assistants
487 Full-time Faculty
393 Part-time Faculty
799 Full-time staff
46 Part-time staff
Administrative Information Services
70,000 Active Pages - Website
Development/ Support
15,000 Students Every Semester Using
150,000+ Page Views Each Week on Main
UNO Web Page
30,000 Daily Transactions using E-BRUNO
Students
250,000 NU ID’s (adding more each day)
5000+ Courses Annually Graded Using EBRUNO/Faculty
30,000 Active Identities
125+ SIS Updates Applied Yearly
30+ Web Template Users
1500+ Ad Hoc WebFocus Reports & 270
Production Reports
1 Datamart
30+ End User WebFocus Support
1,000,000+ Lines of COBOL Code
Supported
1 Mainframe Student Information System
(SIS) Supported
E-BRUNO (Electronic Better Registration
University of Nebraska at Omaha)
-511-
Client Services
4 Distance Education Synchronous Video
Facilities
4,600 PC/Mac Workstations; 100
UNIX/Linux Workstations on Campus
90 Discipline Specific Labs/Computer
Classroom indirect support
42 Kiosk Stations
9 Open Labs w/525 Workstations
Support for Over 40 Software Products
(http://www.unomaha.edu/its/software.php)
Hi-Tech Rooms on Campus:
3 Partnerships for 6 Community Labs
Auditoriums:
16
Conference:
21
Labs:
80
Lecture:
183
Total
300
20,000 Helpdesk Calls/Walk-ins (Yearly)
Academic Partnership for Instruction
Distance Education
Training, Instructional Design,
Multimedia and Web Support
10 DE Programs Supported
107 Training courses taught annually
164 DE Courses supported annually
800+ attendees at training sessions
annually
20 New DE Courses supported annually
15 faculty received instructional design
consulting
3,800 DE Student Enrollments annually
15 Multimedia presentations/projects/
documentation
11,700+ DE Student Credit Hours annually
13 Websites created and/or consulted
-512-
Site Licenses
McAfee: Anti- Virus and Anti-Spyware for
Campus and Home (Students, Faculty and
Staff)
Microsoft: Office, Desktop Operating
system and Servers (Campus Use and
Faculty/Staff Home)
Macintosh: OS10
Statistical and Mathematical Campus
Use:
1. Maple
2. Minitab
3. SAS
4. SPSS
AutoCAD: University of Nebraska
Not Site License - Special prices for
campus use:
Adobe Reseller Campus use
-513-
Significant ITS Custom Applications
Students, faculty and staff use customized technology daily to meet their needs. ITS continuously
collaborates with our clients to provide the optimum technology support that integrates software and
support services. The following list are the significant custom applications developed by UNO ITS that
includes “middleware” to integrate commercial systems with existing ones and web based systems to
support critical University requirements.
myUNO (Blackboard 8.0)/SIS
The myUNO (Blackboard) course management system was upgraded to version 8.0 the spring of 2008. This
version enhanced the level of integration with UNO’s SIS system and improved system performance and
stability.
Weboffice/myFolder
Platform
Windows 2003
Development Tools
Support
Windows Active
Directory
In-house IS staff
UNO has created an integrated and enhanced campus-wide file storage system with a unique web
enabled method of access. By integrating campus standard products such as Microsoft Server, web
browser support and SSL web encryption as well as custom integration software, the UNO campus
now has a departmental document storage system called weboffice that is available to any UNO
department, and an individual document storage system called myFolder that is available to all UNO
faculty, staff and students. The real value of these integrated systems is easy access to documents
from any Internet connected computer.
Identity Management
Campus wide web based systems and forms supported by ITS use a shared account name and
password called the UNO NetID. Custom identity management services include NetID
provisioning/de-provisioning, LDAP population, password resets and creation of University wide
unique identifiers (NU ID). Identity Management processes are being migrated to Sun
Microsystems’s Identity Management Suite.
Sungard SCT - Student Information System (SISPLUS)
UNO’s Student Information System (SIS) supports the core academic business needs of UNO
students. SIS includes Admissions, Records and Registration, Billing and Financial Aid modules.
UNO has created custom enhancements to the base SIS system to meet campus specific policies.
E-BRUNO for Students
Platform
Development Tools Support
-514-
Red Hat Linux
PHP, C, Hllapi
In-house IS staff
E-BRUNO for Students is UNO's web-based enrollment services system. With E-BRUNO for
Students, students can use their NU ID and PIN to log in and obtain grades, current class schedules,
register for classes, pay tuition via credit card, accept financial aid and much more. E-BRUNO for
Students provides students with web access to UNO’s Student Information System.
(https://ebruno.unomaha.edu/login.html)
E-BRUNO for Faculty
Platform
Red Hat Linux
Development Tools Support
PHP, C, Hllapi
In-house IS staff
With E-BRUNO for Faculty, a UNO web-based system, faculty can use their NU ID number and PIN
to log in and obtain class rosters, submit course grades and give permits and authorizations, along
with a host of special Blackboard functions. (https://ebruno.unomaha.edu/php/facstaff/)
Datamart
Platform
Development Tools Support
Red Hat Linux
Web Focus, mySQL
In-house IS staff
UNO developed a campus Datamart, built with data from the Student Information System, to meet
census-reporting requirements.
Short Term Loan System (STLS)
Platform
Development Tools Support
Red Hat Linux
Postgres, PHP
In-house IS staff
UNO developed a STLS to meet the needs of short-term student loans from the Student Accounts
office.
-515-
Data Exchange
Below are the major entities outside of the NU System that ITS exchanges data with.
Entity
Description
JSA Technologies
Web based deposits for Cbord ID card system
National Student Loan Program
(NSLP)
Financial Aid loan services
U.S. Department of Education
Financial Aid processing
National Student Clearinghouse
Degree and enrollment verification
U.S. Immigration and Customs
Enforcement (ICE)
Student and Exchange Visitor Program (SEVP)
Dragonfly Athletics
Athletic Management System
General Revenue Corporation
Collection of past due student tuition and fees
Credit World Services
Collection of past due student tuition and fees
CashNet
Student Accounts system
Internal Revenue Service
1098 tax reporting
Various Banks
Student refunding
-516-
Technical Architecture
Our goal is information availability whenever and wherever (24x7 access, ubiquitous/pervasive, and in
real-time where appropriate). Our choice will be via industry standards, higher education best practices
and using products and solutions providing lower Total Cost of Ownership (TCO) and best services to
the whole campus.
This table is technical in nature and explains the technical architecture ITS will be following over the next
two years. The following web site will assist in defining terms listed in this table. http://webopedia.com/
Legacy
Current
Future
Hardware/Servers
Gigabit & multi-Gigabit network
backbone
X
X
X
X
Dynamic Disk Storage (SAN)
Dell/Intel servers
IBM RS 6000
Limited
Limited
IBM S/390 Mainframe – Based
X
Limited
Intel Based (PC)
X
X
Wireless networking access
X
X
Data Bases
IBM DB2/UDB (Database
2/Universal Database)
X
X
Limited
IBM VSAM (Virtual Storage
Access Method)
X
Limited
Limited
X
X
Sun Enterprise LDAP Directory
(Lightweight Directory Access
Protocol)
-517-
Currently in
Research
Legacy
Lotus Notes document and
tracking database
Current
Future
Limited
Microsoft Active Directory
X
X
Microsoft SQL (Structured Query
Language) server
X
X
Open source DB (Postgres,
MYSQL)
X
X
X
Oracle
-518-
Currently in
Research
Legacy
Current
Future
Server Software
Apache web server
X
X
iWay ETL Manager
X
X
X
Oracle Application Server
Microsoft IIS server for web
enabled applications
X
X
PHP (Php: Hypertext
Preprocessor) for web enabled
applications
X
X
Tomcat
X
X
Hibernate
X
X
Web DAV (Distributed Authoring
And Versioning)
X
X
WebFOCUS Reporting Server
X
X
Lotus Notes
X
X
Blackboard
X
X
Cisco router language IOS
X
X
VMware
X
X
IBM zOS
X
Limited
Redhat Linux on Intel
X
X
Microsoft 200x Server
X
X
Server Operating Systems
Languages
C/CGI (Computer Graphics
Interface)
X
Limited
-519-
Currently in
Research
Legacy
COBOL (Common BusinessOriented Language)
Current
X
Future
X
Limited
X
X
X
Limited
JAVA /J2EE
X
X
JavaScript
X
X
PHP (Php: Hypertext
Preprocessor) Web-scripting
language
X
X
Structured Query Language
(SQL)
X
X
X
X
XHTML
(HyperTextMarkupLanguage)
X
X
XML
(EXtensibleMarkupLanguage)
X
X
CSS
HLLAPI (High Level Language
Application Program Interface)
screen scraping
WebFOCUS
X
X
X
Oracle PL/SQL
-520-
Currently in
Research
Legacy
Current
Future
Currently in
Research
Application Development Methodologies and Toolsets
ANT Build Tool for Java
X
X
Configuration Mgmt Tools (UNIT
testing, etc)
X
X
Eclipse IDE
X
X
NetBeans IDE
X
X
Spring
X
X
Struts
X
X
UML
X
X
Web based Content Mgmt
Systems
X
X
Web Services
X
X
Application Delivery Methodologies/Protocols
IBM DB2 (DataBase 2) Connect
X
X
JDBC (Java DataBase
Connectivity)
X
X
LDAP (Lightweight Directory
Access Protocol)
X
X
iWay Data Adapters
X
X
ODBC (Open
DataBaseConnectivity)
X
X
SOAP (Simple Object Access
Protocol)
X
X
UDDI (Universal Description,
Discovery and Integration)
X
-521-
X
Legacy
Current
WAP (Wireless Application
Protocol) /WML (Wireless Markup
Language)
Future
X
WSDL (Web Services Description
Language)
X
X
XML (EXtensible Markup
Language)
X
X
Direct Analog and Digital Video
over fiber
X
X
H.323
X
X
MPEG4 over IP
X
X
NEB*SAT H.261
Limited
Limited
X
X
c.support
X
X
Microsoft Excel
X
X
Daptiv
X
X
Subversion
X
X
Jira Issue Tracking
X
Limited
Currently in
Research
X
Rich Content Protocols (Video/Audio)
Windows Media Player
Quicktime
Flash
Project Management tools
Lotus Notes Team Room
Limited
-522-
X
Legacy
Current
Future
Currently in
Research
Authentication and Security
TippingPoint IPS
X
X
FTP
X
Limited
LDAP with Unique Username
X
X
PGP
X
X
Photo ID card with Database
X
X
PIN (Personal Identification
Number)
X
X
SAP Personnel Number
X
Limited
SFTP/SCP
X
X
SSH Secure Shell
X
X
SSL/TLS Secure Socket Layer
X
X
Limited
Limited
Foundstone Vulnerability Mgt
X
X
UNO NetID
X
X
NU ID
X
X
Limited
X
Student ID (SSN)
VPN Virtual Private Network
X
X
Limited
X
X
X
X
Sun IdM Suite
Wireless VPN
McAfee Anti-virus and Spyware
McAfee Enterprise Policy
Orchestrator (EPO)
X
Cisco Firewalls
X
X
VLANS
X
X
-523-
Legacy
Current
Future
Currently in
Research
X
Security Event Management
Network Environment
General Description
Information Technology Services professionally manages many of the 'mission critical' computer systems
on campus. These include centralized email servers, centralized file servers, campus inter- and intranetworks, including local and wide area networks, Internet and World-Wide-Web communications,
application delivery systems, academic and research systems, instructional delivery systems including
web-based mediums, and streaming media systems in support of the campus-wide academic mission.
The desktop management software being used is Altiris - http://www.altiris.com/ .
The LAN monitoring tools used are:
What’s Up Gold http://www.whatsupgold.com/
Tipping Point http://www.tippingpoint.com/
Pakateer http://www.netequalizer.com/appe.htm
Foundstone http://www.foundstone.com/us/index.asp
Netmri http://www.netcordia.com/
-524-
Network Devices
Current
Firewalls (Hardware)
3
Wireless Access Points
116
Planned – See
narrative below
Video Cameras (USB)*
IP Phones**
35
POP Servers
0
Web Servers
Windows 2003
34***
Red Hat Linus
35****
Application Delivery (e.g. Citrix,
Terminal Services servers)
(Specify)
Remote Desktop Connection
80
*
UNO has many video cameras across the campus to enhance security and will continue to add in
the appropriate places.
**
ITS is currently testing the use of VOIP. The UNO Telecommunications department has set up
VOIP for the Chili Greens location.
*** This only includes ITS-owned & operated systems and 18 of the 34 are running on VMWare
**** This only includes ITS-owned & operated systems and 29 of the 35 are running on VMWare
With the physical expansion of the UNO campus to the south (Pacific and Center streets) the expansion
of all IT services will be impacted and we are involved in the planning of this growth. On average there
has been a 10% expansion of web servers, but with our use of VMware this growth may change.
-525-
Future Direction & Intent
Campus IT in the next biennium is likely to be heavily influenced by the implementation of a new student
information system across the university system. Such systems represent the core academic business
processes of a campus and tend to affect the overall direction and technical architecture of the institution.
Both vendors under current consideration use Oracle, as the underlying technology and therefore it
becomes core to the IT operations of the campus for development of interfaces to other campus systems
as well as for future application development.
In addition, the unprecedented campus physical expansion and renovations planned in the next two
years similarly mandate re-thinking overall campus infrastructure on a new scale. This may include
campus network re-design with consideration of a fiber ring from the Dodge Campus to the Center
Campus to assure appropriate business continuity. Another factor contributing to network infrastructure
design is ongoing convergence of voice, video and data applications on the IP-based network as well as
ubiquitous wireless access that includes a variety of mobile devices.
In response to environmental sustainability, limited capital resources and staffing limitations, UNO ITS is
in the process of re-inventing the campus data center. Server virtualization is achieving significant
savings in electrical costs, server hardware expenses, and system administration costs. Elimination of
major system printing through an output management system and electronic system distribution of output
allows the elimination of larger system printers, their associated electrical and maintenance costs as well
as paper and other supplies. These steps allow the data center to be managed exclusively by the
systems administration staff with no computer operators. Further work in the “greening” of the data
center will continue to produce similar benefits in the next two years.
Regulatory mandates as well as best practice diligence triggers continued attention to data security and
privacy concerns. While much has been done to address these issues, it is ongoing and dynamic in
ways that will continue to make it a priority into the foreseeable future. One of the attendant issues is
identity management. The university has purchased the Sun Identity Management system, which will
continue to be implemented and refined over the next two years. Continuity Planning will be further
enhanced by the virtualization of alternative site operations.
The Academic Partnership for Instruction (API), a division of ITS continues to provide strategic and
operational support to distance education and to dedicate efforts in integrating emerging technologies
with innovative pedagogy, assessment and instructional design for individual faculty and campus
organizations including the Center for Faculty Development, Teaching Circles, the University Committee
-526-
for the Advancement of Teaching, the Faculty Senate Educational and Resources and Services
Committee, and the Distance Education Advisory Committee.
The increasing viability of Software as a Service and the potential for aspects of infrastructure as a
service will play a role in future IT acquisitions. Project management and elements of business continuity
are currently done in this way and the ongoing evaluation of the success of this approach will continue.
2. Staff and Training
Personnel
Information Technology Services has 45 full time employees with 19 part time student workers.
Depending on the project outside contractors can be involved.
IT Related Training
Summarize the agency’s efforts to address training needs relating to information technology, including
training for IT staff and users.
Yearly performance reviews require ITS employees in conjunction with their manager work on personal
development plans that includes training requirements. Employees receive $250 a year to supplement
their personnel development plans. This money is used to contribute toward attending conferences, join
national technical organizations, and subscribe to technology journals, or purchase books or tools that
support new skill development. Training activities include:
All staff has attended local and national conferences and belongs to national technology
associations.
ITS API staff utilizes a course development model that includes presenting new technology
training courses to ITS staff prior to offering them to the campus. This process provides the ITS
instructor with the opportunity to practice and ITS staff with the opportunity to learn about new
technology.
ITS ADIS staff attended 10 days of Sun Identity Management training.
Each year ITS participates in NU tech day, a system-wide one day workshop for technology
professionals.
-527-
In the last year, the focus of training has been on project management. The newly developed ITS
office of project management has developed and implemented extensive training for senior staff,
project management champions and the staff at large.
Technology training for the campus community consists of formal presentations about upgrades of
campus supported software such as Microsoft 2007, new applications such as the UNO ePortfolio
system used for faculty and staff annual performance appraisals or the campus webpage template, and
new instructional technologies such as clickers. Additionally, ITS staff provides small group and
individual training upon request.
-528-
APPENDIX 6 – COLLEGE OF IS&T SYSTEM OVERVIEW
COLLEGE OF INFORMATION SCIENCE AND TECHNOLOGY
College of Information Science &
Technology
Systems Overview
January 2009
-529-
TABLE OF CONTENTS
CONTACT INFORMATION .................................................................................... 3
COMPUTING SUPPORT MODEL ............................................................................ 3
MISSION AND VALUES ........................................................................................ 4
NETWORK CONNECTIVITY AND CONFIGURATION ..................................................... 5
CLASSROOM, LAB, AND RESEARCH COMPUTERS ...................................................... 9
PRINTING....................................................................................................... 11
VIRTUALIZATION REPORT .................................................................................. 14
SERVER INFORMATION .................................................................................. 16
SOFTWARE LIST – CLASSROOM AND LABS .......................................................... 22
MICROSOFT DEVELOPER NETWORK ACADEMIC ALLIANCE...................................... 24
RESEARCH LABS AND PROJECTS ....................................................................... 25
WEBSITES .................................................................................................. 33
POLICIES, PROCEDURES, AND GUIDELINES FOR TECHNOLOGY USAGE........................ 38
-530-
College of IS&T Systems and Support Contact Information
Location and Hours of Operation
Location: PKI 356B
Phone: (402)554-4932
Emergency Pager: (402)888-2927
Emergency Email Address: 4028882927@atsbeep.com
Hours of Operation: Monday-Friday 8:00am - 5:00pm
Primary IT Contact
Name
Title
Phone
Email
Michael Grove
Director
402-554-2790
mrgrove@unomaha.edu
Email Contact List
The Director will be updating an email list of systems contacts. The list will be used to provide general IT
related updates and information to agencies.
Name
James Harr
Joseph Hrabak
Mohammad Shafiullah
Title
Research Systems Manager
Production Systems Manager
Research Systems Manager
Email Address
jharr@unomaha.edu
chrabak@unomaha.edu
mshafiullah@unomaha.edu
Phone
554-3219
554-3340
554-2973
Computing Support Model
The members of the Systems Staff at the College of Information Science and Technology are dedicated
to providing quality support for faculty, staff, and students. We provide assistance with software
installation and troubleshooting, account creation, departmental purchases, printer installation,
hardware repair, security, server configuration and maintenance, backups, web development, and much
more.
Our approach is different than the standard IT support model. Our team pairs up with faculty, staff, and
researchers forming a true symbiotic relationship. We learn about the project or research being
performed, and work to envision new ways to achieve technological goals. In return, the traditional
researcher or program director receives a fully documented computing solution. This allows both
-531-
partners in the process to grow in their understanding of the material, and to develop new and
innovative ways to provide IT solutions.
College of IS&T Mission and Values
Mission
The College of Information Science and Technology (IS&T) represents the joint efforts of the University
of Nebraska, the State of Nebraska, and private industry to address the growing global needs for
knowledgeable professionals in the area of Information Technology. The college is striving to develop
areas of national prominence in bioinformatics, wireless networks/mobile computing, management
information systems, information assurance, project management, decision support systems &
visualization, collaboration science, theoretical and applied computing. The college mission is:
To provide comprehensive up-to-date education of the highest quality in the various areas of
information science and technology to individuals at the Metropolitan Omaha, state, national
and international level.
To engage in basic and applied research activities to be carried out by students and faculty of the
college with collaboration of other University of Nebraska units as well as profit and non-profit
organizations.
To equip college graduates with the knowledge and expertise to contribute significantly to the
work force and to continue to grow professionally.
To partner with other university units in the development and utilization of information
technology in teaching and service activities.
To partner with local, state, national and international entities in the resolutions of information
technology problems and issues.
In order to accomplish the college's mission and vision, the faculty and staff will strive to achieve the
following three strategic goals:
1. Keep students at the center of all college efforts;
2. Strive to achieve the highest academic excellence; and
3. Actively lead and collaborate with academic, business and community entities in various projects
related to IS&T.
-532-
Values
The college's overarching philosophy is exemplified by the value statement, "No student will go
unassisted or unchallenged." The college is focused on reaching the next level of information technology
innovation through collaboration. This collaboration is fostered by the presence of the college in the
Peter Kiewit Institute and is materializing in the form of research, teaching and service/outreach
initiatives in partnership with our stakeholders in the community (government, public and private
sector), other academic units across the University of Nebraska at Omaha and the rest of the University
of Nebraska System.
College of IS&T Network Connectivity
There are two Gigabit network ports in each faculty and staff office. If you are experiencing trouble with
your connectivity, please call us at 554-4932. There is also a VPN available and wireless access
throughout the building. See the text below for more information.
VPN
The College of IS&T has a Virtual Private Network available for faculty and staff. Connecting to the VPN
allows you to access your files, connect to network shares, print from the wireless network, and more.
Instructions on connecting to the VPN are listed below.
1. Download the IS&T VPN Client. ** If you have a modem in your computer you will need to disable
this. This can be done by opening up the Control Panel and going to Device Manager -> Network
Adapters, then locate your modem and Right-click -> Disable.
2. Navigate to the directory where you saved the file. Double click it to install the application.
3. Click 'Yes' to install the VPN client.
4. Check the box to save a shortcut on your desktop.
5. Double click the 'IS&TVPN - Shortcut' on your desktop to connect to the VPN.
6. You will see a box popup with the UNO logo. Type in your IS&T username and password,
followed by PKI-IST in the 'logon domain' box. (To connect faster in the future, you may check the
'Save Password' or 'Connect Automatically' boxes.)
7. Click connect.
8. You may see your connection status at anytime or disconnect by double clicking the 'IS&TVPN Shortcut' on your desktop.
Connecting to My Office PC: Remote Desktop
-533-
You may control your office computer from a remote location, as long as you are connected to the VPN.
This allows you to have full access to your computers files, printers, programs, etc. See instructions
below.
1. Install the IS&T VPN Client - see instructions above
2. Windows XP: Click Start --> Run --> type 'mstsc' without the quotes, press enter
3. Windows Vista: Click the Windows button (Formerly Start) --> type 'mstsc' without the quotes,
press enter
4. Type the name of your computer in the computer field when the remote desktop box appears
and press enter
(example: computer-name.ist.unomaha.edu)
5. You may find your computer name by going to the control panel and clicking 'System'
Wireless Network
The College of IS&T provides unencrypted wireless network access based on common 802.11 standards.
Currently there are 30 active access points providing PKI with nearly 100% wireless coverage.
How to use it
You'll need a computer or other portable device with 802.11 wireless networking capability either built
in or with a wireless network card installed. If you do not have or are not sure if your computer or device
has 802.11 wireless networking capabilities, check with the company or person from whom you
obtained the item.
Set your SSID network name of 'unowireless'.
The wireless network will attempt to automatically assign the computer or device a network number
using DHCP. You may need to turn the computer or device off and back on so it seeks a network
number. If your computer or device does not have a fairly current version of a standard Windows or Mac
operating system, there may be some special steps that system requires you to perform before being
able to use wireless networking with that device. Check the website or call the technical support number
for the device if you're not sure.
-534-
College of IS&T Network Configuration
Physical Equipment:
15 Network Switches
1 Core Router
1000 Network Ports
35 Wireless Access Points
Over the past 6 months IS&T Systems has facilitated several network architecture changes in the pursuit
of better service to computer users in both performance and security. This portion of the document
explains the changes that have been made through the past year.
The use of network address translation to increase security
There are several reasons why NAT is common place in current networks. The two most prominent
reasons are a shortage of available IP address space and an implicit firewall policy. The network at PKI
uses mixed NAT and public IP addressing. Each has its benefits, but it can also cause problems. The
following diagram is a small part of our network 12 months ago.
Private NAT
Router
Private Lab
Networks
Private
Workstations
PKI Core
Router
PKI Building
Network
Internet
Public Workstations
and Servers
IS&T made extensive use of private addressing for research networks. The primary goal was to increase
security and that was a success. However, several drawbacks arose. Nearly all traffic is forced through
the Private NAT router. While the NAT router operates at 1000Mbps and UNO’s Internet connection
runs at 100Mbit, a majority of burst traffic occurs to/from servers inside PKI. The limited scalability of
this solution soon became apparent; the NAT router becomes the bottleneck in our design.
To mitigate the bottleneck issue, IS&T took several heavily used servers and multi-homed them. That is
gave them addresses on both public and private networks. While this solution works, it is far from
optimal. It increases management overhead, requires several non-standard tweaks to DNS to keep
clients connecting to the appropriate adapter on a server, and some applications simply don’t function
right under this set up, in particular any application requiring a license server. This is ignoring the fact
that humans do make occasional mistakes and a mistake configuring a DNS entry can render the service
it pertains to useless until it is fixed.
-535-
Transitioning back to all public addresses was not an option and remains so to this day. Several labs use
network sniffers as educational tools and UNO policy dictates that these networks must be isolated on
the layer 1 and 2 network level. A new approach was needed to maintain security, improve
performance, and simplify server management.
A new approach – Internally routable private addresses
IS&T Systems came up with a new network model to solve these issues without increasing our security
footprint. We wanted to make full use of the PKI Core. It has the capability to route 1.2Tbps, and has
20Gbps fiber links to the edge switches. Compare this to the 1Gbps the NAT router offers, it is a
phenomenal improvement. We came to the conclusion that we needed to make use of the core router
and policy routing to increase performance and decrease management overhead. The following diagram
illustrates our new model, which, excluding a few minor details, has been implemented fully.
Private
Workstations
PKI Border
Router
PKI Building Network
Internet
(including the PKI-Core router)
Public Workstations
and Servers
Private NAT
Router
The new model calls for the core to handle all routing in the building. Private and Public networks are
handled the same. The difference comes when a workstation or server makes a request destined for the
Internet. The core router uses policy routing to forward public addresses directly to the PKI Border
router as usual. However, private addresses are routed to the Private NAT router, now placed at the
border of the PKI network. NAT only occurs for packets destined for the Internet or North Campus. The
performance increases and simplification of server management became immediately visible to the IS&T
systems staff.
The networks’ bottlenecks have been eliminated and the NAT router is no longer saturated on a daily
basis, research networks are still isolated from the rest of the network using VLAN technology, server
-536-
configuration has become significantly simpler, and the NAT router is now able to handle the load
without any question of performance.
-537-
College of IS&T Classroom, Lab, and Research Computers
The Systems Staff maintains classrooms and computer labs that directly support academic and research
endeavors of the College. Each lab is unique in function, and customized to suit student, faculty, and
staff needs. Students, faculty, and staff may login using their UNO netID. Lab hours are posted outside
of each room. For software installation requests, please contact us at any time.
All computer labs and classrooms have Dell® Precision 390 workstations with the following
specifications:
Intel® Core 2 Duo 2.66Mhz processor
160GB Hard Drive
2GB of RAM
NVIDIA® Quadro FX 3500 Video Card
7 USB ports
3 fire wire ports
Audio jacks in the front and rear
DVD/RW Drive
Below is a list of classroom and lab functions, number of seats, and number of computers.
Room
PKI155
PKI157
PKI158A
PKI158C
PKI158G
PKI158K
PKI160
PKI161
PKI164
PKI172a
PKI252
PKI256
PKI259
PKI260
PKI261
PKI263
PKI269
PKI270
PKI274
PKI276
PKI277
PKI278
PKI 279
Purpose
Classroom
Classroom
Public Computer Lab
IST&E Student Computer Lab
“WOW” Room
Data Mining Lab
Instructional Technology Center - Distance Learning
Instructional Technology Center - Distance Learning
Instructional Technology Center - Distance Learning
Dean's Conference Room
Classroom
Classroom
Graduate Student Lab
Instructional Technology Center
Classroom
Classroom
Instructional Technology Center
Classroom
PhD Student Lab
Instructional Technology Center
Conference Room
Instructional Technology Center for Networking
Instructional Technology Center
-538-
Seats
45
23
50
42
10
20
44
26
56
8
45
40
9
45
35
34
30
30
13
30
8
16
30
Computers
1
1
50
40
8
10
1
1
1
1
1
1
9
45
1
1
30
1
13
30
1
16
3
PKI285A
PKI335
PKI350
PKI355
PKI356A
PKI356C
PKI357
PKI356B
PKI359
PKI360
PKI361
PKI362
PKI366
PKI366A
PKI367
PKI370
PKI374
PKI375
PKI377
PKI378
PKI383
PKI387
Faculty/Staff
Laptops
STEAL Lab 3
Classroom
STEAL Lab 1
Graduate Student Lab
One IP Lab
Adjunct Faculty
E-Learning Lab
Systems Office
Classroom
W.I.N.D.S. Research Lab
STEAL Lab 2
CMANTIC Research Lab
Chronoscope Research Lab
Systems Storage
IS&T Attic
MOSAIC Research Lab
Metaverse Research Lab
Multimedia Production Lab
Classroom
Bioinformatics Research Lab
Classroom
Classroom
Office Computers/Laptops
Group Decision Support/Systems Checkout
Totals
-539-
8
28
40
2
20
3
2
12
44
4
25
4
5
0
12
4
6
15
30
6
32
25
90
0
1086
8
1
40
2
7
3
2
30
1
4
25
5
5
4
12
4
6
15
1
6
1
25
120
24
607
College of IS&T Printing
Faculty and Staff Printing
There are two Konica Minolta 750 printers available for Faculty and Staff use. They are located in rooms
170 and 270, and have scanning, copying, and stapling functionality built in. These printers are
automatically installed when you login to your office computer using the IS&T domain. To locate them
on your Windows computer open your control panel and click printers.
Student Printing
All students with a valid UNO Net ID and MavCard may use the printer in lab 158a. For more
information, see instructions here. Graduate and PhD students may print in your respective labs and
offices. If you are experiencing trouble printing, please call us at 554-4932.
Wireless Printing
Faculty and Staff members may print from the wireless network; however you must be connected to our
VPN. After connecting to the VPN, click the install printers link. The 1st and 2nd floor faculty printers will
install automatically.
(Type PKI-IST\your-username and your domain password when prompted)
Step 1) Install IS&T VPN (Windows XP and Vista)
1. Download the IS&T VPN Installer. ** If you have a modem in your computer you will need to
disable this. This can be done by opening up the Control Panel and going to Device Manager ->
Network Adapters, then locate your modem and Right-click -> Disable.
2. Navigate to the directory where you saved the file. Double click it to install the application.
3. Click 'Yes' to install the VPN client.
4. Check the box to save a shortcut on your desktop.
5. Double click the 'IS&TVPN - Shortcut' on your desktop to connect to the VPN.
6. You will see a box popup with the UNO logo. Type in your IS&T username and password,
followed by PKI-IST in the 'logon domain' box. (To connect faster in the future, you may check the
'Save Password' or 'Connect Automatically' boxes.)
7. Click connect.
8. You may see your connection status at anytime or disconnect by double clicking the 'IS&TVPN Shortcut' on your desktop.
Step 2) Install IS&T Printers (Windows XP and Vista)
1. Download the IS&T Printer Installer.
2. Navigate to the directory where you saved the file. Double click it to install the application.
3. Setup should take anywhere from 10 - 60 seconds. You can watch the status of the installation by
going to your Control Panel and opening up the printers folder.
-540-
4. You will receive a success message if the printers install properly, and error message if the install
fails. If you do receive an error message, please contact the systems office at 554-4932.
Below is a list of all printers managed by IS&T Systems. Printers with an * indicate a shared device.
Location
PKI 158A*
PKI 170*
PKI 170B
PKI 172
PKI 172B
PKI 172C
PKI 172C
PKI 172E
PKI 173A
PKI 173C
PKI 173D
PKI 173E
PKI 174C
PKI 174E
PKI 174F
PKI 174G
PKI 174H
PKI 174I
PKI 175A
PKI 175A
PKI 175c
PKI 175D
PKI 175E
PKI 176B
PKI 176C
PKI 176D*
PKI 176D
PKI 176E
PKI 177A
PKI 177A
PKI 177B
PKI 177C
PKI 177D
PKI 259*
Model
HP LaserJet 4200n (2)
Konica Minolta Magicolor
HP Photosmart 1215
HP Laserjet 2200
HP Laserjet 4050
HP Deskjet 970cxi
HP LaserJet 2200
HP DeskJet 5600
HP Laserjet 4050
Dell 1720
HP LaserJet 2200
HP Officejet 6300
HP Laserjet 2200DN
HP LaserJet 1018
HP Photosmart 1215
HP PSC 2400
HP LaserJet 4050
HP LaserJet 2200
HP Color Laserjet 4500
HP Officejet G55
HP DeskJet 970 CXi
HP LaserJet 3330
HP Laserjet 2100
HP LaserJet 1022
HP DeskJet 5100
Magicolor 2300DL
Konica Minolta 2300DL
HP LaserJet 1022
HP Photosmart 1215
HP LaserJet4050 Series PS
HP OfficeJet 7400
HP PhotoSmart C5180
HP Laserjet 2200
HP Laserjet 4050
-541-
PKI 260*
PKI 269*
PKI 274*
PKI 275B
PKI 276*
PKI 279*
PKI 280A*
PKI 280B
PKI 280C
PKI 281A
PKI 281C
PKI 281D
PKI 281E
PKI 282B
PKI 282C
PKI 282D
PKI 282E
PKI 282F
PKI 282G
PKI 282H
PKI 282I
PKI 283B
PKI 283E
PKI 284A
PKI 284B
PKI 284C
PKI 284D
PKI 284E
PKI 285A
PKI 286*
PKI 355*
PKI 356B*
PKI 360*
PKI 362*
PKI 375 *
PKI 378*
PKI 391*
HP Laserjet 4050
HP LaserJet 4350tn Printer
HP Laserjet 2015DN
HP LaserJet 1100 Series
HP LaserJet 4350tn Printer
HP Laserjet 4050
HP 4050N
HP Laserjet 4050
HP Color Laserjet 5500
HP Color Laserjet 2600N
NEC SuperScript 870
HP Color LaserJet 1000
Hp LaserJet 1320 Series
HP PhotoSmart 1215
HP LaserJet 2200
HP Professional 2000C
HP LaserJet 2420
HP LaserJet 2200
HP LaserJet 2100TN
HP LaserJet 3030
HP LaserJet 3030
HP PhotoSmart 1215
HP DeskJet 895C Series
HP PhotoSmart 1215
HP LaserJet 1022
HP LaserJet 1022
hp LaserJet 1320
HP LaserJet 2200
HP PhotoSmart 1215
HP Laserjet 5550 Color Printer
HP 2100TN
HP LaserJet 4050 Series PS
HP Laserjet 2420
HP LaserJet 2420 PS
Sharp Color Printer
HP LaserJet 2200
HP Laserjet 8100
-542-
College of IS&T Virtualization Report – January 2009
During the summer of 2008, the PKI Foundation did a round of server upgrades for the College of IS&T, the
College of Engineering, and the PKI Infrastructure group. Virtualization had started to take a foothold in the IT
industry as a cost effective IT tool, so it was debated as to whether to continue using our physical server layout
that we had in the past, or forge ahead with this new technology. After several in depth discussions, it was
decided that all 3 entities would push forward with virtualization. This document gives a broad technical overview
of the college of IS&T’s virtualization infrastructure.
Virtualization Software
VMware Infrastructure Enterprise was chosen after a product demo. It proved to be stable, flexible, and was the
industry standard for x86 virtualization at the time (and still is as of this document’s publish date). VMware
supports a wide variety of features that increase the performance of the virtualization farm. A brief summary of
these features follows:
VMware Virtual Center – A centralized console for managing all aspects of the virtualization
cluster.
VMFS – Shared storage file system that runs over Fiber Channel or iSCSI SAN Fabrics.
VMotion/SVMotion – Ability to move a live virtual machine from one ESX host to another
without rebooting, downtime, or loss of data.
DRS – Distributed Resource Scheduling. A service that uses VMotion to balance physical server
load to provide optimum VM performance.
VMware HA – A service that monitors hardware health metrics and will evacuate VMs from a
host if hardware failure is eminent.
VMware Consolidated Backup – An API for backup software to efficiently back up virtual
machines over the SAN without impacting the performance of the cluster.
Performance metrics to measure bottlenecks for cluster performance to help ensure peak
performance.
VMware Converter Enterprise – Software to convert existing physical servers into virtual servers.
Virtualization Hardware
After reviewing configuration options, 4 Dell 2950 servers were chosen with 8 processor cores, 32GB of ram, and
6x1 gigabit network connections. The servers were built with reliability and performance in mind. iSCSI was
chosen as a SAN protocol as it fit into our existing network infrastructure, proved to be more cost-effective than
Fiber-Channel, and is displacing Fiber-Channel as the industry standard storage protocol.
PKI donated space on the EMC CLARiiON to the virtualization farm. The CLARiiON has redundant power, network,
data paths, and data movers. In short, any component can fail without a SAN outage. An EMC AX4-5i was
purchased as a secondary storage medium for backup.
Current State
At the end of the summer 2008 semester, the VMware cluster was set up and testing began. The cluster endured
several tests of SAN component failure, network failure, hardware failure (memory errors, etc) and still remained
-543-
stable. During the fall semester of 2008, virtualization was implemented and IS&T’s existing server infrastructure
was converted over to virtual machines. IS&T maintains a few core servers outside the VMware cluster to keep
vital services operating if the cluster were to suffer a complete failure.
Traditionally, new server hardware requires a fresh Operating System install which lengthens the time required to
implement hardware upgrades. This is no longer true and is a great benefit of Virtualization. The decoupling of
hardware upgrades and software upgrades has greatly increased the flexibility and productivity of IS&T Systems.
When the next round of hardware upgrades come through, a rolling upgrade can and will be performed. That is
upgrade hardware piece by piece while keeping all the VMs operational. This significantly reduces the amount of
time spent on hardware upgrades and allows software upgrades to be performed at a more appropriate time.
Performance
The virtualization cluster has performed beyond expectations. For the month of December 2008, CPU load
averaged 11.3% and peaked at 30%; Memory utilization averaged 66%. The cluster currently runs 48 virtual
machines (production, research, and internal R&D VMs). It is important to emphasize that for virtualization
clusters to maintain optimal performance, resource utilization should peak at 80% or below.
Power consumption has been drastically decreased and while metrics for SAN and network are not available, but
the cluster nodes utilize only 800 watts of power total, over a 3 fold reduction in power utilization. This has also
reduced the cooling requirements for the production server room. While IS&T does not directly pay for power, it
is an important contribution to keeping the university utility costs down.
The next section of the document will list all IS&T servers, both virtual and physical.
-544-
College of IS&T Servers
The Systems Staff maintains numerous servers that directly support academic and research endeavors of the
College. Each server is unique in function, and customized to suit student, faculty, staff, or project needs.
Production Virtual Machines (16)
VM Hostname
Description
Contacts
altiris
Deployment Server: Altiris Deployment Server,
Deepfreeze Enterprise Server, DHCP Services for the
Network
bfdc1
Domain Controller for the Blackforest site
bfdc2
Domain Controller for the Blackforest site
cistvss
IST Systems internal SharePoint server
exchange
Mail server
license1
Licensing server for OPNet, MATLAB, any pooled license
software we have.
license2
Redundant license server for MATLAB, any pooled license
software we have.
manage
Production Domain Controller, Production print server
James Harr
jharr@ist.unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
James Harr
jharr@ist.unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
James Harr
jharr@ist.unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
metis
Production Domain Controller; McAfee E-Policy
Orchestrator Server; Temporary license server for OPNet
-545-
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
pf1
NAT Router for private network addresses
pf2
Redundant NAT router
six
2008 test domain controller
sus
Windows Server Update Services (Manages software
updates for Microsoft products)
svn
Subversion (revision control) server
vpn
VPN Server
windows-web
Primary Production Web Server
-546-
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
College of IS&T Production Non-VM Servers (112 including 56 Blackforest nodes)
VM/Non-VM
Hostname
Short Description
Contacts
acm
Web & Project server for the UNO ACM Association of
Computing Machinery Chapter
apollo
Community Outreach Production
atticfw
Community Outreach Firewall
azureus
Course development server
bfnfs
Blackforest Cluster Network File System Server
biigserver
Bioinformatics Development server (Non-VM)
biigserver2
biigserver replacement
biobase
Bioinformatics Course and Development server (Non-VM)
bioshare
Bioinformatics Sun Storage (Non-VM)
blackforest
Blackforest Cluster Web interface (Non-VM)
blizzard
Student development server for Programming on the
Internet
Text Mining Lab server (Non-VM)
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Erin Cox tygrr.v2@gmail.com
Zac Fowler
zfowler@unomaha.edu
Zac Fowler
zfowler@unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Josh Johnston
mociyl@gmail.com
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Robert Fulkerson
robert.fulkerson@gmail.com
Mohammad Shafiullah
mshafiullah.ne@gmail.com
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Mohammad Shafiullah
mshafiullah.ne@gmail.com
chronoscope
clabsvn
CLAB (Collaborative Laboratory for Applied Bioinformatics)
SVN server (Non-V M)
cmjsp
Chad Meyer’s Japanese study web application
-547-
csalpha
Computer Science server (Non-VM)
Csalpha2
Computer Science server (Non-VM)
Csalpha3
Computer Science server (Non-VM)
db
Community Outreach Database Server
callisto
Community Outreach Development Server
df
Web server for the KEWI (Knowledge Engineering and Web
Intelligence) Group
elearning
Production Faculty/Staff Streaming Media Server
esx1
Clustered Virtual Server Farm
esx2
Clustered Virtual Server Farm
esx3
Clustered Virtual Server Farm
esx4
Clustered Virtual Server Farm
flashcom
Community Outreach Streaming Media Server
gsaf
Gene Sequence Analysis Facility legacy server at UNMC
hive
College of IST Ubuntu, CentOS, and OpenBSD mirror (NonVM)
Nessus Scanner Server
istaudit
-548-
Chad Meyer
chadmeyer001@gmail.com
Stan Wileman
stanw@unomaha.edu
Stan Wileman
stanw@unomaha.edu
Stan Wileman
stanw@unomaha.edu
Zac Fowler
zfowler@unomaha.edu
Zac Fowler
zfowler@unomaha.edu
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Josh Johnston
mociyl@gmail.com
Joe Hrabak
chrabak@mail.unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
Zac Fowler
zfowler@unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
James Harr
jharr@ist.unomaha.edu
Josh Johnston
mociyl@gmail.com
Mohammad Shafiullah
mshafiullah.ne@gmail.com
James Harr
jharr@ist.unomaha.edu
ist-file
College of IST user network shares server (Non-VM)
irc
Systems Administrators’ communication server
jrt
Software Engineering course server
karp2
Dr. Chundi’s text mining research server
kitty
Clone of blizzard for testing purposes
klab
private Wiki for CLAB (Collaborative Laboratory for Applied
Bioinformatics) (Non-VM)
lb1
NAT Router for the Blackforest Cluster (Non-VM)
lb2
Redundant NAT Router for the Blackforest Cluster (NonVM)
mascot
Web server for the Bioinformatics tool Mascot
missouri
Community Outreach Webserver
mp1
Bioinformatics course server (for Mark Pauley) (Non-VM)
mp2
Bioinformatics course server (for Mark Pauley) (Non-VM)
necro
Linux Server BackupPC solution
oracle
Database course server
padev
Web server for the tool for the pattern discovery and
-549-
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
James Harr
jharr@ist.unomaha.edu
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Josh Johnston
mociyl@gmail.com
James Harr
james.harr@gmail.com
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Bob Fulkerson
rfulk@unomaha.edu
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Zac Fowler
zfowler@unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Mohammad Shafiullah
mshafiullah.ne@gmail.com
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Joe Hrabak
chrabak@mail.unomaha.edu
Joe Hrabak
pegasus
usage in virtual project management
chrabak@mail.unomaha.edu
Community Outreach Development Server
Zac Fowler
zfowler@unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Mohammad Shafiullah
mshafiullah.ne@gmail.com
James Harr
jharr@ist.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Joe Hrabak
chrabak@mail.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
James Harr
jharr@ist.unomaha.edu
Joe Hrabak
chrabak@mail.unomaha.edu
Mohammad Shafiullah
mshafiullah.ne@gmail.com
Mohammad Shafiullah
mshafiullah.ne@gmail.com
phpmysql
phylogeny
Bioinformatics course
server (for Dhundy Bastola)
rain
Rheumatoid Arthritis Investigational Network web server
(Non-VM)
College of IST research Windows Terminal Server (NonVM)
research
sp1
ssp
Motif Tools Assessment Project Development server (for
Dan Quest) (Non-VM)
Redundant Motif Tools Assessment Project Development
server (for Dan Quest) (Non-VM)
Sharepoint server
vulcan
Student Programming/Web development
zenoss
Monitoring server
sp2
-550-
College of IS&T Classroom and Lab Software List – Spring 2009
The College of IS&T has various software available for faculty, staff, and student use in our classroom and labs. Applications with an * indicates site license or open source.
Software Package
Adobe Reader*
Adobe Acrobat Professional 8
Adobe Creative Suite
Adobe Photoshop CS3
Adobe Creative Suite 4 Web Prem
AllFusion Suite 7*
ArcView GIS 3.3
Camtasia Studio 5
CN 3D 4.1
Clickers*
Clickers PowerPoint*
ColdFusion Studio
Eclipse*
Firefox*
Flash Player*
Gimp 2.0*
Gnu Prolog*
Google Earth*
Homesite 4.5*
IBM Rational Requisite Pro
Java*
Jcreator
Maple
MapWin
Matlab
Maya 7.0
McAfee Anti-Virus*
Microsoft Internet Explorer*
Microsoft Office 2007*
Microsoft Project 2007
Microsoft Visio 2007
155
157
x
x
158a
158c
158k
160
161
164
260
261
269
270
276
278
279
357
359
375
383
387
391
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
-551-
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Microsoft Visual Studio 2005*
Microsoft Visual Studio 2008*
Microsoft Visual Studio 6*
Microsoft Silverlight*
Microsoft SQL Server
Multisim 7
Multisim 8
Netbeans IDE 5.5*
OpNet
Oracle
PC Alert*
Pov-Ray 3.6
Primo PDF*
Putty*
Python*
Quicktime Player*
QT by Trolltech 4.1.1
Real Player*
SAP Front End*
SAS*
See5
Shockwave Player*
SPSS
SQL Yog
SWI Prolog
Terragen
Visual Ham
Visual Logic
Visual Prolog
WinSCP*
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
-552-
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Other Software Available at the College of IS&T
MSDNAA
The Microsoft Developer Network Academic Alliance is a program that the College of IS&T
subscribes to that allows us to offer free Microsoft software to Faculty, Staff, and students that
have majors or minors declared in Computer Science, MIS, Bioinformatics, and Information
Assurance. Below is a current list of available software. For more information, go to
http://www.ist.unomaha.edu/msdnaa . If you would like to provide this to your students,
please send us a class list and course number.
Expression Studio
Microsoft Groove 2007
Microsoft InfoPath 2007
Microsoft OneNote 2007
Microsoft Project Professional 2007
Microsoft SharePoint Designer 2007
Microsoft SQL Server 2005 Standard Edition - 32-bit - DVD
Microsoft Visio Professional 2007
Microsoft Visual Studio 2008 Professional
Windows Server 2003 R2 Enterprise - 2 Discs
Windows Server 2003 Standard Edition
Windows Server 2003 Web Edition
Windows Server 2008
Windows Services for UNIX
Windows Vista Business (32 and 64bit)
Windows XP Professional (32 and 64bit)
-553-
College of IS&T Research Labs and Projects
BioCMS
Website: https://biodev.ist.unomaha.edu
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com
Overview:
BioCMS is a prototype version of a Content Management System developed for enhancing the
bioinformatics researcher experience. This project is being undertaken by the Genetic Sequence
Analysis Facility at the College of IS&T at the University of Nebraska at Omaha using WebGUI.
Bioinformatics Lab
Location: PKI378
Director: Dr. Hesham Ali, Dean
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com
Equipment:
5 Dell Desktops
1 Mac Desktop
1 Printer
Flat Screen LCD TV
Overview:
Bioinformatics merges computer and information science with the study of genetic information and
biological structures. Bioinformatics allows researchers to open new windows of insight into our genetic
makeup, providing pathways to understanding disease processes and creating novel diagnostic and
treatment strategies. There is an immense and growing need for experts in this field, in order to
capitalize on the growing body o knowledge regarding the genome.
Blackforest Cluster
Location: PKI158B
Director: Mike Grove
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com, James Harr –
jharr@unomaha.edu
Website: http://blackforest.gds.unomaha.edu/
Equipment:
56 IBM Servers
3.2 TB Centralized Storage
-554-
Overview:
The Blackforest Computing Cluster was funded through the National Science Foundation's Biomedical
Research Infrastructure Network, and is located in the College of Information Science and Technology at
the University of Nebraska at Omaha. The Blackforest is one of four clusters in Nebraska funded through
BRIN, each capable of utilizing the computational power of the others in times of need.
Currently the Blackforest Cluster at the University of Nebraska at Omaha consists of forty nodes, which
run MPICH. MPICH is a freely available, portable implementation of MPI, the Standard for messagepassing libraries. Message passing is a paradigm used widely on certain classes of parallel machines
especially those with distributed memory. There is also a proprietary web interface solution we call
"Nazo". This interface allows chemical and biomedical researchers to manage their interaction with the
cluster in a simple, easy to understand manner. All results are stored locally, so that researchers can
retrieve any query/job run in the past. In addition, researchers can apply to house their own custom
BLAST databases on the cluster, for faster searches with near real-time updatability.
Chronoscope
Location: PKI366
Director: Dr. Parvathi Chundi
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com
Equipment:
3 Dell Desktops
1 IBM Desktop
1 Server(IBM)
Overview:
The objective of this project is to extract temporal information by constructing several time
decompositions (time points). Now we are studying the time decomposition problem in the context of
medical research abstracts. We extract temporal information pertaining to a disease or an organism by
constructing several time decompositions of research abstracts and by correlating the meta-information
associated with the abstracts. This experimental study will demonstrate the effectiveness of the time
decomposition method on research journal articles in the medical domain.
CMJSP
Website: http://cmjsp.ist.unomaha.edu/
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com
Overview:
This site is designed to help intermediate and advanced students of the Japanese language further
develop their language skills. It works by having the user create lists of kanji or words they wish to study
-555-
and then using these lists in review applets. Words can be added to lists by either directly finding words
in the Dictionary, to performing queues on the database to find words that match your criteria. Once
you have a list with all the words you want, go to the Review section to review it.
i3Bio
Website: http://i3bio.gds.unomaha.edu/
Technical Contact: James Harr – jharr@unomaha.edu
Overview:
Advances in medicine such as organ and bone marrow transplantation have increased the number of
people who are immuno-compromised and susceptible to mycobacterial infections. Mycobacteria in
general and Mycobacterium tuberculosis specifically are known as the great imitators in clinical
medicine because the symptoms that they cause resemble numerous other diseases. The ability to
detect and identify microbial pathogens rapidly for optimal patient management is limited by growthbased phenotypic testing methods now used in the microbiology laboratory. This limitation is of greatest
challenge for the evaluation of those pathogens that grow slow, those that require specialized methods
for detection and identification, and for those emerging pathogens that have become more common in
current clinical practice. Organisms commonly associated within this group include, but are not limited
to the Mycobacterium species and fungi.
Cmantic Lab – Collaborative Multi-Agent Networking Technologies and
Intelligent
Location: PKI362
Director: Dr. Raj Dasqupta
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com
Website: http://prithviraj.dasgupta.googlepages.com/cmanticlabpage
Equipment:
4 Dell Desktops
1 Printer
Overview:
This research lab focuses on the following major topics: multi-agent systems, swarmed robotics and
game theory and computational economics.
Led by Dr. Raj Dasgupta, the research focus for the group is in developing technologies for coordinating
individual resource-constrained components to behave collectively and collaboratively as a single, largescale distributed system. A major application is controlling a team of mobile mini-robots using multiagent algorithms. The unique contribution of this research has been to integrate market-based
techniques for multi-robot coordination with swarm-based techniques for robot control.
We are currently developing technologies for coordinating individual resource-constrained components
-556-
to behave collectively and collaboratively as a single, large-scale distributed system. One of our major
applications is controlling a team of mobile mini-robots using multi-agent algorithms to collaboratively
perform complex tasks in an unknown environment. The unique contribution of our research has been
to integrate market-based techniques for multi-robot coordination with swarm-based techniques for
robot control.
The Collaborative Multi-Agent Networking Technologies and Intelligent Coordination Lab is located at
the Peter Kiewit Institute, Room 362.
Data Mining Lab
Location: PKI158K
Director: Dr. Yong Shi
Technical Contact: Mike Grove – mrgrove@unomaha.edu
Website: http://prithviraj.dasgupta.googlepages.com/cmanticlabpage
Equipment:
9 Dell Desktops
Overview:
The data mining research laboratory was set up by NU foundation to support research and teaching on
data warehousing and data mining, and to allow students, faculty, and industry fellows to conduct
application-oriented projects for analytic customer relationship management (CRM), bioinformatics and
other real-world applications. The multidisciplinary nature of these projects means that the laboratory
will significantly enhance the collaboration in the departments of IS&T: Computer Science and
Information System and Quantitative Analysis, and between IS&T and other university units, such as the
College of Engineering and Technology in the PKI building, the College of Business Administration at
UNO, UNMC, and numerous business and industry for joint research and teaching activities in data
mining.
E-learning Lab
Location: PKI357
Director: Dr. Leah Pietron
Technical Contact: Mike Grove – mrgrove@unomaha.edu
Website: http://elearning.ist.unomaha.edu
Equipment:
1 Dell Desktop
1 Mac Desktop
Web cameras
Headsets with voice
-557-
Overview:
The E-Learning Lab is designed for faculty and staff to create classroom material (Videos/Lectures) for
online and distance education.
Group Decision Support Lab
Location: PKI279
Director: Dr. GJ deVreede
Technical Contact: Mike Grove – mrgrove@unomaha.edu
Equipment:
22 Dell Laptops
1 Dell Desktop
3 Projectors
Overview:
The Group Decision Support Lab is an active high-tech meeting room with facilities which enhance faceto-face meetings in the room, as well as computer-mediated collaborations involving participants
worldwide. The lab contains presentation, display, and communication technologies which enhance the
information exchange for all meeting participants. Research efforts in the Group Decision Support Lab
address meeting facilitation, meeting participation, information exchange, and document collaboration.
MTAP
Website: http://biobase.ist.unomaha.edu
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com
Overview:
Automated regulatory motif detection is a fundamental problem in molecular biology. Currently, there
are more than 80 different tools for identification of cis-regulatory motifs. Consequently, it is extremely
difficult for the molecular biologist to know which tools are effective even on the most simple of
genomes. A root cause of this is a lack of good datasets for benchmarking. Recently, Tompa et al. (2005)
proposed a dataset and complementary benchmark for eukaryotes. In this work, we expand upon this
study by introducing a complementary dataset and benchmark for Escherichia coli and Bacillus subtilis.
Using RegulonDB and DBTBS as our true positives, we evaluated sensitivity, specificity and other
important statistics for prokaryote motif detection programs. Even though this domain is less
challenging than eukaryotes, our preliminary data shows that current motif detection programs still fall
short of accurate detection of regulatory motifs in prokaryotes. We therefore believe that there is still a
great opportunity for improvement in motif discovery methods.
Metaverse Lab – Second Life
-558-
Location: PKI374
Directors: Dr. Khazanchi, Dr. Ilze Zigurs
Technical Contact: Mike Grove – mrgrove@unomaha.edu
Website: http://slurl.com/secondlife/IS&T%20Nebraska%20Omaha/131/26/37
Equipment:
4 IBM Desktops
1 Dell Desktop
Flat Screen LCD TV
Headsets
Overview:
Metaverses are fully immersive 3-dimensional virtual worlds in which people interact as avatars with
each other and with software agents, using the metaphor of the real world but without its physical
limitations. The ubiquitous availability of high speed Internet access has spurred enormous interest in
virtual worlds like SecondLife and World of Warcraft, both in terms of user gaming and potential as a
new technological platform for global virtual collaboration. These environments allow for richer, more
engaging collaboration but their capabilities have yet to be studied and explored in depth. The lab was
setup with seed funding from the NU Foundation Tech Fee grant of $200,000 with the primary goal to
sustain a cross-disciplinary and collaborative effort that focuses on leveraging virtual world technology
capabilities for facilitating e-learning and conducting research and development in such immersive,
multi-participant 3D environments. Students and faculty in the lab work on creative projects in
collaboration with other UNO colleges while building on research already conducted under the
supervision of Drs. Khazanchi and Zigurs over the past year. The overall research goal of the lab is to
enhance virtual team and virtual project management practice in the context of these new technology
environments.
Multi-Media Lab
Location: PKI375
Technical Contact: Zac Fowler – zfowler@unomaha.edu
Equipment:
10 Dell Desktops
5 Macintosh
Keyboards
Tape Decks
Recording devices
Modeling and Simulation Lab
Location: PKI370
Director: Dr. Mahadevan Subramaniam
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com
-559-
Equipment:
4 Dell Desktops
1 Printer
Overview:
The Modeling, Simulation and Automated Inference Center (MOSAIC) conducts collaborative
instruction, research, and development in the areas of modeling, simulation, visualization, and
verification of complex interdisciplinary applications domains including transportation, public health,
intelligent buildings, web, and financial data studies. The laboratory will address the following research
problems that are cross-cutting across several simulation applications.
Omaha Wireless
Website: http://omahawireless.unomaha.edu
Technical Contact: Mike Grove – mrgrove@unomaha.edu
Overview:
Omaha Wireless Network is a grassroots effort proposed by a group of students at the University of
Nebraska at Omaha to build a wireless Metropolitan Area Network (MAN) in Omaha, Nebraska, extend
it to the rural areas of Nebraska and beyond. This is an attempt to provide free, ubiquitous wireless
connectivity to the community. The goal is to build a self-sufficient wireless network that can be used for
various services that may be found on the Internet: web, mail, chat, gaming and resource sharing. Such a
network will not depend on the Internet for content or connectivity. Instead, it can work in conjunction
with the Internet to supplement ways for one to better use connectivity. Users on this wireless network
who wish to share their bandwidth may function as Internet Service Providers (ISPs) and provide access
to the Internet.
Security Technology Evaluation and Analysis Laboratories (STEAL)
Location: PKI350
Director: Dr. Bill Mahoney
Technical Contact: Lucas Wentz – lwentz@unomaha.edu
Equipment:
25 Dell Desktops
Internal, air gapped network
Overview:
The Nebraska University Consortium on Information Assurance (NUCIA) supports three labs.STEAL One is
designed to be an open laboratory for students to use both for coursework and individual exploration.
The lab is fully configurable, with many different operating systems and application sets to choose from.
-560-
Our goal is to create a flexible environment that can be used to create or simulate any desired computing
capability or environment.
STEAL Two has been designed to be a hands-on instructional laboratory. It has been sized to allow entire
classes (max 28 participants) to collectively engage in academic Information Assurance exercises of all
kinds. As with STEAL One, the lab has been designed to be completely flexible, to allow users to simulate
most any type of environment imaginable. A set of dedicated servers provides backbone services, such
as DNS, DHCP, PXE, TFTP, routing, and the like. Each of these services is configurable as well, in order to
allow for more accurate simulations.
STEAL three is a place where NUCIA students, scholars, student workers, Etc congregate and work.
Designed as a lounging area, STEAL 3 generally has a "laid-back" atmosphere where people can relax and
discuss IA topics, get answers to questions from faculty and attend meetings and ad-hoc information
assurance events.
Statpack – (Secure telecommunications application terminal)
Location: PKI364
Technical Contact: Mike Grove – mrgrove@unomaha.edu
Director: Dr. Ann Fruhling
Website: http://statpack.org/
Overview:
The STATPack (Secure Telecommunications Application Terminal) system is an Emergency Response
system for the Public Health Microbiology Laboratories. The STATPack Laboratory is fully equipped to
support this project. The laboratory has 3 client/production computer systems configured for
production support and training, 4 developer work stations for programming and testing, and 3
development servers with version control software and server development tools for unit testing,
integration testing and system testing.
Winds Lab – Wireless infrastructure for networks of distributed systems
Location: PKI360
Director: Dr. Jong – Hoon Youn
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com
Website: http://motes.ist.unomaha.edu
Equipment:
Flat screen LCD TV
5 IBM Desktops
1 Mac Desktop
1 Printer
-561-
Overview:
The Wireless Infrastructure for Networks of Distributed Sensors (WINDS) laboratory is specifically
designed to include sensor network testbeds for supporting research activities for the college and other
research groups in Nebraska. The main goal of the research in this lab is to provide an innovative and
comprehensive research and development program that result in solutions for high-speed wireless data
network connectivity problems in rural as well as urban Nebraska. In particular, the following four
objectives have been identified for the lab's research efforts.
Develop a wireless network laboratory with testbeds and a working prototype of a highperformance wireless data network infrastructure for supporting research, education, and
services in wireless sensor networks.
Investigate solutions for a number of research problems in wireless sensor networks, which have
inhibited complete utilization of high-speed wireless data network technology in critical
applications in agriculture, transportation and bio-security in Nebraska.
Employ wireless networks solutions in various real-world applications.
The Wireless Infrastructure for Networks of Distributed Sensors (WINDS) Lab is located at the Peter
Kiewit Institute, Room 360.
-562-
College of IS&T Websites
The Systems Staff maintains numerous websites that directly support academic and research endeavors
of the College. Each website is unique in function, and customized to suit student, faculty, staff, or
project needs.
Community Outreach/Web Development
Website
Description
Location
Contacts
www.ist.unomaha.edu
aia.ist.unomaha.edu
Linuxweb
Linuxweb
Roni Myers
Roni Myers
Kris Nelson, Leo A
Daly
Roni Myers
Roni Myers
Tomas Helikar
Roni Myers
Roni Myers
Zac Fowler
theomahaproject.org
College of IS&T
Society of American Institute of
Architects - Omaha Chapter Job
Shadow
College of IS&T Alumni
Juvenile Justice Institute Case
Management Inventory System
College of IS&T Newsletter
IS&T Live
Nebraska Lewis and Clark
Bicentennial Commission
Teaching American History for
Students
Teaching American History
(MOCC)
Teaching American History (OPS)
world.unomaha.edu
International Studies Website
Linuxweb
lewisclarkandbeyond.com/org/net
attic.ist.unomaha.edu
skype.ist.unomaha.edu
mena.unomaha.edu
unmcpda.ist.unomaha.edu
Lewis, Clark and Beyond
IS&T Attic website
Skype Trial Blog for IS&T College
IS&P MENA Exchange blog
UNMC PDA project: mobile SQL
replication service and portal
website
Local company development
website
Linuxweb
Linuxweb
Linuxweb
Linuxweb
UNMCPDA
alumni.ist.unomaha.edu
cmi.unomaha.edu
insider.ist.unomaha.edu
istlive.unomaha.edu
www.lewisandclarkne.org
americanhistory.unomaha.edu
tahg.org
Terrecom.ist.unomaha.edu
-563-
Linuxweb
Linuxweb
Linuxweb
Linuxweb
Linuxweb
Linuxweb
Linuxweb
Linuxweb
Windows-web
Zac Fowler, Steve
Bullock
Zac Fowler, Steve
Bullock
Zac Fowler, Steve
Bullock
Zac Fowler, Deepak
Khazanchi, Mary
Ellen Turner
Zac Fowler
Zac Fowler
Zac Fowler
Zac Fowler
Zac Fowler, Deepak
Khazanchi, Lynne
Buchanan (UNMC)
Roni Myers, Zac
Fowler
Research/Course Websites
Website
Description
Location
Contacts
http://acm.ist.unomaha.edu
Web server for the UNO ACM
Association of Computing
Machinery Chapter
Web server hosting wiki pages
for the Motif Tools
Assessment Project
Blackforest Cluster Web
Interface
Website hosting Chad
Meyer’s Japanese Study
Program
Gene Sequence Analysis
Facility legacy server at UNMC
hosting the GCG Seqweb
website
Website hosting College of IST
Ubuntu, CentOS, and
OpenBSD mirror
IBM Rational Jazz Team
Concert website for Harvey
Siy’s Software Engineering
course
Public wiki website for CIST
Collaborative Laboratory for
Applied Bioinformatics
Wiki website for the Gene
Sequence Analysis Facility
acm
James Harr
Mohammad
Erin Cox
Mohammad
Daniel Quest
Internal wiki website for CIST
Collaborative Laboratory for
Applied Bioinformatics
http://mascot.ist.unomaha.edu/mascot Website hosting the
Bioinformatics tool Mascot
http://biigserver.ist.unomaha.edu/
Website hosting home pages
for different Bioinformatics
undergraduate, graduate and
Ph.D. students.
http://ccliwiki.ist.unomaha.edu
Wiki website for the
Integrated Curriculum for
Bioinformatics project
http://ccli.ist.unomaha.edu
Website for Integrated
Curriculum for Bioinformatics
project
http://ccli_test.ist.unomaha.edu
Development wiki for
klab
http://biobase.ist.unomaha.edu
https://blackforest.gds.unomaha.edu
http://cmjsp.net
http://gsaf.unmc.edu
http://hive.ist.unomaha.edu
https://jrt.ist.unomaha.edu:9443
http://clab.ist.unomaha.edu
http://gsaf.ist.unomaha.edu
https://klab.ist.unomaha.edu
-564-
biobase
blackforest
reslin
James Harr
Mohammad
James Harr
Mohammad
gsaf
Mohammad
hive
James Harr
jrt
Mohammad
klab
Dhundy Bastola
Jay Hannah
Mohammad
Dhundy Bastola
Jay Hannah
Mohammad
Dhundy Bastola
Jay Hannah
Mohammad
Mohammad
klab
mascot
biigserver
James
Mohammad
mp1
Mark Pauley
Mohammad
mp1
Mark Pauley
Mohammad
mp1
Mark Pauley
http://mp1.ist.unomaha.edu/blast
http://mp2.ist.unomaha.edu/blast
http://phylogeny.ist.unomaha.edu
https:// rain.ist.unomaha.edu
http://df.ist.unomaha.edu/main/
Integrated Curriculum for
Bioinformatics project
Website hosting the
wwwblast bioinformatics tool
Another website hosting the
wwwblast bioinformatics tool
Wiki website for
Bioinformatics course by
Dhundy Bastola
Rheumatoid Arthritis
Investigational Network web
server
Website for Knowledge
Engineering and Web
Intelligence project
-565-
Mohammad
mp1
Mark Pauley
Mohammad
mp2
Mark Pauley
Mohammad
Dhundy Bastola
Mohammad
phylogeny
rain
df
Abhijeet Maskey
Dhundy Bastola
Mohammad
Bill Mahoney
Haifeng Guo
Qiuming Zhu
Ryan Nickell
Matt Payne
Peter Hospodka
William Sousan
James Harr
Mohammad
Production/Course Websites
Website
Description
Location
Contacts
itd.ist.unomaha.edu
The Journal of Information
Technology for Development
windows-web
Joseph Hrabak, GJ
deVreede
criwg.ist.unomaha.edu
Collaboration Researchers’
International Workshop
windows-web
Joseph Hrabak, GJ
deVreede
windows-web
Joseph Hrabak, Peter
Wolcott
windows-web
accreditation.ist.unomaha.edu
IS&T ABET Page
viadesign.ist.unomaha.edu
faculty.ist.unomaha.edu
archive.ist.unomaha.edu
Design & Development
Faculty pages
ISQA Archives
windows-web
windows-web
mosaic.ist.unomaha.edu
support.ist.unomaha.edu
Khazanchi.ist.unomaha.edu
Modeling, Simulation and
Automated Inference Center
IS&T Systems and IT Support
Deepak Khazanchi's homepage
windows-web
windows-web
windows-web
Joseph Hrabak, Jerry
Wagner
Joseph Hrabak
Joseph Hrabak
Joseph Hrabak,
Mahadevan
Subramaniam
Joseph Hrabak
Joseph Hrabak
cphi.ist.unomaha.edu
Consortium for Publich Health
Informatics
windows-web
Joseph Hrabak, Ann
Fruhling
cistvss
Joseph Hrabak, George
Royce
NWINDS.ist.unomaha.edu
CIST Advisory Committee
Nebraska Wireless Infrastructure
for Networks of Distributed
Sensors
amcis2005.isqa.unomaha.edu
gstech.ist.unomaha.edu
AMCIS Conference
Student workshop
windows-web
windows-web
sponsorsim.ist.unomaha.edu
windows-web
ics.ist.unomaha.edu
PM Simulation for Sponsors
The Institute for Collaboration
Science
cist.ist.unomaha.edu
windows-web
Mohammad Shafiullah,
Jon Youn
Joseph Hrabak, Peter
Wolcott
Joseph Hrabak
windows-web
Joseph Hrabak, Deepak
Khazanchi
Joseph Hrabak, GJ
deVreede
cmit.unomaha.edu
Center for Management of
Information Technology
windows-web
Joseph Hrabak, Deepak
Khazanchi
iaads.unomaha.edu
omahawireless.unomaha.edu
dm.ist.unomaha.edu
msdnaa.ist.unomaha.edu
International Academy for
Advanced Decision Support
Omaha Wireless Project
Data Mining
Microsoft Academic Alliance
windows-web
windows-web
windows-web
windows-web
isqa.unomaha.edu
ISQA Departmental Site
windows-web
istis.unomaha.edu
Information Technology Council
windows-web
-566-
Joseph Hrabak, Jerry
Wagner
Mohammad Shafiullah
Joseph Hrabak, Yong Shi
Joseph Hrabak
Joseph Hrabak, Paul
VanVliet
Joseph Hrabak, Paul
VanVliet
secondlife.ist.unomaha.edu
misso.unomaha.edu
phpmyadmin.ist.unomaha.edu
cisco.ist.unomaha.edu
gatech.ist.unomaha.edu
sigitpm.ist.unomaha.edu
Metaverse Project
MIS Student Group
PHP Admin Site
Cisco Networking Course
Student workshop
Special Interest Group for
Information Technology Project
Management
windows-web
windows-web
windows-web
windows-web
windows-web
Roni Myers, John Murphy
Joseph Hrabak
Roni Myers
Joseph Hrabak, Bill Pulte
Joseph Hrabak
windows-web
Joseph Hrabak, Deepak
Khazanchi
Project Management
Summer Camp
Nebraska Health Information
Project
Summer Camp
windows-web
windows-web
windows-web
windows-web
Joseph Hrabak, Deepak
Khazanchi
Roni Myers
Joseph Hrabak, Ann
Fruhling
Roni Myers
windows-web
exchange
helm
cistvss
Joseph Hrabak, Peter
Wolcott
Joseph Hrabak
Lucas Wentz
Joseph Hrabak
manage
Joseph Hrabak
ist.unomaha.edu - metis
systems.ist.unomaha.edu
Global Diffusion of the Internet
CIST Exchange Email
NUCIA homepage
Leah Pietron Course Site
Redirect for
www.ist.unomaha.edu
Redirect for
www.ist.unomaha.edu
Systems Office Portal
metis
ssp
vulcan.ist.unomaha.edu
Vulcan Server Help/FAQ
vulcan
Joseph Hrabak
Joseph Hrabak
James Harr, Joseph
Hrabak
sharepointdev.ist.unomaha.edu
Sharepoint Portal / wolcott's
class??
azureus
Joseph Hrabak, Peter
Wolcott
groyce.ist.unomaha.edu
Groyce Sharepoint Portal
azureus
Joseph Hrabak, George
Royce
blizzard.ist.unomaha.edu
Web Dev Class Server Info Page
CIST Online Class Multimedia
Server
Teamnet
blizzard
Bob Fulkerson, Joseph
Hrabak
padev
portal8950b.ist.unomaha.edu
Tool for Deepak
Capstone Course Sharepoint
Portal
Capstone Course Sharepoint
Portal
squishy.ist.unomaha.edu
Resource Site for Bob's Web
Programming Class
cmit_mutual.ist.unomaha.edu
cbctech.ist.unomaha.edu
nhip.ist.unomaha.edu
divtech.ist.unomaha.edu
mosaic.unomaha.edu
mymail.ist.unomaha.edu
nucia.unomaha.edu
pietron.ist.unomaha.edu
ist.unomaha.edu - manage
elearning.ist.unomaha.edu
teamnet.ist.unomaha.edu
pattern
portal8950.ist.unomaha.edu
-567-
elearnining
teamnet
portal8950
Joseph Hrabak
Azad, Joseph Hrabak
Joseph Hrabak, Pujak
Arora
Joseph Hrabak, Ann
Fruhling
Joseph Hrabak, Ann
Fruhling
blizzard
Bob Fulkerson, Joseph
Hrabak
portal8950
Executive Memorandum No. 16
Policy for Responsible Use of University Computers and Information Systems
OFFICE OF THE PRESIDENT Executive Memorandum No. 16
1. Purpose
It is the purpose of this Executive Memorandum to set forth the University's administrative policy and
provide guidance relating to responsible use of the University's electronic information systems.
2. General
The University of Nebraska strives to maintain access for its faculty, staff, students, administrators and
Regents (the "users") to local, national and international sources of information and to provide an
atmosphere that encourages sharing of knowledge, the creative process and collaborative efforts within
the University's educational, research and public service missions. Access to electronic information
systems at the University of Nebraska is a privilege, not a right, and must be treated as such by all users
of these systems. All users must act honestly and responsibly. Every user is responsible for the integrity
of these information resources. All users must respect the rights of other computer users, respect the
integrity of the physical facilities and controls, and respect all pertinent license and contractual
agreements related to University information systems. All users shall act in accordance with these
responsibilities, and the relevant local, state and federal laws and regulations. Failure to so conduct
oneself in compliance with this Policy may result in denial of access to University information systems or
other disciplinary action.
The University of Nebraska is a provider of a means to access the vast and growing amount of
information available through electronic information resources. The University of Nebraska is not a
regulator of the content of that information and takes no responsibility for the content of information,
except for that information the University itself and those acting on its behalf create. Any persons
accessing information through the University of Nebraska information systems must determine for
themselves and their charges whether any source is appropriate for viewing.
Accepting any account and/or using the University of Nebraska's information systems shall constitute an
agreement on behalf of the user or other individual accessing such information systems to abide and be
bound by the provisions of this Policy. The University may restrict or prohibit the use of its information
systems in response to complaints presenting evidence of violations of University policies or state or
federal laws. When it has been determined that there has been a violation, the University may restrict
or prohibit access by an offending party to its information systems through University-owned or other
computers, remove or limit access to material posted on University-owned computers or networks, and,
if warranted, institute other disciplinary action.
3. Definitions
For purposes of this policy the following definitions shall apply:
a. Electronic communications shall mean and include the use of information systems in the
communicating or posting of information or material by way of electronic mail, bulletin boards,
-568-
World Wide Web (internet), or other such electronic tools.
b. Information systems shall mean and include computers, networks, servers and other similar devices
that are administered by the University and for which the University is responsible. "Networks" shall
mean and include video, voice and data networks, routers and storage devices.
c. Obscene with respect to obscene material shall mean (1) that an average person applying
contemporary community standards would find the material taken as a whole predominantly appeals to
the prurient interest or a shameful or morbid interest in nudity, sex, or excretion, (2) the material
depicts or describes in a patently offensive way sexual conduct specifically set out in Neb. Rev. Stat. §§
28-807 to 28-809, as amended, and (3) the material taken as a whole lacks serious literary, artistic,
political, or scientific value.
4. Permitted Uses
University Business Use and Limited Personal Use.
University information systems are to be used predominately for University-related business. However,
personal use is permitted so long as it conforms with this Policy and does not interfere with University
operations or an employee user's performance of duties as a University employee. As with permitted
personal use of telephones for local calls, limited personal use of information systems does not
ordinarily result in additional costs to the University and may actually result in increased efficiencies.
Personal use of any University information system to access, download, print, store, forward, transmit
or distribute obscene material is prohibited. UNDER ALL CIRCUMSTANCES, PERSONAL USE BY
EMPLOYEES MUST COMPLY WITH SUBSECTION b. OF THIS SECTION AND SHALL NOT CONFLICT WITH AN
EMPLOYEE'S PERFORMANCE OF DUTIES AND RESPONSIBILITIES FOR THE UNIVERSITY. Personal use may
be denied when such use requires an inordinate amount of information systems resources (e.g. storage
capacity).
Prior Approval Required for Personal Use for Outside Consulting, Business or Employment.
Personal use of University information systems resources or equipment by any user for personal
financial gain in connection with outside (non-University) consulting, business or employment is
prohibited, except as authorized for employees by Section 3.4.5 of the Bylaws of the Board of Regents.
Employee personal use in conjunction with outside professional consulting, business or employment
activities is permitted only when such use has been expressly authorized and approved by the University
Administration or the Board of Regents, as appropriate, in accordance with the requirements of said
Section 3.4.5 of the Bylaws.
5. Access
Unauthorized access to information systems is prohibited. No one should use the ID or password of
another; nor should anyone provide his or her ID or password to another, except in the cases necessary
to facilitate computer maintenance and repairs. When any user terminates his or her relation with the
University of Nebraska, his or her ID and password shall be denied further access to University
computing resources.
6. Misuse of Computers and Network Systems
Misuse of University information systems is prohibited. Misuse includes the following:
Attempting to modify or remove computer equipment, software, or peripherals without proper
authorization.
-569-
Accessing without proper authorization computers, software, information or networks to which the
University belongs, regardless of whether the resource accessed is owned by the University or the abuse
takes place from a non-University site.
c. Taking actions, without authorization, which interfere with the access of others to information
systems.
d. Circumventing logon or other security measures.
e. Using information systems for any illegal or unauthorized purpose.
f. Personal use of information systems or electronic communications for non-University consulting,
business or employment, except as expressly authorized pursuant to Section 3.4.5 of the Bylaws of the
Board of Regents.
g. Sending any fraudulent electronic communication.
h. Violating any software license or copyright, including copying or redistributing copyrighted software,
without the written authorization of the software owner.
i. Using electronic communications to violate the property rights of authors and copyright owners. (Be
especially aware of potential copyright infringement through the use of e-mail. See the provisions under
"E-Mail" contained in this Policy.)
j. Using electronic communications to harass or threaten users in such a way as to create an atmosphere
which unreasonably interferes with the education or the employment experience. Similarly, electronic
communications shall not be used to harass or threaten other information recipients, in addition to
University users.
k. Using electronic communications to disclose proprietary information without the explicit permission
of the owner.
l. Reading other users' information or files without permission.
m. Academic dishonesty.
n. Forging, fraudulently altering or falsifying, or otherwise misusing University or non-University records
(including computerized records, permits, identification cards, or other documents or property).
o. Using electronic communications to hoard, damage, or otherwise interfere with academic resources
available electronically.
p. Using electronic communications to steal another individual's works, or otherwise misrepresent one's
own work.
q. Using electronic communications to fabricate research data.
r. Launching a computer worm, computer virus or other rogue program.
s. Downloading or posting illegal, proprietary or damaging material to a University computer.
t. Transporting illegal, proprietary or damaging material across a University network.
u. Personal use of any University information system to access, download, print, store, forward, transmit
or distribute obscene material.
v. Violating any state or federal law or regulation in connection with use of any information system.
7. Privacy
a. User Privacy Not Guaranteed. When University information systems are functioning properly, a user
can expect the files and data he or she generates to be private information, unless the creator of the file
or data takes action to reveal it to others. Users should be aware, however, that no information system
is completely secure. Persons both within and outside of the University may find ways to access files.
ACCORDINGLY, THE UNIVERSITY CANNOT AND DOES NOT GUARANTEE USER PRIVACY and users should
be continuously aware of this fact.
-570-
b. Repair and Maintenance of Equipment. Users should be aware that on occasion duly authorized
University information systems technological personnel have authority to access individual user files or
data in the process of performing repair or maintenance of computing equipment the University deems
is reasonably necessary, including the testing of systems in order to ensure adequate storage capacity
and performance for University needs. Information systems technological personnel performing repair
or maintenance of computing equipment are prohibited by law from exceeding their authority of access
for repair and maintenance purposes or from making any use of individual user files or data for any
purpose other than repair or maintenance services performed by them.
c. Response to a Public Records Request, Administrative or Judicial Order or Request for Discovery in the
Course of Litigation. Users should be aware that the Nebraska public records statutes are very broad in
their application. Certain records, such as unpublished research in progress, proprietary information,
personal information in personnel and student records are protected from disclosure. However, most
other University records contained in electronic form require disclosure if a public record request is
made. Users should remember this when creating any electronic information, especially e-mail. Also,
users should be aware that the University will comply with any lawful administrative or judicial order
requiring the production of electronic files or data stored in the University's information systems, and
will provide information in electronic files or data stored in the University's information systems in
response to legitimate requests for discovery of evidence in litigation in which the University is involved.
d. Response to Misuse of Computers and Network Systems. When for reasonable cause, as such cause
may be determined by the Office of the Vice President and General Counsel, it is believed that an act of
misuse as defined in section 6 above has occurred, then the chief information services officer serving
Central Administration or serving the relevant campus may access any account, file or other data
controlled by the alleged violator and share such account information, file or other data with those
persons authorized to investigate and implement sanctions in association with the misuse of the
University's computer and information systems. Should any of the chief information service officers
reasonably believe that a misuse is present or imminent such that the potential for damage to the
system or the information stored within it, is genuine and serious (e.g. hacking, spamming or theft), then
the chief information officer may take such action as is necessary to protect the information system and
the information stored in it, including the denial of access to any University or non-University user,
without a determination from the Office of the Vice President and General Counsel regarding
reasonable cause; provided however, that the chief information officer shall contact the Office of the
Vice President and General Counsel as soon as possible to confirm that any protective actions taken
were appropriate and within the parameters of this executive memorandum. Executive Memorandum No. 16
-571-
e. Access to Information Concerning Business Operations. Employees regularly carry out the business
functions of the University using the University's information systems. business records, inquiries and
correspondence are often stored such that individuals may control the access to particular information
stored within the University's information system. Should any employee become unavailable, be
incapacitated due to illness or other reasons, or refuse to provide the information necessary to carry out
the employee's job responsibilities in a reasonably timely manner, then following consultation with and
approval by the Office of the Vice President and General Counsel, the chief information officer of Central
Administration or of the relevant campus may access the employee's records in order to carry out
University business operations on behalf of the unavailable or uncooperative employee.
8. E-mail
a. Applicability. ALL POLICIES STATED HEREIN ARE APPLICABLE TO E-MAIL. E-mail should reflect careful,
professional and courteous drafting-particularly since it is easily forwarded to others. Never assume that
only the addressee will read your e-mail. Be careful about attachments and broad publication messages.
Copyright laws and license agreements also apply to e-mail.
b. E-mail Retention. E-mail messages should be deleted once the information contained in them is no
longer useful. When e-mail communications are sent, the e-mail information is stored in one or more
backup files for the purposes of "disaster recovery", i.e. inadvertent or mistaken deletions, system
failures. In order to provide for the recovery of deleted e-mail, while maintaining efficient use of storage
capabilities, e-mail information on backup files shall be retained for a period of time not to exceed seven
days.
9. Web Pages
The Central Administration and each University campus may establish standards for those Web Pages
considered to be "official" pages of the University. All official Web Pages shall contain the administrative
unit's logo in the header and footer in order to identify it as an official University of Nebraska Web Page.
No other Web Pages shall be allowed to use University of Nebraska logos without the express
permission of the University.
Originators of all Web Pages using information systems associated with the University shall comply with
University policies and are responsible for complying with all federal, state and local laws and
regulations, including copyright laws, obscenity laws, laws relating to libel, slander and defamation, and
laws relating to piracy of software.
The persons creating a Web Page are responsible for the accuracy of the information contained in the
Web Page. Content should be reviewed on a timely basis to assure continued accuracy. Web Pages
should include a phone number or e-mail address of the person to whom questions/comments may be
addressed, as well as the most recent revision date.
10. Notification
This Policy shall be published in all employee and faculty handbooks and student catalogs, and placed on
the World Wide Web in order to fully notify users of its existence.
11. Application and Enforcement
-572-
This Policy applies to all administrative units of the University of Nebraska. The Central Administration
and each University campus is encouraged to provide supplemental policy guidance, consistent with this
Policy, designed to implement the provisions herein.
Each University campus shall be responsible for enforcing this Policy in a manner best suited to its own
organization. It is expected that enforcement will require cooperation between such departments as
computer systems administration, human resources, affirmative action, academic affairs and student
affairs. Prior to any denial of access or other disciplinary action, a user shall be provided with such due
process as may be recommended by the University's Office of the General Counsel.
Reference: August 28, 2001
-573-
IS&T Systems Policies, Procedures, and Guidelines for
Technology Usage
**All policies and guidelines are for internal usage only, and act as an extension of and remain
subordinate to Executive Memorandum 16
Guidelines on Anti-Virus Processes
Recommended processes to prevent virus problems:
Always run the standard, supported anti-virus (McAfee) software is available from the download
site. Download and run the current version; download and install anti-virus software updates as
they become available.
NEVER open any files or macros attached to an email from an unknown, suspicious or
untrustworthy source. Delete these attachments immediately, then "double delete" them by
emptying your Trash.
Delete spam, chain, and other junk email without forwarding, in accordance with the
University's Computer Usage Policy .
Never download files from unknown or suspicious sources.
Avoid direct disk sharing with read/write access unless there is absolutely a business
requirement to do so.
Always scan a media (floppy disks, CD-ROMs, DVD-ROMs, USB devices) from an unknown source
for viruses before using it.
Back-up critical data and system configurations on a regular basis and store the data in a safe
place.
If lab testing conflicts with anti-virus software, run the anti-virus utility to ensure a clean
machine, disable the software, and then run the lab test. After the lab test, enable the anti-virus
software. When the anti-virus software is disabled, do not run any applications that could
transfer a virus, e.g., email or file sharing.
New viruses are discovered almost every day. Periodically check your anti-virus software for
updates.
-574-
Automatically Forwarded Email Policy
1.0 Purpose
To prevent the unauthorized or inadvertent disclosure of sensitive company information.
2.0 Scope
This policy covers automatic email forwarding, and thereby the potentially inadvertent transmission of
sensitive information by all employees, vendors, and agents operating on behalf of the College of
Information Science and Technology at the University of Nebraska Omaha.
3.0 Policy
Employees must exercise utmost caution when sending any email from inside the College of Information
Science and Technology at the University of Nebraska Omaha to an outside network. Unless approved
by an employee's manager, email will not be automatically forwarded to an external destination.
Sensitive information, as defined in the Information Sensitivity Policy, will not be forwarded via any
means, unless that email is critical to business and is encrypted.
4.0 Definitions
Terms
Email
SMTP.
Forwarded email
Definitions
The electronic transmission of information through a mail protocol such as
Programs such as Eudora and Microsoft Outlook use SMTP.
Email resent from internal networking to an outside point.
Sensitive information Information is considered sensitive if it can be damaging to the College of
Information Science and Technology at the University of Nebraska Omaha or its reputation or standing.
Unauthorized Disclosure
The intentional or unintentional revealing of restricted information to
people who do not have a need to know that information.
-575-
Database Password Policy
1.0 Purpose
This policy states the requirements for securely storing and retrieving database usernames and
passwords (i.e., database credentials) for use by a program that will access a database running on one of
the College of Information Science and Technology at the University of Nebraska Omaha’s networks.
Computer programs running on the College of Information Science and Technology at the University of
Nebraska Omaha's networks often require the use of one of the many internal database servers. In
order to access one of these databases, a program must authenticate to the database by presenting
acceptable credentials. The database privileges that the credentials are meant to restrict can be
compromised when the credentials are improperly stored.
2.0 Scope
This policy applies to all software that will access a College of Information Science and Technology at the
University of Nebraska Omaha multi-user production database.
3.0 Policy
3.1 General
In order to maintain the security of the College of Information Science and Technology at the University
of Nebraska Omaha's internal databases, access by software programs must be granted only after
authentication with credentials. The credentials used for this authentication must not reside in the
main, executing body of the program's source code in clear text. Database credentials must not be
stored in a location that can be accessed through a web server.
3.2 Specific Requirements
3.2.1. Storage of Data Base User Names and Passwords
Database user names and passwords may be stored in a file separate from the executing body of
the program's code. This file must not be world readable.
Database credentials may reside on the database server. In this case, a hash number identifying
the credentials may be stored in the executing body of the program's code.
Database credentials may be stored as part of an authentication server (i.e., an entitlement
directory), such as an LDAP server used for user authentication. Database authentication may
occur on behalf of a program as part of the user authentication process at the authentication
server. In this case, there is no need for programmatic use of database credentials.
Database credentials may not reside in the documents tree of a web server.
Pass through authentication (i.e., Oracle OPS$ authentication) must not allow access to the
database based solely upon a remote user's authentication on the remote host.
Passwords or pass phrases used to access a database must adhere to the Password Policy.
3.2.2. Retrieval of Database User Names and Passwords
If stored in a file that is not source code, then database user names and passwords must be read
from the file immediately prior to use. Immediately following database authentication, the
memory containing the user name and password must be released or cleared.
-576-
The scope into which you may store database credentials must be physically separated from the
other areas of your code, e.g., the credentials must be in a separate source file. The file that
contains the credentials must contain no other code but the credentials (i.e., the user name and
password) and any functions, routines, or methods that will be used to access the credentials.
For languages that execute from source code, the credentials' source file must not reside in the
same browse able or executable file directory tree in which the executing body of code resides.
3. Access to Database User Names and Passwords
Every program or every collection of programs implementing a single business function must
have unique database credentials. Sharing of credentials between programs is not allowed.
Database passwords used by programs are system-level passwords as defined by the Password
Policy.
Developer groups must have a process in place to ensure that database passwords are
controlled and changed in accordance with the Password Policy. This process must include a
method for restricting knowledge of database passwords to a need-to-know basis.
4.0 Definitions
Term
Definition
Computer language
A language used to generate programs.
Credentials
Something you know (e.g., a password or pass phrase), and/or something that
identifies you (e.g., a user name, a fingerprint, voiceprint, retina print). Something you know and
something that identifies you are presented for authentication.
Entitlement
The level of privilege that has been authenticated and authorized. The privileges
level at which to access resources.
Executing body
program.
The series of computer instructions that the computer executes to run a
Hash
An algorithmically generated number that identifies a datum or its location.
LDAP
Lightweight Directory Access Protocol, a set of protocols for accessing
information directories.
Module
A collection of computer language instructions grouped together either logically
or physically. A module may also be called a package or a class, depending upon which computer
language is used.
Name space
A logical area of code in which the declared symbolic names are known and
outside of which these names are not visible.
Production
Software that is being used for a purpose other than when software is being
implemented or tested.
Ethics Policy
-577-
1. Overview
The College of Information Science and Technology systems staff at the University of
Nebraska Omaha’s purpose for this ethics policy is to establish a culture of openness, trust
and integrity in business practices. Effective ethics is a team effort involving the
participation and support of every systems employee. All employees should familiarize
themselves with the ethics guidelines that follow this introduction.
The systems staff is committed to protecting employees, partners, vendors and the company
from illegal or damaging actions by individuals, either knowingly or unknowingly. When the
systems staff addresses issues proactively and uses correct judgment, it will help set us apart
from competitors.
The College of Information Science and Technology will not tolerate any wrongdoing or
impropriety at anytime. We will take the appropriate measures act quickly in correcting the
issue if the ethical code is broken. Any infractions of this code of ethics will not be tolerated.
2. Purpose
Our purpose for authoring a publication on ethics is to emphasize the employee’s and
consumer’s expectation to be treated to fair business practices. This policy w ill serve to
guide business behavior to ensure ethical conduct.
3. Scope
This policy applies to employees, contractors, consultants, temporaries, and other workers at
College of Information Science and Technology systems staff, including all personnel
affiliated with third parties.
4. Policy
4.1. Executive Commitment to Ethics
4.1.1. Managers within College of Information Science and Technology systems staff
must set a prime example. In any business practice, honesty and integrity must be
top priority for executives.
4.1.2. Executives must have an open door policy and welcome suggestions and concerns
from employees. This will allow employees to feel comfortable discussing any
issues and will alert executives to concerns within the work force.
4.1.3. Executives must disclose any conflict of interests regard their position within
College of Information Science and Technology.
4.2. Employee Commitment to Ethics
4.2.1. The College of Information Science and Technology systems employees will treat
everyone fairly, have mutual respect, promote a team environment and avoid the
intent and appearance of unethical or compromising practices.
4.2.2. Every employee needs to apply effort and intelligence in maintaining ethics value.
4.2.3. Employees must disclose any conflict of interests regard their position within the
College of Information Science and Technology.
4.2.4. Employees will help to increase customer and vendor satisfaction by providing
quality product s and timely response to inquiries.
4.3. Company Awareness
-578-
4.3.1. Promotion of ethical conduct within interpersonal communications of employees
will be rewarded.
4.3.2. The College of Information Science and Technology systems staff will promote a
trustworthy and honest atmosphere to reinforce the vision of ethics within the
organization.
4.4. Maintaining Ethical Practices
4.4.1. The College of Information Science and Technology systems staff will reinforce
the importance of the integrity message and the tone will start at the top. Every
employee, manager, director needs consistently maintain an ethical stance and
support ethical behavior.
4.4.2. Systems employees should encourage open dialogue, get honest feedback and
treat everyone fairly, with honesty and objectivity.
4.4.3. College of Information Science and Technology systems staff has established a
best practice disclosure committee to make sure the ethical code is delivered to all
employees and that concerns regarding the code can be addressed.
4.5. Unethical Behavior
4.5.1. Systems employees will avoid the intent and appearance of unethical or
compromising practice in relationships, actions and communications.
4.5.2. Harassment or discrimination will not be tolerated.
4.5.3. Unauthorized use of company trade secrets & marketing, operational, personnel,
financial, source code, & technical information integral to the success of our
organization will not be tolerated.
4.5.4. College of Information Science and Technology will not permit impropriety at any
time and we will act ethically and responsibly in accordance with laws.
4.5.5. Systems employees will not use organizational assets or business relationships for
personal use or gain.
-579-
Extranet Policy
1.0 Purpose
This document describes the policy under which third party organizations connect to College of
Information Science and Technology networks for the purpose of transacting business related to the
College of Information Science and Technology.
2.0 Scope
Connections between third parties that require access to non-public College of Information Science and
Technology resources fall under this policy, regardless of whether a Telco circuit (such as frame relay or
ISDN) or VPN technology is used for the connection. Connectivity to third parties such as the Internet
Service Providers (ISPs) that provide Internet access for the College of Information Science and
Technology or to the Public Switched Telephone Network does NOT fall under this policy.
3.0 Policy
3.1 Pre-Requisites
3.1.1 Security Review
All new extranet connectivity will go through a security review with the College of Information Science
and Technology’s system staff. The reviews are to ensure that all access matches the business
requirements in a best possible way, and that the principle of least access is followed.
3.1.2 Third Party Connection Agreement
All new connection requests between third parties and the College of Information Science and
Technology require that the third party and the College of Information Science and Technology
representatives agree to and sign the Third Party Agreement. This agreement must be signed by
management of the Sponsoring Organization as well as a representative from the third party who is
legally empowered to sign on behalf of the third party. The signed document is to be kept on file with
the relevant extranet group. Documents pertaining to connections into College of Information Science
and Technology labs are to be kept on file with the College of Information Science and Technology’s
systems staff.
3.1.3 Business Case
All production extranet connections must be accompanied by a valid business justification, in writing,
that is approved by a project manager in the extranet group. Lab connections must be approved by the
College of Information Science and Technology. Typically this function is handled as part of the Third
Party Agreement.
3.1.4 Point Of Contact
The Sponsoring Organization must designate a person to be the Point of Contact (POC) for the extranet
connection. The POC acts on behalf of the Sponsoring Organization, and is responsible for those portions
of this policy and the Third Party Agreement that pertain to it. In the event that the POC changes, the
relevant extranet Organization must be informed promptly.
3.2 Establishing Connectivity
-580-
Sponsoring Organizations within the College of Information Science and Technology that wish to
establish connectivity to a third party are to file a new site request with the proper extranet group. The
extranet group will engage College of Information Science and Technology systems staff to address
security issues inherent in the project. The Sponsoring Organization must provide full and complete
information as to the nature of the proposed access to the extranet group and the College of
Information Science and Technology, as requested.
All connectivity established must be based on the least-access principle, in accordance with the
approved business requirements and the security review. In no case will the College of Information
Science and Technology rely upon the third party to protect the College of Information Science and
Technology’s network or resources.
3.3 Modifying or Changing Connectivity and Access
All changes in access must be accompanied by a valid business justification, and are subject to security
review. Changes are to be implemented via corporate change management process. The Sponsoring
Organization is responsible for notifying the extranet management group and/or the College of
Information Science and Technology when there is a material change in their originally provided
information so that security and connectivity evolve accordingly.
3.4 Terminating Access
When access is no longer required, the Sponsoring Organization within the College of Information
Science and Technology must notify the extranet team responsible for that connectivity, which will then
terminate the access. This may mean a modification of existing permissions up to terminating the circuit,
as appropriate. The extranet and lab security teams must conduct an audit of their respective
connections on an annual basis to ensure that all existing connections are still needed, and that the
access provided meets the needs of the connection. Connections that are found to be depreciated,
and/or are no longer being used to conduct College of Information Science and Technology business,
will be terminated immediately. Should a security incident or a finding that a circuit has been
deprecated and is no longer being used to conduct the College of Information Science and Technology
business necessitate a modification of existing permissions, or termination of connectivity, the College
of Information Science and Technology and/or the extranet team will notify the POC or the Sponsoring
Organization of the change prior to taking any action.
4.0 Definitions
Terms
Definitions
Circuit
For the purposes of this policy, circuit refers to the method of network access,
whether it's through traditional ISDN, Frame Relay etc., or via VPN/Encryption technologies.
Sponsoring Organization
The organization who requested that the third party have access into
the College of Information Science and Technology.
Third Party
A business that is not a formal or subsidiary part of the College of Information
Science and Technology.
-581-
Information Sensitivity Policy
1.0 Purpose
The Information Sensitivity Policy is intended to help employees determine what information can be
disclosed to non-employees, as well as the relative sensitivity of information that should not be
disclosed outside of the College of Information Science and Technology without proper authorization.
The information covered in these guidelines includes, but is not limited to, information that is either
stored or shared via any means. This includes: electronic information, information on paper, and
information shared orally or visually (such as telephone and video conferencing).
All system employees should familiarize themselves with the information labeling and handling
guidelines that follow this introduction. It should be noted that the sensitivity level definitions were
created as guidelines and to emphasize common sense steps that you can take to protect College of
Information Science and Technology Confidential information (e.g., Confidential information should not
be left unattended in conference rooms).
Please Note: The impact of these guidelines on daily activity should be minimal.
Questions about the proper classification of a specific piece of information should be addressed to your
manager. Questions about these guidelines should be addressed to the College of Information Science
and Technology systems manager.
2.0 Scope
All College of Information Science and Technology information is categorized into two main
classifications:
College of Information Science and Technology Public
College of Information Science and Technology Confidential
College of Information Science and Technology Public information is information that has been declared
public knowledge by someone with the authority to do so, and can freely be given to anyone without
any possible damage to the College of Information Science and Technology.
College of Information Science and Technology Confidential contains all other information. It is a
continuum, in that it is understood that some information is more sensitive than other information, and
should be protected in a more secure manner. Included is information that should be protected very
closely, such as student information, development programs, and other information integral to the
success of the organization. Also included in College of Information Science and Technology Confidential
is information that is less critical, such as telephone directories, general corporate information,
personnel information, etc..
A subset of College of Information Science and Technology Confidential information is “College of
Information Science and Technology Third Party Confidential" information. This is confidential
information belonging or pertaining to another corporation which has been entrusted to the College of
Information Science and Technology by that company under non-disclosure agreements and other
contracts. Examples of this type of information include everything from joint development efforts to
vendor lists, customer orders, and supplier information. Information in this category ranges from
-582-
extremely sensitive to information about the fact that we've connected a supplier / vendor into the
College of Information Science and Technology's network to support our operations.
College of Information Science and Technology personnel are encouraged to use common sense
judgment in securing College of Information Science and Technology Confidential information to the
proper extent. If an employee is uncertain of the sensitivity of a particular piece of information, he/she
should contact their manager
3.0 Policy
The Sensitivity Guidelines below provides details on how to protect information at varying sensitivity
levels. Use these guidelines as a reference only, as College of Information Science and Technology
Confidential information in each column may necessitate more or less stringent measures of protection
depending upon the circumstances and the nature of the College of Information Science and Technology
Confidential information in question.
3.1 Minimal Sensitivity: General organizational information; some personnel and technical
information
Marking guidelines for information in hardcopy or electronic form.
Note: any of these markings may be used with the additional annotation of "3rd Party
Confidential".
Marking is at the discretion of the owner or custodian of the information. If marking is desired,
the words "College of Information Science and Technology Confidential" may be written or
designated in a conspicuous place on or in the information in question. Other labels that may be
used include "College of Information Science and Technology Proprietary" or similar labels at
the discretion of your individual business unit or department. Even if no marking is present,
College of Information Science and Technology information is presumed to be "College of
Information Science and Technology Confidential" unless expressly determined to be College of
Information Science and Technology Public information by a College of Information Science and
Technology employee with authority to do so.
Access: College of Information Science and Technology employees, contractors, people with a
business need to know.
Distribution within the College of Information Science and Technology: Standard interoffice
mail approved electronic mail and electronic file transmission methods.
Distribution outside of College of Information Science and Technology internal mail: U.S. mail
and other public or private carriers approved electronic mail and electronic file transmission
methods.
Electronic distribution: No restrictions except that it is sent to only approved recipients.
Storage: Keep from view of unauthorized people; erase whiteboards, do not leave in view on
tabletop. Machines should be administered with security in mind. Protect from loss; electronic
information should have individual access controls where possible and appropriate.
Disposal/Destruction: Deposit outdated paper information in specially marked disposal bins on
College of Information Science and Technology premises; electronic data should be
expunged/cleared. Reliably erase or physically destroy media.
-583-
Penalty for deliberate or inadvertent disclosure: Up to and including termination, possible civil
and/or criminal prosecution to the full extent of the law.
3.2 More Sensitive: Business, financial, technical, and most personnel information
Marking guidelines for information in hardcopy or electronic form.
Note: any of these markings may be used with the additional annotation of "3rd Party
Confidential". As the sensitivity level of the information increases, you may, in addition or instead
of marking the information " College of Information Science and Technology Confidential" or
“College of Information Science and Technology Proprietary", wish to label the information "
College of Information Science and Technology Internal Use Only" or other similar labels at the
discretion of your individual business unit or department to denote a more sensitive level of
information. However, marking is discretionary at all times.
Access: College of Information Science and Technology employees and non-employees with
signed non-disclosure agreements who have a business need to know.
Distribution within the College of Information Science and Technology: Standard interoffice
mail approved electronic mail and electronic file transmission methods.
Distribution outside of College of Information Science and Technology internal mail: Sent via
U.S. mail or approved private carriers.
Electronic distribution: No restrictions to approved recipients within the College of Information
Science and Technology, but should be encrypted or sent via a private link to approved
recipients outside of College of Information Science and Technology premises.
Storage: Individual access controls are highly recommended for electronic information.
Disposal/Destruction: In specially marked disposal bins on College of Information Science and
Technology premises; electronic data should be expunged/cleared. Reliably erase or physically
destroy media.
Penalty for deliberate or inadvertent disclosure: Up to and including termination, possible civil
and/or criminal prosecution to the full extent of the law.
3.3 Most Sensitive: Trade secrets & marketing, operational, personnel, financial, source code, &
technical information integral to the success of our company
Marking guidelines for information in hardcopy or electronic form.
Note: any of these markings may be used with the additional annotation of "3rd Party
Confidential". To indicate that College of Information Science and Technology Confidential
information is very sensitive, you may should label the information “College of Information
Science and Technology Internal: Registered and Restricted", " College of Information Science
and Technology Eyes Only", " College of Information Science and Technology Confidential" or
similar labels at the discretion of your individual business unit or department. Once again, this
type of College of Information Science and Technology Confidential information need not be
marked, but users should be aware that this information is very sensitive and be protected as
such.
-584-
Access: Only those individuals (College of Information Science and Technology employees and
non-employees) designated with approved access and signed non-disclosure agreements.
Distribution within the College of Information Science and Technology: Delivered direct signature required, envelopes stamped confidential, or approved electronic file transmission
methods.
Distribution outside of College of Information Science and Technology internal mail: Delivered
direct; signature required; approved private carriers.
Electronic distribution: No restrictions to approved recipients within the College of Information
Science and Technology, but it is highly recommended that all information be strongly
encrypted.
Storage: Individual access controls are very highly recommended for electronic information.
Physical security is generally used, and information should be stored in a physically secured
computer.
Disposal/Destruction: Strongly Encouraged: In specially marked disposal bins on College of
Information Science and Technology premises; electronic data should be expunged/cleared.
Reliably erase or physically destroy media.
Penalty for deliberate or inadvertent disclosure: Up to and including termination, possible civil
and/or criminal prosecution to the full extent of the law.
4.0 Definitions
Terms and Definitions
Appropriate measures
To minimize risk to the College of Information Science and Technology from an outside business
connection. College of Information Science and Technology computer use by competitors and
unauthorized personnel must be restricted so that, in the event of an attempt to access College of
Information Science and Technology information, the amount of information at risk is minimized.
Configuration of College of Information Science and Technology -to-other business connections
Connections shall be set up to allow other businesses to see only what they need to see. This involves
setting up both applications and network configurations to allow access to only what is necessary.
Delivered Direct; Signature Required
Do not leave in interoffice mail slot; call the mail room for special pick-up of mail.
Approved Electronic File Transmission Methods
Includes supported FTP clients and Web browsers.
Envelopes Stamped Confidential
You are not required to use a special envelope. Put your document(s) into an interoffice envelope, seal
it, address it, and stamp it confidential.
Approved Electronic Mail
Includes all mail systems supported by the College of Information Science and Technology systems staff.
These include, but are not necessarily limited to, Lotus Notes and Microsoft Exchange. If you have a
business need to use other mailers contact the appropriate support organization.
-585-
Approved Encrypted email and files
Techniques include the use of DES and PGP. DES encryption is available via many different public domain
packages on all platforms. PGP use within the College of Information Science and Technology is done via
a license. Please contact the appropriate support organization if you require a license.
Company Information System Resources
Company Information System Resources include, but are not limited to, all computers, their data and
programs, as well as all paper information and any information at the Internal Use Only level and above.
Expunge
To reliably erase or expunge data on a PC or Mac you must use a separate program to overwrite data,
supplied as a part of Norton Utilities. Otherwise, the PC or Mac's normal erasure routine keeps the data
intact until overwritten. The same thing happens on UNIX machines, but data is much more difficult to
retrieve on UNIX systems.
Individual Access Controls
Individual Access Controls are methods of electronically protecting files from being accessed by people
other than those specifically designated by the owner. On UNIX machines, this is accomplished by
careful use of the chmod command (use man chmod to find out more about it). On Mac’s and PC's, this
includes using passwords on screensavers, such as Disklock.
Insecure Internet Links
Insecure Internet Links are all network links that originate from a locale or travel over lines that are not
totally under the control of the College of Information Science and Technology.
Encryption
International issues regarding encryption are complex. Follow organizational guidelines on export
controls on cryptography, and consult your manager and/or corporate legal services for further
guidance.
One Time Password Authentication
One Time Password Authentication on Internet connections is accomplished by using a onetime
password token to connect to College of Information Science and Technology's internal network over
the Internet. Contact the systems staff for more information on how to set this up.
Physical Security
Physical security means either having actual possession of a computer at all times, or locking the
computer in an unusable state to an object that is immovable. Methods of accomplishing this include
having a special key to unlock the computer so it can be used, thereby ensuring that the computer
cannot be simply rebooted to get around the protection. If it is a laptop or other portable computer,
never leave it alone in a conference room, hotel room or on an airplane seat, etc. Make arrangements to
lock the device in a hotel safe, or take it with you. In the office, always use a lockdown cable. When
leaving the office for the day, secure the laptop and any other sensitive material in a locked drawer or
cabinet.
Private Link
-586-
A Private Link is an electronic communications path that the College of Information Science and
Technology has control over its entire distance. For example, all College of Information Science and
Technology networks are connected via a private link.
-587-
Lab Anti-Virus Policy
1.0 Purpose
To establish requirements which must be met by all computers connected to College of Information
Science and Technology (IS&T) lab networks to ensure effective virus detection and prevention.
2.0 Scope
This policy applies to all IS&T lab computers that are PC-based or utilize PC-file directory sharing. This
includes, but is not limited to, desktop computers, laptop computers, file/ftp/tftp/proxy servers, and any
PC based lab equipment such as traffic generators.
3.0 Policy
All IS&T PC-based lab computers must have IS&T 's standard, supported anti-virus software installed
(McAfee) and scheduled to run at regular intervals. In addition, the anti-virus software and the virus
pattern files must be kept up-to-date. Virus-infected computers must be removed from the network
until they are verified as virus-free. Systems Managers are responsible for creating procedures that
ensure anti-virus software is run at regular intervals, and computers are verified as virus-free. Any
activities with the intention to create and/or distribute malicious programs into IS&T networks (e.g.,
viruses, worms, Trojan horses, e-mail bombs, etc.) are prohibited, in accordance with the Computer Use
Policy.
Refer to IS&T 's Anti-Virus Recommended Processes to help prevent virus problems.
Noted exceptions: Machines with operating systems other than those based on Microsoft products are
exceptions at the current time.
-588-
Password Policy
1.0 Overview
Passwords are an important aspect of computer security. They are the front line of protection for user
accounts. A poorly chosen password may result in the compromise of the College of Information Science
and Technology's (IS&T) entire corporate network. As such, all IS&T employees (including contractors
and vendors with access to IS&T systems) are responsible for taking the appropriate steps, as outlined
below, to select and secure their passwords.
2.0 Purpose
The purpose of this policy is to establish a standard for creation of strong passwords, the protection of
those passwords, and the frequency of change.
3.0 Scope
The scope of this policy includes all personnel who have or are responsible for an account (or any form
of access that supports or requires a password) on any system that resides at any IS&T facility, has
access to the IS&T network, or stores any non-public IS&T information.
4.0 Policy
4.1 General
All system-level passwords (e.g., root, enable, NT admin, application administration accounts,
etc.) must be changed on at least a quarterly basis.
All production system-level passwords must be part of the IS&T administered global password
management database.
All user-level passwords (e.g., email, web, desktop computer, etc.) must be changed at least
every six months. The recommended change interval is every four months.
User accounts that have system-level privileges granted through group memberships or
programs such as "sudo" must have a unique password from all other accounts held by that
user.
Passwords must not be inserted into email messages or other forms of electronic
communication.
Where SNMP is used, the community strings must be defined as something other than the
standard defaults of "public," "private" and "system" and must be different from the passwords
used to log in interactively. A keyed hash must be used where available (e.g., SNMPv2).
All user-level and system-level passwords must conform to the guidelines described below.
4.2 Guidelines
A. General Password Construction Guidelines
Passwords are used for various purposes at the IS&T. Some of the more common uses include: user level
accounts, web accounts, email accounts, screen saver protection, voicemail password, and local router
logins. Since very few systems have support for one-time tokens (i.e., dynamic passwords which are only
used once), everyone should be aware of how to select strong passwords.
Poor, weak passwords have the following characteristics:
The password contains less than eight characters
-589-
The password is a word found in a dictionary (English or foreign)
The password is a common usage word such as:
o Names of family, pets, friends, co-workers, fantasy characters, etc.
o Computer terms and names, commands, sites, companies, hardware, software.
o The words "UNO", " IS&T ", "Omaha", “password” or any derivation.
o Birthdays and other personal information such as addresses and phone numbers.
o Word or number patterns like aaabbb, qwerty, zyxwvuts, 123321, etc.
o Any of the above spelled backwards.
o Any of the above preceded or followed by a digit (e.g., secret1, 1secret)
o Blank password
Strong passwords have the following characteristics:
Contain both upper and lower case characters (e.g., a-z, A-Z)
Have digits and punctuation characters as well as letters e.g., 0-9, !@#$%^&*()_+|~=\`{}[]:";'<>?,./)
Are at least eight alphanumeric characters long and is a passphrase (Ohmy1stu9).
Is not a word in any language, slang, dialect, jargon, etc.
Are not based on personal information, names of family, etc.
Passwords should never be written down or stored on-line. Try to create passwords that can be
easily remembered. One way to do this is create a password based on a song title, affirmation,
or other phrase. For example, the phrase might be: "This May Be One Way To Remember" and
the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation.
NOTE: Do not use either of these examples as passwords!
B. Password Protection Standards
Do not use the same password for IS&T accounts as for other non- IS&T access (e.g., personal ISP
account, option trading, benefits, etc.). Where possible, don't use the same password for various IS&T
access needs. Select a separate password to be used for an NT account and a UNIX account.
Do not share IS&T passwords with anyone, including administrative assistants or secretaries. All
passwords are to be treated as sensitive, Confidential IS&T information.
Here is a list of "dont's":
Don't reveal a password over the phone to ANYONE
Don't reveal a password in an email message
Don't reveal a password to the boss
Don't talk about a password in front of others
Don't hint at the format of a password (e.g., "my family name")
Don't reveal a password on questionnaires or security forms
Don't share a password with family members
Don't reveal a password to co-workers while on vacation
-590-
If someone demands a password, refer them to this document or have them call someone in the
Information Security Department.
Do not use the "Remember Password" feature of applications (e.g., Lotus Notes, Outlook, and Netscape
Messenger).
Again, do not write passwords down and store them anywhere in your office. Do not store passwords in
a file on ANY computer system (including Palm Pilots or similar devices) without encryption.
Change passwords at least once every six months (except system-level passwords which must be
changed quarterly). The recommended change interval is every four months.
If an account or password is suspected to have been compromised, report the incident to IS&T systems
managers and change all passwords.
C. Application Development Standards
Application developers must ensure their programs contain the following security precautions.
Applications:
should support authentication of individual users, not groups.
should not store passwords in clear text or in any easily reversible form.
should provide for some sort of role management, such that one user can take over the
functions of another without having to know the other's password.
should support TACACS+ , RADIUS and/or X.509 with LDAP security retrieval, wherever possible.
5.0 Definitions
Terms
Definitions
Application Administration Account
Any account that is for the administration of an application
(e.g., Oracle database administrator, ISSU administrator).
-591-
Personal Communication Devices and Voicemail Policy
1.0 Purpose
This document describes Information Security's requirements for Personal Communication Devices and
Voicemail for the College of Information Science and Technology. (IS&T)
2.0 Scope
This policy applies to any use of Personal Communication Devices and IS&T Voicemail issued by IS&T or
used for IS&T business.
3.0 Policy
3.1 Issuing Policy
Personal Communication Devices (PCDs) will be issued only to IS&T personnel with duties that require
them to be in immediate and frequent contact when they are away from their normal work locations.
For the purpose of this policy, PCDs are defined to include handheld wireless devices, cellular
telephones, laptop wireless cards and pagers. Effective distribution of the various technological devices
must be limited to persons for whom the productivity gained is appropriate in relation to the costs
incurred.
Handheld wireless devices may be issued, for operational efficiency, to IS&T personnel who need to
conduct immediate, critical IS&T business. These individuals generally are at the executive and
management level. In addition to verbal contact, it is necessary that they have the capability to review
and have documented responses to critical issues.
3.2 Bluetooth
Hands-free enabling devices, such as the Bluetooth, may be issued to authorized IS&T personnel who
have received approval. Care must be taken to avoid being recorded when peering Bluetooth adapters,
Bluetooth 2.0 Class 1 devices have a range of 330 feet.
3.3 Voicemail
Voicemail boxes may be issued to IS&T personnel who require a method for others to leave messages
when they are not available. Voicemail boxes must be protected by a PIN which must never be the
same as the last four digits of the telephone number of the voicemail box.
3.4 Loss and Theft
Files containing confidential or sensitive data may not be stored in PCDs unless protected by approved
encryption. Confidential or sensitive data shall never be stored on a personal PCD. Charges for repair
due to misuse of equipment or misuse of services may be the responsibility of the employee, as
determined on a case-by-case basis. The cost of any item beyond the standard authorized equipment is
also the responsibility of the employee. Lost or stolen equipment must immediately be reported.
3.5 Personal Use
PCDs and voicemail are issued for IS&T business. Personal is allowed but should be limited.
3.6 PCD Safety
-592-
Conducting telephone calls or utilizing PCDs while driving can be a safety hazard. Drivers should use
PCDs while parked or out of the vehicle. If employees must use a PCD while driving, IS&T requires the
use of hands-free enabling devices.
4.0 Definitions
Term
Bluetooth
Definition
Bluetooth is an industrial specification for wireless personal area networks
(PANs), also known as IEEE 802.15.1. Bluetooth provides a way to connect
and exchange information between devices such as personal digital
assistants (PDAs), and mobile phones via a secure, globally unlicensed
short-range radio frequency. Source: Wikipedia
Confidential or sensitive data All data that is not approved for public release shall be considered
confidential or sensitive.
-593-
Power Outage Policy and Procedures for Production Systems
I.
Current Building Situation During a Power Outage
a. A pair of 40kVA battery backup units operating in parallel will maintain power to the
equipment located in: 158B, 158R, 166, 158C, 158A, and the building keycard security
system.
b. The building’s emergency generator should cut in automatically during a power outage.
However, the transfer switch appears to be incorrectly installed, which requires an
occasional manual start.
c. Building blast/fire doors will close during a power outage
d. Faculty wall power outlets are not on UPS or generator power by default.
e. Backup cooling units located in server rooms are NOT on the UPS, and will disengage
when power fails.
II.
Policies and Priorities
a. The following priorities are to be maintained during a power outage:
1. A monitoring device inside the 158R server room that will collect critical
operating environment and status data will be active at all times. This unit
must have keyboard, mouse, and display access maintained at all times.
2. Power to Primary and Backup Domain Controllers must be maintained at all
times, unless operational failure is imminent due to environmental conditions.
3. Power to Domain Name Servers must be maintained at all times, unless
operational failure due to environmental conditions is imminent.
4. Power to File Servers must be maintained for 30 minutes past the start of the
outage, to allow faculty, staff, and students, time to save any open files.
5. Power to E-mail servers must be maintained at all times, unless operational
failure due to environmental conditions is imminent.
6. Power to Certificate Servers must be maintained at all times, unless
operational failure is imminent due to environmental conditions.
7. All other production servers not mentioned above will be shut down 15
minutes after the start of the power outage, following the defined
procedures.
b. The following personnel are to be notified immediately at the onset of a power outage.
Notification should be of an automatic nature, provided by a monitoring service:
1. Senior Systems Managers
2. Production Systems Managers
3. Research Systems Managers
c. The following personnel are to direct the implementation of procedures during a power
outage. These personnel are listed in order of required response:
1. Assistant Production Systems Managers
2. Senior Production Systems Managers
-594-
3. College Computing Director/Dean’s Office
d. In the event that insufficient College personnel are available to respond to the power
outage, the Senior Systems Manager for the College of Engineering Technology should
be contacted by the Senior Production Systems Managers to request aid.
e. Each individually cooled environment (i.e. 158B, 158R, etc) should remain isolated from
the remainder of the cooled environments for as long as possible.
f.
When power is restored to the building, a waiting period of 5 minutes should be
observed to ensure that a subsequent power failure will not occur.
g. When powering up equipment after a power failure, the following priorities should be
observed. Each category should be completely restored before the next category is
begun.
1.
2.
3.
4.
5.
6.
7.
Network Infrastructure
Primary Domain Controllers
Backup Domain Controllers
Domain Name Servers
File Servers
E-mail and Certificate Servers
All other systems
h. After power failure ends, e-mail notification should be sent to all students, faculty, and
staff to alert them to the occurrence. Systems Managers should prioritize data and
system recovery over all other assignments for a minimum of two hours after a power
failure.
III.
Procedures for Power Outages
These procedures are intended to be followed in order by the person assuming
responsibility during a power outage.
1. Facilities Management and Planning should be notified of the outage. If not during
normal working hours (8:00 a.m. to 6:00 p.m.) Campus Security should be notified.
During notification, manual verification of the generator’s start should be requested.
2. All College Production and Research Managers should be notified of the outage.
3. CET Systems managers should be notified of the outage.
4. Wide-area notification mechanisms should be utilized to notify Faculty, Staff and
Students connected to College computing resources of the imminent shutdown of those
resources, and the time frame for that shutdown. Notifications should be repeated
every 15 minutes during the wait/notification period.
5. Alternative cooling mechanisms should be located and brought to standby positions
near all critical locations. The following locations have priority in the following order:
o 158G – UPS Battery Room
o 158R – Production Systems Server room
o 158B – Research Systems Room
-595-
6. After the required notification and wait period, all non-critical systems should be
powered down.
7. After the required notification and wait period, all File Servers should be shut down.
8. Environmental factors within the monitored areas should be constantly watched. If
environmental conditions continue to deteriorate, alternate cooling mechanisms should
be implemented.
9. Should dangerous conditions occur, a notification/wait period of 15 minutes should be
instituted. Should dangerous conditions continue, affected critical systems should be
powered down in the following order:
o Backup Domain Controllers
o E-mail and Certificate Servers
o Domain Name Servers and Primary Domain Controllers.
10. Upon Power restoration, systems should be restored according to policy.
11. All Systems manager should be notified of the end of the outage.
12. Notification should be sent to all Faculty, Staff, and Students, detailing the power
outage, the duration, and any known effects of the outage, including damaged
equipment and procedures for reporting problems to the Systems Office.
13. For a minimum of two hours following the outage, Systems Repair Priority should be
allocated to data and systems recovery first.
14. A report should be sent from the responsible systems manager to the rest of the
systems managers detailing the outage, duration, effects, and any suggested changes to
better respond to future outages.
-596-
Server Malware Protection Policy
1.0 Overview: The College of Information Science and Technology (IS&T) is entrusted with the
responsibility to provide professional management of clients servers as outlined in each of the contracts
with its customers. Inherent in this responsibility is an obligation to provide appropriate protection
against malware threats, such as viruses and spyware applications. Effective implementation of this
policy will limit the exposure and effect of common malware threats to the systems they cover.
2.0 Purpose: The purpose of this policy is to outline which server systems are required to have antivirus and/or anti-spyware applications.
3.0 Scope: This policy applies to all servers that IS&T is responsible to manage. This explicitly includes
any system for which IS&T has a contractual obligation to administer. This also includes all server
systems setup for internal use by IS&T staff, regardless of whether IS&T retains administrative obligation
or not.
4.0 Policy: IS&T operations staff will adhere to this policy to determine which servers will have antivirus and/or anti-spyware applications installed on them and to deploy such applications as appropriate.
4.1 ANTI-VIRUS
All servers MUST have an anti-virus application installed that offers real-time scanning protection to files
and applications running on the target system if they meet one or more of the following conditions:
Non-administrative users have remote access capability
The system is a file server
NBT/Microsoft Share access is open to this server from systems used by non-administrative
users
HTTP/FTP access is open from the Internet
Other “risky” protocols/applications are available to this system from the Internet at the
discretion of the IS&T systems managers
All servers SHOULD have an anti-virus application installed that offers real-time scanning protection to
files and applications running on the target system if they meet one or more of the following conditions:
Outbound web access is available from the system
4.2 MAIL SERVER ANTI-VIRUS
If the target system is a mail server it MUST have either an external or internal anti-virus scanning
application that scans all mail destined to and from the mail server. Local anti-virus scanning
applications MAY be disabled during backups if an external anti-virus application still scans inbound
emails while the backup is being performed.
4.3 ANTI-SPYWARE
All servers MUST have an anti-spyware application installed that offers real-time protection to the target
system if they meet one or more of the following conditions:
Any system where non-technical or non-administrative users have remote access to the
system and ANY outbound access is permitted to the Internet
-597-
Any system where non-technical or non-administrative users have the ability to install
software on their own
4.4 NOTABLE EXCEPTIONS
An exception to the above standards will generally be granted with minimal resistance and
documentation if one of the following notable conditions apply to this system:
The system is a SQL server
The system is used as a dedicated mail server
The system is not a Windows based platform
5.0 Definitions:
TERM
DEFINITION
Server
For purposes of this policy, a server is any computer system residing in the physically
secured data center owned and operated by IS&T. In addition, this includes any system
running an operating system specifically intended for server usage as defined by the
IS&T systems staff that has access to internal secure networks. This includes, but is not
limited to, Microsoft Server 2000 and all permutations, Microsoft Server 2003 and all
permutations, any Linux/Unix based operating systems, and MAC operating systems
that external users are expected to regularly connect to and VMS.
Malware
Software designed to infiltrate or damage a computer system without the owner's
informed consent. It is a blend of the words "malicious" and "software". The expression
is a general term used by computer professionals to mean a variety of forms of hostile,
intrusive, or annoying software or program code.
Spyware
Broad category of software designed to intercept or take partial control of a computer's
operation without the informed consent of that machine's owner or legitimate user.
While the term taken literally suggests software that surreptitiously monitors the user, it
has also come to refer more broadly to software that subverts the computer's operation
for the benefit of a third party.
Anti-virus Software
Consists of computer programs that attempt to identify, thwart and eliminate computer
viruses and other malicious software (malware).
-598-
Server Security Policy
1.0 Purpose
The purpose of this policy is to establish standards for the base configuration of internal server
equipment that is owned and/or operated by the College of Information Science and Technology. (IS&T)
Effective implementation of this policy will minimize unauthorized access to IS&T proprietary
information and technology.
2.0 Scope
This policy applies to server equipment owned and/or operated by IS&T, and to servers registered under
any IS&T -owned internal network domain.
This policy is specifically for equipment on the internal IS&T network. For secure configuration of
equipment external to IS&T on the DMZ, refer to the Internet DMZ Equipment Policy.
3.0 Policy
3.1 Ownership and Responsibilities
All internal servers deployed at IS&T must be owned by an operational group that is responsible for
system administration. Approved server configuration guides must be established and maintained by
each operational group, based on business needs and approved by IS&T Director of IT. Operational
groups should monitor configuration compliance and implement an exception policy tailored to their
environment. Each operational group must establish a process for changing the configuration guides,
which includes review and approval by the IS&T Director of IT.
Servers must be registered within the corporate enterprise management system. At a minimum,
the following information is required to positively identify the point of contact:
o Server contact(s) and location, and a backup contact
o Hardware and Operating System/Version
o Main functions and applications, if applicable
Information in the enterprise management system must be kept up-to-date.
Configuration changes for production servers must follow the appropriate change management
procedures.
3.2 General Configuration Guidelines
Operating System configuration should be in accordance with approved systems guidelines.
Services and applications that will not be used must be disabled where practical.
Access to services should be logged and/or protected through access-control methods, when
possible.
The most recent security patches must be installed on the system as soon as practical, the only
exception being when immediate application would interfere with business requirements.
Trust relationships between systems are a security risk, and their use should be avoided. Do not
use a trust relationship when some other method of communication will do.
Always use standard security principles of least required access to perform a function.
Do not use root when a non-privileged account will do.
-599-
If a methodology for secure channel connection is available (i.e., technically feasible), privileged
access must be performed over secure channels, (e.g., encrypted network connections using
SSH or IPSec).
Servers should be physically located in an access-controlled environment.
Servers are specifically prohibited from operating from uncontrolled cubicle areas.
3.3 Monitoring
All security-related events on critical or sensitive systems must be logged and audit trails saved
as follows:
o All security related logs will be kept online for a minimum of 1 week.
o Daily incremental backups will be retained for at least 1 month.
o Weekly full backups of logs will be retained for at least 1 month.
o Monthly full backups will be retained for a minimum of 2 years.
Security-related events will be reported to IS&T systems managers, who will review logs and
report incidents to the IS&T Director of IT. Corrective measures will be prescribed as needed.
Security-related events include, but are not limited to:
o Port-scan attacks
o Evidence of unauthorized access to privileged accounts
o Anomalous occurrences that are not related to specific applications on the host.
3.4 Compliance
Audits will be performed on a regular basis by authorized organizations within the College.
Audits will be managed by the IS&T systems managers, in accordance with the Audit Policy.
Every effort will be made to prevent audits from causing operational failures or disruptions.
Audits will not be used for purposes of scanning faculty, staff, and student personal data.
4.0 Definitions
Term
Definition
DMZ
De-militarized Zone. A network segment external to the corporate production network.
Server
For purposes of this policy, a Server is defined as an internal IS&T Server. Desktop
machines and Lab equipment are not relevant to the scope of this policy.
-600-
Teaching Assistant, Graduate Assistant, PhD Student, and Student
Worker Acceptable Computer Use Policy
The positions this document is directed towards are by their nature desirable and prestigious positions
for students to hold. This also implies that the positions are only awarded to those students who have
the maturity to also bear the responsibility implied in these positions. This document enacts into
College policy those responsible behaviors before signing this policy. After signing this policy,
responsible behavior will be expected. The College of Information Science and Technology, in many
cases, provides student workers, graduate assistants, PhD students, and teaching assistants with a
computer to use in the normal course of performing their day to day work. These computers are
provided for the express purpose of performing College business. College computer users should be
aware these are not personal systems, but rather are intended as utility systems that will be used in
many cases by several people during a given day. IN the interest of providing a reliable service and one
in which College computer users are abiding by ethical standards and the laws in effect where this
computer use takes place, this acceptable us policy has been implemented. These policies are not
intended for computers used in research projects or by Faculty. Student users of University computer
systems agree to the following conditions. Failure to comply with this agreement and the documents
reference in this agreement will result in loss of access to these systems and/or services, and possible
other disciplinary or legal action.
May not use these systems to harass or threaten individuals or groups or to create a hostile
environment.
May not store or transfer copyrighted material without the consent or public release by the
legal owner of that material, including but not limited to software, pictures, video, audio, and
written material as defined by the United States Copyright Office in this document:
http://lcweb.loc.gov/copyright
May not access or attempt to access computing resources without proper authorization,
including unauthorized use of someone’s account and password.
May not send or present potentially damaging computer software, including but not limited to
computer viruses, and computer worms.
May not use these systems for unsolicited bulk distribution of material or information to off
campus systems, including but not limit to mass email. May not use University systems or
network resources for distribution of copyrighted computer software, images, music, video or
documents unless expressly permitted by the copyright holder.
My not load or run peer-to-peer applications that are intended for the distribution of software
or digital media (music, video, or text). These applications include, but are not limited to Audio
Galaxy, Napster, Bear Share, Lime Wire, mIRC, Bit Torrent, Azureus, and similar systems.
May not store information or use these systems in any ways that violate state or federal laws or
University of Nebraska policies including executive memorandum 16
http://www.nebraska.edu/about/exec_memo16.pdf .
May not sue these systems for commercial, business or any for-profit use without documented
permission from the systems administrator and the individual to whom that administrator
reports. The documented permission requirement shall include UNO Lotus Notes email or
printed and signed documents.
May not run additional services without documented permission from the official administrators
of the system.
-601-
May not use these systems, the services on these systems or the network, to capture private
information or content from other systems or to probe for system and service vulnerabilities
without documented permission from the systems
Continued on Next Page 
administrator of target systems. Loading of software used for these purposes such as network
sniffers, password crackers, and port scanners onto University systems is sufficient cause to
assume this activity is taking place and to cause disciplinary action to be taken.
If an investigation takes place, you understand that any and all of your UNO accounts and
computer use may be subject to review by a designated system administrator and/or UNO
Student Affairs and/or UNO security organizations, as accounts are considered to be the
property of the University of Nebraska Omaha. Your accounts may be disabled during any
investigation.
Signed: ______________________________________________________________________________
Printed Name: _______________________________________
Date: __________________________
Witnessed: __________________________________________
Date: __________________________
-602-
Virtual Private Network (VPN) Policy
1.0 Purpose
The purpose of this policy is to provide guidelines for Remote Access IPSec or L2TP Virtual Private
Network (VPN) connections to the College of Information Science and Technology (IS&T) corporate
network.
2.0 Scope
This policy applies to all IS&T employees, contractors, consultants, temporaries, and other workers
including all personnel affiliated with third parties utilizing VPNs to access the IS&T network. This policy
applies to implementations of VPN that are directed through an IPSec Concentrator.
3.0 Policy
Approved IS&T employees and authorized third parties (customers, vendors, etc.) may utilize the
benefits of VPNs, which are a "user managed" service. This means that the user is responsible for
selecting an Internet Service Provider (ISP), coordinating installation, installing any required software,
and paying associated fees. Further details may be found in the Remote Access Policy.
Additionally,
1. It is the responsibility of employees with VPN privileges to ensure that unauthorized users are
not allowed access to IS&T internal networks.
2. VPN use is to be controlled using either a one-time password authentication such as a token
device or a RADIUS/ldap system with a strong passphrase.
3. When actively connected to the corporate network, VPNs will force all traffic to and from the PC
over the VPN tunnel: all other traffic will be dropped.
4. Dual (split) tunneling is NOT permitted; only one network connection is allowed.
5. VPN gateways will be set up and managed by IS&T systems network operational groups.
6. All computers connected to IS&T internal networks via VPN or any other technology must use
the most up-to-date anti-virus software that is the corporate standard (McAfee); this includes
personal computers.
7. VPN users will be automatically disconnected from IS&T 's network after thirty minutes of
inactivity. The user must then logon again to reconnect to the network. Pings or other artificial
network processes are not to be used to keep the connection open.
8. The VPN concentrator is limited to an absolute connection time of 72 hours.
9. Users of computers that are not IS&T-owned equipment must configure the equipment to
comply with IS&T's VPN and Network policies.
10. Only IS&T-approved VPN clients may be used.
11. By using VPN technology with personal equipment, users must understand that their machines
are a de facto extension of IS&T's network, and as such are subject to the same rules and
regulations that apply to IS&T -owned equipment, i.e., their machines must be configured to
comply with IS&T’s Security Policies.
4.0 Definitions
Term
IPSec Concentrator
Definition
A device in which VPN connections are terminated.
-603-
Wireless Communication Policy
1.0 Purpose
This policy discusses access to College of Information Science and Technology (IS&T) research networks
via wireless communication mechanisms. Only wireless systems that meet the criteria of this policy or
have been granted an exclusive waiver by IS&T systems managers in conjunction with the PKI Network
Administrator are approved for connectivity to IS&T's networks.
2.0 Scope
This policy covers all wireless data communication devices (e.g., personal computers, cellular phones,
PDAs, etc.) connected to any of IS&T 's internal networks. This includes any form of wireless
communication device capable of transmitting packet data. Wireless devices and/or networks without
any connectivity to IS&T’s networks do not fall under the purview of this policy.
3.0 Policy
3.1 Register Access Points and Cards
All wireless Access Points / Base Stations connected to IS&T research networks must be registered and
approved by the IS&T Director of IT in conjunction with the PKI Network Administrator. These Access
Points / Base Stations are subject to periodic penetration tests and audits. All wireless Network
Interface Cards (i.e., PC cards) used in laptop or desktop computers must be registered with IS&T
systems staff and the PKI Network Administrator.
3.2 Approved Research Projects
All wireless LAN projects for research must be approved by the Dean of the College of Information
Science and Technology.
3.3 Technical Implementation/Virtual LAN
All approved projects must be planned and implemented by the IS&T systems staff in conjunction with
the PKI Network Administrator. All computers with wireless LAN devices for research projects must
utilize an approved VLAN. All implementations must not interfere with the production (“unowireless”)
network.
3.4 Setting the SSID
The SSID must be registered with IS&T systems staff and the PKI Network Administrator. The SSID
shall not be named “unowireless”. The SSID shall not contain any identifying information such as
student or employee name, or product identifier.
4.0 Definitions
Terms
User Authentication
VLAN
“unowireless”
Definitions
A method by which the user of a wireless system can be verified as a legitimate
user independent of the computer or operating system being used.
a method of creating independent logical networks within a physical network.
The University of Nebraska Omaha production wireless network.
-604-
APPENDIX 7 – ASSESSMENT DATA COLLECTION
This appendix contains examples of the instruments used to collect assessment data, or extracts of
reports that reflect the assessment data. The complete set of assessments may be accessed at:
http://accreditation.ist.unomaha.edu/
To log in, use the username: pki-ist\abet
and password: accreditus2
-605-
Program Objectives
Advisory Board
-606-
Student Focus Group
Questions for Student Focus Group 2008-10-24
Initial Evaluation of Courses
1. To what extent do you feel that the courses that you took are a valuable part of the curriculum?
2. To what extent do you feel that you learned a lot in the courses that you took?
Feedback on Courses
For each course, students identified strengths, weaknesses, their own preparedness, and improvements.
Curriculum Improvements
How can we improve the undergraduate curriculum?
Staying Power
What would it take for you to stay at IS&T and enter the graduate program?
-607-
Alumni Web Survey
Introduction
Thank you for taking the time to respond to this survey. The purpose of this survey is to get feedback
from alumni of the College of IS&T on two important items:
How well the program prepared you for a career in an IT-related profession, and
How the program might be improved to better prepare current and future students.
Your opinions are a vital part of our on-going efforts to improve our programs.
Survey
1. Please indicate the undergraduate program from which you graduated:
a. BS Information Systems
b. BS Computer Science
c. BS Bioinformatics
2. Which of the following have you participated in within the last year (choose all that
apply)?
a. Self-paced tutorial
b. Conferences
c. Workshops
d. Training courses
e. College courses
f. Other (explain)
3. Have you taken any graduate courses since you received your bachelor’s degree?
a. Yes
b. No
4. Have you completed a graduate program (e.g. MS, PhD) since you received you
bachelor’s degree?
a. Yes
b. No
5. For each of the following, (1) Indicate how important each has been to your work life,
and (2) how well the undergraduate program prepared you to do it.
How important to your How
well
did
the
work life?
undergraduate
program
prepared you to do it?
Understanding the role of
information systems in the
context of the entire
Very important
Important
Neither important
-608-
Very well
Well
nor Neither well nor poorly
organization
unimportant
Unimportant
Very unimportant
Very important
Important
Neither important
unimportant
Unimportant
Very unimportant
Very well prepared
Well prepared
nor Neither well prepared nor
poorly prepared
Poorly prepared
Very poorly prepared
Having good interpersonal
communication skills
Very important
Important
Neither important
unimportant
Unimportant
Very unimportant
Very well prepared
Well prepared
nor Neither well prepared nor
poorly prepared
Poorly prepared
Very poorly prepared
Having good team skills
Very important
Important
Neither important
unimportant
Unimportant
Very unimportant
Very well prepared
Well prepared
nor Neither well prepared nor
poorly prepared
Poorly prepared
Very poorly prepared
Having strong ethical
principles
Very important
Important
Neither important
unimportant
Unimportant
Very unimportant
Very well prepared
Well prepared
nor Neither well prepared nor
poorly prepared
Poorly prepared
Very poorly prepared
Designing, implementing,
delivering or managing
technological solutions to
organizational problems or
opportunities
Very important
Important
Neither important
unimportant
Unimportant
Very unimportant
Very well prepared
Well prepared
nor Neither well prepared nor
poorly prepared
Poorly prepared
Very poorly prepared
Building and/or using current
techniques, skills, & tools
appropriate to your job.
Very important
Important
Neither important
unimportant
Unimportant
Very unimportant
Very well prepared
Well prepared
nor Neither well prepared nor
poorly prepared
Poorly prepared
Very poorly prepared
Engaging in continuing
Very important
Having strong analytic,
problem solving, and critical
thinking skills
-609-
Poorly
Very poorly
Very well prepared
professional development
(e.g. classes, workshops,
seminars, conferences, selflearning)
Important
Neither important
unimportant
Unimportant
Very unimportant
a.
Well prepared
nor Neither well prepared nor
poorly prepared
Poorly prepared
Very poorly prepared
6. In your opinion, how well do the program outcomes listed below indicate what a graduate
from the program should know or be able to do?
a. Very well
b. Well
c. Neither well nor poorly
d. Poorly
e. Very poorly
Students will have an ability to apply knowledge of computing and mathematics appropriate to
the discipline.
Students will understand the local and global role of IS in supporting and enabling processes and
strategies at the individual, organizational, and societal level.
Students will communicate effectively to a range of audiences through listening and through
oral, written, and visual presentation.
Students will work effectively in a team environment and collaborate with others to accomplish
a common goal.
Students will understand and apply appropriate types of computer-based tools to support
communication.
Students will understand and apply professional, legal, and ethical standards of conduct.
Students will understand and model organizational processes and data.
-610-
Students will design, integrate, implement, and evaluate a computer-based system, process,
component, or program to meet desired needs.
Students will manage projects.
Students will manage IS with a specified application environment.
Students will manage change.
Students will recognize the need for continuing professional development.
7. How could this list be improved? (open ended)
8. Are there some topics or learning experiences that were missing from the program when
you were in it that you feel should be a part of the program today?
9. Envisioning the evolution of the role of information technologies in our world over the
next five years, are there particular topics, issues, trends, tools, or practices that you feel
we should pay particular attention to?
10. Please suggest some changes not mentioned elsewhere that, if implemented, would
improve the quality of the program from which you graduated.
-611-
Survey of Graduates
1. From which program are you graduating?
a. Bachelor of Science in Bioinformatics
b. Bachelor of Science in Computer Science
c. Bachelor of Science in Information Assurance
d. Bachelor of Science in Information Systems
2. In the year following graduation, I will
a. Stay in Nebraska
b. Leave Nebraska
c. Don’t know
3. In the year following graduation, I am going to (check all that apply):
a. Attend graduate school
i. At UNO
ii. Elsewhere
b. Work in the IT field
i. I am currently employed in IT (provide job title)
ii. I have an offer for a job in IT (provide job title)
iii. I am searching for a job in IT
c. Work in a non-IT field
d. Other (specify)
e. Don’t know
4. Which of the following types of professional development do you plan on taking within the next
year? (Check all that apply)
a. College course
b. Training course
c. Workshop
d. Self-paced tutorial (e.g. web-based)
e. Other (specify)
5. Please provide one or more suggestions for improving the undergraduate program from which
you are graduating.
-612-
College Statistics Report
Objective #2: Students receiving a bachelor’s degree from the College of IS&T are employed in a job that makes use of their education
Measure
Data collected
AY 2002-2003 AY 2003-2004 AY 2004-2005 AY 2006-2007
UO2.M4
UO2.M5
Retention rates (CS)
Retention rates (IS)
Retention rates (Total)
Minority retention rates (CS)
Minority retention rates (IS)
Minority retention rates
(Total)
Fall-to-fall retention rates for full-time,
degree-seeking freshmen taking courses
within IS&T
Fall-to-fall retention rates for first-time,
full-time minority degree-seeking students
within IS&T
73%
82%
75%
75%
100%
78%
77%
90%
80%
86%
100%
88%
88%
100%
89%
100%
n/a
100%
Objective #6: Students, faculty, and staff in the College of IS&T participate in community and professional outreach
Measure
Data collected
2002
2004
2005
Number of internships (calendar year)
84
79
64
UO6.M2 Internships
Number of firms involved
54
51 (est)
Number of internship opportunities
91
324
476
offered from Career Resource Center
(calendar year)
Number of Career Resource Center
200 (est)
430
600
partner organizations
$
452,943 $
1,100,000
UO6.M9 Funding from the community Dollar amount
Number of funded projects
11
19
Access to education
Number of distance education enabled
25
20
1
course sections
UO6.M12
Number of students enrolled in distance ed
263
34
1
courses
Number of events
15
22
22
UO6.M13 Events encouraging
participation of underNumber of individuals involved
585
438
719
represented groups
84%
73%
80%
67%
100%
71%
2006
56
1176
750
3
15
13
932
Objective #7: Resources available in the College of IS&T are appropriate to the programs offered and are used in an
efficient and effective manner.
Measure
Data collected
AY 2002-2003 AY 2004-2005 AY 2005-2006 AY 2006-2007
UO7.M1
Human Resources
UO7.M3
Financial Resources
UO7.M4
UO7.M7
UO7.M9
Physical Resources
Student/Faculty ratio
Faculty/Admin support staff (FTE) ratio
Faculty/ Tech support staff (FTE) ratio
Student/Tech support staff (FTE) ratio
Student/ Advisor (FTE) ratio
Student/ Admin support (FTE) ratio
IS&T financial assistance/ student ratio
Annual budget for physical and human
resources in IS&T
Number of sections of IS&T classes
Number of sections IS&T classes not
offered at PKI because of space
constraints
Number of students enrolled in IS&T /
workstations ratio
-613-
$
31
7.4
12.3
379
413
227.4
0 $
5,364,108 $
27
6.8
5.2
143
412
185.6
16.98 $
6,058,836 $
23
21
6.3
6.5
6.3
5.6
145
115
387
357
145
133.8
18.90 $
22.18
6,726,702 $ 7,300,862
459
22
471
22
443
13
268
6
3.5
2.9
2.7
2.5
Faculty Annual Reviews
2003
2005
2007
2009
Objective #4 Faculty in the College of IS&T contribute to the advancement of their disciplines through
scholarly activity
Peer-reviewed journal articles
20
15
22
28
Peer-reviewed proceedings
29
16
35
37
Conference presentations
11
14
13
8
Book chapters
7
18
9
10
Monographs / Books
2
3
2
2
Editorial board service
22
25
24
30
Other editorial activity (e.g. conference
section chair)
20
18
20
13
Grants funded (No.)
12
19
11
13
Grants funded ($)
$ 374,507 $ 422,339 $ 1,643,474 $ 891,207
Grants submitted (unfunded)
20
3
10
21
Scholarly activity with direct relevance to UG
students
6
1
0
38
Objective #5 Faculty and staff in the College of IS&T regularly update their professional knowledge and skills
and continually develop and enhance programs to meet the needs of our students and
community.
Count of professional development activities
related to courses in various categories
2
5
13
20
Count of professional development activities
related to advising & support
0
0
1
0
New courses
12
15
6
1
Courses with major change
6
12
11
6
Courses with minor change
26
11
10
32
Objective #6 Students, faculty, and staff in the College of IS&T participate in community and professional
outreach.
Number of projects with external clients
(graduate)
49
58
16
Number of projects with external clients
(undergraduate)
30
24
22
Membership in corporate, professional,
advisory, or civic boards
6
2
2
Professional publications and media
appearances
1
0
5
Speaches to popular conferences, civic
groups, meetings
15
9
13
Training, consulting, technology transfer
activities
1
3
4
Contributions to other institutes
1
8
1
Volunteer work
10
1
0
-614-
12
26
0
0
22
4
1
1
Faculty Questionnaire
General
1.
With which department are you affiliated?
Library Facilities
1.
The library resources are adequate to enable you to meet your responsibilities and professional needs.
2.
The process by which you may request the library to order books or subscriptions is adequate
[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]
3.
The professional librarians and library support staff adequately support your responsibilities and professional needs
[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]
4.
Access to the library’s system for locating and obtaining information is adequate.
[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]
Classroom Equipment
5.
The equipment available in classrooms where you teach is adequate for your teaching needs.
[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]
Faculty Offices
6.
Your office enables you to meet your responsibilities and professional needs
[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]
Labs
7.
The special purpose labs (e.g. those on the 3rd floor) are adequate to meet your needs.
Support Staff
8.
The number of support staff is adequate to enable you to meet your responsibilities and professional needs.
Comment
If you wish, please elaborate on any answer given above.
-615-
Program Outcomes
Capstone project review
Obje ctive (a ) Stude nts w ill ha ve a n a bility to a pply know le dge of com puting
a nd m a the m a tics a ppropria te to the discipline .
Obje ctive (b) Stude nts w ill ha ve a broa d orga niza tiona l a nd re a l-w orld
pe rspe ctive
(1) Understand the local and global role of information systems in supporting
and enabling processes and strategies at the individual, organizational, and
societal level
Obje ctive (c) Stude nts w ill ha ve strong a na lytic, proble m solving, a nd critica l
thinking skills
(1) Apply traditional and contemporary analysis and design techniques to
identify and analyze organizational problems or opportunities, formulate
appropriate strategies and solutions using information technologies, and
evaluate the effectiveness of propos
Obje ctive (d) Stude nts w ill ha ve good inte rpe rsona l com m unica tion, te a m
skills, a nd strong e thica l principle s
(1) Communicate effectively to a range of audiences through listening and
through oral, written, and visual presentation
(2) W ork effectively in a team environment and collaborate with others to
accomplish a common goal.
(3) Understand and apply appropriate types of computer-based tools to
support communication.
(4) Understand and apply professional, legal, and ethical standards of
conduct
Obje ctive (e ) Stude nts w ill be a ble to de sign, im ple m e nt, de live r, a nd
m a na ge te chnologica l solutions to orga niza tiona l proble m s or to ta ke
a dva nta ge of opportunitie s.
(1) Understand and model organizational processes and data
(2) Design, integrate, implement, and evaluate a computer-based system,
process, component, or program to meet desired needs.
(3) Manage projects.
(4) Manage information systems within a specific application environment
(5) Manage organizational change
(6) Manage project change
Principal strengths:
Principal weaknesses:
Suggestions for improving the content or pedagogy of ISQA 4110 and ISQA 4120:
-616-
Group presentation
Correspondence between original
requirements analysis and final deliverables
Other
Post project evaluation
Interface design
Control plan
Computer Architecture Design
Database Design
IDEF1X ER Diagram
Update of project plan
Tracking GANTT
work flow
use cases
IDEF0
process model
Meeting minutes, other comm.
Baseline Project Plan
Workflow
Enterprise model
Statement of work
U - Unsatisfactory
E - Emerging
P - Proficient
D - Distinguished
NO - Not Observed
Task list, resource list
DATE:
Economic Feasibility Analysis
EVALUATOR:
M9
Rework of Economic Feasibility Analysis
PROJECT:
M8
Final GANTT diagram
M7
System construction/prototyping
M6
Documentation
M5
Maintenance plan
M4
Implementation plan
M3
Testing plan
M2
Structure Charts (proprietary software)
M1
Writing sample
-617-
Topic area exam
ISQA 3300 File Structures
-618-
CIST 2500 Statistics
-619-
Ethics case study
-620-