Arthur M. Langer - Academia.edu (original) (raw)
Uploads
Papers by Arthur M. Langer
The purpose of this study was to select an institution that has mandated mentoring as part of its... more The purpose of this study was to select an institution that has mandated mentoring as part of its mission and to examine students' perceptions of the mentoring they received. The study selected Empire State College (ESC), a college that is part of the State of New York University system in the USA. ESC is an institution with a 36-year history of mentoring of nontraditional students. The current study represents a follow-up to a prior study that examined the faculty's denitions and theories of mentoring at the same institution. The results of the current study showed that there are signicant dierences in student alumni perceptions of and experience with mentoring at ESC across a spectrum of gender, race, eld of study, and age. note: This module has been peer-reviewed, accepted, and sanctioned by the National Council of Professors of Educational Administration (NCPEA) as a scholarly contribution to the knowledge base in educational administration. Purpose and Scope of the Study This article will explore how nontraditional undergraduate students 1 perceive the impact of mentoring at Empire State College (ESC) of the State University of New York (SUNY), USA, an institution that has mandated mentoring as part of its mission since 1972. This research is based on the results of a study conducted by interviewing and surveying students at three ESC campuses about their experience with the mentoring program. More specically, this study analyzed student responses to understand how they perceive the value of such mentoring. The study explored the following research questions: 1) How do students rate their experiences with the mentoring process? 2) How do students perceive the objectives of mentoring? 3) How do students dene and describe the roles of their mentors? and 4) What do students value most about mentoring? This study also addressed questions raised by previous research on ESC as to whether the traditional mentoring models presented in the much of the literature are eective for the needs of new and future
Accounting, Management and Information Technologies, 2000
This paper reviews and assesses the emerging research literature on information technology and or... more This paper reviews and assesses the emerging research literature on information technology and organizational learning. After discussing issues of meaning and measurement, we identify and assess two main streams of research: studies that apply organizational learning concepts to the process of implementing and using information technology in organizations; and studies concerned with the design of information technology applications to support organizational learning. From the former stream of research, we conclude that experience plays an important, yet indeterminate role in implementation success; learning is accomplished through both formal training and participation in practice; organizational knowledge barriers may be overcome by learning from other organizations; and that learning new technologies is a dynamic process characterized by relatively narrow windows of opportunity. From the latter stream, we conclude that conceptual designs for organizational memory information systems are a valuable contribution to artifact development; learning is enhanced through systems that support communication and discourse; and that information technologies have the potential to both enable and disable organizational learning. Currently, these two streams flow independently of each other, despite their close conceptual and practical links. We advise that future research on information technology and organizational learning proceeds in a more integrated fashion, recognizes the situated nature of organizational learning, focuses on distributed organizational memory, demonstrates the effectiveness of artifacts in practice, and looks for relevant research findings in related fields.
As discussed in Chap. 1, quantum computing while not yet scalable has the potential to change the... more As discussed in Chap. 1, quantum computing while not yet scalable has the potential to change the processing capabilities of computing especially for ML and AI processing.
Analysis and Design of Information Systems
Analysis and Design of Information Systems
The most effective way to protect information and information systems is to integrate security in... more The most effective way to protect information and information systems is to integrate security into every step of the system development process, from the initiation of a project to develop a system to its disposition. The multistep process that starts with the initiation, analysis, design, and implementation, and continues through the maintenance and disposal of the system, is called the System Development Life Cycle (SDLC). The Information Technology Laboratory of the National Institute of Standards and Technology (NIST) recently updated its general guide that helps organizations plan for and implement security throughout the SDLC. The revised guide provides basic information about the comprehensive approach that NIST has developed for managing risks to systems and for providing the appropriate levels of information security based on the levels of risk. Federal agencies are directed to incorporate security controls and services into the SDLC under the Federal Information Security Management Act (FISMA) and Office of Management and Budget (OMB) Circular A-130, Appendix III.
While 5G is the initiator of possibilities to bring forth the next generation of computing, the I... more While 5G is the initiator of possibilities to bring forth the next generation of computing, the Internet of Things (IoT) represents the actual devices that will be the vehicle for its success. For it is IoT that represents the physical components that will make a technology feasible by placing intermediate smart hardware in every place imaginable around the globe.
Information Technology and Organizational Learning
Analysis and Design of Next-Generation Software Architectures
This chapter outlines the process of interfacing new mobile-based system with preexisting applica... more This chapter outlines the process of interfacing new mobile-based system with preexisting applications called legacies. Issues of product fulfillment, connectivity of legacy databases and processes, and integration of multiple systems architecture are covered. This chapter combines many of the suggested approaches to user interface and application specifications development that are covered in previous chapters. The objective of the chapter is to also provide a detailed pathway to ultimately converting legacy systems.
Guide to Software Development
The purpose of this book was to provide a roadmap for the reader on the processes and considerati... more The purpose of this book was to provide a roadmap for the reader on the processes and considerations for building new computer architectures to support the emerging consumer market. Many of us believe that the advent of 5G will be a major technical development that will dramatically accelerate the way businesses and individuals use and depend on digital technologies.
Guide to Software Development
Once vendors have been selected, organizations need to have contracts that protect their corporat... more Once vendors have been selected, organizations need to have contracts that protect their corporate interests while at the same time are fair to the vendors. Vendors typically have standard contracts or skeleton agreements for organizations to work from, but there are significant issues that must be covered such as indemnity, access to source code, a process of communication if there are problems, warrantees and guarantees, and support. The purpose of this chapter is to provide guidance on the relevant stages, considerations, and content of the contract agreement. In this context, it is important that both the buyer and seller feel protected. The question really becomes how to provide an agreement where both sides feel it is fair.
Guide to Software Development, 2016
The purpose of this study was to select an institution that has mandated mentoring as part of its... more The purpose of this study was to select an institution that has mandated mentoring as part of its mission and to examine students' perceptions of the mentoring they received. The study selected Empire State College (ESC), a college that is part of the State of New York University system in the USA. ESC is an institution with a 36-year history of mentoring of nontraditional students. The current study represents a follow-up to a prior study that examined the faculty's denitions and theories of mentoring at the same institution. The results of the current study showed that there are signicant dierences in student alumni perceptions of and experience with mentoring at ESC across a spectrum of gender, race, eld of study, and age. note: This module has been peer-reviewed, accepted, and sanctioned by the National Council of Professors of Educational Administration (NCPEA) as a scholarly contribution to the knowledge base in educational administration. Purpose and Scope of the Study This article will explore how nontraditional undergraduate students 1 perceive the impact of mentoring at Empire State College (ESC) of the State University of New York (SUNY), USA, an institution that has mandated mentoring as part of its mission since 1972. This research is based on the results of a study conducted by interviewing and surveying students at three ESC campuses about their experience with the mentoring program. More specically, this study analyzed student responses to understand how they perceive the value of such mentoring. The study explored the following research questions: 1) How do students rate their experiences with the mentoring process? 2) How do students perceive the objectives of mentoring? 3) How do students dene and describe the roles of their mentors? and 4) What do students value most about mentoring? This study also addressed questions raised by previous research on ESC as to whether the traditional mentoring models presented in the much of the literature are eective for the needs of new and future
Accounting, Management and Information Technologies, 2000
This paper reviews and assesses the emerging research literature on information technology and or... more This paper reviews and assesses the emerging research literature on information technology and organizational learning. After discussing issues of meaning and measurement, we identify and assess two main streams of research: studies that apply organizational learning concepts to the process of implementing and using information technology in organizations; and studies concerned with the design of information technology applications to support organizational learning. From the former stream of research, we conclude that experience plays an important, yet indeterminate role in implementation success; learning is accomplished through both formal training and participation in practice; organizational knowledge barriers may be overcome by learning from other organizations; and that learning new technologies is a dynamic process characterized by relatively narrow windows of opportunity. From the latter stream, we conclude that conceptual designs for organizational memory information systems are a valuable contribution to artifact development; learning is enhanced through systems that support communication and discourse; and that information technologies have the potential to both enable and disable organizational learning. Currently, these two streams flow independently of each other, despite their close conceptual and practical links. We advise that future research on information technology and organizational learning proceeds in a more integrated fashion, recognizes the situated nature of organizational learning, focuses on distributed organizational memory, demonstrates the effectiveness of artifacts in practice, and looks for relevant research findings in related fields.
As discussed in Chap. 1, quantum computing while not yet scalable has the potential to change the... more As discussed in Chap. 1, quantum computing while not yet scalable has the potential to change the processing capabilities of computing especially for ML and AI processing.
Analysis and Design of Information Systems
Analysis and Design of Information Systems
The most effective way to protect information and information systems is to integrate security in... more The most effective way to protect information and information systems is to integrate security into every step of the system development process, from the initiation of a project to develop a system to its disposition. The multistep process that starts with the initiation, analysis, design, and implementation, and continues through the maintenance and disposal of the system, is called the System Development Life Cycle (SDLC). The Information Technology Laboratory of the National Institute of Standards and Technology (NIST) recently updated its general guide that helps organizations plan for and implement security throughout the SDLC. The revised guide provides basic information about the comprehensive approach that NIST has developed for managing risks to systems and for providing the appropriate levels of information security based on the levels of risk. Federal agencies are directed to incorporate security controls and services into the SDLC under the Federal Information Security Management Act (FISMA) and Office of Management and Budget (OMB) Circular A-130, Appendix III.
While 5G is the initiator of possibilities to bring forth the next generation of computing, the I... more While 5G is the initiator of possibilities to bring forth the next generation of computing, the Internet of Things (IoT) represents the actual devices that will be the vehicle for its success. For it is IoT that represents the physical components that will make a technology feasible by placing intermediate smart hardware in every place imaginable around the globe.
Information Technology and Organizational Learning
Analysis and Design of Next-Generation Software Architectures
This chapter outlines the process of interfacing new mobile-based system with preexisting applica... more This chapter outlines the process of interfacing new mobile-based system with preexisting applications called legacies. Issues of product fulfillment, connectivity of legacy databases and processes, and integration of multiple systems architecture are covered. This chapter combines many of the suggested approaches to user interface and application specifications development that are covered in previous chapters. The objective of the chapter is to also provide a detailed pathway to ultimately converting legacy systems.
Guide to Software Development
The purpose of this book was to provide a roadmap for the reader on the processes and considerati... more The purpose of this book was to provide a roadmap for the reader on the processes and considerations for building new computer architectures to support the emerging consumer market. Many of us believe that the advent of 5G will be a major technical development that will dramatically accelerate the way businesses and individuals use and depend on digital technologies.
Guide to Software Development
Once vendors have been selected, organizations need to have contracts that protect their corporat... more Once vendors have been selected, organizations need to have contracts that protect their corporate interests while at the same time are fair to the vendors. Vendors typically have standard contracts or skeleton agreements for organizations to work from, but there are significant issues that must be covered such as indemnity, access to source code, a process of communication if there are problems, warrantees and guarantees, and support. The purpose of this chapter is to provide guidance on the relevant stages, considerations, and content of the contract agreement. In this context, it is important that both the buyer and seller feel protected. The question really becomes how to provide an agreement where both sides feel it is fair.
Guide to Software Development, 2016