Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Business

The Oral Presentation: Enhancing The Experience In An Online Business Communication Course, Marsha L. Bayless, Judith L. Biss, Betty S. Johnson Oct 2012

The Oral Presentation: Enhancing The Experience In An Online Business Communication Course, Marsha L. Bayless, Judith L. Biss, Betty S. Johnson

Faculty Publications

This study addressed student and faculty experiences in using a commercially available website to facilitate the delivery and evaluation of student presentations in the online business communication course. Of the students enrolled in online business communication, 75 students participated in the study by sharing their perceptions of the effectiveness of the oral presentation process. Additionally, their faculty members assessed the process from the instructor’s perspective. The findings and conclusion revealed that the process provided useful student feedback and was more effective than pedagogical methods tried before.


Look! Up In Cyberspace! Is It Web 2.0? Is It Web 3.0? No! It’S Superweb – Technologies For The Classroom!, Susan Evans Jennings, M. Gail Weatherly Oct 2012

Look! Up In Cyberspace! Is It Web 2.0? Is It Web 3.0? No! It’S Superweb – Technologies For The Classroom!, Susan Evans Jennings, M. Gail Weatherly

Faculty Publications

Using the familiar Bloom‟s Taxonomy pyramid, traditionally applied in educational learning objectives, can be useful in helping to choose the right technology to assist in reaching the desired educational outcomes. Many Web technologies provide free or low-cost teaching tools. Some of the many options available for the computer are provided here along with lesson ideas to incorporate these tools into the learning environment.


Business Practices And Procedures Regarding Smartphone Security, S. Ann Wilson, Michael York, Courtney Short Jan 2012

Business Practices And Procedures Regarding Smartphone Security, S. Ann Wilson, Michael York, Courtney Short

Faculty Publications

Smartphones are having a transformational effect on the way that users access, use, and store information. Smartphones have essentially blurred the line of what is considered a phone, becoming the pinnacle multi-tasking devices of today’s world. Current smartphones have their own dedicated operating system, Bluetooth capabilities, GPS, WiFi, constant network connection, PC connectivity, and are internet enabled, leading them to have similar security risks as that of a computer. Businesses are now worrying about the information employees are storing on these devices and want to find new ways to protect it (Schiller, 2011). Smartphone capabilities used for business application will …