A. Top Information Technology Open Courseware
Health Information Technology Standards and Systems Interoperability – JHSPH
The Johns Hopkins Bloomberg School of Public Health, covers topics in health information technology (HIT) through this open course. It includes Lecture presentations, a reading list and Mp3s. (ocw.jhsph.edu/index.cfm/go/viewcourse/course/infstandards/coursePage/index/)
Health Information Systems to Improve Quality of Care in Resource-Poor Settings – MIT
This open course is a collaborative effort of a number of organizations. It explores how information systems can improve healthcare in developing countries. It includes audio and video lectures, notes, papers and student projects. It is a course for both bachelor’s and master’s students. (http://ocw.mit.edu/courses/health-sciences-and-technology/hst-s14-health-information-systems-to-improve-quality-of-care-in-resource-poor-settings-spring-2012/)
Information technology: A new era? – OpenLearn
This 15-hour course gives students a deep grasp of the dynamics of any industry using the analogy of a life cycle. It also explores the relationship between technological developments and new industries, as well as that between technology and the economy. (http://www.open.edu/openlearn/society/politics-policy-people/sociology/information-technology-new-era/content-section-0?name=DD202_2)
Information Theory – Utah State
Prof. Todd Moon from Utah State’s department of Electrical and Computer Engineering explores the ability of humans to transmit information. It introduces concepts like channel and source coding theorems and information entropy and forms a sound basis for the exploration of further topics such as signal processing, data compression and pattern recognition. (ocw.usu.edu/Electrical-and-Computer-Engineering/Information-Theory/index.html)
Information Technology as an Integrating Force in Manufacturing – MIT
Prof. Brian Subirana from MIT avails videos and lecture notes from this 2003 course. It is designed to examine the basic principles of information systems, and how they can be applied in manufacturing. Other resources provided include study questions and a bibliography. (http://ocw.mit.edu/courses/sloan-school-of-management/15-566-information-technology-as-an-integrating-force-in-manufacturing-spring-2003/)
Intensive Introduction to Computer Science – Harvard
This is an accelerated course that goes further than information systems and explores languages, software development and design, and operating systems as well as websites, networks, security, cryptography and forensics. It is presented as a series of two-hour lectures. (http://www.extension.harvard.edu/open-learning-initiative/intensive-introduction-computer-science)
Integrating eSystems & Global Information Systems MIT
The MIT Sloan School of Management offers this course, instructed byProf. Stuart Madnick, looks at the technologies and strategies required for information to be well-integrated into systems. Resources available include lecture notes, exams, assignments, case studies, and past projects. This course is relevant for both undergraduate and graduate students. (http://ocw.mit.edu/courses/sloan-school-of-management/15-565j-integrating-esystems-global-information-systems-spring-2002/)
Introducing Ethics in Information and Computer Sciences – OpenLearn
This course from the educational technology department at the Open University discusses ethical questions and real-world situations in IT. In nearly 40 study hours, classical dialogues and plays are examined and discussed. (http://www.open.edu/openlearn/education/educational-technology-and-practice/educational-technology/introducing-ethics-information-and-computer-sciences/content-section-0)
B. Top Information Technology Blogs.
Blog@CACM
This blog is run by the Association for Computing Machinery. Its content includes thoughts and articles from many different authors. Its articles cover a vast array of topics that all involved in information systems will appreciate. (cacm.acm.org/blogs/blog.com)
Apophenia
This blog is maintained by Danah Boyd, a leading researcher at Microsoft, and a Professor at New York University. The blog speaks deeply about issues such as privacy and big data. Its posts are informative and contain information that is useful to information systems specialists. (www.zephoria.org/thoughts/)
CERIAS Blog
CERIAS Blog is sponsored by Purdue University through its Center for Education and Research in Information Assurance and Security. Information Security professionals are encouraged to read this blog for its thorough and analytical posts, with articles such as “Schrodinger’s Catnip: A Review of the NSA Phone Surveillance Program,” and “Opticks and a Treatise on the PRISM Surveillance Program.” (www.cerias.purdue.edu/site/blog/)
The Ethical Hacker Network
Donald C. Conzal is the guy behind this blog-like magazine. It is informative with columns, videos and forums, for readers, especially information security professionals to make use of. Its posts cover mobile hacking and other topics. (www.ethicalhacker.net)
The Eponymous Pickle
The Eponymous Pickle is a blog by Franz Dill that posts useful articles on a number of emerging technologies. Its articles talk about quantum computing, unstructured data and more. (eponymouspickle.blogspot.com)
My Biased Coin
Michael Mitzenmacher has continued to document his thoughts on information theory, computer science and algorithms, on his blog since 2007. His posts tend to be more academic and are recommended for all in the field of information systems. (mybiasedcoin.blogspot.com)
Wild Webmink
Simon Phipps is an independent consultant who posts his expertise and insight onto this blog. His posts are featured quite regularly in other media publications such as InfoWorld. “Too Much Power?” and “Don’t Stop with the Trolls,” are among some of his interesting articles that information systems professionals are bound to find exciting. (webmink.com)
Shark Tank
This is the blog of ComputerWorld, the online magazine. Shark Tank provides fresh news for professionals involved in Information systems specialists, with posts such as “Now That’s Secure!”and “Safety first.” (blogs.computerworld.com/blog/shark-tank)
C. Top Information Technology Open Access Journals
Electronic Journal of Information Systems Evaluation
This journal is largely focused on assessing the impact of systems evaluation for organizations and managers. Its content includes reports, theoretical papers, book reviews and more, that are usually subjected to double-blind review. It also includes rich articles such as the one titled, “Exception-Based Approach for Information Systems Evaluation: The Method and its Benefits to Information Systems Management.” (www.ejise.com/main.html)
Australasian Journal of Information Systems
The content on this journal covers theory on information systems, research approaches and applications. It appeals to many Information Systems professionals and concentrates largely on Australasian content. Recent content has included such papers as “Beyond Normal Competencies: Understanding Organization Designs to Develop and Sustain IT-Related Capabilities,” and “Using Historical Methods in Information Systems: A Primer for Researchers.” (journal.acs.org.au/index.php/ajis)
Enterprise Information Systems
Enterprise Information Systems is published twice a monthly, and is focused on the various aspects and challenges of integrating enterprise information systems. It is a peer-reviewed journal that frequently covers topics like engineering, enterprise resource planning, modeling and management. “The adaptive approach for storage assignment by mining data of warehouse management system for distribution centres,” and “Modelling and analysis of workflow for lean supply chains,” are among its most popular articles. (www.tandfonline.com/action/showMostReadArticles?journalCode=teis20#.UtVsFf2TOFI)
Information Systems Management
The goal of this journal is to advance Information Systems management. It publishes research, best practices, and papers , based on surveys, case studies and experiences. Generally, content is taken through a double-blind peer review before publishing. Articles may be freely accessible or may require a paid subscription. (http://www.tandfonline.com/action/showMostReadArticles?journalCode=uism20#.UtVqUP2TOFI)
Information Security Journal: A Global Perspective
This journal posts articles on innovations, trends, and emerging technology. Content also includes papers that take the “how-to” approach and that come with approval from two or more experts . Articles from the journal may be freely accessible, or may require a subscription. (http://www.tandfonline.com/loi/uiss19#.UtVqrP2TOFI)
Issues in Information Systems
Issues in Information Systems by the International Association for Computer Information Systems is a resourceful journal with peer-reviewed articles that are available for free. The journal is published annually. Its articles include ‘Exploring Accounting Information Systems and Embezzlement from Nonprofit Organizations,” together with “Evaluating and Implementing Load and Performance Testing Tools to Test Adobe Flex,” and “Other Rich Internet Applications: A Case Study.” (www.iacis.org/iis/iis.php)
Systems
Systems is a peer-reviewed journal whose content is made up mostly of original research on a variety of topics related to information systems, such as management, social, information and socio-technical. Each of its papers is detailed and has no length restriction. Submissions are posted online as soon as they are accepted. (www.mdpi.com/journal/systems)
Journal of Information Systems and Technology Management
This journal publishes top-rated academic papers covering subjects in information science. Being an open access journal, each of its published papers is subjected to a rigorous double-blind review. An example of one of its articles is, “The Development of Value Systems and the Role of Information Systems in the Portuguese Insurance Industry.” (www.jistem.fea.usp br/index.php/jistem/index)
D. Magazines for IT Professionals and Students
CSO Online
Information security professionals can find all they need on CSO which publishes research, news and analysis on topics related to the field. The magazine includes interesting articles and a job board for job seekers. (www.csoonline.com)
CIO
Information Systems professional can keep abreast with the latest developments in the field, thanks to CIO, which has ben providing analysis and insight on IT since 1987. It is filled with news, blogs, analysis and videos, as well as an informative How-To page. Its articles include such as titled, “Appeals court strikes down FCC’s net neutrality rule,” as well as “Target Hackers Have More Data Than They Can Sell.” (www.CIO.com)
Hakin9
Hakin9 is the top provider of leading solutions to security issues. It targets security professionals as well as hackers, and although a lot of its content is free, some of it may require a paid subscription. (hakin9.org)
Info World
This online magazine provides commentary on the latest developments in the field of emerging technologies, and is the number one source of information on the field. It features professional reviews and White Papers. (www.infoworld.com)
Information Week
Information Week is the go-to place for IT professionals to connect and share. It is made of nine distinct communities including Big Data, Strategic CIO, Security and Infrastructure. “5 Ways Enterprise WiFi Will Advance in 2014,” and “Why the Datacenter is the Center of the Universe,” are among some of its recent articles. (www.informationweek.org)
(IN)SECURE
This magazine provides its content for free, digitally. It explores internet security and hacking, covering topics like forensics, malware, web app security and mobile threats. Its articles offer information on how to achieve highly secured networks and building a security culture. (www.net-security.org/insecuremag.php)
Wired
Wired is devoted to the field of information systems and technology. It posts about the new innovations in these fields and contains articles with information for many different categories. (www.wired.com)
SC Magazine
SC magazine targets professionals in Information Systems with its in-depth information. It features news, product reviews and analysis with posts and videos that cover topics in the field. (www.scmagazine.com)
E. Professional Organizations for IT Students
Association for Computing Machinery
With over 100,000 members, ACM is the largest IT society in the world. Its members can access valuable journals and magazines, certificate courses, books, and a job board – but to mention a few of the available resources. (www.acm.org/membership/membership-benefits)
American Society for Information Science and Technology
This professional organization was formed in 1937. Its members have access to informative journals and a bulletin. Members are also given the opportunity to network via summits, local chapters and conferences. Other resources include a job board, a library, webinars, and more. (www.asis.org/membership.php)
Association for Information Systems
The Association for Information Systems has members from more than 90 countries. It is the home of all organizations and individuals who are leading the way in the research and practice of information systems. Both students and professionals may become members. Membership comes with privileges such as an eLibrary, prestigious academic journals and international conferences. (ais.site-ym.com/?MembershipRates)
International Association for Computer Information Systems
This professional association is committed to improving the study of information systems. Members have access to benefits such as presenting and publishing their original research at conferences and respected journals. It also includes a subscription to the IACIS’ Journal of Computer Information Systems. (www.iacis.org/join/join.php)
Data Management Association International
This is a worldwide association of technical professionals. Membership comes with various benefits. For example, there are numerous networking opportunities and events, discounts for certain education programs, and access to several DAMA publications such as the 2011 Dictionary of Data Management. (www.dama.org)
ISACA
ISACA was formerly known as the Information Systems Audit and Control Association during its founding in 1967. It now has more than 110,000 members worldwide from student, academic, student, and professional backgrounds. Members are presented with networking opportunities, an eLibrary, the ISACA Journal and more. (www.isaca.org/Membership/Student-Membership/Pages/default.aspx)
Women in Technology International
This professional association is focused on promoting women professionals involved in the information systems field. WITI members have access to educational opportunities, special discounts and a Career Center, where members can search for jobs and post their resumes. (www.WITI.com/center/membership/)
Information Systems Security Association
This organization is dedicated to supporting professionals in the information security field. Membership comes with networking opportunities, a monthly journal, national conferences, a job board, seminars, webinars and web conferences. (www.issa.org/?page=Benefits)
F. Top Information Technology Books.
Guide to Disaster Recovery
Michael Erbschloe takes network professionals through the fundamentals required to bounce back from disasters. This book thus covers topics like recovery plans, policies and procedures, risk assessments, plan testing and division of roles within an organization. (http://www.amazon.com/Guide-Disaster-Recovery-Michael-Erbschloe/dp/0619131225/ref=sr_1_21?s=books&ie=UTF8&qid=1389720999&sr=1-21)
Big Data: A Revolution That Will Transform How We Live, Work, and Think
This book details the advantages and risks of collecting huge chunks of data and analyzing them. It goes into detail about topics such as privacy, prediction, economic efficiency and more, making it a useful resource for all involved in information systems. (http://www.amazon.com/Big-Data-Revolution-Transform-Think/dp/0544002695/ref=lp_6524631011_1_1?s=books&ie=UTF8&qid=1389721734&sr=1-1)
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
In his book, Violent Python, TJ O’Connor shows that systems administrators can make use of the Python programming language in their defense against hackers. The book delves further into script writing, network attacks, extracting metadata, and investigating forensic artifacts, from the perspective of a hacker and a network defender. (http://www.amazon.com/Violent-Python-Cookbook-Penetration-Engineers/dp/1597499579/ref=pd_sim_b_2)
Time Management for Systems Administrators
Thomas Limoncelli, in this must-read book, goes through the ways in which busy system administrators can manage short-term emergencies more effectively without losing focus on their longer term projects. His tips and tricks for managing crises while adhering to daily goals makes this book helpful to all administrators. (http://www.amazon.com/Management-System-Administrators-Thomas-Limoncelli/dp/0596007833/ref=sr_1_14?s=books&ie=UTF8&qid=1389720677&sr=1-14)