This book is designed to provide teachers and parents alike an insight into the bring-your-own-technology (BYOT) revolution sweeping across entire school communities in Australia, the US and UK, and explain the immense implications of these developments.
Where end-users once queued up to ask the IT department for permission to buy a new computer or a new version of software, they are now bypassing IT altogether and buying it on their own. From laptops and smartphones to iPads and virtually unlimited software apps, end-users have tasted their freedom and love it. IT will simply never be the same.Bri
Successfully lead your company through the worst crises with this first-hand look at emergency leadership Cyber security failures made for splashy headlines in recent years, giving us some of the most spectacular stories of the year. From the Solar Winds hack to the Colonial Pipeline ransomware event, these incidents highlighted the centrality of competent crisis leadership. Cyber Mayday and the Day After offers readers a roadmap to leading organizations through dramatic emergencies by mining the wisdom of C-level executives from around the globe. It’s loaded with interviews with managers and leaders who've been through the crucible and survived to tell the tale. From former FBI agents to Chief Information Security Officers, these leaders led their companies and agencies through the worst of times and share their hands-on wisdom. In this book, you’ll find out: What leaders wish they'd known before an emergency and how they've created a crisis game plan for future situations How executive-level media responses can maintain – or shatter – consumer and public trust in your firm How to use communication, coordination, teamwork, and partnerships with vendors and law enforcement to implement your crisis response Cyber Mayday and the Day After is a must-read experience that offers managers, executives, and other current or aspiring leaders a first-hand look at how to lead others through rapidly evolving crises.
Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones, tablets, laptops) to the workplace, and using those devices to access company resources such as email, file servers, and databases. BYOD presents unique challenges in data privacy, confidentiality, security, productivity, and acceptable use that must be met proactively by information security professionals. This report provides solid background on the practice, original research on its pros and cons, and actionable recommendations for implementing a BYOD program. Successful programs are cross-functional efforts including information technology, human resources, finance, legal, security, and business operating teams. This report is a valuable resource to any security professional considering a BYOD program. Bring Your Own Device (BYOD) to Work is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. - Presents research data associated with BYOD and productivity in the workplace - Describes BYOD challenges, risks, and liabilities - Makes recommendations for the components a clearly communicated BYOD program should contain
Textbooks are symbols of centuries-old education. They're often outdated as soon as they hit students' desks. Acting "by the textbook" implies compliance and a lack of creativity. It's time to ditch those textbooks--and those textbook assumptions about learning In Ditch That Textbook, teacher and blogger Matt Miller encourages educators to throw out meaningless, pedestrian teaching and learning practices. He empowers them to evolve and improve on old, standard, teaching methods. Ditch That Textbook is a support system, toolbox, and manifesto to help educators free their teaching and revolutionize their classrooms.
With 70 percent of organizations already adopting bring your own device (BYOD) and Gartner expecting this number to increase to 90 percent by the end of 2014, it is not a question of if, or when, it's a question of will you be ready.BYOD for Healthcare provides authoritative guidance to help you thrive during the healthcare BYOD (hBYOD) revolution.
"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." – Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.
Are other teachers using technology in their lessons? Are you letting your own students down by not harnessing the power of your students’ technology knowledge in your lessons? Is your school asking you to show where you are developing ICT in your subject teaching? Technology in your subject does not mean teaching databases, spreadsheets or word processing. Having technical knowledge is no longer sufficient or indeed necessary in today’s world – more important is the knowledge of how to advise and teach students to use technology efficiently and responsibly through their subject. Students faced with a ‘problem’ will need to hunt the internet for open source software, download apps and respond to the problem using technology as a problem solving tool. The scenarios are endless, but can be generated by the teacher - this could mean students publishing work through Amazon’s Kindle or keeping a blog within a class wiki. Teachers do not need to have technical knowledge; rather they need knowledge of trends and opportunities. They then need to blend their basic subject pedagogy within these new trends to contextualise ICT skills. This book looks at pedagogical approaches to using technology in the classroom that will help you to harness future trends, technology and software and embed them into your subject teaching. Full of practical advice, it illustrates how secondary teachers – of any discipline – can accelerate their students’ learning, progress and ability within their subject whilst developing the ICT skills needed in the workplace and society. Including case studies and examples throughout, chapters cover: Blended Learning (mixing traditional teaching methods with e-learning) Developing interactive students Mobile technologies Student safety online E-Portfolios and Virtual Learning Environments This timely new book will help you structure your teaching to harness the latest developments in technology in tandem with the students you teach.