DECISION SUPPORT SYSTEMS

spongehousesΑσφάλεια

3 Νοε 2013 (πριν από 3 χρόνια και 5 μήνες)

61 εμφανίσεις

Pa
n
duan Akademik

Magister Teknologi Informasi


Suplemen



1

DECISION SUPPORT SYSTEMS

[ MTI


631


2 SKS ]



Overview


This course provides the insight of what DSS are about and how to develope systems that meet
the decision makers’s support needs. It discusses the essentials of decision and decision making
process
es, the basic consepts of DSS as information systems, how they are used to day, and what
benefits they provide to organiztions. Several types of DSS are discussed and how to apply each
type conceptually to a real discussion making situation. It also discus
ses the development of
effective DSS and DSS software tools. At the end of this course, discussions are also made on
what Expert Systems ( ES ) are, how they work, and why ES technology is useful in DSS.



Outcome


The students are expected to understand t
he concepts of DSS and capable of applying them to the
real world decision making problems using DSS application packages.




Intro to DSS : Essentials of DSS, DSS benefits, system approach, DSS development



Decision Making Processes : what is a decision ?,
decision processes, types of decisions,
business decision making, impacts of psychological type and culture on decision making



Info systems and info quality : DSS as info systems, info and info quality, models



Types of DSS : DSS hierarchy, DSS categories,
matching DSS to decision type, usage
models



DSS Architecture and OS platform : DSS architecture, DSS on corporate system, Internet &
client / server computing in DSS, open system and DSS, DSS hardware environment



DSS Software Tools : DSS software categorie
s, packages, tools and generators, DSS user
interfaces



Building & Implementing DSS : DSS development process, implementation stage, system
conversion, DSS implementation issues



Models & optimization in DSS : types of models, simulation models, computer sim
ulation,
Linear Programming, Analytical Hierarchy Process (AHP), Preference Ranking
Organization Method for Enrichment Evaluation (PROMETHEE)



Group DSS : group DSS, groupware & groupware products



Expert Systems (ES) : AI, basic idea of ES, confidence facto
r, ES development tools, ES
applications, ES and DSS










Pa
n
duan Akademik

Magister Teknologi Informasi


Suplemen



2



References

:


1.

Adelman, L., 1992,
Evaluating Decision Support and Expert Systems
, John Wiley &
Sons, New York

2.

Bodily, S.E., 1985,
Modern Decision Making : A Guide to Modeling with Decision
Supp
ort Systems
, McGraw
-
Hill, Singapore

3.

Brans, J.P., and Mareshal, B., 1992,
Promethee V : MCDM Problems with Segmentation
Constraint
, INFOR, v.3, n.2

4.

Mallach, E.G., 2000,
Decision Support and Data Warehouse Systems
, McGraw
-
Hill, New
York

5.

Pleifter, R., and Lut
hi, H.J., 1987,
Decision Support Systems and Expert Systems : A
Complementary Relationship ? in Expert Systems and Artificial Intelligence in Decision
Support Systems
, D. Reidel Publishing, Amsterdam

6.

Pomerol, J.C., and Adam, F., 2002,
From Human Decision M
aking to DMSS
Architecture, Decision Making Support Systems : Achievements, trends and challenges
,
Idea Group Publishing, Hersey, P.A

7.

Saatly, T.L., 1988,
Decision Making for Leaders : The Analitycal Hierarchy Process for
Decision in Complex World
, RWS Publ
ications, Pittsburgh

8.

Saatly, T.L., 1994,
Decision Making in Economic, Political, Social and Technological
Environment with the Analytical Hierarchy Process, The Analitycal Hierarchy Process
Series, V. VII
, RWS Publications, Pittsburgh

9.

Silver, M.S., 1991,
S
ystems that Support Decision Makers
, John Wiley & Sons, New
York

10.

Silver, M.S., 1991, Decisional Guidance for Computer Based Decision Support, MIS
Quaterly 15, n.1

11.

Sprague, R.H., 1982,
Building Effective Decision Support Systems
, Grolier, New Jersey

12.

Thieran
f, R.J., 1982,
Decision Support Systems for Effective Planning and Control
,
Prentice
-
Hall, New Jersey

13.

Xenaxis, J.J., 1992,
The Ultimate in Teamwork : Gropware
, BCS Update 15, n.1

14.

Web resources :



Comshare MPC



Expert Choice



ENCORE !



DecisionPro



Microstrategy



Speedware











Pa
n
duan Akademik

Magister Teknologi Informasi


Suplemen



3


Weekly Schedule


Week

Topics



1

Intro to DSS

1.1

Essentials of DSS

1.2

DSS benefits

1.3

System approach

1.4

DSS development










2



+


3

Decision Making Processes

2.1 Understanding Decision

2.2 Decision Processes

2.3 Types of Decisions


3.1 B
usiness decision making

3.2 Impacts of psychological type

3.3 Impacts of culture



4

Info Systems and Info Quality

4.1 DSS as info systems

4.2 Info and info quality

4.3 Models




5





Types of DSS

5.1 DSS hierarchy

5.2 DSS categories

5.3 Usage models



6



+


7

DSS Architecture and OS Platform

6.1 DSS architecture

6.2 DSS on corporate systems

6.3 Internet computing in DSS


7.1 Client / Server computing in DSS

7.2 Open systems and DSS

7.3 DSS hardware environment

8

MID





Week

Topics



9




DSS Soft
ware Tools

9.1 DSS software categories

9.2 Software packages

9.3 Tools and generators

9.4 DSS user interfaces

Pa
n
duan Akademik

Magister Teknologi Informasi


Suplemen



4



10

DSS development

10.1 DSS development process

10.2 Implementation phase

10.3 System conversion

10.4 Implementation issues


11



+

12




Mode
ls and Optimization in DSS

11.1 Types of models

11.2 Simulation models

11.2 Computer Simulation


12.1 Linear Programming

12.2 PROMETHEE

12.3 PROMETHEE




13

Group DSS and Products

13.1 DSS

13.2 Groupware and groupware products



14

Intelligent DSS

14.1

Artificial Intelligence

14.2 Fundamentals of Expert Systems ( ES )

14.3 ES development tools

14.4 ES and DSS




15

FINAL EXAM

























Pa
n
duan Akademik

Magister Teknologi Informasi


Suplemen



5


Business and Profesional Communication

[ MTI


632


2 SKS ]




Overview

This course provides basic kn
owledge and skill for doing business and professional
communication. The skill covers three important communication media : written documents, oral
presentation, and informal discussion.


This course is highly practical. Students are expected to do a lot o
f exercises, practicing
principles and effective communication techniques.


Outcome

Students are expected to acquire basic communication skills and able them in real
-
life situations,
in particular in dealing with IT
-
related problems.



Weekly Schedule


Wee
k

Subjects

1.


Introduction to the art of communication

2.


Communication in business

3.


Planning a written document

4.


Acquiring a healthy writing attitude

5.


Conducting a presentation

6.


Planning presentation

7.


Acquiring a successful presentation attitude

8.


Mid
term Exam

9.


Conducting a presentation

10.


Planning for a meeting

11.


Acquiring a meeting attitude

12.


Participating in a meeting

13.


Understanding communication culture gap

14.


Conflict management

15.


Final Exam


References

1

Dodd, C.H., 2003. Managing Business and Pro
fessional Communication. Allyn & Bacon.








Pa
n
duan Akademik

Magister Teknologi Informasi


Suplemen



6

Computer and Network Security

[ MTI


659


3 SKS ]



Overview


This course explains a foundation in computer security.


Learning Outcomes :

A. Knowledge and Understanding

Upon successful completion of the cou
rse, students will develop an in
-
depth knowledge of:

1.

General Security Concepts.

2.

Communication Security.

3.

Infrastructure Security.

4.

Basics of Cryptography.

5.

Operational/Organizational Security.


B. Intellectual and Practical skills

Upon successful completion o
f the course, students will develop a wide range of skills necessary
for network security. In particular, students will acquire skills necessary for:

1.

Designing network security.

2.

Implementing some security S/W to a small network.


Outline syllabus


This cou
rse covers access control, authentication, intrusion detection, malicious code,
cryptography, physical security, disaster recovery, policies and procedures
. The course is given in
15 weeks as follows:

Week

Topic

1

Computer & Network Security Overview

2

C
onventional Encryption I

3

Conventional Encryption II

4

Message Confidentiality

5

Authentication Applications

6

Electronic Mail Security

7

IP Security

8

Semi
-
final Test

9

Web Security

10

Network Management
Security

11

Intruders

12

Malicious Softw
are

13

Firewalls

14

Security Policies & Procedures
[2]

15

Final Test


References

[1]

Stallings W, Network Security Essentials, 2
nd

Edition


[2]

Pastore M, 2004, Security +, Study Guide, 2
nd

Edition, Sybex.

Pa
n
duan Akademik

Magister Teknologi Informasi


Suplemen



7

INFORMATION SYSTEMS PROJECT MANAGEMENT

[ MTI


663


3

SKS ]




Overview


This course describes the fundamental concepts of 5W
-
1H rules in management, the
understanding of IS projects and project management ( PM ), and the sources and categories of IS
projects. The criteria and the principles of successful IS

projects are discussed. It explains the
seven fundamental principles af IS project management, and the Theory W Software Project
Management Principles : the key steps and the guidelines, and the subsidiary principles. The
management of software process an
d products, and how project team and organization are
planned and managed in IS projects are stressed. Finally, the network planning or scheduling
techniques and PM Software Tools for achieving successful IS projects are described.


Outcome


After completi
on of this course, the students will be able to identify and find IS projects,
understand the types and characteristics of IS projects, and the life
-
cycle of IS projects. They are
also expected to acquire knowledge and skill in using appropriate PM Softwar
e Tools for
planning and implementing various IS project categories.



1.

Intro to Project Management (PM) :

Concept of management, steps in management (5W, 1H), basic idea of information
project management, sources of information system projects

2.

Criteria for

Principle of PM :

Basic concept, universally applicable, straight forward, self evident to PM personel, self
evident naming, basis for research


practical testing


development o f supporting
practices

3.

Principles of Succesful Projects :

There must be pr
oject as defined in PMBOK, project manager, informed and supportive
management, dedicated team of qualified people, clearly defined project goal with
priorities of shareholders, integrated plan to reach the goal, time schedule, budget for
project, and a sy
stem to accommodate changes

4.

Fundamental Principles of PM :



Success Principle : goal of PM is to produce a successful product



Commitment Principle : mutually commitment between project sponsor and project
team



Tetrad


Tradeoff Principle : mutually consiste
nt product scope, quality grade, time


to


produce, and cost


to


complete



Primary Communication Channel Principle : a single channel of communication
between project sponsor and project team leader for all decisions effecting the product
of project



C
ultural Environment ( Suitability ) Principle : informed management provides
supportive environment for successful project completion

Pa
n
duan Akademik

Magister Teknologi Informasi


Suplemen



8



Process Principle : effective and efficient policies and procedures for the conduct of
project commitment



Life


Cycle Pri
nciple : plan first, then do


5.

Software Project Management ( SPM ) :



Theory W : make everyone a Winner

-

Subsidiary principles : plan the flight and fly the plan, identify and manage
the risk

-

Fundamental principle : SP manager will be successful iff they m
ake
winners of all participants in SP process (superiors, subordinates,
customers, users, maintainers, etc)

-

Manager’s primary roles : negotiator between various constituencies and
packager of SP solutions with win conditions for all parties

-

Other manager’s

roles : goal setter, monitor, activist in seeking out day


to
-

day win


lose or lose


lose project conflicts and changing them into
win


win situations



Managing software process and products : analysis, specifications, design,
implementation, and ope
rational ; longitudinal activities; planning a quality product,
quality assurance ; project accounting ; project control ; software documentation ; risk
anaysis and management ; economic and technical feasibility



Managing people and organization : task in
software roles


manager, analyst,
designer, detail worker, tester, librarian, whiz ; software team organization

6.

Network Scheduling Techniques :



Gantt or bar charts



Milestone charts



Line of balance



Networks :
-

Program Evaluation and Review Technique (PE
RT)

-

Arrow Diagram Method (ADM )


[Sometimes called the Critical Path Method


CPM]

-

Precedence Diagram Method (PDM )

-

Graphical Evaluation and Review Technique




References


1.

Bing, J.A, 1994, A Principles of Project Management, PMNETwork, PMI

2.

Hamid,
A.T., 1991, Software Project Dynamics : An Integrated Approach, Prentice


Hall,
New Jersey

3.

Hughes, B., and Cotterell, M., 1999, Software Project Management, McGraw


Hill, New
York

4.

Jurison, J., 1999, Software Project Management : The Manager’s view, Commu
nications of
AIS

5.

Keil, M., 1995 Pulling the Plug : Software Project Management and the Problem of Project
Escalation, MIS quaterly

6.

Royce, W., 1998, Software Project Management : A unified framework, Addison Wesley,
MA

Pa
n
duan Akademik

Magister Teknologi Informasi


Suplemen



9

7.

Shtub, A. Bard, J.F., and Globerson, S
., 1994, Project Management Engineering, Technology,
and Implementation, Prentice


Hall, NY

8.

Web resources :



MS Project ( Microsoft )



AceProject (Web Systems )



Entry.projects ( Entry Software )



eprojXperts.com ( ERP Project Management )



Gran PM



Infowit



The

AMS REALTIME Product Suite ( Advanced Management Solutions )



Concerto ( Realization Technologies, Inc, )



Milestones (KIDASA Software )



OurProject (ACME Interactive, Inc. )



Permaster



PlanBee



Project Gateway ( Marin Research )



Project Kick Start



Project Pro
fessional (GRN Consulting )



Weekly Schedule

Week

Topics



1

Intro to Project Management

1.1

Concept of Management

1.2

Steps in Management

1.3

Basic idea of information systems projects

1.4

Sources of ISP











2

Criteria of PM

2.1 Basic concept

2.2 Practices



3

Principles of Succesful Projects

3.1 Issue of PM principles

3.2 Eight plus one principles


4


+


5

Fundamental Principles of PM

4.1 Success, Commitment, and Tetrad


Tradeoff Principles



5.1 Communication Channel, Cultural Environment, Process, and life

cycle
Principles

Pa
n
duan Akademik

Magister Teknologi Informasi


Suplemen



10

6




+


7

Theory W

6.1 Concept of Theory W

6.2 Subsidiary Principles

6.3 Fundamental Principle



7.1 Manager’s roles


8


MID



Week

Topics

9



+

10

Managing Software Process and Products

9.1 Development cycle

9.2 Activities


10.1 Plann
ing

10.2 Project Accounting Control

11

Managing People and Organization

11.1 Task in software roles

11.2 Software Team Organization

12



+

13


+

14



Network Planning

12.1 Gantt and Milestone Charts

12.2 Line of Balance


13.1 PERT

13.2 CPM


14.1 PDM

14.2

GERT

15

Final Exam













Pa
n
duan Akademik

Magister Teknologi Informasi


Suplemen



11

KEAMANAN SISTEM DAN JARINGAN KOMPUTER

[ CIO


631


3 SKS ]



Deskripsi


Mata kuliah ini membahas tentang

6.

Konsep keamanan jaringan komputer dan keamanan
operasional jaringan komputer.

7.

Keamanan koumunikasi dan infratruktur
.

8.

Dasar
-
dasar Cryptography.

9.

Perancangan keamanan jaringan

10.

Implementasi software keamanan jaringan untuk jaringan
kecil.





Silabus


Cakupan matakuliah ini meliputi:

1.

access control

2.

authentication

3.

intrusion detection

4.

malicious code

5.

cryptography

6.

physical
security

7.

disaster recovery

8.

kebijakan (policies) dan prosedur






Rencana perkuliahan


Minggu

Pokok Bahasan

Acuan

1

Computer & Network Security Overview



2

Conventional Encryption I


[1], [2]

3

Conventional Encryption II


[1], [2]

4

Message Confiden
tiality


[1], [2]

5

Authentication Applications


[1], [2]

6

Electronic Mail Security


[1], [2]

7

IP Security


[1], [2]

8

Mid
-
term


9

Web Security


[1], [2]

10

Network Management
Security

[1], [2]

Pa
n
duan Akademik

Magister Teknologi Informasi


Suplemen



12


11

Intruders


[1], [2]

12

Malicious Software


[1],

[2]

13

Firewalls


[1], [2]

14

Ujian akhir Semester




Referensi

[3]

Stallings W, Network Security Essentials, 2
nd

Edition


[4]

Pastore M, 2004, Security +, Study Guide, 2
nd

Edition, Sybex.