922 resultados para Computer Security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study integrated the research streams of computer-mediated communication (CMC) and group conflict by comparing the expression of different types of conflict in CMC groups and face-to face (FTF) groups over time. The main aim of the study was to compare the cues-filtered-out approach against the social information processing theory A laboratory study was conducted with 39 groups (19 CMC and 20 FTF) in which members were required to work together over three sessions. The frequencies of task, process, and relationship conflict were analyzed. Findings supported the social information processing theory. There was more process and relationship conflict in CMC groups compared to FTF groups on Day 1. However, this difference disappeared on Days 2 and 3. There was no difference between CMC and FTF groups in the amount of task conflict expressed on any day.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article argues that nuclear weapons serve no useful purpose in military calculations; moreover, their continued retention invites the dangers of further proliferation and of accidental use. They are thus defined here as obstacles to, rather than as facilitators of, international security. Seven reasons are presented to support this contention, including an assessment of the moral implications and the strategic limitations of nuclear weapons. Despite these limitations, and the recent commitments made by the nuclear weapon states to eliminate their arsenals, nuclear weapons remain central to the strategic doctrines of these states. Several reasons are put forward to explain why this retention continues, including the unchanging nature of strategic mindsets, the presence of vested interests, and now, in the case of the USA at least, a renewed reliance on nuclear weapons, regardless of how appropriate and effective such a strategy might be against emerging terrorist or `rogue state' threats.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computer Science is a subject which has difficulty in marketing itself. Further, pinning down a standard curriculum is difficult-there are many preferences which are hard to accommodate. This paper argues the case that part of the problem is the fact that, unlike more established disciplines, the subject does not clearly distinguish the study of principles from the study of artifacts. This point was raised in Curriculum 2001 discussions, and debate needs to start in good time for the next curriculum standard. This paper provides a starting point for debate, by outlining a process by which principles and artifacts may be separated, and presents a sample curriculum to illustrate the possibilities. This sample curriculum has some positive points, though these positive points are incidental to the need to start debating the issue. Other models, with a less rigorous ordering of principles before artifacts, would still gain from making it clearer whether a specific concept was fundamental, or a property of a specific technology. (C) 2003 Elsevier Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Test of Mouse Proficiency (TOMP) was developed to assist occupational therapists and education professionals assess computer mouse competency skills in children from preschool to upper primary (elementary) school age. The preliminary reliability and validity of TOMP are reported in this paper. Methods used to examine the internal consistency, test-retest reliability, and criterion- and construct-related validity of the test are elaborated. In the continuing process of test refinement, these preliminary studies support to varying degrees the reliability and validity of TOMP. Recommendations for further validation of the assessment are discussed along with indications for potential clinical application.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The article describes an attempt to improve student learning outcomes in a computer networks course by making lectures more active learning experiences. Quick quizzes, group and individual exercises, the review of student questions, as well as multiple breaks, were incorporated into the weekly three-hour lectures. Student responses to the modified lectures was overwhelmingly positive: over 85% of respondents agreed that the lectures aided understanding, with large majorities of the respondents finding the individual activities useful to their learning. Although student examination performance improved over the previous year, performance on an examination question that was designed to examine deep understanding remained unchanged.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The idea of “human security” is gaining attention among policy-makers and security analysts. Little scholarly attention has been given to the questions of why states accept (or reject) a human security agenda or how such an agenda is incorporated into policy practices. The article suggests that a human security approach is most likely to be applied when both humanitarian and national interests combine. Yet when states or organisations adopt a human security approach, they often misjudge the complex and long-term commitment required of such an approach. There is also the potential for such an agenda to be manipulated to justify questionable courses of action. These issues frame an analysis of six recent case studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study explores the impact of Turkey's likely entry in the European Union (EU) in terms of the EU's foreign, security and defense policies. It reviews Turkish capabilities, namely its military capabilities, which could provide the EU with valuable defense assets. There are differences related to Turkey's relations with the EU, which have increasingly spilled over into the NATO, hindering the development of cooperation over crisis management operations. The article then delves in the implications of Turkey's strategic geographical location to EU policies. It reviews how far the EU and Turkey may have convergent interests in some of the neighboring regions, especially in the Middle East.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Brazil's security agenda during Lula's administration was not homogeneous through the two mandates: the first tenure (2002-2006) revealed a reactive approach towards security topics, while the second one (2006-2010) was more assertive. More specifically, the shift occurred in terms of both its geographical scope - once it incorporated global issues in a more systematic way -, and instruments through which the security agenda was exercised, given the multilateral initiative of Unasur's CDS

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The conventional approach in the discipline of International Relations is to treat terrorist organizations as "non-state" actors of international relations. However, this approach is problematic due to the fact that most terrorist organizations are backed or exploited by some states. In this article, I take issue with the non-stateness of terrorist organizations and seek to answer the question of why so many states, at times, support terrorist organizations. I argue that in the face of rising threats to national security in an age of devastating wars, modern nation states tend to provide support to foreign terrorist organizations that work against their present and imminent enemies. I elaborate on my argument studying three cases of state support for terrorism: Iranian support for Hamas, Syrian support for the PKK, and American support for the MEK. The analyses suggest that, for many states, terror is nothing but war by other means.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Liberal-Institutionalism and Structural Realism expectations about international organizations are confronted by looking at if and how US-controlled international aid is granted, and particularly if it is related or not to political affinity and to United Nations Security Council (UNSC) non-permanent membership. A preliminary assessment suggests that these relations only hold for the period of the Cold War, and, even then, only when UNSC non-permanent membership is in years in which the Security Council was deemed very important.