Subject Area: Business (1568)

save
save to

Please log in to save materials.

selected filters:
Increasing student engagement using podcasts - Case study

Increasing student engagement using podcasts - Case study

Download the supporting PDF file for this episode http://bit.ly/fEveZU from the Learning ... (more)

Download the supporting PDF file for this episode http://bit.ly/fEveZU from the Learning to Teach Online project website.This case study examines the use of simple audio podcasts in a fully online distance education class, as part of the DUCKLING research project conducted by the Beyond Distance Research Alliance at the University of Leicester in the United Kingdom. It discusses the benefits of using podcasts as part of an integrated online learning strategy in a distance learning context, and gives an overview of how podcasts were used to introduce concepts, provide support for assignments, and to give students direct feedback on their work. (less)

Subject:
Arts
Business
Humanities
Mathematics and Statistics
Science and Technology
Social Sciences
Material Type:
Case Study
Readings
Teaching and Learning Strategies
Video Lectures
Provider:
University of New South Wales (UNSW)
Provider Set:
Learning to Teach Online
Author:
Karin Watson
Simon McIntyre
Individuals, Groups, and Organizations, Fall 2006
Remix and Share

Individuals, Groups, and Organizations, Fall 2006

Develops basic concepts for understanding individual, group, and organizational behavior through critical ... (more)

Develops basic concepts for understanding individual, group, and organizational behavior through critical analysis of important works in the field. Areas covered: cognitive psychology, behavioral decision-making, group process and performance, and organizational culture and adaptation. Emphasizes use of behavioral science concepts for stimulating new and useful behavioral science research. Primarily for doctoral candidates in the Sloan School of Management. (less)

Subject:
Business
Material Type:
Full Course
Homework and Assignments
Syllabi
Provider:
M.I.T.
Provider Set:
MIT OpenCourseWare
Author:
Carroll, John S.
Induction guidance for social service employers in scotland
Remix and Share

Induction guidance for social service employers in scotland

Practical guidance on staff induction for the social services sector in Scotland. ... (more)

Practical guidance on staff induction for the social services sector in Scotland. This document is best viewed as a place to start in constructing your own induction arrangements and seeks to highlight the keys areas that induction should address and signpost readers to additional sources of advice and additional resources which can be used. The guidance in this resource has been developed with employers, for employers. The Scottish Social Services Council recognises that there are a range of approaches to induction in the sector. Employers are encouraged to adapt this guidance to the specific needs of their own workforce. (less)

Subject:
Business
Social Sciences
Material Type:
Instructional Material
Provider:
Scottish Social Services Council
Author:
Scottish Social Services Council
Influences On Corporate Governance
Remix and Share

Influences On Corporate Governance

Corporate governance and shareholder activism have gained in importance over recent years. ... (more)

Corporate governance and shareholder activism have gained in importance over recent years. This unit will enable you to consider the issues addressed by corporate governance. You will examine some of the recent scandals and the regulatory reactions to them, before looking at the elements that continue to drive this area. (less)

Subject:
Business
Material Type:
Activities and Labs
Readings
Syllabi
Provider:
Open University
Provider Set:
Open University OpenLearn
Influences on Accounting Regulation
Remix and Share

Influences on Accounting Regulation

Financial reporting is a complex issue. This unit looks at the historical ... (more)

Financial reporting is a complex issue. This unit looks at the historical development of financial regulation and reporting across Europe and the world. You will also examine how both Anglo-Saxon and 'commercial code' accounting have expanded to become the two main accounting systems used today. (less)

Subject:
Business
Material Type:
Activities and Labs
Readings
Syllabi
Provider:
Open University
Provider Set:
Open University OpenLearn
Information Security (06:02): Physical Security

Information Security (06:02): Physical Security

The act of physically protecting the computers. The first rule of any ... (more)

The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access to it. If a bad guy can get their hands on the computer assume they will be able to gain access to all data contained within. (less)

Subject:
Business
Science and Technology
Material Type:
Video Lectures
Provider:
Mr. Ford's Class
Author:
Scott Ford
Information Security (06:03): Authentication

Information Security (06:03): Authentication

Our third video in our Information Security series (part of the Introduction ... (more)

Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are There are three forms of authentication •Something you know •Something you have •Something about you (less)

Subject:
Business
Science and Technology
Material Type:
Video Lectures
Provider:
Mr. Ford's Class
Author:
Scott Ford
Information Security (06:04): Protecting Your Data

Information Security (06:04): Protecting Your Data

This video focuses on date protection. We look at how to migrate ... (more)

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive. Data is always priceless Three topics: -Data migration -Data backup -Data disposal (less)

Subject:
Business
Science and Technology
Material Type:
Video Lectures
Information Security (06:05): Network Security

Information Security (06:05): Network Security

Steps taken to protect computer networks. We cover permissions, user policies (especially ... (more)

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security. Links from Video: -The System Administrator Song http://youtu.be/OpGN3oT1thA (less)

Subject:
Business
Science and Technology
Material Type:
Video Lectures
Provider:
Mr. Ford's Class
Author:
Scott Ford
Information Security (06:06): Internet Security

Information Security (06:06): Internet Security

Our 6 video in the Information Security series (part of Introduction to ... (more)

Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security. Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall. (less)

Subject:
Business
Science and Technology
Material Type:
Video Lectures
Provider:
Mr. Ford's Class
Author:
Scott Ford
Information Security (06:07): Malware

Information Security (06:07): Malware

Video 7 of our information security series (part of Introduction to Computers) ... (more)

Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware. Links from Video: -AVG by Grisoft: http://free.avg.com/us-en/homepage -AVAST: http://www.avast.com -ClamWin: http://www.clamwin.com/ -Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download (less)

Subject:
Business
Science and Technology
Material Type:
Video Lectures
Provider:
Mr. Ford's Class
Author:
Scott Ford
Information Security (06:08): Social Engineering

Information Security (06:08): Social Engineering

Our last video in the Information Security lesson covers my favorite topic, ... (more)

Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing. I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy. Links from Video: •Internet Storm Center: https://isc.sans.edu/ •SNORT: https://www.snort.org/ •Security Now: http://twit.tv/sn •Internet Crime Complaint Center: http://www.ic3.gov/default.aspx •Hak5: http://hak5.org/ •Facecrooks (facebook.com/Facecrooks) (less)

Subject:
Business
Science and Technology
Material Type:
Video Lectures
Provider:
Mr. Ford's Class
Author:
Scott Ford
Information Systems: A Manager's Guide to Harnessing Technology
Remix and Share

Information Systems: A Manager's Guide to Harnessing Technology

Information Systems: A Manager’s Guide to Harnessing Technology V1.2 is intended for ... (more)

Information Systems: A Manager’s Guide to Harnessing Technology V1.2 is intended for use in undergraduate and/or graduate courses in Management Information Systems and Information Technology.Version 1.2 of John's book retains the same structure and theory of version 1.1, but refreshes key statistics, examples, and brings case material up to date (vital when covering firms that move as fast as Facebook, Google, and Netflix). Adopting version 1.2 guarantees your students will have the most current text on the market, drawing real and applicable lessons from material that will keep your class offerings current and accessible.One of BusinessWeek’s "Professors of the Year", John Gallaugher of Boston College, brings you a brand new Management Information Systems textbook that teaches students how he or she will experience IS from a Managers perspective first hand through interesting coverage and bleeding-edge cases.Get involved with John's community by visiting and subscribing to his blog, The Week In Geek, where courseware, technology and strategy intersect and joining his Ning IT Community site where you can get more resources to teach Information Systems.Shockingly, at a time when technology regularly appears on the cover of every major business publication, students find IS among the least appealing of management disciplines.The teaching approach in Information Systems: A Manager’s Guide to Harnessing Technology V 1.2 can change this. The text offers a proven approach that has garnered student praise, increased IS enrollment, and engaged students to think deeper and more practically about the space where business and technology meet. Every topic is related to specific business examples, so students gain an immediate appreciation of its importance. Rather than lead with technical topics, the book starts with strategic thinking, focusing on big-picture issues that have confounded experts but will engage students. And while chapters introduce concepts, cases on approachable, exciting firms across industries further challenge students to apply what they've learned, asking questions like:Why was NetFlix able to repel Blockbuster and WalMart? How did Harrah's Casino's become twice as profitable as comparably-sized Caesar's, enabling the former to acquire the latter? How does Spain's fashion giant Zara, a firm that shuns the sort of offshore manufacturing used by every other popular clothing chain, offer cheap fashions that fly off the shelves, all while achieving growth rates and profit margins that put Gap to shame? Why do technology markets often evolve into winner-take-all or winner take-most scenarios? And how can managers compete when these dynamics are present? Why is Google more profitable than Disney? How much is Facebook really worthThe Information Systems course and discipline have never seemed more relevant, more interesting, and more exciting. Gallaugher's textbook can help teachers make students understand why. (less)

Subject:
Business
Science and Technology
Material Type:
Textbooks
Provider:
University of Minnesota
Provider Set:
University of Minnesota - Open Academics Textbooks
Author:
John Gallaugher
Information Systems and Strategy
Remix and Share

Information Systems and Strategy

This page contains a table of contents that gives an overview of ... (more)

This page contains a table of contents that gives an overview of each session and links to its associated web page, a list of text books that are suitable for this course and a note about how to obtain data and articles for the course. It also contains a link to further information on the assignment. (less)

Subject:
Business
Material Type:
Homework and Assignments
Lecture Notes
Readings
Provider:
Euromed Marseille, France
Provider Set:
Individual Authors
Author:
Chris Kimble
Information Technology Essentials, Spring 2005
Remix and Share

Information Technology Essentials, Spring 2005

Subject covers technology concepts and trends underlying current and future developments in ... (more)

Subject covers technology concepts and trends underlying current and future developments in information technology, and fundamental principles for the effective use of computer-based information systems. Special emphasis on networks and distributed computing, including the web. Other topics include: hardware and operating systems, software development tools and processes, relational databases, security and cryptography, enterprise applications and business process redesign, and electronic commerce. Hands-on exposure to Web, database, and graphical user interface (GUI) tools. Primarily for Sloan master's students. (less)

Subject:
Business
Material Type:
Assessments
Full Course
Homework and Assignments
Lecture Notes
Syllabi
Provider:
M.I.T.
Provider Set:
MIT OpenCourseWare
Author:
Malone, Thomas
Information Technology I, Spring 2003
Remix and Share

Information Technology I, Spring 2003

Broad coverage of technology concepts underlying modern computing and information management. Topics ... (more)

Broad coverage of technology concepts underlying modern computing and information management. Topics include computer architecture and operating systems, relational database systems, graphical user interfaces, networks, client/server systems, enterprise applications, cryptography, and the web. Hands-on exposure to internet services, Microsoft Access database management system, and Lotus Notes. Information Technology I helps students understand technical concepts underlying current and future developments in information technology. There will be a special emphasis on networks and distributed computing. Students will also gain some hands-on exposure to powerful, high-level tools for making computers do amazing things, without the need for conventional programming languages. Since 15.564 is an introductory course, no knowledge of how computers work or are programmed is assumed. (less)

Subject:
Business
Material Type:
Activities and Labs
Full Course
Homework and Assignments
Lecture Notes
Syllabi
Provider:
M.I.T.
Provider Set:
MIT OpenCourseWare
Author:
Dellarocas, Chrysanthos
Information Technology as an Integrating Force in Manufacturing, Spring 2003
Remix and Share

Information Technology as an Integrating Force in Manufacturing, Spring 2003

Focus on the key role that information technology plays in enabling organizational ... (more)

Focus on the key role that information technology plays in enabling organizational change and integration, especially in manufacturing. Topics include: trends in core technologies, including computer hardware, software, communications, and networks; the development and evolution of the internet and web; business models for electronic commerce; reinventing business processes and supply chain management; evaluating and managing the use of advanced information technologies in manufacturing; and new technology-enabled forms of working and organizing. In virtually every industry and every firm, information technology is driving change, creating opportunities and challenges. Leaders who don't understand at least the fundamentals of information systems will be at a strategic disadvantage. This course provides broad coverage of technology concepts and trends underlying current and future developments in information technology, and fundamental principles for the effective use of computer-based information systems. There will be a special emphasis on manufacturing. Information Systems topics that will be covered include networks and distributed computing, including the World Wide Web, hardware and operating systems, software development tools and processes, relational databases, security and cryptography, enterprise applications, B2B, the semantic web and electronic commerce. Sloan LFM students with an interest in Information Systems are encouraged to register for this course. (less)

Subject:
Business
Material Type:
Full Course
Homework and Assignments
Lecture Notes
Syllabi
Video Lectures
Provider:
M.I.T.
Provider Set:
MIT OpenCourseWare
Author:
Subirana, Brian
Innovative Businesses and Breakthrough Technologies - The Legal Issues, Fall 2004
Remix and Share

Innovative Businesses and Breakthrough Technologies - The Legal Issues, Fall 2004

15.616 is an introduction to business law which covers the fundamentals, including ... (more)

15.616 is an introduction to business law which covers the fundamentals, including contracts, liability, regulation, employment, and corporations, with an in-depth treatment of the legal issues relating to breakthrough technologies, including the legal framework of R&D, the commercialization of new high-technology products in start-ups and mature companies, and the liability and regulatory implications of new products and innovative business models. There is extensive attention to national and international intellectual property protection and strategies. Examples are drawn from many industries, including information technology, communications, and life sciences. (less)

Subject:
Business
Material Type:
Activities and Labs
Full Course
Homework and Assignments
Syllabi
Provider:
M.I.T.
Provider Set:
MIT OpenCourseWare
Author:
Akula, John L.