Australia’s STEM workforce: A survey of employers
This 2014 report describes the demand for STEM skills within the Australian workplace.This 2014 report describes the demand for STEM skills within the Australian workplace. The research was conducted by Deloitte Access Economics. “The largest differences in skill levels between people with STEM and non-STEM qualifications were observed for ‘complex problem-solving’, ‘programming’, ‘critical thinking’ and ‘system analysis and evaluation’.”
Additional details
| Year band(s) | 9-10 |
|---|---|
| Content type | Article or research |
| Format | Document |
| Keywords | Occupations, STEM, Workforce, Careers |
| Integrated, cross-curriculum, special needs | STEM |
| Organisation | Deloitte |
| Copyright | 2014 Deloitte Access Economics Pty Ltd. May be subject to Copyright Act statutory licence. |
Related resources
-
NMC Horizon Report
This report profiles the trends and key technologies and practices shaping the future of teaching and learning, and envisions a number of scenarios for that future. It is based on the perspectives and expertise of a global panel of leaders from across the higher education landscape.
-
The Big Book of Computing Pedagogy
This guide focuses on approaches to teaching computing in the classroom, and includes pedagogically themed articles. It is structured around twelve pedagogical principles, originally developed by the Raspberry Pi Foundation for the National Centre for Computing Education in England.
-
Why kids still need to learn to code in the age of AI
This report put forward evidence that even in a world where AI can generate code, we will need skilled human programmers who can think critically, solve problems, and make ethical decisions. It puts the case forward that young people need to learn to code because it is the most effective way for them to develop the mental models and fluency to become skilled human programmers.
-
Big Data
This comprehensive online guide, provides a background on big data. This topic has information on data mining and predictive analytics.
-
Encryption
This comprehensive online guide, provides a background to encryption.
-
Network security
This comprehensive online guide, provides a background to network security. This topic has information on encryption and authentication .
-
Malicious software
This comprehensive online guide, provides a background to malware. Malicious software (malware) is created with the intent to cause damage to computer systems or steal data, and computer users must take steps to lessen these threats.
-
Compression
This comprehensive online guide, provides a background to compression. Compression is a technique that reduces file size. This topic has information about lossy and lossless.