COURSE SYLLABUS
Information Management, 7.5 credits
Information Management, 7,5 högskolepoäng
Course Code: | JIMR25 |
Confirmed by: | Council for Undergraduate and Masters Education Feb 1, 2011 |
Revised by: | Council for Undergraduate and Masters Education Nov 19, 2014 |
Valid From: | Jan 19, 2015 |
Version: | 1 |
Reg number: | IHH 2014/4470-122 |
Education Cycle: | Second-cycle level |
Disciplinary domain: | Technology
|
Subject group: | IF1
|
Specialised in: | A1N
|
Main field of study: | Informatics |
Intended Learning Outcomes (ILO)
On completion of the course the students will be able to:
Knowledge and understanding
1. Demonstrate the role and responsibilities of information management, strategy and governance in organizational contexts.
2. Present the components of an information strategy and their alignment with the business strategy.
3. Demonstrate an understanding of the basic principles of working with distributed content and the outsourcing or offshoring of information-related processes in relation to information strategies.
4. Describe and analyze the impact of social media on information and business strategies.
5. Explain basic concepts and principles of knowledge management, information architecture and business ethics from an information strategy perspective.
Skills and abilities
6. Evaluate an information strategy according to theory and best practices from the praxis.
7. Create an information strategy based on theoretical frameworks and best practices.
Judgement and approach
8. Independently make and assess decisions and choices in information management.
9. Critically assess alignment between business strategies and information strategies.
Contents
The course content focus on the field of information strategy and management in a business context with aparticular focus on:
- Information strategies and information systems strategies and their alignment with business strategies
- The role of information systems in managing information in organizations
- The impact of social media and co-production on business strategy
- Knowledge management and information architecture
- Information strategies, data ownership and ethics
Type of instruction
The course consists of lectures and practical case sessions.
The teaching is conducted in English.
Prerequisites
Bachelor’s degree in Informatics, Business Administration or Computer Science (or the equivalent).
Examination and grades
The course is graded A, B, C, D, E, FX or F.
The course examination consists of one individual written exam for 3.5 credits and a series of case assignments carried out through written reports and verbal reflections for 4 credits.
ILOs 1, 2, 3, 4, and 5 will be examined in the written individual exam.
ILOs 6, 7, 8 and 9 will be examined in the case assignments.
Registration of the examination:
Registration of examination:
Name of the Test | Value | Grading |
---|
Written individual exam | 3.5 credits | A/B/C/D/E/FX/F |
Case assignments | 4 credits | A/B/C/D/E/FX/F |
Course evaluation
It is the responsibility of the examiner to ensure that each course is evaluated. At the outset of the course, evaluators must be identified (elected) among the students. The course evaluation is carried out continuously as well as at the end of the course. On the completion of the course the course evaluators and course examiner discuss the course evaluation and possible improvements. A summary report is created and archived. The reports are followed up by program directors and discussed in program groups and with relevant others (depending on issue e.g. Associate Dean of Education, Associate Dean of faculty, Director of PhD Candidates, Dean and Director of Studies). The next time the course runs, students should be informed of any measures taken to improve the course based on the previous course evaluation.
Other information
Academic integrity
JIBS students are expected to maintain a strong academic integrity. This implies to behave within the boundaries of academic rules and expectations relating to all types of teaching and examination.
Copying someone else’s work is a particularly serious offence and can lead to disciplinary action. When you copy someone else’s work, you are plagiarizing. You must not copy sections of work (such as paragraphs, diagrams, tables and words) from any other person, including another student or any other author. Cutting and pasting is a clear example of plagiarism. There is a workshop and online resources to assist you in not plagiarizing called the Interactive Anti-Plagiarism Guide.
Other forms of breaking academic integrity include (but are not limited to) adding your name to a project you did not work on (or allowing someone to add their name), cheating on an examination, helping other students to cheat and submitting other students work as your own, and using non-allowed electronic equipment during an examination. All of these make you liable to disciplinary action.
Course literature
Literature
Pearlson, K. E. & Saunders, C. S. (2012). Strategic Management of Information Systems. 5th ed. John Wiley & Sons.
Gray, D. & Vanderwal, T. (2012). The Connected Company. O’Reilly.
Hinchcliffe, D. & Kim, P. (2012). Social Business by Design. John Wiley & Sons.
Qualman, E. (2012). Socialnomics: How social media transforms the way we live and do business. John Wiley & Sons.
Selected articles.