scholarly journals Career Success Model: A Case Study of Information Technology Graduates

Author(s):  
Julianti Kasih ◽  
Doro Edi ◽  
Radiant Victor Imbar

Success in a career is everyone's dream, and it is not an exception for Information Technology graduates who are engaged in information technology-related jobs. Several studies have documented the role of the following two (2) constructs, namely Career Competence (CC) and Lecturer Competence (LC), in Career Success (CS). The authors believe that University Commitment (UC) must be included in this list. This research aims at developing a model that explains and measures the relationship amongst those four (4) constructs. The model that will be developed is based on the Structural Equations Modelling Technique. Respondents participating in this research are IT graduates working in IT-related jobs who have graduated from three (3) private universities in Bandung (Indonesia), namely, Maranatha Christian University (UKM), Parahyangan Catholic University (UNPAR), and Harapan Bangsa Institute of Technology (ITHB)) with graduating years ranging from 2006 to 2018. The collected data will be processed using IBM SPSS AMOS. This research proves that firstly, LC influences both UC and CC, secondly, UC influences CC, and lastly, CC affects CS. Further hope this model can be developed for other universities in Indonesia to increase Lecture Competency and University Commitments by the strategic plans of each university.   Respondents participating in this research are IT graduates working in IT-related jobs who have graduated from three (3) private universities in Bandung (Indonesia), namely, Maranatha Christian University (UKM), Parahyangan Catholic University (UNPAR), and Harapan Bangsa Institute of Technology (ITHB)) with graduating years range from 2006 to 2018. The collected data will be processed using IBM SPSS AMOS. This research proves that firstly, LC influences both UC and CC, secondly, UC influences CC, and lastly, CC affects CS. Further hope this model can be developed for other universities in Indonesia to increase Lecture Competency and University Commitments by the strategic plans of each university.   Keywords— Department of Information Technology, Career Success, Commitment of Higher Education Lecturer Competency, Career Competence

2019 ◽  
Vol 22 (4) ◽  
pp. 744-752
Author(s):  
Sisira Dharmasri Jayasekara ◽  
Iroshini Abeysekara

Purpose The purpose of this paper is to discuss the role of digital forensics in an evolving environment of cyber laws giving attention to Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation (BIMSTEC) countries, comprising Bangladesh, India, Myanmar, Sri Lanka, Thailand, Nepal and Bhutan, in a dynamic global context. Design/methodology/approach This study uses a case study approach to discuss the digital forensics and cyber laws of BIMSTEC countries. The objective of the study was expected to be achieved by referring to decided cases in different jurisdictions. Cyber laws of BIMSTEC countries were studied for the purpose of this study. Findings The analysis revealed that BIMSTEC countries are required to amend legislation to support the growth of information technology. Most of the legislation are 10-15 years old and have not been amended to resolve issues on cyber jurisdictions. Research limitations/implications This study was limited to the members of the BIMSTEC. Originality/value This paper is an original work done by the authors who have discussed the issues of conducting investigations with respect to digital crimes in a rapidly changing environment of information technology and deficient legal frameworks.


Author(s):  
Mulyaning Wulan ◽  
Hera Khairunnisa ◽  
Efri Syamsul Bahri

This study aims to get information about: 1) How is the implementation of digital zakat finance in Indonesia?; 2) Why do zakat institutions need the Internal Audit role in the implementation of digital finance zakat?. This study is motivated by the development of zakat collection systems such as digital zakat finance system that uses a digital platform. Along with the development of technology, the role of internal audit is also expected to be expanded to the aspect of information technology audit. Internal audit division faces several challenges regarding digital zakat finance. Internal audit division has to ensure the zakat institution already mitigate the significant risk related to digital zakat finance. This study is limited to the audit aspect related to zakat collection system in BAZNAS that used digital platforms such as bank transfer collection system and collection system that collaborated with e-commerce. To achieve the study’s aims, this study uses qualitative methods with literature study techniques that are reinforced by interviews.


2016 ◽  
Vol 31 (1) ◽  
pp. 79-101 ◽  
Author(s):  
Stephan Zimmermann ◽  
Christopher Rentrop ◽  
Carsten Felden

ABSTRACT In several organizations, business workgroups autonomously implement information technology (IT) outside the purview of the IT department. Shadow IT, evolving as a type of workaround from nontransparent and unapproved end-user computing (EUC), is a term used to refer to this phenomenon, which challenges norms relative to IT controllability. This report describes shadow IT based on case studies of three companies and investigates its management. In 62 percent of cases, companies decided to reengineer detected instances or reallocate related subtasks to their IT department. Considerations of risks and transaction cost economics with regard to specificity, uncertainty, and scope explain these actions and the resulting coordination of IT responsibilities between the business workgroups and IT departments. This turns shadow IT into controlled business-managed IT activities and enhances EUC management. The results contribute to the governance of IT task responsibilities and provide a way to formalize the role of workarounds in business workgroups.


Author(s):  
Clem Herman

This article examines the role of community-based training initiatives in enabling women to cross the so-called digital divide and become confident users of ICTs. Drawing on a case study of the Women’s Electronic Village Hall (WEVH) in Manchester, United Kingdom, one of the first such initiatives in Europe offering both skills training and Internet access to women, the article will illustrate the impact that community-based initiatives can have in challenging and changing prevailing gendered attitudes toward technology. Gendered constructions of technology in dominant discourse suggest that women must also cross an internal digital divide, involving a change in attitude and self–identification, before they can see themselves as technically competent. Learning about technology is intimately linked to learning about gender, and the performance of skills and tasks that are culturally identified as masculine can be an empowering step for women, successfully challenging preconceived gendered relationships with technology. The WEVH occupied a unique position, acting as a model for other women’s ICT initiatives and influencing the development and proliferation of other community-based ICT access projects. There were two main motivating forces behind its setting up in 1992. The first was a shared vision of the potential for ICTs to be used as a tool to combat social exclusion. The second was a feminist commitment to redressing the inequalities and underrepresentation of women in computing. Both these perspectives formed an important backdrop to the growth and development of the organisation and have continued to inform its strategic plans.


2008 ◽  
pp. 2151-2158
Author(s):  
Clem Herman

This article examines the role of community-based training initiatives in enabling women to cross the so-called digital divide and become confident users of ICTs. Drawing on a case study of the Women’s Electronic Village Hall (WEVH) in Manchester, United Kingdom, one of the first such initiatives in Europe offering both skills training and Internet access to women, the article will illustrate the impact that community-based initiatives can have in challenging and changing prevailing gendered attitudes toward technology. Gendered constructions of technology in dominant discourse suggest that women must also cross an internal digital divide, involving a change in attitude and self–identification, before they can see themselves as technically competent. Learning about technology is intimately linked to learning about gender, and the performance of skills and tasks that are culturally identified as masculine can be an empowering step for women, successfully challenging preconceived gendered relationships with technology. The WEVH occupied a unique position, acting as a model for other women’s ICT initiatives and influencing the development and proliferation of other community-based ICT access projects. There were two main motivating forces behind its setting up in 1992. The first was a shared vision of the potential for ICTs to be used as a tool to combat social exclusion. The second was a feminist commitment to redressing the inequalities and underrepresentation of women in computing. Both these perspectives formed an important backdrop to the growth and development of the organisation and have continued to inform its strategic plans.


Sign in / Sign up

Export Citation Format

Share Document