{"id":527,"date":"2025-07-29T03:04:35","date_gmt":"2025-07-29T03:04:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jprosser91\/?page_id=527"},"modified":"2025-08-11T01:03:32","modified_gmt":"2025-08-11T01:03:32","slug":"it-425","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jprosser91\/it-425\/","title":{"rendered":"IT 425"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Information Systems for International Business<\/h1>\n\n\n\n<h2 class=\"wp-block-heading\">Course Description<\/h2>\n\n\n\n<p>This course introduces students to global information systems. It exposes students to the issues of doing<br>global business in a technological world. There will be a general focus on the use of technology to<br>facilitate the practice of global business in the enterprise. A key outcome of the course should be an<br>understanding of the uses of systems and technology to gain and sustain competitive advantage for<br>global companies.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Course Objectives<\/h3>\n\n\n\n<p>Upon completion of this course, students will be able to:<\/p>\n\n\n\n<ol>\n<li>Explain the competitive nature of global business<\/li>\n\n\n\n<li>Discuss the variety of global information management issues facing managers, teams, and<br>individuals in organizations<\/li>\n\n\n\n<li>Identify the applications of technology in global enterprise<\/li>\n\n\n\n<li>Explain the cultural and political aspects of global enterprise<\/li>\n\n\n\n<li>Explain the issues involved in building a success global software team<\/li>\n\n\n\n<li>Recognize the security issues in global information systems<\/li>\n\n\n\n<li>Discuss the current trends and events in global management and technology<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Assignments<\/h2>\n\n\n\n<p>Due to the nature of this class, there are no written assignments to showcase<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Systems for International Business Course Description This course introduces students to global information systems. It exposes students to the issues of doingglobal business in a technological world. There will be a general focus on the use of technology tofacilitate the practice of global business in the enterprise. A key outcome of the course should&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jprosser91\/it-425\/\">Read More<\/a><\/div>\n","protected":false},"author":22978,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":505,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cs-464\/","url_meta":{"origin":527,"position":0},"title":"CS 464","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Networked Systems Security Course Description This course introduces students to global information systems. It exposes students to the issues of doing global business in a technological world. There will be a general focus on the use of technology to facilitate the practice of global business in the enterprise. A key\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/HW8_AH_datapacket.drawio.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/HW8_AH_datapacket.drawio.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/HW8_AH_datapacket.drawio.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/HW8_AH_datapacket.drawio.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":525,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/it-363\/","url_meta":{"origin":527,"position":1},"title":"IT 363","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"SYSTEMS ANALYSIS & DESIGN Course Description This course provides an introduction to the analysis and design of information systems. Emphasis is placed upon the development of requirements that serve the business needs as well as the design of information systems. This course focus on the object-oriented approach of system analysis\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":671,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/it-201\/","url_meta":{"origin":527,"position":2},"title":"IT 201","author":"jpros004","date":"July 31, 2025","format":false,"excerpt":"Introduction to Information Systems Course Description: Lecture 3 hours; 3 credits. An introduction to the major hardware\/software components of modern information systems. Topics include introduction to the history of computers, numbering systems conversion, system and application software, networks and the Internet. Additional topics include Information Systems and Systems Development Life\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":133,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/it-cyse-200t-2\/","url_meta":{"origin":527,"position":3},"title":"CYSE 200T","author":"jpros004","date":"January 12, 2022","format":false,"excerpt":"Cybersecurity, Technology, and Society Students in IT\/CYSE 200T explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows: Describe how\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":480,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-462\/","url_meta":{"origin":527,"position":4},"title":"CYSE 462","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Cybersecurity Fundamentals Course Overview This is the first course in the\u00a0Graduate Certificate Program in Cybersecurity. This course will introduce the networking and cybersecurity background that you'll need to succeed in the other courses in the certificate program. Cybersecurity emphasizes prevention of attacks that are perpetrated using the Internet. It includes\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":517,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-450\/","url_meta":{"origin":527,"position":5},"title":"CYSE 450","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Ethical Hacking and Penetration Testing. This course introduces the basic terminologies used in ethical hacking and useful tools in relation to penetration testing on Kali Linux. Students will learn to explore the vulnerabilities in various systems and operate the industry-leading tools and framework to perform penetration testing on different target\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/527"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/users\/22978"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/comments?post=527"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/527\/revisions"}],"predecessor-version":[{"id":821,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/527\/revisions\/821"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/media?parent=527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}