Spring 2011 - Temple Fox MIS

advertisement
MIS 2901 – Honors Information Systems in Organizations
Spring 2011
Instructor
Class Location
Prerequisite
Paul Weinberg
Office: Speakman 209J
Phone: (215) 204-9563
Fax: (215) 204-3101
http://community.mis.temple.ed
u/pweinberg/
TBA
weinberg@temple.edu
Office Hours:
To be posted on Blackboard
M W F 1:00 – 1:50
Basic Computer Literacy (see www.fox.temple.edu/foxclt ).
Course Objectives
The primary objectives are:
 Explain the role of technology as a business enabler
 Identify and explain applications in a business setting
 Assess business applications
 Interpret the interaction between technology, customers, processes, data, infrastructure,
participants, and environment an organization.
 Understand the complexity and challenges involved in integrating the functional areas of a
business
 Understand how organizations are using new technology to innovate and create new businesses
and revenue streams, and how technology entrepreneurship enables organizational change
The secondary objectives are:
 Discriminate and synthesize between different sources of information as part of
application acquisition or development
 List ethical and intellectual property challenges that arise from the use of technology
 Explain the evolving role of MIS in the organization, the MIS professional, and careers in
MIS
Class Preparation
Topics for each week’s class are listed in the following schedule. Materials for each week are
also listed. The materials may include:
 Slides posted on Blackboard
 One or more book chapters
 Articles
 Business cases
The materials should be read before class and you should be ready to discuss them in class.
Specific discussion questions related to cases and articles may be posted in the course blog in
advance of classes. You should be ready to respond to these questions in class. I encourage you
MIS2901
Syllabus
Page 2
to discuss the questions in advance with other members of the class. You can use the course
blog for this purpose.
I may only cover the key points of the materials in the slides during class. But you are still
responsible for all of the information in the slides.
Class Blog at http://community.mis.temple.edu
This course does not use Blackboard. Class materials (notes, presentations, projects) are located
on the MIS Community Site. The URL for the course is
http://community.mis.temple.edu/mis2901sec001s11/ This site also contains staff contact
information. You are responsible for checking the site daily for updates and announcements.
The Community Site is structured like a blog-based social networking site. A word of caution:
Be careful posting materials on the MIS Community Site! For more information, read the
section of the syllabus titled “Plagiarism and Academic Dishonesty.”
Course announcements will appear on the Community Site as blog posts. You should check the
announcements area several times a week. Select the announcements category to view the
announcements. To avoid missing announcements, I recommend that you subscribe to the
announcements using a Really Simply Syndication (RSS) feed. Click the RSS icon
next to
the announcements category in the Community Site course blog to subscribe. The
announcements can be automatically sent to your MyYahoo or Google homepages, a folder in
Microsoft Outlook, a mobile device, and other RSS readers. (The choice is especially easy to
make if you are using the Firefox browser.)
Textbooks and Supplies
Required
Textbook

MIS 2901 Spring 2010
Leonard Jessup and Joseph Valacich. Information Systems Today:
Managing in the Digital World, 3rd Edition, Prentice Hall, 2008.
ISBN:0132335069
The full edition of the Jessup/Valacich book can be used.
However, there is a custom edition of the book which only contains
the sections we use in this course. This edition is available at the
Temple Bookstore and is significantly less expensive than the full
edition. You should also be able to obtain the book through online
used book marketplaces.
Paul Weinberg
MIS2901
Temple
Library
Resources
(Helpful but
not required)
Required
Cases
Syllabus
Page 3

You can access Gartner Group reports on Technology Topics at
http://www.temple.edu/gartner. You will have to set your browser to
use the Temple Proxy Server (gate.temple.edu --- port 8080). Use your
Temple email account and password to login.
 You can also download articles from many business periodicals and
newspapers. Go to http://library.temple.edu Select (on the left) Find
Articles/All DataBases A-Z. Select Business Source Premier and search
for a topic (for example “nanotechnology”).
Available through Harvard Business School (HBS) publishing:




HBS Case 908M17 The Globalization of Wyeth
HBS Case 9-301-099: CISCO ERP and Web-enabled IT
HBS Case 9-508-110 Radiohead: Music at Your Own Price
Stanford Case SM-176: Google’s Android --- Will it Shakeup the Wireless
Industry in 2009 and Beyond?
Available through Ivey Publishing (University of Western Ontario)
 Ivey Case 9B05E002:
A Hacker Attack: An E-Commerce Nightmare -- Part A
Articles
Available on the Internet or through library.temple.edu.








MIS 2901 Spring 2010
Nagai, E.W.T, et al. Development of an RFID-based Sushi Management
System (2008) Elsevier
http://www.sciencedirect.com.libproxy.temple.edu/science?_ob=MImg&_imageke
y=B6VF8-4P06CD5-1H&_cdi=6004&_user=1543922&_pii=S0925527307002010&_origin=search&_co
verDate=04%2F30%2F2008&_sk=998879997&view=c&wchp=dGLbVlzzSkzS&md5=b07694b39d10152599d3c8ef675c0e25&ie=/sdarticle.pdf
Wilson, Scott and Kambil, Ajit --- Open Source: Salvation or Suicide? (April
2008)
http://web.ebscohost.com.libproxy.temple.edu/ehost/pdfviewer/pdfviewer?hid=22
&sid=2c992792-1267-4f30-b89b-6a4d414107db%40sessionmgr13&vid=4
Machavarapu, Sai: Prioritizing IT Projects Based on Business Strategy.
CIO.
http://www.cio.com/article/print/22976
Obrien, M The Future of Web Applications – Seven Things a Company Must
Do to Succeed, Mashable.com
http://mashable.com/2009/01/15/the-future-of-web-apps/
Duplessie, S. (July 30, 2007). Opinion: What Web 2.0 is (and isn't).
ComputerWorld.
http://www.computerworld.com/s/article/print/9028358/Opinion_What_Web_2.0_
is_and_isn_t_?taxonomyName=Data+Center&taxonomyId=154
Wikipedia: Cloud Computing
http://en.wikipedia.org/wiki/Cloud_computing
King, R. (August 4, 2008). How Cloud Computing is Changing the World.
Business Week
http://www.businessweek.com/technology/content/aug2008/tc2008082_445669.ht
m
Chesbrough, H. Why Companies Should Have Open Business Models, Sloan
Management Review
http://proquest.umi.com.libproxy.temple.edu/pqdlink?Ver=1&Exp=01-072016&FMT=7&DID=1193235251&RQT=309&cfc=1
Paul Weinberg
MIS2901
Syllabus









Page 4
Chartier, David, et al. Steve Jobs Takes on Android (Jan 2011), MacWorld
http://web.ebscohost.com.libproxy.temple.edu/ehost/detail?hid=12&sid=47e0b3a7
-191f-4b25-88aa3c85d2c2186b%40sessionmgr13&vid=5&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZz
Y29wZT1zaXRl#db=buh&AN=55495401
Mulcahy, R. (March 6, 2007). Business Intelligence Definitions and Solutions.
CIO.
http://www.cio.com/article/print/40296
Levinson, M. (May 15, 2007). The Brain Behind the Big, Bad Burger and
Other Tales of Business Intelligence. CIO.
http://www.cio.com/article/print/109454
Madden, M. (July 16, 2008). Barack Obama’s Super Marketing Machine. Salon.
http://www.salon.com/news/feature/2008/07/16/obama_data
Davenport, T, and Haris, J. (May, 2007). The Dark Side of Customer
Analytics. Harvard Business Review
http://web.ebscohost.com.libproxy.temple.edu/ehost/pdfviewer/pdfviewer?hid=15
&sid=5832553b-a656-47af-ae1d-5e6247f449ce%40sessionmgr12&vid=12
Wikipedia: Social Network Service
http://en.wikipedia.org/wiki/Social_network_service
Wikipedia: Facebook
http://en.wikipedia.org/wiki/Facebook
Coutou, Dianne, et al (June 2007). We Googled You, Harvard Business
Review
http://web.ebscohost.com.libproxy.temple.edu/ehost/pdfviewer/pdfviewer?hid=15
&sid=5832553b-a656-47af-ae1d-5e6247f449ce%40sessionmgr12&vid=11
Raman, A. (Dec 2009). Enterprise 2.0: How a Connected Workforce
Innovates
http://web.ebscohost.com.libproxy.temple.edu/ehost/pdfviewer/pdfviewer?hid=12
&sid=47e0b3a7-191f-4b25-88aa-3c85d2c2186b%40sessionmgr13&vid=4
You should purchase the cases online from Harvard Business School (HBS) Publishing and Ivey
Business School Publishing.


To purchase the HBS cases, go to http://cb.hbsp.harvard.edu/cb/access/8008835 You will need to
register in order to purchase the cases. Once you purchase the case through this site, you can
immediately download an electronic copy. If you lose your copy, you can download additional copies
from Harvard Publishing until the end of the semester (May, 2011).
To purchase the Hacker Attack case, go to http://cases.ivey.uwo.ca/cases/pages/home.aspx. You do
not have to register at Ivey’s site (just checkout as a “guest”). Search for product number 9B05E002.
You’ll see both parts of the case but you only need to purchase part A. Add it to your cart.
The articles are all available for free downloads from a web site or from library.temple.edu. Click on
the link next to the article title. You will need to use your Temple email account and password to obtain
the articles from library.temple.edu.
MIS 2901 Spring 2010
Paul Weinberg
MIS2901
Syllabus
Page 5
Chapter Numbers and the Custom Text
As described above in the section that lists the required textbook for this course, while the full edition of
the Jessup/Valacich book can be used, it is expensive. The custom text prepared for this course is
significantly less expensive. The chapters provided in the custom text are the same as the equivalent
chapters in the full text. However the custom text does not have chapter numbers, and page numbers
are different.
Please use the following table to map chapter numbers in the full text to the chapter titles in the custom
text:
Chapter Number
1
2
3
4
5
7
8
9
10
Chapter Title
Managing in the Digital World
Fueling Globalization through Information Systems
Valuing Information Systems Investments
Managing the Information Systems Infrastructure
Enabling Commerce Using the Internet
Enhancing Business Intelligence Using Information Systems
Building Organizational Partnerships Using Enterprise Information Systems
Developing Information Systems
Managing Information Systems Ethics and Crime
Evaluation
Item
Midterm Exam
Final Exam
Class Activities
 Participation in class
discussions 5%
 Group Technology
Entrepreneurship
Presentation 10%
Business Applications
Project
ERP Project
Identity Management
(ePortfolio/Ad-Words/
Google Analytics) Project
Percentage
25%
30%
15%
Scale
94 – 100
90 – 93
87 – 89
83 – 86
80 – 82
77 – 79
A
AB+
B
BC+
73 – 76
70 – 72
67 – 69
63 – 66
60 – 62
Below 60
C
CD+
D
DF
10%
10%
10%


Term grades are not rounded. For example, an 89.9 average is a B+.
The presentation, business applications project, ePortfolio/Ad-Words and Data Analytics
projects receive letter grades. The letter grades are converted to the middle of the range. So,
for example, a B+ grade will be converted to an 88.
 The ERP project is graded pass/fail. Pass = 100, Fail = 0.
MIS 2901 Spring 2010
Paul Weinberg
MIS2901
Syllabus
Page 6
Project Assignments
There are 3 project assignments which should be completed individually.

The Business Applications Project involves using several online services and illustrates
uses of information systems in business.

This Identity Management Project will have several phases to it, where you will create an
‘e-portfolio’ for yourself, using WordPress and the Temple MIS Community site to
create a professional resume and portfolio of yourself, and make it available to internet
users. You will then learn how to use Google AdWords to advertise your e-portfolio to
the world, and then follow up by using Google Analytics to measure and analyze the data
and traffic your e-portfolio ad generates.

The Enterprise Resource Planning (ERP) project involves the use of the SAP system.
The project is designed to give you the opportunity to become familiar with the use of an
ERP in organizations. you will be required to complete typical business functions in the
areas of Sales Orders Processes and and Human Resources. SAP is the world leader in
ERP, and this project will help demonstrate both the value and difficulty in integrating
business functions, using a real world SAP system.
Projects should be submitted as Word documents sent to the instructor as email
attachments. Be sure to retain a copy of the email in the sent items folder on your
computer. This is your proof of on-time submission.
Group Presentation
During the first class, the class will be organized into groups. The groups will be responsible for
presenting the information in the Technology Entrepreneurship articles listed in the schedule.
The presentations will take place during Week 12. (See the syllabus below.) Allow 20 minutes
for your group’s presentation. You will need to prepare in advance. The presentations will be
group graded. The presentations should:




Explain the concepts discussed in the article.
What are the issues and key ideas in the article
Discuss management implications --- What can be learned from a management
perspective
If appropriate --- What do you think will happen as a result of the situation discussed in
the article?
MIS 2901 Spring 2010
Paul Weinberg
MIS2901
Syllabus
Page 7
Late Assignment Policy
The project is considered late if it is turned in after the beginning of class. The project will be
assessed a 10% penalty each day it is late. No credit will be given if the project is submitted
more than one week past the due date. However, you must turn it in – if you decide to skip it,
you’ll receive no credit for the project itself, and in addition your overall course grade will be
reduced by 5%. Late projects will not be accepted after the last day of class.
Equipment and network failures are not acceptable reasons for turning the project in late.
During the semester, computers will fail and printers will be out of service. You should always
make a backup of your files (if it’s really important, make two backups).
Be sure you submit the right material for the project. Projects submitted with missing files will
not receive credit and will be treated as if they were not submitted. Changes will not be
accepted after the project is submitted. Late projects will not be accepted after the last regular
class meeting.
Attendance Policy
Because I plan for class discussion to be an integral part of the course, I expect full attendance by
every member of the class. I also expect you to arrive on time to class. Attendance is one of the
factors I may consider in computing your final grade.
Exams
There will be two exams scheduled during the semester, a midterm and a final. Missed exams
cannot be made up, regardless of the reason for absence. Exams are multiple choice, and will be
machine graded.
The two exams cover topics from the class lectures and presentations, reading assignments, and
class discussions. The exams are closed book.
Classroom Etiquette
Your behavior in class directly impacts the value you and your fellow students gain from the
course. To that end, the following are rules of conduct in this class:





Do not arrive late or leave early.
Do not leave in the middle of the class.
Turn off all cell phones, pagers, PDAs, Wii consoles, and Playstations while you are in class.
You can use a laptop computer as long as it is related to the class (taking notes). Do not use
your computer to check you email, browse the Internet, or send instant messages during the
class.
Do not engage in side discussions while others are speaking.
MIS 2901 Spring 2010
Paul Weinberg
MIS2901
Syllabus
Page 8
Plagiarism and Academic Dishonesty
Plagiarism and academic dishonesty can take many forms. The most obvious is copying from
another student’s exam, but the following are also forms of this:





Copying material directly, word-for-word, from a source (including the Internet)
Using material from a source without a proper citation
Turning in an assignment from a previous semester as if it were your own
Having someone else complete your homework or project and submitting it as if it were your
own
Using material from another student’s assignment in your own assignment
If you use text, figures, and data in reports that were created by someone other than yourself, you
must identify the source and clearly differentiate your work from the material that you are
referencing. There are many different acceptable formats that you can use to cite the work of
others (see some of the resources below). You must clearly show the reader what is your work
and what is a reference to somebody else’s work.
Plagiarism and cheating are serious offenses. Penalties for such actions are given at my
discretion, and can range from a failing grade for the individual assignment, to a failing grade for
the entire course, to expulsion from the program.
For more information, refer to the Temple University student code of conduct, available at
http://www.temple.edu/assistance/udc/coc.htm.
MIS 2901 Spring 2010
Paul Weinberg
MIS2901
Syllabus
Page 9
Schedule (Keep in mind that all dates are tentative)
Topics
Jan Course Introduction
19 Managing in a Digital World
Reading/Preparation
Week 1
Assignments
Jessup: Chapter 1
Careers in IS
Form project groups
Week 2
Jan
25
Globalization and IS
The World is Flat discussion
Globalization of Wyeth discussion
Jessup: Chapter 2


View The World is Flat
video
The video can be found at
http://mitworld.mit.edu/vi
deo/266/
Read and be ready to
discuss HBS Case 908M17
The Globalization of
Wyeth
Week 3
Feb
2
Electronic Commerce
Discuss the ePortfolio assignment
Jessup: Chapter 5
Feb
9
Internal Information Systems
Jessup: Chapter 7
Week 4
MIS 2901 Spring 2010
Business Applications
Project due Feb 11.
Project instructions are
located in the assignments
area of the class blog.
Submit as a Word document
attached to an email. Be
sure to include your name,
course number, and project
title on the subject line of
the email.
Paul Weinberg
MIS2901
Syllabus
Page 10
Week 5
Feb
16
Internal Information Systems
(continued)
CISCO case discussion
Jessup: Chapter 7
Read and be ready to discuss
HBS Case 9-301-099: CISCO
ERP and Web-enabled IT
Feb
23
Mapping Business Processes
and IT Management
Jessup: Chapter 9
Read and be ready to discuss
 Nagai et al. Development
of an RFID-based Sushi
Management System
 Wilson and Kambil: Open
Source: Salvation or
Suicide
Week 6
Discuss the Sushi project – Is it
justifiable? What are the
management issues?
Discuss the Open Source Paper
Identity Management:
ePortfolio due Feb 28.
(Post following directions
in the assignment)
Discuss Google Ad-Words
Week 7
Mar Introduction to Enterprise
2
Systems
Midterm Review
Jessup: Chapter 8
Read and be ready to discuss
HBS Case 9-508-110
Radiohead: Music at Your
Own Price
Spring Break – No class March 7, 9, and 11
Week 8
Mar MIDTERM EXAM Mar 16
16 (CLOSED BOOK. Covers
weeks 1-7)
Sales/Purchasing
Mar Production and Supply Chain
23 Management
Discuss the Excel sales and
purchasing spreadsheet
Jessup: Chapter 8
Week 9
Review Posted Excel
Spreadsheet
Week 10
Mar Accounting
30
MIS 2901 Spring 2010
Enterprise Resource
Planning (ERP) Project
Due April 4
Submit as a Word
document attached to an
email. Be sure to include
your name, course, and
project title on the subject
line of the email
Paul Weinberg
MIS2901
Apr
6
Valuing Information Systems
Ethics, Security and Crime
Discuss the Hacker Attack case
MIS 2901 Spring 2010
Syllabus
Week 11
Jessup Chapter 3
Read and be ready to discuss
Machavarpu, Sai: Prioritizing
IT projects based on Business
Strategy
Page 11
Identity Management:
Google Ad-Words listing
due Apr 6. (Post following
directions in the
assignment)
Jessup Chapter 10
Read and be ready to discuss
Ivey Case 9B05E002: A
Hacker Attack
Paul Weinberg
MIS2901
Apr
13
Technology Entrepreneurship
Discussion of Technology-Based
Innovation
Group Presentation and
Discussions
Discussion – What makes a good
mobile application?
Apr
20
Business Intelligence/Data
analytics
Discussion of Assigned Articles
Apr
27
Social Networking and
Management of Your Online
Presence
Discussion of Assigned Articles
Final Exam Review
Syllabus
Week 12
Read and be ready to discuss
1. Obrien: The future of Web
Applications
2. Duplessie et al: What
Web 2.0 is and isn’t
3. Wikipedia: Cloud
Computng
4. King: How Cloud
Computing is Changing
the World
5. Chesbrough: Why
Companies Should have
Open Business Models
6. Chartier et al: Steve Jobs
Takes on Android
7. Stanford Case SM-176
Google’s Android – Will it
shake up the Wireless
Industry in 2009 and
Beyond?
Week 13
Read and be ready to discuss
 Malcahy et al: Business
Intelligence and Solutions
 Levinson, M: The Brain
Behind the Big,, Bad
Burger and Other Tales of
Business Intelligence
 Madden, M: Barrack
Obama’s Super Marketing
Machine
 Davenport et al: The Dark
Side of Customer
Analytics
Week 14
Read and be ready to discuss:
 Wikipedia: Social Network
Service
 Wikipedia: Facebook
 Cautou et al: We Googled
You
 Raman: Enterprise 2.0
How a Connected
Workforce Innovates
Page 12
Group Presentations Due
 Group 1 – Papers 1 and
2
 Group 2 – Papers 3 and
4
 Group 3 – Papers 5 and
6
 Group 4 – Stanford
Android Case
Identity Management:
Results related to your
AdWords positing (from
Google Analytics) due
April 27. Send as a
document attached to an
email.
LAST CLASS May 2
FINAL EXAM DURING EXAM WEEK. (CLOSED BOOK)
MIS 2901 Spring 2010
Paul Weinberg
Download