895 resultados para Critical curriculum
Resumo:
Integrating Enterprise Systems solutions in the curriculum of not only universities but all types of institutes of higher learning has been a major challenge for nearly ten years. Enterprise Systems education is surprisingly well documented in a number of papers on Information Systems education. However, most publications in this area report on the individual experiences of an institution or an academic. This paper focuses on the most popular Enterprise System - SAP - and summarizes the outcomes of a global survey on the status quo of SAP-related education. Based on feedback of 305 lecturers and more than 700 students, it reports on the main factors of Enterprise Systems education including, critical success factors, alternative hosting models, and students’ perceptions. The results show among others an overall increasing interest in advanced SAP solutions and international collaboration, and a high satisfaction with the concept of using Application Hosting Centers.
Resumo:
In this article, the author discusses how she applied autoethnography in a study of the design of hypermedia educational resources and shows how she addressed problematic issues related to autoethnographic legitimacy and representation. The study covered a 6-year period during which the practitioner’s perspective on the internal and external factors influencing the creation of three hypermedia CD-ROMs contributed to an emerging theory of design. The author highlights the interrelationship between perception and reality as vital to qualitative approaches and encourages researchers to investigate their reality more fully by practicing the art of autoethnography.
Resumo:
This paper identifies a number of critical infrastructure applications that are reliant on location services from cooperative location technologies such as GPS and GSM. We show that these location technologies can be represented in a general location model, such that the model components can be used for vulnerability analysis. We perform a vulnerability analysis on these components of GSM and GPS location systems as well as a number of augmentations to these systems.