759 resultados para Student volunteers in social service.


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study investigated the practices of two teachers in a school that was successful in enabling the mathematical learning of students in Years 1 and 2, including those from backgrounds associated with low mathematical achievement. The study explained how the practices of the teachers constituted a radical visible pedagogy that enabled equitable outcomes. The study also showed that teachers’ practices have collective power to shape students’ mathematical identities. The role of the principal in the school was pivotal because she structured curriculum delivery so that students experienced the distinct practices of both teachers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study focuses on the managerial question “should social enterprises become more entrepreneurial?” It adapts the Covin and Slevin (1989) entrepreneurial orientation scale to measure the adoption of entrepreneurship by a social enterprise, and develops a scale that combines a Vincentian based focus to serve the poor with a propensity to take a more entrepreneurial approach toward business as a measure of a social value orientation (SVO).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the widespread of social media websites in the internet, and the huge number of users participating and generating infinite number of contents in these websites, the need for personalisation increases dramatically to become a necessity. One of the major issues in personalisation is building users’ profiles, which depend on many elements; such as the used data, the application domain they aim to serve, the representation method and the construction methodology. Recently, this area of research has been a focus for many researchers, and hence, the proposed methods are increasing very quickly. This survey aims to discuss the available user modelling techniques for social media websites, and to highlight the weakness and strength of these methods and to provide a vision for future work in user modelling in social media websites.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The use of volunteer undergraduate students to support simulated training for peers is common in Paramedic Science. However, there are limited examples of engaging paramedic student-volunteers in research as compared to that reported in cognate disciplines such as Medicine and Nursing. This case report shares our experience with engaging a penultimate year paramedic student in evaluation research. This information we hope will start the dialogue on the epistemology and pedagogies for effective engagement of undergraduate paramedic students as future researchers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter describes the challenges of integrating new technologies with literacy education in pre-service primary teacher education in Australia. The authors describe the policy context and regulatory mechanisms controlling pre-service education, including a national set of professional standards for graduate teachers, a new national curriculum for school students, the introduction of high stakes national assessment for school students, and the looming threat of decontextualized back-to-the-basics professional entry tests for aspiring teachers. The chapter includes three case studies of the authors’ pedagogical practices that attempt to reframe conceptions of the literacy capabilities of pre-service teachers to reflect the complex and sophisticated requirements of teachers in contemporary schooling. The authors conclude the chapter with a discussion of the implications of these case studies as they illustrate the ways that pre-service teachers can be scaffolded and supported to develop creative capacity and critical awareness of the kinds of literacies required in the digital age despite restrictive regimes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The television quiz program Letters and Numbers, broadcast on the SBS network, has recently become quite popular in Australia. This paper considers an implementation in Excel 2010 and its potential as a vehicle to showcase a range of mathematical and computing concepts and principles.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this project was to build the leadership capacity of clinical supervisors in the nursing discipline by developing, implementing and systematically embedding a leadership model into the structure and practice of student supervision. The University worked in partnership with three major metropolitan hospitals in Queensland to develop a framework and professional development program incorporating leadership and clinical supervision. The Leadership and Clinical Education (LaCE) program consisted of two structured workshops complemented by individual personal development projects undertaken by participants. Participants were supported in these activities with a purpose-built website that provides access to a wide variety of information and other learning resources. Quantitative and qualitative evaluations indicated that the approach was highly valued by participants, as it promoted useful peer dialogue, sharing of experiences and personal development in relation to assisting leadership development and student learning in the workplace. The LaCE program provides an ideal springboard for introducing the development of welltrained leaders into the clinical workplace. The resources developed have the potential to provide ongoing support for clinical supervisors to improve the learning of undergraduate nursing student. The challenge will be to achieve continued innovation within clinical education through sustainable leadership programs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A common problem with the use of tensor modeling in generating quality recommendations for large datasets is scalability. In this paper, we propose the Tensor-based Recommendation using Probabilistic Ranking method that generates the reconstructed tensor using block-striped parallel matrix multiplication and then probabilistically calculates the preferences of user to rank the recommended items. Empirical analysis on two real-world datasets shows that the proposed method is scalable for large tensor datasets and is able to outperform the benchmarking methods in terms of accuracy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Due to their potential to positively influence sales quality and performance and reduce employee turnover in service organizations, HR practices targeting employee commitment have received considerable attention in the HRM literature in recent years. Parallel to this, there has been increasing focus on the nature of commitment, and in particular the existence of multiple commitment foci. In this paper, we examine how HR practices influence professionals' commitment to their organization, to their profession or to both organization and profession, in a qualitative study of three Danish financial investment firms. Our findings suggest that in professional service firms, HR practices encourage high levels of organizational commitment primarily and most often through their influence on professional commitment and that HR practices related to flexible work design are essential in creating balance between an employee's commitment to organization and commitment to their profession. Further, the findings suggest that these same HR practices may foster such high levels of professional commitment that labor turnover will increase when opportunities for pursuing professional goals afforded by work design are restricted.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study adopts the premise that innovation capability underpins a service firm's value creation ability and that management style, employee behaviors and marketing underpin its innovation capability. This study examines the role of managers and employees in the creation and delivery of superior value to customers via the firm's innovation capability. To test this premise the current study examines the role of transformational leadership (TFL) as an aspect of the service firm's management style in creating and delivering value to customers through its services. This study adopts a multi-level study, collecting data from managers, employees and customers of service firms in a Southeast-Asian country, Cambodia. The results show that a service firm's innovation capability has a positive effect on the firm's value offering (VO), the VO has a positive relationship with customer perceived value-in use (PVI), and PVI has a positive relationship with firm performance. This study also finds moderating effects of TFL on the relationship between service innovation capability and VO, and of service marketing capability on the relationship between VO and PVI respectively.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Abstract: Social network technologies, as we know them today have become a popular feature of everyday life for many people. As their name suggests, their underlying premise is to enable people to connect with each other for a variety of purposes. These purposes however, are generally thought of in a positive fashion. Based on a multi-method study of two online environments, Habbo Hotel and Second Life, which incorporate social networking functionality, we she light on forms of what can be conceptualized as antisocial behaviours and the rationales for these. Such behaviours included: scamming, racist/homophobic attacks, sim attacks, avatar attacks, non-conformance to contextual norms, counterfeiting and unneighbourly behaviour. The rationales for sub behaviours included: profit, fun, status building, network disruption, accidental acts and prejudice. Through our analysis we are able to comment upon the difficulties of defining antisocial behaviour in such environments, particularly when such environments are subject to interpretation vis their use and expected norms. We also point to the problems we face in conducting our public and private lives given the role ICTs are playing in the convergence of these two spaces and also the convergence of ICTs themselves.