Eastern Michigan University, School of Technology Studies – Master of Science in Technology Studies
Eastern Michigan University School of Technology Studies offers a Master of Science (MS) in Technology Studies (TCST). Evening, online and hybrid courses permit part-time and full time study toward the Master’s degree.
As technology shapes the new global economy, we need to stay current in this rapidly changing world. Professionals must constantly update their knowledge and skills to cope with the spreading impact of change, beyond what many professional educational programs provide. This degree is designed to provide the knowledge and skills to lead and manage technological change. Contemporary managers and administrators need to understand technology and its role in the global economy. This understanding allows professional growth and enhances career alternatives.
A total of 31-34 credit hours is required for the MS degree with 12 hours in core courses; 15-18 hours in the concentration of your choice: Technology Management, Information Assurance, Interdisciplinary Technology, and Homeland Security & Emergency Management*; with four to six hours of capstone experience.
Core Courses: 12 hours (required)
TS 505 - Introduction to Technology and Society
TS 506 - Patterns of Change in Technology and Culture
TS 508 - Contemporary Trends in Technology and Society
TS 509 - Research Methods in Technology Studies
Concentration Courses: Select one concentration from the following:
Technology Management: 15 hours
TM 510 - Principles of Managing Technological Enterprises 3 hrs
TM 555 - Technology and Organization 3 hrs
TM 560 - Technology and Labor Relations 3 hrs
TM 565 - Technology and Training 3 hrs
TM 615 - Implementing and Managing Technological Change 3 hrs
Information Assurance: 18 hours (from any combination of IA courses)
IA 532 - Audit Controls in Information Security 3 hrs
IA 544 - Cyber Law and Compliance for IA Systems 3 hrs
IA 622 - Risk, Vulnerability and Physical Analysis 3 hrs
IA 642 - Enterprise Security 3 hrs
IA 643 - Disaster Recovery - Business Continuity 3 hrs
IA 645 - Data Mining for IA Security 3 hrs
IA 642 - Enterprise Security 3 hrs
IA 643 - Disaster Recovery - Business Continuity 3 hrs
IA 646 - Open Source Security Administration 3 hrs
IA 647 - Microsoft Windows Security Administration 3 hrs
IA 650 - Ethical Hacking, Penetration Testing and Compliance 3 hrs
IA 651 - Enterprise Incident Response 3 hrs
IA 529 - Foreign and Domestic Terrorism and Information Warfare 3 hrs
IA 533 - Cybercrime I 3 hrs
IA 557 - Cybercrime II 3 hrs
IA 558 - Computer Forensics I 3 hrs
IA 559 - Computer Forensics II 3 hrs
IA 651 - Enterprise Incident Response 3 hrs
Interdisciplinary Studies: 15 hours (from any focus)
Technology and Culture
Communications
Computer Science
Management and Marketing
Public Administration
Women’s and Gender Studies
Homeland Security and Emergency Management*: 15 hours
SSC 529 - Foreign and Domestic Terrorism and Information Warfare 3 hrs
SSC 525 - Management/Leadership for Homeland Security 2 hrs
SSC 530 - Administrating the Public Safety Agency 2 hrs
SSC 535 - Planning and Decision Making for Homeland Security 2 hrs
SSC 540 - Human Resource Management in Public Safety Agencies 2 hrs
SSC 545 - Managing the critical Incident for Homeland Security 2 hrs
SSC 550 - Managing Technology in the Public Safety Environment 2 hrs
* Restricted to those enrolled in Staff & Command Executive Leadership Program
Capstone Experience Courses: 4-6 hours
Select from either option I or option II:
Option I: Capstone Project
TS 691 - Proposal Development 1 hr
TS 693 - Capstone Project 3 hrs
Option II: Thesis
TS 691 - Proposal Development 1 hr
TS 695 - Thesis 5 hrs
Eastern Michigan University is regionally accredited by The Higher Learning Commission.
For more information Contact:
MS-TCST Program Coordinator
Eastern Michigan University
College of Technology
School of Technology Studies
122 Sill Hall
Ypsilanti, MI 48197
Phone: (734) 487-1161
Email:
Additional Information:
Updated: 8/27/2014
“Please note: Some of the Web sites linked to in this document are not federal government Web sites, and may not necessarily operate under the same laws, regulations, and policies as federal Web sites.”