Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies

University of Wollongong

Consultants

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael Jan 2012

Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael

Associate Professor Katina Michael

In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than …


It Consultants' Voluntary Contract Termination - A Psychological Contract Perspective, Gro Bjerknes, Karlheinz Kautz Jan 2012

It Consultants' Voluntary Contract Termination - A Psychological Contract Perspective, Gro Bjerknes, Karlheinz Kautz

Faculty of Engineering and Information Sciences - Papers: Part A

This research explores the question why IT consultants terminate their employment contracts in a labour market with job drought, downsizing and salary cuts when they were among those who kept their jobs during layoffs. A process model for the maintenance of a psychological contract between employees and employers is presented, which combines the concept of psychological contract with a theory of the relation between intrinsic motivation and management practices and with theories of identity, self-esteem, influence and power. The research verifies and specifies the model based on a revelatory case study. The model helps explaining IT consultants' behavior of voluntarily …