29,483 research outputs found

    Environmental modelling of the Chief Information Officer

    Get PDF
    Since the introduction of the term in the 1980’s, the role of the Chief Information Officer (CIO) has been widely researched. Various perceptions and dimensions of the role have been explored and debated. However, the explosion in data proliferation (and the inevitable resulting information fuelled change) further complicates organisational expectations of the CIOs role. If organisations are to competitively exploit the digital trend, then those charged with recruiting and developing CIOs now need to be more effective in determining (and shaping) CIO traits and attributes, within the context of their own organisational circumstances and in line with stakeholder expectations. CIOs also need to determine their own suitability and progression within their chosen organisation if they are to remain motivated and effective. Before modelling the role of the future CIO, it is necessary to synthesise our current knowledge (and the lessons learnt) about the CIO. This paper, therefore, aims to identify and summate the spectrum of key researched ‘themes’ pertaining to the role of the CIO. Summating previous research, themes are modelled around four key CIO ‘dimensions’, namely (1) Impacting factors, (2) Controlling factors (3) Responses and (4) CIO ‘attributes’. Having modelled the CIOs current environment, and recognising the evolving IT enabled information landscape, the authors call for further research to inform the recruitment and development of the future CIO in terms of personal attributes and the measurable impact such attributes will have on their respective organisation

    Understanding Occupational and Skill Demand in New Jersey's Finance Industry

    Get PDF
    The finance industry in New Jersey employs over 200,000 people. Many more workers benefit from the state's proximity to the finance industry in New York City. Jobs in the industry are evolving rapidly in response to national and global trends, such as deregulation, increasingly complex laws, and new technologies. As jobs change, skill requirements for both entry-level and incumbent workers increase. This report summarizes the skill, knowledge, and educational requirements of key finance occupations and identifies strategies for meeting the workforce challenges facing the industry

    The Future of Work In Cities

    Get PDF
    The latest report in our City of the Future series examines societal shifts and advancements in technology that are impacting the rapidly changing American workforce. The report outlines solutions to help city leaders plan for the fast-approaching future, while forecasting the economic viability of two distinct sectors – retail and office administration – in which a quarter of Americans are currently employed

    International Outsourcing and the Supply Side Productivity Determinants

    Get PDF
    A service provider firm in an outsourcing relationship is distinct from a typical firm because it is not a stand alone organization and fits somewhere in between the value chain of its client’s business. Thus, conventional factors like wages, capital, rent, energy consumption cannot appropriately determine a Business Process Outsourcing (BPO) firm’s productivity. Academic research is silent on the factors that influence the performance of a BPO firm even though the issue is pertinent from the perspective of the host country, the sourcing firm, the global outsourcing industry and of course the service provider firm. In this paper, we embark on to explore these factors.productivity, outsourcing, third party vendor

    Focus on Communities (Winter 2009)

    Get PDF

    Addressing the cyber safety challenge: from risk to resilience

    Get PDF
    Addressing the cyber safety challenge: from risk to resilience describes the cyber safety issues emerging from a range of technology trends, how different populations are using technologies and the risks they face, and how we can effectively respond to each group’s unique cyber safety needs. Written by the University of Western Sydney for Telstra Corporation Ltd, the report advocates for continuing to move cyber safety from a ‘risk and protection’ framework to one that focuses on building digital resilience, as well as fostering trust and confidence in the online environment. To do this we need to: Address the needs of populations often neglected by current policies and programs – including adults, seniors, parents, and small to medium enterprises Continue to build the digital literacy skills of all populations, because digital literacy strongly influences users’ ability to engage safely online – this is best achieved by a hands-on learning approach Keep risk in perspective – the risks and benefits of digital participation go hand in hand Broaden the focus from awareness-raising to long-term behaviour change. As digital technologies become further integrated into the everyday lives of Australians, users are potentially exposed to greater risks. However, the risks and benefits of digital participation go hand in hand. The challenge, therefore, is to support users to minimise the risks without limiting their digital participation and their capacity to derive the full benefits of connectivity. If Australians are to benefit as either consumers or providers of online services and products in the e-commerce environment, consumer safety and trust need to be improved. Cyber safety needs to be considered against a transforming backdrop of technology trends, products and practices. While the rise of social media has tended to dominate recent debate and developments in cyber safety, particularly in relation to young people, a range of other trends is also shaping how users engage online, the risks they potentially face in the new media landscape, and the strategies used to address them. These trends include the rise of user generated content and content sharing platforms; the uptake of mobile technologies and, in particular, the adoption of smartphones; cloud computing; platform integration and single sign-on mechanisms; and the rise of GPS and location based services

    European Digital Libraries: Web Security Vulnerabilities

    Get PDF
    Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons. Design/methodology/approach – A web vulnerability testing tool was used to analyze 80 European library sites in four countries to determine how many security vulnerabilities each had and what were the most common types of problems. Findings – Analysis results from surveying the libraries show the majority have serious security flaws in their web applications. The research shows that despite country-specific laws mandating secure sites, system librarians have not implemented appropriate measures to secure their online information systems. Research limitations/implications – Further research on library vulnerability throughout the world can be taken to educate librarians in other countries of the serious nature of protecting their systems. Practical implications – The findings serve to remind librarians of the complexity in providing a secure online environment for their patrons and that a disregard or lack of awareness of securing systems could lead to serious vulnerabilities of the patrons' personal data and systems. Lack of consumer trust may result in a decreased use of online commerce and have serious repercussions for the municipal libraries. Several concrete examples of methods to improve security are provided. Originality/value – The paper serves as a current paper on data security issues at Western European municipal library web sites. It serves as a useful summary regarding technical and managerial measures librarians can take to mitigate inadequacies in their security implementation

    Mobile phone and e-government in Turkey: practices and technological choices at the cross-road

    Get PDF
    Enhanced data services through mobile phones are expected to be soon fully transactional and embedded within future mobile consumption practices. While private services will surely continue to take the lead, others such as government and NGOs will become more prominent m-players. It is not yet sure which form of technological standards will take the lead including enhance SMS based operations or Internet based specifically developed mobile phone applications. With the introduction of interactive transactions via mobile phones, currently untapped segment of the populations (without computers) have the potential to be accessed. Our research, as a reflection of the current market situation in an emerging country context, in the case of mobile phones analyzes the current needs or emergence of dependencies regarding the use of m/e-government services from the perspective of municipality officers. We contend that more research is needed to understand current preparatory bottlenecks and front loading activities to be able to encourage future intention to use e-government services through mobile phone technologies. This study highlights and interprets the current emerging practices and praxis for consuming m-government services within government

    Sony, Cyber Security, and Free Speech: Preserving the First Amendment in the Modern World

    Get PDF
    Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication and conform storylines to societal standards. Such censorship cuts the First Amendment at its core and exemplifies the danger cyber terror poses to freedom of speech by compromising Americans’ privacy in digital mediums. This paper critiques the current methods for combatting cyber terror, which consist of unwieldy federal criminal laws and controversial information sharing policies, while proposing more promising solutions that unleash the competitive power of the free market with limited government regulation. It also recommends legal, affordable and user-friendly tools anyone can use to secure their technology, recapture their privacy and exercise their freedom of speech online without fear of surreptitious surveillance or retaliatory exposure
    • 

    corecore