Table E5. Skill proficiency ratings by job specialty, page 8
|
Business specialists
|
Systems specialists
| ||
|---|---|---|---|
|
Skill
|
Mean*
|
Skill
|
Mean*
|
|
System life cycle planning principles |
2.08 |
Database design & development standards |
2.26 |
|
Customer Relationship Management (CRM) |
2.07 |
Web/ IP |
2.23 |
|
Records management |
2.02 |
Systems integration |
2.23 |
|
Workflow management |
2.02 |
Managing consultant staff |
2.22 |
|
Quality assurance |
2.01 |
Database applications development techniques |
2.22 |
|
Unified messaging services |
2.01 |
Network architecture & design principles |
2.21 |
|
Web/ IP |
2.00 |
Technology training activities |
2.19 |
|
Website design & development |
1.99 |
DHTML/ HTML/ XHTML |
2.16 |
|
Network configuration |
1.97 |
Network configuration |
2.15 |
|
Knowledge Management (KM) |
1.97 |
Quality assurance |
2.13 |
|
Database applications development techniques |
1.96 |
Microsoft Access |
2.13 |
|
Structured system analysis & design principles |
1.95 |
Mainframe operations |
2.12 |
|
Change management |
1.92 |
Object-oriented analysis & design principles |
2.12 |
|
IT strategic planning |
1.91 |
Website design & development |
2.12 |
|
Network architecture & design principles |
1.91 |
IBM mainframe |
2.10 |
|
Systems integration |
1.89 |
Website management |
2.04 |
|
System security applications |
1.89 |
Business process analysis |
2.03 |
|
IT procurement |
1.86 |
Internal controls |
2.00 |
|
IT project portfolio management |
1.84 |
Visual Basic |
1.98 |
|
Website management |
1.84 |
Call center activities |
1.98 |
|
Disaster recovery & planning |
1.83 |
Unified messaging services |
1.94 |
|
IT risk assessment & management |
1.83 |
Intrusion detection |
1.91 |
|
Mobile computing |
1.82 |
Web servers |
1.91 |
|
Wireless technologies |
1.82 |
Workflow management |
1.90 |
|
Contract management & vendor relations |
1.81 |
Linux operating systems |
1.89 |
|
IT asset management |
1.80 |
Change management |
1.88 |
|
DHTML/ HTML/ XHTML |
1.78 |
Identity management & directory services |
1.87 |
|
Systems architecture |
1.78 |
Wide Area Networks (WAN) |
1.86 |
|
Identity management & directory services |
1.75 |
Website accessibility |
1.86 |
|
Website accessibility |
1.75 |
Encryption |
1.79 |
|
Business continuity planning |
1.74 |
JavaScript |
1.79 |
|
Open systems server administration |
1.73 |
Collaboration software |
1.78 |
|
Wide Area Networks (WAN) |
1.72 |
Mobile computing |
1.78 |
|
Data warehousing |
1.68 |
CASE Tools |
1.77 |
|
Intrusion detection |
1.67 |
SQL |
1.77 |
|
Content management |
1.67 |
Fortran |
1.76 |
|
Object-oriented analysis & design principles |
1.67 |
Knowledge Management (KM) |
1.76 |
|
Novell operating systems |
1.66 |
Wireless technologies |
1.76 |
|
CASE Tools |
1.64 |
C |
1.75 |
|
Website privacy |
1.62 |
Visual Basic Script |
1.74 |
|
Broadband technologies |
1.60 |
Rapid Application Development (RAD)/ Prototyping |
1.74 |
|
Visual Basic |
1.60 |
Records management |
1.72 |
