Top Five Articles for the Week

CTU Online Degree - Student Centered TeachingInnovation in Higher Education: Student Centered Teaching
Prior to my career in higher education, I consulted with organizations on how to effectively use emerging media to achieve strategic goals. One client was an intermediate school district. I recall conversations with the district’s curriculum consultants about how experts knew (and preached) the value of innovation in teaching and learning, but failed to actually put it into practice.


CTU Health Science Degree - New Year's ClockIt’s a New Year: Make Your Relationships Count
Like clockwork, when the New Year rolls around people everywhere resolve to make a fresh start. It makes sense. The slower pace of the holiday season that precedes the New Year is a perfect time for personal reflection. It’s during that time, your mind gravitates to the many things you wish you had done but never seemed to make time for.


CTU Business Degree - Stakeholder Identification
How to Identify Stakeholders in Project Management
As a project manager responsible for completing projects successfully and within scope, it’s imperative that you know the stakeholders. Stakeholders can be a person or organization with an interest in the project’s completion. This can be anyone from an influential customer, sponsor, the public or performing organization involved in the project. 


CTU Criminal Justice Degree - Understanding RapistsA Look Inside the Mind of a Rapist
One of the most difficult things law enforcement officers must do is to interview rape victims. They must be asked highly intrusive questions that force them to relive an extraordinarily painful experience. Yet the hard, cold fact is that cops aren’t therapists. Their primary goal is to capture the rapist and to keep another victim from going through the same pain.


CTU Computer Science Degree - Safe Data5 Essential Steps to Protect Your Company’s Data
In most organizations, the Chief Security Officer (CSO) or Chief Information Security Officer (CISO) is responsible for alerting the Chief Information Officer (CIO) and other key executives of potential security risks related to the business’ critical Information Systems (IS) infrastructure and data. Another key responsibility is to mitigate cyber-attacks.



Did you enjoy this post? Receive fresh updates from CTU faculty directly to your inbox by subscribing to CTU’s blog. Join us! 


Terms and Conditions By providing your mobile number, you agree to receive text messages from Colorado Tech via its mobile text message provider.  You may opt out of receiving messages by texting the word STOP to 94576, or simply reply with the word STOP to any text message you receive from Colorado Tech. While CEC or its mobile text message provider will not charge end users for receiving/responding to promotional messages, depending on the terms of your mobile phone plan, you may incur a cost from your mobile service carrier to receive and respond to any promotional text messages (standard messaging and data rates/fees and other charges may apply).  Charges will appear on your mobile phone bill or will be deducted from pre-paid amounts.  Current participating/supported carriers are: Alltel, AT&T, Boost, Cellcom, Cellular One, Cellular South, Cincinnati Bell, Cricket, Element Wireless, Golden State Cellular, iWireless, Metro PCS, Nextel, nTelos, Plateau Wireless, Sprint, T-Mobile, US Cellular, Verizon Wireless, Viaero Wireless, Virgin, and more.×