Page 274 - Bowie State University Graduate Catalog 2018-2020.
P. 274
addressed. Case studies will be used to expose students to information systems
policy issues.
INSS 730 STRATEGIC INFORMATION MANAGEMENT
Prerequisite: INSS 630
Credit 3
This course provides an opportunity for in-depth analysis and discussion of
strategic information management and leadership. The focus is on using
information technology as a strategic resource and managing information
systems as an asset to the organization. Students learn to how best use IT to
affect culture and behavioral changes in an organization. Planning strategies,
tactics, and practices are discussed, and overall corporate strategic plans are
linked to information technology. Case studies and simulation models are used
to explore the issues, problems, and processes in the strategic management of
information and the management of information programs in institutional
settings
INSS 733 BUSINESS PROCESS AND CHANGE MANAGEMEN
Prerequisite: INSS 630
Credit 3
An in-depth study of business transformation and the role of information
technology (IT) as both an enabler and a driver of change. The course examines
significant organizational changes and other issues associated with the
incorporation and integration of IT throughout various levels of the
organization, primarily from the process management perspective. A variety of
commercial and open source tools will be used to determine the most effective
ways of managing change in technology-intensive organizations. Students will
learn the best practices in business process re-engineering and continuous
process improvement. The focus is on enterprise and IT integration and synergy
creation.
INSS 735 INFORMATION SYSTEMS SECURITY
Former course number 635
Prerequisites: INSS 615, 630 or consent of Instructor
Credit 3
This course explores security policies, policies, models, and mechanics for
secrecy, integrity, and availability. Topics include operating systems models and
mechanisms for mandatory and discretionary controls; data models, concepts,
and mechanisms for database security; basic cryptography and its applications;
security in computer networks and distributed systems; as well as control and
prevention of viruses and other malicious programs.
273