In their study of user manager's systems needs, Alloway and Quillard surveyed 529 managers to determine whether current systems supported their information needs. Managers reported that only 44% of the installed base of application systems, most of which were transaction processing systems, were useful. Inquiry systems, which enabled managers to query data bases and to generate reports, and data analysis systems, which provided opportunities for modeling, simulating, and statistical analysis, were overwhelmingly favored by the managers surveyed. However, few of these analysis and inquiry systems existed (Alloway and Quillard, 1983).
{"title":"The impact of end-user computing on information systems development","authors":"M. Sumner, R. Klepper","doi":"10.1145/15467.15470","DOIUrl":"https://doi.org/10.1145/15467.15470","url":null,"abstract":"In their study of user manager's systems needs, Alloway and Quillard surveyed 529 managers to determine whether current systems supported their information needs. Managers reported that only 44% of the installed base of application systems, most of which were transaction processing systems, were useful. Inquiry systems, which enabled managers to query data bases and to generate reports, and data analysis systems, which provided opportunities for modeling, simulating, and statistical analysis, were overwhelmingly favored by the managers surveyed. However, few of these analysis and inquiry systems existed (Alloway and Quillard, 1983).","PeriodicalId":426630,"journal":{"name":"ACM Sigcpr Computer Personnel","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130471948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It can be expected that people's opinions about the future will differ. Consequently a high degree of concurrence cannot be anticipated if a mixed group of academics and practitioners are asked to forecast aspects of the future of application systems development.
{"title":"Predictions of the skills required by the systems analyst of the future","authors":"T. Crossman","doi":"10.1145/15467.15469","DOIUrl":"https://doi.org/10.1145/15467.15469","url":null,"abstract":"It can be expected that people's opinions about the future will differ. Consequently a high degree of concurrence cannot be anticipated if a mixed group of academics and practitioners are asked to forecast aspects of the future of application systems development.","PeriodicalId":426630,"journal":{"name":"ACM Sigcpr Computer Personnel","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115199609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There is considerable disagreement as to whether or not a procedural language, such as COBOL, should be included in the junior/senior year course work of information systems students. The curriculum recommendations of the Association for Computing Machinery (ACM) includes a procedural language prerequisite for information systems students. The ACM curriculum course, "Program, Data, and File Structures", includes programming as a topic within the course.This article presents arguments against the inclusion of COBOL within the information systems curriculum. It is intended to promote debate within the academic community to determine if a procedural language should be included in the curriculum and if so, which language should be taught. Arguments for a Procedural Language.
{"title":"Cobol and the information systems curriculum","authors":"G. Schell","doi":"10.1145/15467.15471","DOIUrl":"https://doi.org/10.1145/15467.15471","url":null,"abstract":"There is considerable disagreement as to whether or not a procedural language, such as COBOL, should be included in the junior/senior year course work of information systems students. The curriculum recommendations of the Association for Computing Machinery (ACM) includes a procedural language prerequisite for information systems students. The ACM curriculum course, \"Program, Data, and File Structures\", includes programming as a topic within the course.This article presents arguments against the inclusion of COBOL within the information systems curriculum. It is intended to promote debate within the academic community to determine if a procedural language should be included in the curriculum and if so, which language should be taught. Arguments for a Procedural Language.","PeriodicalId":426630,"journal":{"name":"ACM Sigcpr Computer Personnel","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122486863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The job titles given to application systems developers during the early 1970s seldom included anything other than SYSTEMS ANALYST and PROGRAMMER. By inspecting the appointments section of the computer press, it is noted that currently the job titles in use for people involved in application systems development include:Programmer business analystsystems designer chief programmerinformation analyst programmer analystsystems analyst knowledge engineerinformation centre consultantThis multiplicity of job titles is indicative of a job turbulence in the application software development industry.
{"title":"Roots of the job turbulence in information systems (IS) development","authors":"T. Crossman","doi":"10.1145/15472.15474","DOIUrl":"https://doi.org/10.1145/15472.15474","url":null,"abstract":"The job titles given to application systems developers during the early 1970s seldom included anything other than SYSTEMS ANALYST and PROGRAMMER. By inspecting the appointments section of the computer press, it is noted that currently the job titles in use for people involved in application systems development include:Programmer business analystsystems designer chief programmerinformation analyst programmer analystsystems analyst knowledge engineerinformation centre consultantThis multiplicity of job titles is indicative of a job turbulence in the application software development industry.","PeriodicalId":426630,"journal":{"name":"ACM Sigcpr Computer Personnel","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123865522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The 1980's has been described as the "age of communications." With it has come increasing recognition that modern electronic data transmission provides the critical infra-structure for all aspects of today's information-based society. While telecommunications and its component technology, data communications, has existed for over 150 years, it is in recent years that it has enjoyed explosive growth. This has been due to the confluence of powerful technical, economic and political forces, the most prominent among these being the orders of magnitude advances in information processing capacity and the continuing movement toward the deregulation of the electronic communications industry. The final court-ordered divestiture of AT&T in 1984 caused further acceleration of fundamental industry changes already well underway. A measure of the degree of this change is the explosive growth experienced by the telecommunications industry as a whole, which is estimated to have doubled its total annual revenues in the period 1980 to 1885 from $60 billion to $120 billion.[2]
{"title":"Data communication education—who needs it?","authors":"J. Riehl","doi":"10.1145/15472.15475","DOIUrl":"https://doi.org/10.1145/15472.15475","url":null,"abstract":"The 1980's has been described as the \"age of communications.\" With it has come increasing recognition that modern electronic data transmission provides the critical infra-structure for all aspects of today's information-based society. While telecommunications and its component technology, data communications, has existed for over 150 years, it is in recent years that it has enjoyed explosive growth. This has been due to the confluence of powerful technical, economic and political forces, the most prominent among these being the orders of magnitude advances in information processing capacity and the continuing movement toward the deregulation of the electronic communications industry. The final court-ordered divestiture of AT&T in 1984 caused further acceleration of fundamental industry changes already well underway. A measure of the degree of this change is the explosive growth experienced by the telecommunications industry as a whole, which is estimated to have doubled its total annual revenues in the period 1980 to 1885 from $60 billion to $120 billion.[2]","PeriodicalId":426630,"journal":{"name":"ACM Sigcpr Computer Personnel","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120896264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
No matter what the reason for designing an information system in a particular way or acquiring a sysrtem with particular features, there is always a broader rationale which justifies the introduction of new automated information into the workplace. Inevitably, an executive, manager, or user has decided that the organization will be more productive - that is, its ability to get its work done will be enhanced by making new information available to the organization.
{"title":"Information systems for organizational productivity","authors":"G. Akin, D. Hopelain","doi":"10.1145/15472.15473","DOIUrl":"https://doi.org/10.1145/15472.15473","url":null,"abstract":"No matter what the reason for designing an information system in a particular way or acquiring a sysrtem with particular features, there is always a broader rationale which justifies the introduction of new automated information into the workplace. Inevitably, an executive, manager, or user has decided that the organization will be more productive - that is, its ability to get its work done will be enhanced by making new information available to the organization.","PeriodicalId":426630,"journal":{"name":"ACM Sigcpr Computer Personnel","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116759549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The failure of information systems stems not from activities during their implementation but usually because of poor planning in the early stages of systems development (Bostrom and Heinen, 1977; DeBrabander and Thiers, 1984; Robey and Markus, 1984).
信息系统的失败不是源于其实施期间的活动,而通常是因为系统开发早期阶段的规划不良(Bostrom和Heinen, 1977;DeBrabander and Thiers, 1984;Robey and Markus, 1984)。
{"title":"The relationship of cognitive style to the derivation of information requirements","authors":"K. Kaiser","doi":"10.1145/1036374.1036375","DOIUrl":"https://doi.org/10.1145/1036374.1036375","url":null,"abstract":"The failure of information systems stems not from activities during their implementation but usually because of poor planning in the early stages of systems development (Bostrom and Heinen, 1977; DeBrabander and Thiers, 1984; Robey and Markus, 1984).","PeriodicalId":426630,"journal":{"name":"ACM Sigcpr Computer Personnel","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126159762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research investigates executive monitoring of critical success factors (CSF) across selected business strategies. Based on a sample of 124 organizations, the extent, importance, and consistency in executive monitoring are examined, as well as the degree to which differences exist across the four strategy types proposed in the Miles-Snow typology. The study concludes that different monitoring patterns are associated with the various strategy types.
{"title":"Monitoring critical success factors across selected business strategies","authors":"Per V. Jenster","doi":"10.1145/1036374.1036376","DOIUrl":"https://doi.org/10.1145/1036374.1036376","url":null,"abstract":"This research investigates executive monitoring of critical success factors (CSF) across selected business strategies. Based on a sample of 124 organizations, the extent, importance, and consistency in executive monitoring are examined, as well as the degree to which differences exist across the four strategy types proposed in the Miles-Snow typology. The study concludes that different monitoring patterns are associated with the various strategy types.","PeriodicalId":426630,"journal":{"name":"ACM Sigcpr Computer Personnel","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116695171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is still too often the case that Computer-Based Information Systems (CIS) are developed behind schedule, over cost, do not do as much as promised, and do not satisfy their users. After 25 years of experience building these systems, why do these troubles continue to arise? A good part of the answer is that the requirements for these systems were never stated accurately and/or completely in the first place. If the requirement statements are erroneous or incomplete, how can the resulting system be expected to perform satisfactorily? In addition, errors caught or requirements discovered in later phases of the system development process can have very adverse affects on cost targets and meeting time deadlines.
{"title":"Development of computer-based information systems: a communication perspective","authors":"R. Bostrom","doi":"10.1145/1036965.1036967","DOIUrl":"https://doi.org/10.1145/1036965.1036967","url":null,"abstract":"It is still too often the case that Computer-Based Information Systems (CIS) are developed behind schedule, over cost, do not do as much as promised, and do not satisfy their users. After 25 years of experience building these systems, why do these troubles continue to arise? A good part of the answer is that the requirements for these systems were never stated accurately and/or completely in the first place. If the requirement statements are erroneous or incomplete, how can the resulting system be expected to perform satisfactorily? In addition, errors caught or requirements discovered in later phases of the system development process can have very adverse affects on cost targets and meeting time deadlines.","PeriodicalId":426630,"journal":{"name":"ACM Sigcpr Computer Personnel","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1984-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131492180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
White collar crime involving the use of computers is becoming a serious problem in today's business world, with losses estimated in the billions of dollars. In an attempt to combat computerized crime, a company must take into consideration a large number of potential risk areas and combat them with well designed security procedures and control systems. These areas include the computer software systems, the hardware, the physical environment in which the computer resides, the communication systems used by the computer, administrative procedures, and personnel policies. Most of these topics have been discussed in a number of recent journal articles and in computer security texts. One area which has not received the attention which it deserves is the relationship between computer crime and employee management.
{"title":"Security considerations for computer personnel","authors":"Tom Richards, S. Guynes, W. Spence","doi":"10.1145/1036965.1036968","DOIUrl":"https://doi.org/10.1145/1036965.1036968","url":null,"abstract":"White collar crime involving the use of computers is becoming a serious problem in today's business world, with losses estimated in the billions of dollars. In an attempt to combat computerized crime, a company must take into consideration a large number of potential risk areas and combat them with well designed security procedures and control systems. These areas include the computer software systems, the hardware, the physical environment in which the computer resides, the communication systems used by the computer, administrative procedures, and personnel policies. Most of these topics have been discussed in a number of recent journal articles and in computer security texts. One area which has not received the attention which it deserves is the relationship between computer crime and employee management.","PeriodicalId":426630,"journal":{"name":"ACM Sigcpr Computer Personnel","volume":"71 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1984-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131841721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}