MBAA 609: Management Information Systems, Spring 2006

MBAA 609: Management Information Systems, Spring 2006
(Tues, 7:15 – 10:00 pm)
Instructor: Robbie T. Nakatsu
Office: Hilton 221
E-mail: rnakatsu@lmu.edu or robbienaka@yahoo.com
Phone: (310) 338-3746
Office Hours: To be announced
Web Site: myweb.lmu.edu/rnakatsu/mbaa609
Description
For any organization to be successfully managed, it is necessary to provide management with
valid information about the organization’s products and services, its resources, and its
environment. Most organizations now recognize that information technology is one of their most
valuable resources and that computers and telecommunications technology are among their most
powerful tools to assist in managing this information. Today, information technology (IT) is the
backbone of commerce, linking a company to its remote supply chains, and tying businesses to
the customers they serve. Indeed, spending on IT accounts for nearly 60 percent of all business
equipment investment in companies today.
This course is designed to introduce you to key IT concepts and to enhance your understanding
of the issues that business executives face when developing and managing information systems.
By completing the course, you will be better equipped to make IT-related decisions, to
participate in IT projects, and to knowledgeably communicate with IT experts.
We will examine the fundamental principles associated with IT development and management,
and the increasing impact of information technology in business organizations. The field is in a
state of flux, so we will also examine emerging technologies and IT trends. The course will
employ lectures, readings, class discussions, software demonstrations, and computer assignments
to address the following objectives:
Objectives
1. To understand the core technologies (e.g., databases, the Internet) that affect the
operation and management of business.
2. To introduce you to how information systems are developed and managed in business
organizations.
3. To prepare you to become better problem-solvers and critical users of information
technology.
4. To keep you abreast of some of the emerging trends in the field.
5. To understand how organizations use IT to become more competitive in the marketplace.
Page 1
Contents
The course will provide an introduction to the following topics:








Organizational uses of information technology
Databases
The Internet and Electronic Business
Strategic and competitive uses of IT
Decision Support Systems
Supporting organizational decision-making with IT
Managing security threats
Emerging technologies and IT Trends
Course Materials
There is no required textbook for this course. You are, however, required to purchase a package
of reading materials from the LMU bookstore. The package includes selected chapters from
books, Harvard Business Review articles and cases, and other materials.
You are also strongly encouraged to purchase a USB flash drive for classroom use and
submission of assignments. The PCs in the classroom do not contain a 3 ½” floppy drive, so
you must either save classroom work on a USB flash drive, or email the file to yourself.
In addition to the reading materials, I will provide lecture notes, usually in the form of
powerpoint slides. These slides will be made available on the web. Please check the course web
site regularly to obtain these materials. You are responsible for obtaining lecture handouts on
your own, if you wish to have a hardcopy to take notes on during class. Alternatively, you can
download a copy of the powerpoint file and type your notes directly in the file.
Occasionally, I may also put articles and other supplementary material on the course web site. I
will let you know about these as the need arises.
You are also strongly encouraged to seek out additional sources of information to keep abreast of
current trends in information technology. The news media (e.g., the Wall Street Journal, the
New York Times, the LA Times, PC Magazine, Business Week) and the Web (e.g., cnet.com,
zdnet.com) are excellent sources for the most current and up-to-date information.
Page 2
Course Requirements
1. Computer Assignments
You will be required to complete three computer assignments on your own:
1. RF Walrus Case (Database Application)
2. Datius Case (Decision Support System)
3. Maxi’s Grocery Mart (Sensitivity Analysis and Macros)
The three assignments are to be submitted individually—you are allowed to collaborate with
your classmates, but you may not copy another classmates’ assignment. I will be conducting
hands-on tutorials in class that will help you to complete the assignment. In addition, I will
provide class handouts to accompany the tutorials.
You will be using Microsoft Office software to complete the assignments. Any version later
than and including Office 2000 should work fine for purposes of the assignments. If you are
having problems with your version of the software, please see me as soon as possible.
Please begin the computer assignments as soon as possible to allow for possible problems that
may arise. The assignments are non-trivial and you may need extra time to work out any
technical glitches and problems that arise. Late submissions are strongly discouraged, and you
will be marked one letter grade lower for each late day, if you submit after the due date. Please
note that all assignments are due at the beginning of the class. If you arrive late for class on the
date the assignment is due, you will be penalized one late day.
2. Group Project
Students will be required to organize themselves into groups of about four. Each project team
will be expected to analyze either 1) an emerging technology or technology trend or 2) a
controversial IT “hot” topic. I am particularly interested in a topical issue that has generated
controversy and heated discussion. You will be required to present the arguments (both pros and
cons) and your final recommendation to companies. I will provide more details in a separate
handout later on in the semester.
Suggestions for topics include the following IT trends / controversies:
1. Offshore outsourcing of IT services.
2. Ethical issues associated with RFID (radio frequency ID tags) and other monitoring systems.
3. Does IT matter? (see article Nicholas G. Carr, “IT Doesn’t Matter,” Harvard Business
Review, May 2003, 41-29.)
4. Downloading music/video files on the Internet, and copyright infringement issues.
Alternatively, you may analyze a new and emerging technology such as:
Page 3
1.
2.
3.
4.
5.
Voice over IP
New and Emerging Wireless Technologies (e.g., WiMax and 3G)
Nanotechnology
Web 2.0 (the second-generation Web)
New software development techniques and technologies (e.g., AJAX)
You may come up with you own topic, subject to my approval.
Project Status Report
A single-spaced, one-page project status report will be due, at the beginning of class on April 4
(subject to change). In this report, you will be required to have a plan for completing the group
project. In particular, you are to provide a list of references you plan to investigate further
(Internet web sites, magazine articles, books, etc.) as well as how you intend to divide the work
among the group members. You may want to include dates and milestones so that your group is
kept on track.
Project Oral Presentation
Each project team will be required to present the results of its investigation to the rest of the class
during weeks 14 and 15 of the semester (see course outline below). The oral presentation will
be about 30-35 minutes long, including time for questions and comments.
3. Examinations
Examinations will be held—both a midterm and final—to test your understanding of the material
covered in this course. Both examinations are closed-book and no materials are allowed. You
are responsible for all reading material assigned, as well as all lecture material covered in class.
The examinations will be a combination of multiple-choice questions, and short answer
questions. I will provide more details about the examinations before they are to take place.
4. Class Participation and Professionalism
Regular class attendance and participation in discussions is expected from each of you, and will
be a determining factor in your final course grade. At a minimum, you are expected to attend
class. To promote deeper discussion of the reading assignments, I will (on occasion) require that
you answer a set of questions on the assigned reading. Failure to turn in a set of answers will
negatively impact your class participation grade.
Other factors that could negatively impact your class participation grade include regularly
showing up late for class, surfing the web during class lecture time ,and turning in your
assignments late without advanced warning. If you are having problems keeping up with the
class assignments, please see me as soon as possible, NOT the night before the assignment is
due.
Page 4
Grading
Grading will be based on three homework assignments, a group presentation, a midterm, a final
exam, and class participation. The breakdown for the grading is provided below:
Assignments
Assignment 1: Database
11%
Assignment 2: DSS
9%
Assignment 3: Sensitivity Analysis 9%
Midterm Exam
22%
Group Presentation
13%
Final Exam
26%
Class Participation
10%
Total
100%
Last day to withdraw or apply for credit / no-credit grading: March 17, 2006
Academic Honesty and Integrity
You are expected to work on the assignments and take the examinations individually and
independently. (You may consult with other students on the assignments, but I expect each of
you to turn in your own assignments). Plagiarism and cheating on examinations will not be
tolerated. Students who commit any act of cheating or dishonesty will receive an automatic F on
the assignment/exam on which they cheated. If the offense is serious enough, the student may
fail the course outright without the possibility of withdrawal.
Please Note: The computer assignments are modified from semester to semester, so that you
cannot copy another classmate’s assignment from another semester. The penalty is severe if I
catch any act of copying. (It is very easy to copy another student’s file, but please do not do
this!)
Page 5
MBAA 609 Course Outline
Jan - Apr 2006
Week #
Date
Topic
1
Tue
Jan 10
Introduction to Course &
Management Information Systems
Foundations of IS in Organizations
2
Tue
Jan 17
Databases, P. I
Reading: Hoffer, J.A., Prescott, M.B., and McFadden, F. R. (2005). Modern Database
Management, 7th Edition, Saddle River, NJ: Pearson Prentice Hall. Chapter 1, The Database
Environment, pp. 3-30.
Lab: Developing Databases Using Access, P. I
3
Tue
Jan 24
Databases, P. II
4
Tue
Jan 31
Systems Development, P. I
Lab: Developing Databases Using Access, P. II
Reading: Laudon, K.C. and Laudon, J.P. (2004). Managing Information Systems: Managing
the Digital Firm, 8th Edition, Saddle River, NJ: Pearson Prentice-Hall. Chapter 12,
Redesigning the Organization with Information Systems, pp. 376-407.
Lab: Developing Databases Using Access, Conclusions
5
Tue
Feb 7
Systems Development, P. II
6
Tue
Feb 14
The Internet and E-Business , P. I
Reading: Rigby, D.K. and Ledingham, D. (2004). “CRM Done Right,” Harvard Business
Review, November 2004, pp. 118-129.
Reading: Afuah, A. and Tucci, C.L. (2002). Internet Business Models and Strategies,
McGraw-Hill. Chapter 3, Competitive Landscape-Changing Properties of the Internet, pp. 3246.
Lab: Decision Support Systems using Excel
7
Tue
Feb 21
8
Tue
Feb 28
Mar 6 –
Mar 10
Midterm Examination
The Internet and E-Business, P. II
Reading: Magretta, J. (2002). “Why Business Models Matter,” Harvard Business Review,
May 2002, pp. 86-92.
Lab: Organizational Uses of Spreadsheets
UNIVERSITY HOLIDAY:
Spring Break
Page 6
9
Tue
Mar 14
Strategic I.S.
10
Tue
Mar 21
Strategic I.S.
Reading: Porter, M.E. (2001). “Strategy and the Internet,” Harvard Business Review, March
2001, pp. 63-78
Reading: Tapscott, D, (2001) "Rethinking Strategy in a Networked World (or Why Michael
Porter is Wrong about the Internet)," Strategy+Business, Third Quarter, Issue 24.
Lab: Sensitivity Analysis and Macros
11
Tue
Mar 28
12
Tue
Apr 4
Supporting Organizational Decision-Making with IT
Reading: Mallach, E.G. (2000). Decision Support Systems and Data Warehouse Systems,
Irwin McGraw-Hill, Chapter 10, Group Decision Support Systems, pp. 384-414.
Managing Security Threats
Reading: Austin, R.D. and Darby, C.A.R. (2003). “The Myth of Secure Computing,” Harvard
Business Review
Austin, R.D. (2003). “The iPremier Company (A): Denial of Service Attack,” Harvard
Business School Case Study.
13
Tue
Apr 11
New and Emerging Technologies
14
Tue
Apr 18
15
Tue
Apr 25
Group Project Presentations:
Groups 1, 2, and 3
Reading: Werbach, K. (2005). “Using VoIP to Compete,” Harvard Business Review,
September 2005, pp. 1-8.
Group Project Presentations:
Groups 4, 5, and 6
Course Wrap-Up
Note: The course outline is tentative and subject to change by the instructor during the semester
based on the progress of the class.
Page 7