There has been a perception in both industry and in academia that mainframe skills are obsolete. ... more There has been a perception in both industry and in academia that mainframe skills are obsolete. As a result, there has been a decline in curricula addressing these skills. However, recent evidence shows that many organizations are still actively supporting mainframe technologies and report a need for students graduating in information technology to be trained in those skills, especially as much of their current mainframe workforce moves toward retirement. This paper examines the question of what motivates students to acquire mainframe skills. To do so, this research is investigates IBM's Master the Mainframe contest, a competition that attempts to engender enthusiasm for acquiring mainframe skills and ensure an adequate supply of such skills to organizations relying on them.
International Journal of Management & Information Systems (IJMIS), 2011
... Vol. 288 Article No. 42, (2008). 2. Al-Shaer, Ehab, Latifur Khan, and Mohammad Ahmed. ... Mu... more ... Vol. 288 Article No. 42, (2008). 2. Al-Shaer, Ehab, Latifur Khan, and Mohammad Ahmed. ... Multi-aspect security configuration assessment. Proceedings of the 2nd ACM workshop on Assurable and usable security configuration (2009):1-6. 8. Naous, Jad, Ryan Stutzman ...
Database For Advances in Information Systems, Apr 1, 1998
As information technology evolves, it continues to raise new ethical challenges. In recognition o... more As information technology evolves, it continues to raise new ethical challenges. In recognition of this, the business and academic communities have focused increased attention on ethics. Profes-sional codes of ethics have been enacted by the ACM, AITP, and other computing ...
International Journal of Electronic Business, 2005
... to 188 billion dollars in discretionary income and this figure is expected to rise with the a... more ... to 188 billion dollars in discretionary income and this figure is expected to rise with the aging 'baby boomers' (Paciello, 2001; Quinn ... and buying potential of this group are effectively denying themselves entire markets of consumers. (Gibson, 2001, p.8) Carmen Jones, president ...
Journal of Information Technology Case and Application Research, 2002
ABSTRACT CEOs are ultimately responsible to investors for firm performance, including the results... more ABSTRACT CEOs are ultimately responsible to investors for firm performance, including the results of IS/IT outsourcing. CIOs, while responsible for implementing the outsourcing contract, do not share that same level of motivation or responsibility as the CEO. Although previous studies examine market effects of outsourcing on firm stock, and of IS technology investment on firm value, no published IS research ties outsourcing to financial performance or examines its effects on firm risk. This study addresses these issues with a securities market assessment of outsourcing. It examines outsourcing announcement effects on firm value and firm risk, using empirical data.
As information technology evolves, it continues to raise new ethical challenges. In recognition o... more As information technology evolves, it continues to raise new ethical challenges. In recognition of this, the business and academic communities have focused increased attention on ethics. Profes-sional codes of ethics have been enacted by the ACM, AITP, and other computing ...
This study examines student perceptions and usage of a variety of information technologies, their... more This study examines student perceptions and usage of a variety of information technologies, their comfort level in performing basic computer related tasks, and their computer related experience and sources of learning about information technology. Findings are interpreted through a systems thinking perspective with a focus on the implications for information technology educators. Although students today have more exposure to information
ABSTRACT Telecommunications, although around for many years, is finally beginning to get the atte... more ABSTRACT Telecommunications, although around for many years, is finally beginning to get the attention it deserves. There are more applications utilizing telecommunication principles than ever before and many of these applications are facing security problems much like those faced by batch applications of a few years ago. Although this paper is not a definitive work about telecommunication security, it is a tutorial which will help “jog” the minds of the reader to remember key elements and components of telecommunication systems. By remembering these elements and components, system designers will be better able to utilize existing security functions to make current and planned telecommunication systems more secure. This paper describes general security issues in telecommunications and then uses those generalities to discuss two specific areas of concern: access and authorization.
ABSTRACT. This study compares computer-sup-ported groups, ie, groups using group support systems ... more ABSTRACT. This study compares computer-sup-ported groups, ie, groups using group support systems (GSS), and face-to-face groups using ethical decision-making tasks. A laboratory experiment was conducted using five-person groups of information systems professionals. ...
There has been a perception in both industry and in academia that mainframe skills are obsolete. ... more There has been a perception in both industry and in academia that mainframe skills are obsolete. As a result, there has been a decline in curricula addressing these skills. However, recent evidence shows that many organizations are still actively supporting mainframe technologies and report a need for students graduating in information technology to be trained in those skills, especially as much of their current mainframe workforce moves toward retirement. This paper examines the question of what motivates students to acquire mainframe skills. To do so, this research is investigates IBM's Master the Mainframe contest, a competition that attempts to engender enthusiasm for acquiring mainframe skills and ensure an adequate supply of such skills to organizations relying on them.
International Journal of Management & Information Systems (IJMIS), 2011
... Vol. 288 Article No. 42, (2008). 2. Al-Shaer, Ehab, Latifur Khan, and Mohammad Ahmed. ... Mu... more ... Vol. 288 Article No. 42, (2008). 2. Al-Shaer, Ehab, Latifur Khan, and Mohammad Ahmed. ... Multi-aspect security configuration assessment. Proceedings of the 2nd ACM workshop on Assurable and usable security configuration (2009):1-6. 8. Naous, Jad, Ryan Stutzman ...
Database For Advances in Information Systems, Apr 1, 1998
As information technology evolves, it continues to raise new ethical challenges. In recognition o... more As information technology evolves, it continues to raise new ethical challenges. In recognition of this, the business and academic communities have focused increased attention on ethics. Profes-sional codes of ethics have been enacted by the ACM, AITP, and other computing ...
International Journal of Electronic Business, 2005
... to 188 billion dollars in discretionary income and this figure is expected to rise with the a... more ... to 188 billion dollars in discretionary income and this figure is expected to rise with the aging 'baby boomers' (Paciello, 2001; Quinn ... and buying potential of this group are effectively denying themselves entire markets of consumers. (Gibson, 2001, p.8) Carmen Jones, president ...
Journal of Information Technology Case and Application Research, 2002
ABSTRACT CEOs are ultimately responsible to investors for firm performance, including the results... more ABSTRACT CEOs are ultimately responsible to investors for firm performance, including the results of IS/IT outsourcing. CIOs, while responsible for implementing the outsourcing contract, do not share that same level of motivation or responsibility as the CEO. Although previous studies examine market effects of outsourcing on firm stock, and of IS technology investment on firm value, no published IS research ties outsourcing to financial performance or examines its effects on firm risk. This study addresses these issues with a securities market assessment of outsourcing. It examines outsourcing announcement effects on firm value and firm risk, using empirical data.
As information technology evolves, it continues to raise new ethical challenges. In recognition o... more As information technology evolves, it continues to raise new ethical challenges. In recognition of this, the business and academic communities have focused increased attention on ethics. Profes-sional codes of ethics have been enacted by the ACM, AITP, and other computing ...
This study examines student perceptions and usage of a variety of information technologies, their... more This study examines student perceptions and usage of a variety of information technologies, their comfort level in performing basic computer related tasks, and their computer related experience and sources of learning about information technology. Findings are interpreted through a systems thinking perspective with a focus on the implications for information technology educators. Although students today have more exposure to information
ABSTRACT Telecommunications, although around for many years, is finally beginning to get the atte... more ABSTRACT Telecommunications, although around for many years, is finally beginning to get the attention it deserves. There are more applications utilizing telecommunication principles than ever before and many of these applications are facing security problems much like those faced by batch applications of a few years ago. Although this paper is not a definitive work about telecommunication security, it is a tutorial which will help “jog” the minds of the reader to remember key elements and components of telecommunication systems. By remembering these elements and components, system designers will be better able to utilize existing security functions to make current and planned telecommunication systems more secure. This paper describes general security issues in telecommunications and then uses those generalities to discuss two specific areas of concern: access and authorization.
ABSTRACT. This study compares computer-sup-ported groups, ie, groups using group support systems ... more ABSTRACT. This study compares computer-sup-ported groups, ie, groups using group support systems (GSS), and face-to-face groups using ethical decision-making tasks. A laboratory experiment was conducted using five-person groups of information systems professionals. ...
Uploads