information technology professions
Recently Published Documents


TOTAL DOCUMENTS

7
(FIVE YEARS 0)

H-INDEX

0
(FIVE YEARS 0)

10.29007/p7br ◽  
2019 ◽  
Author(s):  
Andrian Twala ◽  
Ray Kekwaletswe

Cloud computing is internet-based computing in which users can share information technology resources in a secure and efficient system [1]. South African organisations by adopting and using technology such as cloud computing can leverage on its ability to offer a flexible resource that is scalable to the needs of an organization, which are accessible from anywhere at any time. The main goal of this study was to conceptualise a strategic cloud computing framework in the context of South African information technology professions. This study used stakeholder theory, contingency theory, and technology-organization-environment theory as research lenses. The study used interpretivism research philosophy. The primary data was collected using semi-structured interviews from 21 individual IT professionals. The key findings are that IT professionals recognized the importance and benefits of cloud computing. In addition, stakeholders have an influence on cloud computing use and adoption. The IT strategy needs to be aligned with the business strategy for cloud computing to be smoothly adopted and use in an organisation. The study concluded that there is a need for a strategic cloud computing framework that would help to strategically adopt and use cloud computing in a uniformed and coordinated manner in South African organisations.


2016 ◽  
pp. 69-78
Author(s):  
Dillon Glasser ◽  
Aakash Taneja

Since the government began tackling the problems of cybercrime, many laws have been enacted. A lack of a comprehensive definition and taxonomy of cybercrime makes it difficult to accurately identify report and monitor cybercrime trends. There is not just a lack of international agreement on what cybercrime is; there are different laws in every state within the United States, reflecting the inconsistency of dealing with cybercrime. There is also concern that many times lawyers and information technology professions are unable to understand each other well. The deficiency of cyber laws is an obvious problem and development of effective laws is emerging as an important issue to deal with cybercrime. This research uses the routine activity theory to develop a unified framework by including the motivation of the offender to use a computer as a tool/target, suitability of the target, and the presence (or absence) of guardian. It could help states that want to update their existing laws and cover areas that were previously uncovered.


Author(s):  
Dillon Glasser ◽  
Aakash Taneja

Since the government began tackling the problems of cybercrime, many laws have been enacted. A lack of a comprehensive definition and taxonomy of cybercrime makes it difficult to accurately identify report and monitor cybercrime trends. There is not just a lack of international agreement on what cybercrime is; there are different laws in every state within the United States, reflecting the inconsistency of dealing with cybercrime. There is also concern that many times lawyers and information technology professions are unable to understand each other well. The deficiency of cyber laws is an obvious problem and development of effective laws is emerging as an important issue to deal with cybercrime. This research uses the routine activity theory to develop a unified framework by including the motivation of the offender to use a computer as a tool/target, suitability of the target, and the presence (or absence) of guardian. It could help states that want to update their existing laws and cover areas that were previously uncovered.


Author(s):  
Sue E. Kase ◽  
Frank E. Ritter

Because of their ability to enhance productivity, computers have become ubiquitous in the workplace. By the early 1990s the use of computers in the workplace reached a per capita penetration that the telephone took 75 years to achieve (Webster & Martocchio, 1992). During the past several decades, there has been both speculation and hard research related to the psychological effects of computer technology. More recently the role of attitudes towards computers in influencing the acceptance and use of computer-based management information systems (MIS) has been highlighted by a growing number of MIS researchers. Generally, these studies focus on the negative attitudes towards computers and concerns about the impact of MIS on individual performance in the workplace. Computer anxiety has been reported to be associated with negative attitudes towards computers. As computers play a pervasive role in MIS and decision support systems, these findings emphasize the need for additional empirical research on the determinants of computer anxiety and attitudes towards computers. Furthermore, with the increasing participation of women in information technology professions, important questions are whether men and women differ with regard to computer anxiety and attitudes towards computers, and what factors explain such differences where they exist, and how to ameliorate anxiety where it occurs.


Author(s):  
Mary Malliaris ◽  
Linda Salchenberger

While the issue of attracting women to information technology professions has been studied extensively since the 1970s, the gender gap in IT continues to be a significant social and economic problem (Thom, 2001). Numerous research studies have been conducted to understand the reasons for the gender gap in IT (Gurer & Camp, 2002; Sheard, Lowe, Nicholson, & Ceddia, 2003; von Hellens, Nielsen, & Beekhuyzen, 2004). Universities and colleges have developed a variety of programmatic efforts to apply gender gap research results, implementing strategies that increase female undergraduate enrollment in computer science programs (Wardle & Burton, 2002). Yet, individual successes have not translated into any significant change in the overall percentages of women choosing IT. An analysis of current choices of women in their selection of four-year undergraduate institutions reveals yet another alarming trend—young women are not choosing to study IT at the traditional academic four year institutions that would best prepare them for the IT professional careers of the future. To complicate matters, the information technology job market is changing rapidly. For example, some well-documented IT trends that are causing such shifts are outsourcing, the commoditization of IT, the effect of the dot com bust on the job market, and most importantly, the integration of IT into the fundamental economic, social and cultural fabric of our society. IT now permeates every aspect of professional work, even the traditional female-oriented occupations such as nursing and teaching. This integration of IT into the professions must guide the development of a new set of strategies to insure that women have equal opportunities and access to the benefits of an education that prepares them for professional careers. It is in the best interest of the IT profession and our society in general to help young women make choices that include the pursuit of information technology.


Sign in / Sign up

Export Citation Format

Share Document