Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (221)
- SelectedWorks (215)
- Kennesaw State University (178)
- Selected Works (107)
- Illinois State University (52)
-
- The University of San Francisco (36)
- University of Nebraska - Lincoln (35)
- Singapore Management University (21)
- Kansas State University Libraries (12)
- Loyola University Chicago (8)
- University of Arkansas, Fayetteville (8)
- Northern Michigan University (7)
- Embry-Riddle Aeronautical University (6)
- Johnson & Wales University (6)
- University of Wollongong (6)
- Walden University (5)
- Florida International University (4)
- Georgia Southern University (4)
- Liberty University (4)
- Missouri University of Science and Technology (4)
- Montclair State University (4)
- San Jose State University (4)
- University of Nevada, Las Vegas (4)
- Brigham Young University (3)
- Nova Southeastern University (3)
- Old Dominion University (3)
- Southern Methodist University (3)
- Technological University Dublin (3)
- University of Pittsburgh School of Law (3)
- University of South Florida (3)
- Keyword
-
- Präsentation (50)
- Technology (41)
- Wissenschaftliche Zeitschriften (37)
- Information (35)
- Cybersecurity (33)
-
- Arbeitspapier (26)
- Internet (23)
- Konferenzpapier (21)
- Collaboration (18)
- Strategy (17)
- Service (16)
- Work system (16)
- IT (15)
- Innovation (15)
- Management (15)
- RFID (15)
- Systems (15)
- Editorial Board (13)
- Hybrid Mail (13)
- Hybrid post (13)
- Postal (13)
- Privacy (13)
- Social media (13)
- Business (11)
- Editorial (11)
- Education (11)
- Geschäftsmodell (11)
- Healthcare (11)
- Information Systems (11)
- Security (11)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (207)
- Hubert Oesterle (152)
- Journal of Cybersecurity Education, Research and Practice (80)
- KSU Proceedings on Cybersecurity Education, Research and Practice (77)
- International Journal for Business Education (52)
-
- Dr Deogratias Harorimana (24)
- Business Analytics and Information Systems (21)
- Associate Professor Linda Dawson (18)
- Steven Alter (18)
- Jacob Johnsen, MSc (17)
- Department of Supply Chain Management and Analytics: Faculty and Staff Publications (16)
- Library Philosophy and Practice (e-journal) (16)
- Dariusz Jemielniak (15)
- Shahriar Akter (14)
- The African Journal of Information Systems (13)
- Central Plains Network for Digital Asset Management (12)
- Electronic Theses, Projects, and Dissertations (12)
- Dr Samuel Fosso Wamba (8)
- Information Systems and Operations Management: Faculty Publications & Other Works (8)
- Maurice Dawson (8)
- Madison Ngafeeson (7)
- Research Collection School Of Computing and Information Systems (7)
- Faculty of Informatics - Papers (Archive) (6)
- MBA Faculty Conference Papers & Journal Articles (6)
- African Conference on Information Systems and Technology (5)
- Dr Shah Jahan Miah (5)
- Graduate Theses and Dissertations (5)
- Business and Information Technology Faculty Research & Creative Works (4)
- Dissertations (4)
- Francesca Cabiddu (4)
- Publication Type
Articles 31 - 60 of 1033
Full-Text Articles in Management Information Systems
Education As A Solution To Combat Rising Cybercrime Rates Against Children And Teenagers, Christian Javier Solis-Diaz
Education As A Solution To Combat Rising Cybercrime Rates Against Children And Teenagers, Christian Javier Solis-Diaz
Electronic Theses, Projects, and Dissertations
Ninety seven percent (97%) of people between the ages of 3 and 18 are found to be users of technology and internet services daily. This number also correlates with rising cyber crime rates against people in this age bracket. It is found that people between 3 and 18 years old are found to be technologically savvy but often lack the knowledge of how to protect themselves in online environments. Researchers have suggested that cybersecurity awareness training is an effective method at combating common forms of cyberattack such as social engineering. Social engineering attacks are found to make up 98% of …
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
Cybersecurity Undergraduate Research Showcase
The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …
Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu
Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu
Journal of Cybersecurity Education, Research and Practice
This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post experimental design was employed. 43 self-selected participants were recruited via an online register and posters at the university (excluding IT related courses). Participants completed the Human Aspects of Information Security Questionnaire (HAIS-Q) and Fear of Missing Out (FoMO) Scale. They then completed all games and quizzes in the GICAST course before repeating the HAIS-Q and …
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Journal of Cybersecurity Education, Research and Practice
Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …
Analysis Of Us Airline Stocks Performance Using Latent Dirichlet Allocation (Lda), Amina Issoufou Anaroua
Analysis Of Us Airline Stocks Performance Using Latent Dirichlet Allocation (Lda), Amina Issoufou Anaroua
Beyond: Undergraduate Research Journal
Various events, such as changes in the interest rate or the hijacking of a commercial aircraft, can lead to significant shifts in airline stock performance. This study aimed to measure the impact of aviation-related news announcements on the stock performance of US airlines, focusing on different topics. The dataset included aviation news covering airlines, airports, regulations, safety, accidents, manufacturers, MRO, incidents, aviation training, general aviation, and others obtained from Aviation Voice. To uncover patterns that could explain the movements of US airline stocks, a natural language processing technique called Latent Dirichlet Allocation (LDA) was employed. The process involved text mining …
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Journal of Cybersecurity Education, Research and Practice
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and ethics, cybersecurity can foster diversity among audiences with varying educational backgrounds, thereby cultivating a richer and more resilient security landscape. A more diverse cybersecurity workforce can provide a broader range of perspectives, experiences, and skills to address the complex and ever-evolving threats of the digital age. The research focuses on enhancing cybersecurity education …
Determinants Of Business Organization’S Adoption Of Complex Innovative Product: A Case Of The Intelligent Iot System For Hog-Raising, Jingguan Cao
Dissertations and Theses Collection (Open Access)
With the development of science and technology, various opportunities emerged for the application of complex innovative products. However, not all business organizations are willing to adopt complex innovative products although these products can improve efficiency and reduce costs of the organizations, because there are bound to be various problems in the early application of new technologies. Hence, it is important to find the key influencing factors for the acceptance of complex innovative products by business organizations. The Internet of Things (IoT) is a typical complex innovative product, and this dissertation takes the intelligent IoT system for hog-raising as a case …
A Developed Framework For Studying Cyberethical Behaviour In North Central Nigeria, Aderinola Ololade Dunmade, Adeyinka Tella, Uloma Doris Onuoha
A Developed Framework For Studying Cyberethical Behaviour In North Central Nigeria, Aderinola Ololade Dunmade, Adeyinka Tella, Uloma Doris Onuoha
Journal of Cybersecurity Education, Research and Practice
ICT advancements have enabled more online activities, resulting in several cyberethical behaviours. Literature documents prevalence of plagiarism, and online fraud, among other misbehaviours. While behaviour has been explained by several theories, as scholarship and research advances, frameworks are modified to include more constructs. The researchers modified Fishbein and Ajzen (2011)'s Reasoned Action Approach to study female postgraduate students' perspectives toward cyberethical behaviour in North Central Nigerian universities.
The study focused on four variables, which were adequately captured by the model: perception, awareness, and attitude.
An adapted questionnaire collected quantitative data. This study used multistage sampling. A sample size of 989 …
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Journal of Cybersecurity Education, Research and Practice
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Building The Operational Technology (Ot) Cybersecurity Workforce: What Are Employers Looking For?, Christopher A. Ramezan, Paul M. Coffy, Jared Lemons
Building The Operational Technology (Ot) Cybersecurity Workforce: What Are Employers Looking For?, Christopher A. Ramezan, Paul M. Coffy, Jared Lemons
Journal of Cybersecurity Education, Research and Practice
A trained workforce is needed to protect operational technology (OT) and industrial control systems (ICS) within national critical infrastructure and critical industries. However, what knowledge, skills, and credentials are employers looking for in OT cybersecurity professionals? To best train the next generation of OT cybersecurity professionals, an understanding of current OT cybersecurity position requirements is needed. Thus, this work analyzes 100 OT cybersecurity positions to provide insights on key prerequisite requirements such as prior professional experience, education, industry certifications, security clearances, programming expertise, soft verbal and written communication skills, knowledge of OT frameworks, standards, and network communication protocols, and position …
Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton
Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton
Journal of Cybersecurity Education, Research and Practice
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for K-12 systems and provides concrete tools for school leaders to employ in order to provide preventive education to their school communities.
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan
Journal of Cybersecurity Education, Research and Practice
Cyberbiosecurity and workforce development in agriculture and the life sciences (ALS) is a growing area of need in the curriculum in higher education. Students that pursue majors related to ALS often do not include training in cyber-related concepts or expose the ‘hidden curriculum’ of seeking internships and jobs. Exposing students through workforce development training and hands-on engagement with industry professionals can provide learning opportunities to bridge the two and is an area of growth and demand as the workforce evolves. The objectives of this work were 1) to learn key concepts in cybersecurity, including data security, visualization, and analysis, to …
Infrastructure As Code For Cybersecurity Training, Rui Pinto, Rolando Martins, Carlos Novo
Infrastructure As Code For Cybersecurity Training, Rui Pinto, Rolando Martins, Carlos Novo
Journal of Cybersecurity Education, Research and Practice
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. These attacks tend to become increasingly specialized, meaning cybersecurity professionals must ensure proficiency in specific areas. Naturally, recommendations include creating advanced practical training scenarios considering realistic situations to help trainees gain detailed knowledge. However, the caveats of high-cost infrastructure and difficulties in the deployment process of this kind of system, primarily due to the manual process of pre-configuring software needed for the …
Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen
Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen
Journal of Cybersecurity Education, Research and Practice
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An un-tapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education is a 3-tiered approach to quickly escalate the student into a workplace-ready graduate. The analogy used is a three-legged-stool, where curriculum content, hands-on skills, and certifications are equal instruments in the edification of the cybersecurity student. This paper endeavors to delve into the 3rd leg of …
What You See Is Not What You Know: Studying Deception In Deepfake Video Manipulation, Cathryn Allen, Bryson R. Payne, Tamirat Abegaz, Chuck Robertson
What You See Is Not What You Know: Studying Deception In Deepfake Video Manipulation, Cathryn Allen, Bryson R. Payne, Tamirat Abegaz, Chuck Robertson
Journal of Cybersecurity Education, Research and Practice
Research indicates that deceitful videos tend to spread rapidly online and influence people’s opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers’ capability to distinguish deepfake videos from genuine video footage. This work focuses on exploring deepfake videos’ potential use for deception and misinformation by exploring people’s ability to determine whether videos are deepfakes in a survey consisting of deepfake videos and original unedited videos. The participants viewed a set of four videos and were asked to judge whether the videos shown …
Editorial, Michael E. Whitman, Herbert J. Mattord
Editorial, Michael E. Whitman, Herbert J. Mattord
Journal of Cybersecurity Education, Research and Practice
Editorial for Volume 2023, Issue 2
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Journal of Cybersecurity Education, Research and Practice
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two programs offer a required course about terrorism. Given the fluid nature of terrorism and its threat to national infrastructure, the omission is concerning. It is recommended that NSA-certified cybersecurity programs begin implementing educational content that aim to teach about this emerging crime and justice issue. One suggestion is to embrace the …
Developing An Integrative Theoretical Framework For Electronic Business Value Optimisation In Botswana, Meduduetso Tsumake-Tsiang, Adheesh Budree
Developing An Integrative Theoretical Framework For Electronic Business Value Optimisation In Botswana, Meduduetso Tsumake-Tsiang, Adheesh Budree
African Conference on Information Systems and Technology
Organizations are trying to move quickly to adopt remote working policies into their organizations as to attract and retain top talent, reduce office space costs, and increase productivity. As many of these strategies were quickly adopted by South African ICT organizations during the COIVD-19 pandemic, organizations are still somewhat unclear on what their role is with regards to ensuring long term adoption of remote working. Thus, this study explored the role of the organization with regards to a work-from-home strategy. It was found that the organization is responsible for formalizing the chosen strategy, creating supportive policies, and adapting its management …
Social Media & Privacy: Understanding Privacy In The Age Of Content Creator Culture, Robert Tagoe, Raphael Amponsah, Emmanuel Awuni Kolog, Eric Afful-Dadzie
Social Media & Privacy: Understanding Privacy In The Age Of Content Creator Culture, Robert Tagoe, Raphael Amponsah, Emmanuel Awuni Kolog, Eric Afful-Dadzie
African Conference on Information Systems and Technology
In today's digital age, content creators are gaining public attention and becoming highly influential. With that increased influence, it is important to acknowledge the privacy concerns within this culture. This interpretive research study seeks to identify and understand the dynamics of privacy within the content creator culture. This research will leverage information from interviews with content creators from various social media platforms such as YouTube, Instagram, Facebook, and TikTok. Using theories to understand the phenomena, theories of privacy calculus, privacy paradox and self-disclosure, will be used to view how content creators define and navigate privacy, strategies employed to control personal …
Digital Transformation Of Smes Through Social Media, Georgette Eugenia Otoo, Raphael Amponsah, Eric Afful-Dadzie, Emmanuel Awuni Kolog
Digital Transformation Of Smes Through Social Media, Georgette Eugenia Otoo, Raphael Amponsah, Eric Afful-Dadzie, Emmanuel Awuni Kolog
African Conference on Information Systems and Technology
This research paper explores the strategic integration of social media platforms by Small and Medium-sized Enterprises (SMEs) in Low- and Middle-Income Countries (LMICs) beyond marketing. Drawing from Resource-Based View and Dynamic Capabilities theories, the study investigates how social media enhances management, coordination, and control functions. Through five diverse case studies from Ghana, findings reveal SMEs’ innovative use of platforms like Instagram, WhatsApp, Slack, and Trello. These platforms foster efficient internal communication, customer engagement, project management, and talent acquisition. Challenges such as technical expertise and dynamic digital landscapes are identified.
Information Technology Decision Makers’ Readiness For Artificial Intelligence Governance In Institutions Of Higher Education In South Africa, John Mangundu
African Conference on Information Systems and Technology
Artificial intelligence (AI) can enhance the educational experience for academics and students. However, research has inadequately examined AI ethics and governance, particularly in the higher education sector of developing economies such as South Africa. AI governance ensures that envisioned AI benefits are realized while reducing AI risks. Against this backdrop of huge research deficit, the current study reports on a qualitative exploratory study that investigates the state of readiness for AI governance and AI governance maturity in South African higher education institutions. Informed by the combination of the TOE framework, the traditional IT governance model and the adapted IT governance …
Responses To General Capabilities Framework For Tertiary Education, Tony Shannon
Responses To General Capabilities Framework For Tertiary Education, Tony Shannon
International Journal for Business Education
The Australian Government Department of Education, Skills and Employment (DESE) is consulting on how best to develop a general capabilities framework for tertiary education. This is being done with NOUS, a business management consultancy, and the Assessment Research Centre of the University of Melbourne
The Coaldrake And Joyce Reviews Into Australia's Tertiary Education Systems, Tony Shannon
The Coaldrake And Joyce Reviews Into Australia's Tertiary Education Systems, Tony Shannon
International Journal for Business Education
In October 2018 the Commonwealth Minister for Education, the Hon. Dan Tehan MP announced that Australia’s Higher Education Provider Category Standards will be reviewed to ensure the sector has the capacity to meet the evolving needs of students, employers and the wider community.
Continuing Professional Development And The Commercial Education Society Of Australia, Kathleen Mckenzie, Jacob Munday
Continuing Professional Development And The Commercial Education Society Of Australia, Kathleen Mckenzie, Jacob Munday
International Journal for Business Education
The Commercial Education Society of Australia (CESA) was founded in 1910 and incorporated in 1911 as a non-profit company limited by guarantee. The mission of the Society is to provide students with the opportunity to raise their standards of education so that they can take advantage of the opportunities for further education and employment. This is reflected in the Society’s coat-of-arms ‘Digne Ambulate’ — walk worthily.
Group Learning And Tutoring, Tony Shannon
Group Learning And Tutoring, Tony Shannon
International Journal for Business Education
There are some academic subjects, particularly problem-based units, where group learning is beneficial, particularly as so much professional work is conducted in groups, whether formal or informal. These notes are merely an introductory outline to what can be an important element of some learning and assessment.
Irish Catholic History In Australia's Oldest Secretarial College, David Ryan
Irish Catholic History In Australia's Oldest Secretarial College, David Ryan
International Journal for Business Education
Patrick Careers Academy, founded in 1923 by the Sisters of Mercy as St Patrick’s Commercial College began as a way of helping young working class women gain employment in Sydney’s corporate world with training as personal assistants and legal secretaries.
Academic Freedom And Academic Integrity, Tony Shannon
Academic Freedom And Academic Integrity, Tony Shannon
International Journal for Business Education
The demand for freedom, an intense desire in fact, is a positive characteristic of our era, but human freedom does not mean acting in accord with one’s caprices or without restraint by any law. Recent controversaries at universities in Queensland have raised questions about mandating the French Review in Australian higher education as the review deals with the related issues of academic freedom and integrity.
Affective And Psychomotor Taxonomies, Tony Shannon, Melvin Leong
Affective And Psychomotor Taxonomies, Tony Shannon, Melvin Leong
International Journal for Business Education
Taxonomies can sensitise teachers to develop their learners’ applications of their knowledge and skills in depth when utilised judiciously in preparing experiences for learning and assessments for evaluation (Tyszko and Sheets, 2019).
Comments On Teqsa Discussion Paper: "Making And Accessing Claims Of Scholarship And Scholarly Activity", No Author
International Journal for Business Education
The Background and initial discussion are extracts from the TEQSA paper dated 12 October 2020, as are the subsequent statements of Principles and associated Questions. The layout here is to make it easier for interested staff to comment and contribute to our response to TEQSA if it is eventually deemed appropriate and useful to make such a submission. In any case, it is useful to have a discussion among colleagues on this important topic and what the regulator expects from providers and their staff.