Technical problems deserve their own mention because when they occur they can have an immediate, massive impact on our students. According to research…Even the best-designed courses are not immune to technical difficulties (Lan et al. 2003)
Social media analytics is the art and science of extracting valuable hidden insights from vast amounts of semi-structured and unstructured social media data to enable informed and insightful decision-making. It is a science, as it involves syst
In today’s high tech world, Internet use has become a common part of everyday life. Senior citizens are one of the most vulnerable groups of Internet users who are prone to cyber-attacks. The purpose of the course is to provide seniors with an
The ability to share information has never been so easy.Websites, blogs and social media have made it tempting and easy to copy or link to images or video/music clips, which we come across on the Internet. However without permission this expo
Margaret Wheatley said, "Without reflection, we go blindly our way, creating more unintended consequences, and failing to achieve anything useful." In a world where educational paradigms are rapidly changing, curriculum and instruction shou
Welcome to INF 656 – Cybersecurity. The ability to secure information within a modern enterprise—large or small—is a growing challenge. Threats to information security are global, persistent, and increasingly sophisticated. Long gone are the da
I am Robin Saunders and I am the director of the graduate CIM Programs. I have been teaching for more than 30 years (YIKES) and teaching online for about 15 years. As the educational online community continues to grow, I would like to explore
The Toolkit is a repository of user-friendly tips, technology tools, training and resources. The goal is to identify, explain, develop, implement and support innovative technology and pedagogy for the enrichment of academic experiences.This to
This course is about examining the key components of enterprise business information technology and cybersecurity management. Focus of class discussions will be on practical problems, barriers, limitations, and mitigation strategies. Additional