Schools: Telfer School of Management, School of Information Technology and Engineering, and the Faculty of Law.
Description: Interdisciplinary degree offering two specializations: Electronic Business and Electronic Technologies. Electronic Business focuses on organizational transformations based on IT, with research on best practices and trends, comparative analysis of new business models, performance evaluation based on new technologies, efficacy of new services and methods in attracting and satisfying customers and simulation of integrated supply chains. Electronic Technologies focuses on IT and system architectures used to create and manage online transactions. Research focuses on electronic commerce technologies and protocols (including wireless and multi-media); the analysis and development of algorithms (including security, data mining, Web data warehouses and distributed applications); and the definition of standards, architectures and software engineering methodologies for e-commerce systems.
Prerequisites: Honors bachelor's degree in a relevant discipline. For the e-business stream, disciplines such as business administration, economics, computer science, electrical engineering and business information are relevant. For the e-technologies stream, disciplines such as computer science, computer engineering, software engineering, electrical engineering and business information are relevant.
Full-time program: 12 months for a Master in Electronic Business Technologies; 16 months for a Master of Science in Electronic Business Technologies (thesis required).
Part-time options: Yes, though degree must be completed within four years of initial registration.
6 Tools to Protect Big DataMost IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift.
Big Data Brings Big Security ProblemsWhy should big data be more difficult to secure? In a word, variety. But the business won’t wait to use it to predict customer behavior, find correlations across disparate data sources, predict fraud or financial risk, and more.