Synopsis: Ict: Computing:


MIT_embracing_digital_technology_a_new_strategic_imperative_2013.pdf

Lori Beer, executive vice president of information technology and specialty business at Wellpoint, the nation's largest Blue Cross/Blue Shield licensee, said that i t's not like we're a consumer Rated D for digital Most

very beginning of this next generation of computing, and I think that every industry leader will be the ones that transform first.


National Strategy on Digital Agenda for Romania.pdf

37 2. 2 Cyber security Information systems and networks Security...45 2. 2. 1 Introduction...45 2. 2. 2 European context...

In terms of funding, as it is mentioned in the Romanian Partnership Agreement for the 2014-2020 programming period,

The order of decisions for investment in information systems is: Buy, Customize, Build. This means that generally, an entity will first look for already existing solutions that satisfy the needs of their customers,

the costs for development and the time to deployment. 4. Formulate legislation to support the initiatives This document acknowledges that there may exist some gaps in legislation pertaining to the use, operation or maintenance of information systems.

Entities should secure funding for the investment for a period up to 5 years for all recurrent costs of that investment objective (including initial investment, maintenance, upgrades etc..

but mainly, egovernment should mean the transformational approach enabled by the use of information technology to offer better public services by the government,

. While there have many major steps in Romania in the later years in Romania (from access perspective as well as implementing major information systems), the majority of initiatives faced challenges in terms of adoption, quality, legislation and uniformity.

All public bodies will adhere to this Line Action 2. 2 CYBER SECURITY INFORMATION SYSTEMS AND NETWORKS SECURITY 2. 2. 1 Introduction Preamble Trust and security in public services is national priority for the Romanian government

The Strategy is accompanied by the technical legislative proposal by the European commission's Directorate General Connect to strengthen the security of information systems in the EU

In fighting against cyberattacks on the information systems Member States must amend the existing criminal law on attacks against information systems.

The main purpose is to provide greater authority to the European legislation on cybercrime. The initiative will improve the security of citizens and businesses,

as information systems repair costs are very high. At the national level, it will provide points of contact for complaints

analyze, identify and respond to cyber security incidents of information systems. Developing cooperation between the public and private sectors in order to ensure cyber security represents a priority for action at the national level,

Operative Council for Cyber security (COSC) Development of educational programs (Enabler) Educational programs in the forms of compulsory education on the safe use of the Internet and computing equipment Responsible:

Enabling rapid and cost-effective procurement of information systems/services for all state agencies Eliminating the duplication of effort Reducing risk management costs Cloud computing Definition Cloud computing relies on sharing of resources to achieve coherence and economies of scale

services Shifting IT investments to more efficient computing platforms Ability to use shared applications for common Government functions (ERP, HR, SCM, GIS etc.)

computing and storage environments The IT infrastructure within the cloud that is faster, more secure, and continually refreshed with the latest application versions

Strengthening and diversifying the unique integrated health information system Upgrading and consolidation of nomenclatures (classification of diseases groupings etc.

in information technology overall the turnover of enterprises with TIC main activity(%)24.8%30.5%Share of the turnover of enterprises with main activity of telecommunication overall

of turnover of enterprises with main activity of editing software products and service activities in information technology overall the turnover of economic activity(%)1. 0%1. 1%Source:

General Directorate of Protection of People with Disabilities Programming a medical consult in a hospital 1. Choosing typology hospital as needed 2. Verification of availability 3. Programming 4. Receiving confirmation 1

a series of information systems need to be created. These will act as the knowledge base for the committee

The first system is the National Register for Information systems (NRIS which will hold general and specific information pertaining to information systems in Romania (Authority, Description, Funding, Technical Components, Supplier, Integrations with other systems, Lifecycle status, Exceptions etc..

This system needs to be integrated fully and automated with the e-Procurement system and needs to make its data available to the general public and to other public entities.


national_smart_specialisation_strategy_en.pdf

development and innovation and encouraging the socioeconomic exploitation of the results thereof as priorities in the 2014-2020 programming period.

High level of ICT infrastructure, basic computer network infrastructure for research purposes, outstanding high-performance computing (HPC) capacity

as well as the delegates of the relevant managing authorities of the 2014-20 programming period. Its priority task is to harmonise the planning of S3 and the Operational Programmes.

EMMI, FM, KKM MTA), including the delegates of the managing authorities concerned in the 2014-2020 programming period.

The chart below shows the four important steps of the programming cycle: 1. Design of the intervention (e g.,


NESTA Digital Social Innovation report.pdf

Their computing power can now then be used to store and analyse medical information, sensor and environmental data,

By centralising computing, data storage and service provision (via the Cloud), and by striking strategic alliances between the largest Over-The-Top (OTT) iand largest network operators, there is a risk that the innovation ecosystem will become more closed,

Its objective is to teach the high-level abstraction of programming as a sequence of instructions to young children in schools

Growing a Digital Social Innovation Ecosystem for Europe 59 (Digital) Social Innovation FI-PPP and computing Collective awareness platforms (collective intelligence) CENTRALISED

as well as access to computing resources). Any privileged access provided to the owner/managers of the infrastructure would alter free competition.

(which includes Linked Data54 and SPARQL end-points55). Opening up access to an application's source code exposes that code to a relatively large number of developers,

subjecting it to rigorous critical inquiry of a pool of reviewers larger than the one proprietary developers have available to them internally.

topic-filters=11379 RESINDEX http://www. sinnergiak. org/wp-content/uploads/2014/06/cuaderno resindex cast. pdf http://www. sinnergiak. org/index. php/resindex

A Faster Algorithm for Betweenness Centrality, Journal of Mathematical Sociology 25 (2): 163-177. Clauset, A. et al.

and make products that can make a difference to their world',19 http://www. bmbf. de/en/19955. php about-city-budgets-heres

-sparql-query/56 http://www. theopeninter. net/57 http://en. wikipedia. org/wiki/Dataportability 58 http://www. w3. org/Social

http://www. nesta. org. uk/publications/standards-evidence-impact-investing 79 http://www. wikiprogress. org/index. php/Event:


new_technology_mobile.pdf

Education and Information technologies, 12 (2), 59-70. Herrington, A. 2008. Adult educators'authentic use of smartphones to create digital teaching resources.

Journal of Computing in Higher education, 16 (2), 97-116. Reimann, P, . & Goodyear, P. 2004).


NHS Prescription Services - the impace of legacy ICT - National Audit Office UK 2013.pdf

is composed of the Mcdonnell douglas Information system (MDIS) which provides the operator terminals and the Sun Pricing system (SPS)

and then automatically used by the systems. 4. 28 The CIP system has an inbuilt business rule processing engine based on Java technology.

and fully supported with plans in place for future upgrade. Performance. The availability and performance of the legacy system is captured as part of service performance measurement.


OECD _ ICT, E-BUSINESS AND SMEs_2004.pdf

OECD (2002), Guidelines for the Security of Information systems and Networks: Towards a Culture of Security;

E-commerce maintenance and upgrades can be very costly, especially when firms prefer a highly sophisticated virtual shop.

Web site maintenance and 22 upgrades may increase over time as the volume of on-line transactions grows,

High levels of concern about on-line security, changes in technologies and the overall on-line environment are reflected in the 2002 OECD Guidelines for the Security of Information systems and Networks:

Towards a Culture of Security, a revision of the 1992 OECD Guidelines on Security of Information systems.

NET site (www. ause. net) and ebiz. enable site (www. strategis. ic. gc. ca/sc indps/ebiz/engdoc/homepage. php.

Langdon, S. 2001), The Influence of Information technology on the Growth of the Microbusiness, paper presented at the 24th ISBA National Small Firms Policy and Research Conference.

Information technology, Innovation and Entrepreneurship, OECD, Paris. OECD (2001b), Broadband Infrastructure Deployment: the Role of Government Assistance, OECD, Paris. OECD (2001c), The Development of Broadband Access in OECD Countries, DSTI/ICCP/TISP (2001) 2/FINAL, OECD, Paris

Summary, DSTI/ICCP/IE (2002) 5/FINAL, OECD, Paris. OECD (2002b), Information technology Outlook 2002, OECD, Paris. OECD (2002c), Measuring the Information Economy

progress report, DSTI/IND/PME (2002) 7/ANN/FINAL, OECD, Paris. OECD (2002e), Guidelines for the Security of Information systems and Networks:

Scally, T.,M. Stansfield and K. Grant (2001), An Investigation into the Use of the Internet and E-business among SMES in Lanarkshire, Computing and Information systems, Vol. 8, pp. 58-66.


Online services, including e-commerce, in the Single Market.pdf

The use of the Internal Market Information system (IMI) for Article 19 ECD could also be explored. 3. 3 Need for better enforcement of the ECD Under the co-ordination of Commission services,

http://legalis. net/spip. php? page=jurisprudencedecision&id article=3001#.90 Hamburg Regional Court, 03.09.2010, ref. no. 308 O 27/09;

http://www. legalis. net/spip. php? page=jurisprudencedecision&id article=2354 93 Paris Civil Court, 13.05.2009; available at:

http://www. legalis. net/spip. php? page=jurisprudencedecision&id article=2639 29 In the ebay vs. Maceo case94, the Paris Civil Court considered that ebay's activities are covered by the definition of hosting.

http://www. legalis. net/spip. php? article3144 95 High court of England and Wales, 22.05.2009,2009 EWHC 1094 (Ch;

http://www. legalis. net/spip. php? page=jurisprudence-decision&id article=2488 102 Court of cassation, Third Criminal Chamber, 29.09.2009, ref. no. 49437;

http://www. legalis. net/spip. php? page=breves-article&id article=213 111 TGI Nanterre, 24.05.2000; available at:

http://www. legalis. net/spip. php? page=jurisprudencedecision&id article=2639.144 High court of Justice of England and Wales, Queen's Bench Division, 20.04.2011;

and apply both in offline and online 180 European commission, Flash Eurobarometer 300: Retailers'attitudes toward cross-border trade and consumer protection.

and conditions of its licence agreement with independent developers of applications requiring the use of Apple's native programming tools and approved software languages to the detriment of third-party software.

http://ec. europa. eu/justice/newsroom/consumermarketing/events/digital conf en. htm 224 See Eurobarometer Flash 320,

European contract law in business-to-business transactions, 2011, available at http://ec. europa. eu/public opinion/flash/fl 320 sum en. pdf and Eurobarometer Flash 321,

http://ec. europa. eu/consumers/redress cons/docs/cons redress eu qual study report en. pdf 284 The Gallup Organization for DG Communication, Flash Eurobarometer 300, Retailers'attitudes towards cross

SG (2003) A/05684) http://www. et. gr/index. php? option=com wrapper&view=wrapper&itemid=104& lang=en Spain Transposition deadline:

(MNE (2006) 51147) http://www. likumi. lv/doc. php? id=109879&from=off 2. Pateretaju tiesibu aizsardzibas likums Legal act:

(MNE (2003) 50062) http://www. likumi. lv/doc. php? id=23309 3. Par reglamentetajam profesijam un profesionalas kvalifikacijas atzi anu Legal act:

(MNE (2004) 50177) http://www. likumi. lv/doc. php? id=26021 4. Latvijas Republikas Civillikums Legal act:

(MNE (2004) 53163) http://www. likumi. lv/doc. php? id=96619 6. Grozijumi Pateretaju tiesibu aizsardzibas likuma Legal act:

(MNE (2004) 51138) http://www. likumi. lv/doc. php? id=221390 127 Lithuania: Transposition deadline:

(MNE (2006) 58517) http://www. legi-internet. ro/index. php? id=22 132 3. Lege privind unele masuri pentru asigurarea tranparentei în exercitarea demnitatilor publice, a functiilor publice si în mediul

(MNE (2006) 58518) http://legislatie. resurse-pentru-democratie. org/161 2003. php Slovenia Transposition deadline: 01/05/2004 1. Zakon o spremembah in dopolnitvah Zakona o varstvu potro nikov (ZVPOT-C) Legal act:


Open Innovation 2.0 Yearbook 2015.pdf

connectivity and computation? How should all that influence our choices when we seek the impact?

Knowledge co-creation and use-inspired research In its Global Information technology Report 2010-11,8 the World Economic Forum provides ranking of university-industry R & D collaboration based on

/reports/global-competitiveness-report-2012-2013 (7) http://www. ref. ac. uk (8) Global Information technology Report 2010-11, the World Economic Forum.

/Home. aspx (28) http://www. abdn. ac. uk/study/about/sixth-centurycourses-348. php (29) Roos J.,The Renaissance We Need in Business education, HBR

ownership of university patents is regulated as well as copyrighted in relation to computer programming. Regarding the other types of rights (e g. artistic copyright, design rights), the system relies on contractual freedom.

Computer programming is an exception to this rule, as the computer programs belong to Harvard university as sponsored software inventions.

In Finland, there is an exception regarding computer programming the IP of computer programming belongs to the employer,

Different people from various fields like industrial engineering, interaction design, programming, marketing or anthropology are involved often in the innovation process at some stage.

graduates and freelancers involved in sectors such as new media, film, camera, film editing, scripts, graphic design, programming, game design and data visualisation.

Municipality Management Information system (YBS), Electronic Document Management System (EDM), Digital Archiving and GIS 5. 76 O P E N I N N O V A t

Technological developments include an upgrade of the public lighting infrastructure and system by connecting to ICT solutions.

Innovative SMES often have dedicated high-tech solutions for specific functions (such as the 3d sound sensors or social media analysis algorithms in the Stratumseind example.

With the exponential growth of computing power and developments in genetics, nanotechnology and artificial intelligence, humanity will soon overcome biological limitations.

Take for example all those programming classes at primary schools all over Europe. In fact, learning any language besides English is relevant for European harmonisation.


Open Innovation 2.0.pdf

Information technology will play a special role because IT can supply the necessary connectivity and enable social networking among innovators

bold design, ace computer programming and what might be called politely‘autistic creativity'.'The arrival of the ipad and its apps allowed the Finnish industry to break out of its frozen ghetto.

http://www. inderscience. com/info/inarticle. php? artid=23374 (further references:(29)( 35)( 40)( 42)( 51)( 60)( 61))(20) Alfonse et al (2010.

Computer skills as query languages, database design, mining and interactive data analysis, scripting or programming languages, expert systems and machine learning, etc.

Instead of merely asking,‘How can we use information technology to make driving safer and more secure?'

How can information technology improve the driving experience, whether during a long commute, a crosscountry drive,

GM has gone a step further by opening up the applications programming interface of its automotive cloud platform that enables Onstar-based services to developers.

4 applications programming interface, Relayrides allows renters to use remote features with their smartphones, such as unlocking vehicles remotely to access the reserved car.

and an open applications programming interface that allow any service provider to participate in the Aadhaar ecosystem by developing an application that utilises Aadhaar as an authentication method.

and advances in mobile and interactive communications and information technologies, networked individuals around the globe are no longer passive and docile recipients of dispensed instructions and development assistance.

which can be used as a platform for development environment and access point for new services. One example of the city's activities in the field of open innovation and user involvement is the development of a new district, Hiukkavaara,

Juniper Research October 15, 2013 http://www. juniperresearch. com/viewpressrelease. php? pr=405 (11) http://mobihealthnews. com/30616/global-mobile-health-market-to-grow-to-49b-by-2020/12) Electronic textiles

Technological developments include an upgrade of the public lighting infrastructure and system by connecting to ICT solutions.


Open innovation in SMEs - Prof. Wim Vanhaverbeke.pdf

and largely untapped approach to increasing value for the customer and enabling medical staff to deliver value by making their jobs more convenient using, for instance, smart and integrated information systems.

and future of the concept, Communications of the Association for Information systems, Vol. 16,1-25-25; Shafer, M. S.,Smith, H. J. and Linder, J. C. 2005), The power of business models, Business Horizons, 48 (3), 199-207.

origins, present and future of the concept, Communications of the Association for Information systems. Chapter 4 98 29 Chesbrough, H. 2007), Why companies should have open business models, MIT Sloan Management Review, Winter 2007,48, 2, 22-28;


Open innovation in SMEs Trends- motives and management challenges .pdf

A two-stage clustering algorithm with robust recovery characteristics. Educational and Psychological Measurement 40,755-759.

A case study. Information systems Research 1, 89-113. Nalebuff, B. J.,Brandenburger A m.,1996. Co-opetition.


Open-innovation-in-SMEs.pdf

and largely untapped approach to increasing value for the customer and enabling medical staff to deliver value by making their jobs more convenient using, for instance, smart and integrated information systems.

and future of the concept, Communications of the Association for Information systems, Vol. 16,1-25-25; Shafer, M. S.,Smith, H. J. and Linder, J. C. 2005), The power of business models, Business Horizons, 48 (3), 199-207.

origins, present and future of the concept, Communications of the Association for Information systems. Chapter 4 98 29 Chesbrough, H. 2007), Why companies should have open business models, MIT Sloan Management Review, Winter 2007,48, 2, 22-28;


Oxford_ European competitiveness in information technology and lon term scientific performance_2011.pdf

http://www. ingentaconnect. com/content/beech/spp European competitiveness in information technology and long-term scientific performance Andrea Bonaccorsi The reasons behind the poor competitiveness of the European information technology

Based on the analysis of the curriculum vitae of the top 1, 000 scientists in computer science, it shows that these conditions were met only in the US academic system.

particularly computer science, and industrial competitiveness. We will use original evidence, admittedly of preliminary type, to support this proposition.

In the fourth section we review descriptive evidence drawn from a large sample of CVS of the top 1, 010 scientists in computer science worldwide.

A few years ago we asked a small panel of scientific authorities in computer science, in both European and US universities,

while the seminal theoretical contributions to the entire field of computer science were conceived by European thinkers (Alan Turing

it nurtures the ecology of ideas and visions that feed innovation Table 1. Origins of most important ideas in computer science and technology Top ten ideas in computer science 1. Turing machine

Turing) 2. Programming languages; formal description of syntax and semantics; LISP (Mccarthy) 3. Memory hierarchy; cache memory 4. User interface;

pseudocausality 7. Relational database 8. Fourier fast transform (FFT)( Cooley and Tuckey) 9. Efficient algorithms; data structure (Knuth and Tarjan) 10.

Luckily, computer science and the computer industry have been the object of a massive historical literature, that has highlighted several key factors.

We briefly review some of the turning points in the history of computing in which this contribution is more evident.

USA The era of digital computing in the USA was inaugurated by the ENIAC electronic calculator (Ceruzzi, 1998;

After this development, in 1945 the great mathematician John Von neumann described the abstract structure of a modern computing machine,

if that university agreed to offer courses in business data processing or scientific computing (Watson, 1990). This opened the way to a large diffusion of courses in computer science across US universities.

Meanwhile, US universities started to be involved in research on the component technologies underlying the computer.

The role of academic research is also evident in the field of high-level programming languages, for both the USA and Europe.

While the single most important language, FORTRAN, was invented by John Backus at IBM in 1954 (Pugh, 1995),

the ALGOL 60 was created by a committee convened by F L Bauer from the University of Munich (Germany) in 1958,

and COBOL was promoted by a group of universities and computer users which held a meeting at the Computation Center of the University of Pennsylvania in 1959.

In turn, the LISP LANGUAGE was developed by John Mccarthy at MIT in 1958 (Moreau, 1984), PASCAL was developed by Niklaus Wirth at ETH in Zurich (Switzerland) in the period 1968 1969 (Wirth,

1996) and PROLOG was born in 1972 after the work of several French researchers mostly based at the University of Marseille (Colmerauer and Roussel, 1996).

As with C++ ,it was developed in 1979 at Bell laboratories by Bjarne Stroustrup, on the basis of the work he did for his Phd at Cambridge university (UK)( Stroustrup, 1996).

and desires of()university researchers eager to investigate new computing techniques. Throughout its entire life, IPTO followed the rules prescribed by its early director, Joseph C R Licklider,

where he contributed to the development of the automatic computing engine (ACE), which was realized in 1950

Here Maurice Wilkes developed ideas that prepared for high-level programming languages, such as symbolic labels, macros, and subroutine libraries (Books LLC, 2010a).

In France the theoretical roots of computer science were laid down as early as the 1930s. The french mathematician Louis Couffignal demonstrated how a programmable binary calculator could be constructed using electromechanical technology as early as 1938,

Semelson studied the structure of programming languages and developed the notion of bracketed structures, a fundamental breakthrough in computer science,

while Bauer was the first to propose the stack method of expression evaluation. Jointly, they developed fundamental works on compilers (Books LLC, 2010b.

Indeed, Zuse's work is considered by historians of computing technology to be the earliest pioneering work in the modern era.

In his reconstructions of major early computing events Williams places European pioneers such as Zuse, Turing at NPL, Williams and Kilburn at Manchester and Wilkes at Cambridge alongside Von neumann, Eckert and Mauchly, the Moore

In the early history of computing technology Europe and the USA were equally competitive. These short summaries also make it clear that the early era of computer technology saw the deep involvement of the academic environment.

Not many scientific stars from Europe are mentioned in the studies of history of computing after the 1970s.

It is clear that the institutionalization of computer science as an academic discipline took place earlier in the USA, approximately in the 1950s,

characterizing the search regime of computer science In a stream of recent papers (Bonaccorsi, 2007; 2008;

It is therefore useful to try to characterize the history of computer science from the point of view of the underlying abstract dynamics of knowledge.

The National Research Council (NRC) of the US National Academies has edited a number of essays from leading scientists on the state of the art of computer science, with a collective introduction (NRC, 2004.

Computer science embraces questions ranging from the properties of electronic devices to the character of human understanding, from individual designer components to globally distributed systems,

Computer science encompasses basic research that seeks fundamental understanding of computational phenomena, as well as applied research. The two are coupled often;

in computer science there is a significant overlap. Great theorists also engage in developing (or have their students develop) software code

computer science research (NRC, 2004: 15: involves symbols and their manipulation and the creation and manipulation of abstractions. creates

and studies algorithms and artificial constructs, notably unlimited by physical laws. exploits and addresses exponential growth. seeks the fundamental limits on

From the Moore School and the University of Iowa, from Aiken and Wilkes to Algol, the vast majority of the essential steps were achieved on academic grounds.

One certainly is that the computer has an essential abstract side, most visible in programming,

On the basis of an extensive historical reconstruction and of informed reports from scientists, we can conclude that the search regime of computer science has been characterized by turbulent We conclude that the search regime of computer science has been characterized by a turbulent rate of growth, proliferation dynamics,

but a law of business), granted order of magnitude increases in computing power over time, relaxing year after year the constraints on computation.

Programming languages added further diversity to the search regime by allowing computing results to be obtained in many different programming ways.

The abstract nature of computer objects (e g. data, procedures) allowed a process of progressive transformation of many fields of reality,

has attracted a large number of other disciplines into computer science, creating powerful forms of cognitive complementarity. Not only mathematics, logics,

and electric and electronic engineering have been involved into computer science since the beginning, but also biology and chemistry (bioinformatics), earth sciences (geographic information systems), psychology (artificial intelligence), visual art (computer graphics), operations management (enterprise resource planning),

and many other cognitive fields. All have been transformed deeply from the relationship with computer science. In all cases, there was not just‘application,

'but, as noted above,‘fundamental insights'to be gained from this complementarity. Another form of complementarity is defined institutionally

In computer science, this complementarity comes from the constitutive interplay between theoretical work and pragmatic goals (Bonaccorsi, 2010.

New evidence on scientific excellence in computer science An analysis of the CVS of top computer scientists An interesting perspective is to look at the large community of computer scientists and at their own self-validation processes.

Citations to papers in computer science are recorded automatically by Citeseer, 2 a highly structured indexing system established in 1997 and endorsed by most scientific societies and departments in computer science worldwide.

The Citeseer service ranks scientists by the total number of citations without checking for homonyms and controlling for the age of scientists.

These scientists have the largest cumulative number of citations in papers from a list of journals and conferences in computer science, irrespective of their age.

it is almost impossible to rank high in the computer science field without a Phd from either the USA or Europe,

In the period 1980 1989, a period of explosion of computer science and information technology, US Table 2. Distribution of degrees of top computer scientists by geographical area Area Phd degree Master degree

457 100.0 641 100.0 It is almost impossible to rank high in the computer science field without a Phd from either the USA or Europe, with the USA leading by a large margin European competitiveness:

and place of Phd degree of top scientists in computer science Year USA Europe Asia Other Not available Total<1950 4 4 0 0 0 8

Master and Bachelor degrees to top scientists in computer science Phd degree Master degree Bachelor degree Number%Number%Number%MIT 82 9. 6 47

when we move to the Bachelor degree, the entry point for students considering a career in computer science.

The talent pool for a career in computer science is worldwide. Entry points are good universities offering strong basic scientific knowledge

With few exceptions, European postgraduate education in computer science is not globally competitive. If it were competitive we would see more students migrating from Asia and the rest of the world into Europe, instead of the USA,

not computer science (see Table 5). The entry point of a scientific career is not in the specialised field,

Also interesting is the group of graduate students in physics who are recognized as key leaders in computer science.

computer science is number one at the level of Master degrees, a stage in which some focusing is required.

Finally, at the Phd stage the disciplinary affiliation of computer science dominates with 38.2%of cases.

because it is considered obvious that their Phd is in computer science?).At the same time an interesting tentative interpretation can be offered.

Computer science is a relatively young discipline. It has not the long scientific history of physics, mathematics, or chemistry.

a Table 5. Distribution of Phd, Master and Bachelor degrees by discipline Phd degree Master degree Bachelor degree Number%Number%Number%Computer science 327 38.2

IT and long-term scientific performance 534 Science and Public Policy August 2011 theoretical discipline, based on advanced research in mathematics, logics, computation, probability,

Our data seem to suggest that computer science has been a gateway for cross-discipline mobility and cognitive recombination.

students with a background in human sciences (literature, linguistics, psychology) and social sciences (economics) may combine their domain expertise with advanced computer science.

This is roughly confirmed for computer science (79.4%on the diagonal cell) but not for mathematics and engineering.

We therefore conclude that computer science is characterized a field by a high degree of disciplinary mobility attracting competences from related fields.

which is Table 6. Transition matrix between disciplinary distribution of Bachelor and Phd degrees Bachelor degree Phd degree Mathematics Engineering Computer science Other disciplines No Phd Total

100.0 Engineering 4 41.8 69 34.5 57 17.6 29 17.6 6 3. 6 165 100.0 Computer science-2. 0 2 79.4

. 8 432 100.0 The search regime of computer science has been characterized by a turbulent rate of growth, proliferation dynamics,

Our data seem to suggest that in the computer sciences the pattern of geographic mobility has been an ingredient of long-term success. Scientific productivity We offer a very rough descriptive analysis of the scientific production of top scientists.

These cover only a subset of journals considered important in the computer science community, and do not include many top conferences,

This confirms the notion that institutional complementarity is an integral part of the search regime in computer science.

combine different disciplines around computer science, enjoy a rapid career, have extensive industry involvement, as witnessed by research collaborations,

Computer science has been based on a fierce competition for students and researchers worldwide. Knowing how severe these demands are,

However, there is also very recent evidence that the type of brain race that we have discovered in the computer science is becoming widespread (Wildavsky

The search regime in computer science is based on a massive and fast effort of exploration of many competing directions,

In History of Computing: Software Issues, U Hashagen, R Keil-Slawik and A l Norberg (eds..

Beyond computation: information technology, organizational transformation, and business performance. Journal of Economic Perspectives, 14 (4), 23 48.

Campbell-Kelly, M 1989. ICL. A Business and Technical History. The Official History of Britain's Leading Information systems Company.

Oxford, UK: Clarendon Press. Campbell-Kelly, M 2003. From Airline Reservations to Sonic the Hedgehog.

A History of Modern Computing. Cambridge, MA: MIT Press (2nd edition, 2003. Chandler, A 1990.

In History of Programming languages-II, T J Bergin and R G Gibson (eds..New york: Addison-Wesley.

In A History of Computing in the Twentieth Century. A Collection of Essays, N Metropolis, J Howlett and G Rota (eds..

The birth of electronic computing at Bull. Annals of the History of Computing, 12 (1), 5 22.

Lécuyer, C 2006. Making Silicon valley. Innovation and the Growth Of high Tech, 1930 1970. Cambridge, MA:

Computer science. Reflections on the Field, Reflections from the Field. WASHINGTON DC: National Academies Press. Nicoletti, G and S Scarpetta 2003.

an experiment that escaped from the lab. In Computer science. Reflections on the Field, Reflections from the Field, National Research Council (ed.),pp 129 133.

The COLOSSUS. In A History of Computing in the Twentieth Century. A Collection of Essays, N Metropolis, J Howlett and G Rota (eds..

The architecture of Konrad Zuse's early computing machines. In The First Computers. History and Architectures, R Rojas and U Hashagen (eds..

Strategies for software engineering research. In Computer science. Reflections on the Field, Reflections from the Field, National Research Council (ed.),pp 151 158.

WASHINGTON DC: National Academies Press. Stroustrup, B 1996. A history of C++ :++1979 1991. In History of Programming languages-II, T J Bergin and R G Gibson (eds..

New york: Addison-Wesley. Swedin, E g and D L Ferro 2005. Computers. The Life story of a Technology.

Westport, CT: Greenwood Press. Ten Raa, T and E N Wolff 2000. Engines of growth in the US economy.

A Century of Electrical engineering and Computer science at MIT, 1882 1982. Cambridge, MA: MIT Press Williams, M R 2000 A preview of things to come:

In History of Programming languages-II, T J Bergin and R G Gibson (eds..New york, Addison-Wesley.

In Foundations of Computer science. Potential-Theory-Cognition, C Freksa, M Jantzen and R Valk (eds..


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011