ISQS 4385 - Strategic IS/IT Management

  1. Syllabus - Spring 2019

    Instructor: John R Durrett

    Office Hours: MWF 1-2 or anytime by phone or email

    Office: BA E303

    Phones: mobile 806-438-2049, home 806-687-9028, office 834-0629

    Email: Class web page:

  2. Course Learning Objectives:
    This course focuses on an integration of the knowledge gained in previous MIS and other business courses. The goal is to provide future business leaders with a strategic focus for IS/IT, to allow them to gain an understanding that IS/IT development must be an integral part of the business, and and that business success requires not only consideration of what is technically feasible but what is strategically desirable.

  3. Topics Covered:
    The Evolving Role of Information Systems and Technology in Organizations: A Strategic Perspective.  An Overview of Business Strategy Concepts and the IS/IT Strategy Implications. Developing an IS/IT Strategy: Establishing Effective Processes. IS/IT Strategic Analysis: Assessing and Understanding the Current Situation. Determining the Business Information Systems Strategy. Managing the Applications Portfolio. Strategic Management of IS/IT: Organizing and Resourcing. Managing Investments in Information Systems and Technology. Strategies for Information Management: Towards Knowledge Management.
  4. Methodology:
    This class will be conducted using Powerpoint slides that give the general idea of Business, IS, and IT strategies augmented with miniCase studies that show examples of this in the “real world”.  

  5. Academic Conduct:
    The Texas Tech policy for academic affairs applies to all students, at all times. Any student who violates the academic conduct policy will be subjected to the appropriate disciplinary sanctions (Student Affairs Handbook). In absence of evidence to the contrary, students will be treated as trustworthy, honest, and just.
  6. Disabled Students:
    Any student who, because of a disability, may require special arrangements in order to meet the course requirements should contact the instructor as soon as possible to make any necessary arrangements. Students should present appropriate verification from Student Disability Services during the instructorâ??s office hours. Please note instructors are not allowed to provide classroom accommodations to a student until appropriate verification from Student Disability Services has been provided. For additional information, you may contact the Student Disability Services office in 335 West Hall or 806-742-2405.
  7. Attendance:
    I take attendance during class, sometimes.  The purpose of this attendance role is to enable grade decisions at the end of the semester.  If a student is "borderline" (in either direction) attendance is considered in raising or lowering the final grade.  In addition, I periodically make changes to exam dates, homework due dates, homework assignments, extra credit assignments, exam bonuses, and other class structural issues.  If a student misses one of these class announcements for any reason it is their responsibility to find out about the change.  The instructor is NOT responsible for informing students individually.

  8. Assessment and Grading policy:
    Given the everchaning nature of and complexity of threats to organizational computer security along with the expanding prevalence of such threats it is hoped that students enrolled in this course have a desire to learn the concepts involved. Reflecting this desire along with a hoped for high level of student maturity the quality of each student's understanding of the above learning objectives will be assessed (and grades will be assigned) based primarily on class individual assignments and projects with exams & quizzes used to verify the accuracy of the project grades. 

In general your grade will be determined as follows:

exams & quiz(es)


Strategy Paper (Due May 5th in my email)


class participation (ie Links)






    Strategy Paper: Write a paper giving me a real world example of a current use of IS/IT by a local organization to gain strategic advantage. The more current and local the better. I prefer one written for an organization where you have worked. However, if that is not possible the pick one you are familiar with, for instance a University Business School.

    Class participation Given the lecture nature of this course your participation is a must. You must come to class able to discuss the current chapters in the text. In addition I would like you to send me current examples of IS/IT strategy from the "real world" and come to class ready to discuss them.

  1. Preliminary Class Outline.

  2. Required Guidelines: