917 research outputs found

    More Than Just Bad Blood: Reasonably Assessing Fear of AIDS Claims

    Get PDF

    Leveraging Program-Level Transparency as a Communication Strategy for Sustainability through Recruitment and Retention

    Get PDF
    This article demonstrates how principles of Transparency in Learning and Teaching (TILT) can be extended to academic programs to create a communication strategy that promotes recruitment and retention, particularly in liberal arts programs. Analysis of program-level transparency at two schools demonstrates how faculty can leverage TILT at that level to communicate program benefits to various stakeholders, supporting program sustainability through recruitment and retention

    An Exploratory Study of the Approach to Bring Your Own Device (BYOD) in Assuring Information Security

    Get PDF
    The availability of smart device capabilities, easy to use apps, and collaborative capabilities has increased the expectations for the technology experience of employees. In addition, enterprises are adopting SaaS cloud-based systems that employees can access anytime, anywhere using their personal, mobile device. BYOD could drive an IT evolution for powerful device capabilities and easy to use apps, but only if the information security concerns can be addressed. This research proposed to determine the acceptance rate of BYOD in organizations, the decision making approach, and significant factors that led to the successful adoption of BYOD using the expertise of experienced internal control professionals. The approach and factors leading to the decision to permit the use of BYOD was identified through survey responses, which was distributed to approximately 5,000 members of the Institute for Internal Controls (IIC). The survey participation request was opened by 1,688 potential respondents, and 663 total responses were received for a response rate of 39%. Internal control professionals were targeted by this study to ensure a diverse population of organizations that have implemented or considered implementation of a BYOD program were included. This study provided an understanding of how widely the use of BYOD was permitted in organizations and identified effective approaches that were used in making the decision. In addition, the research identified the factors that were influential in the decision making process. This study also explored the new information security risks introduced by BYOD. The research argued that there were several new risks in the areas of access, compliance, compromise, data protection, and control that affect a company’s willingness to support BYOD. This study identified new information security concerns and risks associated with BYOD and suggested new elements of governance, risk management, and control systems that were necessary to ensure a secure BYOD program. Based on the initial research findings, future research areas were suggested

    Santee Frazier folio

    Get PDF
    Ventilator series is a part of a longer work-in progress; a chiaroscuro where one image seems to black out as another presses through

    The Slaying of Pio-Pio-Mox-Mox

    Get PDF
    "…All this he accomplished in a moment by the expedient of bending a rifle barrel over the head of Pio-Pio-Mox-Mox, Chief of the Walla Wallas.

    The Battle of La Glorieta Pass

    Get PDF

    Lawyer of the Nez Perces

    Get PDF
    "Lawyer was wiser. He followed the way of peace, patiently assisting the induction of his people into the white man's cultural heritage.

    Stendhal's character trios :

    Get PDF

    Egan of the Piutes

    Get PDF
    "Egan himself was neither Bannock nor Piute, but a Cayuse born. Captured as a child by Shoshone raiders, he had found a home among the Paviotso, commonly known as Piutes, Paiutes, or Pah Utes.
    • …
    corecore