Technology for Non-Technical Managers
This course is designed for managers involved in making business decisions involving technology. Students are expected to know how to use a computer, but this course is not a hands-on tutorial. Instead, we discuss a range of issues focusing around modern technologies used by businesses around the world. Topics include networking, communications, open source software, content management systems, computer based training, Web services, Web site usability, wireless, productivity tools, and more.
M-F 8 am–5 pm, 22-26 May 2006 (one week only, but 3 credits!)
More info at Granneman.com or Washington University
Blogs to Wikis: Building Community in a Virtual Environment
Social software has been defined as "software that suppports group interaction." While not a new topic in technology, in the last few years social software has seen a renaissance of innovation as various factors–including the internet, broadband, wireless communications, and the rise of open source and open standards-based software–have coalesced to create exciting new possibilities for building communities in virtual environments. This course examines the growth of social software by first examining the trends that have contributed to its growth, and then focusing on a different type of social software each week (including hands-on use of blogs, wikis, virtual gaming worlds, and Web sites such as Friendster, Flickr, and del.icio.us).
Tues & Thurs 6–8:45 pm, 13 June–3 August 2006
More info at Granneman.com or Washington University
Information & Communication Security
As a result of completing this course, students will be able to:
- Describe threats to information security
- Identify methods, tools and techniques for combating these threats
- Identify types of attacks and problems that occur when systems are not properly protected
- Explain integral parts of overall good information security practices
- Identify and discuss issues related to access control
- Describe the need for and development of information security policies, and identify guidelines and models for writing policies
- Define risk management and explain why it is an important component of an information security strategy and practice
- Describe the types of contingency plan and the steps involved in developing each
- Identify security issues related to personnel decisions, and qualifications of security personnel
Wed 5:30–9 pm, 31 May–26 July 2006
More into at Granneman.com or Webster University