


{"id":24,"date":"2013-02-21T20:49:37","date_gmt":"2013-02-21T20:49:37","guid":{"rendered":"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/?page_id=24"},"modified":"2014-02-04T13:41:41","modified_gmt":"2014-02-04T13:41:41","slug":"master-computer-science-in-information-systems-english","status":"publish","type":"page","link":"https:\/\/blogs.gm.fh-koeln.de\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/","title":{"rendered":"Specialization in Information Systems (english)"},"content":{"rendered":"<p class=\"lead\">Many companies are faced with rapid changes in the IT landscape for years. As the successful introduction and the effective operation of business application systems has become a critical factor, especially bigger companies need specialists who know the business and on the other hand are able to judge critical technologies, systems and services, development projects so as to make IT effective and efficient. Graduates of the 2-year master&#8217;s program &#8220;Computer Science&#8221; specialization &#8220;Information Systems&#8221; are prepared for leadership roles. There is not only a wide range of industries as a field of application available, but increasingly many graduates find career in management consulting.<\/p>\n<p>The international Master\u2019s program \u201cComputer Science: Information Systems\u201d\u00a0 at Cologne University of Applied Sciences covers computer sciences and its business applications. Mainly, it places emphasis on the correlation and interaction between both components. Key aspects in the Master\u2019s program are the understanding and the design of vertical information processes, data structures, applications and systems that meet business demands. The knowledge which was acquired in a Bachelor&#8217;s degree in computer science or Business Informatics will be deepened and expanded and supplemented by additional competencies. Students are specifically enabled to participate in the analysis of complex computer science-specific tasks, to design solutions and are enabled to lead interdisciplinary development teams. In the framework of practical case studies and projects with external partners, it is taught to realize comprehensive and also contrary tasks with social and economic aspects, to design solution architectures and solution strategies, as well as to develop reference models for new tasks. Students will be led to the current state of research in areas of Informatics and Business Informatics and trained in methods of self management, so that they can tackle tasks in everyday working life at the borderline between technology and business.<\/p>\n<p>The course plan includes four equal weighted areas: &#8220;Information Systems&#8221; (25%), electives (25%), project area (25%), Master&#8217;s thesis (25%). The first year includes the study focus and the electives including topics of computer science, information systems and business administration. The second year consists of a project area, and the Master&#8217;s thesis.<\/p>\n<p><strong>Subjects of the first year of study<\/strong><\/p>\n<p>5 mandatory courses of &#8220;Information Systems&#8221;<\/p>\n<ul>\n<li><a title=\"Reference models of application systems, SOA and Web Services, Enterprise Architecture Management , EAM and SOA, EA Frameworks: TOGAF, workflow management systems based on SAP and open source tools, process models for the implementation of workflow management systems, Petri nets for modeling and verification of workflow management systems, EDI subsystems\" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/information-systems-mandatory-courses\/\">Enterprise Architecture Management<\/a><\/li>\n<li><a title=\"analysis of IT system environments, identification and control of economic risks associated with IT operations, IT-Management &amp; IT-factory, IT-Management, methods for security management, BSI safety manual, IT security and risk management metrics\" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/information-systems-mandatory-courses\/\">IT Compliance &amp; Risk Management<\/a><\/li>\n<li><a title=\"classification of management support, methodology of BI development, BI reference models, dimensional data modelling, data profiling, data quality, ETL processes\" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/information-systems-mandatory-courses\/\">Business Intelligence<\/a><\/li>\n<li><a title=\"basics of analytic applications, modelling aspects, development methodology, operational analytic applications like financial planning, social media screening, analytic customer relationship management\" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/information-systems-mandatory-courses\/\">Analytic Applications<\/a><\/li>\n<li><a title=\"Basics of performance management, operational performance management,strategic performance management, performance management systems architecture&amp;software tools, development methodology\" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/information-systems-mandatory-courses\/\">Performance Management<\/a><\/li>\n<\/ul>\n<p>Electives (choose 5 modules out of 12)<\/p>\n<p style=\"padding-left: 30px;\">Courses held in English:<\/p>\n<ul>\n<li><a title=\"Linear and non-linear optimization \u2022 Markov-Chains \u2022 Dynamic Programming Queuing Theory \u2022 Financial Statistics\" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/ms-computer-science-electives\/\">Operations Research<\/a><\/li>\n<li><a title=\"\u2022\tFeature Extraction \u2022\tUnsupervised Learning \u2022\tSupervised Learning \u2022\tRule Induction\" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/ms-computer-science-electives\/\">Data Mining<\/a><\/li>\n<li><a title=\"\u2022\tJob market &amp; skill requirements  \u2022\tStaffing: Personal marketing; Internal, External &amp; Online recruiting.  \u2022\tWork and requirements analysis as a prerequisite for targeted recruitment and development.  \u2022\tRecruitment: aptitude test by construct-oriented, simulation-oriented and biography-oriented methods. \u2022\tStaff development: Objectives, approaches, tools  \u2022\tTeambuilding and development: Concepts and practices.  \u2022\tHR management: basic problems and theories of leadership and motivation to work  \u2022\tHR management: Instruments (target agreement systems, employee interviews, 360 \u00b0 feedback, remuneration systems, performance and personnel assessment, etc.) \u2022\tHuman resource management-related aspects of change  \u2022\tManagement and Innovation  \u2022\tAspects related to HR management of international assignments: concept of intercultural competence, Determinants of successful overseas assignments, methods of diagnosis and development of intercultural competence \u2022\tConflict Resolution and Mediation \u2022\tCommunication \/ facilitation techniques\" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/ms-computer-science-electives\/\">Principles of Leadership and Strategic Management<\/a><\/li>\n<li><a title=\"The challenge of Big Data  \u2022\tDefinition, possibilities and problems \u2022\tOverview of the diversity of \u2018Big-Data\u2019-DBS  \u2022\tEthical aspects of Big Data in business environments  NoSQL-Database Systems \u2022\tNoSQL modeling and concepts \u2022\tNew theories and techniques in the context of NoSQL like map\/reduce, CAP theorem, BASE, consistent hashing, MVCC, vector clocks, Paxos, \u2026   \u2022\tAdministration and programming of different NoSQL, in memory and cloud database systems, \u2026  Mobile Database Systems \u2022\tSpecifics of use of database systems through mobile applications \u2022\tDeveloping mobile applications in the context of access to mobile database systems  Multimedia database systems as a particular type of object-related  database systems: \u2022\tCharacteristics of multimedia DB systems  \u2022\tMultimedia Data types for image, audio, video, text  \u2022\tMultimedia data models (SQL\/MM from the SQL\/2011 standard, LOB data types, storage, requests and changes to multimedia data) \u2022\tIndex structures for multimedia data.\" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/ms-computer-science-electives\/\">Databases<\/a><\/li>\n<li><a title=\"specific BA topics are covered, e.g.  the international financial markets and financial crises, risk management , business derivatives, fundamentals of stock trading, Derivatives (Forwards, Options, Futures, Swaps), Value-at-Risk, Bank regulations \" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/ms-computer-science-electives\/\">Business Administration<\/a><\/li>\n<li><a title=\"Successful project management includes generic organizational, planning and controlling activities. Major projects in the business provide a special challenge: they require Informatik  and business administration, and increasingly, media-technical skills that need to be united in the projects and synchronized. The structure of the event is based on the following scheme: \u2022\tThe organization of the project in the hierarchy of the company's customers \u2022\tplanning of IT projects \u2022\tcontrol of IT projects (project management disciplines in order to progress monitoring, methods and techniques for monitoring of projects) \u2022\tMethods and techniques, human aspects, as well as sociological aspects of success which are critical. Methodical and targeted approach, good communication within the team and with the customer and finding a common technical, methodological, linguistic and cultural level which are necessary resources for effective project management. The many different tasks of a project manager are developed and all necessary methods are taught wherever necessary. Further aspects are dealt with, especially risk management to ensure business continuity, demand and change management as well as social aspects.\" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/ms-computer-science-electives\/\">Project Management<\/a><\/li>\n<\/ul>\n<p style=\"padding-left: 30px;\">Courses held in German:<\/p>\n<ul>\n<li><a title=\"Exemplarische Fragestellungen der Mathematik in der Informatik mit beispielhaften Themen wie: Deskriptive Statistik, Datenanalyse, Visualisierung; Schlie\u00dfende Statistik, Trendanalyse; Pr\u00e4dikatenlogik; gemischt-ganzzahlige Optimierung; Simulationsverfahren; Differentialgleichung und ihre numerische L\u00f6sung\" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/ms-computer-science-electives\/\">Spezielle Gebiete der Mathematik (Specific Areas of Mathematics)<\/a><\/li>\n<li><a title=\"Teil I: \u2022\tEinf\u00fchrung in die Grundbegriffe der IT-Sicherheit (Was ist Sicherheit?, Schutzziele, Mechanismen, Beispielszenarien) \u2022\tEinsatz aktueller kryptographischer Verfahren als Mechanismus zur Erreichung von Schutzzielen (symmetrische, asymmetrische Kryptographie, digitale Signaturen, Zertifikate, Angriffe) \u2022\tAktuelle kryptographische Standards (AES, RSA ,...) \u2022\tPrinzipien und Mechanismen zur Authentisierung (Biometrie, Passw\u00f6rter, Chipkartensysteme, Single-Sign-On) \u2022\tSicherheit TCP\/IP basierter Netze und Dienste (Schw\u00e4chen, Angriffe, Beispiele) \u2022\tFirewall-Systeme (Application-Level-Gateways, Paketfilter, Remote-Access)   Teil II: Spezielle Werkzeuge der IT-Sicherheit in der Praxis: \u2022\tSicherheitswerkzeuge,  \u2022\tWerkzeuge zur Pr\u00fcfung der Sicherheit,  \u2022\tAngriffswerkzeuge und -methoden \" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/ms-computer-science-electives\/\">IT Sicherheit (IT Security)<\/a><\/li>\n<li><a title=\"\u2022\tMethoden und Analyse-Werkzeuge \u2022\tVier-C-Konzept, Five-Forces, SWOT, QHAR-Konzept \u2022\tITIL IT Infrastructure Library \u2022\tService und Operational Level Agreements \u2022\tFallstudien-Beispiele \u2022\tStrukturierung von ill-structured problems \u2022\tZentralisierung \/ Dezentralisierung der IT \u2022\tErarbeitung und Bewertung von IT-Produktportfolios \u2022\tIT Service Desk Konzepte \u2022\tIT Marketing \u2022\tEntwicklung von Service Katalogen \u2022\tEntwicklung und Bewertung von SLAs und OLAs\" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/ms-computer-science-electives\/\">IT Consulting<\/a><\/li>\n<li><a title=\"Gesch\u00e4ftsprozessmanagement (Business Process Manage-ment) ist der Teil der betrieblichen F\u00fchrungsaufgaben, der sich mit der (gesch\u00e4ftswirksamen) Gestaltung der Gesch\u00e4ftsprozesse von Unternehmungen und deren IT-Unterst\u00fctzung befasst. Gesch\u00e4ftsprozessmodellierung findet vor dem Hintergrund einer konkreten fachlichen Zielsetzung und mittels der Methoden und Sprachen eines spezifischen GPM-Konzeptes statt. ARIS und BPMN sind die f\u00fchrenden GPM-Konzepte mit je spezifischen Einsatzperspektiven. Sowohl f\u00fcr ARIS als auch f\u00fcr BPMN gibt es praxistaugliche Unterst\u00fctzungswerkzeuge.  \u2022\tIn Wissenschaft und Praxis aktuell nicht zufriedenstellend beantwortete Fragen zum Gesch\u00e4ftsprozessmanagement beziehen sich beispielsweise darauf, wie sich nach einem bestimmten GPM-Konzept erstellte Prozessmodelle  \u2022\tohne Informationsverlust und zus\u00e4tzlichen Informationsbedarf in Prozessmodelle eines anderen GPM-Konzeptes transformieren lassen oder  \u2022\thinsichtlich ihrer Notation in strategische, fachlich-operative und technische Prozessmodelle voneinander unterscheiden lassen. \" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/ms-computer-science-electives\/\">Gesch\u00e4ftsprozessmanagement (Business Process Management)<\/a><\/li>\n<li><a title=\"Ziele, Prinzipien, Methoden, Ma\u00dfnahmen sowie Techniken und Werkzeuge zum operativen, taktischen und strategischen Management von wirtschaftlich handelnden Unternehmen. Schwerpunkte liegen auf der Steuerung und leistungsbezogenen Lenkung von Unternehmen, wobei auf die IT Unterst\u00fctzung besonderer Wert gelegt wird.  Inhalte im Einzelnen: Grundlagen o\tOrganisation o\tEntscheidung o\tKoordination Operatives Management o\tF\u00fchrungsprinzipien o\tProzessmanagement o\tOperative Aspekte des Performance Managements Taktisches Management o\tPersonalmanagement o\tChange Management Strategisches Management o\tStrategische Steuerung  o\tStrategische Analyse und Diagnose\" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/ms-computer-science-electives\/\">Management und Unternehmenssteuerung (Management and Enterprise Control)<\/a><\/li>\n<li><a title=\"\u2022\tInduktives und deduktives Schlie\u00dfen, G\u00fcltigkeit und Wahrheit von kategorischen Syllogismen  \u2022\tPr\u00e4dikatenlogik und pr\u00e4dikatenlogische Inferenz \u2022\tProbalistisches Schlie\u00dfen \u2022\tPlanen und Handeln (auch unter Unsicherheit) in realen Umgebungen \u2022\teinfache und komplexe Entscheidungen \u2022\tInformationsgewinnung durch Lernen und Exploration, insbesondere induktives Lernen durch Beobachten \u2022\tBedeutung von Wissen beim Lernen \u2022\taktuelle Entwicklungsumgebungen f\u00fcr intelligente Agenten \u2022\taktuelle Themen aus dem Bereich Mensch-Computer-Interaktion und Usability Engineering\" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/ms-computer-science-electives\/\">Spezielle Gebiete der Mensch-Computer-Interaktion (Specific Areas of Human-Computer Interaction)<\/a><\/li>\n<li><a title=\"Erfolgreiches Projektmanagement umfasst organisato-rische, planerische und kontrollierende Aktivit\u00e4ten. Gro\u00dfprojekte in Unternehmen  stellen hierbei eine besondere Herausforderung dar: sie erfordern informatische und betriebswirtschaftliche, zunehmend auch medientechnische Kompetenzen, die in den Projekten vereint und harmonisiert werden m\u00fcssen.  Die Struktur der Veranstaltung orientiert sich an folgendem Schema: \u2022\tDie Organisation des Projektes in der Unternehmenshierarchie des Kunden  \u2022\tPlanung von IT-Projekten  \u2022\tKontrolle von IT-Projekten (Disziplinen des Projektmanagements im Hinblick auf die  Fortschrittskontrolle, Methoden und Techniken zur \u00dcberwachung von Projekten)  \u2022\tMethoden und Techniken, menschliche Aspekte Soziologische Aspekte sind von erfolgskritischer Bedeutung. Methodisches und zielgerichtetes Vorgehen, gute Kommunikation im Team und mit dem Kunden und das Finden einer gemeinsamen fachlichen, methodischen, sprachlichen und kulturellen Verst\u00e4ndigungsebene sind notwendige Mittel f\u00fcr ein effektives Projektmanagement.  Die vielseitigen Aufgaben eines Projektleiters sollen erarbeitet und alle notwendigen Methoden soweit erforderlich vermittelt werden. Weitergehende Aspekte werden behandelt, insb. Risikomanagement zur Sicherstellung der Business Continuity, Demand- und Changemanagement, soziologische Aspekte. \" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/ms-computer-science-electives\/\">Projekt Management<\/a><\/li>\n<\/ul>\n<p><strong>Subjects of the second year of study<\/strong><\/p>\n<ul>\n<li><a title=\"Supervised treatment of a more complex task in the framework of a research and development project (possibly in cooperation with external partners). The teacher defines the objectives and leads a regular discussion about the progress of the project. He also agrees on milestones as well as communications and other forms of cooperation. The projects are systematically supported. Accompanying these components the student carries out study with relevant literature independently.\" href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/ms-computer-science-project-phase\/\">Project area &#8211; three projects<\/a><\/li>\n<li>Master&#8217;s thesis<\/li>\n<\/ul>\n<p>The program has started in fall 2013.<\/p>\n<p>Related CUAS\u2019s Master programme:<\/p>\n<p>Master&#8217;s programme <a href=\"http:\/\/lwibs01.gm.fh-koeln.de\/blogs\/mastercomputerscience\/courses\/master-computer-science-in-software-engineering-deutsch\/\">Computer Science specializing in Software Engineering<\/a> (to be held in German)<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many companies are faced with rapid changes in the IT landscape for years. As the successful introduction and the effective operation of business application systems has become a critical factor, especially bigger companies need specialists who know the business and on the other hand are able to judge critical technologies, systems and services, development projects&#8230;  <a href=\"https:\/\/blogs.gm.fh-koeln.de\/mastercomputerscience\/courses\/master-computer-science-in-information-systems-english\/\" class=\"more-link\" title=\"Read Specialization in Information Systems (english)\"><?php _e(\"Read more &raquo;\",\"wpbootstrap\"); ?><\/a><\/p>\n","protected":false},"author":27,"featured_media":0,"parent":9,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-24","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blogs.gm.fh-koeln.de\/mastercomputerscience\/wp-json\/wp\/v2\/pages\/24","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.gm.fh-koeln.de\/mastercomputerscience\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.gm.fh-koeln.de\/mastercomputerscience\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.gm.fh-koeln.de\/mastercomputerscience\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.gm.fh-koeln.de\/mastercomputerscience\/wp-json\/wp\/v2\/comments?post=24"}],"version-history":[{"count":33,"href":"https:\/\/blogs.gm.fh-koeln.de\/mastercomputerscience\/wp-json\/wp\/v2\/pages\/24\/revisions"}],"predecessor-version":[{"id":55,"href":"https:\/\/blogs.gm.fh-koeln.de\/mastercomputerscience\/wp-json\/wp\/v2\/pages\/24\/revisions\/55"}],"up":[{"embeddable":true,"href":"https:\/\/blogs.gm.fh-koeln.de\/mastercomputerscience\/wp-json\/wp\/v2\/pages\/9"}],"wp:attachment":[{"href":"https:\/\/blogs.gm.fh-koeln.de\/mastercomputerscience\/wp-json\/wp\/v2\/media?parent=24"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}