Syllabus+CPIS 220 CPIT 220

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

CPIS 220: Principles of Information Systems- Syllabus

University of Jeddah, Jeddah, Saudi Arabia


Faculty of Computing and Information Technology
Department of Information Systems

CPIS-220 Principles of Information Systems

Course Information
Title: Principles of Information Systems
Code: CPIS 220
Credits: 3
Prerequisites: CPCS-202

Course References

Patricia Wallace, Introduction to Information Systems, Prentice Hall 2nd Edition (2014), ISBN-
10: 0133571750 • ISBN-13: 9780133571752

Course Topics

1. Information Systems and People


2. Information Systems and Strategy
3. Information and Communications
4. Technologies: The Enterprise Architecture
5. Databases and Data Warehouses
6. Information Systems for the Enterprise
7. The Web, E-Commerce, and M-Commerce
8. Business Intelligence and Decision Making
9. Collaborating with Technology
10. Knowledge Management and E-Learning
11. Ethics, Privacy, and Security
12. Systems Development and Procurement
13. Project Management and Strategic Planning

Course Learning Outcomes (CLO)

1. The Human Element in Information Systems: The course combines comprehensive, up-
to-date coverage with focus on the human element in businesses, nonprofits, and other
organizations. Topics are enriched with probing discussions about the roles people play
in building, shaping, implementing, and even obstructing information systems.

Dr. Wafa GHONAIM – Winter2016


CPIS 220: Principles of Information Systems- Syllabus

2. Changing Student Roles: This course recognizes that while some students will become IS
managers, others may enter professions as consultants, business analysts, accountants,
marketing professionals, development specialists, volunteers, virtual team leaders,
forensic experts, legal advisors, project managers, and also the emerging data scientists.
3. Inspiring Students to Pursue Promising Careers: With the goal of conveying potentials
of information systems, there are countless examples of how savvy men and women
leverage information systems to transform organizations, and even build new empires.
4. Working Smarter Not Harder–Productivity: Chapters include several “Productivity Tips”
that suggest ways students can improve productivity by applying what they’ve learned.
5. Helping students see beyond today’s classrooms into today’s varied world: Students
understand the close links between competitive business strategies and information
systems and develop an awareness and new appreciation for the fierce business
competitions they see around them as they look at online ads, privacy policies, social
networks, and their own smartphones.
6. Expanded discussion of mobile devices and m-commerce in Chapter 6 includes a review
of evolving mobile payment technologies using near field communications and
strategies for mobile-friendly software development.
7. The “Internet of Things” is highlighted in several chapters, illustrating its growing
impact on network architecture and bandwidth, and its rapidly increasing role in data
collection, analysis, privacy, and surveillance.
8. Expanded discussion of cloud computing, personal clouds, mobility, and the BYOD
trend is presented, especially as they affect strategic planning for organizations.
9. Highlighting Globalization and International Contexts: Examples of how information
systems plays a key role in globalization about throughout the text to show students
first hand instances such as how Baidu captured the search engine market in China, or
how Idea manages a global supply chain.
10. Emphasizing Ethics: Ethical concerns are woven throughout the text, touching on very
human ethical dilemmas and the choices that have to be made. A special feature in each
chapter, The Ethical Factor, explores timely ethical issues such as corporate
responsibility in extended supply chains, or the ethics of massive surveillance and
collection of big data by governments and corporations.
11. Extended coverage of big data and the technologies used to store and analyze it has
been added, along with a new “Ethical Factor” box that explores the ethics of big data.
12. End-of-book comprehensive case studies show students the concepts in action.

Course Policy
Student Responsibilities:
Students must attend class, lab and session regularly. A lack of attention to

Dr. Wafa GHONAIM – Winter2016


CPIS 220: Principles of Information Systems- Syllabus

regular attendance deprives students of interaction and exchange of ideas


and knowledge. To promote student attendance, the instructor is setting a
bonus scheme for attendance that falls upon each absence. However, failure
to show up for 75% of term lectures would subject the student to imminent
failure of the course. Students also are responsible for knowing the contents
of the course syllabus. Reading them carefully to avoid trouble.
Submission Policy:
The Students have to make sure that they submit the works on or before the
dateline. Assignments will NOT be accepted after the submission deadline.
Student performance in this course will depend on student ability to meet
established milestones (that is, submit work on time). Work must be
submitted on the due date and time. Therefore, student should plan for
contingencies. (Note: A computer/network/printer crash is not an
acceptable excuse for late submission of work.)
Collaboration:
The students are permitted to study in groups to prepare for examinations
so long as the resulting exam demonstrates your individual mastery of the
concepts and skills tested.
Group work:
The students are permitted to work in groups only for designated ‘group
projects,’ which you are to submit as a group. All other assignments are to
be prepared individually.
Computer programs and technical reports:
Plagiarism includes submitting as your own work a computer program or a
technical report that was written by someone else or directly derived from
someone else. A computer program or technical report is directly derived
from someone else’s if it is identical to someone else’s program or technical
report except for minor changes such as reformatting, change of variable
names, etc. The responsibility is YOURS!

Grading Scheme

Course Component Grade Contribution


First Exam 20 %
Second Exam 20 %
Assignments & Quizzes 15 %
Lab Activities 15 %
Project
Lab work
Final Exam 30%
Bonus Attendance 5%
Total 105 %

Dr. Wafa GHONAIM – Winter2016

You might also like