Decision Science

Students study the use of technology in decision making. Topics include decision analysis, risk analysis, decision support systems, information assurance management and computer science. 

ITEC 375 will serve as an introduction to the scientific processes of transforming data sets into actionable insight.

Data Science (ITEC 375)

Topics include:

1) Introduction to Data Science
        a. Data Science, analytics, and statistics
        b. Required skills: statistics, programming, problem domain

2) Available Tools
        a. R
        b. Statistical Analysis tools
        c. Watson, SPSS, Others

3) Data Cleaning
        a. Categorical vs continuous data
        b. Bad data

4) Exploratory Data Analysis
        a. Plots
        b. Correlations
        c. Factor Analysis

5) Introduction to Machine Learning
        a. Regression
        b. K-nearest neighbor (categorical), k-means (continuous)
        c. Naive Bayes

6) Feature Generation
        a. Decision Trees
        b. Decision Forests

7) Dimensionality Reduction
        a. Principle Component Analysis
        b. Support Vector Machines

8) Social Analysis
        a. Network Analysis
        b. Cluster Analysis
        c. Sentiment Analysis

9) Data Visualization
        a. Principles of visualization

 

Students who complete this course will be able to:

1) Explain data science to a non-user
2) Identify the best software platform for a data problem
3) Explain a problem domain for which data science can provide a solution
4) Identify the best analysis technique for any data set
5) Explain how to clean data sets to generate insight
6) Demonstrate how to take a data set and identify the potential insight
7) Generate high quality visualizations of data sets

ITEC 485 focuses on data and modeling solutions to semi-structured business problems including expert systems, executive information systems, on-line analytical processing, natural language interfaces, and ad-hoc query and reporting tools.

Decision Support Systems (ITEC 485)

Topics include:
1) Computer-based decision support systems as currently developed and utilized by business decision makers
2) Decisions and decision makers
3) Modeling decision processes
4) Designing and building Decision Support Systems (DSS) and Enterprise Systems (ES)
5) The DSS and ES development process
6) The use of application  software to construct prototype decision support system components
7) Spreadsheet models used in the decision making process
8) Concepts and structure of ES

 

Students who complete the course will be able to:  
1) Identify benefits and limitations of DSS and ES use.
2) Describe the importance of user interface in DSS and ES.
3) Define the characteristics a good decision.
4) Describe the process of choice.
5) Describe the concept of ES knowledge engineering and how it is distinct from traditional IS development.
6) Compare how DSS and ES differ from and relate to other types of information systems.
7) Create expert systems applications using an ES shell
8) Create a stand-alone or web based DSS or ES

ITEC 466 covers principles, policies, procedures and management in security. It includes information assurance governance, risk, compliance, planning and procedures.

Information Assurance Management (ITEC 466)

1) Cybersecurity Planning and Management
        a. Common Body of Knowledge
        b. Operational, Tactical, Strategic Plan and Management
        c. Incidence Response, Business Continuity/Disaster Recovery
        d. Audit, Report
        e. C-Level Functions
        f. Cybersecurity as a strategy
    2) Security Program Management
        a. Project and Resource Management.
        b. Quality Assurance and Control
        c. Security Awareness, Training, Education and Ethics
        d. Security Baselines
        e. Change and Patch Management.
        f. Roles and Responsibilities of the Security Organization
    3) Threat Model, Security Risk Analysis: Assessment, Measurement, Management, Mitigation, Transference and Communication.
    4) IA compliance: HIPAA, SOX, FERPA, Data Breach Disclosure Laws, FISMA, Gramm Leach Biley and PCI DSS
    5) IA standards: Rainbow series
    6) Systems Certification and Accreditation
        a. DoD Policies and Directives
        b. Roles/Players
        c. Components of the C&A process
        d. Certification Boards and Panels
        e. NIST Risk Framework (SP800-37)

Students who complete the course will be able to:  
1) Identify benefits and limitations of DSS and ES use.
2) Describe the importance of user interface in DSS and ES.
3) Define the characteristics a good decision.
4) Describe the process of choice.
5) Describe the concept of ES knowledge engineering and how it is distinct from traditional IS development.
6) Compare how DSS and ES differ from and relate to other types of information systems.
7) Create expert systems applications using an ES shell
8) Create a stand-alone or web based DSS or ES

ITEC 495 covers advanced topics in information systems that build on previous courses in software engineering, web programming, database and business. This course in intended to provide a large information system capstone experience.

Information Systems Capstone (ITEC 495)

Topics include:
1. Leveraging the power of information.
2. The strategic value of IS and the alignment between business and IT.
3. The disruptive and transformational potential of information technologies.
4. Various methods of system acquisition and their pros and cons.
5. Managing an effective IT infrastructure.
6. Managing the outsourcing of IT operations.
7. Managing a balanced IT project portfolio.
8. Understanding IS leadership and governing the IS Function.
9  Technological trends and implications.

 

Students who complete the course will be able to:  
1. Assess the strategic value of information systems (IS) to an organization.
2. Recognize the importance of the alignment of business and IS strategies and capabilities.
3. Evaluate the business impacts of networked IT infrastructures.
4. Apply the principles of information security and risk management.
5. Explain different methods of acquiring information systems and their pros and cons.
6. Evaluate the disruptive and transformational potential of emerging information technologies.
7. Apply the project portfolio approach to project management.
8. Analyze IS leadership and IT governance issues.