SC&I Courses

Filter

Displaying 21 - 30 of 35

  • Credits: 3 Prerequisites: 04:547:201 Corequisites: None

    With the advent of the Extensible Markup language, web developers have the opportunity to build richer, more fully interactive sites by tapping into the power of a series of flexible and robust technologies that permit more effective sharing of information between organizations. Students will be starting with the fundamentals of XML and moving on into discussions and implementations of XHTML, Schema, DTDs, RSS, Web Services, AJAX and other XML-based frameworks for Web development. Particular attention will be paid to the issues surrounding open source development efforts and the business case for various technologies and their alternatives.

    Learning Objectives

    Upon successful completion of this course, students will be able to:

    • Build a website or web application that incorporates front-end interactivity through the use of interface behaviors, data manipulation, templating, and asynchronous data transfer (AJAX).
    • Manipulate, aggregate, and make relationships between data from various sources to produce results in an interactive website or application not otherwise possible using single data sources alone.
    • Identify and discover interactive capabilities of 3rd-party public application programming interfaces (API’s) and integrate such API’s into a website or application design.
    • Find and make use of specialized development tools to aid in building interactivity within websites and applications such as integrated development environments (IDE’s), developer tools, javascript frameworks, and server-side scripting technologies.
    • Troubleshoot and debug issues with both front-end and server-side scripting technologies.
  • Credits: 3 Prerequisites: 04:547:201 Corequisites: None

    An introduction to the various technical and administrative aspects of information security and assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.

    The purpose of the course is to provide the student with an overview of the field of information security and assurance. Students will be exposed to the spectrum of security activities, methods, methodologies, and procedures. Coverage will include inspection and protection of information assets, detection of and reaction to threats to information assets, and examination of pre- and post-incident procedures, technical and managerial responses, and an overview of the information security planning and staffing functions.

    Please note that this course was previously numbered 04:547:432; students who successfully completed 04:547:432 cannot also enroll in 04:547:333 for credit.

    Learning Objectives

    Upon completion of this course, students will be able to:

    • Identify and prioritize information assets and threats to information assets.
    • Define an information security strategy and architecture.
    • Plan response to information security incidents.
    • Present a disaster recovery plan for recovery of information assets after an incident.
    • Describe legal and public relations implications of security and privacy issues.
    • Demonstrate knowledge of a chosen security topic through a written research paper.
  • Credits: 3 Prerequisites: None Corequisites: None

    Analyzes gender in relation to race, class, nationality, culture, religion, and sexuality in the context of technological innovation. Its focus is on fundamental concepts, the feminist critique of technoscience, and the impact of gender issues on workplace inclusiveness and equity, in a transnational and historical perspective. It examines the effects of gender on the development and use of information technologies and on gender-based electronic information preferences.

    Learning Objectives

    Upon successful completion of this course, students will be able to:

    • Understand feminist critiques of science/technology and comprehend alternative strategies for thinking about technology as it affects women's lives.
    • Understand the development of technology and science in a historical context and in the context of gender-based division of labor, using current theoretical constructs.
    • Recognize the importance and processes of innovation as they impact women in technology-based industries.
    • Develop strategies for maintaining an inclusive and equitable work community.
    • Identify barriers to the recruitment and retention of women in the IT workplace and develop recommendations regarding strategies to overcome these barriers.
  • Credits: 3 Prerequisites: 04:547:200 and 04:547:333 Corequisites: None

    This course explores information privacy, security, and technology in contemporary organizations. Students analyze how regulatory, social, and ethical issues impact information privacy and data protection, and implement tools to manage information privacy risks.

    Learning Objectives

    Upon successful completion of this course, students will be able to:

    • Compare and contrast the relationships among privacy rights and responsibilities in an information society.
    • Examine regulations such as GDPR, and US Privacy state laws, and how major regulatory, social, and ethical issues impact security, privacy, technology, emerging technologies, and governance.
    • Describe the roles of encryption and nonrepudiation, and identity and anonymity in implementing data protection and information privacy solutions.
    • Evaluate tracking and surveillance, and usable and useful privacy interfaces.
    • Use privacy assessment and data protection tools to complete risk assessment activities.
    • Design organizational privacy and security policies for a cybersecurity program.
  • Credits: 3 Prerequisites: 04:547:202 or an equivalent course (such as 01:198:113 or 01:198:211). Open only to Major. Corequisites: None

    This course is not being offered in the 2020-21 academic year; the schedule for 2021-22 and beyond is yet to be determined.

    This course examines the technologies used to transact business electronically. It investigates a range of social, economic and security issues related to such transactions, and the design of websites that facilitate these transactions.

    Learning Objectives

    Upon successful completion of this course, students will be able to:

    • Identify and evaluate the technologies web developers use to create e-commerce websites.
    • Identify issues of security, privacy, intellectual property, digital currency, and propose web solutions.
    • Undertake comparative cost analysis in terms of doing business online versus the costs of doing business in a physical location.
    • Understand and apply strategies (such as advertising, risk management) appropriate to conducting business in a digital environment.
    • Analyze e-commerce sites to identify why some sites work more successfully than others.
    • Develop a business plan for transacting business in an electronic environment.
    • As part of a team process, develop a prototype e-commerce website for a locally-based organization.
  • Credits: 3 Prerequisites: 04:547:201 and 04:547:315 Corequisites: None

    Creating a digital game involves merging many the skills of many disciplines in to a single cohesive whole. It involves applying principles from computer programming, two and three dimensional digital art, animation, physics, mathematics, artificial intelligence, user interface and experience design, psychology, narrative design and visual communication, to provide an incomplete list. This course focuses upon understanding and demonstrating the technical implementation of game play mechanics within a game engine framework. The purpose of this course is designed to expand upon the work done in Game Design Methodology (04:547:315) to provide an introduction in working with these disparate skill sets by building subsets of a complete game in a digital form.

    Learning Objectives

    Upon successful completion of this course, students will be able to:

    • Discuss and document game creation decisions using industry standard terminology: In this objective, students will be required to show that they can conceive of a game play system and can describe the goal state of their implementation. Focus must be given on using appropriate terminology as well as selecting specific behaviors to implement.
    • Implement examples of game play systems in the game engine used in the course: In this objective students will be required to demonstrate a functional knowledge of the object model and scripting languages of the disparate systems available within the game engine.
    • Assemble multiple game play systems in to a cohesive game play experience: In this objective students show how they are able to demonstrate the totality of objectives 1 and 2 by conceiving of, implementing and documenting an aggregation of different systems in a single user experience.
  • Credits: 3 Prerequisites: 04:547:210 Corequisites: None

    This course examines economic theories related to information technologies and systems. The concept of information as "commodity" is considered. Quantitative methods such as cost-benefit analysis and return on information technology investment evaluation are introduced. Alternative methods such as measuring the human costs associated with information technology implementations is also addressed.

    Learning Objectives

    Upon successful completion of this course, students will be able to:

    • Explain the concept of "information" as a commodity.
    • Identify key economic theories related to organizational investments in information technology systems, and outline their dimensions.
    • Identify, quantify and evaluate the costs and benefits of existing and proposed information systems.
    • Critically assess traditional methods for evaluating the investment returns associated with information technology and information system implementation.
    • Devise alternative strategies for measuring other cost factors related to information technology implementation within an organization.
  • Credits: 3 Prerequisites: None Corequisites: None

    Data analytics linked to storage, curation, management, and mining with attention to alternative methodological approaches.  The course will demonstrate various methods to explore how big data might be analyzed, stored, and retrieved.

    Learning Objectives

    Upon successful completion of this course, students will be able to:

    • Use models and structures to depict large data sets within a data analytics environment.
    • Apply statistical models to data using SPSS and related software programs.
    • Explain, determine, debate, compare and contrast: predictive analytic issues, language issues, algorithms, analytic methods, curation issues, and applications to social networks.
    • Create a tutorial guide to assist others in data analytic endeavors to include structuring data sets, using software to analyze data, and depositing and making accessible big data sets.
    • Assess how different statistical models might be used to extract meaning from particular data sets.
    • Understand how clustering and other statistical models can be used to extract meaning from data sets which will then lead to decision models on particular sub-groups.
    • Specify how to manage and curate large sets within a particular application area.
    • Address storage, security, and privacy issues as they apply to different types of large data sets.
    • Implement appropriate frameworks to identify the overall model for a big data set, how such data might be analyzed, curated, placed in a repository to provide appropriate access points for data set retrieval.
  • Credits: 3 Prerequisites: 04:547:210 Corequisites: None

    This course is not being offered in the 2020-21 academic year; the schedule for 2021-22 and beyond is yet to be determined.

    This course focuses on understanding how organizations learn, and how information technology can be used for the design and development of instructional systems and materials within the organization to facilitate workplace learning. It will address workplace learning needs, learning styles, learning outcomes, representation of knowledge, problem solving, and assessment of the usability of e-learning systems in the workplace.

    Learning Objectives

    Upon successful completion of this course, students will be able to:

    • Describe how people learn in the workplace, and be able to identify enablers and barriers to learning.
    • Identify learning styles, and appropriate pedagogical principles and teaching methods.
    • Implement strategies to determine learning needs in the organization.
    • Apply principles of effective design and development of workplace learning initiatives.
    • Work cooperatively with others in developing an instructional design plan for the organization.
    • Select and use appropriate technologies for implementing workplace learning solutions.
    • Analyze and appraise various course and instructional management techniques such as questioning, discussions, evaluation and assessment.
  • Credits: 3 Prerequisites: Permission by the department; Open only to Major Corequisites: None

    The Practicum in Information Technology will operate very much like an independent study course, only in this case, the students' work will be directed toward passing an IT certification test. Selected certificates--ones that are in demand by companies and organizations--will be options presented to the students. Certification options may include, but are not limited to,: A+, CCNA, MCTS, etc.

    Learning Objectives

    Upon successful completion of this course, students will be able to:

    • Integrate skills learned in the classroom and apply them to an IT certification experience.
    • Share information about tasks assigned to them by mentors.
    • Describe and relate the experience to their educational and career goals.