Main Nav

Search results

Showing 81 - 90 of 1635 Results

Sort by:

Evidence of Learning: A Framework for Facilitation
October 12, 2015

Presenting evidence of learning should be a hallmark of society's increasing orientation toward lifelong learning and transparency of capabilities. Executing this vision requires a far-rangi…

The Tech Talent Wars and #WomenInTech
October 12, 2015

To win the war for top IT talent, college and university leaders need a strategy for coming out ahead in one key battle: the paucity of women earning degrees in technology and pursuing related ca…

Digital Game-Based Learning: Still Restless, After All These Years
October 12, 2015

We have the evidence and the design tools to demonstrate that digital games are powerful learning tools. Whether we choose to take advantage of the opportunity before us is a completely different…

EDUCAUSE Review Print Edition Volume 50 Number 6 November/December 2015
October 12, 2015

This is the full issue of EDUCAUSE Review Print Edition Volume 50 Number 6 November/December 2015 This is the full issue of EDUCAUSE Review Print…

Creating a Culture of Cybersecurity at Work
October 9, 2015

Security awareness is foundational to creating a culture of cybersecurity. While technologies are evolving to stop advanced attacks, the human element is essential to protecting data in the workp…

You're an Important Piece of the Puzzle
October 8, 2015

In case you haven't heard (perhaps you've been working remotely on the moon), cybersecurity has become a huge issue for all of us. The security professionals tasked with keeping institu…

The Partnership Begins at Home
October 7, 2015

For the CIOs reading this: Who is responsible for information security in your organization? Hopefully you can respond with a name — there is plenty of evidence that hiring a chief information …

Three Steps to Create a Campus Cloud Cybersecurity Culture
October 6, 2015

Celebrated every October, National Cyber Security Awareness Month (NCSAM) was created as a collaborative effort between government and industry to ensure everyone has the resources they need to s…

Overcoming Social Engineering through Cultural Change
October 5, 2015

More than a connected nation, we are now a connected world. Data in one corner of the planet can easily be accessed by someone halfway around the globe in a matter of seconds with just a few simp…

On the Move with Two-Factor Authentication
October 1, 2015

You get the attention of your users when they have to go through a mandated password change cycle to get to IT resources. You get extra attention when they remind you that they were just fine for…