Course description

The study-unit addresses 3D Computer Graphics Modelling & Animation which utilizes a three dimensional representation of geometric data stored within a computer.  The topics include the usage of pre-prepared models for the creation of scenes and short movies, 3D figure design and textures. The creation of virtual 3D landscapes is now also feasible. These environments can feature human images, animals and other characters.

            Course learning outcomes

 

·         Use 3d modelling software to express/rationalise their design ideas in practice

·         Build their own 3D Models, whilst utilising various packages

·         Create textures, 3D renders and do post-production

·         Create animated 3D renders  

·         Present their work on a pc or on video sites like Youtube


Course description                   

Electronic business or e-business has been dramatically changing the way today’s businesses operate and compete in the global marketplace. Nevertheless, most people including the businessmen are focusing on how to utilize the e-Business system as a tool to effectively implement traditional business strategies, few cares about the engineering construction of those systems.  This course provides an overview of e-business ENGINEERING from an architectural perspective, and introduces the fundamental concepts and frameworks of IBM patterns for e-business with which to examine the existing e-business models, the prevalent enabling technologies, and the strategic issues confronting the legacy firms.  The efficiency, performance, capacity, and practical design of e-Business engineering systems will be covered with the best practice of IBM experience.

 

Course learning outcomes

At the end of the course students should be able to

  • Apply theoretical and technical knowledge of web-based information systems to facilitate and support business practice.
  • Select and apply various online tools and techniques to effectively implement web-based information systems.
  • Respond to issues and challenges faced by businesses in relation to web-based information systems and generate a range of potential solutions.
  • Select appropriate web-based solutions to address specific business issues.
  • Design and implement web-based information systems to address specific business issues.

Course content

·         Introduction to E-Business

·          Making Functional Areas E-Business Enabled : Value chain and supply chain, inter and intra organizational business processes, ERP

·         Making Functional Areas E-Business Enabled : E-Procurement

·          Making Functional Areas E-Business Enabled : E-marketing, E-Selling, E-Supply Chain Management

·         Technologies for E-Business: Internet and Web based system

·         Technologies for E-Business: Security and payment systems

·         Technologies for E-Business: Supply chain integration technologies (EDI, RFID, Sensors, IoT, GPS, GIS)

·         Technologies for E-Business: Supply chain integration technologies (Web services and cloud)

·         Decision Support in E-Business: Web analytics

·         Decision Support in E-Business: Customer behavior modeling

·         Decision Support in E-Business: Auctions

·         Decision Support in E-Business: Recommender systems

 

Course reading Materials

·         E-Business and e-commerce Management: Strategy, Implementation and Practice (4th ed.) (2009), by Dave Chaffey. Prentice Hall. ISBN -10 0273719602, ISBN -13 978 0273719601

·         E-Business, International Edition (International Student Edition) (2009), by Gary Schneider. South Western College. ISBN - 10 032478807X

·         Management Information Systems: Managing the Digital Firm, Laudon and Laudon, Pearson Scaling for E-Business, Menasce & Almeida, PHI

·         E-Business & eCommerce – Managing the Digital Value Chain, Meier & Stormer, Springer


Course description                          

This course intends to teach audit and control aspects of information systems. Students will learn about risks, controls, audit and computer fraud detection techniques related to key information systems areas. Specially developed software will be used to perform audit tests and fraud prevention and detection procedures.

Course learning outcomes

After studying this course you will be able to:

·         Explain and apply the concepts and theory underlying IS Auditing;

·         Evaluate internal control in an IS environment - emphasising the auditor's role in risk analysis, contingency planning and systems development, etc;

·         Explain contemporary IS Auditing practice, considering techniques and methods for auditing computerized information systems;

·         Describe and differentiate between contemporary IS auditing techniques;

·         Apply the Information Systems Auditing Methodology;

·         Appraise the audit significance and implications of:

o   Auditing in a Mobile Computing environment

o   Auditing in a Cloud Computing environment

o   Auditing as a part of project SDLC

o   Auditing web servers and applications

o   Auditing switches, routers and firewalls, including UNIX and Windows operating systems

o   Auditing DRP/BCM and Data Centers

o   e-Forensics and ID Fraud,

·         Assess the current status of professional and legal requirements; and,

·         Discuss current research issues in IS auditing by use of the web to review current research efforts in IS auditing.

 

Course content

·         Overview of Information Systems Auditing, Need for Control and audit of computers, system integrity objectives, system effectiveness and efficiency objectives

·         Fundamentals of Information system auditing, effects of computer on internal control, Effects of computer on Auditing.

·         Conducting and information System Audit, Audit Risks, Type of Audit Procedures.

·         Steps in Audit, Auditing Through Computers

·         Top Management controls, Evaluating the Planning and Organizing function.

·         Top Management controls, Evaluating the Leading and Controlling Function

·         System Development Management Controls, Auditing systems development, Techniques for studying Existing system.

·         Evaluating Major Phases in System Development Process

·         Programming Management Controls, organizing the programming teams, types of programming teams

·         Managing the Programming groups, Techniques for Program Design

·         Data Resource Management Controls, Functions of DA and the DBA, Placement of DA and DBA roles.

·         Data repository Systems, Control over DA and DBA, Organizational issues, exposures and Measures. Audit Aspects of a DRS

·         Security Management Controls., Developing a Security Program, Exposure Analysis, Controls Adjustment, Report Preparation

·         Major Security Threats and Remedial Measures, Controls of Last Resort

·         Operation Management Controls, Production Management Controls, Capacity Planning and Performance Monitoring, Management of Out Sourced operations

·         Quality Assurance Management Controls. QA functions, Organizational Considerations.

·         MID

·         Application Boundary Controls, Cryptographic Controls, PINs, Digital Signatures, Plastic Cards, Audit Trial Controls

·         Audit Software, Functional Capabilities of Audit Software, Using Software to assess operational efficiency, effectiveness, and reliability, Control of Audit Software

·         Code Review, Test Data and Code Comparisons

·         Concurrent Auditing Techniques, needs and nature of concurrent auditing.

·         Implementing Concurrent Auditing Techniques, Strengths and Limitations.

·         Interviews Questionnaires and control Flow Charts

·         Performance Measurement Tools, types of Performance Measurement

·         Presenting Performance Measurement, Kiviat graphs, Performance Measurement vs. Data integrity

·         Evaluating Asset Safeguarding and Data Integrity, Determinants of Judgment and Performance.

·         Audit Technology to assist the Evaluation Decision, Cost effectiveness considerations

·         Evaluating System Effectiveness, Effectiveness evaluation process, Model of Information System Effectiveness.

·         Evaluating System and information Quality, ease of use and usefulness. System Satisfaction and organizational Impact

·         Evaluating System Efficiency, Key Performance Indicators, performance Indices

·         Evaluating System Efficiency, Workload Models, System models, Combining Workload Models and System models.

·         Managing the Information System Audit Function planning, Organizing and Staffing

·         Managing the Information System Audit Function Leading, Controlling , IS Audit Professionalism, Features of IS Auditing

 

 

Course reading Materials

·         Davis, Schiller, Wheeler. 2011. IT Auditing: Using Controls to Protect Information Assets, 2nd Edition, McGraw-Hill, ISBN: 0-071-74238-7.

·         Richard E. Cascarino. 2007. Auditor's Guide to Information Systems Auditing, John Wiley, ISBN: 0-470-00989-6.

·         James A Hall. 2005. Information Systems Auditing and Assurance, Thompson, ISBN: 0-324-19198-7.

·         Doug Dayton, Daug Dayton (1997), “ Information Technology Audit Handbook ”, Prentice Hall, ISBN: 0136143148.

·         Frederick Gallegos, Sandra Allen-Senft, Daniel P. Manson (1999), “ Information Technology Control and Audit ”, Auerbach Pub, ISBN: 0849399947.


Course description                   

Builds an understanding of the technical and management architecture that comprise enterprise computing environments. The course focuses on identifying and solving large complex problems by using enterprise computing technologies. The course addresses the analysis of the underlying computer hardware and software architecture including: operating systems, as well as, the management issues relating to enterprise and distributed computing systems, enterprise applications, data structures, security, application development policies, standards and guidelines, software procurement, custom development, operating system selection: z/OS, Linux, Windows, various application development and deployment environments. Some coverage of software sourcing, software reuse design, software maintenance, change-control and configuration management.

 

Course learning outcomes

At the completion of this course students will be able to:

·         Identify, describe and solve large complex problems

·         Describe enterprise technology concepts

·         Evaluate the use of enterprise technologies   

·         Evaluate the use multi-tier architectures for large-scale systems

·         Describe key architectural concepts used in building enterprise systems

·         Describe key enterprise data structure concepts including various file access methods

·         Use large enterprise computing systems to build enterprise software objects

·

 

Course content

·         Introduction to Information System

·         Control, Audit and Security of Information System

·         Enterprise Management System

·         Decision Support and Intelligent System

·         Planning for IS

·         Implementation of Information System

·         Web Based Information System and Navigation

·         Scalable and Emerging Information System Technique

 

 

Course reading Materials

·         Leonard Jessup and Joseph valacich, “Information Systems Today.” Prentice hall

·          J.Kanter, “Managing With Information System”, PHI

·         Carter B., Introducing RISKMAN Methodology, NCC Blackwell ISBN-13: 978-1855543560

·         Oskarsson O., ISO9000 Approach to building quality software, Prentice Hall ISBN-13: 978-0132289252

·         Hawker Andrew, Security and Control in Information Systems, Routledge ISBN-13: 978-0415205351

·         Kramer John, The CISA Prep Book, Wiley Publishers ISBN-13: 978-0471250326

·         BugTraq: SecurityFocus http://www.securityfocus.com/archive/1

·         Microsoft Security Bulletins: Microsoft Security Techcenter http://technet.microsoft.com/en-gb/security/