NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Veltsos, Jennifer R. – Business Communication Quarterly, 2012
Forty-six states require organizations to notify users when personally identifiable information has been exposed or when the organization's data security measures have been breached. This article describes a qualitative document analysis of 13 data breach notification templates from state and federal agencies. The results confirm much of the…
Descriptors: Information Security, Compliance (Legal), Disclosure, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Hulsart, Robyn; McCarthy, Victoria – Journal of Continuing Higher Education, 2011
A simple Internet search of "academic dishonesty" reveals a continuing conversation among individuals within the academic community who are asking what academic dishonesty is, who is cheating, why students are cheating, and how we stop them from cheating. This article addresses these questions and provides a model for creating a culture of trust…
Descriptors: Trust (Psychology), Cheating, Integrity, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Blair, Anthony L. – Journal of Continuing Higher Education, 2010
The article addresses the effective use of full-time and part-time faculty in transforming an institutionalized marginalized professional studies unit into an academic unit with greater academic credibility, as perceived by traditional colleagues and accreditors. Recommendations are supported by a case study narrative from the experiences of the…
Descriptors: Learning Experience, College Faculty, Part Time Faculty, Accreditation (Institutions)