Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Illinois State University (54)
- Kennesaw State University (35)
- California State University, San Bernardino (9)
- Embry-Riddle Aeronautical University (4)
- The University of Maine (2)
-
- University of Central Florida (2)
- University of Massachusetts Boston (2)
- Walden University (2)
- Association of Arab Universities (1)
- Brigham Young University (1)
- Clemson University (1)
- Colby College (1)
- DePaul University (1)
- Edith Cowan University (1)
- Fort Hays State University (1)
- HCA Healthcare (1)
- Illinois Wesleyan University (1)
- Munster Technological University (1)
- Nova Southeastern University (1)
- Old Dominion University (1)
- San Jose State University (1)
- St. John's University (1)
- Technological University Dublin (1)
- The University of Akron (1)
- The University of Notre Dame Australia (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Rhode Island (1)
- University of South Alabama (1)
- University of South Florida (1)
- Virginia Community College System (1)
- Keyword
-
- Cybersecurity (15)
- Editorial Board (13)
- Education (8)
- Technology (5)
- Business education (3)
-
- Cybersecurity Education (3)
- Cybersecurity education (3)
- Diversity (3)
- Experiential learning (3)
- Higher education (3)
- Pedagogy (3)
- Assessment (2)
- Certifications (2)
- Climate change (2)
- Cyber ranges (2)
- Cyberbullying (2)
- Digital learning (2)
- Digital transformation (2)
- Entrepreneurship education (2)
- Ethics (2)
- Information security (2)
- Innovation (2)
- Innovation Engineering (2)
- Internships (2)
- K-12 (2)
- Leadership (2)
- Learning (2)
- Learning Outcomes (2)
- Mentoring (2)
- Multidisciplinary approach (2)
- Publication Year
- Publication
-
- International Journal for Business Education (54)
- Journal of Cybersecurity Education, Research and Practice (32)
- Journal of International Technology and Information Management (9)
- Human-Machine Communication (2)
- International Journal of Aviation, Aeronautics, and Aerospace (2)
-
- Journal of Sustainable Social Change (2)
- KSU Distinguished Course Repository (2)
- Maine Policy Review (2)
- New England Journal of Public Policy (2)
- Alabama Libraries (1)
- Australian Journal of Teacher Education (1)
- Colby Magazine (1)
- Computer Ethics - Philosophical Enquiry (CEPE) Proceedings (1)
- DePaul Magazine (1)
- Future Computing and Informatics Journal (1)
- HCA Healthcare Journal of Medicine (1)
- Inquiry: The Journal of the Virginia Community Colleges (1)
- International Journal of Islands Research (1)
- Irish Business Journal (1)
- Journal of Aviation/Aerospace Education & Research (1)
- Journal of Business & Technology Law (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of Global Awareness (1)
- Journal of Nonprofit Innovation (1)
- Markets, Globalization & Development Review (1)
- Proceedings from the Document Academy (1)
- SACAD: John Heinrichs Scholarly and Creative Activity Days (1)
- Secrecy and Society (1)
- The African Journal of Information Systems (1)
- The Journal of Extension (1)
Articles 1 - 30 of 132
Full-Text Articles in Technology and Innovation
Exploring Entrepreneurial Intention And Subjective Beliefs: A Comparative Analysis Of General Education Schools And Commercial Schools, Julia Riess, Bettina Fuhrmann, Gerhard Geissler
Exploring Entrepreneurial Intention And Subjective Beliefs: A Comparative Analysis Of General Education Schools And Commercial Schools, Julia Riess, Bettina Fuhrmann, Gerhard Geissler
International Journal for Business Education
This study examines the entrepreneurial intentions of Austrian secondary school students, specifically comparing students from commercial schools with those from general education schools. We analyzed 2,329 data sets and found that subjective beliefs, primarily behavioral and control beliefs, significantly influence entrepreneurial intentions. In addition, demographic factors such as gender, language, acquaintance with entrepreneurs, and school type play a significant role in explaining the variance in entrepreneurial intentions.
Our detailed analysis shows that students from commercial schools have stronger entrepreneurial intentions and subjective beliefs. Particularly notable are the differences in behavioral beliefs, where students from commercial schools find all aspects of …
An Exploratory Study On The Use Of Artificial Intelligence For Tourism Marketing In The Midwest, Callyn Anderson, Marisol Banda, Katie Hale
An Exploratory Study On The Use Of Artificial Intelligence For Tourism Marketing In The Midwest, Callyn Anderson, Marisol Banda, Katie Hale
SACAD: John Heinrichs Scholarly and Creative Activity Days
Rural tourism plays a significant role in fostering economic development, preserving cultural heritage and promoting sustainable practices. It creates employment opportunities for local residents, both directly in the tourism sector and indirectly in supporting industries. Marketing tourism in rural communities requires a strategic approach that highlights the unique aspects of the area, promotes sustainable practices, and engages potential visitors. A strong understanding of marketing tools and techniques are critical in the usage of marketing ("); border-bottom: 1px solid transparent; background-size: 5px; font-size: 18pt; font-family: "Book Antiqua", "Book Antiqua_EmbeddedFont", "Book Antiqua_MSFontService", "Book Antiqua_MSFontService", Calibri, sans-serif; letter-spacing: 0px; font-kerning: normal; line-height: 6px; …
Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor
Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor
Journal of Cybersecurity Education, Research and Practice
The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized “cognitive” transfer theories might help explain and synergize three aspects of cybersecurity education. These include teaching and training in diverse settings, assessing learning formatively & summatively, and testing & measuring achievement, proficiency, & readiness. We excluded newer sociocultural theories and their implications for inclusion as we explore those theories elsewhere. We first summarized the history of cybersecurity education and proficiency standards considering transfer theories. We then explored each theory and reviewed the most relevant cybersecurity education …
Leading Horses To Water During A Pandemic: Assuring Communication Learning For "Quants", Thomas Hall
Leading Horses To Water During A Pandemic: Assuring Communication Learning For "Quants", Thomas Hall
International Journal for Business Education
Students who are attracted to quantitative disciplines of study can be reluctant to devote much attention to the important task of communicating, and previous research (Hostager, 2018) has identified statistically significant differences in learning approaches by major among undergraduate business students. This paper presents results of learning assurance for writing skills (direct measures) even when the content of the course relates to the highly quantitative topics of data analytics and finance. The approach combines various pedagogical methods in an undergraduate, writing-intensive setting: traditional testing but in an iterative framework, “flipped classroom” intensive work using spreadsheet software, repeated submission of brief …
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Journal of Cybersecurity Education, Research and Practice
This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …
University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo
University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo
Journal of Cybersecurity Education, Research and Practice
This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg Institutional Repository database was the data source for this study. Variations in cybersecurity keyword searches and topic modeling techniques were used to identify the frequency and distribution of research output across different disciplines. The study reveals that cybersecurity awareness has diffused across various disciplines, including non-computer science disciplines such as business, accounting, and social …
An Examination Of The Relationship Between Cheating In Online Classes And Technostress: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper
An Examination Of The Relationship Between Cheating In Online Classes And Technostress: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper
International Journal for Business Education
This research study investigated the relationship between technostress creators (techno-complexity, techno-insecurity, techno-invasion, techno-overload, and techno-uncertainty) and faculty perceptions of student cheating in online classes. Data were collected from faculty members of the Management and Organizational Behavior Teaching Society (MOBTS), a member of the AACSB Business Education Alliance, the American Society of Business and Behavioral Sciences (ASBBS), an interdisciplinary professional organization comprised of faculty teaching in accounting, finance, management, marketing, organizational behavior, and computer information systems, and other research panels during 2021 (N = 94). Findings from regression analysis indicated that the techno-complexity subconstruct is positively related to a faculty’s perception …
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
The Coming Transformative Impact Of Large Language Models And Artificial Intelligence On Global Business And Education, Eva K. Jermakowicz
The Coming Transformative Impact Of Large Language Models And Artificial Intelligence On Global Business And Education, Eva K. Jermakowicz
Journal of Global Awareness
Rapid advances in the capabilities of Large Language Models (LLM) as a basis for Artificial Intelligence (AI) applications, and their sudden wide accessibility, have garnered significant attention recently. These technologies (e.g., ChatGPT, BARD), which have the ability to predict and generate human language, have led to excitement and concerns regarding their use in various industries. This paper explores the history of LLM, examines their applications in business and education, and delves into the critical ethical concerns and challenges of these emerging technologies to ensure that their uses are not only effective, but also responsible and equitable.
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Journal of Cybersecurity Education, Research and Practice
Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Journal of Cybersecurity Education, Research and Practice
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and ethics, cybersecurity can foster diversity among audiences with varying educational backgrounds, thereby cultivating a richer and more resilient security landscape. A more diverse cybersecurity workforce can provide a broader range of perspectives, experiences, and skills to address the complex and ever-evolving threats of the digital age. The research focuses on enhancing cybersecurity education …
Depaul Digest
DePaul Magazine
College of Education Professor Jason Goulah fosters hope, happiness and global citizenship through DePaul’s Institute for Daisaku Ikeda Studies in Education. Associate Journalism Professor Jill Hopke shares how to talk about climate change. News briefs from DePaul’s 10 colleges and schools: Occupational Therapy Standardized Patient Program, Financial Planning Certificate program, Business Education in Technology and Analytics Hub, Racial Justice Initiative, Teacher Quality Partnership grant, Intimate Partner Violence and Brain Injury collaboration, School of Music Career Closet, Sports Photojournalism course, DePaul Migration Collaborative’s Solutions Lab, Inclusive Screenwriting courses. New appointments: School of Music Dean John Milbauer, College of Education Dean Jennifer …
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Journal of Cybersecurity Education, Research and Practice
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …
Introduction To International Business, Rajaram Veliyath
Introduction To International Business, Rajaram Veliyath
KSU Distinguished Course Repository
An introduction to the global business environment, this course examines the discrete and interactive effects of the geographic, historical, sociocultural, political/legal, economic and technological forces that shape business activities across borders and their consequences.
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan
Journal of Cybersecurity Education, Research and Practice
Cyberbiosecurity and workforce development in agriculture and the life sciences (ALS) is a growing area of need in the curriculum in higher education. Students that pursue majors related to ALS often do not include training in cyber-related concepts or expose the ‘hidden curriculum’ of seeking internships and jobs. Exposing students through workforce development training and hands-on engagement with industry professionals can provide learning opportunities to bridge the two and is an area of growth and demand as the workforce evolves. The objectives of this work were 1) to learn key concepts in cybersecurity, including data security, visualization, and analysis, to …
A Mixed-Method Study Exploring Cyber Ranges And Educator Motivation, Cheryl Beauchamp, Holly M. Matusovich
A Mixed-Method Study Exploring Cyber Ranges And Educator Motivation, Cheryl Beauchamp, Holly M. Matusovich
Journal of Cybersecurity Education, Research and Practice
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable understanding of the cyber range resources they use, how they use them, what they value, and what they do not value. This study provides the cyber range user perspective of cyber ranges in cybersecurity education by describing how K-12 educators are motivated using cyber ranges. Using mixed methods, this study explored educator motivation associated with …
Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen
Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen
Journal of Cybersecurity Education, Research and Practice
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An un-tapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education is a 3-tiered approach to quickly escalate the student into a workplace-ready graduate. The analogy used is a three-legged-stool, where curriculum content, hands-on skills, and certifications are equal instruments in the edification of the cybersecurity student. This paper endeavors to delve into the 3rd leg of …
Cybersecurity Challenges And Awareness Of The Multi-Generational Learners In Nepal, Raj Kumar Dhungana, Lina Gurung Dr, Hem Poudyal
Cybersecurity Challenges And Awareness Of The Multi-Generational Learners In Nepal, Raj Kumar Dhungana, Lina Gurung Dr, Hem Poudyal
Journal of Cybersecurity Education, Research and Practice
Increased exposure to technologies has lately emerged as one of the everyday realities of digital natives, especially K-12 students, and teachers, the digital immigrants. Protection from cybersecurity risks in digital learning spaces is a human right, but students are increasingly exposed to high-risk cyberspace without time to cope with cybersecurity risks. This study, using a survey (N-891 students and 157 teachers) and in-depth interviews (27 students and 14 teachers), described the students' cybersecurity-related experiences and challenges in Nepal. This study revealed that the school’s cybersecurity support system is poor and teachers has very low awareness and competencies to protect students …
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Journal of Cybersecurity Education, Research and Practice
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two programs offer a required course about terrorism. Given the fluid nature of terrorism and its threat to national infrastructure, the omission is concerning. It is recommended that NSA-certified cybersecurity programs begin implementing educational content that aim to teach about this emerging crime and justice issue. One suggestion is to embrace the …
Textbook Tasks For Social Change: Instantiation Of Development Debates And Interposition Of Pedagogical Interventions In Media Literacy Education, John N. Ponsaran
Textbook Tasks For Social Change: Instantiation Of Development Debates And Interposition Of Pedagogical Interventions In Media Literacy Education, John N. Ponsaran
Journal of Sustainable Social Change
As materialization of their discursive stance as instructional communicators and media producers, textbook authors instantiate various development debates as well as interpose a wide range of pedagogical interventions for critical reflection and adoption by learners. This qualitative study sought to situate these development debates and the counterpart pedagogical interventions within the context of textbook task design as an application and embodiment of social justice communication. The development debates serve as the proposed contexts for media text analyses, reflective exercises, case studies, and media production, among others. Correspondingly, the interposition of interventions allows students to make sense of and act upon …
Civilian Oversight Of Police Through The Lens Of Polarities Of Democracy, Joseph A. Mcmillan, Jacqueline D. Smith, William J. Benet
Civilian Oversight Of Police Through The Lens Of Polarities Of Democracy, Joseph A. Mcmillan, Jacqueline D. Smith, William J. Benet
Journal of Sustainable Social Change
Following the murder of George Floyd, the U.S. Congress called upon the National Organization for Black Law Enforcement Executives (NOBLE) to play a role in the reimagining of policing in America, including a transformation of policing from a warrior to a guardian mentality. In turn, NOBLE partnered with the Institute for Polarities of Democracy (the Institute) to conduct an analysis of the 21st Century Policing Report (the Report), which focused on addressing a myriad of issues that challenged the relationship between the police and communities. The Report determined there were six “pillars” necessary for effective policing in America, including (1) …
Responses To General Capabilities Framework For Tertiary Education, Tony Shannon
Responses To General Capabilities Framework For Tertiary Education, Tony Shannon
International Journal for Business Education
The Australian Government Department of Education, Skills and Employment (DESE) is consulting on how best to develop a general capabilities framework for tertiary education. This is being done with NOUS, a business management consultancy, and the Assessment Research Centre of the University of Melbourne
The Coaldrake And Joyce Reviews Into Australia's Tertiary Education Systems, Tony Shannon
The Coaldrake And Joyce Reviews Into Australia's Tertiary Education Systems, Tony Shannon
International Journal for Business Education
In October 2018 the Commonwealth Minister for Education, the Hon. Dan Tehan MP announced that Australia’s Higher Education Provider Category Standards will be reviewed to ensure the sector has the capacity to meet the evolving needs of students, employers and the wider community.
Continuing Professional Development And The Commercial Education Society Of Australia, Kathleen Mckenzie, Jacob Munday
Continuing Professional Development And The Commercial Education Society Of Australia, Kathleen Mckenzie, Jacob Munday
International Journal for Business Education
The Commercial Education Society of Australia (CESA) was founded in 1910 and incorporated in 1911 as a non-profit company limited by guarantee. The mission of the Society is to provide students with the opportunity to raise their standards of education so that they can take advantage of the opportunities for further education and employment. This is reflected in the Society’s coat-of-arms ‘Digne Ambulate’ — walk worthily.
Group Learning And Tutoring, Tony Shannon
Group Learning And Tutoring, Tony Shannon
International Journal for Business Education
There are some academic subjects, particularly problem-based units, where group learning is beneficial, particularly as so much professional work is conducted in groups, whether formal or informal. These notes are merely an introductory outline to what can be an important element of some learning and assessment.
Irish Catholic History In Australia's Oldest Secretarial College, David Ryan
Irish Catholic History In Australia's Oldest Secretarial College, David Ryan
International Journal for Business Education
Patrick Careers Academy, founded in 1923 by the Sisters of Mercy as St Patrick’s Commercial College began as a way of helping young working class women gain employment in Sydney’s corporate world with training as personal assistants and legal secretaries.
Academic Freedom And Academic Integrity, Tony Shannon
Academic Freedom And Academic Integrity, Tony Shannon
International Journal for Business Education
The demand for freedom, an intense desire in fact, is a positive characteristic of our era, but human freedom does not mean acting in accord with one’s caprices or without restraint by any law. Recent controversaries at universities in Queensland have raised questions about mandating the French Review in Australian higher education as the review deals with the related issues of academic freedom and integrity.
Affective And Psychomotor Taxonomies, Tony Shannon, Melvin Leong
Affective And Psychomotor Taxonomies, Tony Shannon, Melvin Leong
International Journal for Business Education
Taxonomies can sensitise teachers to develop their learners’ applications of their knowledge and skills in depth when utilised judiciously in preparing experiences for learning and assessments for evaluation (Tyszko and Sheets, 2019).
Comments On Teqsa Discussion Paper: "Making And Accessing Claims Of Scholarship And Scholarly Activity", No Author
International Journal for Business Education
The Background and initial discussion are extracts from the TEQSA paper dated 12 October 2020, as are the subsequent statements of Principles and associated Questions. The layout here is to make it easier for interested staff to comment and contribute to our response to TEQSA if it is eventually deemed appropriate and useful to make such a submission. In any case, it is useful to have a discussion among colleagues on this important topic and what the regulator expects from providers and their staff.
The Purpose Of Education: Dewey And Maritain Re-Visited, Tony Shannon
The Purpose Of Education: Dewey And Maritain Re-Visited, Tony Shannon
International Journal for Business Education
This paper touches on the views of John Dewey and Jacques Maritain on the purpose of the process of formal education, particularly its social dimension in relation to the environment, which for Dewey means “those conditions that promote or hinder, stimulate or inhibit, the characteristic activities of a living being”. Dewey is concerned with communication and the conditions of growth of the child from every point of view. He was very opposed to those who see education as preparation for something else: he focused on what he saw as the existential needs of the student. Some of Dewey’s views are …