{"title":"Business schools seen improving DP curricula","authors":"J. Couger","doi":"10.1145/1017625.1017629","DOIUrl":"https://doi.org/10.1145/1017625.1017629","url":null,"abstract":"A significant change in philosophy concerning compute r use in U .S . Schools of Business has transpired over the pas t five years . The writer's original study, Computers and th e Schools of Business (1967), described the approach of 1 1 progressive schools which had implemented four phases o f computer curriculum . A survey last year revealed that the four phase curriculu m has been implemented in the majority of the 139 member s of the American Association of Collegiate Schools of Business . A recent study by Professor Roger Gupta (Kent Stat e University) shows that the majority of the other U .S . schools now require an introductory course in data processing — phase one of the four phase cur r iculum . Yet the significant change is not the spread of compute r curriculum from a few progressive schools to the majorit y of the 600 U .S . Schools of Business in the brief, five yea r span of time . The significant change is the way in which the compute r is being used . Five years ago it was used primarily as a problem solver — on rather trivial problems . It was als o used for faculty research . During the next few years it con -","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116204200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of \"A Handbook for Orienting The Manager To The Computer, by Frederick G. Harold.\" Auerback Publishers, Inc., 1971","authors":"T. C. Willoughby","doi":"10.1145/1017536.1017543","DOIUrl":"https://doi.org/10.1145/1017536.1017543","url":null,"abstract":"","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121981174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer security: a survey","authors":"Peter S. Browne","doi":"10.1145/1017536.1017537","DOIUrl":"https://doi.org/10.1145/1017536.1017537","url":null,"abstract":"","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125002971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The internal financial management aspects of MIS: closing the MIS creditability gap","authors":"James M. Spitze","doi":"10.1145/1017536.1017540","DOIUrl":"https://doi.org/10.1145/1017536.1017540","url":null,"abstract":"When a . senior financial officer reviews his company's annual budget, he is often confronted with an \"EDP\" expense item of uncomfortable proportions . Is it too big . . . or too small? Is it being spent wisely . . . or wasted? It is th e purpose of this paper to outline a reliable methodolog y for answering these questions and, by so doing, help t o close the credibility gap frequently noted as existing, an d possibly growing, between EDP management and senio r general management .","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"32 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114028050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accreditation: what it is. who does it? How it is done","authors":"Virginia Goddard Mervel, Thomas E. Murray","doi":"10.1145/2579424.2579429","DOIUrl":"https://doi.org/10.1145/2579424.2579429","url":null,"abstract":"","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133588246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation and management of information services","authors":"H. Lucas","doi":"10.1145/2579424.2579426","DOIUrl":"https://doi.org/10.1145/2579424.2579426","url":null,"abstract":"Performance evaluation techniques can contribute substantially to the successful management of the information services function. Three major purposes for performance evaluation in a typical commercially oriented computer installation are discussed including the acquisition of new hardware and software, the improvement of existing computer operations, and the improvement of the systems design process. The most suitable of the various techniques for performance evaluation are discussed for each major purpose. A proposal is also made for extending performance evaluation beyond the hardware and software system to encompass the user.","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125612255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data base recovery with IMS/360","authors":"W. P. Grafton","doi":"10.1145/2579424.2579428","DOIUrl":"https://doi.org/10.1145/2579424.2579428","url":null,"abstract":"","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122971292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of \"Human Factors Design Handbook, by Wesley E. Woodson.\" McGraw-Hill, 1981","authors":"B. Ives","doi":"10.1145/1017692.1017699","DOIUrl":"https://doi.org/10.1145/1017692.1017699","url":null,"abstract":"of a cohesive group dedicated to a single objective — shipment of the first Eagle. Technically, the book will meet with mixed reviews. System programmers and hardware designers may view Kid-der's many technical discussions as oversimplifications , while the technological neophyte will wonder why the boo k includes uninteresting digressions into microcode, simulation , diagnostics and so on. However, for those of us jus t downriver from hardware design, Kidder ' s technical discussions provide an easy-to-read tutorial on important subjects we might not otherwise explore. The book also reveals an interesting ethical issue involving the low-cost strategies Data General employed to motivate this relatively naive project team. Increasingly, productivity has become an important watchword, both fo r our industry and the country, but do the methods Kidde r describes exceed socially acceptable limits? Has Data General ' s management maliciously manipulated its inexperienced stars in exchange for a year of grueling work , restricted social lives and little or no financial reward fo r the heroic effort? Or perhaps, we are seeing computer en-gineerings' equivalent to the medical student's internship , the Ph .D .'s dissertation or the would-be public accountant' s two-year servitude as an auditor. Manipulation or initia-tion? It depends, I suppose, upon the privileges afforded t o an accepted member of the club. Kidder ' s book will be read by managers, many of who m will adopt as their own some of the project managemen t strategies described therein. But I hope the book also find s an audience in our schools of engineering and compute r science. No one who reads the book will innocently becom e a \"Hardy Boy \" or \"micro kid. \" The subtitle of this book is Information and Guidelines for the Design of Systems, Facilities, Equipment and Product s for Human Use. As the title suggests, the book is a monster. In more than 1,000 pages with nearly 500 illustrations , Woodson has produced a monumental work that focuses o n human-oriented design. The term \"design \" is used here in its fullest meaning. Included are human-factors considerations related to th e design of, among other things, transportation, architecture , military, communications and industrial systems. Unlik e other human-factor references, this work \". .. is directe d toward the engineer or designer, as opposed to being directed primarily toward the human-factor specialist. \" The book contains a wealth of …","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130554519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of \"Structured Requirements Definition, by Ken Orr.\" Ken Orr and Associates, Inc.","authors":"B. Ives","doi":"10.1145/1017692.1017700","DOIUrl":"https://doi.org/10.1145/1017692.1017700","url":null,"abstract":"tors design will require a \"minimum of two percent of th e total program cost .\" This is a small price to pay if the process produces appropriate user interfaces . Chapter 5 also discusses the process of \"function allocation.\" Here Woodson presents a strategy for allocating system functions between people and machines . Although hi s examples here, and elsewhere in the chapter, focus on military systems, the methodology can be generalized for an y system-development project . Although the Human Factors Design Handbook ha s rather limited applicability to the design of computer systems, I still find its pages becoming more tattered than mos t of the books on my bookshelf. The book, like the Guinness Book of Records and Bartlett 's Familiar Quotations, is fun to just open to any page and start reading .","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"155 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128710621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of \"The Information Systems Handbook, by F. Warren McFarlan and Richard L. Nolan.\" Dow Jones-Irwin, Inc.","authors":"J. Gorgone","doi":"10.1145/1017634.1017636","DOIUrl":"https://doi.org/10.1145/1017634.1017636","url":null,"abstract":"","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123050570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}