13,870 research outputs found
Multinational perspectives on information technology from academia and industry
As the term \u27information technology\u27 has many meanings for various stakeholders and continues to evolve, this work presents a comprehensive approach for developing curriculum guidelines for rigorous, high quality, bachelor\u27s degree programs in information technology (IT) to prepare successful graduates for a future global technological society. The aim is to address three research questions in the context of IT concerning (1) the educational frameworks relevant for academics and students of IT, (2) the pathways into IT programs, and (3) graduates\u27 preparation for meeting future technologies. The analysis of current trends comes from survey data of IT faculty members and professional IT industry leaders. With these analyses, the IT Model Curricula of CC2005, IT2008, IT2017, extensive literature review, and the multinational insights of the authors into the status of IT, this paper presents a comprehensive overview and discussion of future directions of global IT education toward 2025
Engineering at San Jose State University, Winter 2014
https://scholarworks.sjsu.edu/engr_news/1012/thumbnail.jp
Preparing millennials as digital citizens and socially and environmentally responsible business professionals in a socially irresponsible climate
As of 2015, a millennial born in the 1990's became the largest population in
the workplace and are still growing. Studies indicate that a millennial is tech
savvy but lag in the exercise of digital responsibility. In addition, they are
passive towards environmental sustainability and fail to grasp the importance
of social responsibility. This paper provides a review of such findings
relating to business communications educators in their classrooms. The
literature should enable the development of a millennial as an excellent global
citizen through business communications curricula that emphasizes digital
citizenship, environmental sustainability and social responsibility. The
impetus for this work is to provide guidance in the development of courses and
teaching strategies customized to the development of each millennial as a
digital, environmental and socially responsible global citizen
Digital interaction: where are we going?
In the framework of the AVI 2018 Conference, the interuniversity center ECONA has organized a thematic workshop on "Digital Interaction: where are we going?". Six contributions from the ECONA members investigate different perspectives around this thematic
Moving from a "human-as-problem" to a "human-as-solution" cybersecurity mindset
Cybersecurity has gained prominence, with a number of widely publicised security incidents, hacking attacks and data breaches reaching the news over the last few years. The escalation in the numbers of cyber incidents shows no sign of abating, and it seems appropriate to take a look at the way cybersecurity is conceptualised and to consider whether there is a need for a mindset change.To consider this question, we applied a "problematization" approach to assess current conceptualisations of the cybersecurity problem by government, industry and hackers. Our analysis revealed that individual human actors, in a variety of roles, are generally considered to be "a problem". We also discovered that deployed solutions primarily focus on preventing adverse events by building resistance: i.e. implementing new security layers and policies that control humans and constrain their problematic behaviours. In essence, this treats all humans in the system as if they might well be malicious actors, and the solutions are designed to prevent their ill-advised behaviours. Given the continuing incidences of data breaches and successful hacks, it seems wise to rethink the status quo approach, which we refer to as "Cybersecurity, Currently". In particular, we suggest that there is a need to reconsider the core assumptions and characterisations of the well-intentioned human's role in the cybersecurity socio-technical system. Treating everyone as a problem does not seem to work, given the current cyber security landscape.Benefiting from research in other fields, we propose a new mindset i.e. "Cybersecurity, Differently". This approach rests on recognition of the fact that the problem is actually the high complexity, interconnectedness and emergent qualities of socio-technical systems. The "differently" mindset acknowledges the well-intentioned human's ability to be an important contributor to organisational cybersecurity, as well as their potential to be "part of the solution" rather than "the problem". In essence, this new approach initially treats all humans in the system as if they are well-intentioned. The focus is on enhancing factors that contribute to positive outcomes and resilience. We conclude by proposing a set of key principles and, with the help of a prototypical fictional organisation, consider how this mindset could enhance and improve cybersecurity across the socio-technical system
An Overview of the New ACM/IEEE Information Technology Curricular Framework
ACM and IEEE have developed a curricular report titled, “Information Technology Curricula 2017: Curriculum Guidelines for Baccalaureate Degree Programs in Information Technology,” known also as IT2017. The development of this report has received worldwide content contributions from industry and academia through surveys as well as many international conferences and workshops. An open online publication of the report was made available in December 2017. This paper presents a digest of the content of the report, the IT curricular framework, and suggestions for its use in developing new information technology programs or enhancing existing ones. The heart of the IT curricular framework is a set of competencies identified through knowledge, skills, and dispositions, as supported by pedagogical research. The paper also describes ways in which institutions could use the curricular framework not only to develop information technology degree programs, but also to improve and enhance related computing programs
The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities
In spite of the growing importance of software security and the industry
demand for more cyber security expertise in the workforce, the effect of
security education and experience on the ability to assess complex software
security problems has only been recently investigated. As proxy for the full
range of software security skills, we considered the problem of assessing the
severity of software vulnerabilities by means of a structured analysis
methodology widely used in industry (i.e. the Common Vulnerability Scoring
System (\CVSS) v3), and designed a study to compare how accurately individuals
with background in information technology but different professional experience
and education in cyber security are able to assess the severity of software
vulnerabilities. Our results provide some structural insights into the complex
relationship between education or experience of assessors and the quality of
their assessments. In particular we find that individual characteristics matter
more than professional experience or formal education; apparently it is the
\emph{combination} of skills that one owns (including the actual knowledge of
the system under study), rather than the specialization or the years of
experience, to influence more the assessment quality. Similarly, we find that
the overall advantage given by professional expertise significantly depends on
the composition of the individual security skills as well as on the available
information.Comment: Presented at the Workshop on the Economics of Information Security
(WEIS 2018), Innsbruck, Austria, June 201
European smart specialization for Ukrainian regional development: path from creation to implementation
The focus of the research is to develop recommendations of smart specialization (SS) for Ukrainian policymakers using European approaches. The authors revealed that the main SS projects are presented in such sectors as agri-food, industrial modernization and energy. More than 12 EU countries were the plot for conducted analysis of SS, as a result of which the level of activity of each country was determined. The creation of consortiums, including SMEs, associations, universities and other participants, disclosed the successful way of SS realization. The structure of SME’s innovative potential
in Ukraine was identified underlining their main characteristic features like types of innovations and innovative activity, differentiation according to enterprise size, their regional distribution. The authors explored lack of innovations on regional and national level and significant territorial disparities, which could be eliminated through policy implementation of regional SS. The existing legislative norms for possibility of SS implementation in Ukraine were analyzed due to correspondence with the EU ones.
The analysis provides the opportunity to consider them only as general framework documents without any action plans and sectoral prioritization at all. The weak points of these law documents are emphasized. As a result of research, the authors developed recommendations presented by direct action plan for Ukrainian policymakers, which include such activities as underlining key priorities (especially ICT applicability in every SS project) and their correspondence with the EU ones; eliminating regional imbalances by focusing on innovation development and reorientation of some regions according to SS priorities; respecting regional existing capacities; providing organizational mechanism for cooperation of stakeholders and financial mechanism for SS support through the EU structural funds
- …