Information Systems (MSc)

Overview

The MSc degree in Information Systems (IS) with Concentrations is designed to prepare students for challenging careers involving the design, analysis, implementation and operation of computer-based information systems. IS involves the application of computers in organizations functional areas of management.

The Master’s and PhD degree program provides students with a foundation in three areas:

  1. the application of IT to solve business problems and business processes and the strategic needs of the organization;
  2. enterprise data management; and
  3. analysis of business processes for redesign and development.

 

Course Structure

The Master of Science in Information Systems programme requires a minimum of 36 credit hours made up as follows:

8 core courses (3 credit hours each) - 24 credit hours

2 elective courses (3 credit hours each) - 6 credit hours

Thesis  (done over two semesters) - 6 credit hours

Total: 36 credit hours


Duration: minimum 18 months; maximum 36 months

Course Descriptions

CIE 802 Research Directions and Methodology

This course aims to equip research students with the necessary foundations and skills to evaluate and perform qualitative research at a postgraduate level. Course Description: Three semester hours. This course offers "An overview of research methodology including basic concepts employed in quantitative and qualitative research methods includes computer applications for research.

 

INF 804 Disaster Recovery and Planning

An in-depth coverage of disaster recovery planning including, techniques to prevent, detect, and recover from loss of information availability. Students are instructed in ways to formulate a disaster and recovery plan, and test and implement the plan in a simulated lab environment.

 

INF 806 Security Policies, Standards and Management            

This course provides students with the standards for creating an enterprise-wide security policy. Topics include: security management principles; defining security requirements; planning and documenting security policies; asset identification and control; system access control; and Internet security. Students also learn how to formulate, administer, manage and evaluate security policies and standards based on best standards for information systems security (ISO 17799), best practices for security auditing (CObIT) and the protection of private information.

 

INF 822 TCP/IP Security          

A deep review of the TCP/IP protocol suite, with a focus on protocol analysis, and supplemented with various issues relevant to network security professionals, such as ARP cache poisoning, IP source address spoofing, DNS cache poisoning, and many others. Students will gain practical experience constructing internetworks and implementing servers for various application layer protocols. Students will also engage in exercises intended to illustrate many of the network security issues covered in the course.     

 

INF 834 Systems Development and Project Management        

An in-depth study of the concepts and techniques for designing, developing and/or revising software using a planned approach.. Both the software development life-cycle model and project management approach is presented. Students apply project management concepts in this course to group and individual projects.

 

INF 841 Management Accounting

Financial management theory and financial statement analysis. Students use rate-of-return, break-even, scenario analysis, and other methods to evaluate projects and organizational performance. Students also learn how to make financial proposals for new equipment needed for an information security enhancement. To a more limited degree, IT security auditing is also discussed along with the importance of IT auditing to the enterprise.

 

INF 850 IT & Business Analytics

The objective of this course is to use modern Information technology in analytics using data and models to explain the performance of a business and how it can be improved.

 

INF 853 Governance, Risk and Control  

The principles and techniques applied to security risk analysis and the role of risk management in the business enterprise. Topics covered include how to conduct vulnerability assessments, the use of risk assessment tools and how to establish a cost benefit analysis for specific safeguards to ensure that information is confidential, available and has integrity. Emerging trends in risk management are also explored. Students use standard tools to assess network weaknesses such as UNIX-based NMAP and Nessus.

 

ELECTIVE COURSES:

CIE 800  Model Thinking

The objective of this course is first to introduce the general concept of models. What are models? Are there different types of models? Who uses models? Why are models useful? This introduction to models also serves to discuss the concept of system, complexity, simulation and optimization. Also addressed is the role of models as tools to understand system behavior and decipher complexity. The second purpose of the course is to present and illustrate with examples of applications the main categories of models: statistical models, agent-based models, simulation models, game theory and optimization models. The third and last objective is to select one or two specific model types and practice both model building and use with real life examples of applications.

 

INF 803 Business Data Communications and Networking

The objective of this course is to provide a basic understanding of the technical and management aspects of business data communications and networking.

 

INF 805 Business Foundations for IT (IT Strategy)

This course will explore necessary management actions, which will insure that information is available, correct, protected, and archived in proper forms and can also be manipulated.  All levels of management have the burden of insuring that appropriate information systems are in place to bring about a productive profitable organization. Management is accountable.  The objective of this course is to meet the challenges which are seemingly unending.

 

INF 810 Introduction to Enterprise Computing Environments

Enterprise Resource Planning (ERP) systems represent an integrated strategy for management of information among organizations, suppliers and customers. Graduate-level requirements include completion of a group project on an advanced complementary or enabling technology using ERP. Students' projects include implementation or demonstration and presentation to class.

 

INF 812 Data Mining for Business Intelligence

The course will provide an introduction to concepts behind data mining, text mining, and web mining. Lectures and real-world examples will be used to explain the fundamental principles, uses, and some technical details of data mining techniques. The emphasis primarily is on understanding the business application of data mining techniques, and secondarily on the variety of techniques. Data mining and investigation is a key goal behind any data warehouse effort.

 

INF 816 Advanced Operating Systems    

This course has two components: a theory component to teach the concepts and principles that underlie modern operating systems, and a practice component to relate theoretical principles with operating system implementation. In the theory component, you will learn about processes and processor management, concurrency and synchronization, memory management schemes, file system and secondary storage management, security and protection, etc. The practice component will complement the theory component through some specific assignments illustrating the use and implementation of these concepts.

 

INF 820 Data Mining and Data Warehouse

Data mining and investigation is a key goal behind any data warehouse effort. The course will provide an in-depth coverage of advanced concepts on data warehousing, data mining, text mining, and web mining. Lectures and real-world examples will be used to explain the fundamental principles, uses, and some technical details of data mining techniques. The emphasis primarily is on understanding the business application of data mining techniques, and secondarily on the variety of techniques

 

INF 831 Database Management

This course focuses on the general concepts and methodologies in file and database management systems-data representation, data modeling and file organization.  Additional focus will be on the movement of data to related database systems within and outside the user organization.  Students are required to understand the architecture of and start implementing simple database applications using commercially available packages such as MS-ACCESS, and ORACLE.

 

INF 832 Supply Chain and Logistics

This course focuses on the strategic principles necessary for the successful management of firms that rely heavily on logistics and supply chains.

 

INF 855 Organizational Behavior  

Organizational behaviour integrates content from several fields including psychology, sociology, economics, organization theory, statistics, and others. This material is then applied to organizations to explain the motivation of people and how the potential of the human side of business is best harnessed. This content is a crucial area of knowledge in information systems security because of the constantly changing security environment and the changing importance of the roles of security officers. Topics such as work motivation, work attitudes, socialization, leadership, decision making, and management of change will all help prepare students for the challenges faced as a security professional or manager.

 

INF 862 Information Security in Public and Private Sectors

This course exposes the student to a broad range of computer systems and information security topics. It is designed to provide a general knowledge of measures to insure confidentiality, availability, and integrity of information systems.

Admission Requirements
Tuition Fees