15 research outputs found

    Software Piracy: A Study of the Extent of Coverage in Introductory MIS Textbooks

    Get PDF
    This research argues that although software piracy has serious implications for the software industry and the economy, the topic receives very little detailed coverage in MIS textbooks. Software piracy has a significant impact on the software industry and on the economy as a whole. Lost sales due to software piracy amount to over 11billionannuallyandlosttaxesapproach11 billion annually and lost taxes approach 1 billion annually. Current technology makes it a simple task for even a novice computer user to copy software and therefore, unauthorized software is not uncommon. The researchers conducted an evaluation of MIS texts and found that software piracy receives very little coverage in the texts. The research suggests that MIS faculty need to provide material to supplement the textbook coverage in order to provide adequate coverage of this serious issue

    Evolution of water production of 67P/Churyumov-Gerasimenko: An empirical model and a multi-instrument study

    Get PDF
    We examine the evolution of the water production of comet 67P/Churyumov–Gerasimenko during the Rosetta mission (2014 June–2016 May) based on in situ and remote sensing measurements made by Rosetta instruments, Earth-based telescopes and through the development of an empirical coma model. The derivation of the empirical model is described and the model is then applied to detrend spacecraft position effects from the Rosetta Orbiter Spectrometer for Ion and Neutral Analysis (ROSINA) data. The inter-comparison of the instrument data sets shows a high level of consistency and provides insights into the water and dust production. We examine different phases of the orbit, including the early mission (beyond 3.5 au) where the ROSINA water production does not show the expected increase with decreasing heliocentric distance. A second important phase is the period around the inbound equinox, where the peak water production makes a dramatic transition from northern to southern latitudes. During this transition, the water distribution is complex, but is driven by rotation and active areas in the north and south. Finally, we consider the perihelion period, where there may be evidence of time dependence in the water production rate. The peak water production, as measured by ROSINA, occurs 18–22 d after perihelion at 3.5 ± 0.5 × 1028 water molecules s-1. We show that the water production is highly correlated with ground-based dust measurements, possibly indicating that several dust parameters are constant during the observed period. Using estimates of the dust/gas ratio, we use our measured water production rate to calculate a uniform surface loss of 2–4 m during the current perihelion passage

    Outsourcing: Can CASE Technology Stem the Tide?

    Get PDF
    In their desire to contain rising IS costs while at the same time becoming more productive, many corporations are developing an interest in outsourcing part or all of their IS junctions as one strategy for accomplishing these objectives. While this may make sense for some IS junctions because of systems developed with older technology, another strategy should be to put some emphasis on developing more effective and efficient systems using CASE technology. In the 1990s, the competitive advantage will go to those firms that can effectively utilize the fall potential of information technology

    A Profile of Colleges and Universities That Have Adopted the Data Processing Management Association’s Model Curriculum

    Get PDF
    The Data Processing Management Association (DPMA) developed a model curriculum for the education of business computer students in 1981. One element of this curriculum was directed toward four-year colleges and universities. Since that time, hundreds of colleges and universities have adopted this model for use in their compute program. Because the DPMA will be issuing updates to this curriculum as an on-going process, some knowledge about the types of institutions that have adopted the model curriculum may be helpful in insuring that new changes are accepted. Research in the adopting of innovations, such as a curriculum, for example, has shown that the more you know about a potential adopter, the better able you are to develop strategies for adoption of your product. A survey of adopting institutions was used to form a profile of adopting institutions. The results are presented in this study

    Concerns of College Faculty about the Data Processing Management Association’s Model Curriculum

    Get PDF
    The rapid changes that are currently occurring in the information technology field are challenging our educational institutions as they have never been challenged before. A common complaint heard from business leaders is that computer courses offered in educational institutions are not relevant to the needs of business. The Data Processing Management Association (DPMA) has attempted to bridge this computer education gap by developing a national model computer curriculum for the education of business computer students. However, faculty familiarity with the DPMA model in adopting institutions was uncertain. Therefore, a survey of computer systems faculty in institutions that adopted the model curriculum was undertaken. The results of the survey indicate that certain variables are related to the degree of computer faculty familiarity with the model curriculum. These variables are discussed in this study

    Electronic Commerce: An Examination of Skills for a Successful Developer

    No full text
    The development of web-based, electronic commerce software has grown significantly in recent years. These software development applications have challenged information technology departments in business organizations to implement mission critical, strategic applications for their organization that in turn creates a significant demand for the technology personnel to support the development process. Therefore, the implementation of these systems requires talented personnel that have received formal training with the proper skills to develop successful applications. This research conducts a pilot survey of industry professionals to determine the necessary skills and training required of an undergraduate computer information systems professional seeking employment for these positions. In order to analyze the survey data, the difference between the respondents\u27 rankings (market importance - student competency) were compared to determine whether students attained a level of competency that was equivalent to the skill\u27s importance in the marketplace. Overall, the results illustrate that information systems graduates do not possess a high level of competency in several web-based development skills considered important by the marketplace. For the twenty-eight skills included in the survey, fourteen of the variables showed significant differences between the means scores as well as a negative value for the differences in the respondents\u27 rankings. Specifically, the respondents believed that Java was the web development skill as having the largest gap between the market importance and the level of competency possessed by a graduating student

    Managing Instant Messaging Security: A Pilot Study of Recommended Practices

    No full text
    Instant Messaging technology has the potential to be a valuable communication tool at many levels of the business enterprise and is already in use by employees in 85 percent of North American companies. Worldwide business use of IM is expected to reach 670 million in 2008. IM is a primary means of communication for college students and many institutions are learning to exploit IM to improve communications. However, instant messaging presents some serious security risks. This paper will review some of the major security risks and recommend management practices to enhance the level of IM security. The security posture of internal staff plays a major role in an organization’s security. A survey of IM business users conducted by the authors indicates that a higher level of security is found at companies with sound management practices

    Educational Institutions Must Keep Pace With Changing Computer Technology

    No full text
    Focuses on the need for educational institutions to keep pace with changes concerning computer technology. Curriculum development and reform; Stages of concern about innovation; Examination on department and institutional variables

    Computer Security in the Introductory Business Information Systems Course: An Exploratory Study of Textbook Coverage

    No full text
    The authors conducted an evaluation of Management Information Systems (MIS) textbooks and found that computer security receives very little in-depth coverage. The textbooks provide, at best, superficial treatment of security issues. The research results suggest that MIS faculty need to provide material to supplement the textbook to provide adequate coverage of this important and timely issue

    COBOL\u27s Role in a College Curriculum--A Pilot Study

    No full text
    Presents a study that investigated the role of Common Business Oriented Language (COBOL) in the information systems curricula in business education. Perceptions of business companies on the importance of skills in programming languages, including COBOL; Views on necessary application development skills; Assessment on the competency of graduates
    corecore