CS814
This course provides an overview and introduction to the breadth of research in the disciplines of computer science and information systems. As such, its content will evolve over time and is expected to cover research developments at the leading edge of these disciplines.
|
Current Topics in Computer Science and Information Systems |
4 |
CS861
This course presents techniques and methods for building a strategic security plan for an enterprise. This includes identifying potential risk assessment strategies and identifying the approach to standards adoption, to align with business goals. Enterprise security policy creation and implementation are also included in the student’s planning effort, as well as the Operations and Monitoring approach. Finally, students will provide and audit an assessment plan, which includes taking compliance issues into consideration. All of this security planning has the goal of bringing IT Security controls into alignment with business goals.
|
Information Assurance |
4 |
CS875
Develops the skills in futuring through a variety of techniques. Introduces formal methods of innovation and diffusion of innovation.
|
Futuring and Innovation |
4 |
CS880
This course explores the fundamental topics in digital systems security. Classical access control models and policies for a secure environment are analyzed. Current cryptographic algorithms are studied as means to ensure data confidentiality and integrity and for authentication. Techniques for secure software design, implementation and maintenance are discussed. Information assurance is examined as applied to the corporate environment. Malware attacks are examined and vulnerability analysis and risk assessment are discussed. Enterprise-level digital forensics is briefly discussed.
|
Foundations of Digital Systems Security |
4 |
CS884
This course examines enterprise-level security architecture and its relationship to physical security. Security as related to service-oriented architecture (SOA), software-as-a-service (SaaS), business-to-business architectures, cloud computing and virtualization is covered. Topics include security infrastructure, policy and procedures, assessment, baselining and auditing. Secure communications, defense in depth, multiple security zones, multi-level security, cross-domain solutions and the unique challenges of advanced architectures are discussed. Compliance with national and international laws and regulations is covered as well as certification and accreditation requirements. Special emphasis is paid to the interrelationship of the security strategic plan with the business strategic plan and the strategic plans of other corporate functional units.
|
Enterprise Security Architecture |
4 |
EIS846
This course examines enterprise tools and realization technologies for enterprise computing, including ontologies and semantic web support; middleware standards and systems such as CORBA and J2EE; modeling and description languages such as XML, RDF, OWL, and UML. In addition, Enterprise computing concepts for specific domains such as electronic and mobile commerce, vertical domains such as finance, telecommunications, automotive, aerospace, command and control, defense, healthcare, and government are reviewed. Business process and workflow modeling, analysis, integration, monitoring, and management are also examined in view of the enterprise.
|
Enterprise Tools, Concepts and Processes |
4 |
EIS852
This course presents an overview of the major structures, such as the Sarbanes-Oxley regulations and their impact on the enterprise. The course also explores governance and ethics relative to policies and control within the enterprise. In addition, topics such as trust, security, and privacy issues in enterprise computing and quality assurance issues in enterprise computing are closely examined.
|
Governance, Quality, Compliance and Ethics |
4 |
EIS854
This course focuses the student on a broad range of topics relative to managing security at the enterprise level. The intent is focusing on creating a security management framework, so that organizations can build up and sustain security for their enterprise. This approach integrates policies, best practices, guidelines, procedures, and regulations while incorporating a broad range of security topics. This broad outlook covers not only security but also any other risks to an organization’s core business relative to people, processes, data, facilities, and technology. This course examines external and internal security threats, failed systems development and system processes, employee mistakes and their respective risk mitigation.
|
Security Management |
4 |
RES804
This course provides a general understanding of both quantitative and qualitative methods within the context of research designs. Research design is the plan for the selection and application of accepted research practices. Research methods provide models for the appropriate collection, organization and analysis of data for decision-making, replication, and contribution to a knowledge base. Additionally, this course supports doctoral students’ abilities to demonstrate an understanding of the research purpose, nature and forms of research design and their relationship to research questions, methods for data collection and data analyses.
|
Principles of Research Methods and Design |
4 |
RES812
This course examines the fundamental principles of qualitative inquiry differentiating among various qualitative research designs. Includes active engagement and practice with capturing qualitative data including being a participant observer and an interviewer. Students will learn how to minimize threats to the internal validity of qualitative studies, focusing on specific techniques for interpretation of data that contributes to the authenticity of qualitative studies.
|
Qualitative Research Methods |
4 |
RES814
Students will learn fundamental concepts of designing, collecting and assessing quantitative data. The course covers descriptive measures as well as various forms of probability and inferential analysis. Exploration of multivariate statistics will be practiced via large datasets using statistical analysis software.
|
Quantitative Research Methods |
4 |
RES861
RES861 is the second course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course: clarifies the research focus, defines the research question(s)/objective/hypotheses, and produces a written document that shows adequate progress toward completion of dissertation research.
|
Doctoral Research II: Annotated Bibliography |
4 |
RES862
This course presents doctoral students to the dissertation research process and applies relevant integrative understanding of complementary disciplines. It examines in depth the research process and introduces doctoral candidates to the various aspects of conducting valid research. Topics in this course include: hypothesis formulization, designing a literature review, conniving data collection techniques, ethical issues in research, and dissertation research design.
|
Dissertation Research Process |
4 |
RES863
RES863 is the third course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course: clarifies the research focus, defines the research question(s)/objective/hypotheses, produces a review of the literature.
|
Doctoral Research III: Dissertation Literature Review |
4 |
RES864
RES864 is the fourth course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course requires: fine tuning the research question(s)/objective/hypotheses, strengthening the review of the literature, drafting a methods chapter (min), and drafting a chapter one. Students may surpass this description as they are able.
|
Doctoral Research IV: Dissertation Methods |
4 |
RES865
RES865 is the fifth course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course requires the student to focus on: producing a defense-ready draft of Chapters 1, 2 & 3 (the research proposal), undertaking the Proposal Defense, undertaking modifications required by the dissertation committee, achieving an approved IRB application.
|
Doctoral Research V: Dissertation Introduction |
4 |
RES866
RES866 is the sixth course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course requires the student to focus on: undertaking the Proposal Defense, undertaking modifications required by the dissertation committee, achieving an approved IRB application, proceeding with Data Collection and Analysis.
|
Doctoral Research VI: Dissertation Findings |
4 |
RES867
RES867 is the seventh course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course requires the student to focus on: proceeding with Data Collection and Analysis, working on initial drafting of chapters 4 & 5, and preparing for Final Defense. Course is pass/fail.
|
Doctoral Research VII: Dissertation Discussion and Conclusion |
4 |
RES868
RES868 is the eighth course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course requires the student to focus on: completing Data Collection and Analysis as needed, completing work on chapters 4 &5, undertaking the Final Defense, modifying document as required by the committee, editing of final document for publishing, and University sign off. Course is pass/fail.
|
Doctoral Research VIII: Dissertation Conclusion |
4 |
RSCH860
The course is designed to help students develop as scholar‐practitioners through research and writing activities required for the dissertation. Students will be introduced to doctoral level evidence‐based research and writing skills, critical thinking, ethics in research, and the development of an annotated bibliography.
|
Doctoral Research I: Principles of Research and Writing |
4 |
|
Select four 4- credit courses from 800-level CS or EM or EIS courses |
16 |
SYMP801
Doctoral Symposium I provides first-year doctoral students with activities designed to develop foundational skills for doctoral study and an orientation to the doctoral dissertation process. Students participate in both the Doctoral Symposium and online classroom activities in the second quarter of the first year of study. Students prepare for and attend Symposium during the 5.5 week course. Post-symposium course work is designed to help students prepare to progress through the next year of the doctoral program. Successful completion of all specified activities and requirements of the Doctoral Symposium and assigned deliverables are required to pass this course.
|
Doctoral Symposium I |
2 |
SYMP802
Doctoral Symposium II provides second or third year doctoral students with activities that help them prepare for completion of the dissertation. Students participate in both the Doctoral Symposium and online course work. The course is designed to prepare students to attend Symposium and to progress to completion of the dissertation. Successful completion of all specified activities and requirements of the Doctoral Symposium and assigned deliverables are required to pass this course.
|
Doctoral Symposium II |
2 |