This course begins your study of information science -- a field that
focuses on the relationship between information systems and their
users.
We live in what
is often called the "Information Age" because of the growing importance
of information (and information-related skills) in our society.
The study of information cannot go very far without encountering the
role of information
technology (IT) -- in other words, computers and
communication networks. Information technology enables many
of society's
information-dependent institutions to function. For example, our
financial system (including banks, credit cards, and the stock market)
could
not exist in their present form without computer-based IT. In
addition, IT has changed the way
people communicate with each other. Information scientists are
just beginning to study and understand the impact of email, wikis,
social networks, and text messaging on human behavior and
relationships.
WEEK | TOPICS
|
Assigned Reading
|
PART I. Organizations and
Information Systems |
||
1 9/10 2 9/14&9/17 3 9/21&9/24 4 9/28&10/1 |
Course overview; What is
IS? Organizations and IT Organizations and IT (cont.); Traditional Information systems Recent developments: e-Commerce; e-Government Cutomer Relationship Management; Mobile Commerce |
Kling;
Rainer, Ch. 1 Rainer Ch. 2, 8 Rainer Ch. 6 Anderson article Mergel article, pp. 1-27 Rainer Ch. 9, 7 |
Part II.Modeling information and
decision making |
||
5 10/5& 10/8 6 10/12 10/15 7 10/19 10/22 8 10/26&10/29 |
Probability (review); Decision Trees Guest Lecture: Prof. David Lazer, CCIS and Political Science: "Cyberspace, Network Science, and Social Behavior" Discuss Term Projects; Data and Information Models Exam #1 Guest Lecture: Prof Yang Lee, Management Information Systems: "Enterprise Information Systems" Data and Information Models (cont.); Taxonomies; Ontologies |
Decision Tree Primer Ch 1 Decision Tree Primer Ch 3 Term Project Description Noy/McGuiness: Ontology101 Protege |
Part III. Behavioral and Social
Informatics |
||
9 11/2 11/5 10 11/9&11/12 11 11/16& 11/19 12 11/23 11/26 13 11/30 |
Information Security Guest Lecture: Prof. Stephen Intille, CCIS: "Computers can revolutionize health care" Information Security (cont.); Innovation Diffusion Learning from Failure EXAM #2 Impact of computers on society (in general) Thanksgiving recess -- no class Intellectual Property; Discuss final presentations |
West Social Engineering article CyberThreats report Rogers CONFIRM Grudin Brey article Is Google making us stupid? 4 short CACM articles 1 2 3 4 |
Part IV. Student
presentations |
||
12/3 14 12/7 |
Student presentations Student presentations |
|
12/14 |
Student presentations 1:00 -
3:00 p.m. |
Academic Honesty: Work assigned to an individual or a group must be
done ONLY by that individual or the people in that group. When
material is quoted or derived from outside sources. those sources must
be given the proper credit. Plagiarism or cheating will result in
an official University disciplinary review.
Late Homework: Assignment 1 papers must be handed in as hard
copy in class on the due date (or within 24 hours). The
other
(major) assignments will be submitted using Blackboard
unless otherwise specified. All of your work should have a
professional
appearance, and include
your name, the name of the course, a title that identifies the
assignment, and the date. Homework will be
accepted up to 24 hours late without any
penalty.
After that, late homework will be penalized by 10% of the maximum grade
per week. This will be handled on Blackboard by having two
assignments defined for each actual assignment: one for on-time work
which will enforce the deadline, and one for late work.
Missed exams: There are no makeup exams in this course. An
unexcused absence for an exam results in a grade of 0. If a missed exam
is excused for legitimate medical or family emergency reasons, the
course grade
will be based on the student's other work in the course.
Last modified: September 16, 2010