scholarly journals A Role for Information Systems Education Programs

10.28945/2503 ◽  
2002 ◽  
Author(s):  
R. Alan Hodgett

The international media continually reports a worldwide shortage of skilled information technology literate people. An intermediary role or disciplinary area between business requirements and computer science has been identified in the past. A number of institutions have developed information systems education programs to fill this role. A survey of pasl graduates and employers evaluates the performance of several information systems education programs at the University of South Australia.

2013 ◽  
Vol 95 (5) ◽  
pp. 164-165
Author(s):  
Carina Phillips

Over the past year RCS museum staff have been working on a project called Digitised Diseases. This Joint Information Systems Committee (JISC)-funded project is a collaboration with the university of Bradford and Museum of London Archaeology (MOLA). Digitised Diseases aims to bridge the gap between modern clinical medicine, historic medical collections and archaeological assemblages in the study of osteological pathology. The project will produce an archive of 3D case studies of exemplar specimens that can be studied virtually.


1992 ◽  
Vol 8 (29) ◽  
pp. 70-75
Author(s):  
Tony Mitchell

Doppio is a theatre company which uses three languages – English, Italian, and a synthetic migrant dialect it calls ‘Emigrante’ – to explore the conditions of the large community of Italian migrants in Australia. It works, too, in three different kinds of theatrical territory, all with an increasingly feminist slant – those of multicultural theatrein-education; of community theatre based in the Italian clubs of South Australia; and of documentary theatre, exploring the roots and the past of a previously marginalized social group. The company's work was seen in 1990 at the Leeds Festival of Youth Theatre, but its appeal is fast increasing beyond the confines of specialisms, ethnic or theatric, and being recognized in the ‘mainstream’ of Australian theatrical activity. Tony Mitchell – a regular contributor to NTQ, notably on the work of Dario Fo – who presently teaches in the Department of Theatre Studies in the University of Technology in Sydney, here provides an analytical introduction to the company's work, and follows this with an interview with one of its directors and co-founders, Teresa Crea.


10.28945/3914 ◽  
2017 ◽  
Vol 2 ◽  
pp. 001-025 ◽  

Dr. T. Grandon Gill, a Professor in the Information Systems and Decision Sciences Department at the University of South Florida, was traveling with his family in England when he received a strange phone message. Not being able to respond, he ignored it until—a couple of days later—he was notified that access to his personal website had been suspended (see Exhibit 1). Grandon.com had, once again, been hacked–for the 7th time. Getting his website hacked was not a new experience for Grandon Gill. In the past, however, getting the site back up and running had been a quick fix involving replacing the corrupted files. This time it was different. Based on the email and his service provider’s response, his site now contained links to PayPal phishing sites. Without significant changes, he could become complicit in fraud if the situation was not remedied. This was a problem that could no longer be ignored. After Gill had re-read the email, he pondered the various options available to him. Given the amount of trouble it was causing him, he wondered if he needed the website at all. To maintain the domain name grandon.com, which he had held for more than 20 years, all he needed to do was to put up a simple landing page with a message: “Hi, I am Grandon—go to my school account to find out more.” At the other extreme, he could completely re-engineer the site to make it much less vulnerable—a process that could take days, if not weeks. Between the two extremes, there were many other possibilities. These included changing hosts, simplifying the site so that it contained only the most critical information, dropping its WordPress component, or even going to a pure WordPress model. He had a suspicion, based on previous experience, that vulnerabilities in WordPress may have been the source of the hack. But were these vulnerabilities intrinsic to the application, or were they simply the result of his inattentive management? Whatever he decided, he needed to take action soon. It was very embarrassing, and perhaps professionally damaging, to have his site showing an unavailable message. He thought back to a popular ironic quote that said: “Good decisions come from experience, and experience comes from bad decisions.” What should he do now?


2020 ◽  
Vol 20 (2) ◽  
pp. 648
Author(s):  
Suharyono Suharyono

Development is the most important thing in the countryside. All that can be seen from the way the government manages its finances, including village funds and village funds. This study discusses the evaluation of the use of village funds and allocation of funds. The type of research used is descriptive qualitative. The results of this study indicate how the use of village funds and village funds in BM has not been used to its full potential, because there are still a number of program activities that are not realized. While unrealized activities are management of village-owned libraries, security capacity building and improvement, construction / repair / construction of buildings, construction of village information systems, education programs, and disaster management activities.


10.28945/3926 ◽  
2017 ◽  
Vol 6 ◽  
pp. 10
Author(s):  
Taufeeq Mohammed ◽  
Utkarsh Shrivastava ◽  
Ashish K Das ◽  
Quynh Thi Nguyen

A professor in information systems discovers that his personal website has been hacked. Even worse, his ISP has suspended his site because the defacement included a PayPal phishing scheme. This is not the first time this has happened. How should he recover? Dr. T. Grandon Gill, a Professor in the Information Systems and Decision Sciences Department at the University of South Florida, was traveling with his family in England when he received a strange phone message. Not being able to respond, he ignored it until—a couple of days later—he was notified that access to his personal website had been suspended (see Exhibit 1). Grandon.com had, once again, been hacked–for the 7th time. Getting his website hacked was not a new experience for Grandon Gill. In the past, however, getting the site back up and running had been a quick fix involving replacing the corrupted files. This time it was different. Based on the email and his service provider’s response, his site now contained links to PayPal phishing sites. Without significant changes, he could become complicit in fraud if the situation was not remedied. This was a problem that could no longer be ignored. After Gill had re-read the email, he pondered the various options available to him. Given the amount of trouble it was causing him, he wondered if he needed the website at all. To maintain the domain name grandon.com, which he had held for more than 20 years, all he needed to do was to put up a simple landing page with a message: “Hi, I am Grandon—go to my school account to find out more.” At the other extreme, he could completely re-engineer the site to make it much less vulnerable—a process that could take days, if not weeks. Between the two extremes, there were many other possibilities. These included changing hosts, simplifying the site so that it contained only the most critical information, dropping its WordPress component, or even going to a pure WordPress model. He had a suspicion, based on previous experience, that vulnerabilities in WordPress may have been the source of the hack. But were these vulnerabilities intrinsic to the application, or were they simply the result of his inattentive management? Whatever he decided, he needed to take action soon. It was very embarrassing, and perhaps professionally damaging, to have his site showing an unavailable message. He thought back to a popular ironic quote that said: “Good decisions come from experience, and experience comes from bad decisions.” What should he do now?


2017 ◽  
Vol 3 (2) ◽  
pp. 1
Author(s):  
Janos T. Fustos ◽  
Gerard J. Morris ◽  
Wayne A. Haga

Information Systems/Technology is a key component in today’s business infrastructures with a myriad of ever-increasing and innovative applications fuelling the drive for competitive advantage. Therefore information systems education should be a critical element in business schools programs today to appropriately prepare students to be competitive. As our university was seeking AACSB accreditation we wanted to investigate what other programs were doing for the information systems area in the business core. Therefore data was acquired from 61 peer institutions, 89% of which are AACSB-accredited. Data about the components of the business core were collected from the university websites and analysed to determine the amount of the business core curriculum devoted to information systems. Analysis indicates that 85% of the peer institutions had one information systems course and only three percent had two information systems courses.


1979 ◽  
Vol 46 ◽  
pp. 96-101
Author(s):  
J.A. Graham

During the past several years, a systematic search for novae in the Magellanic Clouds has been carried out at Cerro Tololo Inter-American Observatory. The Curtis Schmidt telescope, on loan to CTIO from the University of Michigan is used to obtain plates every two weeks during the observing season. An objective prism is used on the telescope. This provides additional low-dispersion spectroscopic information when a nova is discovered. The plates cover an area of 5°x5°. One plate is sufficient to cover the Small Magellanic Cloud and four are taken of the Large Magellanic Cloud with an overlap so that the central bar is included on each plate. The methods used in the search have been described by Graham and Araya (1971). In the CTIO survey, 8 novae have been discovered in the Large Cloud but none in the Small Cloud. The survey was not carried out in 1974 or 1976. During 1974, one nova was discovered in the Small Cloud by MacConnell and Sanduleak (1974).


Author(s):  
Kenneth C. Moore

The University of Iowa Central Electron Microscopy Research Facility(CEMRF) was established in 1981 to support all faculty, staff and students needing this technology. Initially the CEMRF was operated with one TEM, one SEM, three staff members and supported about 30 projects a year. During the past twelve years, the facility has replaced all instrumentation pre-dating 1981, and now includes 2 TEM's, 2 SEM's, 2 EDS systems, cryo-transfer specimen holders for both TEM and SEM, 2 parafin microtomes, 4 ultamicrotomes including cryoultramicrotomy, a Laser Scanning Confocal microscope, a research grade light microscope, an Ion Mill, film and print processing equipment, a rapid cryo-freezer, freeze substitution apparatus, a freeze-fracture/etching system, vacuum evaporators, sputter coaters, a plasma asher, and is currently evaluating scanning probe microscopes for acquisition. The facility presently consists of 10 staff members and supports over 150 projects annually from 44 departments in 5 Colleges and 10 industrial laboratories. One of the unique strengths of the CEMRF is that both Biomedical and Physical scientists use the facility.


1995 ◽  
Vol 34 (03) ◽  
pp. 289-296 ◽  
Author(s):  
B. H. Sielaff ◽  
D. P. Connelly ◽  
K. E. Willard

Abstract:The development of an innovative clinical decision-support project such as the University of Minnesota’s Clinical Workstation initiative mandates the use of modern client-server network architectures. Preexisting conventional laboratory information systems (LIS) cannot be quickly replaced with client-server equivalents because of the cost and relative unavailability of such systems. Thus, embedding strategies that effectively integrate legacy information systems are needed. Our strategy led to the adoption of a multi-layered connection architecture that provides a data feed from our existing LIS to a new network-based relational database management system. By careful design, we maximize the use of open standards in our layered connection structure to provide data, requisition, or event messaging in several formats. Each layer is optimized to provide needed services to existing hospital clients and is well positioned to support future hospital network clients.


Sign in / Sign up

Export Citation Format

Share Document