arba minch university - smis.amu.edu.et
TRANSCRIPT
ARBA MINCH UNIVERSITY
ARBA MINCH INSTITUTE OF TECHNOLOGY (AMiT)
Department of Computer Science & Information Technology (CS&IT)
Curriculum
OF
Master of Science Degree Programme in Information
Technology
(M.Sc. IT)
1st August, 2016
Page 1 of 84
Abbreviations
ACM Association for Computing Machinery AI Artificial Intelligence API Application Program Interface BAN Body Area Network BI Business Informatics CAN Campus Area Network CMM Capability Maturity Model CRISP-DM Cross Industry Standard Process for Data Mining CS Computer Science DGC Department Graduates Council GIS Geographical Information System GPS Geographical Positioning System HAN Home Area Network ICT Information and Communication Technology IS Information Science ISO International Organization for Standardization IT Information Technology KM Knowledge Management LAN Local Area Network MAN Metropolitan Area Network NLP Natural Language Processing PAN Personal Area Network SDSS Spatial Decision Support System WAN Wide Area Network
Page 2 of 84
Table of Contents
Abbreviations .................................................................................................................................... 1
1 Background ............................................................................................................................... 4
1.1 Field of Study ..................................................................................................................... 4
1.2 Vision, Mission and Goals of the Department ..................................................................... 4
2 Rationale (Why M.Sc. in Information Technology (IT)) ................................................................ 6
2.1 Resilient need for development of Ethiopia ........................................................................ 7
2.2 The programme ambition for national policies and strategies of the country and AMU’s Mission and Vision ......................................................................................................................... 7
2.3 Career prospects ................................................................................................................ 8
3 Objectives of the Programme .................................................................................................... 8
3.1 General Objective .............................................................................................................. 8
3.2 Specific objectives .............................................................................................................. 8
4 Graduate Profile ........................................................................................................................ 9
4.1 Learning Outcomes in terms of Knowledge & Skills ............................................................ 9
4.2 Global leadership programme in IT ................................................................................... 10
4.3 Inclusion (HIV/AIDS and Females) ..................................................................................... 10
5 Admission Requirements ......................................................................................................... 10
6 Graduation Requirement ......................................................................................................... 11
7 Programme Duration and Degree Nomenclature ..................................................................... 11
Degree Nomenclature: .................................................................................................................... 11
English ............................................................................................................................................. 11
8 Programme Profile ................................................................................................................... 11
8.1 Structure of the Programme............................................................................................. 11
8.2 Credit Point of a Course ................................................................................................... 12
8.3 Programme Structure ....................................................................................................... 12
8.4 Course List ....................................................................................................................... 13
8.4.1 Core Courses ............................................................................................................ 13
8.4.2 Elective courses ........................................................................................................ 13
8.4.3 Thesis /Project module ............................................................................................. 14
8.5 Course Schedule............................................................................................................... 14
8.5.1 Option A- .................................................................................................................. 14
8.5.2 Option B- .................................................................................................................. 15
Page 3 of 84
8.5.3 Justification of the Schedule ..................................................................................... 15
8.5.4 Assessment/Evaluation............................................................................................. 16
8.5.5 Quality Assurance ..................................................................................................... 16
9 Course Profile .......................................................................................................................... 17
9.1 Course for Research Skills Development ........................................................................... 17
9.2 Course for Scientific & Professional Development in advanced technologies .................... 17
9.3 Course Syllabus ................................................................................................................ 18
10 Grading Scheme ................................................................................................................... 82
11 Resources and facilities required to properly run the program ............................................. 82
Staff Profile.................................................................................................................................. 82
11.1 Laboratory facilities .......................................................................................................... 83
12 Annexure A- Convention for course nomenclature ............................................................... 83
Page 4 of 84
1 Background 1.1 Field of Study
Information Technology (IT) has evolved as an emerging field of study across the globe.
Institutions, enterprises, organizations and companies in all sectors, public and private, are
directly or indirectly being affected by the overwhelming information flow and its effective
management through technology around the world. The effect goes down to small businesses
and even to individuals. Every such unit must be equipped with tools that enable it to survive
in such a dynamic world. Ethiopia is no exception and we must get ready to cope up with the
influence of the knowledge age in our day to day life.
1.2 Vision, Mission and Goals of the Department Vision of the Department: Currently, there is significant difference between the demand and
supply of the quality professionals in Computer & IT sector to fulfill country’s technocratic
need. Various Governmental and other organizations have the desire to use modern
information technology tools and techniques. However, there is an acute shortage of technical
staff. The failure of many projects in IT in terms of implementation and sustainability is
largely attributed to shortage of qualified professionals. Realizing the importance of
Computer Science and IT and the acute shortage of skilled manpower in the field, the
Department of Computer Science and Information Technology, Arba Minch University
Institute of Technology, Arba Minch University was established with the vision and mission
to promote Computer Science and Information Technology education at Graduate and post
Graduate level to fulfill the technocratic need of country. In starting phase department
launched an Advanced Diploma programme in Computer Science in 2003 G.C (now Closed).
The first curriculum for B.Sc degree programme was adopted in 2004 G.C. under Faculty of
Engineering. In addition to this the university launched a second B.Sc Degree program in
Information Technology in 2004 G.C. Currently both the programs run under Computer
Science and IT department under Arba Minch Institute of Technology (AMIT). Further
department started M.Sc. in Computer Science in 2011 G.C. In addition to it the department
has summer B.Sc. Computer Science, B.Sc. Information Technology and M.Sc. Information
Technology. All programmes are successfully running with adequate quality and
commitment to accomplish the vision and mission of the department, university and nation at
large. Department has vision to accomplish the following:
Page 5 of 84
Filling the IT Human Resource gap in between demand and supply
Ensure Success Factor of IT projects & Technology Transfer (implementation and
sustainability)
Develop an IT Echo System in the country for Technology Savvy society
Mission of the Department:
1) Run Computer Science and IT programmes at undergraduate, graduate and higher level to
fulfill the need of the country, 2) Initiate technology transfer and research projects to solve
business, industry, society problems through computer and IT tools and technologies, 3)
Formulate integrated research frameworks for interdisciplinary automations, 4) Initiate core
and multidisciplinary research collaborations and Present or publish research results
in national/international journals and conferences.
Educational & Research Goals of the Department: The primary goal of the department is to
produce high quality technocrats with innovative and research skills having Graduate and
Post Graduate qualifications with entrepreneurial, creative and problem-solving mindsets.
The MSc Information Technology is an intensive, practical-oriented course. It provides an
opportunity for graduates to develop key specialist skills for a career in Information
Technology and Computing. It is ideal for complementing student’s expertise with core IT &
Computing skills. Information Technology at AMU has strong links with industry. Students
can get a first-hand industrial experience through placements and research project
internships with local enterprises and organizations. More specifically, University can
offer company-based MSc research projects to the students where they can work with an
employer to gain valuable commercialized IT exposure. University industry linkage office
can regularly invite industry experts to share their expertise with students through seminars
and talks. Target learners will also get prepared for finding and securing great jobs after
completing this course as a professional development programme. This programme covers
crucial topics such as Converging Technologies, IT Project Management, Knowledge
Management, E- Governance and E-Commerce with job searching prospects worldwide.
Rapid advances in technology mean we live in an ever-changing world. By far the most
important driving factor in this change is Information Technology (IT). The Arba Minch
Institute of Technology, Arba Minch University, offers a Master’s degree Programme in
Information Technology designed to track technological changes and enable students to
Page 6 of 84
develop into a consummate professional in rapidly evolving field. The programme includes
topics that will help to develop understanding of a wide range of technology related areas
with the aim of helping and building students career in the field of IT. Today, IT is at the
heart of every aspect of our life and business. Professionals who can use IT to create business
advantage are in demand. This M.Sc. programme will be able to enrich the knowledge on
Information Technology tools and understanding of scholars to forge a successful career.
Problem solving professionals through IT will be welcomed with high demand for
automation and technology transfer in the time ahead.
1. Rationale/Justification of the need for the program (professional profile).
How it is initiated
Why it is important to launch the program
The demand for the graduates
What are the comparative advantages to launch the program in AMU
How it is tuned to the national policies and strategies of the country and AMU’s
Mission and Vision
The target/anticipated job market for the graduates
Etc.
2 Rationale (Why M.Sc. in Information Technology (IT))
The young and new programme in M.Sc. IT is proposed to be start functioning with the prime
aim of growing needs of professional Technocrats and IT specialists in the country; Ethiopia.
The national level demand for skilled man power in the field of IT and its wide range
application areas have motivated the Institute/ University to start this programme
immediately.
Ethiopia has strong need for IT industrial experts to complement the current status of IT
human resource with excellent academic and research backgrounds. They may consult
organizations on a wide range of IT applications, problems in multi-disciplinary fields of
practices. The programme can benefits from frequent content revisions that can be based on
the continuous interaction of staff with industry and stakeholders to maintain the program’s
leadership in IT industry and a large number of application users at corporate level. AMU is
located in Gamo Gofa zone which is southern part of Ethiopia. In this region, M.Sc. IT
Page 7 of 84
graduates are needed for next generation technology adoption, research for localized problem
solving and capacity building for digitalization of systems and poverty alleviation.
2.1 Resilient need for development of Ethiopia IT is necessary to develop capacity in prospective graduates with skilled mindsets to
acquire the necessary knowledge and skills to meet the growing needs of IT
professionals in the region and country.
Wide range of IT applications have developed a thrust to produce high quality
graduate professionals with an entrepreneurial and problem solving mind sets to
empower the IT industry in the region and country
It is a need of the country to produce highly competent trained man power who
practically can apply their knowledge in the real world of IT.
Assurance of professional growth of IT Industry in Ethiopia by certifying availability
of local IT human resource/ professionals anticipated by investors for IT industry
expansion and establishment
Alignment of automation & solutions with benchmark and standards with globalized
competition for assurance of quality in localized IT solution market with cost
effective and long term sustainability
Training and Strengthening IT Human Resource for professional’s exports in Africa
and other parts of the world
Balancing the demand and supply in IT industry professional with core competency in
design, development and customization of IT products and services in Ethiopia
Establishing a new paradigm of IT industrial revolution in the country to make
Ethiopia; a super power in IT enabled solution market in African continents countries
Magnify and open the professional doors for reliable IT solutions in E-Commerce, E-
Governance and E-XYZ capacities for achieving national goals under national
mission of scientific technology revolution;
Achieving good governance motives and responsive quick governance at your door
by IT solutions with worth quality criterions
2.2 The programme ambition for national policies and strategies of the country and AMU’s Mission and Vision
Facilitate education with at most quality and thereby to cultivate confidence among
the target learners, technocrats to serve the country in better and professionals manner
Page 8 of 84
Supporting Government’s policy of increasing technology trained human resource,
thereby reducing the shortage of skilled manpower that are required for different
organizations, to and empower and develop the nation through enabling power of IT
Supporting the industrial community and institutions across the country to achieve
excellence and judicious growth for educational excellence
Enable students to critically analyze and solve the problems through knowledge,
creativity and independent research in IT or multidisciplinary Informatics
Endow students with the qualities needed for employment requiring sound judgment,
personal responsibility and initiative, in complex and often unpredictable professional
environments in IT industry and its applied areas
Students should have the relevant prior qualifications or experience that may be required to
pursue the study.
2.3 Career prospects
This Programme is suitable for those who wish to develop professional and technical
competence in the field of information technology. It prepares students/scholars for careers in
core IT development, management of IT systems in governance, business organization and
areas of applications. M.Sc. Graduates will be employed as IT Managers, IT Project
Managers, IT Consultants, IT Solution Architects, System Solution Designers, System
Managers and Research Consultants.
3 Objectives of the Programme 3.1 General Objective
The prime objective of this programme is to provide advanced-level theoretical and practical
knowledge of latest Information Technologies in order to build capacity that are most
relevant to the needs of the country
3.2 Specific objectives
To facilitate the provision of an individual learning experience for each scholar that
fosters engagement with their programme of study and promotes and enhances
independent study and life-long learning in changing needs of IT technologies.
Page 9 of 84
To maintain a high quality, comprehensive and coherent curriculum formed by
research practices and enhances each participant’s career prospects in IT domain.
To develop professionals with a sound understanding of the field under study and a
critical awareness of current issues with ability to adopt appropriate project or
research initiatives.
To enable the broadest variety of people, industry and governance professionals to
benefit from engagement with postgraduate education in IT.
To provide postgraduate learning opportunities which are relevant and accessible to
people and organizations regionally, nationally and internationally in align with
technological paradigm shifts.
4 Graduate Profile 4.1 Learning Outcomes in terms of Knowledge & Skills
On completion of the Master of Science in Information Technology, students/scholars will be
able to:
Gain knowledge and understanding of the essential concepts, principles, theories and
applied models with critical awareness of current problems and new insights at the
forefront of the IT discipline
Build capacity to demonstrate the mastery of the Information Technology knowledge
and professional skills necessary to empower the IT professionals
Evidence the qualities and skills necessary to exercise initiative and personal
responsibility in order to adopt critical, ethical and reflective approaches to their
profession.
Investigate, evaluate and analyze country’s technological needs and apply advanced
and contemporary IT related creativity to a wide range of complex and open-ended
social and professional issues and problems to be solved by IT.
Deal with complex issues, make informed judgments in the absence of complete data
and communicate clearly to specialist and non-specialist audiences.
Learn independently and accept responsibility for subsequent career and continuing
professional development in changing needs of IT and its applied areas.
Demonstrate originality in the application of theoretical and practical knowledge,
drawn from earlier studies, through the production of the thesis, dissertation and
Page 10 of 84
project and a significant piece of high-level project and research outcomes in IT
sector.
provide consultancy services in the field of Information Technology
4.2 Global leadership programme in IT
To prepare students/scholars for the challenges of the global employment market and to
strengthen and develop their broader personal and professional skills Arba Minch Institute of
Theology, Arba Minch University has developed this unique Global Leadership Programme
in IT.
4.3 Inclusion (HIV/AIDS and Females)
The programme will assure equal opportunity, full participation and protection of the
educational rights of the people with Special needs, HIV/AIDS and Females under resource
provisions of university and country at large. If required; the programme may propose extra
attention and efforts for their academic growth
What does the programme cover?
• Programme has provision for Equal opportunity, full participation and protection of
educational rights of the people with Special needs (Disability), HIV/AIDS and
Females under resource provisions of university and country at large
• Barriers faced by vulnerable groups of people (e.g. the people with disabilities and
HIV/AIDS) accessing humanitarian aid for education
• Assessment of risks and capacities of people with disabilities and different genders
• Mainstreaming Gender, HIV/AIDS and disability in activities through organizational
change
5 Admission Requirements
An applicant for the programme must:
• Have a University degree from a recognized institution
• Have B.Sc., in IT, IS or CS
• Oral and written entrance examination as required.
• Fulfill the general admission policy of the University
Page 11 of 84
• Fulfill the general SGS/CGPA admission requirements.
• Any other….( as per the rules and regulation of the university)
6 Graduation Requirement
The graduation requirements of this programme specify that the candidate has to:
Obtain a minimum of CGPA of 3.00 without more than one ‘C’
Defend a ‘research thesis work’ or ‘Project ‘which should be accepted by academic
Jury with minimum of satisfactory.
Any other... ( as per the rules and regulation of the university)
7 Programme Duration and Degree Nomenclature
Programme Duration: The duration of study shall be four semesters (two years) extended
up to maximum four years’ subject to conditions and approval of DGC.
Degree Nomenclature:
English
Master of Science Degree in Information Technology (M.Sc. in IT)
Amharic
የሳይንስ ማስተር ዲግሪ በኢንፎርሜሽን ቴክኖሎጂ
8 Programme Profile 8.1 Structure of the Programme
In this programme, a candidate is required to complete a minimum of 36 credit hours of
course work and a preparation of an acceptable thesis (worth 6 credits) under the supervision
of a faculty member and an oral defense of the thesis before an examining committee or
academic Jury. The students/scholars have to finish and defend their thesis proposal before
the beginning of the second semester of his or her second year to be legible to register the
thesis work. DGC will be responsible to evaluate and approve students/scholars’ thesis
proposal.
Page 12 of 84
8.2 Credit Point of a Course Option Type Ratio Cr. hr. Theory Lab and
Project
No. of
hrs.
A Core & Specialization Electives 86% 36 22 hrs 39 hrs 976
Thesis 14% 6 0 hrs 18 hrs 288
Total 100% 42% 22 hrs 57 hrs 1264
B Core & Specialization Electives 93% 39 26 hrs 42 hrs 1088
Project 7% 3 0 9 144
Total 100% 42 26 hrs 51 hrs 1232
8.3 Programme Structure
The full M.Sc. degree comprises of four semesters: The scholars will undertake four
compulsory modules in the first, second and third semesters, and complete a research thesis
or project work in the final semester. The third semester comprises of two compulsory
modules together with a choice of two from elective modules.
The program offers two plans /options:
Option A: course work with thesis,
Option B: course work with project,
Under Option A, the candidate is required to complete a minimum of 36 credit hours of
course work and a preparation of an acceptable thesis (worth 6 credits) under the supervision
of a faculty member and an oral defense of the thesis before an examining committee.
Under Option B, the candidate is required to complete a minimum of 39 credit hours of
course work including a compulsory project work worth 3 credit hours.
The number of students that will join each option depends on three factors: availability of
advising staff, first year CGPA, and the interest of the student. Priority to join Option A will
be given to those interested students with relatively higher CGPAs. Similarly, selection of
interested students to join Option B is made on CGPA of the remaining students. Students
that join options A and B are encouraged to identify problems that they will work on. The
assignment of students to each option should be completed at the end of the first year so that
students assigned to Option A can start working on their research beginning the first semester
of the second year. These students have to finish and defend their thesis proposal before the
Page 13 of 84
beginning of the second semester to be legible to register the thesis work. The Departments
DGC will be responsible to assign students to these two options.
The Programme leads to a degree awarded by Arba Minch Institute of Technology (AMiT),
Arba Minch University, Arba Minch, Ethiopia.
8.4 Course List 8.4.1 Core Courses
A graduate scholar should take the following core courses. Please refer to Annex. A for
course coding convention
Course code Course Title Cr. Hours
IT601 Research Methodology in IT 3
IT611 Foundation of IT & Project Management 3
IT612 Object-Oriented Software Analysis & Design 3
IT613 Advanced Network Technologies 3
IT621 Distributed & Cloud Computing Systems 3
IT622 Information and Knowledge Management 3
IT623 Artificial Intelligence and Expert Systems in Business Informatics 3
IT624 Network Security and Management 3
IT701 Seminar on Advanced Topics in Information Technology 3
IT711 Design Patterns & Web Applications Development Technologies 3
8.4.2 Elective courses
A student should take a minimum of six credit hours’ worth elective course if he /she have
opted for Option A, a minimum of nine credit hours’ worth elective courses if he /she have
opted for Option B. Please refer to Annex A for course number coding convention. Any two
of these courses will be elected based on the availability of academic staffs and scholars
interest. Only courses with available instructors and elected by total number of scholars
greater than six/half will be approved by the DGC to be offered.
Page 14 of 84
Course code Course Name (Title) Cr. Hours
IT712 Computer System Security & Cyber Forensics 3
IT713 Converging Technologies & Multidisciplinary Informatics 3
IT714 Information Security & Privacy 3
IT715 Green ICT strategies & Network Economy 3
IT716 Advanced Multimedia Systems. 3
IT717 Natural Language Processing (NLP) 3
IT718 Wireless and Mobile Computing 3
IT719 Data warehousing & Data Mining 3
IT730 Agile & Scrum Software Development Technologies 3
IT731 Geographical Information Systems 3
IT732 Enterprise Systems and ERP 3
8.4.3 Thesis /Project module
A student under Option A takes thesis research module and a student under Option B takes
project module.
Course Code Course Title Cr. Hrs.
IT702 Thesis 6
IT703 Project 3
The student is expected to register for six credit hour in case of Option A (2 Cr in 2nd year
first semester and 4Cr 2nd year second semester) of thesis work (IT702) or in case of Option
B, (1 Cr in 2nd year first semester and 2 Cr 2nd year second semester) Project work (IT703).
8.5 Course Schedule 8.5.1 Option A-
Year Semester I Semester II
1st
Year
IT611 Foundation of IT & Project
Management [3 Cr]
IT621 Distributed and Cloud
Computing Systems [3 Cr]
IT601 Research Methodology in IT [3
Cr]
IT622 Information and Knowledge
Management [3 Cr]
IT612 Object-Oriented Software
Analysis & Design [3 Cr]
IT623 Artificial Intelligence and
Expert Systems in Business
Page 15 of 84
Informatics [3 Cr]
IT613 Advanced Network
Technologies [3 Cr]
IT624 Network Security and
Management [3 Cr]
2nd
Year
IT701 Seminar on Advanced Topics in
Information Technology [3 Cr]
IT702 Thesis work [6 Cr]
IT711 Design Patterns & Web
Applications Development
Technologies[3 Cr]
IT7XX Elective 1[3 Cr]??
IT7XX Elective 2[3 Cr]
IT702 Thesis work
8.5.2 Option B-
Year Semester I Semester II
1st
Year
IT611 Foundation of IT & Project
Management [3 Cr]
IT621 Distributed and Cloud
Computing Systems[3 Cr]
IT601 Research Methodology in IT [3
Cr]
IT622 Information and Knowledge
Management[3 Cr]
IT612 Object-Oriented Software
Analysis & Design[3 Cr]
IT623 Artificial Intelligence and
Expert Systems in Business
Informatics[3 Cr]
IT613 Advanced Network
Technologies[3 Cr]
IT624 Network Security and
Management[3 Cr]
2nd
Year
IT701 Seminar on Advanced Topics in
Information Technology[3 Cr]
IT703
IT7XX
Project work[2 Cr]
Elective [3 Cr]
IT711 Design Patterns & Web
Applications Development
Technologies[3 Cr]
IT7XX Elective 1[3 Cr]
IT7XX Elective 2[3 Cr]
IT703 Project Work [1]
8.5.3 Justification of the Schedule
Page 16 of 84
Scholars have to be given practical projects throughout the course, and all Information
Technology courses require a series of practical exercises/laboratory demonstration sessions,
understanding of new software tools and technologies. Therefore, considering such nature of
the field, the duration of a course shall be semester based.
8.5.4 Assessment/Evaluation
Students/scholars will generally be assessed continuously until the completion of their study.
Individual assignments, group assignments, presentations of scholarly seminars and class
participation are the main methods to assess scholars’ performance. Specific assessment
method should be available on the respective course outlines, which would be distributed to
students/ scholars by respective teacher one week before the commencement of each module.
8.5.5 Quality Assurance
Appointment of qualified and experienced academic staff.
Facilitate access to standard text books / reference books/Journals and E-Books.
Deliver Practical Demo & standard video tutorials
Maintain student / teacher ratio.
Establish Regular advisory cell for students.
Periodic Evaluation through research & project assignment, internship, link
programme, term tests, self-study assignments, presentations and written
examinations.
Compilation of teaching-learning materials and provide to students.
Monitoring of academic staff performance by semester end evaluation.
Timely Communication of the evaluations reports to the teachers & students.
Standardization of curriculums and exams by senior academicians/Professors.
Make provision for Programme evaluation after every three years
Make provision for programme accreditation by external accrediting agencies (if any).
Establishing Graduates Alumni Network to support career development;
Make provisions for Research Thesis or Project evaluation by external examiners
Page 17 of 84
9 Course Profile 9.1 Course for Research Skills Development
The programme will have one course on research methodology. The course research
methodology (IT601) shall be offered by senior researcher in the field of Information
Technology or related fields. It will cover the basic and advanced techniques and methods of
research and research based projects; specifically, in the field of Information Technology.
This course enables students to-
• Study and analyze the technologies covered in every course with research perspective
• Observe & Formulate Problems in order to initiate new research projects
• Design, develop, customize, adopt and transfer every IT systems with research
orientation and perspectives
9.2 Course for Scientific & Professional Development in advanced technologies
The program will have one course that can help to develop the professional expression and
presentation ability in terms of seminar, conference, workshop, symposium and scientific
societies or congress in scientific technology environments. The course Seminar on
Advanced Topics in Information Technology (IT 701) will serve the purpose of building the
professional expression capability and presentation ability of the scholars while it gives the
chance to discuss the current and hot topics and issues in Information Technology. This
course enables students to-
• Develop and demonstrate the professional expression and presentation ability
• Initiate scientific events and organize with professional maturity
• Observe and Identify the scientific topics for seminar or conference, symposium or
workshops and design events sites, advertise them to scientific community, invite
keynote speeches, publish, index presentations with ISSN number to the world
community
• Observe new technology needs & paradigm shifts in order to organize event for
professional gathering with professional structure
Page 18 of 84
9.3 Course Syllabus
IT601 Research Methodology in IT
Course Name: Research Methodology in IT
Course Code: IT601
Pre-Requisite: None
Credit Hours: 3
Course Description: The course “Research Methodology in IT “is designed to teach how to
initiate a research in IT and writing its research outcomes in scientific manner. In this course,
the students will be able to learn techniques that are used to initiate a research, carryout
research activities, and write the research papers/ thesis/dissertations and research reports.
Current research topics are also exposed, so that their research writing skills through
formulation of problems in IT domain, preparing research papers/ research thesis on a
specified research topic in IT can be explored either in group or individuals. This course will
enable scholars to ensure importance of research in real life and in organizations, especially
in techno-economic competitive environment. At the time of completion of a research, a
formal presentation of the research results is required to be presented for defense/viva.
Learning Objectives: At the end of the course students will be expected to:
Have an understanding of how established techniques of research and enquiry are
used to extend, create and interpret knowledge in Information Technology.
Have a conceptual understanding sufficient to: (i) evaluate critically current research
and advanced scholarship in IT, and (ii) propose possible alternative directions for
further work.
Be able to deal with complex issues at the forefront of the academic discipline of IT in
a manner, based on sound judgments, that is both systematic and creative; and be able
to communicate conclusions clearly to both specialists and non-specialists.
Demonstrate self-direction and originality in tackling and solving problems within the
domain of IT, and be able to act autonomously in planning and implementing
solutions in a professional manner.
Make use of the qualities and transferable skills necessary for employment requiring:
(i) the exercise of initiative and personal responsibility, (ii) decision making in
Page 19 of 84
complex and unpredictable situations, and (iii) the independent learning ability
required for continuing professional development.
Participate within the professional, legal and ethical framework within which they
would be expected to operate as professionals within the IT industry.
Have the skills set to be able to continue to advance their knowledge and
understanding, and to develop new skills to a high level, with respect to continuing
professional development as a "self-directed life-long learner" across the discipline of
IT.
Be able to define and plan a program of independent research.
The module contributes to subject based learning outcomes in the M.Sc. in Information
Technology programme.
Course Contents:
Chapter 1. Overview of Research
Introduction
What is IT Research?
Dialectics of Research
Models of Argument
Proofs by Demonstration
Empiricism
Mathematical Proof
Hermeneutics
Research and its scope in IT domain
Technological value of IT research
Types of research studies confined to IT
Chapter 2. Tools of Research
The library and its resources as a tool of research
The computer and IT tools as tool of research for editing, Data Processing,
indexing, referencing
The human mind as a tool of research for analytics
Chapter 3. The Research Process in IT
Page 20 of 84
Identification and selection of a Research topic/problem in IT
Problem formulation in IT
Evaluating the research problem
Dimensions of the research problems
Ordering the topics in a research proposal
Developing the hypothesis & Objectives
Determining research design for IT Problems
Designing sample and collection of data
Analyze and interpret the data
Prepare the scientific research report
Chapter 4.Review of the literature
Understanding the role of the review of literature
Sources and strategies for locating related literature in Print & digital Media
Evaluating, Organizing and documenting the information collected
Evaluating, Organizing and documenting the information collected
Different Levels of information
Information sources
– Indexes and bibliographies
– Dictionaries
– Encyclopedias
– Handbooks
– Directories
– Online databases
Searching bibliographic database
Using search engines and online archives for searching the information over Web
Chapter 5. Planning and writing the research proposal
Planning a general approach
Planning data collection over IT platforms
Linking data collection in research methodology
Chapter 6. Research methodology
Qualitative
Quantitative
– Statistical techniques for analyzing quantitative data
Page 21 of 84
Design research methods
Chapter 7. Research Design
What is research design in IT?
Essentials of IT research design
Classification of research designs
– Action Research
– Design research
– Constructive research
– Exploratory research
– Secondary data analysis
– Experience surveys
– Focus groups
– Two-stage designs
– Descriptive studies
– Experimentation
Chapter 8. Writing the research report
The preparatory or preliminary papers
– Letter of transmittal
– The title page
– Acknowledgements
– Table of contents
– List of tables
– List of figures
– Abbreviations or glossary of technical words used in the report
– Abstract or summary of the entire report
The body of the research report:
– Introduction
– Literature review
– Methodology
– Findings (Results and Discussions)
– Summary and
– Conclusions and recommendations
The Appended section:
Page 22 of 84
– Appendix
– Bibliography
– Individual citation
– Summary:
– For books:
– For Magazines, Journal Articles and Newspapers:
Further Rules:
I. CHAPTER (CENTER HEADING)
1.1 Side heading
1.1.1 Paragraph side heading
1.1.1.1 Fourth level heading.
Tables and Figures:
Teaching Strategy: The course will be offered through lectures, class discussions,
Laboratory work, reading assignment.
Method of Assessment: The course will be assessed by writing assignment papers and
written or oral examination.
Assessment Breakdown:
Continuous Assessment: …………………50%
Final Examination ………………………..50%
Course Requirement: Scholars are required to attend lectures, lab sessions, seminars,
discussions individually or in groups. Examination and assignments are compulsory.
Reference Books/ Material:
1. Christian W. Dawson: Projects in Computing and Information Systems (A Student’s
Guide). Addison Wesley, 2005.
2. Justin Zobel: Writing for Computer Science. Springer, 2004.
3. Paul D. Leedy, Jeanne Ellis Ormrod: Practical Research Planning and Design, 8thedition,
Pearson, 2005
4. Miller, Casey, and Kate Swift, The Handbook of Nonsexist Writing, Harper and Row.
5. Sherman, Alan T., “How to solve and write up homework problems” (January 29, 1991).
Page 23 of 84
6. Letitia Baldrige’s New Complete Guide to Executive Manners, Rawson Associates (NY,
1993).
7. Strunk, William Jr.; and E. B. White, the Elements of Style, Macmillan (New York,
1972).
IT611 Foundation of IT & Project Management
Course Name: Foundation of IT & Project Management
Course Code: IT611
Pre-Requisite: None
Credit Hours: 3
Course Description: The course “Foundation of IT & Project Management’ is designed to
teach the basic and advanced foundations, principles and evolution of IT and IT oriented
Project Management tools and techniques used in different phases of a Professional Project.
The major aim of this course is to teach the IT students/scholars about project and research
based projects. The course explains how to initiate simple and research oriented IT projects
and how to draft/ write in professional structured and scientific manner. In this course the
scholars will be able to learn the techniques that are in use for initiate projects carry on
project activities, and writing the project reports in influential and professional style. They
are also exposed to current IT projects in IT, and allowed to exercise their Professional
technical writing skills through preparing project or research project proposals on a specified
IT topic either in group or individual. The course also includes latest professional practices
for Interdisciplinary, Cross disciplinary or multidisciplinary projects and professional
motivation. At the time of completion of the project a formal presentation of the results is
required.
Learning Objectives: On successful completion of the course scholars will be able to:
describe foundation of ITs and their emergence
provide a deep and systematic understanding of the nature and conduct of IT and its
projects in critical, cost effective and time intense manner with research orientation
acquire sound understanding of latest Project Management tools and techniques
used in IT industry for Project design and development
explain how and what critical measures should be take into consideration for IT
projects
Page 24 of 84
equip scholars with the ability to undertake independent IT projects with research
flux
acquire sound understanding of technological strategies for case analysis and
selection of appropriate most viable techniques in IT industry
Equip scholars of the Legal, Social, Ethical and Professional (LSEP) issues
applicable during handling large IT projects
Course Contents:
Chapter 1. Overview of IT Project Management Change as Universal Law Foundation of IT as Change Technology Why IT? - Basics of Information Technology, including Computer system,
concept of memory, storage devices, software and communication Technology Why Software /Xwares? - Systems Software (Oss…), Applications Software
(word processing, electronic spreadsheet…) What is IT domain of Applications? What is Societal impacts of IT? Importance of IT project management - Defining project? Why Project
Management, Problems with IT Projects, Define Project Management?
Stages of Project - The Feasibility Analysis and Study, the Cost-benefit Analysis,
Project Planning, Project Execution and the Life Cycles
The Stakeholder analysis of Project - Partners of a project, Project Management
Frameworks, The Role of Project Manager, Tools in Project Management
Chapter 2. IT Project Planning Phase Integration Management- Defining Integration Management
Scope Management- Defining Scope Management, Professional methods for
Selecting Projects, Project Charter, Scope Statement, Work Breakdown Structure
(WBS)
Systematic Project Planning- Introduction to Project Planning, Steps in Project
Planning
Practical demos on Project management tools
Chapter 3. IT Project Scheduling Time Management- Importance of Project Schedules, Scheduling techniques and
sequential activities
Drawing Project Network Diagrams
Chapter 4. IT Project Cost Management
Page 25 of 84
Principles of Project Cost Management
Resource Planning
Cost Estimating
Cost Budgeting
Cost Control
Chapter 5. IT Project Quality Management Defining attributes in Quality of IT Projects
Stages of IT Quality Management- Planning, Assurance, Control,
Quality Standards
Quality Control Tools and Techniques
Chapter 6. IT Project Human Resources Management Defining Project Human Resources Management?
Managing People
Organizational Planning
Issues in Project Staff Acquisition and professional team development
Chapter 7. IT Project Communication Management Communications Planning
Information Distribution
Performance Reporting
Administrative Closure
Suggestions for Improving Project communications
Practical Demo on Technology enabled communication for assigning and
monitoring
Chapter 8. IT Project Risk Management Why Project Risk Management
Common Sources of Risk in IT projects
Risk Identification
Risk Quantification
Risk Response Development and Control
Case analysis for Risk Management
Chapter 9. IT Project Procurement Management Importance of Project Procurèrent Management
Procurèrent Planning
Sollicitation
Page 26 of 84
Source Selection
Contract Administration
Contract Close-out
Chapter 10. IT Project Management Process Groups Introduction to Project Management Process Groups
Project Initiation
Project Planning
Project Executing
Project Controlling and Configuration Management
Project Closing
Chapter 11. Advancements in IT Project Management IT Project Management over Organizational Intranets
Green Design strategies in IT project Management
Agile Techniques in IT Project Management
Teaching Strategy: The course will be offered through lectures, class discussions, practical
demo, project work and reading assignments.
Method of Assessment: The course will be assessed by writing assignment papers, prepare
project document and writing written or oral examination.
Assessment Breakdown:
Continuous Assessment………………….50%
Final Examination ……………………….50%
Course Requirement: Scholars are required to attend lectures, seminars, discussions
individually or in groups. Examination and assignments are compulsory.
Reference Books/Material:
1. Ireland, R., Hughes, B., West, B., Smith, N., & Shepherd, D. I. (2012). Project
Management for It-Related Projects. BCS, The Chartered Institute.
2. Willcocks, L. P., & Sykes, R. (2000). Enterprise resource planning: the role of the
CIO and it function in ERP. Communications of the ACM, 43(4), 32-38.
3. Mitchell, V. L., & Zmud, R. W. (1999). The effects of coupling IT and work process
strategies in redesign projects. Organization Science, 10(4), 424-438.
Page 27 of 84
4. A Guide to the Project Management Body of Knowledge, Project Management
Institute, Pennsylvania, USA (2000)
5. “Information Technology Project Management” Kathy Schwalbe, International
Student Edition, THOMSON Course Technology, 2003
6. Basics of Software Project Management, NIIT, Prentice-Hall India, 2004
7. Software Project Management in Practice, Pankaj Jalote, Pearson Education, 2002
8. Software Project Management, A Concise Study, S.A. Kelkar, Revised Edition,
Prentice-Hall India, 2003
IT612 Object-Oriented Software Analysis & Design
Course Name: Object-Oriented Software Analysis & Design
Course Code: IT612
Pre-Requisite: None
Credit Hours: 3
Course Description: The course is about building large and complex software systems using
object oriented approaches and techniques. It deals with system modeling and model
implementation techniques.
Learning Objectives: On successful completion of the course scholars will be able to:
Describe objects, classes and Object Oriented approaches
Construct modeling diagrams using UML
Prepare developmental documents: RAD, SDD, ODD, TPD and UMD
Manage software development process
Test developed software systems
Develop team work spirit
Course Contents:
Chapter 1 Overview
Software crisis
Design approaches
OO Software development activities
Chapter 2 Unified Modeling Language(UML)
Modeling concepts
Page 28 of 84
Modeling diagrams: use case, class, sequence, state chart , activity
Chapter 3 Requirements Elicitation
An overview of requirements elicitation
Requirements elicitation activities: identifying actors, scenarios, use cases,
objects
Chapter 4 Requirements Analysis
Analysis concepts
Analysis activities: identifying entity, boundary and control objects, mapping
use cases to objects
Chapter 5 System Design
System design concepts
System Design activities: identifying subsystems, defining persistent data stores
and access control, mapping subsystems to components
Chapter 6 Object Design
Design concepts
Object design activities
Chapter 7 Implementation and Testing
Chapter 8 Latest Trends in OOSAD (if any)
Teaching Strategy: This course will be offered through lectures, presentations, class
discussions, laboratory work and Group project work. Scholars present their assignments, and
get feedbacks.
Method of Assessment: This course is assessed by a project and an examination. The project
is a group work and assessed in 5 phases:
Phase 1: Requirements elicitation and analysis- scholars will produce requirements
analysis document (RAD) of their project.
Phase 2: System and OO Design- scholars will produce system design document
(SDD) including OO design of their project.
Phase 3: Implementation- scholars will implement their design.
Phase 4: Test plan document- scholars will produce test plan document (TPD) to test
their system.
Phase 5: User manual- scholars will produce a user manual (UMD) for their system.
Page 29 of 84
Each phase will be defended/demonstrated by the scholars and feedbacks will be given to
them by the instructor.
Assessment Breakdown:
Final Examination: ………………………25%
Individual Assessments ………………….25%
Group Project: …………………………...50%
Course Requirement:
Every scholar should attend all lectures.
Scholars should group themselves into 3 for the project work and identify their own
project titles on the first day of the class.
Scholars should submit every assignment according to the deadline.
Scholars should present/demonstrate their assignments.
Scholars should appear in the written examination.
Reference Books/ Material:
1. Gady Booch, Object-Oriented Analysis and Design with Applications, Addison-Wesley.
2. Waman S.Jawadekar, Software Engineering: Principles and Practice, TATA McGraw-
Hill.
3. David William Brown, Object-Oriented Analysis, John Wiley.
4. Scott W.Ambler, the Object Primer, Cambridge University Press.
5. E-Book on OO Software Development.
IT613 Advanced Network Technologies
Course Name: Advanced Network Technologies
Course Code: IT613
Pre-Requisite: None
Credit Hours: 3
Course Description: This course covers Advanced Networks focuses on high-speed
networks, which carry integrated multi-service traffic such as voice, video and data. Quality
of service requirements for various types of traffic are considered, together with fixed and
cellular technologies and the role each plays in providing broadband infrastructures. Network
Page 30 of 84
protocols will be explained and contrasted, and problems of network interconnection and
recent developments such as intelligent networks will also be covered.
Learning Objectives: At the end of this course scholars will be able:
Understand the principles of the Networking and Internet protocols,
Discuss the limitations of the current Internet and its service model,
Justify the main ideas behind some of the current innovations in networking
including, protocols, wireless access systems,
Assess possible research opportunities and difficulties within the course scope.
Course Content:
Chapter 1 Overview of Computer Networks
Uses of computer networks
Overview of Data Communications (types of connection, physical
topology, network categories, the Internet)
Network Protocols and Standards
Network (Reference) Models (OSI and TCP/IP)
Chapter 2 The OSI Network Reference model
Layers in OSI: Physical Layer, Data Link Layer, Network Layer,
Transport Layer, Session Layer, Presentation Layer, Application Layer
Chapter 3 TCP/IP Model and their Differences with OSI
Layers in the TCP/IP Model: Link Layer, Internet Layer, Transport
Layer, Application Layer
OSI and TCP/IP layering differences
Managing TCP/IP networks: Management models and functions
Chapter 4 Local and Wide Area Networks
LANs, Ethernet (Traditional Ethernet, Fast Ethernet and Gigabit
Ethernet), Token bus, Token ring, Wireless LANs (802.11 and
Bluetooth),Virtual LANs
Introduction to WANs
Switching (circuit, message and packet switching)
Chapter 5 Next generation networking: Motivation and Challenges
Page 31 of 84
IPv6 Internetworking and mobility, internetworking with IPv6; IPv6
extensions and functionality, routing advances, mobile IP networking,
micro and macro mobility,
VoIP fundamentals: how packetized voice works, voice quality, SIP, soft
switches and gateways, PBX replacement
Self-organizing networks: Ad-hoc, sensors and mesh networks;
applications; communication support: information dissemination,
medium access mechanisms; self-organizing concepts in infrastructure
networks.
New trends in computer networking
Teaching Strategy: This course will be offered through lectures, presentations, class
discussions, laboratory work and Group project work. Students/scholars will present their
assignments, and get feedbacks.
Method of Assessment: This course is assessed by written exams, lab assignments, reports
and presentations of assignments.
Assessment Breakdown:
Continuous Assessment: ……………………………30%
Group project: ………………………………………30%
Final Examination: ………………………………….40%
Course Requirement:
Every student should attend all lectures.
Students should group themselves into 3 for the project work and identify their own
project titles from the list of categories of topics that will be provided by the
instructor.
Students should submit every assignment and project work according to the deadline.
Students should present/demonstrate their work.
Students should appear in the written examination.
Reference Books/ Material:
1. Andrew S. Tannenbaum, Computer Networks, Prentice Hall, 4th edition, 2003
2. B. A. Forouzan, Data Communications and Networking, McGraw Hill, 3rd edition,2003.
Page 32 of 84
3. W. Stallings, Data and Computer Communications, Prentice Hall, 7th edition, 2004.
4. W. Stallings, High-Speed Networks and Internets: Performance and Quality of Service,
Prentice Hall, 2nd edition, 2002.
5. F. Halsall, Data Communications, Computer Networks and Open Systems, Addison-
Wesley, 4th edition, 1996.
6. G. Held, Data over Wireless Networks, Bluetooth,WAP and Wireless LANs, McGraw
Hill, 2000.
7. S. Hagen, IPv6 Essentials, O Reilly, 2002.
8. H. Soliman, Mobile IPv6 - Mobility in a wireless Internet, Addison-Wesley, 2004.
9. C. Perkins, RTP: Audio and Video for the Internet, Addison-Wesley Professional, 2003
10. O. Hersent, J. P. Petit, D. Gurle, IP Telephony: Deploying Voice-over-IP Protocols,John
Wiley & Sons, 2005.
11. J. Davidson, Peters, B. Gracely, Voice over IP Fundamentals, Cisco Press, 2000.
IT621 Distributed and Cloud Computing Systems
Course Name: Distributed and Cloud Computing Systems
Course Code: IT621
Pre-Requisite: None
Credit Hours: 3
Course Description: The course is designed to help scholars to understand the concepts of
Distributed Systems and explore the knowledge of their architecture, design and
implementation issues involved in real world. The scholars will be trained to apply current
implementation of distributed systems technologies over Cloud based infrastructures and
their advancements, and allowed to exercise their learning’s into conducting research either
in group or individually. At the time of completion a formal presentation of the results of
their research is also anticipated.
Learning Objectives: By the end of this course scholars will be able to:
Understand issues in designing, developing and using distributed systems
Explain how systems communicate in distributed systems effectively and securely
Realize issues and difficulties in clock synchronization over several machines
Know needs of replica and redundancy and apply different method that are used in
handling consistency and replication
Page 33 of 84
Know why high fault tolerance in Distributed system and its finest implementation
over Cloud infrastructures are required and how fault tolerant systems are built
Course Contents:
Chapter 1 Introduction
1.1 Basic definitions and the background of distributed systems
1.2 Goal of distributed systems
1.3 Types of distributed Systems
Chapter 2 Architectures
2.1 Architectural styles
2.2 System architectures
Chapter 3 Processes
3.1 Threads and their implementations
3.2 Anatomy of clients
3.3 Servers and design issues
3.4 Code migration
Chapter 4 Communication
4.1 Network protocols and standards
4.2 Remote procedure call (RPC)
4.3 Stream-oriented communication
4.4 Multicast communication
Chapter 5 Naming
5.1 Names, identifiers and addresses
5.2 Flat naming
5.3 Structured naming
5.4 Attribute-based naming
Chapter 6 Synchronization
6.1 Clock synchronization
6.2 Logical clocks
6.3 Mutual exclusion
6.4 Election algorithms
Chapter 7 Consistency and replication
7.1 Reason for replication
7.2 Data-centric consistency models
Page 34 of 84
7.3 Client-centric consistency model
7.4 Replica management
7.5 Consistency
Chapter 8 Fault Tolerance
8.1 Introduction to fault tolerance
8.2 Process resilience
8.3 Reliable client-server communication
8.4 Reliable group communication
8.5 Recovery
Chapter 9 Introduction to Cloud Computing
9.1 Cloud Computing Definition
9.2 The Evolution of the Cloud
9.3 What are Cloud Services?
9.4 Cloud Service Attributes
9.4.1 Access to the Cloud
9.4.2 Hosting over Cloud
9.4.3 Service Provisioning
9.4.4 Service Pricing
9.5 User and System Interface
9.6 Shared Resources
Chapter 10
10.1 Characteristics of Cloud Computing
10.1.1 Rapid elasticity
10.1.2 Pay per use
10.1.3 Independent resource pooling
10.1.4 Network access
10.1.5 On-demand self-service
10.2 The Five Levels of Redundancy
10.2.1 Physical
10.2.2 Virtual resource
10.2.3 Availability zone
10.2.4 Region
10.2.5 Cloud
Page 35 of 84
Chapter 11
11. Classification, Architectures and Models
11.1 Cloud Deployment Models
o Public Cloud
o Private Cloud
o Hybrid Cloud
o Community Cloud
11.2 Cloud Delivery Models
o Software as a Service (SaaS)
o Platform as a Service (PaaS)
o Infrastructure as a Service (IaaS)
11.3Cloud Architectural Models
o Design for Failure (DFF)
11.4Cloud Architecture
o Customization
o Service Reliability and Disruptions
Integration Challenges- Loss of Control, Emerging
Technology, Vendor Choices, Infrastructure
Limitations, Negligence
Chapter 12
12. Security in the Cloud
12.1Data Security and Control
12.2Provider Loss
12.3Subpoenaed Data
12.4Lack of Provider Security
12.5Encryption
12.6Regulatory Compliance
12.7 Cloud Threats
12.7.1 Cloud Security vs. Traditional IT
12.7.2 Cloud Security Attributes
12.7.3 Security as a Service from the Cloud
12.7.4 Cloud and Security Risks
12.8 Data Confidentiality and Privacy
12.8.1 Service Availability
Page 36 of 84
12.8.2 Cloud Risk Summary
12.8.3 Real World Issues with Cloud Computing
12.8.4 Cloud Security Alliance
12.8.5 National Institute of Standards and Technology
12.9 Cloud Computing and Organizational work culture &Business
12.9.1 Cloud adoption Modeling
12.9.2 Computing Culture Re-engineering
12.9.3 Intranet over Clouds
12.10 Lab Demo on SaaS, PaaS, SaaS, SECaaS etc.
Teaching Strategy: This course will be offered through lectures, presentations, class
discussions, laboratory work and group project work.
Method of Assessment: This course is assessed by written exams, lab assignments, reports
and presentations of assignments.
Assessment Breakdown:
Lab assignment:…………………………15-25%
Assignments:…………………………….15-25%
Final examination………………………..50-60%
Course Requirement: Scholars will be required to attend all lectures and lab sessions, do
their reading and lab assignments individually or in groups as the case may be and submit on
time, make presentations of assignments, read all reading materials provided and/or referred,
and appear in all exams.
Reference Books/ Material:
1. A. S. Tanenbaum and Maarten van Steen, Distributed Systems, Principles and
Paradigms, Prentice Hall, 2nd Edition, 2006.
2. G. Coulouris, J. Dollimore, and T. Kindberg, Distributed Systems, Concepts and
Design, Addison Wesley, 4th edition, 2005.
3. A. S. Tanenbaum, Computer Systems, 2nd edition, 2003.
4. S. Mullender, Distributed Systems, 2nd edition, Addison-Wesley, 1993.
5. Hwang, Kai, Geoffrey Fox, and Jack Dongarra. "Distributed and Cloud
Computing." (2011).
Page 37 of 84
IT622 Information and Knowledge Management
Course Name: Information and Knowledge Management
Course Code: IT622
Pre-Requisite: None
Credit Hours: 3
Course Description: This module focuses on to develop an appreciation of the ideas
underpinning different theories of knowledge; Compare alternative approaches to gaining
business value from knowledge management initiatives; and Design and plan knowledge
management initiatives for a particular organization in terms of its organizational culture,
structure and business strengths
Learning Objectives: At the end of this course scholars will be able to:
Define Knowledge Management (KM), learning organizations, intellectual capital
and related terminologies in clear terms and understand the role of knowledge
management in organizations
Demonstrate an understanding of the history, concepts, and the antecedents of
management of knowledge and describe several successful knowledge management
systems
Identify and select tools and techniques of KM for the stages of creation, acquisition,
transfer and management of knowledge
Analyze and evaluate tangible and intangible knowledge assets and understand
current KM issues and initiatives
Evaluate the impact of technology including telecommunications, networks, and
Internet/intranet role in managing knowledge.
Identify KM in specific environments: managerial and decision making communities;
finance and economic sectors; legal information systems; health information
Demonstrate an understanding of the importance of intellectual capital to benefit the
competitive advantage in organizations.
Specify application packages in KM and the issues in designing and developing
knowledge databases.
Develop a working knowledge in the area through focused projects.
Articulate various career options in the field.
Page 38 of 84
Understand how to achieve organizational objectives by creating, sharing and using
knowledge
Understand contemporary issues, trends, innovations and forces for change in
information and knowledge practices, as well as the broader political, policy and
technological contexts
Develop understanding of ethical practice and the ability to operate with integrity,
rigor, self-reliance and cooperation in professional contexts
Demonstrate creative, critical, reflective problem-solving capabilities in the context of
their professional roles and a commitment to lifelong learning, and
Demonstrate capabilities in planning and implementing a project.
Course Contents:
Chapter 1. Introduction
Overview of knowledge management, the nature of knowledge, knowledge creation
and KM processes, Kinds of knowledge and their interaction
Chapter 2. Concepts and Guidelines
The organizational context of KM, Guidelines for undertaking personal, group and
corporate knowledge management, KM assessment of an organization
Chapter 3. Communities of KM
The factors influencing KM, The contribution of IT to KM practice, the social
technical and business oriented views of KM
Chapter 4. Codification
Modes of Knowledge Conversion – Codification Tools and Procedures – Knowledge
Developer’s Skill Sets – System Testing and Deployment – Knowledge Testing –
Approaches to Logical Testing, User Acceptance Testing – KM System Deployment
Issues – User Training – Post implementation.
Chapter 5. Knowledge Transfer and Sharing
Technologies in KM- Groupware, Workflow, Content/document Management,
Enterprise portals, E-Management, Scheduling and planning, Tele-presence, AI
tools, digital library and repository
Page 39 of 84
Chapter 6. Research, Review of selected published case studies
Teaching Strategy: This course will be offered through lectures, presentations, class
discussions, laboratory work and group project work.
Method of Assessment: This course is assessed by written exams, lab assignments, reports
and presentations of assignments.
Assessment Breakdown:
Lab assignment:…………………………15-25%
Assignments:…………………………….15-25%
Final examination………………………..55-65%
Course Requirement: Scholars are required to attend all lectures and lab sessions, do their
reading and lab assignments individually or in groups as the case may be and submit on time,
make presentations of assignments, read all reading materials provided and/or referred, and
site for all exams.
Reference Books/ Material:
1. Kimiz Dalkir, Knowledge Management in Theory and Practice - 2nd edition, The MIT
Press,2011
2. Elias.M. Award & Hassan M. Ghaziri – “Knowledge Management” Pearson Education
2003.
3. Jashapara, A, Knowledge Management, an Integrated Approach, Prentice Hall, Harlow,
Essex, UK, 2004
4. Geoff, T & Jones, T, Introduction to Knowledge Management, Burlington MA,
Butterworth Heineman, 2003
5. Awad, EM &Ghaziri, HM, Knowledge Management, Pearson Education Inc. 2004
6. Barnes, SE, Knowledge Management Systems: Theory and Practice. Thomson
Learning, 2002
7. Coakes, E, Willis, D & Clarke, S, Knowledge Management in the Socio-Technical
World: The Graffiti Continues, London: Springer, 2002
8. Firestone, M & McElroy, MW, Key Issues in the New Knowledge Management,
Butterworth Heinemann, 2003
Page 40 of 84
9. President and Fellows of Harvard College, Harvard Business Review on knowledge
management, Boston, Mass.: Harvard Business School Press, 1998
IT623 Artificial Intelligence & Expert Systems in Business Informatics
Course Name: Artificial Intelligence and Expert Systems in Business Informatics
Course Code: IT623
Pre-Requisite: Basics of Artificial Intelligence
Credit Hours: 3
Course Description: This module focuses on to develop an appreciation of the ideas
underpinning different theories of knowledge of AI, Business Informatics (BI) and Expert
Systems especially in Business domain; Compare alternative approaches to gain business
value from knowledge management initiatives; and effective decision making through AI &
Expert System for a particular organization in terms of its organizational past data, work
culture, structure and business strengths
Learning Objectives: By the end of this course scholars will be able to:
Demonstrate sophisticated information handling skills appropriate for professional
practice in diverse environments
Understand how to achieve organizational objectives by creating, sharing and using
AI and Expert systems in effective business information system designs
Understand contemporary issues, trends, innovations and forces for change in
information analytics patterns to take successful decisions in the broader political,
policy and technological contexts
Develop understanding of ethical practice and the ability to operate with integrity,
rigor, self-reliance and cooperation in professional contexts
Demonstrate creative, critical, reflective problem-solving capabilities in the context of
their professional roles and a commitment to lifelong learning, and
Demonstrate capabilities in planning and implementing a project.
Course Contents:
Chapter1. Artificial Intelligence
Definition of intelligence, Definition of artificial intelligence, Foundations of
Artificial Intelligence, Types of AI systems, modeling intelligence: adaptive and
Page 41 of 84
knowledge-based approaches to analysis and design of intelligent systems.
Application domains of artificial intelligence,
Chapter2. Expert Systems:
Evolution, Software Architecture- Rule based knowledge, Inference engine, Merits
and Demerits, Fields of application, Case studies, Knowledge Engineering
Chapter3. Theory of Business Informatics
Defining Business and Business Informatics, Information technology in business,
data visualization, exploration of databases, effectiveness of information system
projects and activities, automatic object identification, agent based systems, Web-
applications.
Chapter4. AI & Expert Systems in BI
Role of Artificial Intelligence systems in globalized organizational changes. Types of AI
systems used within organizations and their importance. Artificial intelligence in business,
industry and public sector organizations. Models of the organization and the provision of
knowledge and decision support. Overview of data and systems support for an organization:
Databases and data warehousing concepts, OLAP, Design Support Systems, Expert Systems,
Knowledge discovery systems; Knowledge analysis and the design of AI systems.
Knowledge acquisition from data bases, verification of the acquired knowledge and research
concerning integration of the knowledge. Intelligent support of evaluation of enterprise
management system effectiveness, open expert systems, AI in decision support systems
Teaching Strategy: This course will be offered through lectures, presentations, class
discussions, laboratory work and group project work.
Method of Assessment: This course is assessed by written exams, lab assignments, reports
and presentations of assignments.
Assessment Breakdown:
Lab assignment:…………………………15-25%
Assignments:…………………………….15-25%
Final examination………………………..50-65%
Page 42 of 84
Course Requirement: Scholars are required to attend all lectures and lab sessions, do their
reading and lab assignments individually or in groups as the case may be and submit on time,
make presentations of assignments, read all reading materials provided and/or referred, and
appear in all exams.
Reference Books/ Material:
1. B., J. Valacich, R. Watson, R. Zmud and et al. (December 2002). "What Every Business
Student Needs to Know About Information Systems". Communications of the
Association for Information Systems
2. K., R. Baskerville, J. Livari, D. Te'eni (2007). "Why the old world cannot publish?
Overcoming challenges in publishing high-impact IS research". European Journal of
Information Systems (EJIS)
3. Peter Jackson, Introduction to Expert Systems (3rd Edition
4. Peter Norving, Artificial Intelligence: A Modern Approach, 3e, Prentice Hall, 2010 -
Computers - 1132 pages
IT624 Network Security and Management
Course Name: Network Security and Management
Course Code: IT624
Pre-Requisite: None
Credit Hours: 3
Course Description: This course will cover a variety of topics that will prepare students who
wish to develop skills in information security management. This is a survey course that will
cover a full range of information security topics, ranging from technical areas like cryptology
and network security to a policy area like risk management. The level of depth will engender
an appreciation for the topics, and should stimulate an interest in taking follow-up courses to
attain greater depth. The technical subjects as well as other less technical topic areas where
security managers are required to lead an information security group and make sound
business decisions surrounding information systems and security will be explored.
Learning Objectives: Upon completion of this course, the scholars will be able to:
Describe the basics of cryptology, including: historical uses, mathematical basis, types
and examples of cryptography, and practical considerations for implementation.
Page 43 of 84
Discuss network fundamentals and security, including: network topologies, protocols,
address conservation, naming, network services, and network threats and
countermeasures.
Describe several models of access control, both at a theoretical and practical level.
Understand the problems and potential solutions associated with designing and
implementing operating system and application security.
Explain common practices and be able to cite some common approaches to risk
management and analysis.
Understand what is required to formulate and implement a plan for incident response.
Develop processes for system evaluation and assurance and understand what
frameworks are commonly used for governance and compliance activities.
Describe in depth on an information security topic of their choosing, as a result of
completing the final paper or project requirement.
Course Contents:
Chapter 1 Building a Secure Organization
1.1 Real threats that impact cyber security
1.2 A cyber security policy: the foundation of protection
Chapter 2 A Cryptography Primer
2.1 Securing data with symmetric encryption
2.2 Solving key distribution issues with asymmetric encryption
2.3 Ensuring integrity with hashes
Chapter 3 Verifying User and Host Identity
3.1 Assessing traditional static password schemes
3.2 Evaluating strong authentication methods
3.3 Authenticating hosts
Chapter 4 Preventing System Intrusions
4.1 Discovering system vulnerabilities
4.2 Encrypting files for confidentiality
4.3 Hardening the operating system
Chapter 5 Guarding Against Network Intrusions
5.1 Scanning for vulnerabilities
5.2 Reducing denial-of-service (DoS) attacks
5.3 Deploying firewalls to control network traffic
Page 44 of 84
5.4 Building network firewalls
Chapter 6 Ensuring Network Confidentiality
6.1 Threats from the LAN
6.2 Confidentiality on external connections
Chapter 7 Network Management
7.1 Network Monitoring
7.2 Simple Network Management Protocol (SNMP) Standards
Chapter 8 Emerging Technologies and Future Directions
Teaching Strategy: This course will be offered through lectures, presentations, class
discussions, laboratory work and group project work.
Method of Assessment: This course is assessed by written exams, lab assignments, reports
and presentations of assignments.
Assessment Breakdown:
Lab assignment:…………………………20%
Assignments:…………………………….15%
Course Project…………………………...25%
Final examination………………………..40%
Course Requirement: Scholars are required to attend all lectures and lab sessions, do their
reading and lab assignments individually or in groups as the case may be and submit on time,
make presentations of assignments, read all reading materials provided and/or referred, and
appear in all exams.
Reference Books/ Material:
1. Pfleeger, Charles P, and Shari L. Pfleeger. Security in Computing, 4th Edition. Upper
Saddle River, NJ: Prentice Hall, 2008. Print.
2. Anderson, Ross J. Security Engineering: A Guide to Building Dependable Distributed
Systems, Second Edition. Indianapolis, IN: Wiley, 2008. Print.
3. William R. Cheswick and Steven M. Bellovin, Firewalls and Internet Security, Addison
Wesley, 1994. ISBN 0-201-63357-4
4. James F. Kurose and KeithW. Ross, Computer Networking: A Top-Down Approach
Featuring the Internet, Addison Wesley, 2000. ISBN 0-471-11709-9.
Page 45 of 84
5. D. E. Comer, Internetworking with TCP/IP, vol. 1. Englewood Cliffs, New Jersey:
Prentice Hall, 3rd ed., 1995.
6. Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security –Private
Communication in a Public World, Prentice Hall, Englewood Cliffs, New Jersey,1995.
ISBN 0-13-061466-1
7. Bruce Schneier, Applied Cryptography (2nd ed.), John Wiley, 1996. ISBN0-471-11709-9.
IT701 Seminar on Advanced Topics in Information Technology
Course Name: Seminar on Advanced Topics in Information Technology
Course Code: IT701
Pre-Requisite: None
Credit Hours: 3
Course Description: The motivation for this course lies in the interest in providing a broad
viewpoint on IT by surveying recent developments, major results, and contemporary hot
topics with applied interest in today’s leading-edge research in IT. The main focus of this
course is on topics of current interest in IT. It also enables a student to be familiar with
professional practices in seminar, conference, symposium, workshop, and convention,
congress for presentation, publication, communication and articulation in order to organize
such events successfully and professional manner
Learning Objectives: On successful completion of the course students will be able to
identify current research topics in IT and their importance for development
seminar presentation and discussion on contemporary important and emerging topics
in IT
organizing scientific and scholarly events for keynote presentations, discussion and
scholarly scientific collaborations on contemporary issues in IT
professional publishing, showcasing and indexing scholarly scientific or research
outcomes for larger and global audience
Developing website and contents for advertisements of such events, design system for
automatic allocation for reviewing papers and publishing proceedings or reports with
indexing
Course Contents:
Page 46 of 84
Chapter 1 How to make a presentation
1.1 Verbal
1.2 Non-Verbal
1.3 LCD based Power Point
Chapter 2 How to write a Seminar report
2.1 Abstract
2.2 Introduction
2.3 Body
2.4 Conclusions
2.5 References &Appendix
Chapter 3 Group Discussion
3.1 Share the work with a group
3.2 Modularization of the work
3.3 Shareware Development
Chapter 4 Communication
4.1 Horizontal
4.2 Vertical
4.3 Upward
4.4 Downward
Chapter 5 Organization of Scholarly Scientific Events i.e. Seminar, Conferences and
publishing Proceedings
5.1 Defining Seminar, Symposium, Conference, Workshop, Convention, Congress
5.2 Organizational strategy
5.3 Design event website structure & Digital advertising
5.4 Review of Papers/Articles
5.5 Publication of proceedings
5.6 Taking ISSN/ ISBN Numbers, Indexing, Tagging in Digital world
Chapter 6 Seminar on emerging Topics/Technologies in IT
6.1 Seminar on Advanced Topic 1
6.2 Seminar on Advanced Topic 2
6.3 Seminar on Advanced Topic 3
6.4 Seminar on Advanced Topic 4
6.5 Seminar on Advanced Topic 5
6.6 Seminar on Advanced Topic 6
Page 47 of 84
Teaching Strategy: This course will be offered through lectures, presentations, class
discussions, laboratory work and Group project work. Students present their assignments, and
get feedbacks.
Method of Assessment: This course is assessed by class room activities, project and
examination.
Assessment Breakdown:
Classroom Presentations: …………………………………………………….…20%
Project/Organize Seminar workshop/ Conference/ Symposium: ………………40%
Examination oral and or written: ……………………………………….………40%
Course Requirement:
Every student should attend all classes.
Students should submit every assignment according to the deadline.
Students should present/demonstrate their assignments.
Students should appear in the written or oral examination.
Reference Books/ Material: Vary as it depends on the selected topics. It can be references
from open access knowledge repositories via internet
IT711 Design Patterns & Web Applications Development Technologies
Course Name: Design Patterns & Web Applications Development Technologies
Course Code: IT711
Pre-Requisite: None
Credit Hours: 3
Course Description: Evolution of distributed computing and web applications, enterprise
application development addressing presentation tier, business logic tier, and data access tier,
contemporary technologies for developing each tier for examples, Java Servlet, JSP, EJB, and
JDBC, will be described. Introduction to Ajax, Introduction to Web Services will be
included.
Learning Objectives: On successful completion of the course students will be able to
Page 48 of 84
Explain and configure the fundamental structure of a Web application, including the
server environment, protocols used, and other underlying systems.
Students will be able to evaluate and justify choices in design patterns and
technologies used in Web application development.
Apply the principles of progressive enhancement in front-end Web development using
HTML, CSS and JavaScript.
Create, interpret and apply planning artifacts commonly used in modern Web
application development, including the use of project specifications, wireframes, and
site maps in the Web development process.
Develop and troubleshoot secure Web application back-ends using an Apache, PHP
and MySQL technology stack.
Implement the basic principles of Web services from the perspective of both the client
and service provider.
Explain the inherently collaborative and cross-disciplinary nature of modern Web
application development, with consideration for the social, ethical, political and
economic factors that drive development and innovation forward.
Course Contents:
Chapter 1 HTTP
Chapter 2 HTML and XML
Chapter 3 JavaBeans
Chapter 4 Design Patterns (e.g., Abstract Factories and Model-View-Controller)
Chapter 5 Tag Libraries (JSTL)
Chapter 6 Relational Databases (MySQL/JDBC)
Chapter 7 Object-Relation Mapping tools (Bean Factory)
Chapter 8 Security (including SSL)
Chapter 9 AJAX (including JavaScript and the DOM)
Chapter 10 Web Services (SOAP/WSDL/UDDI)
Chapter 11 Frameworks (Struts)
Chapter 12 Internationalization
Chapter 13 Scalability and Performance Issues
Teaching Strategy: This course will be offered through lectures, presentations, class
discussions, laboratory work and group project work.
Page 49 of 84
Method of Assessment: This course is assessed by written exams, lab assignments, reports
and presentations of a project works.
Assessment Breakdown:
Labs: ………………………..30%
Projects: …………………….40%
Final Exam:...……………….30%
Course Requirement:
Every student should attend all classes.
Students should submit every assignment according to the deadline.
Students should present/demonstrate their assignments.
Students should appear in the written examination.
Reference Books/ Material:
1. Design Patterns By Erich Gamma, Pearson Education
2. Beck, Kent (October 2007). Implementation Patterns. Addison-Wesley. ISBN 978-
0321413093
3. Jendrock, Eric and et. al. The Java EE 5 Tutorial, online available at
http://java.sun.com/javaee/5/docs/tutorial/doc/
4. Wang and Qian. Component-Oriented Programming. Wiley 2005.
5. Gordon, A. COM and COM+ Programming Primer. Prentice Hall PTR, 2000.
6. O'Neil, Joseph. JavaBeans Programming from the Ground Up. Osborne/McGraw-Hill,
1998.
7. Qian et.al. Java Web Development Illuminated. Jones and Barlett. 2007
8. Microsoft. Developing XML Web Services and Server Components with Microsoft
Visual Basic.Net and Visual C#.Net, Microsoft Press, 2002.
9. Panda, Rahman, and Lane. EJB 3 in Action. Manning, 2007.
10. Szyperski, Clemens. Component Software beyond Object-Oriented Programming 2nd.
Addison Wesley, 2002.
IT712 Computer System Security and Cyber Forensics
Course Name: Computer System Security & Cyber Forensics
Course Code: IT712
Page 50 of 84
Pre-Requisite: None
Credit Hours: 3
Course Description: This course describes computer security breaches, anticipated
cybercrimes, related forensics investigations and technologies. The course covers
fundamentals of computer security, privacy, the importance of security for computer systems,
protection schemes and policy. Including, network security concepts and mechanisms, public
and private key encryption techniques, network layers security, computer forensics, legal and
policy issues, viruses and worms, web security, programming security, Data Centers security;
cybercrimes & law.
Learning Objectives: On successful completion of the course students will be able to
Describe elements of computer security and privacy
Investigate the degree of vulnerability of a computing environment to security threats
Identify computer security threats in a computing environment and prepare the
necessary counter measures for protection
Identify and discuss research issues in Computer Security, privacy and intrusion
attacks seriousness with forensic investigation
Deploy security techniques like encryption, cryptography, access control, firewall, etc.
Develop computer security and privacy policies, procedures and guidelines for a
computing environment.
Play a professional role in identifying system security related issues in real world,
design and develop or plan and advice strategic policy and frameworks for
strengthening security
Play an expert role in enforcement of cyber law, effective judgment and cyber
forensic investigation
Course Contents:
Chapter1. Fundamentals of computer security & privacy- Overview, history,
vulnerabilities, countermeasures, physical security
Chapter2. Computer security threats, Intruders, Malwares (Trojan-horse Viruses,
Worms), Crackers, Spy-wares . . .
Chapter3. Authentication, digital signatures, key management, and certification
authorities, Security Techniques- Encryption, cryptography, access control,
Page 51 of 84
firewall,
Chapter4. Network security concepts and mechanisms, Software security mechanisms,
programming techniques
Chapter5. Secure system planning and administration, Analyzing risks, planning,
policies and procedures
Chapter6. Computer forensics, Cybercrimes & law, cyber forensics investigation,
related technologies and dynamics
Chapter7. Legal, ethical and policy issues, Policy enforcement in data center, design of
strategic frameworks, guidelines
Teaching Strategy: This course will be offered through lectures, presentations, class
discussions, laboratory work and group project work.
Method of Assessment: This course is assessed by written exams, lab assignments, reports
and presentations of a project works.
Assessment Breakdown:
Presentation…………………15%
Labs: ………………………..25%
Projects: …………………….20%
Final Exam:...……………….40%
Course Requirement:
Every student should attend all classes.
Students should submit every assignment according to the deadline.
Students should present/demonstrate their assignments.
Students should appear in the written examination.
Reference Books/ Material:
1. D. Russell and G.T. Gangemi, Computer Security Basics, OReilly & Associates,
1991.
2. BPB Publications, Security Complete, New Delhi BPB Publications,1999.
3. C. Easttom, Computer Security Fundamentals, Prentice Hall, May 2005.
4. W. Stallings, Network Security Essentials, 2nd edition, Prentice Hall, 2003.
5. L. Fennelly, E ective Physical Security, Butterworth-heinemann, 2003.
Page 52 of 84
6. T. R. Peltier, Information Security Policies, Procedures, And Standards:Guidelines
For E ective Information Security Management, Auerbach Publications, 2001.
7. E. Michael, Physical Security for IT, Digital Pr, 2004.
8. M. Bishop, Computer Security: Art and Science, Addison-Wesley, 2002.
9. S. Bosworth and M. E. Kabay, Computer Security Handbook, 4th edition, Willey,
2002.
10. M. R. Overly, E-Policy: How to Develop Computer, E-Policy, and Internet
Guidelines to Protect Your Company and its Assets, AMACOM, 1998.
11. S. A. Thomas, SSL and TLS Essentials: Securing the Web, Wiley, 2000.
12. R. J. Anderson, Security Engineering, Ross Anderson, John Wiley & Sons Inc., 2008.
13. "Introduction to Computer Security", by M. Goodrich and R. Tamassia, Addison
Wesley, 2010, ISBN: 0321512944
14. In addition, course material will include research articles from electronic databases
such as: ACM Digital Library, IEEE Xplore, Science Direct
IT713 Converging Technologies and Multidisciplinary Informatics
Course Name: Converging Technologies and Multidisciplinary Informatics
Course Code: IT713
Pre-Requisite: None
Credit Hours: 3
Course Description: Information Technology is rapidly unfolding its wings in several
interdisciplinary or cross disciplinary areas. Its scope is increasing day by day with close
convergence of multidisciplinary projects like Bioinformatics, Business informatics, Geo-
informatics, medico-informatics, Agro-informatics and so on. Responding to the changes and
new demands of the digital media and communication industries, the focus of
Interdisciplinary digital practices are establishing team-working skills through innovative
development practices devised in consultation with external clients, advisors from industry.
These may innovative complex systems and involve high-levels of creative problem solving
mechanism with user testing, developing and scholars' ability to interpret, interact and
participate in iterative design processes and agile development practices. Scholars' will be
expected to present work in the context of their own practice, making their understanding of
development processes for digital media clear and contextualizing their own contribution.
Page 53 of 84
Learning Objectives: On successful completion of the course students will be able to
Understand and analyze the barrier free technology expansions
Describe new thrust for cross disciplinary or interdisciplinary technology related
researches.
Investigate the degree of cross boundary association and collaborations for mutual
betterment and expansion of technologies especially in IT domain of study and
researches.
Identify and discuss research issues in boundary less technology domains for creating
new frontiers of knowledge
Play a professional role in identifying system that can Improve existing traditional
systems by convergence and improve Human Performance in real world.
Course Contents:
Chapter1. Evolution of convergence, importance of convergence n technologies, various
types of convergence like media convergence, message convergence,
communication convergence, application convergence, horizontal convergence,
vertical convergence etc.
Chapter2. Describe the technologies used in convergences and identify the architectures
used in the industry.
Chapter3. Name the key telecommunications industry protocols. Explain the application of
technologies, architectures, and protocols used in the telecommunication industry.
Describe signaling and its importance to telecommunications.
Chapter4. Explain the various access technologies: PAN, HAN, LAN, CAN, MAN, and
WAN. (Including associated cellular and wireless network architectures.)
Chapter5. Describe the principles of PSTN switching including the functionality of IP soft
switches.
Chapter6. Explain the reasons for the convergence of voice, data, image, and video. Explain
how the Internet Protocol is the key to convergence. Appraise the importance of
quality of service. (Special regard to availability, reliability, and serviceability of
a voice network.)
Chapter7. Describe the converging technology components involved in “smart city”, “smart
home” home networks.
Chapter8. Select emerging paradigms in converging technology in multidisciplinary
practices with research and case analytics
Page 54 of 84
Teaching Strategy: This course will be offered through lectures, presentations, class
discussions, laboratory work and group project work.
Method of Assessment: This course is assessed by written exams, lab assignments, reports
and presentations of a project works.
Assessment Breakdown:
Presentation…………………20%
Labs: ………………………..20%
Projects: …………………….20%
Final Exam:...……………….40%
Course Requirement:
Every student should attend all classes.
Students should submit every assignment according to the deadline.
Students should present/demonstrate their assignments.
Students should appear in the written examination.
Reference Books/Material:
Times of Convergence. Technologies across Learning Contexts: Third European.
Converging Technologies for Improving Human Performance nanotechnology,
biotechnology, information technology and cognitive science NSF/DOC-sponsored
report Edited by Mihail C. Roco and William Sims Bainbridge, National Science
Foundation June 2002 Arlington, Virginia
IT714 Information System Security & Privacy
Course Name: Information System Security & Privacy
Course Code: IT714
Pre-Requisite: None
Credit Hours: 3
Course Description: This is covers the various technical and administrative aspects of
information security and privacy. It also established basic understanding of the foundation for
the key issues associated with protecting information assets, determining the levels of
Page 55 of 84
protection and response to security incidents, and designing a consistent, reasonable
information security system, with appropriate intrusion detection and reporting features. The
purpose of the course is to provide the student with an overview of the field of information
security and privacy. Students will be exposed to the spectrum of security and privacy
activities, methods, methodologies, and procedures. Coverage will include inspection and
protection of information assets, detection of and reaction to threats to information assets, and
examination of pre-and post-incident procedures, technical and managerial responses, and an
overview of the information security planning and staffing functions.
Learning Objectives: Course Students who successfully complete this course will be able to:
• Analyze impact of systems security and information privacy for organizations
• Understand the broad role of information security and information privacy in
business processes
• Understand the technical foundations for information security and information
privacy.
• Study the implications for information security and information privacy in
Enterprise Information Systems and Inter-Organizational business processes.
• Understand the issues in managing the security and privacy of Information
Systems.
• Understand how to assess and mitigate the risks and vulnerabilities in systems
• Identify and prioritize information assets
• Identify and prioritize threats to information assets
• Define an information security and privacy strategies and architecture
• Plan for and respond to intruders in an information system
• Describe legal and public relations implications of security and privacy issues
• Present a disaster recovery plan for recovery of information assets after an
incident
Course Contents:
Chapter1. Introduction to information security and privacy in real word IT environment.
Nature and scope History of Information Security and Privacy, Security of
Technical Systems, well known cybercrimes/attacks and their motives, related
forensics investigations and technologies available.
Page 56 of 84
Chapter2. Issues in Information Security and Information Privacy, Information System Risk
Management Threats and Attacks
Chapter3. Internet Communications and TCP/IP Network Security, Firewalls and VPNs
Chapter4. Cryptography and Technical Information System Security
Chapter5. The art and science of Hacking, Intrusion Detection and Prevention Systems
Chapter6. Information and Data Privacy
Chapter7. Social Engineering- Phishing, Vishing etc.
Chapter8. Security and Privacy of Formal Systems in Organizations Planning for
Information System Security and Privacy Designing Information System Security
and Privacy Culture and IS Security and Privacy Corporate Governance for IS
Security and Privacy
Chapter8. Legal Aspects of Information Security and Privacy
Teaching Strategy: This course will be offered through lectures, presentations, class
discussions, laboratory work and group project work.
Method of Assessment: This course is assessed by written exams, lab assignments, reports
and presentations of a project works.
Assessment Breakdown:
Presentation…………………20%
Individual assignment: ……..10%
Projects: …………………….30%
Final Exam:...……………….40%
Course Requirement:
Every student should attend all classes.
Students should submit every assignment according to the deadline.
Students should present/demonstrate their assignments.
Students should appear in the written examination.
Reference Books/Material:
Information Security and Ethics, Hamid Nemati
Information Security Policies and Procedures: A Practitioner’s Reference, Second
Edition. By Thomas R. Peltier (Refer to as ISPP)
Page 57 of 84
Handbook of Information Security: Information Warfare; Social, Legal, and
International Issues; and Security Foundations, Volume 2. (Refer to as HIS2)
Handbook Of Information Security: Threats, Vulnerabilities, Prevention, Detection,
and Management Volume 3 (Refer to as HIS3)
Complete Guide to CISM® Certification (Refer to as CISM)
Computer Security: Art and Science (Refer to as CSArt)
Active Defense — A Comprehensive Guide to Network Security
Digital Identity (Refer to as DI)
Fundamentals Of Cryptology (Refer to as FC)
Guide to Information Technology Security Services (Refer to as GITSS)
An Introduction to Computer Security (Refer to as ICS)
Guide to Intrusion Detection and Prevention Systems (IDPS) Karen Scarfone and
Peter Mell National Institute of Standards and Technology (NIST) 800-94
Intrusion Detection in Depth, Kyle Haugsness, SANS Institute InfoSec Reading
Room 15. Glossary of Key Information Security Terms, Richard Kissel, NIST IR
7298
An Overview of TCP/IP Protocols and the Internet, Gary C. Kessler
Risk Management Guide for Information Technology Systems, Gary Stoneburner,
Alice Goguen, and Alexis Feringa, (NIST) 800-30
Guide to Selecting Information Technology Security Products, Timothy Grance, Marc
Stevens and Marissa Myers, (NIST) 800-36
Guidelines on Firewalls and Firewall Policy, Karen Scarfone Paul Hoffman, (NIST)
800-41
Electronic Authentication Guideline, William E. Burr Donna F. Dodson W. Timothy
Polk, (NIST) 800-63
Privacy Technology Implementation Guide, Privacy Office U.S. Department of
Homeland Security
Identity Theft, Privacy, and the Architecture of Vulnerability, Daniel J. Solove
Hacking: The Basics, Zachary Wilson, SANS Institute InfoSec Reading Room
Social Engineering: A Means To Violate A Computer System, Malcolm Allen, SANS
Institute InfoSec Reading Room
IT715 Green ICT strategies & Network Economy
Page 58 of 84
Course Name: Green ICT strategies & Network Economy
Course Code: IT715
Pre-Requisite: None
Credit Hours: 3
Course Description: The prime aim of this course is to analyze the relationships between
information technology, economy and the society. The topics include are Green ICTs,
Computing issues and initiatives especially in developing counties, Technology and society;
the Information Technology revolution; the Internet society; the network economy; the
network enterprise and transformation of work, management and employment; the digital
divide; and the issues of green management governance. The concluding theme touches on
technology and social responsibility along with assurance of judicious development of
national economy under green ICT strategies.
Learning Objectives:
The objective of this course is to provide graduate students with an understanding of the role
of ICTs and their impact on the global carbon footprint, This includes how to estimate the
carbon footprint of the ICT operations of an organization and access ways to reduce the
carbon footprint by changes to policies for procurement of ICT, changes to ICT operations
and revising business processes.
Course Contents:
1. Politics, Science and Business of Sustainability
Introduction to Green ICT Strategies
Introduction to Green Computing & Background
The Global ICT Footprint
Enabling ICT: Dematerialization, Smart Motor Systems, Logistics, Buildings and
Grids
2. Technical Strategy and Planning–Emerging Technology Monitoring
Energy Management in Mobile Systems and Smartphones
Greening Desktop and Laptop PCs
Energy Saving: Data Centers and Client Equipment
Materials Use
Page 59 of 84
Methods and Tools
3. Business/IS Strategy and Planning
Business Process Improvement
Improving Data Centre Energy Efficiency
Enterprise Architecture
IT Enabled Smart Buildings
Modeling, Prediction and Control for Smart Buildings
4. Procurement & Management Support
Procurement
Energy Star Program and Quality Management
Compliance Audit
5. Case study observation and analyze in real world scenarios
Teaching Strategy: This course will be offered through lectures, presentations, class
discussions, laboratory work and group project work.
Method of Assessment: This course is assessed by written exams, lab assignments, reports
and presentations of a project works and scientific case study.
Assessment Breakdown:
Presentation…………………15%
Labs: ………………………..15%
Case study or Projects: .…….20%
Final Exam:...……………….50%
Course Requirement:
Every student should attend all classes.
Students should submit every assignment according to the deadline.
Students should present/demonstrate their assignments.
Students should appear in the written examination.
Page 60 of 84
Reference Books/Material:
Open Access
All learning materials for this course are freely available and have no copyright
restrictions to access. This allows the course to be made available without restriction
to anyone interested in studying the subject. In addition, all materials are accessible
over the Internet and can be read onscreen.
IT716 Advanced Multimedia Systems
Course Name: Advanced Multimedia Systems
Course Code: IT716
Pre-Requisite: None
Credit Hours: 3
Course Description: This course will introduce scholars to the creation, storage, retrieval
and transmission of multimedia contents. Most current communication techniques are a
single medium. Multimedia technologies, through the use of more than one media, allow
more natural communication. Though this course, it is expected that scholars will be able to
develop in house movies, multimedia advertisements and short games and entertainment
serials. Multimedia is the combined use of text, graphics, sound, animation, and video. A
primary objective of this course is to teach students how to develop multimedia programs.
Another objective is to demonstrate how still images, sound, and video can be digitized on
the computer. Students will create their own multimedia courses using Hyper-Studio on the
Macintosh platform. Hyper-Studio is an authoring tool that allows students to develop an
electronic stack of cards that contain buttons, graphics, and text. Issues concerning
multimedia design and its use in education will be the focus of reading and class discussions
throughout the course.
Learning Objectives:
formulate a working definition of interactive multimedia;
demonstrate competence in using the authoring program Hyper Studio;
demonstrate the use of animation, digitized sound, video control, and scanned images;
demonstrate the use of Netscape to access the Course Home Page and Tips and
Tricks;
Page 61 of 84
use instructional design principles in the development of stacks;
will develop conceptual maps of content and process for interactive multimedia
instructional program
Course Contents:
1. Multimedia Overview
o Definition
o Applications and Design
o Authoring (Hyper-Studio)
2. Introduction to Hyper-Studio
o The Metaphor
o The Basics (Cards, Buttons, Text)
o Hyper-Studio Resources
3. Instructional Design
o Objectives
o Content (print, graphics, sounds, etc.)
o Interaction
o Assessment
o Closure
4. Screen Design
o Metaphors and Themes
o Colors and Backgrounds
o Text (size, color, placement)
o Navigation
o Consistency
o Transitions and Links
5. Use of Sound
o Hyper-Studio Sounds
o Recording byOwn
6. Internet Resources
o Graphics
o Integrating Web documents
o User Interface Design and Web Project Development Cycle
7. Hyper-Studio Tips and Tricks
Page 62 of 84
o Animation
o Launching other applications and documents
o Basic NBA's
8. Multimedia Portfolios
o Designing a template
o Adding elements
o Choosing materials (readings)
9. Advanced Button Features
o Hyperlinks
o Drag-n-Drop
o Advanced NBA's
o Using Actions with other Objects
10. Incorporating Digital Media
o QuickTime Movies
o Laserdisc and CD-ROM control
o Scanning
Teaching Strategy: This course will be offered through lectures, presentations, class
discussions, laboratory work and group project work.
Method of Assessment: This course is assessed by written exams, lab assignments, reports
and presentations of a project works and scientific case study.
Assessment Breakdown:
Presentation…………………15%
Labs: ………………………..15%
Projects: …………………….30%
Final Exam:...……………….40%
Course Requirement:
Every student should attend all classes.
Students should submit every assignment according to the deadline.
Students should present/demonstrate their assignments.
Students should appear in the written examination.
Page 63 of 84
Reference Books/Material:
Vaughan, Taya. Multimedia: Making it Work, 7th ed. New York: McGraw-Hill, 2008.
The "Learning Lingo for Adobe Director" e-book
http://dreamsteep.com/tutorials/director-ebook.html, Adobe publishes a PDF version
of the Director User's Guide for offline reference
Macromedia Director for Windows & Macintosh. Mark Schaeffer, Andre Persidsky.
2004. Peachpit Press. ISBN 0-321-24667-5.
A. Murat Tekalp: Digital Video Processing, Prentice Hall PTR, Upper Saddle
River,1995
K. R. Rao and J. J. Hwang “Techniques and Standards for Image, Video and Audio
Coding”, Prentice Hall PTR, Upper Saddle River, 1996
Joan L. Mitchell, William B. Pennebaker, Chad E. Fogg and Didier J. LeGall: MPEG
Video Compression Standard, Chapman, 1997.
William B. Pennebaker and Joan L. Mitchell: JPEG: Still Image Data Compression
Standard, Van Nostrand Reinhold, 1993.
K. R. Rao and P. Yip: Discrete Cosine Transforms: Algorithms, Advantages,
Applications, Academic Press, 1990
John W. Woods: Subband Image Coding, Kluwer Academic
Paul M. Farrelle: Recursive Block Coding for Image Data Compression, Springer
Verlag, 1990
Michael F. Barnsley and Lyman P. Hurd: Fractal Image Compression, Jones and
Bartlett, 1993
IT717 Natural Language Processing (NLP)
Course Name: Natural Language Processing (NLP)
Course Code: IT717
Pre-Requisite: None
Credit Hours: 3
Course Description: This course is an introduction to natural language processing - the
study of human language from a computational perspective and designed to get students up to
speed of with the current research in the area. It covers morphology, syntactic, semantic and
pragmatic processing models, emphasizing statistical or corpus-based methods and
Page 64 of 84
algorithms. It also covers applications of these methods and models in syntactic parsing,
information extraction, statistical machine translation, dialogue systems, and summarization
Learning Objectives: At the end of this course, students will be able to
Describe major trends and systems in Natural Language Processing;
Define: morphology; syntax; semantics; pragmatic processing; and give appropriate
examples to illustrate their definitions;
Describe approaches to syntax and semantics in NLP;
Describe approaches to pragmatic, generation, dialogue and summarization within
NLP;
Describe current corpus-based methods to NLP;
Describe statistical techniques as applied within NLP;
Describe an application of natural language processing (for instance machine
translation, information retrieval) and show the place of syntactic, semantic and
pragmatic processing.
Course Contents:
Chapter 1. Natural Language Processing: Background and Overview
Chapter 2. Formal Language and Regular Expressions
Chapter 3. Lexical semantics and word-sense disambiguation
Chapter 4. Morphology
Chapter 5. Parsing and Syntax
Chapter 6. Semantic analysis
Chapter 7. Spoken language Processing
Chapter 8. Natural Language Generation/Summarization
Chapter 9. Statistical/corpus-based NLP
Chapter 10. Information extraction
Chapter 11. Machine Translation
Teaching Strategy: This course will be covered through lectures, presentations, class
discussions, laboratory work and Group project work. Students present their assignments, and
get feedbacks.
Method of Assessment: This course is assessed by written exams, lab assignments, project
work, reports and presentations of assignments
Page 65 of 84
Assessment Breakdown:
Practical Project:……………. 50%
Written examination:……….. 50%
Course Requirement:
Every student should attend all lectures.
Students should group themselves for the project work.
Students should submit every assignment according to the deadline.
Students should present /demonstrate their assignments.
Students should appear in the written examination.
Reference Books/Material:
1. Jurafsky, David, and James H. Martin. Speech and Language Processing: An
Introduction to Natural Language Processing, Computational Linguistics and
Speech Recognition. Upper Saddle River, NJ: Prentice-Hall, 2000.
2. Manning, Christopher D., and Hinrich Schütze. Foundations of Statistical Natural
Language Processing. Cambridge, MA: MIT Press, 1999.
3. Allen J, Natural language understanding (2nd ed). Benjamin /Cummings, 1995
IT718 Wireless and Mobile Computing Course Name: Wireless and Mobile Computing
Course Code: IT718
Pre-Requisite: None
Credit Hours: 3
Course Description: This course is recommended as an essential part of the "Net-centric
Computing" component of the ACM and is intended to keep the student abreast of the
developments in wireless computing. Wireless hosts e.g. mobile phones, laptops, palmtops,
PDAs, desktop computers as well as wireless links are becoming increasingly popular, hence
there is the need to investigate the principles and protocols that make wireless
communications possible. Bluetooth and 802.11 standards are among the topics to be
discussed, as well as applications for the mobile phone.
Learning Objectives: At the end of this course the students will be able to:
describe the need for the study of wireless and mobile networks
Page 66 of 84
describe the main characteristics of mobile IP and how it differs from IP
illustrate traffic routing with mobile IP
develop applications that rely on wireless data communications including
applications for the mobile phone
Describe current and emerging interests in wireless and mobile computing and
current capabilities, limitations and potential of each.
Course Contents:
Chapter1. Introduction to the ISO and other network architectures.
History and Evolution of wireless standards, Wireless Local Loops.
Chapter2. Mobile Internet protocols
Chapter3. Special problems of wireless and mobile computing. Software support for
mobile and wireless computing (includes MIDP programming, SMS and
Bluetooth based applications).
Chapter4. Introduction to MIDlets, Display, Ticker, TextBox, Alert, List, Form,
StringItem Applications
Chapter5. Spacer, TextField, ImageItem, DateField, Gauge, ChoiceGroup,
Responding to Item Changes, Applications
Chapter6. CustomItem, Item Traversal, MIDP Record Store Basics, Applications
Chapter7. Connecting to the World, Applications
Chapter8. Wireless Messaging API, Applications
Chapter9. Bluetooth and OBEX, Sound, Music and Video, Applications
Chapter10. Application aware and application transparent adaptation. Mobile
client/server networks, Mobile data access.
Chgapter11. The role of middleware, Performance Issues., Emerging Technologies
Teaching Strategy: This course will be covered through lectures, presentations, class
discussions, laboratory work and Group project work. Students present their assignments, and
get feedbacks.
Page 67 of 84
Method of Assessment: This course is assessed by written exams, lab assignments, project
work, reports and presentations of assignments
Assessment Breakdown:
Presentation…………………20%
Labs: ………………………..20%
Projects: …………………….20%
Final Exam:...……………….40%
Course Requirement:
Every student should attend all lectures.
Students should group themselves for the project work.
Students should submit every assignment according to the deadline.
Students should present /demonstrate their assignments.
Students should appear in the written examination
Reference Books/Material:
1. Wireless Communications and Networks, Latest Edition, by William Stallings
2. Fundamentals of Wireless Sensor Networks (Theory and Practice) by Waltenegus
Dargie and Christian Poellabauer
3. Beginning Java™ ME Platform (Beginning from Novice to Professional) Ray
Rischpater. 2008. Apress.
4. Beginning J2ME: From Novice to Professional, Third Edition (Novice to
Professional), Sing Li and Jonathan Knudsen 2005. Apress.
5. Java ME- Heiko Mosemann. Publisher: Hanser Fachbuchverlag (October 31, 2006)
6. Tanenbaum, A. 2003. Computer Networks, 4th Edition. NJ: Prentice Hall.
7. Wireless Communications & Networks - William Stallings. Publisher: Prentice Hall.
2005.
IT719 Data Warehousing & Data Mining Course Name: Data Warehousing and Data Mining
Course Code: IT719
Pre-Requisite: None
Credit Hours: 3
Page 68 of 84
Course Description: The course is about discovering hidden pattern (knowledge) from a
given data warehouse or data source using different data mining functionalities for research
and business applications
Learning Objectives: At the end of this course, students will be able to
Understand the concept of data warehouse and data mining
Understand the different data mining functionalities: Association,
Classification, Clustering etc.
Understand the data warehouse operations: Slicing, dicing, pivoting, rolling up,
rolling down etc.
Understand and use data mining modeling techniques such as CRISP-DM
Develop skill on how to measure performance of data mining system
Develop skill to measure the goodness of the data set for decision making
Develop confidence in doing research in the area of data mining and data
warehousing
Develop and test data mining systems
Develop team work spirit
Course Contents:
1. Overview
Brief description of data mining
Data warehousing, data mining and database technology
Online Transaction processing and data mining
2. Data warehousing
Design
Tools
Operations
Issues
3. Association rule Mining
Description
Principle
Page 69 of 84
Design
Algorithm
Rule evaluation
4. Classification rule Mining
Description
Principle
Design
Algorithm
Rule evaluation
5. Clustering
Description
Principle
Design
Algorithm
Result Analysis
Teaching Strategy: This course will be covered through lectures, presentations, class
discussions, laboratory work and Group project work. Students present their assignments, and
get feedbacks.
Method of Assessment: This course is assessed by written exams, lab assignments, project
reports and presentations of project and assignments
Assessment Breakdown:
Assignments: 20 %
Practical Project: 30%
Written examination: 50%
Course Requirement:
Every student should attend all lectures.
Students should group themselves into 3 for the project / research work and identify
their own project titles at the end of the second chapter together with their instructor.
Students should submit every assignment according to the deadline.
Page 70 of 84
Students should present /demonstrate their assignments.
Student must sit for the final exam
Reference Books/Material:
J. Han and M. Kamber with tile Data Mining Concepts and Techniques, 2nd edition
Usama Fayyad, Gregory Piatetsky-Shapiro, Padhraic Smyth, and Ramasamy
Uthurasamy, "Advances in Knowledge Discovery and D ata Mining", AAAI Press /
The MIT Press, 1996.
J. Ross Quinlan, "C4.5: Programs for Machine Learning", Morgan Kaufmann
Publishers, 1993.
Michael Berry and Gordon Lino , "Data Mining Techniques (For Marketing, Sales,
and Customer Support), John Wiley & Sons, 1997.
Sholom M. Weiss and Nitin Indurkhya, "Predictive Data Mining: A Practical
Guide", Morgan Kaufmann Publishers, 1998.
Alex Freitas and Simon Lavington, "Mining Very Large Databases with Parallel
Processing", Kluwer Academic Publishers, 1998.
A. K. Jain and R. C. Dubes, "Algorithms for Clustering Data", Prentice Hall, 1988.
V. Cherkassky and F. Mulier, "Learning from Data", John Wiley & Sons, 1998.
IT730 Agile & Scrum Software Development Technologies
Course Name: Agile & Scrum Software Development Technology
Course Code: IT730
Pre-Requisite: None
Credit Hours: 3
Course Description: This course emphasizes the quick realization of system value through
disciplined, iterative, and incremental software development techniques and the elimination
of wasteful practices. Students will study the full spectrum of agile methods, including
Scrum, Extreme Programming, Lean, Kanban, Dynamic Systems Development Method, and
Feature-Driven Development. These methods promote teamwork, rich concise
communication, and the frequent delivery of running, tested systems containing the highest-
priority stakeholder features. Agile methods are contrasted with common workplace practices
and traditional methods such as Waterfall, CMMI, and PMI/PMBOK. Examples of agile
Page 71 of 84
adoption in industry are discussed. Assignments and projects are designed to help students
apply agile principles and practices in their own professional context. Additional subthemes
in the course include enterprise agility, team dynamics, collaboration, software quality, and
metrics for reporting progress.
Learning Objectives: At the end of this course, students will be able to:
To learn the fundamental principles and practices associated with each of the agile
development methods: Lean, Scrum, eXtreme Programming (XP), Feature-driven
Development (FDD), Kanban, and Dynamic Systems Development Method (DSDM).
To learn from fun hands-on activities in the classroom (or in collaborative groups
online) and also on a course project where students will apply the principles and
practices of agile software development. Each student can chose their own course
project to ensure high interest and relevance. Industry examples and a detailed project
example will be presented to the class to emphasize agile methods down to the nuance
level.
To learn how agile methods scale to large and distributed projects, including the role
of systems engineering. And, to learn the essentials of collaboration as they apply to
agile methods.
To perform in-depth explorations into aspects of agile development that are
particularly relevant to each student through detailed discussion sessions.
Course Contents:
Chapter1
o Introduction
o Driving factors behind Scrum & Agile Development
o Scrum Time Boxes, Roles and Artifacts
o Requirements Development
o Product Backlog Development and Ranking
o Definition of Done
o Estimation
Chapter 2
o Task Breakdown
o Sprint Design Considerations
Page 72 of 84
o Velocity Estimation (Capacity Analysis)
Chapter 3
o Release Definition
o Release Criteria
o Tracking
o Tools for Agile Project Management
Chapter 4
o Sprint Planning
o Daily Scrum Meeting
o Sprint Review
o Retrospective Meeting
o Sample Project
Chapter 5
o Introduction
o Management of Uncertainty
o Project and Process Types
o Product Owner Role
o ScrumMaster Role
o Scrum Basics
Chapter 6
o Product Vision
o Story Mapping
o Group Prioritization Strategies
o Release Slicing
o Writing User Stories
o Writing Technical Stories
o Writing Defect Reports
Chapter 7
o Requirements Decomposition and Epics
o Roadmaps
Page 73 of 84
o Architecture Planning
o Release Planning
o Sprint Backlog Creation
Chapter 8
o Scrum Program Management Hierarchy
o Coupling and Team Definitions
o Dependency Analysis for Multiple-Team Implementations
o Planning Hybrid Projects
o Tools for Agile Project Management
o Retrospective
Teaching Strategy: This course will be covered through lectures, presentations, class
discussions, laboratory work and Group project work. Students present their assignments, and
get feedbacks.
Method of Assessment: This course is assessed by written exams, lab assignments, project
reports and presentations of project and assignments
Assessment Breakdown:
Assignments: 20 %
Practical Project: 30%
Written examination: 50%
Course Requirement:
Every student should attend all lectures.
Students should group themselves into 3 for the project / research work and identify
their own project titles at the end of the second chapter together with their instructor.
Students should submit every assignment according to the deadline.
Students should present /demonstrate their assignments.
Student must sit for the final exam
Reference Books/Material:
S.W. Ambler, M. Lines, Disciplined Agile Delivery: A Practitioner's Guide to Agile
Software Delivery in the Enterprise, IBM Press, 2012.
Page 74 of 84
K. Beck, Test Driven Development: By Example, Addison-Wesley, 2002.
K. Beck, C. Andres, Extreme Programming Explained: Embrace Change, 2nd Edition,
Addison-Wesley, 2004.
M. Cohn, Succeeding with Agile: Software Development Using Scrum, Addison-
Wesley, 2010.
M. Fowler, Catalog of Refactorings, Published online at:
http://refactoring.com/catalog/, December 2013 (last visited on: 3 August 2014).
K.S. Rubin, Essential Scrum: A Practical Guide to the Most Popular Agile Process,
Addison-Wesley, 2012.
K. Schwaber, J. Sutherland, The Scrum Guide, Published online at:
https://www.scrum.org/scrum-guide, July 2013 (last visited on: 3 August 2014).
Note: Textbook information is available online also via the MBS Direct Virtual Bookstore.
IT731 Geographical Information Systems
Course Name: Geographical Information System
Course Code: IT731
Pre-Requisite: None
Credit Hours: 3
Course Description: This course introduces the hardware and software components of
Geographic Information Systems and reviews GIS applications. Topics include data
structures and basic functions, methods of data capture and sources of data, and the nature
and characteristics of spatial data and objects. Upon completion, students should be able to
identify GIS hardware components, typical operations, products/applications, and differences
between database models and between raster and vector systems.
Learning Objectives: Upon completion of this course, the student will be able to:
Define GIS
Use GIS to identify, explore, understand, and solve spatial problems
Demonstrate GIS modeling skills
Demonstrate critical thinking skills in solving geospatial problems.
Design and implement a GIS project
Page 75 of 84
Demonstrate competency with the ArcMap software to enhance and interpret
data
Use queries in GIS Analysis h) Formulate applications of GIS technology
Course Contents:
I. Introducing GIS
o What is GIS
o What GIS can do
o Types of GIS projects
o Remote sensing, GPS, SDSS
II. ArcGIS
o Exploring ArcGIS
o Spatial Data
o Metadata
o ArcCatalog
o ArcToolbox
III. Working with ArcMap
o Map documents
o Windows and Menus
o Help system
o Data frames
o Layers
o Symbols and styles
o Map scales and labeling
IV. Coordinate Systems and Map Projection
o Map projections and GIS
o Coordinate Systems
o Spheroids and datums
o Common projection systems
o Projecting data
V. Drawing and Symbolizing Features
Page 76 of 84
o Types of maps
o Classifying numeric data
o Using map layers
o Editing symbols and using styles
o Displaying rasters
VI. Working with Tables
o Tables
o Joining tables
o Statistics
o Summarizing tables
o Editing and calculating tables
VII. Queries
o What are queries?
o Selecting
o Using queries in GIS analysis
VIII. Spatial Joins
o Spatial join
o Types of joins
o Setting up a spatial join
IX. Map Overlay
o Map overlay
o Other spatial analysis functions
o Coordinate systems and map units
X. Presenting Data
o Maps and Reports in ArcGIS
o Working with map elements
o Layout toolbar
o Working with map scales
o Setting up scale bars
XI. Geocoding
o Introduction to geocoding
Page 77 of 84
o Geocoding styles
o Geocoding process
o Setting up the address locater
o Reference data
o x-y coordinates
XII. Basic Editing in ArcMap
o Editing overview
o The Editor Toolbar
o Snapping features
o Creating adjacent polygons
o Editing features
o Editing attributes
o Saving work
XIII. Advanced Editing
o Using sketch tools
o Changing existing features
o Combining features
o Buffering features
o Topology and shared features
XIV. Working with Geodatabases
o About geodatabases
o Creating geodatabases
o Creating feature datasets
o Using default values
o Setting up domains
o Split and merge
o Subtypes
Teaching Strategy: This course will be covered through lectures, presentations, class
discussions, laboratory work and Group project work. Students present their assignments, and
get feedbacks.
Page 78 of 84
Method of Assessment: This course is assessed by written exams, lab assignments, project
reports and presentations of project and assignments
Assessment Breakdown:
Assignments: 25 %
Practical Project: 25%
Written examination: 50%
Course Requirement:
Every student should attend all lectures.
Students should group themselves into 3 for the project / research work and identify
their own project titles at the end of the second chapter together with their instructor.
Students should submit every assignment according to the deadline.
Students should present /demonstrate their assignments.
Student must sit for the final exam
Reference Books/Material: To be determined by the instructor.
IT32 Enterprise systems and ERP
Course Name: ERP with E-Business and Governance
Course Code: IT32
Pre-Requisite: None
Credit Hours: 3
Course Description:
It is expected that ERP will enhance the capacity of organizations to use ICT for improved
organizational management and governance processes effectively. By increasing the
accountability and transparency of ERP, ICT based Business or Business and management in
public sector organizations is expected to play a crucial role in the aligning smooth and
effective functions of organizations in integrated manners. The courses will also positively
impact on the use of IT and ICT to simplify manual working procedures and speed of work,
which will contribute to the improvement of the overall efficiency of enterprise management.
Finally, IT is expected to gradually transform the relations between stakeholders, enterprises
and to replace top-down, bottom up with openness and transparency. This course will
Page 79 of 84
develop a new knowledge bridge between enterprise management and governance process
through automation
Learning Outcomes: On successful completion of the course scholars will be able to:
Critically apply theoretical approaches and analyze their application to achieve
effective use of Enterprise Systems to support operations and management practice
through IT
Critically apply cross-disciplinary knowledge with creativity in decision making
supporting the selection, implementation and use of IT based Enterprise Systems;
Communicate effectively to specialist and non- specialist audiences including multi-
disciplinary teams, diverse cultural communities and business and other professional
organizations;
Plan and execute a substantial research based project or evidence-based capstone
experience linked to an Enterprise Resource Planning System to generate and evaluate
complex ideas and concepts at abstract and practical levels;
Understand the basic principal of E-Government, Securities, Familiar with state of the
art Electronic Model, and Payment Mechanisms and Supply Chain Management.
Develop the skills in the field of electronic business & commerce and to keep students
at the forefront of the Global Digital Economy via facilitating innovation, creating
values in the Electronic market place with the Cooperation of leading Edge
organizations.
Evaluate and observe various online businesses and exemplify initiative and
inspirational leadership in a dynamic 21st century IT oriented work environment,
acting consistently, ethically and socially responsibly.
Course Contents:
ERP & E-Business and Governance
Systems Enterprise wide information system, Custom built and packaged approaches, Needs
and Evolution of ERP Systems, Common myths and evolving realities, ERP and Related
Technologies, Business Process Reengineering and Information Technology, Supply Chain
Page 80 of 84
Management, Relevance to Data Warehousing, Data Mining and OLAP, ERP Drivers,
Decision support system.
ERP Domain, ERP Benefits classification, Present global and Indian market scenario,
milestones and pitfalls, Forecast, Market players and profiles, Evaluation criterion for ERP
product, ERP Life Cycle: Adoption decision, Acquisition, Implementation, Use &
Maintenance, Evolution and Retirement phases, ERP Modules.
Framework for evaluating ERP acquisition, Analytical Hierarchy Processes (AHP),
Applications of AHP in evaluating ERP, Selection of Weights, Role of consultants, vendors
and users in ERP implementation; Implementation vendors evaluation criterion, ERP
Implementation approaches and methodology, ERP implementation strategies, ERP
Customization, ERP-A manufacturing Perspective.
Critical success and failure factors for implementation, Model for improving ERP
effectiveness, ROI of ERP implementation, Hidden costs, ERP success inhibitors and
accelerators, Management concern for ERP success, Strategic Grid: Useful guidelines for
ERP Implementations.
Technologies in ERP Systems and Extended ERP, Case Studies Development and Analysis
of ERP Implementations in focusing the various issues discussed in above units through Soft
System approaches or qualitative Analysis tools, Learning and Emerging Issues.
E-Business & Commerce:
Overview of Electronic Business & Commerce (EC), E-Marketplaces (Auctions, Portals
etc.), E-Tailing Products and Services, Online Marketing and Online Consumer Behavior,
Business- to-Business E-Commerce, E-Government and E-Learning, Web 2.0, Social
Networks and Search Engine Optimization, E-Commerce Security, Payment Solutions and
Order Fulfillment, E-Commerce Strategy and Global Issues, Legal, Ethical and Tax Issues,
Launching an E-Commerce Business, Ontology and modeling specifications, E-Commerce
Business Analysis Term Project
E- Governance:
Concepts, Delivery Models, Phases of e-government, Stages of Electronic Government
development, Statutes affecting e-government development, Need assessment & evolution of
E-Government in Ethiopia, Current issues, trends and frame works in e-government, Internet
Page 81 of 84
& responsiveness for good governance, Transaction technologies over net, area of application
like public sector, service industry and case studies.
Teaching Strategy: The course will be offered through lectures, class discussions, practical
demo, project work and reading assignments.
Method of Assessment: The course will be assessed by writing assignment papers, prepare
project document and writing written or oral examination.
Assessment Breakdown:
Continuous Assessment………………….50%
Final Examination ……………………….50%
Course Requirement: Scholars are required to attend lectures, seminars, discussions
individually or in groups. Examination and assignments are compulsory.
Reference Books/Material:
A. Lexis Leon, Enterprise Resource Planning, TMH
Brady, Manu, Wegner, Enterprise Resource Planning, TMH
Garson, G.D. (2006). Public information technology & e-governance: Managing the
virtual state. London: Jones & Bartlett Publishers.
Dawes, S. S. (2009). Governance in the digital age: A research and action framework
for an uncertain future. Government Information Quarterly, 26(2): 257-264. DOI:
10.1016/j.giq.2008.12.003.
Chadwick, A. and May, C. (2003), Interaction between states and citizens in the age of
the Internet: “E-government” in the United States, Britain, and the European Union.
Governance, 16(2), 271-300.
Public Technology, Inc.-- Bringing the Benefits of Technology to Local Governments
http://pti.nw.dc.us/
The Complete E-Commerce Book, Second Edition: Design, Build & Maintain a
Successful Web-based Business by Janice Reynolds
E-commerce: Get It Right! By Ian Daniel
E-Commerce 2009: Business, Technology, and Society by Kenneth Laudon and Carol
Guercio Traver
Page 82 of 84
10 Grading Scheme
The grading system for
B. course works shall follow fixed scale as follow
Range of Marks Letter Grade Grade Points
[91-100] A+ 4.00
[85-91] A 4.00
[80-85] A- 3.75
[75-80] B+ 3.50
[70-75] B 3.00
[65-70] B- 2.75
[58-65] C+ 2.50
[50-58] C 2.00
[40-50] D 1.00
[<40] F 0.00
C. A ‘research thesis work’ or ‘Project work ‘which is defended and accepted shall be
rated “EXCELLENT”,“VERY GOOD”, “GOOD”, or “SATISFACTORY” which
may appear on the transcript but will not be used for calculation of the CGPA of the
scholar.
D. A thesis work or project work that is defended and rejected shall be rated “FAIL”.
11 Resources and facilities required to properly run the program
Staff Profile
The staff profile of the Department of Computer Science and IT is presented in the following
Table.
Status Number of staff
members available
Number of Staff
required
Remark
Professors full time 1
Professors part time 0
Page 83 of 84
Associate professors full time 0
Associate professors part time 0
Assistant professors full time 6
Assistant professor part time 0
Study leave for PhD 2
Lecturer 28
Study leave for M.Sc. degree 26
Assistant lecturer 2
Graduate assistant II 0
Graduate assistant I 0
Technical assistant 19
Total 84
11.1 Laboratory facilities Laboratory facilities have already been allocated. Library resources are promised by library like Journals, books and e-study material
12 Annexure A- Convention for course nomenclature
First Digit (year) Second Digit (Semester) Third Digit First Year Second Year
6 7
General Course First Semester Second Semester
0 Odd Number Even Number
Course id A Sequential Number