...communicate effectively in a workplace that is increasingly dependent upon technology as a means to communicate globally. The course provides students with an understanding of technology-mediated communication and the ability to maximize the use of new media to optimize organizational communications. Intranets, Internet, e-commerce, and the impacts upon customer satisfaction of new communications technologies are explored. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Turban, E., King, D., McKay, J., Marshall, P., Lee, J., & Viehland, D. (2008). Electronic commerce 2008: A managerial perspective (4th ed.). Upper Saddle River, NJ: Pearson Prentice Hall. Roebuck, D. B. (2006). Improving business communication skills (4th ed.). Upper Saddle River, NJ: Pearson Prentice Hall. All electronic materials are available on the student website. |Week One: Overview ...
Words: 2500 - Pages: 10
...document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Cooper, D. F., Grey, S., Raymond, G., & Walker, P. (2005). Project risk management guidelines: Managing risk in large projects and complex procurements. Hoboken, NJ: Wiley. Greenstein, M., & Vasarhelyi, M. (2002). Electronic commerce: Security, risk management, and control (2nd ed.). Boston, MA: McGraw-Hill. Marchewka, J. T. (2009). Information technology project management: Providing measurable organizational value (3rd ed.). Hoboken, NJ: Wiley. Tarlow, P. E. (2002) Event risk management and safety. Hoboken, NJ: Wiley. Article...
Words: 1690 - Pages: 7
...used by different types of businesses across different industries. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Rainer, R. K., Jr., & Turban, E. (2009). Introduction to information systems: Supporting and transforming business (2nd ed.). Hoboken, NJ: Wiley. All electronic materials are available on the student website. |Week One: Overview of Information Systems...
Words: 2308 - Pages: 10
...partnerships are explored. You discuss how a corporation is formed and how it can be financed. Finally, you study limited liability companies and limited partnerships, as well as franchises and special forms of business. This week further introduces you to the concept of alternative dispute resolution as a method for resolving disputes outside traditional litigation. After first looking at the litigation process, you are then introduced to arbitration, negotiation, mediation, conciliation, minitrial, fact-finding, and the use of a judicial referee. The Legal System and the Legal Forms of Business OBJECTIVE: Explain the major components of the legal system. Resources: Ch. 1, 2, & 4 of Business Law: Legal Environment, Online Commerce, Business Ethics, and International Issues Content • Ch. 1: Legal Heritage and the Information Age o Introduction to Legal Heritage and the Information Age o What Is Law? • Landmark U.S. Supreme Court Case Brown v. Board of Education o Schools of Jurisprudential Thought • International Law: Immigration to the United States of America o History of American Law • International Law: Adoption of English Common Law in America • International Law: The Civil Law System o...
Words: 1106 - Pages: 5
...|[pic] |Course Design Guide | | |College of Information Systems & Technology | | |CMGT/442 Version 4 | | |Information Systems Risk Management | Copyright © 2010, 2009, 2008, 2006 by University of Phoenix. All rights reserved. Course Description This course identifies and defines the types of risks that information systems professionals need to consider during the development and implementation of computer based information systems. This course will survey remedies and prevention techniques available to address the risk areas present. Organizational policies and current regulatory considerations will also be examined relative to development, implementation, and use of computer based information systems. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials...
Words: 1982 - Pages: 8
...[pic] |Syllabus Axia College/School of Business XBIS/219 Business Information Systems | |Copyright © 2009, 2008 by University of Phoenix. All rights reserved. Course Description This course provides an overview of Business Information Systems. This includes a broad foundation for both technical and nontechnical business professionals. Special emphasis is placed on how information is used by different types of businesses across different industries. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. The instructor policies are VERY important. The late policies, participation and discussion requirements, and other important information to ensure your best experience in this class are detailed in that document. Make sure you read this document in full immediately to help avoide missed requirements and missed points. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. PLEASE NOTE: Many of the assignments in this class have been customized, which means...
Words: 3946 - Pages: 16
...well as the associated business consequences. The readings focus on workers’ compensation, occupational safety, and other worker protection laws, with a specific attention to the Family and Medical Leave Act. This week also covers the collective bargaining agreements and labor law, as well as several laws and decisions a company must make regarding these labor law issues. In addition, you examine equal opportunity in employment and Title VII, including what comprises this significant law. You review regulatory laws, environmental protection and global warning, as well as antitrust laws and unfair trade practices. The readings focus on introductory concepts and the laws that support these concepts. Employment and Regulatory Risk OBJECTIVE: Differentiate between types of employment relationships and the associated legal considerations. Resources: Ch. 31 & 32 of Business Law: Legal Environment, Online Commerce, Business Ethics, and International Issues Content • Ch. 31: Employment, Worker Protection, and Immigration Laws o Introduction to Employment, Worker Protection, and Immigration Laws o Worker’s Compensation • Case 31.1 Workers’ Compensation: Medrano v. Marshall Electrical Contracting Inc. o Occupational Safety • Ethics Spotlight: Company Violates OSHA’s Safety Rule o Fair Labor Standards Act (FLSA) • Ethics Spotlight: Fair Labor Standards Act Pay Violation • Ethics Spotlight: Microsoft...
Words: 971 - Pages: 4
... Microsoft®, Windows®, and Windows NT® are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation. Edited in accordance with University of Phoenix® editorial standards and practices. Course Syllabus Course Title: | BIS/219 Business Information SystemsStart Date: 8/25/2010, Group ID:SWFOUN85 | Course Schedule: | 8/25/2010, 9/1/2010, 9/8/2010, 9/15/2010 and 9/22/2010 | Course Location/Times/Newsgroup: | South West campus 6 PM to 10 PM | ------------------------------------------------- Instructor’s Name: | Edward A. Potter | Telephone: | Work: 407-5550 (8-5 M-F), Home 562-3114 (5-9 M-F, 9-2 Sat) | UoPhx E-mail Address: | Alpotter77@email.phoenix.edu | Alternative E-mail Address: | Alpotter77@msn.com | Availability: | I check my email frequently so you may contact me by email, or I would be happy to meet with you personally by appointment. | Welcome! I am looking forward to our five weeks together as you take this step along your journey to getting your business/management degree. I will do everything that I can to ensure that the next five weeks will be a quality learning experience for all of you. Remember, a...
Words: 5103 - Pages: 21
...|[pic] |Syllabus | | |College of Information Systems & Technology | | |CMGT/582 | | |Security & Ethics | Copyright © 2010, 2009 by University of Phoenix. All rights reserved. Course Description The ethical issues examined in the course include information privacy, accessibility, and ownership from an organizational perspective. Information laws, regulations, and compliance requirements are examined in this course as well as the considerations for creating a safe digital environment within the organization. Policies Faculty and students or learners will be held responsible for understanding and adhering to all policies contained within this syllabus and the following two additional documents: University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies...
Words: 2637 - Pages: 11
...MIS 301 Introduction to Information Technology Management FALL 2010 - Unique Numbers: 03905, 03910, 03915 Instructor tructorBin Gu – bin.gu@mccombs.utexas.edu Dr. Information, Risk, & Operations Management (IROM) Dept. Office CBA 5.228 Office Hours MW 4:00-5:00 pm or by appointment Qian Tang - qian.tang@phd.mccombs.utexas.edu Teaching Assistant CBA 1.308B Office TBD Office Hours Course Description Information technology (IT) has transformed all aspects of 21st century business and everyday life. New IT investments continue to be staggering. Worldwide, over $2.5 trillion is invested in IT. In the U.S., over 50% of capital expenditures are related to IT. Information systems influence business processes, organizational structures, and the ways people do business, work, and communicate. Emerging technologies have triggered new forms of organization and business process innovation; they have also impacted organizational structure, culture, politics, decision making, and society as a whole. IT is transforming how physical products are designed, how services are bundled with products, and how individuals interact with businesses and with other individuals. A silent transformation is occurring as more and more physical products use embedded IT to improve customer experience and product performance. The pervasiveness of IT is expanding global trade and changing how and where work is performed. It is vital that future managers—in every area of business—have a...
Words: 3229 - Pages: 13
...sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Get Ready for Class • Familiarize yourself with the textbooks used in this course. Course Materials All electronic materials are available on your student website. Week1 Information Systems and Word Processing Tools Tasks • Download the new and improved Phoenix Mobile app. • Review the Week One Student Guide. 7 days Objectives/Competencies 1.1 Explain the benefits of information systems in the work environment. 1.2 Describe ethical issues related to information technology. 1.3 Use word processing tools to communicate business objectives. Required Learning Activities • Introduction to Information Systems, Ch. 1 • Introduction to Information Systems, Ch. 2 • Introduction to Information Systems, Ch. 3 • Word in Microsoft® Office...
Words: 789 - Pages: 4
...posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Fitzgerald, J. & Dennis, A. (2009). Business data communications & networking (10th ed.). Hoboken, NJ: Wiley. Iniewski, K., McCrosky, C., & Minoli, D. (2008). Network infrastructure and architecture: Designing high-availability networks. Hoboken, NJ: Wiley-Interscience. Turban, E. & Volonino, L. (2009). Information technology for management: Improving performance in the digital economy (7th ed.). Hoboken, NJ: Wiley. Supplemental Resources Element K. (2010). Fundamentals of Data Communication: Level 1. Element K. (2010). Fundamentals of Data Communication: Level 2. Element K. (2010). Network Security Fundamentals. Article References Aird, C. L. & Sappenfield, D. (2009, June). IT the 'enabler' of global outsourcing. Financial Executive, 25(5), 62. Chtioui, T. (2009,...
Words: 2439 - Pages: 10
...INSTRUCTIONS: YOU MUST ANSWER QUESTIONS 1, 2, AND 3. THEN CHOOSE TWO QUESTIONS FROM 4, 5, 6, AND 7. IN TOTAL, YOU WILL ANSWER FIVE QUESTIONS. EACH QUESTION SHOULD BE ANSWERED THOROUGHLY TO SHOW YOUR UNDERSTANDING IN DETAIL. CLEARLY LABLE THE QUESTIONS YOU ARE ANSWERING. Question #1 (Ch.1) Your friend Karen, knowing that you are a diligent student studying in the MPAc program, has asked that you enlighten her about Sarbanes-Oxley. a) Describe to Karen the key points of the section 404 of the Sarbanes-Oxley Act. b) Section 404 requires management to make a statement identifying the control framework used to conduct their assessment of internal controls. Describe to Karen the options in selecting a control framework. c) Karen was wondering, if the auditors give a qualified opinion on management’s assessment of internal controls over the financial reporting system, does it mean that the auditor must also give a qualified opinion on the financial statements? Explain how it works. d) In this age of high technology and computer based information systems, Karen was wondering why accountants are concerned about physical (human) controls. Explain. e) Internal control in a computerized environment can be divided into two broad categories. Explain to Karen what they are. Question #2 (Ch.2) You are being interviewed for a job as an internal auditor, and it is the...
Words: 820 - Pages: 4
...L: 4 T: 1 P: 0 Textbook: 1. Hunger J. D. and Wheelen T. L. , Strategic Management & Business Policy, Pearson Education, New Delhi, 8th Ed., 2006 Other Specific Books: 2. Kazmi, A. Business Policy and Strategic Management, Tata McGraw Hill, New Delhi, 2nd Ed. 2007 3. Jauch, R. Lawrence, R. Gupta and W.F.Glueck, Business Policy and Strategic Management, Frank Bros.&Co., 7th Ed.,2007 Other readings: |S. No |Journal articles as compulsory reading | |. |Camillus, J. C. Strategy as a wicked problem, Harvard Business Review, May 2008 | | |Hirotaka, The contradictions that Drive Toyota’s success, Harvard Business Review, June, 2008 | | |C.K. Prahalad’s Plan: India @75, Business Today, August 24, 2008 | | |McAfee, A. and Brynjolfsson, E., Investing in IT that makes a competitive Difference, Harvard Business Review, July-August, 2008, PP.98-107 | | |Collis, D.J. and Montgomery, C.A., Competing on Resource, Harvard Business Review, July-August, 1995 | | |Michael E. Porter, From competitive advantage to corporate strategy, Harvard Business Review, May-June...
Words: 2548 - Pages: 11
...Course Syllabus Course Name: Business Law Course Number: BUS/415 Group Number: SWFOUN86 Course Start Date: 5/14/2012 Course End Date: 6/18/2012 Day & Time: Monday, 6:00pm PST Course Schedule________________________________________________________ Workshop 1 – May 14, 2012 Workshop 2 – May 21, 2012 Workshop 3 – June 4, 2012 Workshop 4 – June 11, 2012 Workshop 5 – June 18, 2012 Course Description This course examines, analyzes, and applies to the morn business environment the nature, formation and system of law in the United States. Course Topics & Objectives 1. Legal Environment Explain the relationship between business and the legal environment. Evaluate the social responsibility of business practices. Describe the stages of a civil case. 2. Torts Assess business situations for tort liability and defenses. 3. Contracts and Commerce Describe the elements of a valid contract. Explain the application of the Uniform Commercial Code to commercial transactions. Differentiate between types of interests in property. 4. Business Organizations Differentiate business entities by their advantages and disadvantages. Explain the actions which may result in the piercing of the corporate veil. Describe the formation and dissolution of a corporation. 5. Employment Law Government Regulation Describe the evolution of employment law. Explain government regulation of employer-employee relationships...
Words: 4940 - Pages: 20