The Analysis of Export Competitiveness in the United States and China and Japan for Information Technology Industries of Korea

2011 ◽  
Vol 12 (2) ◽  
pp. 433-453 ◽  
Author(s):  
김지현
2018 ◽  
Vol 6 (2) ◽  
pp. 149
Author(s):  
Neal Grandgenett ◽  
Pam Perry ◽  
Thomas Pensabene ◽  
Karen Wegner ◽  
Robert Nirenberg ◽  
...  

The buildings in which people work, live, and spend their leisure time are increasingly embedded with sophisticated information technology (IT). This article describes the approach of Metropolitan Community College (MCC) in Omaha, Nebraska of the United States to provide an occupational context to some of their IT coursework by organizing IT instruction around the context of building automation systems (BAS). This contextualization allows IT students not only to study IT as a standalone discipline but also to study its integrated use within a specific occupational context. The article also describes MCC’s focused curriculum design efforts funded by the National Science Foundation’s Advanced Technological Education program. These efforts toward BAS-contextualization of the IT curriculum have become a catalyst for systematic contextualization of IT instruction at MCC and support the institution’s broader efforts to become a national model in IT instruction and interdisciplinary engagement within the United States. The research-based approach, activities, and outcomes of this project are all described here, as well as the lessons learned by one community college seeking to make their IT program increasingly relevant to their students and the IT workforce of today.


Medical Care ◽  
2015 ◽  
Vol 53 (2) ◽  
pp. 184-190 ◽  
Author(s):  
Chun-Ju Hsiao ◽  
Jennifer King ◽  
Esther Hing ◽  
Alan E. Simon

Author(s):  
Dillon Glasser ◽  
Aakash Taneja

Since the government began tackling the problems of cybercrime, many laws have been enacted. A lack of a comprehensive definition and taxonomy of cybercrime makes it difficult to accurately identify report and monitor cybercrime trends. There is not just a lack of international agreement on what cybercrime is; there are different laws in every state within the United States, reflecting the inconsistency of dealing with cybercrime. There is also concern that many times lawyers and information technology professions are unable to understand each other well. The deficiency of cyber laws is an obvious problem and development of effective laws is emerging as an important issue to deal with cybercrime. This research uses the routine activity theory to develop a unified framework by including the motivation of the offender to use a computer as a tool/target, suitability of the target, and the presence (or absence) of guardian. It could help states that want to update their existing laws and cover areas that were previously uncovered.


Author(s):  
Ramona Sue McNeal ◽  
Susan M. Kunkle ◽  
Lisa Dotterweich Bryan

Cyberbullying is the use of information technology to deliberately hurt, taunt, threaten or intimidate someone. Currently, there are no federal statutes in the United States which directly address this problem. The response of the states has varied from attempting to use existing anti-bullying laws to limit cyberbullying to passing new laws that specifically target cyberbullying behavior. An important question is, “why are some states taking a lead in combating this cybercrime through new laws while others are relying on existing laws?” The literature on policy adoption suggests politics, resources and public need are important factors in predicting why certain states are more likely to enact government policies. This chapter analyzes the impact of these factors and others on policy adoption by exploring the level of legislative action to update existing cyberbullying laws for 2009 through 2014.


2008 ◽  
pp. 3659-3675
Author(s):  
Steven C. Ross ◽  
Craig K. Tyran ◽  
David J. Auer

On July 3, 2002, fire destroyed a facility that served as both office and computer server room for a College of Business located in the United States. The fire also caused significant smoke damage to the office building where the computer facility was located. The monetary costs of the disaster were over $4 million. This case, written from the point of view of the chairperson of the College Technology Committee, discusses the issues faced by the college as they resumed operations and planned for rebuilding their information technology operations. The almost-total destruction of the college’s server assets offered a unique opportunity to rethink the IT architecture for the college. The reader is challenged to learn from the experiences discussed in the case to develop an IT architecture for the college that will meet operational requirements and take into account the potential threats to the system.


Sign in / Sign up

Export Citation Format

Share Document