共查询到20条相似文献,搜索用时 109 毫秒
1.
2.
3.
为了提高人才需求预测精度,提出一种将灰色理论和支持向量机相结合的人才需求预测模型。首先采用灰色预测模型预测人才需求基本变化趋势,然后运用支持向量机对灰色模型预测结果进行修正,以提高人才需求预测精度。结果表明,组合预测模型提高了人才需求的预测精度,更能描述人才需求变化规律,为人才需求预测提供了一种新的预测方法。 相似文献
4.
5.
6.
7.
8.
云计算时代高校IT人才培养模式的创新 总被引:1,自引:0,他引:1
阐述了云计算的应用优势;基于对云计算技术特点和知名招聘网站IT职位描述信息进行综合分析,总结未来IT人才需求的趋势,并针对高校相关专业IT人才培养模式提出了改革措施。 相似文献
9.
李悦芳 《数字社区&智能家居》2014,(1):107-109
目前重庆IT行业人才需求巨大,但市场具体青睐何种人才却无人清楚;本文对重庆地区IT行业人力资源需求做了调查分析,并对高校计算机教学提出可行建议。 相似文献
10.
针对我国IT人才素质与企业需求差异现状,对IT类招聘信息进行统计分析,简要介绍统计方法,通过分析统计结果,给出IT行业人才需求,以期对教学提供参考。 相似文献
11.
David Coderre 《EDPACS》2015,51(2):1-9
Auditors are being challenged to make better use of data analytics to identify and assess emerging areas of risk. Traditional methods are not timely and too labor intensive. Business risk changes rapidly and auditors need to implement a continuous assessment process that will allow them to adjust audit plans as risks change. Since this requires access to, and the analysis of, information residing in enterprise resource planning and other information systems, IT auditors are often called on to provide the technical advice and assistance. Therefore, it is important for IT auditors to understand how quantitative indicators of risk can be employed to address this problem. 相似文献
12.
The entire IT security industry is an accident: an artifact of how the computer industry developed. Computers are hard to use, and you need an IT department staffed with experts to make it work. IT security is critical, but there's no earthly reason why users need to know what an intrusion detection system with stateful protocol analysis is, or why it's helpful in spotting SQL injection attacks. As IT fades into the background and becomes just another utility, users will simply expect it to work. The details of how it works won't matter. 相似文献
13.
针对当前企业信息化过程中所存在的问题,系统论述了企业管理和IT治理的关系,并着重分析了企业IT治理的模式,提出了企业IT治理的目标和架构。并在此基础上提出了企业IT治理架构构建的方法。 相似文献
14.
The impact of information technology (IT) on the business value of a cooperation has been an active research area for more than two decades. Although it is widely agreed that IT has a positive impact on the business values of cooperations an in-depth understanding of the underlying structures is still missing. Especially due to the huge investments in IT, there is still a need to better understand how IT influences the performance of cooperations and business values. Generally, the data collected in IT business value research to be quantitative as well as of qualitative nature. While quantitative data can be examined by classic econometric methods the analysis of qualitative data requires special methods. In the case of ordinal data DRSA – Dominance based Rough Sets Approach has been proposed. DRSA can be applied to induce rules out of a decision table containing ordinal data. This method has already successfully applied to such diverse areas like customer relationship management and satisfaction analysis, or the technical diagnostic of a fleet of vehicles besides others. In this article we apply it for the first time to the analysis of IT business value. We use ordinal data of a survey on IT management strategies of Australian firms conducted by the Australian Department of Communications, Information Technology and the Arts. The induces rules are interpreted and provide important insights into the impact of information technology on the business values of cooperations. Furthermore our study shows the potential of DRSA for information systems research where questionnaire are a widely applied technique to collect ordinal data. 相似文献
15.
《Information & Management》2005,42(7):947-964
The evaluation of information technology (IT) is fraught with misconception and there is a lack of understanding of appropriate IT evaluation methods and techniques. The benefits, costs and risks of IT need to be identified, managed, and controlled if businesses are to derive value from their investments. This paper presents findings from an exploratory study that used a questionnaire survey to determine the benefits, costs and risks of IT investments from 130 small-to-medium-sized enterprises (SMEs) in Australia. The analysis revealed that organizations from different industry sectors significantly differ in the amount they invest in IT but that firm size (in terms of turnover and number of employees) does not influence IT investment levels. Second, strategic benefits vary across different industry sectors. Third, the way employees adapt to change as a result of IT implementation depends on the size of the organization. Based upon the findings, a series of benchmark metrics for benefits, costs, and risks of IT are presented. It is posited that these can serve as a reference point for initiating a quality evaluation cycle in which benchmarking forms an integral component of the strategic process. 相似文献
16.
In enterprises decisions whether to undertake investments into IT projects or not have to be made regularly. Regarding the fact that two out of three IT projects fail or do not reach their expected value the need for an integrated valuation which addresses returns and connected risks is evident. The impact of development aspects (e.g. the process model used) and project size on the risk-return position of IT projects is demonstrated and it is shown how this can be taken into account when valuing, optimizing and selecting IT investments. 相似文献
17.
Sajda Qureshi 《Information Technology for Development》2013,19(2):71-72
Abstract Organizational context plays an important role in how organizations develop and implement IT strategies and plans. Since, in developing nations like India where, in the presence of highly skilled based of technical manpower, embedded organizational and cultural issues exert a strong impact on strategies adopted by organizations, it becomes important to identify organizational attributes that determine IT effectiveness. In this paper we investigate the critical nexus between IT planning and IT effectiveness in the Indian corporate milieu with the aim of identifying strategies and practices that could result in effective IT usage in spite of organizational and cultural constraints. Empirical support was provided for this study by in‐depth interviews conducted with systems managers and, in some instances, CEOs. Results indicate that the majority of the organizations do not use IT effectively. Moreover, some of these deficiencies can be linked to planning and strategic aspects of IT management. Results are discussed in the light of existing conditions and the main outcome that emerges is that if organizations in India do not develop and implement strategies to use IT for both incremental as well as radical organizational improvements, they are not likely to experience significant IT‐related benefits. 相似文献
18.
We present an analysis of the issues that have influenced the development of informatics policy of India. Factors such as impact on employment, trade, and foreign exchange have acted as constraints in the adoption of information technology (IT). At the same time, IT presented a significant opportunity for accelerating progress towards meeting India's goals of self reliance and faster economic development. IT was also viewed as necessary for India's strategy of development, which is based upon centralized planning and management of the economy. We also discuss the role of potential demand for computer systems, the existing industrial base, R&D infrastructure, availability of technical manpower, and regulations for import, foreign investment, and licensing in determining the policies for indigenous manufacture of computer systems. We conclude with a discussion of India's informatics policies and experience in implementing them. 相似文献
19.
Stakeholder involvement and participation are widely recognized as being key success factors for IT risk assessment. A particular
challenge facing current IT risk assessment methods is to provide accessible abstractions on matters of IT risk that attend
to both managerial and technical perspectives of the stakeholders involved. In this paper, we investigate whether a conceptual
modeling method can address essential requirements in the IT risk assessment domain, and which structural and procedural features
such a method entails. The research follows a design research process in which we describe a research artifact, and evaluate
it to assess whether it meets the intended goals. In the paper, we specify requirements and assumptions underlying the method
construction, discuss the structural specification of the method and its design rationale, present a prototypical application
scenario, and provide an initial method evaluation. The results indicate that multi-perspective modeling methods satisfy requirements
specific to the IT risk assessment domain, and that such methods, in fact, provide abstractions on matters of IT risk accessible
to both a technical and a managerial audience. 相似文献
20.
N. K. Mwara 《Information Technology for Development》2013,19(2):75-89
The issues pertaining to computers and development are at best complex. This paper examines the implications of manpower, education and training, IT policy, job replacement, culture and traditions, consultancy and marketing, IT isolationism in the context of Kenya. 相似文献