Author
Listed:
- Rexwhite Tega Enakrire
(Nelson Mandela University)
- Brenda Scholtz
(Nelson Mandela University)
- Khulekani Yakobi
(Mangosuthu University of Technology)
Abstract
The Fifth Industrial Revolution (5IR) embraces the concept of harmonious human–machine collaborations where the focus moves from the digital perspective of the 4IR to a more human perspective. The priority is the well-being of all stakeholders in society and business, necessitating an (r)evolution in thinking about how human–machine collaborations, can be leveraged for positive societal impact. Therefore, educators need to re-evaluate their curricula to consider these evolving needs and a competency-based approach, particularly for Computing graduates. The purpose of this paper is to report on the importance of developing the competencies needed by graduates of Computing programmes in the era of 5IR, which requires strong soft skills. The exploratory research used a Systematic Literature Review and a qualitative research approach based on the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) method. The findings revealed that Computing curricula need to carefully consider and address a wide, diverse range of the required competencies needed by their graduates, to support human–machine interaction, organizational transformation, and productivity. These competencies range from highly technical competencies to soft skills such as attitude, motivation, collaborative and team competencies, and interpersonal skills. The study recommends a strategic approach encouraging regular reviews of Computing curricula and a competency-based method that balances technical and soft skills within a culture of promoting the self-confidence of graduates.
Suggested Citation
Rexwhite Tega Enakrire & Brenda Scholtz & Khulekani Yakobi, 2024.
"The Importance of Soft Skills for Computing Graduates in the Context of the Fifth Industrial Revolution,"
Progress in IS, in: Jorge Marx Gómez & Anael Elikana Sam & Devotha Godfrey Nyambo (ed.), Smart and Secure Embedded and Mobile Systems, pages 437-449,
Springer.
Handle:
RePEc:spr:prochp:978-3-031-56603-5_36
DOI: 10.1007/978-3-031-56603-5_36
Download full text from publisher
To our knowledge, this item is not available for
download. To find whether it is available, there are three
options:
1. Check below whether another version of this item is available online.
2. Check on the provider's
web page
whether it is in fact available.
3. Perform a
for a similarly titled item that would be
available.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:prochp:978-3-031-56603-5_36. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.