Copyright © 2010, 2009, 2008, 2006 by University of Phoenix. All rights reserved.
|Facilitator Information and Availability | | | | |
Course Start Date:
Course End Date:
Local Campus Class Meeting Time, Days and Dates:
6 p.m. – 10:00 p.m., Thursdays
This course identifies and defines the types of risks that information systems professionals need to consider during the development and implementation of computer based information systems. This course will survey remedies and prevention techniques available to address the risk areas present. Organizational policies and current regulatory considerations will also be examined relative to development, implementation, and use of computer based information systems.
Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents:
• University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum.
University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.
Cooper, D. F., Grey, S., Raymond, G., & Walker, P. (2005). Project risk management guidelines: Managing risk in large projects and complex procurements. Hoboken, NJ: Wiley.
Greenstein, M., & Vasarhelyi, M. (2002). Electronic commerce: Security, risk management, and control (2nd ed.). Boston, MA: McGraw-Hill.
Marchewka, J. T. (2009). Information technology project management: Providing measurable organizational value (3rd ed.). Hoboken, NJ: Wiley.
Tarlow, P. E. (2002) Event risk management and safety. Hoboken, NJ: Wiley.
Barr, J. G. (2012). Business continuity for Web sites. Faulkner Information Services.
Ledford, J. L. (2012). Business continuity for corporate libraries. Faulkner Information Services.
Keston, G. (2008). Identity management for IT security and administration. Faulkner Information Services.
Vosevich, K. (2011). Risk management software market trends. Faulkner Information Services.
Barr, J. (2011). Federal business continuity plans. Faulkner Information Services.
Ledford, J. L. (2012). Federal Information Security Management Act (FISMA). Faulkner Information Services.
Ainsworth, M. (2009). The business continuity planning process. Faulkner Information Services.
Barr, J. G. (2011). The standard of good practice for information security. Faulkner Information Services.
Shaw, R. (2012). Conducting an information security gap analysis. Faulkner Information Services.
All electronic materials are available on the student website.
|Week One: Enterprise Information Systems Risk Management...