Sunday, December 29, 2019

Leadership Skills At The County Public Schools Essay

Introduction Clinical practice is an excellent opportunity that instills the leadership skills especially as a P-20 leader for the days to come. I am learning new things every day from my school system that provides immense experience. And I strongly believe that getting an experience from such an educational system by following the district’s administrative leaders enhanced my P-20 leadership experiences in different ways. Rationale for Site and Supervisor Selection The site for the clinical practice that I have chosen is Union County Public schools (UCPS), Morganfield, Kentucky. UCPS is a small rural school district comprised of one high school, one middle school, three elementary schools, one learning academy and a vocational school. The district has approximately 2400 students. The school district administration includes superintendent, assistant superintendent, directors of various administrative departments and secretaries. The school district board governs the district’s policies, strategic planning, and overall functioning of the UCPS along with the dynamic leadership of the district superintendent. As a school district, currently UCPS serves the areas of Morganfield, Sturgis, Waverly and Uniontown. 86% of the student population is Whites, 13% is Afro-Americans and 1% is of Hispanics and Asians. The student teacher ratio is 16:1 which is lower than the state average. Being a part of the district as an educator for the last seven years, in selecting the placementShow MoreRelatedRole Of Social Media On Classroom1390 Words   |  6 Pagesinstructors can foster collaboration and discussion, create meaningful dialogue, exchange ideas, and boost student interaction. Enhance Student Engagement Social media is an effective way to increase student engagement and build better communication skills. Students who rarely raise a hand in class may feel more comfortable expressing themselves on Facebook, Twitter, or YouTube. Social networking platforms enable teachers to establish â€Å"back channels† that foster discussion and surface ideas that studentsRead MoreThe Situational Approach And Contingency Theories Of Leadership830 Words   |  4 Pagesapproach and contingency theories of leadership. As looked through various theories, I found the situational approach theory and the contingency theory to be particularly interesting. As the eldest sibling, I have always thought of myself as some type of â€Å"leader†, often making decisions and taking the initiative. As I grew older, I realized that there were situations where there were people better prepared for various challenges. Consequently, I found myself in leadership positions at diffe rent locationsRead MoreMy Experience At 25 Middle School1444 Words   |  6 Pagescommunity in Wilmington, NC. In the fall of 2011 Williston middle school offered me a Tennis Coach position which I readily accepted. This opportunity opened my eyes to the world of education and the families who function within in it. Teaching tennis to 25 middle school girls was no menial task. A small minority had tennis experience while the majority of players were simply looking for something to occupy their time after school. Also, there were huge socioeconomic disparities among the childrenRead MoreReflection Paper On Personal Leadership1339 Words   |  6 PagesPERSONAL LEADERSHIP REFLECTION PAPER FIRST SERGEANT JERRY D. HOLEMAN INDIANA STATE POLICE SESSION: 270 SECTION: 5 I am excited to reflect on my personal leadership style and how I got where I am today. I will discuss and use examples from my past experiences from the United States Marine Corps, as a coach, community leader, and within the Indian State Police. As a United States Marine for eight years, I have obtained many leadership qualities, such as integrity, loyalty, unselfishness, sacrificeRead MoreMy High School Of Business Administration974 Words   |  4 PagesThroughout my entire high school life I have always chosen different career choices. At a time I wanted to be a lawyer, physical therapist, pharmacist, and an athletic trainer. I didn’t choose any of them either because it too many years in school to complete or centered on a subject that wasn’t my strong suit. I chose to major in Business Administration with a concentration in finances because I always imaged myself in an office setting holding a high position especially as a young women. OnceRead MoreAn Acronym For Good Love Intentionally Operating For Noelle Is A Family Public, Non Profit, 501 Essay755 Words   |  4 PagesIntentionally Operating for Noelle is a family public, non-profit, 501(c)(3) charity base organization. (Tax ID # 47-5245075) G.LION Inc. promotes positive structure and organization skills in children based in King William County, VA and surrounding counties. G.LION Inc. strives in providing culturally sensitive programs and services to enhance the understanding of the basic educational and functional life skills in all youth, including the at-risk in King William County and surrounding areas. OrganizationalRead MoreHagerstown Community College Essay Sample993 Words   |  4 PagesCommunity College (HCC) is a public, not for profit, two-year college located in Washington County Maryland. HCC is one of the first colleges in Maryland that started by offering mostly evening classes. Today, the campus offers over 100 programs of study on its 319-acre campus consisting of associate degrees, certifications, and non-credit continuing education courses. HCC reaches out to four states for recruitment purposes: Maryland (specifically Washington County), Pennsylvania (mostly FranklinRead MoreCrisis Management Response Plan Essay1427 Words   |  6 Pagesstudents during evacuation emergencies. Administrators work with teachers, students, parents, law enforcement officers, business and community members, to develop an effective emergency and crises plan. The administrator provides leadership in developing and monitoring the school safety plan and also establishes procedures for e mergency evacuation and crisis management at different stages of the plan. However, an effective leader develops a comprehensive prevention education plan, and regularly reviewsRead MorePromoting A Culture Of Prevention Aim At Educating Youth Essay1241 Words   |  5 Pagespreventive measures that can help bring change and awareness within local communities. The Los Angeles Unified School District (LAUSD), currently enrolls more than 640,000 students throughout the county (Dauter, Fuller, 2016). Promoting a culture of prevention aim at educating youth, should incorporate policy advocacy interventions that can be embedded and take root within one of the largest school districts in the country. It would be within a social worker’s scope of practice to adopt an integrated,Read MoreThe Effects Of Domestic Violence On Children Essay1547 Words   |  7 Pagesdon’t know is that is also the single largest cause of violence in United States (Sherman, Schmidt, Rogan,1992). Un fortunately, public outcry has only come in the aftermath of high profile cases being magnified through the media. Despite this post-measured reality, a general response to domestic violence (DV) and intimate partner violence (IPV) by the majority of the public is in line with what most consider unacceptable and with what the law considers legally wrong. Consider by many, more than just

Saturday, December 21, 2019

The Biggest Risk Of Data Theft Lies Within A Company s...

The biggest risk of data theft lies within a company s customers. When security breaches happen, the customer begins to question if Sunoco has looked out for their personal information and overall trust becomes an issue. Whenever someone purchases with a credit card, the customer is putting their trust in Sunoco that the information will not fall into the wrong hands. If Sunoco does not handle the situation quickly and efficiently after it occurrs, panic ensues by current and potential customers. Credit cards are a huge portion of sales today. According to Javelin Strategy Research, â€Å"plastic cards purchases comprised 66 percent of all in-person sales, with nearly half of them, or 31 percent, made with debit cards. Last year shoppers used credit cards for 29 percent of point-of-sale purchases; it is expected that the numbers will rise to 33 percent by 2017† (New, 2012, para. 5). That leaves potential for a significant loss in sales and annual earnings. With the increase o f credit and debt card usage, Sunoco needs to take the necessary action to ensure that data theft does not occur again for their customers. In order for Sunoco to avoid the consequences and risks of a data breach, security systems must be updated on a frequent basis and implemented when they become available. Heavier monitoring of the Point of Sale system (POS) that the customers have available at the gas pump should also be implemented. After the Target credit card breach, the Department of Homeland ofShow MoreRelatedUnethical Computer Issues1912 Words   |  8 Pagesdo everything from work related projects to managing financial transactions and accounts online. While technology has made our lives more convenient than ever before, cyber crime, in various forms, has become one of our biggest concerns. It is a crime to misuse another person s whether personal or financial information, without their consent, for fraudulent activities. Information such as social security numbers, credit history, and PIN numbers is often acquired through the unlawful access to informationRead MoreThe Darknet, Inside The Digital Underworld1860 Words   |  8 Pagesvarious subcultures go to take part in mostly illegal activities without getting caught. Some of these sites are used to access child pornography, (Attwood, 2010) and some of them sell illegal drugs. People can do whatever they want even if it s illegal without getting arrested. The main issue that the author is addressing is that the Darknet may provide a place for people to go on the internet and engage in child pornography and drug trafficking outside of the law but many of the thingsRead MoreOrganizational Fraud9733 Words   |  39 Pagessystem red flags 12 3.6.5. Financial performance red flags 12 4. ESSENTIALS OF ORGANIZATIONAL FRAUD 12 4.1 Detection 13 5. SATYAM SCANDAL 14 5.1 Lessons for HR Professionals 14 5.2 Lessons for India Companies 15 6. ORGANISATIONAL EMPOWERMENT 16 7. RISK OF FRAUD IS LESSENED IN EMPOWERED ORGANIZATION 16 8. IMPACT OF FRAUD 16 8.1 Macroview – Impact on Organization 16 8.2 Microview – Impact on employees not involved in fraud 17 9. ORGANIZATIONAL LEADERSHIP 17 Read MoreThe Pros and Cons of Cloud Computing3785 Words   |  16 Pagessuccessful company in the private usage of a file-cloud, since 2007 it has acquired over 50 million users (Dropbox 2012). The success of Dropbox lies more in its simplicity rather than its functionality, the company never uses words like sync or cloud, it simply works for the user (Carr 2011). But would business also use cloud services? If we take Dropbox as an example, would a firm use a similar service and upload files on a foreign server, hence give away files to a different company? Even whenRead MoreThe Security Of A Bank Transaction, Online Shopping Or Booking Flight Tickets On Our Mobile App8041 Words   |  33 Pagesphenomenal. Moreover, the present, ever expanding, inculcation of digital technology has accommodated, within its premise, a further lag in analyzing the consequential stakes. A common practice of espionage targets both banking institution as well as its customers. Strikingly, the frontier between the different security threats are fuzzy, either due to the complexity of domain or the ever-increasing customer base. The banks are governed by some regulations and policies, yet it does have a scope for theRead MoreA Critical Evaluation of Amazon’s Strategy, Strategic Choices, Structure, Systems and Culture7541 Words   |  31 Pages | Amazon.com A critical evaluation of Amazon’s strategy, strategic choices, structure, systems and culture Authored by: L. Gounden, C. Hendrikz, R. Ligault, M. Louw, P. Mathopa, A. Omer, S. Patamadai V. Pillay Date: September 22, 2008 TABLE OF CONTENTS 1 Introduction 5 2 Q1. STRATEGY 5 2.1 THE EXTERNAL ENVIRONMENT 6 2.1.1 MACRO ENVIRONMENT 6 2.1.2 Industry environment 9 2.1.3 CompetitiveRead MoreElectronic Commerce As Defined By Salvatore2622 Words   |  11 Pagesand from business to consumer through the Internet† (p. 150). Consequently, e-commerce is now essential for businesses to be able to compete in the global marketplace. â€Å"E-commerce is now being used in all types of business, including manufacturing companies, retail stores, and service firms. E-commerce has made business processes more reliable and efficient† (Smith, K.T., 2011, p.3). this paper will outline those perspectives in regards to the origin of E-commerce, Business to Business E-commerce, BusinessRead MoreFrauds in Insurance11958 Words   |  48 PagesInsurance is one of the tools for risk management that aims at reducing the risk on the day-to-day life of individuals, organisation and society. At the same time, it should also be appreciated that insurance cannot be utilised as a risk free tool for all types of situations. Insurance provides risk management solutions to many situations that fall within the competence of human judgement and managerial skills. Insurance is very important in today’s world there are number risk which people face in theirRead MoreThe Future of Our Money Essay examples2433 Words   |  10 Pagesintrinsic value to conduct our business; today, we use paper currency, which is convenient and easy to carry around. But slowly, we are moving into the digital age of money, an age in which less of our money is actually tangible and more of it is just data on a computer server. To some, this prospect may seem daunting. However, given the major advantages of electronic money over outmoded paper counterpart, society as a whole should embrace the upcoming era of digital money. Digital money is undeniablyRead MoreThe University Of Arizon Electrical And Computer Engineering7879 Words   |  32 Pagesprotection from Rogue Aps, here are some attacks that can be laugh through the Rogue AP: †¢ Attack on wired network infrastructure †¢ Mapping the Network for target attacks †¢ Scanning hosts or network for target attacks †¢ Man in the middle attack and data sniffing on network. I.2. Homograph attack Security Ninja which is a blog for security research news and guidance on network describes the internationalized domain name (IDN) homograph attack as a way a malicious party may deceive computer

Thursday, December 12, 2019

Knowledge Audit for Business Analysis Business World

Question: Describe about the Knowledge Audit for Business Analysis of Business World. Answer: Knowledge Audit for Business Analysis Knowledge auditing is one of the fundamental areas while trying to understand what is required of an entrepreneur in the business world. There are great business analysts who are equipped with rich knowledge in explaining special concepts concerning what ought to be done by the company in order to realize on the business objectives. The success of the business depends on how the company handles different issues such as the employees related problems and the perception of the customers (Weetman, 2006, p. 23). Special areas in knowledge audit include; financial capital, intellectual capital, natural capital and social and relationship capital. Stakeholders analysis and management Stakeholders analysis entails finding of the information from different categories of people affected by business. This information is important in the decision-making process in the company. They are the most important persons while running of the business. They play an integral part in the growth of any firm since their role is outstanding as they are majorly concerned with the market scope of the product and efficacy of the enterprise. There are two types of stakeholders. One of them is the primary or generic stakeholders. These stakeholders are affected by the running of the business directly. Their effect is felt either positively or negatively in the association. The owners of the company fall under this category of primary stakeholders. They are classified in this because of their directly engagement in the business (Rego, Pinho, Pedrosa E Cunha, 2008, p. 14). For instance, they are the ones who are affected by the law in case there business collides with the requirement of th e law. On the other hand, secondary stakeholders are those who are affected indirectly by the actions of the organization. These are case of the security exchange market where the company is reserved. Both of them ought to strategize in order to create a portfolio in their company and lead to profit maximization in the firm. Stakeholders are mostly involved extensively during the preparation phase of the company. Understanding of the benefits of the analysis of this group is very necessary. One of the main reasons is to provide clear understanding of the stakeholders interest in the association. This will assist the assist the management in the development of the impetus of change in order to meet the substantial need of the stakeholders. Moreover, it helps in the understanding of potential risks, which might be experienced in the line of business. These risks include change of tastes and preferences of the customers in the company. This will help the management to change the tactics to avoid such mess. Additionally, their scrutiny helps in creating of the awareness of the work or the products produced by the company. This can be concerning the quality, the codes of ethics in the company among many others. (Jespersen, 2006, p. 33). They are based on a basic formula, which clearly defines their role. This formula is abbreviated (WTCAOE) it stands for; Worldview, Transformation, Customers, Actor, Owners, Environment. According to the worldview, they are perceived are ones who can either make the business to grow or fall. The entire business fraternity should treat this category of people in a special way. They help in the transformation setup of the business. Through crucial analysis, one finds that the stakeholders influenced the customers of different companies either frankly or ultimately. The management of the companies relies fully on the work of the stakeholders in promoting of the business activities in the firm (Khan, Ganguly Gupta, 2008, p. 36). They are the threshold since they finance and obtains full rights on the operation of the entity. Social media and Information Technology systems are used as the spectrum in analysis of the stakeholders views on business concerns. Most of them present their views and ideas to the radios and the television in order to be aired. They can also post their feelings through mail and forth. Despite the fact that they are very important in the growth and development of the business, this group also as its own setbacks (Faber, Schiazza Megna, 2015, p. 6). They can easily be swayed and thus give analysis about the business inappropriately. It is therefore prudent for the organization to analyzeothersorts of specialists in business in order to find the truth behind the running of their business. According to views, they can bring d own the business since some do not have quality knowledge on business productivity techniques. This thus leads to biasness in the presentation of the information on the dos and donts of the company (Stadnicka Ratnayake, 2015, p. 92). Business analyst A business analyst is a person who provides information and techniques to be executed in the running of the business activities. One under this school is considered an expert in the business sector. Most companies need their services in order to help in the production and maintenance of the business related activities in the world today. They offer complete description of the processes of business in solving of the problems which affects the companys flaws. They are filled with tips, tricks, techniques, and guerrilla tactics, which help in the executing of the development in the face of critical moments in the sector (Folinas et al, 2010, p. 29). The forecaster plays different roles in the line of duty (Gao, Dai Hei, 2015, p. 1542). Firstly, one undertakes the role of intermediately for the company. The business analyst helps in linking the business with the potential client by sampling clients to ascertain the problem emanated from which part. After that, one is expected to relay the information on the findings and thus provision of the perfect rubric to be taken in the administration of business. Moreover, one links the management and the owners of the company through meetings entailed to provide solutions on the issues pulling down the business (Mohammadi, Khanlari Sohrabi, 2010, p. 36). Secondly, business analyst provides quality assurance to the firm. This is done through giving out of the mechanism, which the company ought to follow in order to sprout in the economical standards of the enterprise. Many have actually helped even the fallen and hopeless company to stand and retain their earlier forms in the industry. Th irdly, one acts as the filter for the company. This role is exercised through guiding of the organization on what they ought to concentrate upon in order to avoid failure, which might have been brought about by the inefficiencies experienced earlier on (Osan et al, 2010, p. 34). Fourthly, this person acts as the diplomat for the company. One helps in the analysis of certain views, which are fundamental for the business. Moreover, one is entitled to travel to different destinations in search of answers for the problems affecting the market scope of the company. The fifth point is that, the business analyst helps in facilitating of the business (Sharma, Tan Cheng, 2010, p. 23). This is done through providing of lectures and tutorials to the stakeholders of the company. Through this, one provides the best mechanism each should follow in different sectors they are entitled to work for. It is prudent for the company to bring about collaboration with the business analyst. This is because it is the only way they can understand each problem affecting the business and bring forth the success of the institution. The corporation ought to fully follow the instructions as given by the analyst without failing. This is because in case of fall short of the requirements, the company will be subjected to malfunctioning problems. Despite the great work done by this specialists, they also exhibit some challenges in th e company (Andriessen Fahlbruch, 2004, p. 40). Some of them are affected by political tyrannies and thus the delivery of up to date advice on business success is affected. This is due to pressure imposed upon by the ruling party. Additionally, they also face the challenges brought about by corruption cases. Some of this analysts work for different companies. The companies, which deal with same line of product, can easily bribe the analyst to provide vague advice to the competitor. This will lead to the collapse of the other company in the name of love for money. In my critic, the company should solely have internal analyses in order to combat predicaments caused by those who are hired from specified companies. The firm can also engage in extensive research on success of the company on their own. What is the real problem? Business analysts as the main or the sole problem, which as continuously pulled down or cause malfunctioning of the business enterprises, have defined real problem. They are the portfolio risks, which are, ought to be researched seriously in order to help the business to recuperate. Most companies during their recession period waste a lot of capital in trying to solve the problem which in real sense they maybe not the actually be the ones affecting the company (El Kharbili, 20009, p. 37). They go ahead and solve vague and ambiguous misleading problems without focusing on what actually is the matter affecting the company. It is thus prudent for them to determine the problem. Moreover, they ought to define the impetus to bring about the efforts, which will help in the solving of the problem they have researched upon. One finds that their exits different perceptions, which ought to by, delve upon in order to bring to book what is the real problem paralyzing the business. This can the pr oblem does not actually exist. This is an assumption point of view from the management to the association (LoÃÅ' pez-NicolaÃÅ' s MeronÃÅ'Æ’o-CerdaÃÅ' n, 2010, p. 18). This will thus lead to continuous failure of the firm. Through the usage of what people such as the customers and the analyst will help the management to fight the mess living in the enterprise. This people have full knowledge on the business and thus been keen on their advice can help the firm to understand where the problem is and subsequently work towards finding of the solution to the issues affecting the association. Doing critical investigation is also very dynamic in finding one pulls down the company (Chakrabarty, 2010, p. 28). The management should be very keen while trying to find the real problems. They ought to consider on a number of factors before concentrating their mind on the opinions from the stakeholders of the group. This is because most of them do not have sufficient knowledge on the business (Guo, 2010, p. 45). This will thus lead to uncertain solutions, which can lead to solving of the problem, which is not affecting the running of the association. To add on this, the stakeholders bring about conflicting solution i n the company. This is because majority of them are swayed by the structure of the association and the previous success without counting on rows the company is facing in the present time (Yoke, Yatim Wee, 2014, p. 14). In determining of the problem, one ought to gather information from different stakeholder and doing research through the information technology system. One should also consider focusing on the vision and mission statement of the company. This is because it gives out the guidelines to be followed and what is mandated to be reaped from the company. Portfolio analyses: Knowledge management audit Different scholars have defined knowledge management audit as the management of the capability and the understanding of different people in the business field (Borgianni, Cascini Rotini, 2010, p. 23). It is very important since one ought to have clear concept of ones performance to avoid problems brought about by the doing work in which one does not understand. It is meant to aid in reduction of risks. One of the main areas of concern in this subtopic is the capital knowledge. Capital is defined as the total assets and the liabilities of the company. The stakeholders should have the knowledge concerning this in order to bring about balance of work in the business during their course of delivery. This is entailed in preventing the sinking of the business through ensuring that liabilities do not exceed the asset capacity in the firm (Moeller Brink, 2009, p. 34) Moreover, it is meant to aid in maintain the core objectives of the firm. Besides, intellectual capital is also cognitive in the running of the business enterprise. The way employees and the management understand on the capital requirement can either build or destroy the association. This is because in the event where people do not understand what their core capital requirement is, the morale for its growth and development will never be realized and thus probability of closure the company is inevitable. Understanding of the natural capital is also very decisive (Andriessen Fahlbruch, 2004, p. 12). This is because it will help the corporation in working towards its improvement rather than destroying it. An example of the natural capital is the atmosphere. The company ought to take care of it through preventing it from contaminations brought about by pollution activities. They should ensure that dumping is done appropriately. They are also entitled to do practices such as planting of trees to protect the ecosystem and subsequently the human and animal life whose life depends on it. To add on that, manufacturing capital is also very essential. Com panies should concentrate on manufacturing on quality products. This is because outputs, which are very quality, sell themselves and thus reduction on the wastage. The audit will be based on the quantity of the blend used in the production. It will ensure that it is the right one and follows the requirement of the law. The core functions and the cultural assessment should be put in consideration while performing such tasks (Paquette et al, 2010, p. 20). Reference List Andriessen, J. H. E., Fahlbruch, B. (2004).How to manage experience sharing: from organisational surprises to organisational knowledge. Amsterdam, Elsevier. https://site.ebrary.com/id/10137948. Borgianni, Y., Cascini, G., Rotini, F. (2010). Process value analysis for business process re-engineering.Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture.224, 305-327. Chakrabarty, S. (2010). Strategies for Business Process Outsourcing. El Kharbili, M. (2009). Business Rules Management for Business Processes. Faber, T., Schiazza, T. L., Megna, P. (2015). Improvement in pasive arc flash protection through limiting arcing duration. 1-8. Folinas, D., Pavlou, T., Karakostas, B., Manthou, V. (2010). A Conceptual Framework for Business Process Modeling in Virtual Organizations. Gao, Y., Dai, L., Hei, X. (2015). Throughput Optimization of non-real-time flows with delay guarantee of real-time flows in WLANs. 1541-1546. Guo, K. H. (2010). Knowledge for Managing Information Systems Security. Jespersen, K. R. (2006). Computational Intelligence as a Platform for a Data Collection Methodology in Management Science. Khan, S., Ganguly, A. R., Gupta, A. R. (2008). Creating Knowledge for Business Decision Making. LoÃÅ' pez-NicolaÃÅ' s, C., MeronÃÅ'Æ’o-CerdaÃÅ' n, A. L. (2010). A Model for Knowledge Management and Intellectual Capital Audits. Mohammadi, K., Khanlari, A., Sohrabi, B. (2010). Organizational Readiness Assessment for Knowledge Management. Moeller, R. R., Brink, V. Z. (2009).Brink's modern internal auditing: a common body of knowledge. Hoboken, N.J., Wiley. https://www.123library.org/book_details/?id=5999. Paquette, G., LeÃÅ' onard, M., Basque, J., Pudelko, B. (2010). Modeling for Knowledge Management in Organizations. Osanna, P. H., Durakbasa, N. M., Yurci, M. E., Bauer, J. M. (2010). Enterprise Information Systems for Business Integration in Global International Cooperations of Collaborating Small and Medium Sized Organisations. Rego, A., Pinho, I., Pedrosa, J., E Cunha, M. P. (2008). Barriers and Facilitators to Knowledge Management in University Research Centers: An Exploratory Study. Management Research. 7, 33-48. Sharma, R. S., Tan, D. S., Cheng, W. S. (2010). Two Heads Are Better Than One: Leveraging Web 2.0 for Business Intelligence.International Journal of Systems and Service-Oriented Engineering.1, 1-24. Stadnicka, D., Ratnayake, R. C. (2015). Simple approach for Value Stream Mapping for business process analysis. 88-94. Weetman, Pauline. (2006). Financial Accounting An Introduction. Pearson Education UK. https://www.myilibrary.com?id=60210. Yoke Seng Wong, Yatim, M. H. M., Wee Hoe Tan. (2014). Use computer game to learn Object-Oriented programming in computer science courses. 9-16.