scholarly journals A MODEL OF TECHNOLOGICALLY CHOOSING EMPLOYEES IN AN AEROSPACE INDUSTRY PROJECT

2021 ◽  
Vol 1 (161) ◽  
pp. 223-229
Author(s):  
Y. Rachenko ◽  
N. Dotsenko

The challenges of interviewing candidates for positions in cybersecure communications of aerospace industry. Data and experiments conducted as evidence that the improvements to the current model of selecting employees are needed in the real-world applications. A proposal of a newly developed method of selecting job candidates using information technology.

2021 ◽  
Author(s):  
Edward Yourdon

A t the beginning of this paper, the decentralized world (DW) and decentralized world economy (DeWe) were defined. And the blockchain industry was pointed out to be at the initial stage of the decentralized world parallel to the real world. Then a set of systematicsolutions, named Electronical Material Information Technology (EMIT), was proposed, after which the development direction and path of the decentralized world economy was put forward, from its limitations, by arguing how to provide sufficient and necessary basic conditions for the decentralized world development. In the end, the EMIT was proved to be an effective reference for building the decentralized world from the basic level to the application level and enabling its sustainable development.


Author(s):  
Michael Suk-Young Chwe

This chapter examines African American folktales that teach the importance of strategic thinking and argues that they informed the tactics of the 1960s civil rights movement. It analyzes a number of stories where characters who do not think strategically are mocked and punished by events while revered figures skillfully anticipate others' future actions. It starts with the tale of a new slave who asks his master why he does nothing while the slave has to work all the time, even as he demonstrates his own strategic understanding. It then considers the tale of Brer Rabbit and the Tar Baby, along with “Malitis,” which tackles the problem of how the slaves could keep the meat and eat it openly. These and other folktales teach how inferiors can exploit the cluelessness of status-obsessed superiors, a strategy that can come in handy. The chapter also discusses the real-world applications of these folktales' insights.


Author(s):  
Xiaotong Li

Many information resource managers have learned to be proactive in today’s highly competitive business environment. However, limited financial resources and many uncertainties require them to maximize their shareholders’ equity while controlling the risks incurred at an acceptable level. As the unprecedented development in information technology continuously produces great opportunities that are usually associated with significant uncertainties, technology adoption and planning become more and more crucial to companies in the information era. In this study, we attempt to evaluate IT investment opportunities from a new perspective, namely, the real options theory. Its advantage over other capital budgeting methods like static discounted cash flow analysis has been widely recognized in analyzing the strategic investment decision under uncertainties (Amram & Kulatilaka, 1999; Luehrman, 1998a, 1998b). Smith and McCardle (1998, 1999) further show that option pricing approach can be integrated into standard decision analysis framework to get the best of the both worlds. In fact, some previous IS researches have recognized the fact that many IT investment projects in the uncertain world possess some option-like characteristics (Clemsons, 1991; Dos Santos, 1991; Kumar, 1996). Recently, Benaroth and Kauffman (1999) and Taudes, Feurstein and Mild (2000) have applied the real options theory to real-world business cases and evaluated this approach’s merits as a tool for IT investment planning. As all real options models inevitably depend on some specific assumptions, their appropriateness should be scrutinized under different scenarios. This study aims to provide a framework that will help IS researchers to better understand the real options models and to apply them more rigorously in IT investment evaluation. As the technology changes, the basic economic principles underlying the real options theory do not change. We do need to integrate the IT dimension into the real options based investment decision-making process. Using electronic brokerage’s investment decision in wireless technology as a real-world example, we show the importance of adopting appropriate real options models in IT investment planning. By specifically focusing on the uncertainties caused by IT innovation and competition, our study also gives some intriguing results about the dynamics between IT adoption and the technology standard setting process.


Author(s):  
Suzanne Tsacoumis

High fidelity measures have proven to be powerful tools for measuring a broad range of competencies and their validity is well documented. However, their high-touch nature is often a deterrent to their use due to the cost and time required to develop and implement them. In addition, given the increased reliance on technology to screen and evaluate job candidates, organizations are continuing to search for more efficient ways to gather the information they need about one's capabilities. This chapter describes how innovative, interactive rich-media simulations that incorporate branching technology have been used in several real-world applications. The main focus is on describing the nature of these assessments and highlighting potential solutions to the unique measurement challenges associated with these types of assessments.


2017 ◽  
Vol 1 (2) ◽  
pp. 76-90 ◽  
Author(s):  
Jassim Happa ◽  
Michael Goldsmith

Purpose Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may lack insight about minor variations about attacks that are observed in the real world (but are not described in the model). This may lead to similar attacks being classified as the same type of attack, or in some cases the same instance of attack. The appropriate solution would be to modify the model or replace it entirely. However, doing so may be undesirable as the model may work well for most cases or time and resource constraints may factor in as well. This paper aims to explore the potential value of adding information about attacks and attackers to existing models. Design/methodology/approach This paper investigates used cases of minor variations in attacks and how it may and may not be appropriate to communicate subtle differences in existing attack models through the use of annotations. In particular, the authors investigate commonalities across a range of existing models and identify where and how annotations may be helpful. Findings The authors propose that nuances (of attack properties) can be appended as annotations to existing attack models. Using annotations appropriately should enable analysts and researchers to express subtle but important variations in attacks that may not fit the model currently being used. Research limitations/implications This work only demonstrated a few simple, generic examples. In the future, the authors intend to investigate how this annotation approach can be extended further. Particularly, they intend to explore how annotations can be created computationally; the authors wish to obtain feedback from security analysts through interviews, identify where potential biases may arise and identify other real-world applications. Originality/value The value of this paper is that the authors demonstrate how annotations may help analysts communicate and ask better questions during identification of unknown aspects of attacks faster,e.g. as a means of storing mental notes in a structured manner, especially while facing zero-day attacks when information is incomplete.


2014 ◽  
Vol 1 (2) ◽  
pp. 236
Author(s):  
Kulakov ◽  
Smirnov ◽  
Lipatov ◽  
Latipov

Author(s):  
Viet Bui ◽  
Trung Pham ◽  
Huy Nguyen ◽  
Hoang Nhi Tran Gia ◽  
Tauheed Khan Mohd

Author(s):  
Shreyasi Pranjal

Work-life balance refl ects an individual’s orientation across career roles and non-carrier life roles as an incompatible inter-role phenomenon. In the transition to an information-based global economy, the lines between work and home are blurring as technology reshapes the work place and the nature of home life evolves. Information technology (IT) has become a vital and integral part of every individual’s life. From a teenager who loves technologically advanced cum latest gadgets and an adult who is addicted of using cloud-computing technology as for data’s storing. The reasons for the omnipresent use of computer technology in the real world can best be determined by looking at how it is being used across the real world. Role of IT in balancing work-life is all about delivering ease, effi ciency and maintaining individual’s healthy environment. There are numerous roles of IT which makes us integrally prominent, smart and active, and makes an effective aura in between work-life. Role of IT in work-life balance has been an electrifying current investigation subject from the recent years; the purpose of the research role of IT in work-life balance shows the how IT makes individuals life convenient, promising, stressless, and relatively safe.


Sign in / Sign up

Export Citation Format

Share Document