Key features of PC-based systems: Motherboards, hub chips, processors, RAM and cache.
Basic processor operation: the fetch execute cycle and interrupts.
Principles of operating systems: virtual memory and multitasking.
Case study: the Windows operating system.
Main features of local area networks and the Internet: Ethernet, wireless networks, the Internet Protocol. Introduction to some of the main network devices, such as switches and routers.
Database architecture and functionality
Data analysis and entity-relationship modelling
Normalisation (to third normal form)
SQL – theory and practical skills
The role of a Database Administrator (DBA)
Practical exposure to current software tools
Current trends in database technology
Digital business models and revenue models.
Digital business strategy process models and their use.
Online marketplace analysis.
The role of ‘Search’ and ‘Social’ ecosystems in the online environment.
Assessment of e-Procurement and digital supply chains.
Mobile platforms and location-based services.
Design approaches for online channels and touchpoints.
Privacy and trust issues.
Legal and regulatory frameworks for digital business.
Approach: Lectures will present both theory and practical examples. Tutorial exercises will support the development of modelling skills and practical, computer-based sessions will develop both modelling and development skills
Project overview, life cycles and methodologies, with emphasis on Agile Application Development Requirements elicitation, modelling and specification, including functional and non-functional requirements, and using techniques such as CRC modelling, and functionality prioritisation technique
The Unified Modelling Language (UML), such as Use Case Modelling, Activity Diagrams, Object Modelling, Class Diagrams, Sequence Diagrams, State Charts,
Test Driven Design and Development
Security by Design, and Misuse case Modelling Issues of Computer Ethics, Professionalism, and Legislation relating to Information Systems Development
Developing and assessing simple applications using system construction tools such as Visual Studio C# .Net
Managing project start-up through project requirements evaluation and project planning techniques.
Comparing and contrasting big up front and appropriate design approaches
Comparative analysis of software project management approaches and Bodies of Knowledge (BoK) applied to software development projects
The assessment of project risk management approaches and metrics for project monitoring and control within an agile project management approach.
Analysis of software development process improvement approaches through Agile software standards and maturity models
Evaluation of software development teams and group dynamics as key factors in the successful delivery of projects
Utilisation of a tailored project management methodology such as Scrum or XP to manage the delivery of an assessment instrument
The work for this module comprises the completion of an individual research project. Each student is assigned a personal Supervisor, and an Internal Examiner who monitors progress and feedback, inputs advice, examines the dissertation and takes the lead at the viva.
There are three preliminary deliverables prior to the submission of the final dissertation:
(1) Project proposal
(2) Initial Report including time plan and dissertation outline
The aim of the module is to let you develop a deep understanding of the framework that information security operates in, and to give you an opportunity to express this in the form of professional written reports. Topics covered include:
• Overview of relevant laws and regulations: national and international, covering Data Protection, computer misuse and other legal issues.
• The relation between governance models and frameworks including: ISACA’s COBIT and ISO Standards (ISO27000 in particular)
• Role of the professions; difference between audit, forensics and security management. Professional ethics and codes of practice
• Risk management, contingency and continuity planning
• Understanding and application of the COBIT domains
Evolving role of strategic IS/IT systems; Management of strategic IS/IT systems; Processes for developing effective IS/IT strategies; Alignment of IS/IT strategies with business strategies; Innovating with IS/IT systems; Strategic IS/IT systems for competitive advantage; Tools & techniques for building IS/IT strategic capabilities; Evaluating & justifying IS/IT systems; Managing a portfolio of IS/IT applications. Positioning & managing strategic IS/IT systems.
This module will allow you to expand your professional skills within user experience and service design. You will learn how to apply a range of methodologies suitable to a variety of organisations and institutions, and in result, enhance your employability. You will be encouraged to adopt a user-centred approach to design, implementation, and evaluation of products and services. You will study cross-channel user experiences with an emphasis on pervasive information architecture. You will learn how to create a coherent experience across products and services at an enterprise level, including development of a brand and an individual design language. The module also covers user studies and usability testing in an agile environment, using state-of-the-art technology.