How to make good Elearning succeed in your Organization

Written by Michelle Johnston


1.What will good ELearning do for your Organization?

According to a study byrepparttar IDC, worldwide spending on ELearning will surpass $23 billion byrepparttar 118769 end of 2004. However, withrepparttar 118770 current economic climate, companies are less inclined to spend money unless they get a great return on their investment. So exactly why is ELearning so popular?

1. What will good ELearning do for your organization?

ELearning can be much more effective, and cheaper than more traditional learning methods for many reasons.

ELearning can tailor itself in ‘real time’ in response to student progress. Immediate feedback allowsrepparttar 118771 student’s progress to be monitored andrepparttar 118772 learning materials to be automatically adjusted accordingly. The student can also monitor his/her own progress in an ELearning environment much more easily than in traditional learning environments.

Elearning can employ all ofrepparttar 118773 senses inrepparttar 118774 learning process, by usingrepparttar 118775 latest technologies. People remember 10 percent of what they read, 20 percent of what they hear, 30 percent of what they see and 50 percent of what they hear and see. Because different people have different learning styles, allowing student to receive information using more than one ofrepparttar 118776 senses increases recall greatly.

While few organizations find ELearning courses cheaper to develop than traditional methods, many find them cheaper to deliver once they are built . Once an ELearning course has been built, it can be reused day in, day out and can be used to reach a potentially unlimited audience withoutrepparttar 118777 costs associated with more traditional methods of learning – for example, there is no need to pay an instructor, rent out a room, pay for lunch forrepparttar 118778 students or pay any travel costs involved in running a course.

A Student can chooserepparttar 118779 most convenient time and place in which to learn, and can also work at his/her own pace. For an organization, this can mean reduced cost of training, asrepparttar 118780 student does not have to take time off of work to attend training and there are no hotel / food / travel costs involved. Forrepparttar 118781 student, this can mean more convenience. ELearning is always available, and can be fit around a student’s family and working commitments. Many students also tend to feel less intimidated by ELearning than they do by having to face other students in a classroom atmosphere, and compare their own progress to that of others inrepparttar 118782 classroom who may be of a different competency level, age, race or gender.

ELearning courses can be kept up to date much more easily (and more cheaply) than traditional paper-based courses. Only one copy ofrepparttar 118783 course needs to be updated – course binders, books, and other materials do not have to be re-printed each time there is an update - and ELearning can thus much more easily and cheaply include relevant information fromrepparttar 118784 student’s everyday life, fromrepparttar 118785 latest news events or developments within an industry or academic field. This can makerepparttar 118786 courses more relevant, timely and more interesting torepparttar 118787 student.

An ELearning program can help companies successfully train people in specific skills for specific performances (Study-Center.com offers ELearning in specialist skills torepparttar 118788 Electricity industry as well as general courses in subjects like Telephone skills) while providing increased access to information tools for decision-making and general skills that effect overall employee performance.

Very importantly, ELearning is widely available to all, often extremely cheaply (sometimes even free!). With increasing numbers of people having direct access torepparttar 118789 web (72% of employees now have access to a computer with internet access as part of their jobs ), a wide number of courses on a wide number of subjects is available, making it possible for people in remote locations and people with disabilities to participate in ELearning much more easily.

Forrepparttar 118790 organization that developed a good quality ELearning course inrepparttar 118791 first place, it means extra income from that course, as well asrepparttar 118792 reputation for providing good quality ELearning content outside ofrepparttar 118793 organization. Forrepparttar 118794 purchaser of such ELearning content, it provides a cheaper way to develop ELearning content. And forrepparttar 118795 LMS host (in this case, Blackboard.com) it makes their LMS system more appealing to those who wish to use an LMS as they know they can choose from a wealth of ELearning content that has already been developed.

2.How can you ensure that good ELearning succeeds?

In order to ensure that good ELearning succeeds, it is firstly important to select one LMS that your organization will standardize upon and work only with that. It is very costly to support many different products, and it is far easier to provide technical support if only one tool is used organization-wide. It is also easier for students and tutors to use a single product so thatrepparttar 118796 tool itself does not obstructrepparttar 118797 learning process.

It is important to help students to feel comfortable withrepparttar 118798 ELearning system early on. Where possible, it is good to have very good help / support facilities – or, ideally, live online helpers to interact with students - to help them to get started so that they do not grow frustrated atrepparttar 118799 system or find that they are not able to use it. Drop out rates are at their highest withinrepparttar 118800 first use of an ELearning system, so try to ensure that your students have a good experiencerepparttar 118801 first time!

Live online interaction with other students and/or tutors at pre-appointed times tends to increase retention rates also. This can takerepparttar 118802 form of ‘online classrooms’, in whichrepparttar 118803 tutor reviews material for that week/module withrepparttar 118804 students, or ‘café’ type chatrooms in which students can chat informally about course subjects etc.

Having an ‘online classroom’ or ‘webinar’ to attend each week/month can providerepparttar 118805 incentive for students to go online more often, especially if those sessions improverepparttar 118806 student’s chances of passing tests, exams or coursework, and ifrepparttar 118807 students can ask questions in a question/answer session while online. Incentive to attend such events increases ifrepparttar 118808 coursework, tests or exams are mandatory in order to passrepparttar 118809 course.

Any online events should be timed to be convenient torepparttar 118810 maximum number of students in order to be effective – students have lives offline and may live within different timezones so it is important to makerepparttar 118811 course flexible enough to accommodate forrepparttar 118812 fact that students may also have work commitments, children or even be taking other ELearning courses. Transcripts of online sessions can allow students who missedrepparttar 118813 sessions to catch up on anything they missed and in some cases it is possible to rerunrepparttar 118814 online session at different times for different timezones or provide access to a recording of a webinar that can be re-run at any time.

Lisa Currin, in her special to ELearn magazine entitled ‘Feeling Groovy’ , says that Elearning must elicit positive emotions in order to succeed. While this is true, any good psychologist knows that it is easier to motivate human beings to avoid pain than it is to motivate them simply by giving them pleasure !

ESecurity

Written by Michelle Johnston


ESecurity

Current Situation

Up until recently, security was very much like teenage sex in that it was typified by lots of talk but no action. Companies declared their sites as secure simply becauserepparttar credit card payment page was protected by SSL (Secure Socket Layer). Even now, there is an overwhelming sense of complacency acrossrepparttar 118768 industry.

However, Etailers, are reportedly still finding that web shoppers are still very concerned about security. It is becoming increasingly essential that Etailers gainrepparttar 118769 trust and confidence of their customers in order to gain competitive advantage over their competition, but also, simply to stay in business.

Withrepparttar 118770 increasing use of Ebusiness for enabling business processes and operations acrossrepparttar 118771 internet, it is critical for organizations to recognize information as a valuable business asset and implement controls to secure it, to ensurerepparttar 118772 privacy of their customer’s data,repparttar 118773 integrity of that data and to ensure that they do not lose it!

General Security Issues

The aim of a good security strategy for an Ebusiness organization should be to combine maximum flexibility, performance, and scalability withrepparttar 118774 highest availability and security. The goal of a security strategy is to protect information assets through:

•Authentication – identifyingrepparttar 118775 parties involved in communications and transactions •Access – provide access to appropriate levels of information (with as little inconvenience as possible) to those who should have access, but prevent access to anyone who should not have access, and prevent access beyondrepparttar 118776 level of information that is appropriate torepparttar 118777 user’s ‘class’ •Confidentiality – ensuring that information is not accessed by unauthorized parties •Non-Repudiation – ensuring that transactions, once committed, are legally valid and irrevocable •Availability – ensuring that transactions or communications can be executed reliably upon demand.

Top management needs to understand that security is a hygiene factor: when it is there, and is effective and efficient, people hardly notice it at all; however, when it is not there it can meanrepparttar 118778 end of business overnight. It is essential to get it right, particularly for transactions placed overrepparttar 118779 Internet.

Further, management needs to understand that security is a never-ending process. Security policies and measures should be under constant review, network support teams should monitor newsgroups etc for information aboutrepparttar 118780 latest threats to security (e.g.repparttar 118781 latest virus attacks, hackers , security loopholes in software products, etc), security audits must take place to ensure procedures are working, logs of unauthorized access should be reviewed, and disaster recovery plans should be tested out regularly.

Many companies have now either been bitten byrepparttar 118782 problems inherent in having no real built in security policies, or have seen media reports about others who have been bitten.

MSNBC reported cases in which large numbers of credit card numbers and associated information had been stolen from sites in March 2000. Visa had earlier announced that around half its disputes concern internet based credit card transactions, despite these only making up 2% of its total revenue . The Melissa virus caused an estimated $80 million damage, andrepparttar 118783 Love Bug similarly wreaked havoc acrossrepparttar 118784 world. Denial of Service attacks have hit big names like Amazon.com, Ebay and Yahoo, causing loss in terms of revenue and public image.

There is much evidence to suggest that reported cases are simplyrepparttar 118785 tip of a very large iceberg as many security breaches go unreported due torepparttar 118786 embarrassment caused by admitting to them andrepparttar 118787 risks to future business of doing so.

Forrepparttar 118788 consumer, there is not onlyrepparttar 118789 worry that personal information such as credit card data could be stolen, but there is alsorepparttar 118790 worry that anyone they appear to be dealing with onrepparttar 118791 internet could be untrustworthy – and even when dealing with a company known and trusted there isrepparttar 118792 risk that in realityrepparttar 118793 consumer is dealing with an imposter. Thus, it is up to those with integrity who are running websites to find ways to reassurerepparttar 118794 consumer that it is safe to use their websites – for example, by providing Digital Certificates verified by a trusted third party such as Verisign .

It is very difficult for Governments andrepparttar 118795 Legislation systems to protectrepparttar 118796 consumer from internet fraudsters and conmen because national boundaries are very difficult to establish or enforce onrepparttar 118797 internet as content is accessible from everywhere. The US and UK, among others, are investigatingrepparttar 118798 possibility of policingrepparttar 118799 internet using national ‘cybercrime units’. Financial regulators such asrepparttar 118800 SEC inrepparttar 118801 US andrepparttar 118802 FSA inrepparttar 118803 UK are looking at measures to help them in controlling websites within their own jurisdictions. International bodies likerepparttar 118804 OECD andrepparttar 118805 European Union are working on standards for Ecommerce to be implemented and enforced at a national level by governments, but progress is very slow because industry opposesrepparttar 118806 idea of government intervention, preferring to rely on self-regulation.

Procedures

At last, many large organizations are now taking security fairly seriously. However there is still a great deal of misunderstanding about what security really means for an organization that uses Internet technologies to trade.

Organizations deploying internet technologies tend to focus onrepparttar 118807 technologies rather thanrepparttar 118808 procedures behindrepparttar 118809 technologies. Having solid security procedures in place is often much more important thanrepparttar 118810 technology which is used to implement security. The benefits of using SSL to gather credit card information from a consumer overrepparttar 118811 web could be nullified if it is common practice withinrepparttar 118812 organization to subsequently email them from one department to another. Putting virus scanning technology into place in an organization is only useful ifrepparttar 118813 virus scanner is updated regularly as new viruses are found. Procedures are required to ensure thatrepparttar 118814 technologies are being used effectively to meetrepparttar 118815 organizational security goals.

Such procedures should include clear divisions of responsibility forrepparttar 118816 different areas of security: backup procedures, disaster recovery procedures, physical security (security card control, building security, etc), password procedures, system access levels and authorization procedures, virus control procedures, firewall policies, and all other traditional areas of security which an organization should have under control.

Procedures should ensure that whenever not in use, server consoles should be locked using passwords, that all access attempts to all systems are logged and audited and that passwords are not easily guessed and are changed regularly. They should ensure that all network systems and web servers are kept in secure locations, and that redundancy systems exist for all key hardware – not onlyrepparttar 118817 network systems themselves (including servers, firewalls, hubs and routers) but also air conditioning and power systems.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use