in the virtual extension
DOI: 10.1145/1646353.1646357
in the Virtual extension
Communications’ Virtual Extension brings more quality articles to ACM members.
These articles are now available in the ACM Digital Library.
Reversing the Landslide
in computer-Related Degree
Programs
Irma Becerra-Fernandez, Joyce Elam,
and Susan Clemmons
Undergraduate and graduate enrollment
in computer information system (
CIS)-related coursework has been on a steady
decline. The number of bachelor’s degrees
in computer science has fallen dramatically
since 2004; a similar trend is also affecting
academic programs that combine business
and IT education. Rumors of CIS faculty
layoffs compound the grim job outlook of
CIS graduates, who fear not being able to
find jobs in a market already plagued by
challenges brought about by the dot com
demise and I T outsourcing. How can CIS
programs survive? This article details some
successful intervention strategies that can
be implemented to weather the impending
crisis, and details how these interventions
helped one institution reverse the downturn
and reinvent the image of its CIS programs.
Practical intelligence in it:
Assessing soft skills
of it Professionals
Damien Joseph, Soon Ang, Roger H.L.
Change, and Sandra A. Slaughter
What qualities make a successful IT
professional? This study develops and
tests a measure of soft skills or practical
intelligence of IT professionals, defined
as intrapersonal and interpersonal
strategies for managing self, career, and
others. The instrument—SoftSkills for
IT (SSIT)—elicits individuals’ responses
to IT work-related incidents and was
administered to practicing IT professionals
and inexperienced IT undergraduates.
Results indicate that practical intelligence
is measurable and SSIT discriminates
between experienced and inexperienced
IT professionals. This study concludes
by identifying practical implications for
selection, training, and development and
proposes future research directions on
assessing practical intelligence.
Wireless insecurity:
examining user security Behavior
on Public networks
Tim Chenoweth, Robert Minch,
and Sharon Tabor
Wireless networks are becoming
ubiquitous but often leave users
responsible for their own security. The
authors study whether users are securing
their computers when using wireless
networks. Automated techniques are
used that scan users’ machines after
they associate with a university wireless
network. Results show that over 9% of 3,331
unique computers scanned were not using
a properly configured firewall. In addition,
almost 9% had at least one TCP port open,
with almost 6% having open ports with
significant security implications. The
authors also discuss cases where connected
computers were compromised by Trojan
programs, such as SubSeven and NetBus.
informatics creativity:
A Role for Abductive Reasoning?
John Minor Ross
Analysts and programmers may be stymied
when faced with novel tasks that seem
beyond the reach of prior education and
experience. Sometimes a solution appears,
however, while considering something else
seemingly altogether unrelated. Coming
up with new ideas or creative approaches
to overcome such problems may be less
daunting once the role of adductive
reasoning is considered.
Designs for effective
implementation of trust
Assurances in internet stores
Dongmin Kim and Izak Benbasat
A study of 85 online stories offers a
snapshot of how often Internet stores
use trust assurances and what concerns
they address. These findings will help
business managers understand how other
companies use trust assurances and help
identify what can be improved within
their organizations. For example, the
authors determine that about 38% of total
assurances were delivered in an ineffective
way, which might cause shopping-cart-abandonment problems. The article offers
design guidelines for trust assurances for
Web developers based on the authors’
analysis and previous studies.
taking a flexible Approach to AsPs
Farheen Altaf and David Schuff
There has been a recent revival of the
ASP model through the notion of cloud
computing and “software as a service.”
The purpose of this article is to better
comprehend the Small to Medium
enterprise (SMe) market for ASPs through
an analysis of the factors that are most
important to likely adopters. Through a
survey of 101 SMes, the authors find that
cost, financial stability, reliability, and
flexibility are all significantly associated
with self-assessed likelihood of ASP
adoption. Surprisingly, flexibility was
negatively associated with likelihood of
adoption, possibly indicating a perception
that ASPs are not sought for their flexibility.
managing a corporate
open source software Asset
Vijay K. Gurbani, Anita Garvert, and
James D. Herbsleb
Corporations have used open source
software for a long time. But, can a
corporation internally develop its software
using the open source development
models? It may seem that open source style
development—using informal processes,
voluntary assignment to tasks, and having
few financial incentives—may not be a
good match for commercial environments.
This ongoing work demonstrates
that under the right circumstances,
corporations can indeed benefit from
adopting open source development
methodologies. This article presents
findings on how corporations can structure
software teams to succeed in developing
commercial software using the open-source software development model.
takes two to tango: how
Relational investments improve
it outsourcing Partnerships
Nikhil Mehta and Anju Mehta
As the recent economic crisis has
shown, client-vendor partnership
can quickly regress into a contractual
arrangement with a primitive cost-cutting
objective. Based on interviews with 21
vendor executives in India, the authors
recommend that clients with a long-term
vision for their IT outsourcing function
may do well by developing mature
partnerships with their vendors. To address
the general lack of understanding about
how to make it happen, the authors make
provisional recommendations advising
clients to make relational investments in
selective areas. Key client benefits of such
investments include improved service
quality, cost savings, improved vendor
sensitivity toward information security and
privacy, and improved vendor capabilities
to fulfill client’s future IT needs.