Feeds

High Schools putting kids off IT careers, deepening skills shortage

ACS Foundation queries whether IT as a career should even be taught

Top three mobile application threats

High School teaching of IT as a career actually puts kids off pursuing careers in the field, according to John Ridge, Executive Director of the Australian Computer Society Foundation Trust Fund (ACSF).

Ridge says general computer literacy courses in early high school are important and welcome, as employers expect some level of skill with productivity applications when hiring. But once kids start to study IT as a career, he says, they tend to abandon the idea of actually working in the industry.

The reason for the rebound, he says, is that too few teachers have the skills and passion to teach IT well. In New South Wales, Ridge said he feels 100 to 200 IT teachers do well … but with more than 1000 high schools in the State that’s not a great strike rate. Without proper resourcing and relevant curricula – the NSW Higher Schools Certificate’s Software Development and Design course is unchanged since 2009 – Ridge therefore wonders if it is even worth teaching IT as a career in schools.

Ridge also cited conversations with peers who feel University computer science curricula have changed little in decades.

The ACSF tries to step in where curriculum development fails, with its Work Integrated Learning scholarship scheme offering a way for recent graduates to bridge the worlds of University and work in a year-long program. But Ridge feels the Foundation can do only so much – it has placed 3850 students over ten years - and that unless schools and Universities improve Australia will struggle to meet the opportunity for growth in IT services, which he said will expand tenfold worldwide.

“Australia’s share of the IT services market has fallen as global demand has increased four-fold,” he told El Reg.

But Ridge also added that Schools and Universities can’t bring about change alone.

“There are lots of different groups who need to do this,” he said. “They should get together and there has to be a co-ordinated approach.” ®

3 Big data security analytics techniques

More from The Register

next story
From corporate bod to startup star: The 10-month gig that changed everything
What I learned as a techie in my time away from globo firms
Facebook snubbed Google's Silicon Valley wage-strangle pact, Sheryl Sandberg claims
Report details letter COO wrote to court addressing 'no-compete deal' lawsuit
Another day, another nasty Android vuln
Memory corruption mess can brick your mobe
Barclays warns freelance techies of DOUBLE DIGIT rate cut
'IT was a car crash before, so this isn't going to get any better' - sources
VMware announces compulsory bi-ennial VCP recertification
Downside: more time and money; Upside: VMware hints at two-yearly release cycle
Sysadmins and devs: Do these job descriptions make any sense?
Industry lobby group defines skills used in 25 common IT jobs
Who earns '$7k a month' but can't even legally drink? A tech intern!
Glassdoor reveals astonishing salaries of Silicon Valley undergrads
Your CIO is now a venture capitalist and you work at their startup
This just happened without you changing job, by the way
Turnover at the top in Oz telco-land as AAPT, Huawei, Optus, lose top brass
Move along, nothing to see here but orderly transitions
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.