This course provides an overview of Business Information Systems. Students learn to apply Microsoft® Office tools including work processing, spreadsheet, database, and presentation software to accomplish business objectives. Other topics include uses of application software and the Internet for effective problem solving, exploration of relevant emerging technologies, and how information is used across different industries. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: University policies: You must be logged into the student website to view this document. •Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Grauer, R. T. , Poatsy, M. A. , Mulbery, K. , Hulett, M. , Krebs, C. & Mast, K. (2011). Microsoft® Office 2010: Volume 1. Upper Saddle River, NJ: Pearson Prentice Hall. Rainer, R. K. & Cegielski, C. G. (2011). Introduction to information systems: Supporting and transforming business (3rd ed. ). Hoboken, NJ: John Wiley & Sons. All electronic materials are available on the student website. Week One: Information Systems and Word Processing Tools DetailsDuePoints Objectives1. 1Explain the benefits of information systems in the work environment. 1. 2Describe ethical issues related to information technology. . 3Use word processing tools to communicate business objectives. ReadingsRead Ch. 1–3 & Technology Guide 1 of Introduction to Information Systems. Read Ch. 1 & 2 for Word in Microsoft® Office 2010. Read this week’s Electronic Reserve Readings. ParticipationParticipate in class discussion. 2 Learning Team InstructionsResources: Learning Team Charter Create the Learning Team Charter. Individual Information Technology Acts PaperSelect two of the following acts to research: •Do Not Call Implementation Act, 2003 Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, 2003 •Federal Information Security Management Act (FISMA), 2002 •Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (US Patriot Act), 2001, renewed 2006 •Children’s Internet Protection Act, 2000 •Financial Services Modernization Act, 1999 •Children’s Online Privacy Protection Act (COPPA), 1998 •No Electronic Theft (NET) Act, 1997 •Health Insurance Portability and Accountability Act (HIPAA), 1996 •Telephone Consumer Protection Act (TCPA), 1991 Video Privacy Protection Act, 1988 •Computer Fraud and Abuse Act, 1986 •Electronic Communications Privacy Act, 1986 •The Cable Communications Policy Act, 1984 •Electronic Funds Transfer Act, 1978 •Family Educational Rights and Privacy Act, 1974 •Fair Credit Reporting Act, 1970 Prepare a 350- to 1,050-word paper that answers the following question: •What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act? Format your paper consistent with APA guidelines. 10
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more