Factors affecting professional competence of information technology professionals

1998 ◽  
Vol 19 (3) ◽  
pp. 4-19 ◽  
Author(s):  
J. Ellis Blanton ◽  
Thomas Schambach ◽  
Kenneth J. Trimmer
Author(s):  
I. G. Zakharova ◽  
Yu. V. Boganyuk ◽  
M. S. Vorobyova ◽  
E. A. Pavlova

The article goal is to demonstrate the possibilities of the approach to diagnosing the level of IT graduates’ professional competence, based on the analysis of the student’s digital footprint and the content of the corresponding educational program. We describe methods for extracting student professional level indicators from digital footprint text data — courses’ descriptions and graduation qualification works. We show methods of comparing these indicators with the formalized requirements of employers, reflected in the texts of vacancies in the field of information technology. The proposed approach was applied at the Institute of Mathematics and Computer Science of the University of Tyumen. We performed diagnostics using a data set that included texts of courses’ descriptions for IT areas of undergraduate studies, 542 graduation qualification works in these areas, 879 descriptions of job requirements and information on graduate employment. The presented approach allows us to evaluate the relevance of the educational program as a whole and the level of professional competence of each student based on objective data. The results were used to update the content of some major courses and to include new elective courses in the curriculum.


2002 ◽  
Vol 1 (2) ◽  
pp. 152-190 ◽  
Author(s):  
Jeffrey M. Stanton ◽  
Kathryn R. Stam

Over recent years, information technology has played an increasingly important role in the monitoring and surveillance of worker behavior in organizations. In this article, we take the position that managers, workers, and information technology professionals alike see worker-related information as a valuable organizational resource and that processes of social exchange influence how this information resource is controlled. These suppositions are woven together by joining two theories, information boundary theory, a motivational framework for examining privacy at work, and social exchange theory, which provides a perspective on social networks and social power. After discussing these two frameworks and how they might be interlaced, we analyze a corpus of semi-structured interviews with 119 managers, employees, and IT professionals that explored questions of privacy, motivation, and power in six not-for-profit organizations that were undergoing technology-driven change with potential for increased monitoring and surveillance.


2007 ◽  
Vol 5 (2) ◽  
pp. 62 ◽  
Author(s):  
Riëtte Sutherland ◽  
Gideon P. De Bruin ◽  
Freddie Crous

This study examined the relationship between conscientiousness, empowerment and job performance among information technology professionals. An Employee Empowerment Questionnaire (EEQ), a Conscientiousness Scale and a Social Desirability Scale were administered to 101 information technology customer service engineers. Managers completed a Performance Evaluation Questionnaire (PEQ) for each customer service engineer. The results indicated a significant relationship between conscientiousness and empowerment. A curvilinear relationship was found between empowerment and performance. The practical and theoretical implications of the findings are discussed.


Sign in / Sign up

Export Citation Format

Share Document