MIT?? - Fundamental of Information Technology (Compulsory) MIT- YEAR – SEMESTER 1 INTRODUCTION This is a course developed to offer in the first Semester of Master of Information Technology (MIT) Program. CREDITS: 0?? LEARNING OUTCOMES After successfully completing this course students will be able to: Describe components, roles and functions of Information Systems in the context of environment rich in Information Technology as well as the process of Information System development and management challenges in practice. OUTLINE OF SYLLABUS Topics/Titles 1. Introduction to Information Systems 2. Context of Information Systems and Technology 3. Hardware and Software Lecturing Hours 2 1 2 4. Organizing Data and Information 2 5. Communications, Networks and Internet 2 6. Business Information Systems 2 7. Systems Investigation and Analysis 2 8. Systems Design, Implementation, Maintenance, and Review 1 9. Security, Privacy, Ethical Issues and National Development 1 TOTAL 15 REQUIRED MATERIALS Main Reading: Ref 1: Stair, R., Reynolds, G. “Principles of Information Systems” 7TH Edition, Thomson Course Technology, 2006. Ref 2: O’Brien, J. “Introduction to Information Systems” 12th Edition, Tata McGraw-Hill Publishing Company Limited, 2005. DETAILED SYLLABUS 1 Introduction to Information Systems Instructional Objectives Students will be able to: Distinguish data from information and describe the characteristics used to evaluate the quality of data. Identify system concepts and describe various types of systems Name the components of an information system and describe several system characteristics. Identify and describe the activities of an Information System. Identify and describe the components of a computer based information system. Identify the basic types of business information systems. Discuss the role of IS in business and the management challenges. Discuss why it is important to study and understand information systems. Sub Topics 1.1 Information concepts 1.1.1 Data vs. Information [Ref 1: pp 5-7] 1.1.2 The characteristics of Valuable Information [Ref 1: pp 7] 1.1.3 The value of Information [Ref 1: pp 7-8] 1.2 System and modeling concepts 1.2.1 What is a System? [Ref 1: pp 8] 1.2.2 System Components and concepts [Ref 1: pp 9] 1.2.3 System Performance and Standards [Ref 1: pp 11] 1.2.4 System Variables and Parameters [Ref 1: pp 11] 1.2.5 Modeling a System [Ref 1: pp 12-14] 1.3 Information System 1.3.1 What is an Information System [Ref 1: pp 15; Ref 2: pp 22] 1.3.2 Main Components of an Information System [Ref 1: pp 15-16] 1.3.3 Manual Information System [Ref 1: pp 16] 1.3.4 Computer based Information Systems [Ref 1: pp 17] 1.3.4.1 Hardware [Ref 1: pp 17-18; Ref 2: pp 26] 1.3.4.2 Software [Ref 1: pp 18; Ref 2: pp 26] 1.3.4.3 Databases [Ref 1: pp 19; Ref 2: pp 26] 1.3.4.4 People [Ref 1: pp 21; Ref 2: 25] 1.3.4.5 Procedures [Ref 1: pp 21]* 1.3.5 Activities of an Information System [Ref 2: pp 27] 1.3.6 Trends in Business Information Systems [Ref 2: pp 10] 1.4 The Role of Information Systems in Business and Managerial Challenges 1.4.1 The Fundamental Role of IS in Business [Ref 2: pp 8] 1.4.1.1 Information Systems in Functional Areas of Business [Ref 2: pp 35] 1.4.1.2 Information Systems in Different industries [Ref 2: pp 36] 1.4.2 Managerial Challenges of IT 1.5 Importance of Learning Information Systems 1.5.1 Introduction [see note/slide] 1.5.2 Computer and Information Systems Literacy [Ref 1: pp 35-36] 1.5.3 Information Systems Careers [Ref 1: pp 71-77] 2 Context of Information Systems and Technology Instructional Objectives Students will be able to: Define key terms with respect to organizational structure, culture and change Identify the value added processes and describe the role of Information Systems within them. Define the term competitive advantage. Sub Topics 2.1 Organizations 2.1.2 Organizational Structure [Ref 1: pp 51-54] 2.1.3 Organizational Culture [Ref 1: pp 54-57] 2.2 Competitive Advantage and Strategic Information 2.2.1 Use of IT to Support Competitive Strategies [Ref 2: 42-44; Ref 1: pp 64-66] 2.3 The Value Chain and Strategic Uses of IT [Ref 2: pp 44-45] 3 Hardware and Software Instructional Objectives Students will be able to: Describe the how to select and organize computer system components (input, processing and output devices) to support information system objectives. Describe the power speed and capacity of CPU and memory. Briefly describe access methods, capacity of secondary storage. Discuss the functionality and importance of input output devices. Identify types of computer systems Identify and briefly describe the functions of the two basic kinds of software. Outline the functions of the operating system and give examples of popular operating systems. Discuss how application software can support business objectives. Identify the basic types of software and discuss the pros and cons of each. Outline the overall characteristics of programming languages and clearly differentiate between low-and higher-level programming languages Sub Topics 3.1 Hardware: Input, Processing Output Devices 3.1.1 Overview of Hardware of a Computer System [Ref 1: pp 92] 3.1.2 Processing 3.1.2.1 CPU [Ref 1: pp 93-98] 3.1.2.1 Memory [Ref 1: pp 98-101] 3.1.3 Secondary Storage 3.1.3.1 Introduction [Ref 1: pp 102-103] 3.1.3.2 Magnetic Tape [Ref 1: pp 103-104] 3.1.3.3 Magnetic Disks [Ref 1: pp 104-105] 3.1.3.4 Optical Disks [Ref 1 : 105-106] 3.1.4 Input Devices [Ref 1: pp 109-118] 3.1.5 Output Devices [Ref 1: pp 118-121] 3.2 Types of Computer Systems 3.2.1 Micro Computer Systems [Ref 2: pp 68] 3.2.1 Network Computers [Ref 2: pp 71] 3.2.2 Information Appliances [Ref 2: pp 71] 3.2.3 Computer Terminals [Ref 2: pp 71] 3.2.2 Midrange Systems [Ref 2: pp 72] 3.2.3 Mainframe Computer Systems [Ref 1: 125; Ref 2: pp 73] 3.2.4 Super Computer Systems [Ref 1: 126; Ref 2: pp 73] 3.3 Systems Software 3.3.1 Overview of Systems Software [Ref 1: pp 143, 145) 3.3.2 Operating Systems (done in CS-mention functions) [Ref 1: pp 145-146] 3.3.2.1 Common Hardware Functions [Ref 1: pp 146] 3.3.2.2 User Interface and Input/Output Management [Ref 1: pp 146-147] 3.3.2.3 Hardware Independence [Ref 1: pp 147] 3.3.2.4 Memory Management [Ref 1: pp 147-148] 3.3.2.5 Processing Tasks [Ref 1: pp 148-149] 3.3.2.6 Network Capability [Ref 1: pp 149] 3.3.2.7 Access to System Resources [Ref 1: pp 149] 3.3.2.8 File Management [Ref 1: 149] 3.3.3 Popular Operating Systems 3.3.3.1 MS PC Operating Systems [Ref 1: pp 150-151] 3.3.3.2 Apple Computer Operating Systems [Ref 1: pp 151-152] 3.3.3.3 Unix [Ref 1: pp 153] 3.3.3.4 Linux [Ref 1: pp 154; Ref 2: pp 120] 3.3.4 Utility programs [Ref 1: pp 156-157] 3.4 Application Software 3.4.1 Overview of Application Software 3.4.2 Types of Application Software [Ref 1: pp 158-160] 3.4.3 Examples of Application Software 3.4.3.1 Personal Application Software [Ref 1: pp 160; Ref 2: pp 106-111] 3.4.3.2 Work Group Application Software [Ref 1: pp 168-169] 3.4.3.3 Enterprise Application Software [Ref 1: pp 169-170] 3.4.3.4 Application Software for Decision Support [Ref 1: pp 171] and Specialised Purpose 3.5. Programming Languages and Software 3.5.1 Overview 3.5.2 The Evolution of Programming Languages 3.5.2.1 First Generation [Ref 1: pp 172; Ref 2: pp 123] 3.5.2.2 Second Generation [Ref 2: pp 123-124; Ref 1: pp 172] 3.5.2.3 Third Generation [Ref 2: pp 124; Ref 1: pp 172-173] 3.4.2.4 Fourth Generation [Ref 1:124; Ref 1: pp 173-174] 3.4.2.5 Languages Beyond Fourth Generation [Ref 1: 173-175] 3.5.3 Selecting a Programming Language [Ref 1: pp 175] 3.5.4 Programming Software [Ref 2: pp 129-130] 3.5.4.1 Language Translators [Ref 2: 130] 3.5.4.2 Programming Tools [Ref 2: 130] 3.6 Software Issues and Trends 3.6.1 Software Bugs [Ref 1: pp 176] 3.6.2 Copyright and Licenses [Ref 1: pp 176-177] 3.6.3 Open Source Software [Ref 1: pp 177] 3.6.4 Software Upgrades [Ref 1: pp 180] 3.6.5 Global Software Support [Ref 1: pp 180] 4 Organizing Data and Information Instructional Objectives Students will be able to: Define general data management terms and identify advantages of the database approach to data management. Name database models and identify the common functions performed by database management systems. Identify and briefly discuss emerging database trends Define the term database administration and outline the responsibilities of a database administrator Sub Topics 4.1 Data Management 4.1.1 The Hierarchy of Data [Ref 1: pp 196] 4.1.2 Data Entities, Attributes, and Keys [Ref 1: pp 197] 4.1.3 The Traditional Approach vs Database Approach 4.1.3.1 The Traditional Approach [Ref 1: pp 199-201; Ref 2: pp 146148] 4.1.3.2 The Database Approach [Ref 1: pp 199-200; Ref 2: pp 148] 4.2 Data Modeling and The Relational Database Approach 4.2.1 Data Modeling [Ref 1: pp 201-202; Ref 2: 160-163] 4.2.2 Overview of Database Models [Ref 2: pp 155-160] 4.2.2.1 Hierarchical 4.2.2.2 Network 4.2.2.3 Relational 4.2.2.4 Object Oriented 4.2.3 The Relational Database Model [Ref 1: pp 202-203] 4.2.3.1 Manipulating Data [Ref 1: pp 203-205] 4.2.3.2 Data Cleanup [Ref 1: pp 205-206] 4.3 Database Management Systems 4.3.1 Overview of Database Types [Ref 1: pp 206-207] 4.3.2 Providing a User View [Ref 1: pp 207] 4.3.3 Creating and Modifying the Database [Ref 1: pp 208-210] 4.3.4 Storing and Retrieving Data [Ref 1: pp 210-211] 4.3.5 Manipulating Data and Generating Reports [Ref 1: pp 211-213] 4.3.6 Database Administration [Ref 1: pp 213-214] 4.3.7 Popular Database Management Systems [Ref 1: pp 214] 4.3.8 Special Purpose Database Systems [Ref 1: pp 215] 4.3.9 Selecting a Database Management System [Ref 1: pp 215-217] 4.3.10 Using Databases with Other Software [Ref 1: pp 217] 4.4 Database Applications 4.4.1 Linking the Company Database to the Internet [Ref 1: pp 217, pp 219] 4.4.2 Data Warehouses, Data Marts and Data Mining [Ref 1: pp 219-224; Ref 2: pp 143-146] 4.4.3 Business Intelligence [Ref 1: pp 224-225] 4.4.4 Distributed Databases [Ref 1: pp 225-226; Ref 2: pp 142-143] 4.4.5 Online Analytical Processing (OLAP) [Ref 1: pp 227; Ref 2: pp 300] 4.4.6 Open Database Connectivity (ODBC) [Ref 1: pp 228] 4.4.7 Object Oriented Database Management Systems (OODBMS) and Object Relational Database Management Systems (ORDBMS) [Ref 1: pp 229; Ref 2: 157] 4.4.8 Visual, Audio and Other Databases [Ref 1: pp 229-230] 5 Fundamentals of Communications and Networks Instructional Objectives Students will be able to: Define the terms communications and telecommunications. Identify and describe the functions and components of a telecommunications model. Identify the benefits associated with a network. Identify type of telecommunications media and discuss the basic characteristics. Identify types of networks and describe the use of these. Identify basic network topologies and briefly describe the features. Discuss the business value of the internet, intranet and extranets Material /Sub Topics 5.1 An Overview of Communication Systems 5.1.1 Communications [Ref 1: pp 243-244] 5.1.2 Telecommunications [Ref 1: pp 244-245] 5.2 Telecommunication Networks 5.2.1 Functions and Components of a Telecommunications Network [see note] 5.2.2 Telecommunication Processors 5.2.2.1 Modem [Ref 1: pp 250-251; Ref 2: pp 194-195] 5.2.2.2 Multiplexer [Ref 1: pp 251; Ref 2: pp 195] 5.2.2.3 Bridge [Ref 1: pp 271] 5.2.2.4 Switch [Ref 1: pp 272] 5.2.2.5 Router [Ref 1: pp 272] 5.2.2.6 Hub [Ref 1: pp 272] 5.2.2.7 Gateway [Ref 1: pp 272] 5.2.3 Telecommunications Media [Ref 2: pp 246-250] 5.2.3.1 Wired Media [Ref 1: pp 246-247] 5.2.3.2 Wireless Media [Ref 1: pp 248-249] 5.2.4 Telecommunications Software (Ref 1: 274-275; Ref 2: pp 196-197) 5.3 Network Basics 5.3.1 Network Types [Ref 1: pp 259-262; Ref 2: pp 185-187] 5.3.1.1 Personal Area Network (PAN) [Ref 1: pp 259] 5.3.1.2 Local Area Network (LAN) [Ref 1: pp 260; Ref 2: pp 185] 5.3.1.3 Wide Area Network (WAN) [Ref 1: pp 261-262; Ref 2: pp 185] [see note/slide] 5.3.2 Network Topologies [Ref 1: pp 262-263] 5.3.2.1 Introduction [see note/slide] 5.3.2.2 Bus 5.3.2.3 Ring 5.3.2.4 Star 5.3.2.5 Network 5.3.2.6 Hybrid 5.3.3 Distributed Processing Alternatives 5.3.3.1 Client Server [Ref 1: pp 263-264; Ref 2: pp 188] 5.3.3.2 File Server [Ref 1: pp 263] 5.3.3.3 Terminal to Host [Ref 1: pp 263] 5.4 Interconnecting Networks 5.4.1 Introduction [Ref 1: pp 265] 5.4.1 OSI (Open System Interconnection) [Ref 1: pp 265; Ref 2: pp 199] 5.4.2 TCP/IP [Ref 1: pp 265; Ref 2: pp 199] 5.5 Trends in Telecommunications and Business Value 5.5.1 Trends in Telecommunications [Ref 2: pp 172-174] 5.5.1 The Business Value of Telecommunication Networks 5.5.1.1 The Internet: Business Value [Ref 2: pp 174-177] 5.5.1.2 The Intranet: Business Value [Ref 2: pp 178-179] 5.5.1.3 The Extranet: Business Value [Ref 2: pp 180-181] 6 Business Information Systems Instructional Objectives Students will be able to: Identify basic alternatives and business objectives common to all transaction processing systems Explain some key control and management issues associated with a TPS. Describe the inputs, processing, and outputs for the transaction processing systems associated with order processing, purchasing and accounting business process Define the term MIS and clearly distinguish the difference between a TPS and a MIS Describe the inputs and outputs associated with different types of MIS Define the stages of decision making List and discuss the important characteristics of DSSs that give the potential to be effective management support tools Identify and describe the basic components of a DSS Discuss the use of GSS and ESS Define the term Artificial Intelligence and identify major application areas List the characteristics and components of expert systems Identify the benefits and limitations associated with the use of expert systems Sub Topics 6.1 Transaction Processing System (TPS) * 6.1.1 Overview of TPS 6.1.2 Types of Transaction methods [Ref1: pp 402-403] 6.1.2.1 Batch Processing 6.1.2.2 Online Processing 6.1.3 Organisational Objectives of a TPS [Ref 1:pp 403-407 6.1.4 Activities in a TPS [Ref 1: pp 407-410] 6.1.5 Control and Management of a TPS [Ref 1:pp 410-412] 6.1.6 TPS Applications [Ref 1: pp 413-434] 6.2 Management Information Systems (MIS) ** 6.2.1 Overview of MIS [Ref 1: pp 458-162] 6.2.2 Characteristics of a MIS [Ref 1: pp 463-464] 6.2.3 MIS in Functional Areas of Business 6.2.3.1 Introduction 6.2.3.2 Financial MIS [Ref 2: pp 465-467] 6.2.3.3 Marketing MIS [Ref 2: pp 472, 474-476] 6.2.3.4 Human Resource MIS [Ref 2: pp 476-479] 6.2.3.5 Manufacturing MIS [Ref 2: 467-472] 6.2.3.6 Other Management Information Systems [Ref 2: 479-480] 6.3 Decision Support Systems (DSS) 6.3.1 Introduction [Ref 1: pp 480-482; Ref 2: pp 301-304] 6.3.2 Capabilities of a DSS [Ref 1: pp 482-484; Ref 2: pp 304-307] 6.3.3 Comparison of MIS and DSS [Ref 1: pp 484] 6.3.4 Features of a Group Support Systems (GSS) [Ref 1: pp 486-491] 6.3.5 Features of a Executive Support Systems (ESS) [Ref 1: pp 491-494; Ref 2: pp 308-309] 6.4 Other Specialized Information Systems 6.4.1 An overview of Artificial Intelligence [Ref 1: pp 509-512; R2: pp 316] 6.4.1.1 Major Application Areas of Artificial Intelligence [Ref 2: pp 316-324; Ref 1: pp 530] 6.4.2 Expert Systems 6.4.2.1 An Overview of a Expert System [Ref 1: pp 521-525; Ref 2: pp 325] 6.4.2.2 Applications of an Expert System [Ref 2: pp 325-326; Ref 1: pp 530] 6.4.2.3 Benefits and Limitations of an Expert System [Ref 2: pp 326328; Ref 1: pp 520-521] 7 Systems Investigation and Analysis Instructional Objectives Students will be able to: Identify the key participants in the systems development process and discuss their roles. Define the term information systems planning and identify several reasons for initiating a systems project. Discuss the key features, advantages, and disadvantages of the traditional, prototyping, rapid application development, and end-user systems development. Identify several factors that influence the success or failure of a systems development project. Identify and describe the tools that can be used to improve system development State the purpose of systems investigation. State the purpose of systems analysis and discuss some of the tools and techniques used in this phase of systems development. 7.1 An Overview of Systems Development 7.1.1 Introduction [see note/slide] 7.1.2 Participants in Systems Development [Ref 1: pp 557] 7.1.3 Initiating Systems Development [Ref 1: pp 559-560] 7.1.4 Information Systems Planning [Ref 1: pp 561] 7.1.4.1 Aligning IS and Corporate Goals [Ref 1: pp 561-563] 7.1.4.2 Developing a Competitive Advantage [Ref 1: pp 564] 7.1.5 Establishing Objectives of Systems Development [Ref 1: pp 564-566] 7.2 Systems Development Life Cycle 7.2.1 The Traditional Systems Development Life Cycle [Ref 1: pp 569-570; Ref 2: pp 342-343] 7.2.2 Prototyping [Ref 1: pp 571-572; Ref 2: pp 343-344] 7.2.3 Rapid Application Development [Ref 1: pp 573; Ref 2: pp 344] 7.2.4 End User System Development [Ref 1: 574; Ref 2: 353] 7.2.5 Outsourcing Systems development Life Cycle [Ref 1: pp 575-576] 7.3 Factors Affecting Systems Development Success 7.3.1 Degree of Change [Ref 1: pp 577-578] 7.3.2 Quality of Project Planning [Ref 1: pp 580] 7.3.2.1 Project Management Tools [Ref 1: pp 582-583] 7.3.3 Organisational Experience with the Systems Development Process [Ref 1: pp 581-582] 7.3.3.1 Capability Maturity Model [Ref 1: pp 581-582] 7.3.4 Use of Computer-Aided Software Engineering(CASE) Tools [Ref 1: pp 584-585] 7.4 Systems Investigation 7.4.1 Initiating Systems Investigation [Ref 1: pp 586; Ref 2: pp 346] 7.4.2 Participants in Systems Investigation [Ref 1: pp 586] 7.4.3 Feasibility Analysis [Ref 1: pp 587-588; Ref 2: pp 346-347] 7.4.4. The Systems Investigation Report [Ref 1: pp 588-589] 7.5 Systems Analysis [Ref 2: pp 348-350] 7.5.1 General Analysis Considerations [Ref 1: pp 589-590] 7.5.2 Participants in Systems Analysis [Ref 1: pp 590] 7.5.3 Data Collection [Ref 1: pp 590-591] 7.5.4 Data Analysis [Ref 1: pp 595-598] 7.5.5 Requirements Analysis [Ref 1: pp 595-598] 7.5.6 The Systems Analysis Report [Ref 1: pp 598-599] 8 Systems Design, Implementation, Maintenance, and Review Instructional Objectives Students will be able to: State the purpose of systems design and discuss the differences between logical and physical systems design. Outline key considerations in interface design and control and system security control. Define the term RFP and discuss how this document is used to drive the acquisition of hardware and software. Describe the techniques used to make systems selection evaluations. List the advantages and disadvantages of purchasing versus developing software. State the purpose of systems implementation and discuss the various activities associated with this phase of systems development. State the importance of systems and software maintenance. Describe the system review process. Describe the importance of managing organizational change. Sub Topics 8.1 System Design 8.1.1 Introduction [see note/slide] 8.1.2 Logical and Physical Design 8.1.2.1 Logical Design [Ref 1: pp 613-616] 8.1.2.2 Physical Design [Ref 1: pp 616-617] 8.1.3 Special Systems Design Considerations 8.1.3.1 Interface Design and Controls [Ref 1: pp 619-620] 8.1.3.2 Design of System Security and Controls [Ref 1: pp 621-626] 8.1.4 Generating Systems Design Alternatives [Ref 1: pp 626-628] 8.1.5 Evaluating and Selecting a System Design 8.1.5.1 Evaluation Techniques [Ref 1: pp 629] 8.1.6 The Contract [Ref 1: pp 631] 8.1.7 The Design Report [Ref 1: pp 631] 8.2 Systems Implementation [Ref 2: pp 356-364] 8.2.1 Introduction [see note/slide] 8.2.2 Hardware Acquisition [Ref 1: pp 632-634] 8.2.3 Software Acquisition [Ref 1: pp 634-636] 8.2.4 User Preparation [Ref 1: pp 641] 8.2.5 Hiring and Training of IS Personnel [Ref 1: pp 642] 8.2.6 Site Preparation [Ref 1: pp 642] 8.2.7 Data Preparation [Ref 1: pp 642] 8.2.8 Installation [Ref 1: pp 643] 8.2.9 Testing [Ref 1: pp 643] 8.2.10 Start-Up [Ref 1: pp 644-645] 8.2.11 User Acceptance [Ref 1: pp 645] 8.3 Systems Maintenance [Ref 2: pp 365] 8.3.1 Introduction [Ref 1: pp 645-646] 8.3.2 Reasons for maintenance [Ref 1: pp 646] 8.3.3 Types of Maintenance [Ref 1: pp 648] 8.3.4 The Financial Implications of Maintenance [Ref 1: pp 649-650] 8.3.5 The Relationship between Maintenance and Design [Ref 1: 650] 8.4 Systems Review 8.4.1 Introduction [see note/slide] 8.4.2 Review Procedures [Ref 1: pp 651] 8.4.3 Factors to Consider During Systems Review [Ref 1: pp 651-652] 8.5 Managing Organisational Change [see note/slide] 8.5.1 Involving End Users [Ref 2: pp 366-368] 8.5.2 Change Management [Ref 2: pp 368-369] 9 Security, Privacy, Ethical Issues and National Development Instructional Objectives Students will be able to: Describe some examples of waste and mistakes in an IS environment, their causes, and possible solutions. Explain the types and effects of computer crime, along with measures for prevention. Identify several important ethical issues associated with the use of computers on the work environment Outline the criteria for the ethical use of information systems Identify several types of security management strategies and defenses and explain how they can be used to ensure the security of business applications of IT. Discuss the importance of IT in national development Sub Topics 9.1 Computer Related Waste and Mistakes 9.1.1 Computer Related Wastes [Ref 1: pp 673] 9.1.2 Computer-Related Mistakes [Ref 1: pp 673, pp 675] 9.1.3 How to Prevent Computer-Related Waste and Mistakes [Ref 1: pp 675- 678] 9.2 Computer Crime & Prevention 9.2.1 Computer Crime [Ref 1: pp 680-690] 9.2.2 Prevention of Computer-Related Crime [Ref 1: pp 691-698] 9.3 Privacy Issues [see note/slide] 9.3.1 Overview of Privacy Issues [Ref 1: pp 678-703] 9.3.2 Privacy Laws and Regulations [Ref 1: pp 704] 9.3.3 Corporate Privacy Policies [Ref 1: 708] 9.4 Ethical Foundations in Business and IT 9.4.1 Overview of Ethical Dimensions [see note/slide] 9.4.2 Business Ethics [Ref 2: pp 380-381] 9.4.3 Technology Ethics [Ref 2: pp 382] 9.4.4 Guidelines of Ethics [Ref 2: pp 382-383] 9.4.5 Other Ethical Issues Associated with the Use of Computers 9.4.5.1 Employment Challenges [Ref 2: pp 393-394] 9.4.5.2 Computer Monitoring [Ref 2: pp 394-395] 9.4.5.3 Impact on Working Conditions [Ref 2: pp 395] 9.4.5.4 Effects on Individuality [Ref 2: pp 395] 9.4.5.5 Health Issues Related to Work Environment [Ref 2: pp 395396; Ref 1: pp 706-708] 9.5 Security Management 9.5.1 Importance of Security Management [see note/slide] 9.5.2 Internetworked Security Defenses [Ref 2: pp 400-406]* 9.5.3 Other Security Management Tools and Policies [Ref 2: pp 407410] 9.5.4 Security Controls and Audits 9.5.4.1 Security Controls [Ref 2: pp 410-411] 9.5.4.2 Security Audits [Ref 2: pp 411-412] [* some will be discussed under 9.2.2] 9.6 Role of IT on National Development [see note/slide] 9.6.1 Statutory bodies and societies 9.6.2 National policies in IT 9.6.3 e-Governance and IT based services