BUS 375 Week 3 DQ 2

 Beta-Testing

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Read the article

Apple is Beta-testing an Update that Kills Evasion Jailbreak. (Links to an external site.)Links to an external site.

  In the textbook, beta-testing is described as used for formative evaluation and for fine-tuning. How does the story of Apple’s beta-test meet the criteria?

Reference and cite the textbook in your original post. Respond to at least two of your classmates’ posts.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

1/8/2018 Print

https://content.ashford.edu/print/AUBUS375.14.1?sections=ch06,ch06intro,sec6.1,sec6.2,sec6.3,sec6.4,ch06summary&content=all&clientToken=b76… 1/15

Chapter 6
(I)mplementation: Execution

Fancy Collection/SuperStock

Learning Objectives

After reading this chapter, you should be able to:

Carry out beta and pilot testing of training

.

Describe the desired skill set of a trainer.
Manage the barriers to implementing training.
Evaluate the cost bene�it of outsourcing training.

There are two types of speakers: those who get nervous and those who are liars.

—Mark Twain

1/8/2018 Print

https://content.ashford.edu/print/AUBUS375.14.1?sections=ch06,ch06intro,sec6.1,sec6.2,sec6.3,sec6.4,ch06summary&content=all&clientToken=b76… 2/15

Introduction
Whereas the development phase focused on the creation and preparation of the training materials, instructional methods, and media, the implementation
phase centers on rolling out and beginning the training itself. Especially when the training is organization wide, training programs may be rolled out �irst on a
provisional basis through beta and/or pilot testing before full-scale implementation (ASTD, 2012; Noe, 2012; Piskurich, 2010; Vijayasamundeeswari, 2013).
During the implementation phase, we ensure that our trainers—both classroom and on-the-job trainers—have the requisite skill sets to deliver the training
competently, including managing potential trainee resistance to the new learning. It is during the implementation phase, too, that we evaluate whether the
training should be implemented via internal personnel or through an outside vendor.

1/8/2018 Print

https://content.ashford.edu/print/AUBUS375.14.1?sections=ch06,ch06intro,sec6.1,sec6.2,sec6.3,sec6.4,ch06summary&content=all&clientToken=b76… 3/15

6.1 Beta and Pilot Testing of Training
During the development phase, we performed a technical review of the training material and the edited content; in the implementation phase, after we have
made decisions about whether the trainers come from an in-house team or from an outside provider, we can now begin rolling out the training. This often starts
with a beta test and a pilot test (Shaw, 2011; Wan, 2013; Welty, 2013). Pilot tests and beta tests con�irm the usability of the training; they also determine how
effective the training materials are and how well activities are designed. Pilot and beta tests also examine the trainees’ reactions to the training, including the
extent to which trainees have learned from their participation in the program (Preskill & Russ-Eft, 2005; Russ-Eft & Preskill, 2009). Table 6.1 reviews the
differences between beta and pilot tests.

Speci�ically, with a pilot test, we “prerelease” the training to selected trainees and subject matter experts for testing under normal, everyday conditions so we can
pinpoint any remaining �laws and get feedback on particular training modules, as well as the training as a whole. Beta testing is testing where the training takes
place in the real-time trainee environment (Chan, 2009; Morrison, Ross, & Kalman, 2012; Piskurich, 2010). In the beta testing, all intended users participate
(Morrison et al., 2012).

Beta and pilot testing are part of what is known as a formative evaluation. A formative evaluation is a method for judging the worth of a program while the
program activities are forming (in progress); in sum, we are evaluating the training processes (Morrison et al., 2012). In Chapter 7, we will discuss the other type
of evaluation, summative evaluation, which evaluates outcomes of the training itself.

Table 6.1: Differences between beta and pilot tests

Test Audience and participants When How

Pilot Some subjects close to trainee level Before beta 1. Prepare trainees.
2. Observe and ask questions.
3. Debrief extensively.

Beta The real audience in the real environment After pilot 1. Conduct exactly as the training will be
used.

2. Observe, if possible, but do not
interrupt.

3. Debrief with planned questions and
goals.

Source: Adapted from

Piskurich, G. M. (2010). Rapid training development: Developing training courses fast and right. New York: Wiley.

Outcomes of Testing

Testing of the training enables you to �ine-tune the training design itself as well as the usability of the program. By testing the training prior to implementation,
trainers can better ensure that the end users’ needs are being met and that the objectives of the training program are being ful�illed per the organizational goals.
Speci�ically, testing accomplishes the following:

It enables you to gauge your target population’s reaction to the training program by selecting a pilot group that is demographically similar to your
program’s speci�ic target population.
It helps you make better decisions about how to allocate time and resources. Speci�ically, pilot testing the training program can help determine if you
need to spend more time or resources on particular aspects of the program. For example, you might learn that the training program shows a need for
changes to your recruitment strategy based on the entry-level behaviors; that is, the necessary requirements of the job (Rothwell & Kazanas, 2011; Shaw,
2011; Stolovitch & Keeps, 2011; U.S. Department of Health and Human Services, 2013).
It can reveal unanticipated issues that might arise, such as matters of setting, logistics, and particular lessons or activities for which more staff training or
attention may be necessary, and it can ensure that staff members are well prepared to handle issues that come up during the full-scale implementation.

HRD in Practice: Evanston Northwestern Healthcare
Jane Dowd is the chief learning of�icer at Evanston Northwestern Healthcare (ENH) in Evanston, Illinois. ENH is an integrated, academic
healthcare system composed of 3 hospitals, 851 beds, and 65 group practices housed in more than 50 different locations. Dowd and her staff
ramped up, simultaneously hiring staff, performing needs analyses, determining facilities, and creating training. Dowd describes using the �ive-
phase ADDIE model and speci�ically addresses the testing during phase 4, implementation:

Finally, it was time to move … the �irst few weeks feel like a test. Before going live with training, we performed a test run. You can
beta test with a few real trainees, some experts, and other instructional designers. We performed pilot testing (a dress rehearsal)
with real trainees as the audience, and a reviewer test, where participants look at the courses through the eyes of the end-user. Use
feedback to tweak classes. Doing this, you’ll save time, money, and energy down the road.

So, before training of�icially began, trainers ran pilots, gathering immediate feedback. Classes were tweaked accordingly, and
tracking was critical. We became a massive reporting house. Because of the vast number of scheduling options, courses, people,

1/8/2018 Print

https://content.ashford.edu/print/AUBUS375.14.1?sections=ch06,ch06intro,sec6.1,sec6.2,sec6.3,sec6.4,ch06summary&content=all&clientToken=b76… 4/15

and rolling go-live dates, registration, and tracking software proved critical. ENH used more than 200 training coordinators to
register staff and track scores.

We got the job done. With full support from hospital administration, my team and I implemented an award-winning software
education and communications training initiative. It included eight modules, 51 courses, 12,382 training encounters, and 7,886
learners, including 1,287 physicians. The initiative played a key role in ENH’s successful implementation of the ambitious
Electronic Health Records (EHR) system.

Source: From Duggan, Christina Mayer. “Designing Effective Training.” Journal of AHIMA 76, no. 6 (June 2005): 28-32. Reprinted with permission from the American Health
Information Management Association. © 2014 by the American Health Information Management Association. All rights reserved. No part of this may be reproduced,
reprinted, stored in a retrieval system, or transmitted, in any form or by any means, electronic, photocopying, recording, or otherwise, without the prior written permission of
the association.

Consider This

1. In which areas would budgetary constraints have impacted the implementation of the software education and training initiative?
2. How does Dowd differentiate between a beta test and pilot test?
3. What message is the organization sending to stakeholders regarding its commitment to the training and development function by having a
chief learning of�icer position?

1/8/2018 Print

https://content.ashford.edu/print/AUBUS375.14.1?sections=ch06,ch06intro,sec6.1,sec6.2,sec6.3,sec6.4,ch06summary&content=all&clientToken=b76… 5/15

6.2 Trainer KSAs
An important truism in human resource development (HRD) is that—irrespective of well-designed and developed training—if training delivery is inferior, the
desired outcomes from the training will not be realized. This consideration becomes especially important in a train-the-trainer scenario, in which you train
someone to deliver the training in the most effective way. Simply put, although a good trainer does not guarantee that the trainees will learn, a poor trainer
almost always guarantees they will not!

The Anatomy of the Excellent Trainer

Remember, the ultimate goal following the training is for trainees to apply the training to the workplace, and the �irst step toward successfully transferring the
training to the workplace begins with the trainer. Here are some pointers to becoming an excellent trainer:

1. Gain a familiarity with adult learner expectations. Previously, we discussed the assumptions an expert trainer should consider for guiding his or her adult
learners through the SVVE (success, volition, value, and enjoyment) (Wlodkowski, 2008) framework. Although lacking one of more of these areas does not
always spell presentation disaster, this framework underscores the principles of how adults learn. The following assumptions maximize trainee motivation
to learn:

Success. Adults want to be successful learners; few employees come to work every day wanting to do a bad job. The assumption should be that
employees want to do a good job, and your role is to ensure that they have the requisite KSAs to succeed at performing their job duties.
Volition. Adults want to have choice in their learning. Although every job has necessary duties, motivational bene�its occur if the employee
participates in the decision-making process concerning the order, pace, and modality of the required training.
Employees want to learn something of value. Speci�ically, adult learners need to know the reasons for learning something before undertaking to learn
it (Knowles, 1973).
Enjoyment. Finally, though it is called work, adults want to have some level of enjoyment while performing their jobs.

2. Develop a motivating presentation framework (Knowles, Holton, & Swanson, 2012; Wlodkowski, 2008). We know, too, that to optimize the relationship
between the trainer and trainee, a trainer must possess the skill set of EEEC (expert, enthusiastic, empathetic, and clear); that is, trainees relate better to the
trainer when he or she is:

Expert. According to Wlodkowski (2008), expertise involves three essential elements: trainers know something bene�icial, they know it well, and
they can convey it through an instructional process.
Enthusiastic. The trainer values the subject matter and demonstrates a commitment to the topic with appropriate degrees of emotion, animation, and
energy.
Empathic. The trainer puts him- or herself in the trainee’s shoes; this is different from sympathy, which is more of a third-party detachment.
Empathic training respects the learner’s perspectives and experiences.
Clear. Verbalizing concepts in an organized and cogent way, supported by clear training materials.

3. Demonstrate an understanding of communication patterns (Bates & Davis, 2010; Chase, 1997; Goldsmith, 2000; Hodell, 2011; Wlodkowski, 2008). One of the
more practical aspects of training is maintaining trainee engagement and, speci�ically, managing trainees’ attention spans vis-à-vis the trainee’s speech–
thought differential (Jaffe, 2009). The speech–thought differential is the premise that we think at a faster rate than we speak. Speci�ically, we speak at a
rate of 100 to 180 words per minute, and we think at a rate of 500 to 600 words per minute; as a result, the trainer must monitor trainee attention spans
and know how to bring trainees back into focus, if necessary. Lundsteen’s (1979) classic work on speech–thought differential noted four levels of potential
distraction that trainers should know about their trainees:

Small departures. Trainees produce their own examples, relate material to their own personal experiences, answer rhetorical questions, and use
time for mental interaction with the trainer’s ideas.
Going off on a tangent. Trainees depart from the trainer’s line of thinking; trainees seize on one of trainer’s ideas, taking it in their own direction.
Going off on a tangent includes daydreaming.
Private argument. Trainees begin to challenge and argue internally before they hear the trainer out. Trainees stop trying to understand the trainer
and carry on a running argument with themselves.
Large departures. Trainees’ pattern of attention wanders off into unrelated areas; their attention is brought back into focus on training for a while,
but they go off again into thinking about unrelated topics. For example:
A trainee thinks: “I wonder where we are going to eat tonight…” (Trainee listens a bit about the new training software.) Then trainee thinks: “I can tell
you—no more Mexican food!”

Another aspect of communication that trainers must manage concerns the potential distortion of how trainees’ receive and process the new information,
including leveling, sharpening, and assimilation (Kimmel, 2013):

Leveling. Trainees’ tendency to reduce the message with fewer and fewer details. An example of this would be the telephone game that youngsters play.
In this game a message is passed on in a whisper by each of several people so that the �inal version of the message is often radically changed from the
original.
Sharpening. Trainee selectively retains information, especially only dominant points (such as hyperbole). For example:

Trainer: “If we can implement this new procedure ef�iciently, that means more money to our bottom line, which means more money for raises next year.”

Trainee, upon leaving training: “Since this new procedure is saving the company money, we are going to get raises next year.”

Assimilation. Trainees take the message into their own frame of reference or personality. This idea follows adult learning principles in that learners
process messages based on their prior experiences with the subject matter. For example, if the trainer speaks about quality, the construct of quality
means different things to different people. Consider telling a teenager to clean his room; he might look around and say, “What do you mean? It is clean!”

1/8/2018 Print

https://content.ashford.edu/print/AUBUS375.14.1?sections=ch06,ch06intro,sec6.1,sec6.2,sec6.3,sec6.4,ch06summary&content=all&clientToken=b76… 6/15

Most training utilizes explicit communication; that is, articulating something that can be articulated.
“And, Marilyn, this is where you punch the time clock” is an example of explicit communication.

1. What is an example of telling the trainee too much during training? Explain how there
may be limits on how much should be articulated to a trainee.

2. During training, there may be different trainers paired with different trainees on the
same topic. Explain the pros and cons of trainers agreeing up front which information
they will make explicit, tacit, or implict to trainees.

Much of tacit communication is unspoken, drawing upon the trainer’s experience and intuition. As
such, much of this part of the training experience cannot be put into words.

Consider, too, that even the trainer’s vocal variation and in�lections (Jaffe, 2009) may have an unintended effect on the trainees. Consider these ideas of vocal
variations and associations also mentioned in the following video links: https://www.youtube.com/watch?v=hdBNUDIOIP8 (https://www.youtube.com/watch?
v=hdBNUDIOIP8) and https://www.youtube.com/watch?v=rTm4r_SbJq0 (https://www.youtube.com/watch?v=rTm4r_SbJq0) (also see Chapter 5).

Loud and fast = self-suf�icient
Loud and slow = aggressive
Soft and fast = enthusiastic
Soft and slow = benevolent

So, for example, consider a trainer who speaks loudly and slowly. She may think she is being clear, but trainees may instead consider her aggressive.

Did You Know? For Some, Public Speaking Is Second Only to Death in Fear Factor!

Trainers must be comfortable speaking in public. Unfortunately, some novice trainers fear public speaking more than they fear death (Grigsby,
2010).

Training becomes easier with practice, but while you are practicing, here are a few tips for presenting and settling down those nerves:

Drink water! Staying hydrated helps avoid “cotton mouth,” a real sign of anxiety; the person experiencing it is suffering.
Exercise that morning. It has been shown that exercise can alleviate anxiety by releasing endorphins that can make you feel better.
Think of something funny or pleasant. They used to say “picture your audience in their underwear.” While that tactic still may be effective,
you can also try methods such as looking at a humorous photo or reminding yourself of a joke.
And, perhaps the best tip of all, be prepared. You cannot overprepare for a presentation. Know your material back and forth; anticipate
audience questions, and have a backup plan if technology or equipment fails.

Communication Patterns Particular to On-the-Job Trainers

When selecting site trainers to lead OJT, not only should they be experienced and knowledgeable and follow all the rules of successful training, they also should
have particular communication skills that go with the dynamics of shadowing someone in the workplace (Clifford, 2007).

Communication Patterns in Training, Part I

Critical Thinking Questions

Speci�ically, and as discussed in Chapter 2, we depend on the site trainer to make the implicit (that which could be articulated, but has not been yet) explicit, as
appropriate. As previously discussed, here are the reasons for implicit knowledge remaining in the implicit realm:

Productive reason. “Sure, I could tell David everything, but I believe he will learn better if he tries out some things himself and learns by trial and error;
he’ll understand things better that way.”
Neutral reason (including trainer laziness). “Ah, sorry. I had forgotten to tell you that.”
Counterproductive reason. “If I tell Eliot too much, he’ll know as much as I do and then the higher ups won’t value me as much!”

Communication Patterns in Training, Part II

Critical Thinking Questions

https://www.youtube.com/watch?v=rTm4r_SbJq0

1/8/2018 Print

https://content.ashford.edu/print/AUBUS375.14.1?sections=ch06,ch06intro,sec6.1,sec6.2,sec6.3,sec6.4,ch06summary&content=all&clientToken=b76… 7/15

1. Explain the importance of telling a trainee that he or she is not expected to readily do
well in a certain task because it takes more experience.

2. What components of your job are tacit?

A trainer’s rationale for decisions concerning implicit communication can be complex. Appropriate
decisions regarding when, what and why to tell the trainee something can determine whether the
training communication is productive or counterproductive.

1. Explain how trainer laziness is a form of implicit communication.
2. Give an example of something a trainer could tell a trainee but chooses not to in order
to enhance the training experience.

Food for Thought: Six Top Qualities of a Great Trainer
Kelly Prince, who is the senior instructional designer at Management Concepts, was interviewed on the top qualities that trainers should
possess. She says a great trainer has all of the following qualities:

1. A command of the material
2. Preparation and practice
3. Rhythm and energy
4. Readiness to allow and encourage participants to learn from themselves and the class to create as many organic learning moments as
possible

5. Love for what they do
6. An excellent organization supporting them

At the top of her list, Prince advises that effective trainers have not only a command of the material—that is, know the material back and forth—
but also know where to get answers if they do not know something. And although Prince emphasizes preparation and practice, trainers must
come off as prepared yet not scripted. Trainees notice if trainers are just going through the motions; fake engagement is soon found out. She says
that trainers should focus on being engaging rather than entertaining. Prince underscores that trainers should have a love for what they do; if the
trainer is jaded and bored, this demeanor necessarily re�lects poorly on the quality of the training itself.

Lastly, effective trainers have excellent organizations supporting them. Without organizational support, training programs suffer; trainers are
not given enough time to prep, train-the-trainer procedures are lacking, and materials get delivered late or are of poor quality. A lack of
organizational support inevitably leads to burnout, even for the most well-intended trainer.

Source: Malik, J. (2011). 6 top qualities of a great trainer. Retrieved from GovLoop website: http://www.govloop.com/pro�iles/blogs/title-6-top-qualities-of-a
(http://www.govloop.com/pro�iles/blogs/title-6-top-qualities-of-a)

Consider This

1. What additional qualities might be needed if the trainer were an external consultant versus an internal trainer?
2. If one quality of great trainers is a love for what they do, what limitations might there be in the train-the-trainer model?
3. What does Prince mean when she says engagement is more important than entertainment?

Communication Patterns in Training, Part III

Critical Thinking Questions

HRD in Practice: When a Subject Matter Expert Does Not Equal a Presentation Expert
“What a colossal waste of time that was!” Rashanda muttered to herself as she left the training room. “That’s 90 minutes I’ll never get
back!”

“Hey, Rashanda. What’s up? What’s wrong?”

“Hi, Carrie. Nothing. I just got out of the so-called training on the new system.”

“Bad?”

http://www.govloop.com/profiles/blogs/title-6-top-qualities-of-a

1/8/2018 Print

https://content.ashford.edu/print/AUBUS375.14.1?sections=ch06,ch06intro,sec6.1,sec6.2,sec6.3,sec6.4,ch06summary&content=all&clientToken=b76… 8/15

“Awful! And, it wasn’t because of the content; I actually was looking forward to learning the new system. Supposedly, the guy they got
to train us was an expert on this system. But he was terrible! First off, we couldn’t hear a word he was saying because of the buzz from
the computer fan, and when we could hear him, all he would do is stammer; every other word was like, ‘Ah—Uh—OK—Uh.’ And then
he would turn his back to us and read word-by-word each of his PowerPoint® slides. To top things off, he ignored questions when
people had their hands up. If there was a poster child for how not to give presentations, this guy was it! I wish there would have been
some type of evaluation at the end because I would have written a thing or two, believe me! The bottom line is I still don’t know the
system—I didn’t learn anything!”

Consider This

Given Rashanda’s description of the trainer, what rules for presentation do you think the trainer violated?
What should an organization do if the subject matter expert is not an expert in presentations skills?

1/8/2018 Print

https://content.ashford.edu/print/AUBUS375.14.1?sections=ch06,ch06intro,sec6.1,sec6.2,sec6.3,sec6.4,ch06summary&content=all&clientToken=b76… 9/15

6.3 Barriers to Implementing Training
For a training program to be effective, employees must �irst perceive it as being useful (Agbettor, 2013; Rothwell & Kazanas, 2011; Sambrook & Stewart, 2007).
However, achieving this goal is sometimes easier said than done, due to three levels of potential resistance trainees may exhibit toward new training (Connor,
Lake, & Stackman, 2003; Welty, 2007, 2013):

Barriers to understanding the need for training. Trainees may feel the new training is pointless because they see no need for it. “This is ridiculous; we
don’t need con�lict handling training here. What we need is a raise!”
Barriers to acceptance of training. Trainees may feel there is a need for the training, but they do not accept that they themselves are in need of
training.” Why are they grouping me with the supervisors who don’t know how to do a performance appraisal? I’m one of the supervisors who does know how
to do it!”
Barriers to acting out the training. Trainees may see the need for the training and accept they will be in training, but they are not committed or
dedicated to the outcomes of the training. “This is going to be a monster to implement; I’m just going to do it the way I always have.”

Remember, as discussed in Chapter 2, in the absence of able and willing trainees, barriers ultimately come down to a distressed status of the trainee’s ability
and/or willingness:

Able and willing
Not able, but willing
Able, but not willing
Not able and not willing

Chapter 8 will further discuss how to overcome such barriers using Lewin’s force-�ield analysis.

.

Food for Thought: Ways to Address Training Barriers
The Nonpro�it Risk Management Center (http://www.nonpro�itrisk.org (http://www.nonpro�itrisk.org) ) provides tips to overcome training
barriers, speci�ically in workplace safety. These are common barriers:

Lack of engagement and support from top management
Lack of trainee understanding and appreciation of the training
Lack of appropriate time investment for design and implementation
Lack of clear and consistent communication about performance expectations
A decentralized organizational structure

Source: Nonpro�it Risk Management Center. (2008). Recognizing some barriers to implementing workplace-safety programs. Retrieved from:
https://nonpro�itrisk.org/tools/workplace-safety/nonpro�it/c2/barriers.htm (https://nonpro�itrisk.org/tools/workplace-safety/nonpro�it/c2/barriers.htm)

Consider This

1. What would be an example of an organization’s reward structure for employees who engage in safety practices?
2. Regarding workplace safety training, describe what you would do to convey to employees a need for this training.
3. What challenges does a highly decentralized organization (one with many sites or locations) pose for conveying the need for or appreciation
of the training?

E-learning Readiness: Potential Barriers

Because of the touted cost savings of e-learning programs, it is tempting for organizations to jump right in and implement e-learning in their training program.
However, one aspect organizations must evaluate so it is not a barrier is the culture for e-learning (Aydin & Tasci, 2005; Borotis & Poulymenakou, 2004); that is,
the organization’s e-learning readiness.

The factors that make up e-learning readiness are varied and numerous, ranging from evaluating the practical (for example, the IT equipment and �inancial
wherewithal) to the intangible (for example, the interpersonal and sociological readiness of the workforce). To assess an organization’s e-learning readiness,
Chapnick (2001) developed the e-learning readiness scale as a 5-point Likert scale (ranging from “strongly disagree” to “strongly agree”) on the following
factors:

Psychological readiness—the individual’s state of mind as it affects the outcome of the e-learning initiative
Sociological readiness—the interpersonal aspects of the environment in which the program will be implemented
Environmental readiness—the large-scale forces operating on the stakeholders, both inside and outside the organization
Human resource readiness—the availability and design of the human support system
Financial readiness—the budget size and allocation process
Technological skill (aptitude) readiness—observable and measurable technical competencies
Equipment readiness—the question of the proper equipment possession
Content readiness—the subject matter and goals of the instruction

Home

https://nonprofitrisk.org/tools/workplace-safety/nonprofit/c2/barriers.htm

1/8/2018 Print

https://content.ashford.edu/print/AUBUS375.14.1?sections=ch06,ch06intro,sec6.1,sec6.2,sec6.3,sec6.4,ch06summary&content=all&clientToken=b7… 10/15

The use of e-learning for training should not be done casually or indifferently (Liu, Gibby, Quiros, & Demps, 2002; Meier & Stormer, 2009; Onguko, Jepchumba, &
Gaceri, 2013); in fact, the skills of trainers who use e-learning are so important that recently, the ATD developed a certi�ication speci�ically for e-learning in
instructional design.

1/8/2018 Print

https://content.ashford.edu/print/AUBUS375.14.1?sections=ch06,ch06intro,sec6.1,sec6.2,sec6.3,sec6.4,ch06summary&content=all&clientToken=b7… 11/15

6.4 Outsourcing Training
Until now, we have detailed the processes of ADDIE and training internally, but an organization might have various reasons for outsourcing, or deciding to
purchase prepackaged training materials and bring in outside trainers for delivery (Duggan, 2013; Larson & Lockee, 2013; Neirotti & Paolucci, 2013; Noe, 2012;
Welty, 2013). These reasons include:

the need to comply with complex regulations such as those governing safety or environmental issues;
legal requirements such as those governing equal opportunity, harassment, and discrimination;
a small staff and a lack of enough (or any) quali�ied trainers;
large numbers of employees who need refresher training; and
the desire to keep employees up to date on what is happening in the industry.

Outsourcing: A Rising Trend

The State of the Industry report is ATD’s de�initive review of workplace learning and development trends (ASTD, 2012). The ATD estimates that U.S.
organizations spent approximately $164.2 billion on employee learning in 2012, of which 28% ($46 billion) was spent on external services and outsourcing. This
total was up from 24% the previous year and only 12% in 2010.

Why an organization outsources some or all of its training depends also on its goals. For instance, if an organization’s goal is to maximize shareholder economic
value, what Beer and 156 Nohria (2000) call Theory E, then the outsourcing typically would be large and knowledge driven; that is, there would be extensive
dependence and assistance from outside consultants, who would most likely perform the training. If the goal is to develop organizational capabilities, so-called
Theory O, then the outsourcing would be small and process driven; that is, we would look to the outside consultants to give us the train-the-trainer processes so
our trainers could perform the training (see Table 6.2).

Table 6.2: Outsourcing dimensions

Dimensions of change Theory E Theory O

Goals Maximize shareholder value Develop organizational capabilities

Leadership Manage change from the top down Encourage participation from the bottom up

Focus Emphasize structure and systems Build up corporate culture: employees’ behavior
and attitudes

Process Plan and establish programs Experiment and evolve

Reward system Motivate through �inancial incentives Motivate through commitment; use pay as fair
exchange

Use of outsourcing Consultants analyze problems and shape solutions Consultants support management in shaping their
own solutions

Source: Adapted from Beer, M., & Nohria, N. (2000). Breaking the code of change. Boston, MA: Harvard Business School Press.

Potential Disadvantages of Outsourcing

Although outsourcing has its advantages, organizations should consider some potential disadvantages (Luftig & Ouellette, 2012), as well. They include the
following:

Cost. Although cost savings is often one of the reasons cited for outsourcing noncore functions, outsourced training services can be expensive (Agbettor,
2013; Allen, 2013; Laird, Naquin, & Holton, 2003). Training companies may charge hundreds of dollars per employee for a 1-day training course, and
executive training programs, especially, tend to be more expensive.
Control. Companies lose control when outsourcing support functions because the training services provider chooses the format and content of its
training programs, which typically contain generic examples and case studies. For example, a car dealership may send its sales representatives to a
training course that may contain few examples on how to convert car dealership visitors to customers. Also, training companies usually retain copyright
of all training materials, so hiring companies may not be able to customize the manuals or presentation slides for future internal training needs. These
restrictions make companies dependent on third parties for creating a skilled workforce (Basu, n.d.).
Security issues. Both small and large companies generate and store data that can be critical and important. Although most outsourcing vendors take
adequate precautions to safeguard sensitive data of clients—such as employee performance records, company trade secrets, patents, and copyrights—it
is more dif�icult to secure data when that data is in another organization’s hands (Jochems, Koper, & Van Merrienboer, 2013; Pelet, 2013). For example, if
an outside �irm was training your employees on a particular new KSA that would give your organization a competitive advantage, a leak could be
devastating (Seth & Sethi, 2011).
Lower quality work. Because the trainers are “outsiders” to begin with, employee performance may suffer, particularly if outsourcing vendors are not
chosen well or if the host organization does not manage the outsourcing vendor properly. Good “�itness” of the vendor to the hiring organization is
critical; therefore, contacting previous clients and reviewing vendors’ past results is critical (Agbettor, 2013; Allen, 2013; Laird et al., 2003).

The market for outsourced training, especially in e-learning scenarios, will grow to more than $50 billion over the next few years (ASTD, 2012), and each
organization must weigh the pros and cons of outsourcing, with consideration given to factors such as �inancial resources, technological capacity, and the subject

1/8/2018 Print

https://content.ashford.edu/print/AUBUS375.14.1?sections=ch06,ch06intro,sec6.1,sec6.2,sec6.3,sec6.4,ch06summary&content=all&clientToken=b7… 12/15

matter of the training itself.

HRD in Practice: Cases for Outsourcing
Weyerhaeuser, an international paper and building products manufacturer, outsources about half its training programs—those focused on soft
skills (communications, time management, leadership development, decision making, and problem solving), sales training, and health safety
issues—to Novations Group, Inc. At the heart of the outsourcing is Novations’ standard catalog of 30 training courses to support Weyerhaeuser’s
soft-skills learning programs; Novations adds new content as it is needed.

Weyerhaeuser’s motivation to outsource was an annual outlay of about $30 million on training; management had little idea where the money
was going or what the return-on-training investment was. Further, the company wanted to �ind better, lower cost, less risky, and faster ways to
manage and implement training programs. Weyerhaeuser’s director of education, Horace Parker, explains:

We used to maintain training contracts with 400 vendors, just in the soft-skills area. Now we have all that covered through one
contract with Novations. We’re rid of all the hassles of dealing with multiple vendors, and we have the economies of scale that
come from working with a single vendor.

Weyerhaeuser’s alliance with Novations realized a reduction in total gross spending for training of about 15%. The company was also able to
reduce its in-house training staff by nearly 60%.

Source: Why outsource training? (2003). HRO Today, 2(3). Retrieved from http://www.hrotoday.com/content/575/why-outsource-training
(http://www.hrotoday.com/content/575/why-outsource-training)

Consider This

1. Although a cost savings was realized, what could be the unintended consequences of Weyerhaeuser’s reduction in its in-house training
staff?

http://www.hrotoday.com/content/575/why-outsource-training

1/8/2018 Print

https://content.ashford.edu/print/AUBUS375.14.1?sections=ch06,ch06intro,sec6.1,sec6.2,sec6.3,sec6.4,ch06summary&content=all&clientToken=b7… 13/15

Summary and Resources
Chapter Summary

An important step in implementation is testing the training prior to full-scale implementation; this includes beta and pilot testing. In pilot testing we
“prerelease” the training to selected trainees and SMEs for testing under normal, everyday conditions to pinpoint any remaining �laws and get feedback
on particular modules of the training, as well as the training as a whole. Beta testing takes place in the real-time trainee environment, and all intended
users participate.
In the implementation phase, we also ensure that the trainer has the required KSAs, which include being an expert in the training material, being well
prepared, and having enthusiasm and good energy that the trainees pick up on. The trainer also has good communication skills and can manage speech–
thought differential as well as the aspects of leveling, sharpening, and assimilation.
It is important to manage the barriers of implementation, as well. These include barriers to understanding the need for training, barriers to acceptance of
training, and barriers to acting out the training.
Finally, it is important to weigh the pros and cons of outsourcing the training to outside vendors. Outsourcing might be advantageous if the company must
comply with complex regulations, such as those governing safety or environmental issues; when an organization does not have enough quali�ied trainers;
and when an organization wants to keep employees current on industry trends. Disadvantages include lack of control and security issues and, if training
is not managed properly, lower quality work from trained employees.

Assess Your Learning: Critical Re�lection

1. What would be the special considerations, if any, in piloting a self-directed training program?
2. If you had to choose between one of the following trainer pro�iles, which one would you choose and why?
a. a subject matter expert who scored a 75% in presentation skills
b. an expert presenter who scored a 75% in content knowledge

3. Give your own communication examples of leveling, sharpening, and assimilation.
4. Explain the paradox in which employees can see the need for training but are not committed to being trained. How do you overcome this barrier?
5. Are there certain subjects or content that should not be outsourced? If so, why?

Additional Resources

Web Resources

For speaking skills:
http://www.youtube.com/watch?v=hdBNUDIOIP8 (http://www.youtube.com/watch?v=hdBNUDIOIP8)

2013 top 20 training outsourcing companies:
http://www.trainingindustry.com (http://www.trainingindustry.com)

Case study on overcoming the top �ive barriers to electronic health records implementation:
http://www.prognosishis.com/pdf/Overcoming%20Barriers%20Whitepaper
(http://www.prognosishis.com/pdf/Overcoming%20Barriers%20Whitepaper )

About outsourcing management training:
http://www.youtube.com/watch?v=h64PnKpAKTY (http://www.youtube.com/watch?v=h64PnKpAKTY)

For more readings on Theory E and Theory O:
http://hbswk.hbs.edu/item/2166.html (http://hbswk.hbs.edu/item/2166.html) and http://stevblogs.wordpress.com/2009/05/22/theory-e-o
(http://stevblogs.wordpress.com/2009/05/22/theory-e-o)

Further Reading

American Society for Training & Development. (2012). State of the industry report. Alexandria, VA: ASTD.

Jochems, W., Koper, R., & Van Merrienboer, J. (2013). Integrated e-learning: Implications for pedagogy, technology and organization. London: Taylor & Francis.

Kimmel, A. J. (2013). Rumors and rumor control: A manager’s guide to understanding and combatting rumors. London: Taylor & Francis.

Piskurich, G. M. (2010). Rapid training development: Developing training courses fast and right. New York: Wiley.

Shaw, J. (2011). The cave man guide to training and development. Los Gatos, CA: Smashwords.

Key Terms

Click on each key term to see the de�inition.

assimilation
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

http://www.trainingindustry.com/

http://www.prognosishis.com/pdf/Overcoming%20Barriers%20Whitepaper

http://hbswk.hbs.edu/item/2166.html

Theory E & Theory O

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

1/8/2018 Print

https://content.ashford.edu/print/AUBUS375.14.1?sections=ch06,ch06intro,sec6.1,sec6.2,sec6.3,sec6.4,ch06summary&content=all&clientToken=b7… 14/15

A process by which trainees incorporate a message into their own frame of reference or personality. This idea follows adult learning principles in that learners
take in messages based on their prior experiences with the subject matter.

barriers to acceptance of training
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

Barriers to training whereby trainees may feel there is a need for the training, but they do not accept that they must be trained.

barriers to acting out the training
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

Barriers to training whereby trainees may see the need for the training and accept that they will be in training, but they are not committed or dedicated to the
outcomes of the training.

barriers to understanding the need for training
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

Barriers to training whereby trainees may feel the new training is pointless and see no need for it.

beta test
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

A type of test in which the training takes place in the real-time trainee environment and all intended users participate; part of a formative evaluation.

control
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

An outsourcing consideration. Organizations may lose control when outsourcing support functions because the training services provider decides on the format
and content of its training programs.

cost
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

An outsourcing consideration. Cost savings is often one of the reasons cited for outsourcing noncore functions, but outsourced training services can be more
expensive.

EEEC
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

Expert, enthusiastic, empathic, and clear; a skill set recommended for a trainer in order to optimize the relationship between the trainer and trainee.

e-learning readiness
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

An organization’s culture for e-learning.

formative evaluation
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

A method for judging the worth of a program while the program activities are forming (in progress); an evaluation of the processes of the training.

going off on a tangent
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

Engaging in a departure from the trainer’s line of thinking: The trainee seizes on one of trainer’s ideas and takes it in his or her own direction; includes
daydreaming.

implementation
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

One of the phases of ADDIE; implementation rolls out and commences the training itself and is usually done after the analysis, design, and development phase.

large departures
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

A level of distraction in which a trainee’s attention wanders off into unrelated areas; the trainee’s attention is brought back into focus on training for a while but
goes off again into thinking about unrelated topics.

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

1/8/2018 Print

https://content.ashford.edu/print/AUBUS375.14.1?sections=ch06,ch06intro,sec6.1,sec6.2,sec6.3,sec6.4,ch06summary&content=all&clientToken=b7… 15/15

leveling
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

The trainee’s tendency to reduce the message with fewer and fewer details.

outsourcing
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

Purchasing prepackaged training materials and bringing in outside trainers for delivery.

pilot test
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

A pretest administered to pinpoint any remaining �laws and get feedback on particular modules of the training by prereleasing the training to selected actual
trainees and SMEs for testing under normal, everyday conditions; part of a formative evaluation.

private argument
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

A distraction whereby the trainee begins to challenge and argue internally before hearing the trainer out. The trainee stops trying to understand the trainer and
carries on a running argument with him- or herself.

security issues
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

Another outsourcing consideration. Outsourcing vendors must take adequate precautions to safeguard data of clients who undertake outsourcing; it is more
dif�icult to secure data when that data is in another organization’s hands.

sharpening
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

The trainee’s tendency to selectively retain information, especially only dominant points (such as hyperbole).

small departures
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

A level of distraction in which trainees produce their own examples, relate material to their own personal experiences, answer rhetorical questions, and use time
for mental interaction with the trainer’s ideas.

speech–thought differential
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

The premise that people think at a faster rate than they speak.

summative evaluation
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

An evaluation of the �inal outcomes of the training itself.

Theory E
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

The theory that if an organization’s goal is to maximize shareholder economic value, then the outsourcing typically would be large and knowledge driven.

Theory O
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

The theory that if an organization’s goal is to develop organizational capabilities, then the outsourcing should be small and process driven.

vocal variation and in�lections
(http://content.thuzelearning.com/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/section

Various ways of speaking; in presentation of training, these must be appropriate or they may have an unintended effect on the trainees; for example, vocal
variations such as loud and slow could be interpreted as aggression.

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

https://content.ashford.edu/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm/books/AUBUS375.14.1/sections/fm#

1/10/2018 Apple Is Beta-Testing An Update That Kills Evasi0n Jailbreak

https://www.forbes.com/sites/andygreenberg/2013/02/25/apple-is-beta-testing-a-fix-for-evasi0n-jailbreak/#3ec698255479 1/3

 Security
FEB 25, 2013 @ 10:53 AM 49,370 

/

Apple Is Beta-Testing An Update That Kills
Evasi0n Jailbreak

Andy Greenberg , FORBES STAFF 
Covering the worlds of data security, privacy and hacker culture. FULL BIO 

All good jailbreaks must come to an end.

Late last week Apple released an update for iOS
to developers in beta that prevents the use of
the popular jailbreak software evasi0n,
according to one of evasi0n’s creators who
tested the patch over the weekend, David
Wang.

Wang tells me that he’s analyzed the 6.1.3 beta 2 update and found that it patches at
least one of the five bugs the jailbreak exploits, namely a flaw in the operating
system’s time zone settings. The beta update likely signals the end of using evasi0n
to hack new or updated devices after the update is released to users, says Wang, who
says he’s still testing the patch to see which other vulnerabilities exploited by the
jailbreak might no longer exist in the new operating system.

“If one of the vulnerabilities doesn’t work, evasi0n doesn’t work,” he says. “We could
replace that part with a different vulnerability, but [Apple] will probably fix most if
not all of the bugs we’ve used when 6.1.3 comes out.”

That impending patch doesn’t mean evasi0n’s time is up, says Wang. Judging by
Apple’s usual schedule of releasing beta updates to users, he predicts that it may
take as long as another month before the patch is widely released.

When evasi0n hit the Web earlier this month, it quickly became the most popular
jailbreak of all time as users jumped at their first chance to jailbreak the iPhone 5
and other most-recent versions of Apple’s hardware. The hacking tool was used on
close to seven million devices in just its first four days online.

https://www.forbes.com/security

https://www.forbes.com/

https://www.forbes.com/sites/andygreenberg/

http://blogs-images.forbes.com/andygreenberg/files/2013/02/evasi0n3

http://www.forbes.com/sites/andygreenberg/2013/02/08/evasi0n-is-the-most-popular-jailbreak-ever-nearly-seven-million-ios-devices-hacked-in-four-days/

https://www.forbes.com/sites/andygreenberg/

1/10/2018 Apple Is Beta-Testing An Update That Kills Evasi0n Jailbreak

https://www.forbes.com/sites/andygreenberg/2013/02/25/apple-is-beta-testing-a-fix-for-evasi0n-jailbreak/#3ec698255479 2/3

Despite that frenzy, Apple has hardly scrambled to stop the jailbreaking. Evasi0n
has already gone unpatched for three weeks. That’s far longer, for instance, than the
nine days it took Apple to release a fix for Jailbreakme 3.0, the jailbreak tool
released in the summer of 2011 for the iPhone 4, which was by some measures the
last jailbreak to approach Evasi0n’s popularity.

Apple’s slow response to Evasi0n is explained in part by the relatively low security
risk that the tool poses. Unlike Jailbreakme, which allowed users to merely visit a
website and have their device’s restrictions instantly broken, Evasi0n requires users
to plug their gadget into a PC with a USB cable. That cable setup makes it far
tougher for malicious hackers to borrow Evasi0n’s tricks to remotely install malware
on a user’s phone or tablet.

Security researchers have nonetheless pointed out that Evasi0n could give criminals
or spies some nasty ideas. The tool uses five distinct bugs in iOS, all of which might
be appropriated and combined with other techniques for malicious ends. And F-
Secure researcher Mikko Hypponen points out that if a hacker used a Mac or
Windows exploit to compromise a user’s PC, he or she could simply wait for the
target to plug in an iPhone or iPad and use evasi0n to take over that device as well.

More likely, perhaps, is a scenario described by German iPhone security researcher
Stefan Esser. He argues that a hacker could use a secret exploit to gain access to an
iPhone or iPad and then install evasi0n, using the jailbreaking tool to hide his or her
tracks and keep the secret exploit technique undiscovered by Apple and unpatched.
“That way they protect their investment and leave no exploit code that could be
analyzed for origin,” Esser wrote on Twitter.

Apple already has a more pressing security reason to push out its latest update. The
patch also fixes a bug discovered earlier this month that allows anyone who gains
physical access to a phone to bypass its lockscreen in seconds and access contacts
and photos.

When Apple’s update arrives, the team of jailbreakers known as the evad3rs may
still have more tricks in store. Wang tells me that the group has discovered enough
bugs in Apple’s mobile operating system to nearly build a new iOS jailbreak even if
all the bugs they currently use are fixed.

But then again, Wang says he hasn’t yet been able to check Apple’s patch for every
bug it might fix–either the ones evasi0n employs or those he and his fellow hackers
had hoped to keep secret for their next jailbreak. “If they patch most of the bugs,”
Wang says, “Then we’re starting from scratch.”

http://www.forbes.com/sites/andygreenberg/2011/07/15/apple-patches-jailbreakme-3-iphone-and-ipad-vulnerability/

http://www.forbes.com/sites/andygreenberg/2013/02/05/inside-evasi0n-the-most-elaborate-jailbreak-to-ever-hack-your-iphone/

http://www.theverge.com/2013/2/14/3987830/ios-6-1-security-flaw-lets-anyone-make-calls-from-your-iphone

http://www.forbes.com/sites/andygreenberg/2013/02/06/after-evasi0n-ios-hackers-have-more-exploits-in-store-for-apple/

1/10/2018 Apple Is Beta-Testing An Update That Kills Evasi0n Jailbreak

https://www.forbes.com/sites/andygreenberg/2013/02/25/apple-is-beta-testing-a-fix-for-evasi0n-jailbreak/#3ec698255479 3/3

Follow me on Twitter, and check out my new book, This Machine Kills
Secrets: How WikiLeakers, Cypherpunks and Hacktivists Aim To Free
The World’s Information.

http://www.thismachinekillssecrets.com/

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER