Course Outline

MISA 522 : Social Media, Business and Web Analytics: Information Assurance Implications

Preview Workflow

Viewing: MISA 522-WW : Social Media, Business and Web Analytics: Information Assurance Implications

Last approved: Wed, 20 Jan 2016 14:10:33 GMT

Last edit: Wed, 20 Jan 2016 14:10:32 GMT

MISA 522-WW
Campus
Worldwide
College of Business (WBUAD)
MISA
522
Social Media, Business and Web Analytics: Information Assurance Implications
3
Social media and the analysis of business and web data have transformed organizations and business models. The wide availability of vast stores of data, which may range from high-value and reliable to error-prone and misleading, establishes a foundation where organizations can apply analytical techniques to understand customer and consumer behavior and solve business problems. Along with the substantial promise and capabilities that effectively exploiting this data can bring comes an array of data privacy and information assurance concerns. Enterprises seeking to leverage newfound data resources and analytical approaches have the task of addressing the security and assurance concerns while not stifling business activities. Prerequisites: MISA 501 and MISA 502

This course explores the challenges in attaining information assurance in the emerging domains of social media and web data. The core security concerns of maintaining the confidentiality, integrity, and availability of data are compounded when considering the volume, velocity, and nature of available data resources. Approaches to identifying and mitigating new, associated, risks are explored and students are equipped to develop updated information assurance programs that reflect new data realities.

Understand common security and assurance challenges in social media applications. Explain how information assurance concerning social media and web data directly supports organizational objectives. Explain how well-designed social media policies can support the enterprise information assurance mission. Develop information assurance programs and approaches for web systems. Explain how information assurance concerns can be built into strategic data and analytics programs without disrupting organizational objectives.

Located on the Daytona Beach Campus, the Jack R. Hunt Library is the primary library for all students of the Worldwide Campus. The Chief Academic Officer strongly recommends that every faculty member, where appropriate, require all students in his or her classes to access the Hunt Library or a comparable college-level local library for research. The results of this research can be used for class projects such as research papers, group discussion, or individual presentations. Students should feel comfortable with using the resources of the library. 


Web & Chat: http://huntlibrary.erau.edu
Email:  library@erau.edu
Text: (386) 968-8843
Library Phone:  (386) 226-7656 or (800) 678-9428
Hourshttp://huntlibrary.erau.edu/about/hours.html
 

N/A
N/A

Written assignments must be formatted in accordance with the current edition of the Publication Manual of the American Psychological Association (APA) unless otherwise instructed in individual assignments.

ActivityPercent of Grade
Input Grading Item100

Undergraduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
60 - 69% D
0 - 60% F

Graduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
0 - 69% F
Wendi Kappers - 2/24/2015
KAPPERSW@erau.edu
Aaron Glassman - 2/24/2015
glassf10@erau.edu
Dr. Bobby McMasters - 2/24/2015
mcmas245@erau.edu
PO#NameDescription
1-5 Master of Science in Information Security and Assurance 1. Understand the interdisciplinary aspects (technical, business, management, and policy) of information assurance and information systems and organizational security.
2. Assess and manage the identification of and response to the changing nature of the information risks and information security challenges that increasingly complex, distributed organizations face.
3. Establish governance policies and management mechanisms necessary to develop, acquire, and operate sustainable, cost-effective secure information infrastructures.
4. Integrate various ethical, legal, technological and professional perspectives, both local and global, along with data protection and information assurance perspectives, throughout the various MIS decision making and managerial and leadership processes.
5. Manage and direct the development and operational use of information security and assurance procedures, policies and technologies throughout the organization.
Key: 334