首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
东莞市IT人才需求预测研究   总被引:1,自引:0,他引:1  
随着东莞产业结构的调整、高新技术产业的迅猛发展和转型升级的推进,IT人才的需求量急剧上升。本文在完成东莞市IT人才需求调研的基础上,根据近年东莞IT人才需求的历史数据,利用灰色系统理论的GM(1,1)模型对东莞IT人才的需求进行了拟合和预测,并针对社会发展需求提出了人才培养对策,为探索适应东莞改革新形势的高职实用型、技能型高级计算机专门人才培养模式提供了参考依据。  相似文献   

2.
分析重庆市IT产业现状及其人才需求,探讨IT企业所需人才的基本素质,研究高校IT专业学生的培养路径,重点构建其与IT企业人才需求对接策略。通过实践案例展示校企合作、IT专业学生综合能力培养及其与IT企业人才需求对接的路径。  相似文献   

3.
董纪芳 《福建电脑》2012,28(6):74-76,62
为了提高人才需求预测精度,提出一种将灰色理论和支持向量机相结合的人才需求预测模型。首先采用灰色预测模型预测人才需求基本变化趋势,然后运用支持向量机对灰色模型预测结果进行修正,以提高人才需求预测精度。结果表明,组合预测模型提高了人才需求的预测精度,更能描述人才需求变化规律,为人才需求预测提供了一种新的预测方法。  相似文献   

4.
<正>计算机类高技能人才是IT产业人力资源结构中直接实现价值和创造利润的主力军,而IT产业在众多新兴职业中是发展最为迅猛,社会影响力最大,对社会各领域渗透力最强的产业。关注产业发展,预测人才需求,针对区域经济发展的要求,灵活调整和设置专业,是高等职业教育  相似文献   

5.
不觉间,挥手告别了2004,满怀希望地走进了2005。据专家预测,今年IT人才需求行情仍然看涨,这对于即将毕业的IT学子来说或许是一个不错的消息。然而,就快过年了,是不是所有的IT大学生都有心情享受新年里的欢乐呢?求职?考研?出国?创业?当今的IT学子路在何方?他们又是怎样面对生活的机遇与挑战?下面就让我们走进他们的世界,听听他们的故事。  相似文献   

6.
不觉间,挥手告别了2004,满怀希望地走进了2005.据专家预测,今年IT人才需求行情仍然看涨,这对于即将毕业的IT学子来说或许是一个不错的消息.然而,就快过年了,是不是所有的IT大学生都有心情享受新年里的欢乐呢?求职?考研?出国?创业?当今的IT学子路在何方?他们又是怎样面对生活的机遇与挑战?下面就让我们走进他们的世界,听听他们的故事.……  相似文献   

7.
《软件工程师》2005,(2):25-27
不觉间,挥手告别了2004,满怀希望地走进了2005。据专家预测,今年IT人才需求行情仍然看涨,这对于即将毕业的IT学子来说或许是一个不错的消息。然而,就快过年了,是不是所有的IT大学生都有心情享受新年里的欢乐呢?求职?考研?出国?创业?当今的IT学子路在何方?他们又是怎样面对生活的机遇与挑战?下面就让我们走进他们的世界,听听他们的故事。  相似文献   

8.
云计算时代高校IT人才培养模式的创新   总被引:1,自引:0,他引:1  
黄务兰 《计算机时代》2012,(3):59-61,64
阐述了云计算的应用优势;基于对云计算技术特点和知名招聘网站IT职位描述信息进行综合分析,总结未来IT人才需求的趋势,并针对高校相关专业IT人才培养模式提出了改革措施。  相似文献   

9.
目前重庆IT行业人才需求巨大,但市场具体青睐何种人才却无人清楚;本文对重庆地区IT行业人力资源需求做了调查分析,并对高校计算机教学提出可行建议。  相似文献   

10.
针对我国IT人才素质与企业需求差异现状,对IT类招聘信息进行统计分析,简要介绍统计方法,通过分析统计结果,给出IT行业人才需求,以期对教学提供参考。  相似文献   

11.
David Coderre 《EDPACS》2015,51(2):1-9
Auditors are being challenged to make better use of data analytics to identify and assess emerging areas of risk. Traditional methods are not timely and too labor intensive. Business risk changes rapidly and auditors need to implement a continuous assessment process that will allow them to adjust audit plans as risks change. Since this requires access to, and the analysis of, information residing in enterprise resource planning and other information systems, IT auditors are often called on to provide the technical advice and assistance. Therefore, it is important for IT auditors to understand how quantitative indicators of risk can be employed to address this problem.  相似文献   

12.
The entire IT security industry is an accident: an artifact of how the computer industry developed. Computers are hard to use, and you need an IT department staffed with experts to make it work. IT security is critical, but there's no earthly reason why users need to know what an intrusion detection system with stateful protocol analysis is, or why it's helpful in spotting SQL injection attacks. As IT fades into the background and becomes just another utility, users will simply expect it to work. The details of how it works won't matter.  相似文献   

13.
针对当前企业信息化过程中所存在的问题,系统论述了企业管理和IT治理的关系,并着重分析了企业IT治理的模式,提出了企业IT治理的目标和架构。并在此基础上提出了企业IT治理架构构建的方法。  相似文献   

14.
The impact of information technology (IT) on the business value of a cooperation has been an active research area for more than two decades. Although it is widely agreed that IT has a positive impact on the business values of cooperations an in-depth understanding of the underlying structures is still missing. Especially due to the huge investments in IT, there is still a need to better understand how IT influences the performance of cooperations and business values. Generally, the data collected in IT business value research to be quantitative as well as of qualitative nature. While quantitative data can be examined by classic econometric methods the analysis of qualitative data requires special methods. In the case of ordinal data DRSA – Dominance based Rough Sets Approach has been proposed. DRSA can be applied to induce rules out of a decision table containing ordinal data. This method has already successfully applied to such diverse areas like customer relationship management and satisfaction analysis, or the technical diagnostic of a fleet of vehicles besides others. In this article we apply it for the first time to the analysis of IT business value. We use ordinal data of a survey on IT management strategies of Australian firms conducted by the Australian Department of Communications, Information Technology and the Arts. The induces rules are interpreted and provide important insights into the impact of information technology on the business values of cooperations. Furthermore our study shows the potential of DRSA for information systems research where questionnaire are a widely applied technique to collect ordinal data.  相似文献   

15.
《Information & Management》2005,42(7):947-964
The evaluation of information technology (IT) is fraught with misconception and there is a lack of understanding of appropriate IT evaluation methods and techniques. The benefits, costs and risks of IT need to be identified, managed, and controlled if businesses are to derive value from their investments. This paper presents findings from an exploratory study that used a questionnaire survey to determine the benefits, costs and risks of IT investments from 130 small-to-medium-sized enterprises (SMEs) in Australia. The analysis revealed that organizations from different industry sectors significantly differ in the amount they invest in IT but that firm size (in terms of turnover and number of employees) does not influence IT investment levels. Second, strategic benefits vary across different industry sectors. Third, the way employees adapt to change as a result of IT implementation depends on the size of the organization. Based upon the findings, a series of benchmark metrics for benefits, costs, and risks of IT are presented. It is posited that these can serve as a reference point for initiating a quality evaluation cycle in which benchmarking forms an integral component of the strategic process.  相似文献   

16.
Integrierte Ex-ante-Rendite-/Risikobewertung von IT-Investitionen   总被引:3,自引:2,他引:3  
In enterprises decisions whether to undertake investments into IT projects or not have to be made regularly. Regarding the fact that two out of three IT projects fail or do not reach their expected value the need for an integrated valuation which addresses returns and connected risks is evident. The impact of development aspects (e.g. the process model used) and project size on the risk-return position of IT projects is demonstrated and it is shown how this can be taken into account when valuing, optimizing and selecting IT investments.  相似文献   

17.
Abstract

Organizational context plays an important role in how organizations develop and implement IT strategies and plans. Since, in developing nations like India where, in the presence of highly skilled based of technical manpower, embedded organizational and cultural issues exert a strong impact on strategies adopted by organizations, it becomes important to identify organizational attributes that determine IT effectiveness. In this paper we investigate the critical nexus between IT planning and IT effectiveness in the Indian corporate milieu with the aim of identifying strategies and practices that could result in effective IT usage in spite of organizational and cultural constraints. Empirical support was provided for this study by in‐depth interviews conducted with systems managers and, in some instances, CEOs. Results indicate that the majority of the organizations do not use IT effectively. Moreover, some of these deficiencies can be linked to planning and strategic aspects of IT management. Results are discussed in the light of existing conditions and the main outcome that emerges is that if organizations in India do not develop and implement strategies to use IT for both incremental as well as radical organizational improvements, they are not likely to experience significant IT‐related benefits.  相似文献   

18.
We present an analysis of the issues that have influenced the development of informatics policy of India. Factors such as impact on employment, trade, and foreign exchange have acted as constraints in the adoption of information technology (IT). At the same time, IT presented a significant opportunity for accelerating progress towards meeting India's goals of self reliance and faster economic development. IT was also viewed as necessary for India's strategy of development, which is based upon centralized planning and management of the economy. We also discuss the role of potential demand for computer systems, the existing industrial base, R&D infrastructure, availability of technical manpower, and regulations for import, foreign investment, and licensing in determining the policies for indigenous manufacture of computer systems. We conclude with a discussion of India's informatics policies and experience in implementing them.  相似文献   

19.
Stakeholder involvement and participation are widely recognized as being key success factors for IT risk assessment. A particular challenge facing current IT risk assessment methods is to provide accessible abstractions on matters of IT risk that attend to both managerial and technical perspectives of the stakeholders involved. In this paper, we investigate whether a conceptual modeling method can address essential requirements in the IT risk assessment domain, and which structural and procedural features such a method entails. The research follows a design research process in which we describe a research artifact, and evaluate it to assess whether it meets the intended goals. In the paper, we specify requirements and assumptions underlying the method construction, discuss the structural specification of the method and its design rationale, present a prototypical application scenario, and provide an initial method evaluation. The results indicate that multi-perspective modeling methods satisfy requirements specific to the IT risk assessment domain, and that such methods, in fact, provide abstractions on matters of IT risk accessible to both a technical and a managerial audience.  相似文献   

20.
The issues pertaining to computers and development are at best complex. This paper examines the implications of manpower, education and training, IT policy, job replacement, culture and traditions, consultancy and marketing, IT isolationism in the context of Kenya.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号