- citati u SCIndeksu: [3]
- citati u CrossRef-u:[3]
- citati u Google Scholaru:[
]
- posete u poslednjih 30 dana:7
- preuzimanja u poslednjih 30 dana:6
|
|
2016, vol. 71, br. 4, str. 644-647
|
Kako kreirati obuke za zaposlene u IT industriji?
How to create training for the IT industry's staffs?
Subotica
Sažetak
IT industrija je dinamično okruženje koje brzo raste i razvija se. Smatramo da je strateški dobar potez ulagati u domaće IT kapacitete i pospešivati mlade stručnjake da razvijaju svoje biznise koji su neretko konkurentni i na zapadnom tržištu - i to ovde, u Srbiji. Ulaganja u IT resurse su prilično mala s obzirom na novac koji može da se vrati kroz takvu vrstu poslovanja. Međutim, da bi ta grana privrede funkcionisala na konkurentnom nivou - potrebno je da zaposleni poseduju određenja znanja i veštine, te da se konstantno edukuju i obučavaju. U ovom članku, nameravamo da prodiskutujemo značaj dobrih ljudskih resursa u IT industriji kao i vidove njihove obuke i kontsantnog stručnog usavršavanja.
Abstract
The IT industry is a dynamic environment with the wide-spreading and well-developing characteristics. We would consider that the investment into IT industry could get a strategically good movement. We also believe that Serbia got the entire pool of talents regarding the IT sector and those people should get used well as they got competitive internationally. The investment into IT resources got quite small in comparison with its returns. The competitiveness of this branch of commerce could get guaranteed only if employees continuingly follow the trends overseas. In this article, we intend to discuss the significance of good human resources within the IT industry as well as the ways of their continuing professional education.
|
|
|
Reference
|
|
*** (2008) RFID security. Government of the Hong Kong Special Administrative Region, Dostupno na http://www.infosec.gov.hk/english/technical/files/rfid.pdf
|
|
*** (2004) CRS report for congress: Critical infrastructure and key assets: Definition and identification. Dostupno na https://www.fas.org/sgp/crs/RL32631. Pdf
|
4
|
Ablon, L., Libicki, M.C., Golay, A. (2014) Markets for Cybercrime Tools and Stolen Data. Sponsored by Juniper Networks, Dostupno na http://www.rand.org/content/dam/rand/pubs/research_reports/RR6 00/RR610/RAND_RR610.pdf
|
3
|
Beaver, K., Davis, P. (2005) Hacking Wireless Networks for Dummies. Wiley Publishing, https://cdn.preterhuman.net/texts/underground/hacki ng/Hacking_Wireless_Networks_For_Dummies_20 05.pdf
|
1
|
Bergman, M. (2000) The Deep Web: Surfacing Hidden Value. White paper, Dostupno na http://jornalggn.com.br/sites/default/files/documentos/2011_ bergman_7_cafarella_informationretrieval_presentat ion1_2.pdf
|
4
|
Chaliand, G., Blin, A. (2007) The History of Terrorism. University of California Press, https://wikileaks.org/gifiles/attach/177/177597_Hist ory%20of%20Ter.pdf
|
4
|
Charney, S. (2009) Rethinking the cyber threat: A framework and path forward. Microsoft
|
3
|
Đekić, M.D. (2016) Cyber procedure za poslovno okruženje u Srbiji. Tehnika, vol. 71, br. 3, str. 471-474
|
5
|
Đekić, M.D. (2015) Kako sačuvati kontinuitet u poslovanju uprkos cyber incidentima?. Tehnika, vol. 70, br. 2, str. 346-349
|
|
James, P., Jenson, M., Tinsley, H. (2015) Understanding the Threat: What Data Tell Us about U. S. Foreign Fighters. START, Dostupno na https://www.- start.umd.edu/publication/understanding-threatwhat-data-tell-us-about-us-foreign-fighters
|
2
|
Mester, G. (2009) Intelligent mobile robot control in unknown environments. u: Intelligent Engineering Systems and Computational Cybernetics: Intelligent Robotics, Library of Congress, Part I
|
3
|
Payne, S.P. (2007) A guide to security metrics. SANS Institute, Dostupno na https://www.sans.org/-reading-room/whitepapers/auditing/guide-securitymetrics-55
|
1
|
Ponemon Institute LLC (2015) 2015 cost of data breach study: Global analysis. Ponemon Institute Research Report, Dostupno na https://nhlearningsolutions. com/Portals/0/Documents/2015-Cost-of-Data-Breach-Study.PDF
|
|
Puhe, M., Edelmann, M., Reichenbach, M. (2014) Integrated urban e-ticketing for public transport and touristic sites, Final report, Science and Technology Options Assessment. Dostupno na: http://www.europarl.europa.eu/RegData/etudes/etudes/join/2014/513%20551/IPOL-JOIN_ET(2014)513551_EN.pdf
|
4
|
Symantec (2016) Internet security threat report. Dostupno na https://www.symantec.com/content/-dam/symantec/docs/reports/istr-21-2016-en.pdf
|
|
Weine, S., Ellis, B.H. (2015) Lessons Learned from Mental Health and Education: Identifying Best Practices for Addressing Violent Extremism. START, , Dostupno na https: //www. start. umd. edu/-pubs/START_LessonsLearnedfromMentalHealthAn dEducation_FullReport_Oct2015. pdf
|
|
Weine, S., Ellis, B. (2015) H,porting A Multidisciplinary Approach to Addressing Violent Extremism. START, , Dostupno na https: //www. start. umd. edu/pubs/START_LessonsLearnedfromMentalHealthAndEducation_MentalHealthSummary_Oct2015. pdf
|
|
|
|