Managing Information Resources (PUAD 680)
Spring 2000 – Section 001

SYLLABUS

Basic Course Information

Time/Place: Tuesday, 4:30 p.m. – 7:10 p.m., Robinson Hall, rm. A211

Instructor: Jonathan L. Gifford

Office Location: Dept. of Public & International Affairs, A211 Robinson Hall

Telephone: 703-993-1395, fax 801-749-9198

E-mail: jgifford@gmu.edu

Office Hours: Mon., Tuesday, 3:00 p.m. – 4:00 p.m.; or by appt.

Course Organization and Objectives

This course is about the information revolution, its impacts on society broadly, and how these impacts create a new environment for organizations, with­ particular focus on gov­ernment and non-profit organizations. Information technology generally, and the Internet in particular, have brought extraordinary pressures and opportunities to bear on government and non-profit organizations. The course examines how information and information technology can enable or inhibit organization­s’ successful achievement of desired results.

Designing and implementing new systems or modifying and enhancing existing systems poses a challenge to both the line manager and the information technology manager/professional. The line manager needs the skills and capacity to define the information needed and the ability to ensure that systems acquired to manipulate and analyze information meet the business process requirements of all users. In particular, information needs of senior executives and their ability or inability to develop a vision for the potential use of information and information technology can seriously impede successful deployment of information systems.

For the manager, the challenge is developing and maintaining the systems and information nec­essary to lead change and support workers in producing the services and goods needed to fulfill the organiza­tion’s mission. Meeting this challenge can be all the more difficult in public and non-profit or­ganizations because of the procedural, personnel and budgetary limitations that they face.

PUAD 680 considers the need for management of information resources in public and non-profit organi­zations. Topics include the role of information in the management of the public and non-profit sectors, the use of information systems in re-engineering organizational processes and in adapting approaches to providing information to mission accomplishment.

In addition to these functional topics, the course surveys applications of information systems in a variety of public and non-profit settings of the students’ choosing. Candidate application settings include (but are not limited to) associations, human services, defense and national security, public works, law enforcement, legislative bodies, and the judiciary.

The specific course objectives are to teach students to:

1.      Understand the impacts and opportunities of the new information age for government and non-profits;

2.      Recognize the value and problems of using systems to meet management challenges;

3.      Recognize and describe the value and performance of information systems relative to mission results;

4.      Recognize the practical, managerial and ethical dilemmas related to the development, implementation and use of information systems; and

5.      Understand the role of information in managing change.

In addition, the course seeks to enhance student skills in several areas:

6.      Finding, reading and critically reviewing scholarly and professional literature, since the latest information on managing information resources are often available in scholarly journals and government and consulting reports;

7.      Writing clear, understandable, concise, balanced and technically accurate papers and memoranda, complete with easily understandable charts, tables and graphs. The tendency to use jargon and unnecessarily technical language is often a serious problem for writing in this subject area;

8.      Professional presentation and commu­nication, both discussion of issues and options, and the presentation of analyses and results; and

9.      Fair and objective peer review of analytical procedures, conclusions and recommendations.

Requirements and Grading

Paper No. 1 (15% of grade)

Complete a “Work System Description and Evaluation,” approximately 500 words in length, plus appendices if desired (due in week 5), describing and evaluating a work system with which you are familiar. Your paper should both describe the work system you’ve chosen, and evaluate it. Use Alter’s WCA, DFDs, ERDs, and/or six perspectives to organize and present the description and evaluation.

Paper No. 2 (25%)

Write a 2000-word “Sector Application Survey” about information technology applications in a sector of your choice (housing administration, law enforcement, etc.), due in week 9). The instructor must approve the sector you select. The paper should be a description of state-of-the-art and emerging approaches to managing information resources in a sector of interest to the student. The paper should not be limited to a single organization or single application. The point is to look at a sector—for example, law enforcement, highway operations and management, medical information systems, personnel management, housing administration or university data warehousing. Of course, the paper cannot survey an entire sector like law enforcement or higher education completely. You should identify some emerging business processes and functions within the sector that interest you and focus on them.

It is essential that the paper not only describe the technology but that it also critically analyze its potential for improving business processes, and touch upon some of the management and implementation challenges it poses, if any. Be careful to avoid simply reporting unsubstantiated vendor claims. Use Alter’s work centered analysis (WCA) framework to describe your technology and its five perspectives for evaluating systems. Also make appropriate use of other assigned class readings. Try to identify quantified results.

The paper should be approximately 2000 words in length, and may include appendix material at your option.

You should carefully identify and cite source material. For a paper of this type, you will probably need to rely on a wide range of sources, including subject area experts, industry and trade publications, and promotional and marketing materials by vendors. Some of these may be from the Internet.

Examples of selected topics in the past include: ¶ ballistic imaging technology; ¶ smart cards; ¶ vessel navigation systems; ¶ medical records; ¶ “smart” battlefield technologies; ¶ global positioning systems and geographic information systems in highway asset management; ¶ internet technologies in higher education; and ¶ call center technology. In each case, the emphasis has been on a technology applied in a particular government or non-profit sector and the management and implementation issues it raises.

Presentation (10%)

Develop and deliver a 15-minute class presentation on the sector about which you are writing your second paper. Your presentation should utilize presentation software. The classroom is outfitted with Microsoft PowerPoint. You may use other presentation software at your option, but you are responsible for ensuring that the necessary software is available for presentation in our classroom. Presentations will be graded on both content and style. Presentations will be scheduled throughout the semester.

Paper No. 3 (40%)

Write a final paper of approximately 2500 words on how the information age, along with other broad trends in the management of public or non-profit organizations, affects the environment of organizations and can be used (positively and negatively) to respond to changes in an organization’s environment, both externally and internally. At your option, the paper may focus on the sector that was the subject of the “Sector Application Survey” (paper no. 2). You may wish to review and critique a recent, ongoing or anticipated technology acquisition or procurement.

Your paper should use at least five of the assigned readings from the course, as well as additional readings you may have found on your own. As appropriate, use the tools and concepts examined in the course, including the work centered analysis (WCA) framework and concepts of system performance. Please provide word count on the cover page.

Class Participation (10%)

Participate in class discussions demonstrating command of the assigned material and the ability to relate the concepts to other management issues. You should also subscribe to a computer-oriented periodical and scan it regularly for items related to your areas of interest. Candidate publications include Government Computer News (www.gcn.com), Government Technology (www.govtech.net). You may select another relevant publication if you wish. You can read these on-line, or subscribe to the hard copy version. (Note: eligibility for free hard copy subscriptions sometimes depends on how you answer the questions on the subscription form, which the publishers use to promote their publication to advertisers. Don’t lie, but make the most of anything that would make you attractive to their advertisers.)

A regular part of every class session will be a discussion of current events or “found objects” that are relevant to the subject matter of the course. These “found objects” might be incidents or situations that you encounter in your work or personal life that highlight or exemplify particular issues before the class. You should actively seek out such discussion items as a part of your regular everyday perusal of news and other events.

Note: Students who are unable to attend classes during which graded work is to be submitted or presented will be asked to provide appropriate documentation of the necessity for their absence. Also, note that the GMU’s unusual graduate grading system allows grades of A, A-, B+, B, C and F. There is no B-. Work that does not merit at least a B is generally not considered acceptable graduate quality work.

Textbooks

The texts below have been ordered through the campus bookstore and should be available for purchase.

1.      Steven Alter, Information Systems: A Management Perspective, 3rd ed. (Addison-Wesley, 1999);

2.      Steven Kelman, Procurement and Public Management (Washington, D.C.: AEI Press, 1990);

3.      Clifford Stoll, The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (New York: Doubleday, 1989);

4.      Peter Jacobs, "Data Mining; What General Managers Need to Know," Reprint U9910D, Harvard Management Update [Cambridge, MA] (October 1999);

5.      Philip B. Evans and Thomas S. Wurster, "Getting Real About Virtual Commerce," Reprint 99605, Harvard Business Review (November-December 1999): 84-94;

6.      Thomas H. Davenport, "Putting the Enterprise Into the Enterprise System," Reprint 98401, Harvard Business Review (July-August 1998): 121-31;

7.      Andrew S. Grove, Only the Paranoid Survive: How to Exploit the Crisis Points That Challenge Every Company. 1996. Revised. New York: Currency, Doubleday, 1999;

8.      Jay O. Light, Lynda M. Applegate, and Dan J. Green, The Last Mile of Broadband Access, Harvard Business School Note no. 9-800-076 (Cambridge, MA: HBS Press, 1999);

9.      Regina Fazio Maruca, and others, "Are CIOs Obsolete?" reprint R00212, Harvard Business Review March/April 2000; and

10.  M. Bensaou and Michael Earl, "The Right Mind-Set for Managing Information Technology," reprint 98502, Harvard Business Review, September-October 1998.

Note that items 8-10 were ordered late and will not arrive for a week or two. In addition to the above, the instructor will provide selected outside readings, which will be made available at student expense or on the Library’s electronic reserves (http://ers2000.gmu.edu/ers/srch.html).

In addition to the above, the instructor will provide selected outside readings, which will be made available at student expense or on the Library’s electronic reserves (http://ers2000.gmu.edu/ers/srch.html).

Instructor

Jonathan L. Gifford is an associate professor of public management and policy in the Department of Public and International Affairs, the director of the M.S. Professional Studies in Transportation Policy, Operations & Logistics in the School of Public Policy, and a faculty member in the Environmental Sciences and Public Policy program. His teaching interests include: the planning, analysis and development of information systems in government; public policy analysis; transportation system planning and development; and management information systems.

His primary research interests are the use of information technology in public organizations and facilities, and transportation system analysis and planning. Recent research topics include:

·        Institutional issues in the implementation of advanced transportation information and control technologies;

·        The influence of standards on the pace and extent of technological innovation and technological adoption; and

·        Increasing the public acceptability of infrastructure improvements.

His professional experience includes short stints with the U.S. Office of Management and Budget, the Congressional Budget Office, and the U.S. Office of Technology Assessment, as well as a number of consulting assignments with government and private clients.

Prior to joining George Mason University, he served on the faculty of the School of Urban and Public Affairs at Carnegie Mellon University. He received his M.S. and Ph.D. in civil engineering, with a specialization in transportation engineering, from the University of California, Berkeley, and a B.S. in civil engineering from Carnegie Mellon University.

For additional information, see www.gmu.edu/departments/pia/faculty/gifford/gifford.htm.

Computer Proficiency Requirements

Students enrolling in 680 for spring must have basic proficiency in the use of a spreadsheet, database, word processing and presentation packages. Students lacking proficiency in spreadsheet or database but otherwise conversant in the use of computers may take PUAD 680 and PUAD 730 simultaneously. PUAD 730 may not be substituted for PUAD 680.

Students who need to gain proficiency have several options to do so. The right one for you depends on your situation, including how much you already know. Here are some options:

1.      Enroll in 730.

2.      Video-based tutorials for Excel, Access and PowerPoint are available from STAR (Student Technology Assistance and Resource Center), JLC rm. 229, 993-8990.

3.      Complete training in Microsoft Office through an off-campus training program. Such programs are sometimes available through an employer.

General Paper Guidelines

1)      You cannot use a paper from another course without explicit instructor approval.

2)      Paper Length. Word counts specified for papers are exclusive of footnotes, endnotes, or appendix material.

3)      Papers must be typed.

4)      Papers should have a cover page, but do not put papers in covers, binders or any other kind of package.

5)      No late assignments will be accepted without the instructor’s prior approval.

6)      Papers with unacceptable errors in spelling and grammar will be returned for correction prior to grading and penalized 5 points per day until turned back in correctly.

7)      The instructor may ask to review your source material. Do not discard it for at least a month after your final paper is turned in.

8)      Finding and evaluating sources. The “Research Guide” (see below) contains some good pointers for finding and evaluating sources. Remember that some sources are more credible than others, and it’s up to you the researcher to evaluate the credibility of a source and the particular facts, ideas or positions it advances. All sources are not created equal!

9)      Plagiarism. Be careful and systematic in the way you quote and credit source material in order to avoid plagiarism, which may result in Honor Code violations.

10)  Finding and evaluating source material. The department’s “Research Guide” (see below) contains some good pointers for finding and evaluating sources. Remember that some sources are more credible than others, and it’s up to you the researcher to evaluate the credibility of a source and the particular facts, ideas or positions it advances. All sources are not created equal!

11)  Style

a)      The term “style” refers to the way a paper treats headings, footnotes, bibliographic citations, illustrations, tables, etc. In professional writing, it is important to be aware of style and to follow the appropriate style guidelines for what you are writing.

b)      You should choose and adhere to a particular style. You may wish to use the style outlined in the department’s “Research Handbook,” located at http://www.gmu.edu/departments/pia/research/resch-hk.htm. This guide is somewhat dated, especially with respect to the use of the library’s on-line capabilities. However, it provides useful information on writing and on evaluating source material.

c)      For the citation of e-mail messages, World Wide Web sites, and other items on the Internet, follow the format specified in “Beyond the MLA Handbook: Documenting Electronic Sources on the Internet” <http://english.ttu.edu/kairos/1.2/inbox/mla_archive.html> (June 10, 1996).

d)      In addition to the guidelines in the “Research Handbook,” papers for this course require the following: (i) identify your sources in footnotes; (ii) include source information for all figures and tables; (iii) include a bibliography of all source material at the end of your paper.

12)  Grading criteria

a)      Technical content: 65%.

b)      Writing quality: 25%.

c)      Style and appearance: 10%

Honor Code Policy

The Honor Code policy endorsed by the members of the Department of Public & International Affairs relative to the types of academic work indicated below is set out in the appropriate paragraphs:

1.      Quizzes, Tests and Examinations. No help may be given or received by students during the taking of quizzes, tests or examinations, whatever the type or wherever taken, unless the instructor specifically permits deviation from this standard.

2.      Course Requirements. All work submitted in fulfillment of course requirements is to be solely the product of the individual(s) whose name(s) appears on it. Except with permission of the instructor, no recourse is to be had to projects, papers, lab reports or any other written work previously prepared by another student, and except with permission of the instructor no paper or work of another type submitted in partial fulfillment of the requirements of another course may be used a second time to satisfy a requirement of any course in the Department of Public Affairs. No assistance is to be obtained from commercial organizations which sell or lease research help or written papers. With respect to all written work as appropriate, proper footnotes and attribution are required.

3.      Required Reading. A signed pledge that reading required for a course has been completed may be made a condition of receiving credit in that course. Inability to sign the pledge when required on the final exam will result in the assignment of a grade of I.

Schedule

Class

Date

Subject

*Readings

Homework Due

1

8/29

Introduction

 

 

2

9/5

Systems analysis

*Alter chaps. 1-2

Short Bio

WCA exercise

3

9/12

Business processes

*Alter chap. 3

(1)

DFD exercise

4

9/19

Databases

*Alter chap. 4

Database problem

5

9/26

Communication, Decision Making, & Different Types of Information Systems

*Alter chap. 5

*Davenport 1998

*Jacobs 1999

(2)

Paper no. 1

6

10/3

Product, Customer & Competitive Advantage

*Alter chap. 6

*Grove

*Evans & Wurster

 

 

10/10

No class meeting

7

10/17

Ethical Issues

*Alter chaps. 7

(3)

 

8

10/24

Computer Hardware

*Alter chap. 8

(4-8)

 

9

10/31

Software, Programming & Artificial Intelligence

*Alter chap. 9

Paper no. 2

10

11/7

Networks & Telecommunications

*Alter chap. 10

*Light, et al. 1999

 

11

11/14

System Development

*Alter chaps. 11-12

To be announced reading on XML

 

12

11/21

Procurement

*Kelman

(9)

 

 13

11/28

IT Planning & Management in the Federal Government

*Maruca, et al. 2000

Bensaou & Earl 1998

(10)

 

14

12/5

Security & Control

*Alter chap. 13

*Stoll 1989

(1)

 

 

5/10

No class meeting

 

Paper no. 3

* indicates required text, or see numbered reference list below


Reference List

 

1.         U.S. General Accounting Office. Electronic Government: Federal Initiatives Are Evolving Rapidly but They Face Significant Challenges. Statement of David L.McClure Before the Subcommittee on Government Management, Information and Technology, Committee on Government Reform, House of Representatives http://www.gao.gov/new.items/a200179t.pdf, May 22, 2000.

2.         Gulledge, Thomas R., and Rainer A. Sommer. "Public Sector Enterprise Resource Planning." George Mason University, Policy Analysis Center, Fairfax, VA, [2000]. www.pac.gmu.edu.

3.         Fukuyama, Francis. "Trust Still Counts in a Virtual World." In Forbes ASAP. http://www.forbes.com/asap/120296/html/francis_fukuyama.htm. 1996.

4.         Graney, Brian, and Bill Mann. "Convergence Emergence, Part 1: Ubiquity." Fool on the Hill (http://www.fool.com/news/foth/2000/foth2000.htm), August 7 2000.

5.         ——— "Convergence Emergence, Part 2: The 'Sunk Assets'." Fool on the Hill (http://www.fool.com/news/foth/2000/foth2000.htm), August 8 2000.

6.         ——— "Nokia, Dell, and Other Agnostics." Fool on the Hill (http://www.fool.com/news/foth/2000/foth2000.htm), August 9 2000.

7.         ——— "Qualcomm, Siebel, and Other Standard Bearers." Fool on the Hill (http://www.fool.com/news/foth/2000/foth2000.htm), August 10 2000.

8.         ——— "Finding the Next Microsoft." Fool on the Hill (http://www.fool.com/news/foth/2000/foth2000.htm), August 11 2000.

9.         Kelman, Steven. "White House-Initiated Management Reform: Implementing Federal Procurement Reform." In The Managerial Presidency, edited by James P. Pfiffner. 2nd ed., 239-64. College Station, TX: Texas A&M University Press, 1999.

10.       U.S. General Services Administration, Center for IT Capital Planning. Capital Planning and IT Investment Guide. http://www.cio.gov/files/00pg.pdf, February 2000.