46 resultados para Information technology -- Management
em University of Queensland eSpace - Australia
Resumo:
This paper describes the inception, planning and first delivery of a security course as part of a postgraduate ecommerce program. The course is reviewed in terms of existing literature on security courses, the common body of knowledge established for security professionals and the job market into which students will graduate. The course described in this paper is a core subject for the e-commerce program. This program was established in 1999 and the first batch of students graduated in 2001. The program is offered at both postgraduate and undergraduate level. The work described here relates to the postgraduate offering. Students on this program are graduates of diverse disciplines and do not have a common e-commerce or business background.
Resumo:
The pervasiveness of information systems (IS) in organizations mandates the need for high levels of IS skills. In recognition, professional bodies impose IS course requirements for accreditation. For both students and employers, performance in IS courses has become important. The tertiary entrance overall performance score accounted for 19.7 per cent of the variance in students' passing grades. Thereafter, proficiency in office automation software and programming accounted for 1.5 and 0.8 per cent of the variance, respectively. Students living in a stable, family home-based environment performed better and it is likely that this environment underpinned other factors affecting performance.
Resumo:
Growth in the sophistication of information technology (IT) has led to the increasing importance of information accessibility in the workplace. The pervasiveness of the resultant knowledge-based economy has centered attention on issues of employee group identity. In this article we explore how employee perceptions of group membership guide the change outcomes of an organization implementing new information technology. Using a social identity framework, we investigate the salient intergroup relationships of two groups of employees (management and IT implementation teams) and how employees use their different group memberships to reframe positions of authority or knowledge around technology change. We discuss the extent to which perceptions of social identity legitimate institutional structures already in place despite the potential of new technology.