Open Access. Powered by Scholars. Published by Universities.®

Business Intelligence Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Business Intelligence

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris Oct 2016

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris

Journal of International Technology and Information Management

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the …


Flipping The Business Information Literacy Classroom: Redesign, Implementation And Assessment Of A Case Study, Ilana Stonebraker Jun 2015

Flipping The Business Information Literacy Classroom: Redesign, Implementation And Assessment Of A Case Study, Ilana Stonebraker

Libraries Faculty and Staff Scholarship and Research

A team of librarians at Purdue University transformed a business information literacy course from a traditional lecture, 40-student class into multiple sections of a flipped, 70-student classroom to meet the request that the successful course be required for all 500 undergraduate students. Scaling up required the adoption of flipped learning techniques for better utilization of library teaching resources. This case study provides key insights for others implementing credit classes or integrating similar content into one-shots or embedded work. It also describes the assessed results determined through student feedback (focus groups) and student performance (pre/post-tests).