3,356 research outputs found
SMEs, electronically-mediated working and data security: cause for concern?
Security of data is critical to the operations of firms. Without the ability to store, process and transmit data securely, operations may be compromised, with the potential for serious consequences to trading integrity. Thus the role that electronically-mediated working plays in business today and its dependency on data security is of critical interest, especially in light of the fact that much of this communication is based on the use of open networks (i.e. the Internet). This paper discusses findings from a 'WestFocus' survey on electronically-mediated working and telework amongst a sample of SMEs located in West London and adjacent counties in South-Eastern England in order to highlight the problems that such practice raises in terms of data security. Data collection involved a telephone survey undertaken in early 2006 of 378 firms classified into four industrial sectors ('Media', 'Logistics', 'Internet Services' and 'Food Processing'). After establishing how ICTs and the Internet are being exploited as business applications for small firms, data security practice is explored on the basis of sector and size with a focus on telework. The paper goes on to highlight areas of concern in terms of data security policy and training practice. Findings show some sector and size influences.WestFocus* under the Higher Education Innovation Fund (HEIF 2
On the necessity of removing 'cruelty' from the teaching of computing
In his famous article [1] Edsger Dijkstra reflected upon how cruel it would be truly to teach computer science. For some reason the CS community over the years have taken the sadistic element of his entreaties to heart. Why is this so? Does it have intuitive appeal to those CS educators who believe in the "hard man" school of computer science and the "real programmers don't eat quiche" model of education
Elearning to whose agenda? The discourse of enterprise v the discourse of community
No abstract
Architecture
When discussing science fiction’s relationship with architecture, the usual practice is to look at the architecture “in” science fiction—in particular, the architecture in SF films (see Kuhn 75-143) since the spaces of literary SF present obvious difficulties as they have to be imagined. In this essay, that relationship will be reversed: I will instead discuss science fiction “in” architecture, mapping out a number of architectural movements and projects that can be viewed explicitly as science fiction. It is not my contention that the concept of science fiction should be applied to every aspect of architectural production; however, the domination of the architectural profession by conservative, even reactionary views of the built environment as simply an extension of late capitalism needs to be critiqued, and the possibilities afforded by an engagement with the discourse of science fiction is therefore much needed
Onshore to near-shore outsourcing transitions: unpacking tensions
This study is directed towards highlighting tensions of incoming and outgoing vendors during outsourcing in a near-shore context. Incoming-and-outgoing of vendors generate a complex form of relationship in which the participating organizations cooperate and compete simultaneously. It is of great importance to develop knowledge about this kind of relationship typically in the current GSE-related multi-sourcing environment. We carried out a longitudinal case study and utilized data from the 'Novo pay' project, which is available in the public domain. This project involved an outgoing New Zealand based vendor and incoming Australian based vendor. The results show that the demand for the same human resources, dependency upon cooperation and collaboration between vendors, reliance on each other system's configurations and utilizing similar strategies by the client, which worked for the previous vendor, generated a set of tensions which needed to be continuously managed throughout the project
Valuing computer science education research?
This paper critically enquires into the value systems which rule the activities of teaching and research. This critique is intended to demonstrate the application of critical enquiry in Computer Science Education Research and therefore uses critical theory as a method of analysis.A framework of Research as a Discourse is applied to explore how the notions of research as opposed to teaching are presented, and how discipline and research communities are sustained. The concept of a discourse, based upon the work of Foucault, enables critical insight into the processes which regulate forms of thought. This paper positions the field of Computer Science Education Research, as an illustrative case, within the broader discourse of Research, and argues that Computer Science Education Researchers and educators need to understand and engage in this discourse and shape it to their own ends
Using IT for active student feedback in the learning environment
This paper describes the use of a web-based groupware product (specifically a Lotus NotesTM & DominoTM discussion database), as a means of gaining direct and regular feedback from students on the progress of a course. Some of the pitfalls and issues are discussed, including motivation for use, barriers to effective feedback, the value of anonymity and appropriate netiquette. Some recommendations are made for others wishing to use such a feedback mechanism, and for those who do not have Lotus Notes installed, how a feedback system such as this might be implemented in some other web based product
Comprehending large code bases - the skills required for working in a "Brown Fields" environment
In the search for answers to the effective teaching of programming at the beginner level, we are now seeing broader programs of research investigate the distinctions between reading, comprehending and writing small programs [1], [2]. In New Zealand we have joined this work with the "Bracelet" project, in which multiple institutions will investigate how students comprehend small computer programs. We hope this may help answer critical teaching and assessment questions
- …
