Sarah M. North

Learn More
Behavioral therapy techniques for treating phobias often includes graded exposure of the patient to anxiety-producing stimuli (Systematic Desensitization). However, in utilizing systematic desensitization, research reviews demonstrate that many patients appear to have difficulty imaging the prescribed anxiety-evoking scene. They also express strong aversion(More)
Behavioral therapy techniques for treating phobias often includes graded exposure of the patient to anxiety-producing stimuli (Systematic Desensitization). However, in utilizing systematic desensitization, research reviews demonstrate that many patients appear to have difficulty in applying imaginative techniques. This chapter describes the Virtual Reality(More)
There are great challenges for the people involved in the management of information systems to take special measures to secure their information systems. This is more apparent in a university setting, specifically when providing computing resources to the diverse student population. The current paper reports on a study of computer security and ethics(More)
Massive Open Online Courses (MOOCs) are the next logical phase of distance learning rapidly appearing on the horizon. A recent worldwide survey shows that the adoption of MOOCs is on the rise. This study focuses on identifying and emphasizing the unique advantages of MOOCs and provides possible insights to better understanding of MOOCs as an evolutionary(More)
In today's global economy, information security and awareness is an absolutely essential component of any management information system. Furthermore, the importance of information security and awareness is even more vital in university environments. Like other organizations, universities provide users with access to an immense amount of information and(More)
The objective of this project was to investigate, build and develop Information Assurance (IA) capacity at consortium of colleges and universities. This primary objectives of this project were (i) develop Information Security (IS) modules that are geared towards lower level undergraduate courses; and (ii) incorporate early research experiences that are(More)