639 research outputs found
Recommended from our members
Jake Zhu CD Spring 2007
Supports faculty to redesign or develop a course in ways that implement high-impact, evidence-based, and/or innovative teaching strategies to improve student learning
Recommended from our members
Designing a Class Activity to Enhance Business Students’ Learning of Management Information Systems
To understand what happened when students were given the power of being able to choose what to learn and how to learn, using a qualitative approach, this paper has evaluated a business classroom activity. Based on the philosophy of learning as a process, we have found that two students team up to work on an IT trend report and presentation is a meaningful learning experience. Students have brought a variety of new IT topics to the classroom that the textbook even does not cover. This exercise also offer three ways of learning, learning individually, learning from others and learning by doing, which support three learning outcomes: interaction, collaboration and critical thinking. The activity is also meaningful in that the process of learning is relevant to students as future managers and business professionals, and that it facilitates critical thinking. We conclude the paper with implications for and recommendations to researchers, educators and students as well as the challenges we, as educators, may face in the future
Recommended from our members
Corporate Blogs of 40 Fortune 500 Companies: Distribution, Categorization and Characteristics
This paper studies corporate blogs as virtual communities, focusing on the distribution, categorization and characteristics of 40 Fortune 500 Companies’ blogs. Firstly, the 40 corporate blogs were classified by industries to see which industries are active advocates of corporate blogs. Secondly, the 40 corporate blogs were first grouped in direct competitor clusters and then categorized into four types of virtual communities: 1) Community of interest, 2) Goal-oriented community of interest, 3) Learner’s community, and 4) Community of practice. Thirdly, eight common elements were identified and compared for each of the 40 corporate blogs to find out their major characteristics. Finally, the implications of this study and future research directions were outlined in the conclusion
Recommended from our members
Information Technologies and Elderly Care in China: A New Paradigm
China’s aged population has increased dramatically. Because of the one child policy, China now has fewer and fewer children able to support the elderly. The care of China’s elderly is a huge challenge which requires the exploration of all kinds of elderly care models through intelligence and information management technology advances. With the evolving field of Information Management and with the development of newer and cheaper technology, the time has come for a paradigm shift to be explored. A shift in the way China is managing its technology and culture expectations is necessary to address this unique need. This paper carefully explores possible paradigm shifts which include the combination of cultural expectations, integrating technology, government involvement, health care providers and information management.
The paradigm shift uses the work of Davila, Epstein and Shelton (2006) to help develop a Service Innovation paradigm working along with Business and Technology Innovations for the elderly in China
Probabilistic biases meet the Bayesian brain
Bayesian cognitive science sees the mind as a spectacular probabilistic inference machine. But Judgment and Decision Making research has spent half a century uncovering how dramatically and systematically people depart from rational norms. This paper outlines recent research that opens up the possibility of an unexpected reconciliation. The key hypothesis is that the brain neither represents nor calculates with probabilities; but approximates probabilistic calculations through drawing samples from memory or mental simulation. Sampling models diverge from perfect probabilistic calculations in ways that capture many classic JDM findings, and offers the hope of an integrated explanation of classic heuristics and biases, including availability, representativeness, and anchoring and adjustment
Recommended from our members
Online Privacy Policy of the Thirty Dow Jones Corporations: Compliance with FTC Fair Information Practice Principles and Readability Assessment
Privacy policy in corporation’s business refers to a statement or a legal document that discloses some or all of the ways a party gathers, uses, discloses and manages a customer or client\u27s personal data such as name, age, address, gender, email, etc. (“Privacy Policy,” 2012). In 1998, the United States Federal Trade Commission (FTC) reported a study of online privacy concerns to Congress, which described a widely-accepted Fair Information Practice Principles (FIPs) of Notice, Choice, Access, and Security (Landesberg, Levin, Curtin, & Lev, 1998). This project conducted a statistical study by examining the FIPs compliance for each Dow Jones Corporation’s (DJC’s) online privacy policy. In addition, a study by George Milne, Mary Culnan, and Henry Greene showed that online privacy had grown in length as well as had declined in readability (Milne, Culnan, & Greene, 2006). Therefore, this research assessed also the readability of DJC’s online privacy policy by measuring widely adopted Flesch Reading Ease Score (FRES) and Flesch-Kincaid Grade Level (FKGL). Furthermore, in order to better understand the practical situations regarding privacy concerns and policy readability from a customer’s point of view, a customer survey was given to business students at the College of Business and Public Administration at California State University, San Bernardino
Recommended from our members
The Price of Security: The Challenge of Measuring Business Value Investments in Securing Information Systems
With powerful regulations surrounding security and privacy of information, the authors attempt to identify challenges valuing information security investments. The authors examine three primary approaches to measuring information value: Perceived, Real, and Normative. Literature is reviewed and the approaches are examined in terms of their strengths and weaknesses in providing value measurements for secure information systems. A framework is presented to suggest at what level in an organization and in what situations these information value approaches are most suitable
Recommended from our members
A New Asset Type: Digital Assets
Is there a need for a new “asset” type? What are “digital materials?” Can digital materials be designated as “Digital Assets?” What is the driven source of the “Digital Asset?” Is the “Digital Asset” concept mature enough to be defined as a new asset type? For example, under what name or ownership should we regard all social media accounts (Facebook, Twitter, LinkedIn etc.), online photo albums(Flickr, Picasa etc.), blogs, domain names, websites, email accounts, smart phones or any information stored in the cloud or computers? In reality, digital images, photos, documents, audio and video files should be considered “assets” because they are real and contains monetary and personal values. In addition, what will happen to these “Digital Assets” after death? Does the “Digital Society” or “Cyber Citizenry” need better cyber law and regulations particularly related to the “Digital Assets” concept? Today, the concept of Digital Asset is real. However, it is not effectively defined and regulated by law and better regulation is necessary in order to protect people’s “Digital Assets” and rights. Similar to other asset types, people should be able to legally keep, transfer, use, sell or inherit “Digital Assets.” This study examined and elaborated on the “Digital Asset” concept and defined it as a new asset type titled “Digital Asset.
Sampling as a resource-rational constraint
Resource rationality is useful for choosing between models with the same cognitive constraints but cannot settle fundamental disagreements about what those constraints are. We argue that sampling is an especially compelling constraint, as optimizing accumulation of evidence or hypotheses minimizes the cost of time, and there are well-established models for doing so which have had tremendous success explaining human behavior
Recommended from our members
Developing a Metrics Framework for the Federal Government in Computer Security Incident Response
As technology advances and society becomes more dependent on information technology (IT), the exposure to vulnerabilities and threats increases. These threats pertain to industry as well as government information systems. There is, however, a lack in how we measure the performance and create accountability for computer security incident response (CSIR) capabilities. Many government organizations still struggle to determine what security metrics to use and how to find value within these metrics. To fill this apparent gap, a metrics framework has been developed for incident response to serve as an internal analysis, supporting continuous improvement in incident reporting and strengthening the security posture for an organization’s mission. The goal of this metrics framework for CSIR aims to provide a holistic approach towards security metrics, which is specific to incident reporting and promotes efforts of more practical and clear guidelines on measuring the computer security incident response team (CSIRT). An additional benefit to this project is that it provides middle management with a framework for measuring the results of incident reporting in a CSIR program
- …