28 research outputs found

    Information systems outsourcing in major Portuguese companies - contracting services

    Get PDF
    The information systems outsourcing presents itself as a strategic option for companies and continues to evolve in size and in type of contracts.In order to identify the most frequently outsourced services and aiming to get a better comprehension on the hiring process, a study was made based on a survey sent to information systems managers of large Portuguese companies.The study allowed to identify the information systems services usually outsourced, the main criteria used for selecting suppliers, the aspects considered in contracts, the difficulties that arise in relationships between customers and suppliers, and the mechanisms adopted for conflict resolution.- (undefined

    The Malaysian Journal of Computer Science 1996-2006: a bibliometric study

    No full text
    This paper analyses publication and citation patterns in the Malaysian Journal of Computer Science(MJCS) from 1996-2006. The articles in MJCS are mostly written by Malaysian academics, with only limited inputs from international sources. Comparisons are made with the companion Malaysian Journal of Library and Information Science in terms of the type, number of references, length and numbers of authors for individual papers. Searches of Google Scholar showed that 53 MJCS articles attracted a total of 86 citations, of which 43 were self-citations

    A citation analysis of the ACE2005 - 2007 proceedings, with reference to the June 2007 CORE conference and journal rankings

    Full text link
    This paper compares the CORE rankings of computing education conferences and journals to the frequency of citation of those journals and conferences in the ACE2005, 2006 and 2007 proceedings. The assumption underlying this study is that citation rates are a measure of esteem, and so there should be a positive relationship between citation rates and rankings. The CORE conference rankings appear to broadly reflect the ACE citations, but there are some inconsistencies between citation rates and the journal rankings. The paper also identifies the most commonly cited books in these ACE proceedings. Finally, in the spirit of "Quis custodiet ipsos custodes?" the paper discusses some ways in which the CORE rankings process itself might in future be made more transparent and open to scholarly discourse. © 2008, Australian Computer Society, Inc

    The Role of ERP in Improving Organization�s Intellectual Capital

    Get PDF
    The purpose of this study was to identify the influence of management control system (MCS) on intellectual capital through the implementation of ERP as intervening variable. Theoretical model is developed that considers two concepts of MCS (the belief system and the boundary system) and the roles they play in enhancing intellectual capital. Data collected via survey from 57 managers of 36 companies in Indonesia that have implemented ERP system. This research used the partial least square to describe relationships between variables. Results suggest that belief system and boundary system has a positive influence towards intellectual capital through the implementation of ERP as intervening variable on the companies that implement ERP system in Indonesia. When the users experience that ERP is useful and easy to use, the users will use it well. Finding offer the implication for managers to start paying attention to the factors which can help improving the users� work performance. As the users� performance improved the company�s intellectual capital will also be improved

    Ecosistemas de aprendizaje adaptativos

    Get PDF
    [ES]La conferencia “Ecosistemas de Aprendizaje Adaptativos” fue impartida el 30 de junio de 2016 en el ICE, Universidad de Zaragoza en el contexto de la Jornada “Cómo conseguir aprendizaje personalizado en la formación presencial” dentro del Programa de Actividades de Formación Continua para el Profesorado de la Universidad de Zaragoza

    An investigation into computer and network curricula

    Get PDF
    This thesis consists of a series of internationally published, peer reviewed, journal and conference research papers that analyse the educational and training needs of undergraduate Information Technology (IT) students within the area of Computer and Network Technology (CNT) Education. Research by Maj et al has found that accredited computing science curricula can fail to meet the expectations of employers in the field of CNT: “It was found that none of these students could perform first line maintenance on a Personal Computer (PC) to a professional standard with due regard to safety, both to themselves and the equipment. Neither could they install communication cards, cables and network operating system or manage a population of networked PCs to an acceptable commercial standard without further extensive training. It is noteworthy that none of the students interviewed had ever opened a PC. It is significant that all those interviewed for this study had successfully completed all the units on computer architecture and communication engineering (Maj, Robbins, Shaw, & Duley, 1998). The students\u27 curricula at that time lacked units in which they gained hands-on experience in modern PC hardware or networking skills. This was despite the fact that their computing science course was level one accredited, the highest accreditation level offered by the Australian Computer Society (ACS). The results of the initial survey in Western Australia led to the introduction of two new units within the Computing Science Degree at Edith Cowan University (ECU), Computer Installation & Maintenance (CIM) and Network Installation & Maintenance (NIM) (Maj, Fetherston, Charlesworth, & Robbins, 1998). Uniquely within an Australian university context these new syllabi require students to work on real equipment. Such experience excludes digital circuit investigation, which is still a recommended approach by the Association for Computing Machinery (ACM) for computer architecture units (ACM, 2001, p.97). Instead, the CIM unit employs a top-down approach based initially upon students\u27 everyday experiences, which is more in accordance with constructivist educational theory and practice. These papers propose an alternate model of IT education that helps to accommodate the educational and vocational needs of IT students in the context of continual rapid changes and developments in technology. The ACM have recognised the need for variation noting that: There are many effective ways to organize a curriculum even for a particular set of goals and objectives (Tucker et al., 1991, p.70). A possible major contribution to new knowledge of these papers relates to how high level abstract bandwidth (B-Node) models may contribute to the understanding of why and how computer and networking technology systems have developed over time. Because these models are de-coupled from the underlying technology, which is subject to rapid change, these models may help to future-proof student knowledge and understanding of the ongoing and future development of computer and networking systems. The de-coupling is achieved through abstraction based upon bandwidth or throughput rather than the specific implementation of the underlying technologies. One of the underlying problems is that computing systems tend to change faster than the ability of most educational institutions to respond. Abstraction and the use of B-Node models could help educational models to more quickly respond to changes in the field, and can also help to introduce an element of future-proofing in the education of IT students. The importance of abstraction has been noted by the ACM who state that: Levels of Abstraction: the nature and use of abstraction in computing; the use of abstraction in managing complexity, structuring systems, hiding details, and capturing recurring patterns; the ability to represent an entity or system by abstractions having different levels of detail and specificity (ACM, 1991b). Bloom et al note the importance of abstraction, listing under a heading of: “Knowledge of the universals and abstractions in a field” the objective: Knowledge of the major schemes and patterns by which phenomena and ideas arc organized. These are large structures, theories, and generalizations which dominate a subject or field or problems. These are the highest levels of abstraction and complexity\u27\u27 (Bloom, Engelhart, Furst, Hill, & Krathwohl, 1956, p. 203). Abstractions can be applied to computer and networking technology to help provide students with common fundamental concepts regardless of the particular underlying technological implementation to help avoid the rapid redundancy of a detailed knowledge of modem computer and networking technology implementation and hands-on skills acquisition. Again the ACM note that: “Enduring computing concepts include ideas that transcend any specific vendor, package or skill set... While skills are fleeting, fundamental concepts are enduring and provide long lasting benefits to students, critically important in a rapidly changing discipline (ACM, 2001, p.70) These abstractions can also be reinforced by experiential learning to commercial practices. In this context, the other possibly major contribution of new knowledge provided by this thesis is an efficient, scalable and flexible model for assessing hands-on skills and understanding of IT students. This is a form of Competency-Based Assessment (CBA), which has been successfully tested as part of this research and subsequently implemented at ECU. This is the first time within this field that this specific type of research has been undertaken within the university sector within Australia. Hands-on experience and understanding can become outdated hence the need for future proofing provided via B-Nodes models. The three major research questions of this study are: •Is it possible to develop a new, high level abstraction model for use in CNT education? •Is it possible to have CNT curricula that are more directly relevant to both student and employer expectations without suffering from rapid obsolescence? •Can WI effective, efficient and meaningful assessment be undertaken to test students\u27 hands-on skills and understandings? The ACM Special Interest Group on Data Communication (SJGCOMM) workshop report on Computer Networking, Curriculum Designs and Educational Challenges, note a list of teaching approaches: ... the more \u27hands-on\u27 laboratory approach versus the more traditional in-class lecture-based approach; the bottom-up approach towards subject matter verus the top-down approach (Kurose, Leibeherr, Ostermann, & Ott-Boisseau, 2002, para 1). Bandwidth considerations are approached from the PC hardware level and at each of the seven layers of the International Standards Organisation (ISO) Open Systems Interconnection (OSI) reference model. It is believed that this research is of significance to computing education. However, further research is needed

    Detecting Violations of Access Control and Information Flow Policies in Data Flow Diagrams

    Get PDF
    The security of software-intensive systems is frequently attacked. High fines or loss in reputation are potential consequences of not maintaining confidentiality, which is an important security objective. Detecting confidentiality issues in early software designs enables cost-efficient fixes. A Data Flow Diagram (DFD) is a modeling notation, which focuses on essential, functional aspects of such early software designs. Existing confidentiality analyses on DFDs support either information flow control or access control, which are the most common confidentiality mechanisms. Combining both mechanisms can be beneficial but existing DFD analyses do not support this. This lack of expressiveness requires designers to switch modeling languages to consider both mechanisms, which can lead to inconsistencies. In this article, we present an extended DFD syntax that supports modeling both, information flow and access control, in the same language. This improves expressiveness compared to related work and avoids inconsistencies. We define the semantics of extended DFDs by clauses in first-order logic. A logic program made of these clauses enables the automated detection of confidentiality violations by querying it. We evaluate the expressiveness of the syntax in a case study. We attempt to model nine information flow cases and six access control cases. We successfully modeled fourteen out of these fifteen cases, which indicates good expressiveness. We evaluate the reusability of models when switching confidentiality mechanisms by comparing the cases that share the same system design, which are three pairs of cases. We successfully show improved reusability compared to the state of the art. We evaluated the accuracy of confidentiality analyses by executing them for the fourteen cases that we could model. We experienced good accuracy

    An updated review of the concept of eLearning. Tenth anniversary

    Get PDF
    [ES]Los continuos avances en el plano tecnológico provocan flujos de innovación-aceptaciónconsolidación- obsolescencia propios de las estrategias, ya sean ad hoc o planificadas, de gestión del conocimiento y de la tecnología de las corporaciones, y, a otra escala, de los propios individuos. Los procesos de enseñanza+aprendizaje no son, obviamente, ajenos a esta circunstancia. La irrupción de las Tecnologías de la Información y la Comunicación como herramienta educativa supone un punto de inflexión conceptual y metodológico en la forma en que las instituciones, educativas o no, afrontan los procesos educativos y la gestión del aprendizaje, especialmente en lo tocante al concepto de educación a distancia, que evoluciona, de una manera más o menos significativa, al adoptar Internet como medio, lo que da lugar al término eLearning. Pero desde las primeras experiencias eLearning – muy asentadas en el concepto de plataforma o Learning Management System–, hasta las más recientes, se han producido importantes cambios, de nuevo tanto en el plano tecnológico como metodológico, en los que, además de otros factores, destacan las influencias que los medios sociales producen en los hábitos diarios de los usuarios, de forma que se pone de manifiesto una mayor demanda de personalización del aprendizaje, una conectividad absoluta con otros pares, un acceso ilimitado a los recursos y fuentes de información, una flexibilidad total del modo, el lugar y el momento del acceso y una convivencia cada vez más natural y necesaria de los flujos formales e informales de aprendizaje. Con todo esto, las plataformas eLearning “tradicionales”, aunque gozan de un porcentaje altísimo de penetración y se encuentran sumamente consolidadas, requieren de una evolución y una mayor apertura para dar soporte a este rico abanico de posibilidades que demandan sus usuarios, dejando de ser el centro de atención tecnológica para pasar a ser un componente más en un complejo ecosistema digital orientado a la gestión del aprendizaje y del conocimiento, ya sea institucional o personal. Es, por tanto, necesario volver a hacer una revisión actualizada del concepto de eLearning y releer las definiciones que de este concepto se han aportado desde la experiencia y enfoque de nuestro grupo de investigación GRIAL (GRupo de investigación en InterAcción y eLearning), coincidiendo con el décimo aniversario del artículo “Estado actual de los sistemas e-learning”.[EN]The continuous advances in technology cause innovation-acceptation-consolidationobsolescence flows regarding the knowledge and technology management strategies, both ad hoc and planned, of the corporations and also, in a different scale, of the individuals. Teaching and learning processes are not obviously unaware of this situation. The irruption of Information and Communication Technologies as educational tools mean both a conceptual and a methodological turning point in the way that institutions, educational or not, face training processes and learning management, especially with regard to the concept of distance education, which evolves, in a more or less significant way, when it adopts Internet as media; that is how the eLearning concept rises. However, from the first eLearning experiences, too much settled on the concept of platform or Learning Management System, up to the present times, there have been significant changes, again in both technological and methodological levels. It is important to underline, among others, the influence of social media in the daily habits of users. This way, an increased demand of learning personalization it is shown, as so as a complete connectivity with other peers, an unlimited access to resources and information sources, a complete flexibility in the way, place and time they access, and a natural and necessary coexistence of both formal and informal learning flows. Thus, the “traditional” eLearning platforms, despite their large penetration and consolidation, need to evolve and open themselves to support this rich fan of possibilities demanded by the users, ceasing to be the centre technological attention to become another component into a complex digital ecosystem oriented to the learning and knowledge management, both at institutional and personal levels. It is therefore necessary to make an updated review of the eLearning concept and its definitions that have been provided from the experience and perspective of our research group GRIAL (Research Group in InterAction and eLearning), coinciding with the tenth anniversary of the “Current status of e-learning systems” paper
    corecore