32,896 research outputs found

    Benefits, Limitations and Best Practices of Online Coursework…Should Accounting Programs Jump on Board?

    Get PDF
    The evolution of online teaching has evolved as quickly and vivaciously as the adoption of the World Wide Web. While there were and are skeptics, research shows that not only is online learning more convenient and makes educational available anytime and anywhere, it has the potential, in some cases, to be an improved tool for educating. To ensure maximized learning outcomes, and to experience the blessing and not the curse of online coursework, it is critical that universities embrace it wholeheartedly and follow online pedagogical best practices in developing and executing online courses. In addition, there are some courses where special forethought should be made to ensure online learning is effective. Courses that are more computational necessitate this consideration. This document serves to provide strategies and best practices on how to obtain excellence and maximized outcomes from online education. It examines research to date and outlines: the benefits and challenges of online learning, strategies and best practices for online educating, and considerations for online accounting coursework

    Towards an understanding of corporate web identity

    Get PDF
    No abstract available

    EXTENDED ENTERPRISE AND INFORMATION SYSTEMS GOVERNANCE IN AN INTER-ORGANIZATIONAL CONTEXT

    Get PDF
    Flexibility, openness, and cooperation are fundamental tendencies that positively mark the ensemble of private and public sector organizations. For a sustainable development in a more and more complex globalized and competitive business environment, the ee-business, extended enterprise, inter-enterprise cooperative information systems, workflow, corporate governance, IS governance

    Secure Cloud-Edge Deployments, with Trust

    Get PDF
    Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for IoT applications, as well as infrastructure security capabilities, in a simple and declarative manner, and to automatically obtain an explainable assessment of the security level of the possible application deployments. The methodology also considers the impact of trust relations among different stakeholders using or managing Cloud-Edge infrastructures. A lifelike example is used to showcase the prototyped implementation of the methodology

    Updated taxonomy for the network and service management research field

    Get PDF
    Network and service management is an established research field within the general area of computer networks. A few years ago, an initial taxonomy, organizing a comprehensive list of terms and topics, was established through interviews with experts from both industry and academia. This taxonomy has since been used to better partition standardization efforts, identify classes of managed objects and improve the assignment of reviewers to papers submitted in the field. Because the field of network and service management is rapidly evolving, a biyearly update of the taxonomy was proposed. In this paper, a large-scale questionnaire is presented which was answered by experts in the field, evaluating the relevance of each individual topic for the next five years. Missing topics, which are likely to become relevant over the next few years, are identified as well. Furthermore, an analysis is performed of the records of papers submitted to major conferences in the area. Based on the obtained results, an updated version of the taxonomy is proposed.Peer ReviewedPostprint (author's final draft

    Financial Innovation

    Get PDF
    • …
    corecore