acm-header
Sign In

Communications of the ACM

Communications of the ACM

In the Virtual Extension


Reversing the Landslide in Computer-Related Degree Programs

Irma Becerra-Fernandez, Joyce Elam, and Susan Clemmons

Undergraduate and graduate enrollment in computer information system (CIS)-related coursework has been on a steady decline. The number of bachelor's degrees in computer science has fallen dramatically since 2004; a similar trend is also affecting academic programs that combine business and IT education. Rumors of CIS faculty layoffs compound the grim job outlook of CIS graduates, who fear not being able to find jobs in a market already plagued by challenges brought about by the dot com demise and IT outsourcing. How can CIS programs survive? This article details some successful intervention strategies that can be implemented to weather the impending crisis, and details how these interventions helped one institution reverse the downturn and reinvent the image of its CIS programs.

Practical Intelligence in IT: Assessing Soft Skills of IT Professionals

Damien Joseph, Soon Ang, Roger H.L. Change, and Sandra A. Slaughter

What qualities make a successful IT professional? This study develops and tests a measure of soft skills or practical intelligence of IT professionals, defined as intrapersonal and interpersonal strategies for managing self, career, and others. The instrument—SoftSkills for IT (SSIT)—elicits individuals' responses to IT work-related incidents and was administered to practicing IT professionals and inexperienced IT undergraduates. Results indicate that practical intelligence is measurable and SSIT discriminates between experienced and inexperienced IT professionals. This study concludes by identifying practical implications for selection, training, and development and proposes future research directions on assessing practical intelligence.

Wireless Insecurity: Examining User Security Behavior on Public Networks

Tim Chenoweth, Robert Minch, and Sharon Tabor

Wireless networks are becoming ubiquitous but often leave users responsible for their own security. The authors study whether users are securing their computers when using wireless networks. Automated techniques are used that scan users' machines after they associate with a university wireless network. Results show that over 9% of 3,331 unique computers scanned were not using a properly configured firewall. In addition, almost 9% had at least one TCP port open, with almost 6% having open ports with significant security implications. The authors also discuss cases where connected computers were compromised by Trojan programs, such as SubSeven and NetBus.

Informatics Creativity: A Role for Abductive Reasoning?

John Minor Ross

Analysts and programmers may be stymied when faced with novel tasks that seem beyond the reach of prior education and experience. Sometimes a solution appears, however, while considering something else seemingly altogether unrelated. Coming up with new ideas or creative approaches to overcome such problems may be less daunting once the role of adductive reasoning is considered.

Designs for Effective Implementation of Trust Assurances in Internet Stores

Dongmin Kim and Izak Benbasat

A study of 85 online stories offers a snapshot of how often Internet stores use trust assurances and what concerns they address. These findings will help business managers understand how other companies use trust assurances and help identify what can be improved within their organizations. For example, the authors determine that about 38% of total assurances were delivered in an ineffective way, which might cause shopping-cart-abandonment problems. The article offers design guidelines for trust assurances for Web developers based on the authors' analysis and previous studies.

Taking a Flexible Approach to ASPS

Farheen Altaf and David Schuff

There has been a recent revival of the ASP model through the notion of cloud computing and "software as a service." The purpose of this article is to better comprehend the Small to Medium Enterprise (SME) market for ASPs through an analysis of the factors that are most important to likely adopters. Through a survey of 101 SMEs, the authors find that cost, financial stability, reliability, and flexibility are all significantly associated with self-assessed likelihood of ASP adoption. Surprisingly, flexibility was negatively associated with likelihood of adoption, possibly indicating a perception that ASPs are not sought for their flexibility.

Managing a Corporate Open Source Software Asset

Vijay K. Gurbani, Anita Garvert, and James D. Herbsleb

Corporations have used open source software for a long time. But, can a corporation internally develop its software using the open source development models? It may seem that open source style development—using informal processes, voluntary assignment to tasks, and having few financial incentives—may not be a good match for commercial environments. This ongoing work demonstrates that under the right circumstances, corporations can indeed benefit from adopting open source development methodologies. This article presents findings on how corporations can structure software teams to succeed in developing commercial software using the open-source software development model.

Takes Two to Tango: How Relational Investments Improve IT Outsourcing Partnerships

Nikhil Mehta and Anju Mehta

As the recent economic crisis has shown, client-vendor partnership can quickly regress into a contractual arrangement with a primitive cost-cutting objective. Based on interviews with 21 vendor executives in India, the authors recommend that clients with a long-term vision for their IT outsourcing function may do well by developing mature partnerships with their vendors. To address the general lack of understanding about how to make it happen, the authors make provisional recommendations advising clients to make relational investments in selective areas. Key client benefits of such investments include improved service quality, cost savings, improved vendor sensitivity toward information security and privacy, and improved vendor capabilities to fulfill client's future IT needs.

Back to Top

Footnotes

DOI: http://doi.acm.org/10.1145/1646353.1646357


©2010 ACM  0001-0782/10/0200  $10.00

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.

The Digital Library is published by the Association for Computing Machinery. Copyright © 2010 ACM, Inc.


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Article Contents: