Verifying IS Curriculum with Employers
Donna M. Schaeffer, PhD
Marymount University 703.284.5718 donna.schaeffer@marymount.edu

Patrick C. Olson, PhD
National University 408.236.1152 polson@nu.edu



Curriculum's Stakeholders:



Why Stakeholders are Important:



Which changes are substantial and which are just fashion?



Steps:
  1. Identify current employers.
  2. Produce a survey that inquires about the current curriculum and investigates those changes the employers see likely in the future.
  3. Administer the survey.
  4. Compile the results
  5. Analyze them with a "committee" of employers.



Undergraduate Curriculum:

IT 120 Personal Security in the Digital Age Introduces students to the field of information security. Students will examine security and privacy issues that affect their personal use of computers and the Internet. It covers how to protect personal computers from outside threats and how to protect oneself from potential problems such as viruses, phishing, identity theft, and other computer crimes.

Now

Five Years From Now

Very Important

25%

57%

Somewhat Important

50%

14.3%



IT 205 Computer Technology Examines how computers work, including the components of technology: hardware, operating systems, storage, and networking, and how these components work together to support information technology applications. Students troubleshoot, repair, configure, and upgrade computer systems in a hands-on environment. It includes the application of Boolean algebra to basic digital circuits. The course is designed to prepare students with the knowledge necessary to pass the CompTia A+ certification, a prerequisite for preparing for a career in computer support and maintenance.


Now

Five Years From Now

Very Important

62.5%

42.9%

Somewhat Important

25.0%

28.6%



IT 210 Software Engineering Studies the entire system life cycle, including requirements analysis, system analysis and design, software development, software acquisition, system integration, and system maintenance. Software quality and software assurance are also covered. Students get experience with techniques used in commercial environments, such as UML.


Now

Five Years From Now

Very Important

87.5%

85.7%

Somewhat Important

12.5%

14.3%



IT 350 Computer Security Provides an overview for the computer security risks facing enterprises today and covers the many options available for mitigation of these risks. Topics include security concepts, controls and security techniques; standards; designing, monitoring, and securing operating systems; hardware; applications; databases; networks (wired and wireless); and the controls used to enforce various levels of availability, confidentiality and integrity. Computer security is taught in the context of the increasingly global and distributed environment of today?s enterprise. Business continuity and disaster recovery planning are also discussed.


Now

Five Years From Now

Very Important

87.5%

100%

Somewhat Important

12.5%

0%



IT 305 Computer Networking Examines how data gets from one computer to another, including through local area networks (LANs), wide area networks (WANs), and the Internet. Networks are discussed in terms of the Open Systems Interconnect (OSI) seven-layer model. Network operating systems and network middleware are examined. The course is designed to prepare students with the knowledge necessary to pass the CompTia Net+ certification, a prerequisite for preparing for a career in network administration. Prerequisite: IT 205


Now

Five Years From Now

Very Important

75%

62.5%

Somewhat Important

12.5%

37.5%



IT 310 Database Technology Studies the design and implementation of relational databases. Entity-relationship (E-R) diagrams and other design techniques are covered and students get practical experience with their use. SQL programming techniques are also used to build, update, query, and generate reports from databases. Application tools such as JDBC are also examined.


Now

Five Years From Now

Very Important

62.5%

75%

Somewhat Important

37.5%

25.0%




IT 335 Computer Security Provides students with a broad understanding of corporate information security and the tools and techniques used to implement it. It provides a framework for addressing security problems and provides hands-on experience with security products. Specific topics covered include firewalls, host security, cryptography, privacy, application, security, and incident and disaster response. The course is designed to prepare students with the knowledge necessary to pass the CompTia Security+ Certification, a prerequisite for preparing for a career in information security. Prerequisite: IT 305.

Now

Five Years From Now

Very Important

87.5%

87.5%

Somewhat Important

12.5%

12.5%




IT 355 Software Testing, Documentation, and Quality Assurance Focuses on documentation and quality assurance in the system development process in general, and software testing in particular. It includes practical experiences with preparing documentation in each phase of the system life cycle and the use of this documentation to ensure the quality of the final product. Software testing methodologies and strategies are addressed. Prerequisite: IT 210.

Now

Five Years From Now

Very Important

75%

75%

Somewhat Important

25%

25%




How important are each of the following specializations?

Graduate Curriculum:



IT 510 Systems Engineering Examines system and software engineering and takes a systematic and disciplined approach to the entire system life cycle. The course includes planning, requirements definition, modeling, estimating, analysis and design, coding, integration, testing, quality assurance, and maintenance. The course focuses on object-oriented techniques and students get practical experience with the Unified Modeling Language (UML) to produce high-quality software.

Now

Five Years From Now

Very Important

80%

28.6%

Somewhat Important

20%

42.9% (with 28.6% neutral)




IT 515 Decision Making for IT Presents the quantitative tools and techniques necessary to ensure IT professionals can support the complex decisions necessary in today?s business environment. Techniques will support estimation and resource allocation, return-on-investment calculations, make-or-buy decisions, sampling in requirements gathering, cost-benefit analysis, annualized loss expectancy (ALE) calculations, and other quantitative requirements. It provides practical experience in a wide range of decision-making methods and tools, including classical decision analysis, decision trees, influence diagrams, group decision making, and simulation. The course also examines several emerging technologies, such as expert systems and intelligent systems.

Now

Five Years From Now

Very Important

85.7%

62.5%

Somewhat Important

0% (with 12.5% neutral)

37.5%




IT 520 Enterprise Infrastructure and Networks Covers the technology and management of the various components of today?s enterprise IT infrastructure, including hardware, software, and networks. The course examines network architectures, network protocols, network management, IT support models, performance metrics, and operating systems. It also considers data communication and messaging in a global context.

Now

Five Years From Now

Very Important

25%

12.5%

Somewhat Important

62.5%

75%

Neutral

12.5%

12.5%



IT 530 Computer Security Provides an overview for the computer security risks facing enterprises today and covers the many options available for mitigation of these risks. Topics include security concepts, controls and security techniques; standards; designing, monitoring, and securing operating systems; hardware; applications; databases; networks (wired and wireless); and the controls used to enforce various levels of availability, confidentiality and integrity. Computer security is taught in the context of the increasingly global and distributed environment of today?s enterprise. Business continuity and disaster recovery planning are also discussed.

2.5%

Now

Five Years From Now

Very Important

87.5%

87.5%

Somewhat Important

12.5%

12.5%




IT 540 Enterprise Data Management and Analysis Recognizing the increasing dependence on data to manage today?s enterprises, this course covers the design, development, management, and use of today?s transaction-based databases and data warehouses. The course covers the entire life cycle from planning; physical and logical design; extract, transfer, and load (ETL) applications; and data querying and reporting. The course provides practical experience with a relational database and with the Extensible Markup Language (XML) and the XML Stylesheet Language (XSL) for data transfer.

Now

Five Years From Now

Very Important

75%

12.5%

Somewhat Important

75%

12.5%

Neutral

12.5%

12.5%




IT 550 Ethics, Law, and Policy in the Information Age Introduces students to the ethical, legal, and policy issues raised by designing, developing, and using information technology. Issues that are researched and debated in the course include subjects such as information privacy, environmental conservation, effective energy use, limits on the use of technology, the digital divide, customer profiling, open source, copyright violation, globalization, and outsourcing. Students are expected to independently research the issues, make presentations to the class, and support their case.

Now

Five Years From Now

Very Important

87.5

87.5%

Somewhat Important

0%

12.5%

Neutral

12.5%

0%




IT 610 IT Governance and Strategy Examines methodologies and techniques to govern the large and rapidly evolving set of information technology (IT) activities and initiatives that take place in a large enterprise. The course includes the processes, including best practices, that govern decision making around investment decisions, staffing levels, outsourcing decisions, client relationships, project management, and other important IT operational areas. Internet governance is also discussed. The course includes practical experience in the development of an IT strategic plan.

Now

Five Years From Now

Very Important

50%

62.5%

Somewhat Important

37.5%

25%

Neutral

12.5%

12.5%




IT 680 IT Master?s Project Requires the student to integrate and apply knowledge acquired in the degree program to a particular project. The student works individually to complete the project for a sponsor and under the direction of a full-time faculty member of his or her choice. The results are presented orally and communicated in writing. The project outcomes are critiqued by the faculty. Prerequisite: completion of at least 27 credits in the program.

Now

Five Years From Now

Very Important

62.5%

62.5%

Somewhat Important

25%

25%

Neutral

12.5%

12.5%




How important are each of the following specializations?




Trying to be realistic in how much of the effort for cloud-based computing will be reality 3-5 years down the pike. System security will be important either way, but the focus of some tech fields could change dramatically if the client-side gives way to more cloud-based resources. Also, the growth of mobile computing adds complexities across the range of tech fields (i.e. network management, software testing, security, platform support)

Maybe as a component of IT305, it would be nice to see information on Wimax, or Internet service as a utility, which is being deployed in main metropolitan areas.

The fundementals need to be supported with how it relates to present practices.

the content will change for all these courses over the next few years and adjustments will need to be made.



In debriefings, we became aware of the need for soft skills and the importance of writing and communication.