Learning Objectives
• You will be able to explain the relationship between the strategy of the firm and its information systems
• You will be able to describe and explain the application of various technologies used in the business world today.
• You will have a basic understanding of the technology infrastructure that enables businesses to innovate using technology
• You will be able to explain the benefits of several different classes of commonly used information systems
• You will have knowledge of and would have used some personal and business productivity/collaboration tools
• You will be able to identify and suggest appropriate responses to managerial and organizational issues stemming from the development, implementation, and use of computer-based information systems
Tools & Techniques
• MySQL
• Miro
• Business Model
• Canvas
• Network Effects
• Total Cost of Ownership
• Long Tail
• Data Mining Overview
• Business Intelligence
• Develop an understanding and appreciation of the social media ecosystem
• Develop capabilities in measuring the value of social media to various firms
• Critically evaluate business opportunities that include the use of or potential use of social media
• Understand common Internet advertising models
• Develop an appreciation of the business impact of privacy and personalization
• Learn how Big Data created in the social media context enables predictive analytics and apply this knowledge to real-world settings.– Possess a strong sense of how web 2.0 affects business models of firms
• Develop entrepreneurial and design skills to help find a new social business
• Google Ads
• Gephi
• Data Robot
• Content sharing strategies on social media
• Estimating the value of social media metric
• Running online advertising campaign through Google Ads
• Methods to analysis social network graphs
• Social media data analytics
(Exposure to Shark Tank)
• Web 2.0
• Value of social media
• Pay-per-click
• Social network analysis
• Corporate social media policies
• SEO
• Platform responsibilities
• Digital communities
• Understand and help articulate the data needs of the company (requirement analysis)
• Conceptually model the relationship of the data (data modeling).
• Implement the database (implementation)
• Query databases to meet business requirements
• You will also get an introduction to Big Data, data science, machine learning, and several implementations of predictive business analytics in this course
• SQL
• MySQL Workbench
• Requirement analysis
• Entity-Relationship Modeling
• Query Databases
• Data Storage/Modeling/Retrieval
• Relational Model
• Normalization
• Non-Relational Databases
• Big Data, Machine Learning and Data Mining Overview
• Learn the foundations of systems analysis, including methodologies
• Explore the various requirement gathering strategies and methods to define a detailed list of nonfunctional and functional requirements for an information system
• Understand the various "views" of the system and how they are interconnected
• Learn to decompose the system into a series of models including functional, structural models, and behavioral models for an information system using UML
• Understand principles of user/human-centric design and build a visual prototype that conveys the look and feel of the proposed application
• LucidChart
• MS Visio
• MS Teams
• Prototyping tool (Figma, Adobe XD)
• Use Case Diagram
• Class Diagram
• Sequence Diagram
• Medium fidelity prototype
• Systems Request and Requirements Gathering and Definition
• Feasibility Analysis
• System development lifecycle and methodologies
• Functional, structural and behavioral modeling
• Design framework - human-centered design, design fidelity
• Advance understanding of the role of data for modern decision-making
• Learn ways to ethically collect data and obtain insights from it by applying programming-based solutions
• Understand the differences between different types of analysis and core questions that they answer
• Build skills in (a) hand-on data analytics, and (b) telling stories using data visualisation
• Develop confidence in conducting comprehensive data science projects targeted at obtaining actionable insights for business
• Python (Spyder or Jupyter Notebook)
• Collecting data (including ethical considerations)
• Data preprocessing and cleaning
• Python for statistical inference
• Python for supervised machine-learning
• Model fine-tuning (including boosting techniques)
• Trouble-shooting
• Model interpretation using SHAP
• Variables and descriptive statistics
• Statistical analysis and inference
• Supervised machine-learning
• Boosting
• Linear and Logistic regressions
• KNN, SVM
• Trees, Forests
• Lasso, Ridge
• Cross validation
• You will learn about designing technological solutions and the interaction between technology and people who use them
• Human-centered design framework that focuses on developing a deep understanding of people, technology, and society will be used
• Students will be introduced to the 4 stages of the user interface design cycle as they design mobile information systems during the semester
• Miro
• Figma
• Slack
• Journey Mapping
• Sketching
• Storyboarding
• Wireframing
• Prototyping
• Journey Mapping
• Sketching
• Storyboarding
• Wireframing
• Prototyping
• Human-centered design framework
• User research, user testing and feedback
• Work in a team
• Solve problems (with real clients)
• Tell your story
• Microsoft Power Platform
• Python for ML
• Power BI/Tableau
• RPA
• Blockchain
• Create Issue Trees/ Project Plans
• Tech consulting
• Project/team/client management
• Students will be introduced to key managerial and technical aspects of information security and cybersecurity with a constant focus on frameworks and techniques for effectively detecting, managing and mitigating information security threats
• Various Security Apps
• Nmap
• Register
• Axcrypt
• Ripper
• EncryptionApp
• HashingApp
• Cyber Attack Analysis
• Denial of Service Protection
• Encryption for confidentiality
• Encryption for authentication
• Business Continuity and Disaster Recovery Planning
• Threats to Information Security
• Dealing with attacks
• Cryptography
• Access Controls
• Data Protection