The paper "Becoming a Computer Scientist" is a wonderful example of a report on human resources. Many corporations depend on computer systems for efficient day to day operations. With the modern technological advances, security and efficient operations of this computer system are of key importance. This is because many companies and store their data electronically and proper measures must be taken in order to ensure unauthorized people and hackers do no lay hands on this information (Pearl, Pollack, Riskin, Thomas, Wolf & 2002). This paper critically analyses the job of a computer scientist who works as an ICT specialist for British American Tobacco here in the United Kingdom.
His work involves walking people including other employees on the steps to be followed in fixing their computer problems and also ensure all the systems are secure and working properly. The last few years have seen a heightened interest by many individuals and corporations to apply communication and information technologies for global development. This draws interest from many disciplines such as engineering, information technology, computer science, and socio development among others which work together to achieve a common goal and is often referred to as ICTD.
My elder brother’ s friend, Tom Henderson, is a computer scientist and he works as an ICT specialist in the technical department of British American Tobacco. His job is very involving and requires advanced skills in order to be executed efficiently. As consumers, businesses, government agencies, and corporations continue to embrace technological advancement, the demand for skilled computer science professionals continues to grow exponentially. Computer scientists play a key role in the automation process where they collaborate with electrical engineers and they are also required to solve the business issues which are usually complex in nature and create a new computer program that will enable the company to keep up with the heightened consumer demands.
Additionally, computer scientists also develop software programs for entertaining and educating consumers. 2.0 The Job Description Professional computer scientists have a wide variety of career paths that are available for them. This is due to the technological advances which have increased the need for security of the computer system as a result of constant attacks from hackers and also the public needs for tailor-made innovative software solutions.
The field of computer science is thus wide with a good number of defined roles for computer scientists, computer analysts, and database administrators. Some of the key areas include application development, information technology, system analysis, computer programming, web development, and computer engineering. 2.1 Main tasks of a computer scientist As a computer scientist, Tom specializes in web development and information security. His work does not only involve sitting behind the desk and working on the computer but also involves interaction with the customers through email and over the phone and sometimes face to face in order to get their feedback and views regarding the company products and services (Gonzalez, 2012).
His work also involves teaching new British American Tobacco employees on how to effectively use various computer hardware and software in their day to day work. Tom is also obligated with the duty of educating the employees on the need to secure their work stations by safeguarding their passwords in order to prevent unauthorized access and ensure maximum security for the company data.
Bitner, M. J., Zeithaml, V. A., & Gremler, D. D. (2010). Technology’s impact on the gaps model of service quality. Handbook of Service Science, 197-218.
Gonzalez, A. (2012, May 1). Computer Scientist Duties. Retrieved February 25, 2013, from eHow Money: http://www.ehow.com/facts_5640137_computer-scientist-duties.html
Henderson, T. (2013, February 5). Computer Scientist Job. (Me, Interviewer)
Pearl, A., Pollack, M. E., Riskin, E., Thomas, B., Wolf, E., & Wu, A. (2002). Becoming a computer scientist. ACM SIGCSE Bulletin, 34(2), 135-143.
Rountree, J., & Rountree, N. (2009). Issues regarding threshold concepts in computer science. In Proceedings of the Eleventh Australasian Conference on Computing Education-Volume 95 (pp. 139-146). Australian Computer Society, Inc.
Iyer, L., Zhao, X., Chow, A., & Tate, S. (2011). Computer Science and Information Technology (CSIT) Identity: An Integrative Theory to Explain Gender Gap in IT.