Lifelong Learning for Professional Survival

Author(s):  
Philip C. Doesschate

Adjusting to change can be difficult for anyone. A commitment to continuous learning can help in coping with change. This chapter presents a picture of real lifelong learning in a field that has undergone dramatic changes. The author, Philip Doesschate, has had wide-ranging experience in the information technology field over almost five decades. As he recalls his career accomplishments and challenges, he identifies a set of personal life lessons from his work in this rapidly changing field. During his career, Doesschate has worked in numerous roles, industries, and specialties, on projects of small to significant size, using many different computer languages, operating systems, application frameworks, architectures, application packages, and analytical tools. The lessons illustrate issues not only of staying current but also of mastering new approaches as they evolve to meet customer needs and expectations.

2010 ◽  
Vol 16 (4) ◽  
pp. 155-159 ◽  
Author(s):  
Toni Eason

Lifelong learning contributes to the development of knowledge and skill in nursing. A focus on continuous learning is necessary to remain current on trends, practices, and the newest treatments in the field of nursing. Creation of a culture where educational growth is supported and promoted is vital to advancement of the nursing profession. Nurses’ satisfaction with their professional role can be further enhanced by demonstrated expertise through lifelong learning. Expertise in nursing is solidly founded on evidence-based practice. Research, education, and experience in nursing practice are linked to evidence-based practice and lifelong learning; both are essential to remaining well versed in health care service delivery.


Author(s):  
Janina Čižikienė ◽  
Audronė Urmanavičienė

The European Union's education and lifelong learning policy stresses informal learning within the society. The article aims to review the concept of lifelong learning and to analyze opportunities for continuous learning process in organizations. New technologies, innovations in the workplace and professional training encourage employees to improve constantly and awareness of the importance of lifelong learning can help to secure their future in a changing labor market. Research methods applied were as following:  literature and document analysis, expert interviews, analysis of the results and interpretation. The article presents a review of scientific literature and research data reveals leaders’ approach to employees' willingness to raise their qualification constantly and the organization's opportunities. The survey showed that employers want to have a highly qualified staff meeting the requirements of the organization, but do not always have sufficient funds for professional development. 


Author(s):  
Azeddien M. Sllame

The use of the communication and information technology tools can aid students in their lab work to add more flexibility to the accessibility and providing of up-to-date higher education allowing students accessing knowledge anytime, anywhere which will facilitate the lifelong learning and provide accessibility to the curriculum and other students' resources from anywhere at any time. Laboratory work by students in the information technology and engineering fields of study is a must requirement in all accreditation agencies and targeted employment places. This chapter demonstrates a project based learning technique that has been integrated with ordinary classes in computer network courses. The tools used in this study concentrates on the modeling and simulation of different aspect of computer networking that highlight different skills needed to any computer network engineer.


Information technology spreads through the life of the whole society in the educational, professional, and personal lives. It heightens the requirements for the reader's competence and defines key competencies for the 21st century. The requirement for the successful entry to the job market is increasingly about the competency to handle information technology. The problems in reading are a major source of challenges in the inclusion. Strengthening of the reader's skills and extending the offer for lifelong learning is therefore key for overcoming these challenges. This chapter explores literacy as a bridge to quality of life.


Author(s):  
A. D. Smith

Even before September 11, 2001, security and privacy was a concern to nearly 80% of the current and potential Internet users around the globe, according to survey released by the Information Technology Association of America (ITAA) (Poulsen, 2000). The survey, commissioned by the American Express Company, randomly polled 11,410 people in 10 countries, and found that nearly half of the respondents enjoyed some form of Internet access. As might be expected, most of the world’s Internet users utilize Internet for e-mail, browsing, and entertainment. However, fewer than 28% do some shopping online, and 24% use the Internet for banking and financial transactions. But when Internet users and non-users of many countries were asked if they agree with the statement, “I am or would be concerned about security and privacy issues when purchasing or making financial transactions online,” 79% agreed. Prior to the tragedy of September 11, 2001, U.S. citizens also expressed legitimate concerns toward the issues of privacy and security, with an 85% showing. The poll released by the Information Technology Association of America also illustrated that approximately 80% have doubts about the U.S. government’s ability to maintain computer security and privacy. Hence, protecting operating systems is a major strategic concern if the success of e-government as a whole is to reach its potential. Although most of these issues are typically not discussed in relationship with e-government, the need for trusted computing systems within e-business and computing systems can be made as an effective argument that all these issues affect e-government systems as well. Secure computing systems issues in terms of e-government are just as important.  The scope of this article is to present a description of one the most generally known security certifications; namely, the trusted computer system evaluation (TCSEC) and its commercial implementation procedure in the commercial product evaluation process and discuss the influence of this evaluation/certification on the incidence of hacker attacks on e-business. As evident by the abundance of marketing literature of different operating systems for e-business that frequently refers to its security strength ranked against popular security certifications, it is very common to rank commercially available operating systems against TCSEC evaluation and/or certification criteria. This article will also explore where the many operating systems stands on this particular evaluation. In essence, given the vulnerabilities exposed after September 11, 2001, strategic security managers should be deeply concerned that the e-business platform they are responsible for contains the highest security standards to prevent any type of potentially harmful hacker attacks. Managers need to have a working knowledge of TCSEC security evaluation/certifications to become better informed when choosing the e-security platform for e-government/e-business. Essentially, the selection of a particular operating system for e-government/e-business have as much to do with factors ranging from existing skills, existing infrastructure, and economic reasons all the way up to political and strategic reasons. In dealing strategically with modern e-business environments, one of the most important factors that management must consider when choosing an operating system for their e-business platform is the security strength to resist computer hacker attacks on the operating system. If, for example, during different hacker attacks, one of the major aspects of these attacks is a certain operating system, as opposed to other systems, then this is a clear message to management to build in proper safeguards in the proposed operating system (Smith & Rupp, 2002a, 2002b). Certainly some of the reasons for frequent hacker attacks may probabilistic in terms and not random events, since Linux and Windows operating systems are more frequently used for e-commerce than other systems. So, it is not surprising that there are practically few reports of successful hacker attacks against operating systems that run e-business platforms (Smith, 2005; Smith & Lias, 2005; Smith & Offodile, 2002). 


Author(s):  
P. Partow-Navid

Today, information security is one of the highest priorities on the IT agenda. In 2003, Luftman and McLean (2004) conducted a survey of Society for Information Management members to identify the top 20 information technology (IT) issues for executives. Security and privacy issues were ranked third, after IT/ business alignment and IT strategic planning. Concept of information security applies to all the data stored in information systems or being communicated in information networks and encompasses measures applied on all layers of open system interconnect (OSI) model of international standards such as application, networking, and physical. Sophisticated technologies and methods have been developed to: • Control access to computer networks • Secure information systems with advanced cryptography and security models • Establish standards for operating systems with focus on confidentiality • Communication integrity and availability for securing different types of networks • Manage trustworthy networks and support business continuity planning, disaster recovery, and auditing The most widely recognized standards are: • In the United States: Trusted Computer System Evaluation Criteria (TCSEC). • In Canada: Canadian Trusted Computer Product Evaluation Criteria (CTCPEC). • In Europe: Information Technology Security Evaluation Criteria (ITSEC). All of theses standards have recently been aggregated into Common Criteria standards. And yet, the information systems continue to be penetrated internally and externally at a high rate by malicious code, attacks leading to loss of processing capability (like distributed denial-of-service attack), impersonation and session hijacking (like man-in-the-middle attack), sniffing, illegal data mining, spying, and others. The problem points to three areas: technology, law, and IT administration. Even prior to the drama of 9/11, several computer laws were enacted in the USA and yet more may come in the future. Still the fundamental threats to information security, whether they originated outside the network or by the company’s insiders, are based on fundamental vulnerabilities inherent to the most common communication protocols, operating systems, hardware, application systems, and operational procedures. Among all technologies, the Internet, which originally was created for communication where trust was not a characteristic, presents the greatest source of vulnerabilities for public information systems infrastructures. Here, a threat is a probable activity, which, if realized, can cause damage to a system or create a loss of confidentiality, integrity, or availability of data. Consequently, vulnerability is a weakness in a system that can be exploited by a threat. Although, some of these attacks may ultimately lead to an organization’s financial disaster, an all-out defense against these threats may not be economically feasible. The defense actions must be focused and measured to correspond to risk assessment analysis provided by the business and IT management. That puts IT management at the helm of the information security strategy in public organizations.


2008 ◽  
pp. 2745-2754
Author(s):  
Parviz Partow-Navid ◽  
Ludwig Slusky

Today, information security is one of the highest priorities on the IT agenda. In 2003, Luftman and McLean (2004) conducted a survey of Society for Information Management members to identify the top 20 information technology (IT) issues for executives. Security and privacy issues were ranked third, after IT/ business alignment and IT strategic planning. Concept of information security applies to all the data stored in information systems or being communicated in information networks and encompasses measures applied on all layers of open system interconnect (OSI) model of international standards such as application, networking, and physical. Sophisticated technologies and methods have been developed to: • Control access to computer networks • Secure information systems with advanced cryptography and security models • Establish standards for operating systems with focus on confidentiality • Communication integrity and availability for securing different types of networks • Manage trustworthy networks and support business continuity planning, disaster recovery, and auditing The most widely recognized standards are: • In the United States: Trusted Computer System Evaluation Criteria (TCSEC). • In Canada: Canadian Trusted Computer Product Evaluation Criteria (CTCPEC). • In Europe: Information Technology Security Evaluation Criteria (ITSEC). All of theses standards have recently been aggregated into Common Criteria standards. And yet, the information systems continue to be penetrated internally and externally at a high rate by malicious code, attacks leading to loss of processing capability (like distributed denial-of-service attack), impersonation and session hijacking (like man-in-the-middle attack), sniffing, illegal data mining, spying, and others. The problem points to three areas: technology, law, and IT administration. Even prior to the drama of 9/11, several computer laws were enacted in the USA and yet more may come in the future. Still the fundamental threats to information security, whether they originated outside the network or by the company’s insiders, are based on fundamental vulnerabilities inherent to the most common communication protocols, operating systems, hardware, application systems, and operational procedures. Among all technologies, the Internet, which originally was created for communication where trust was not a characteristic, presents the greatest source of vulnerabilities for public information systems infrastructures. Here, a threat is a probable activity, which, if realized, can cause damage to a system or create a loss of confidentiality, integrity, or availability of data. Consequently, vulnerability is a weakness in a system that can be exploited by a threat. Although, some of these attacks may ultimately lead to an organization’s financial disaster, an all-out defense against these threats may not be economically feasible. The defense actions must be focused and measured to correspond to risk assessment analysis provided by the business and IT management. That puts IT management at the helm of the information security strategy in public organizations.


Author(s):  
Manuel London

This chapter addresses several key ideas and issues that emerge from the contributors to this handbook, informing the overall understanding of learning needs and processes throughout the life span. In particular, this chapter examines four significant trends that are likely to drive lifelong learning programs and research during the coming years: (1) the need for continuous learning in light of economic and technological changes, (2) learning challenges for older workers, (3) concern about the readiness of students to enter the workforce and remain productive, and (4) technological advancements in delivering learning resources, including increased attention to experiential (project-based) and self-regulated learning.


Sign in / Sign up

Export Citation Format

Share Document