Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Social and Behavioral Sciences
Color Me Calm: Adult Coloring And The University Library, Heidi Blackburn, Claire E. Chamley
Color Me Calm: Adult Coloring And The University Library, Heidi Blackburn, Claire E. Chamley
Kansas Library Association College and University Libraries Section Proceedings
An activity often reserved for children, coloring books for adults rose from hipster trend to global phenomenon beginning in 2013. Adults flocked to the activity for a variety of reasons, including stress relief, socialization, a way to unplug from technology or even as a way to gain social status by appearing trendy. Participants reported enjoying the tactile, interactive nature of the books as a respite from constant screen time. Coloring books became big business for craft suppliers and bookstores by 2015. Coloring books shot to the top of the Best Sellers list on Amazon and were prominently displayed in book …
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
Journal of International Technology and Information Management
The explosive growth and rapid proliferation of smartphones and other mobile
devices that access data over communication networks has necessitated advocating
and implementing security constraints for the purpose of abetting safe computing.
Remote data access using mobile devices is particularly popular among students at
institutions of higher education. To ensure safe harbor for constituents, it is
imperative for colleges and universities to establish, disseminate, and enforce
mobile device security artifacts, where artifacts is defined as policies, procedures,
guidelines or other documented or undocumented protocols. The purpose of this
study is to explore the existence of, specific content of, and the …