527 resultados para Student membership
Resumo:
Letter to Welland D. Woodruff stating that his membership card will be sent, Feb. 15, 1904.
Resumo:
Active learning strategies based on several learning theories were incorporated during instruction sessions for second year Biological Sciences students. The instructional strategies described in this paper are based primarily on sociocultural and collaborative learning theory, with the goal being to expand the relatively small body of literature currently available that discusses the application of these learning theories to library instruction. The learning strategies employed successfully involved students in the learning process ensuring that the experiences were appropriate and effective. The researchers found that, as a result of these strategies (e.g. teaching moments based on the emerging needs of students) students’ interest in learning information literacy was increased and students interacted with information given to them as well as with their peers. Collaboration between the Librarians, Co-op Student and Senior Lab Instructor helped to enhance the learning experience for students and also revealed new aspects of the active learning experiences. The primary learning objective, which was to increase the students’ information skills in the Biological Sciences, was realized. The advantages of active learning were realized by both instructors and students. Advantages for students attained during these sessions include having their diverse learning styles addressed; increased interaction with and retention of information; increased responsibility for their own learning; the opportunity to value not only the instructors, but also themselves and their peers as sources of authority and knowledge; improved problem solving abilities; increased interest and opportunities for critical thinking, as a result of the actively exchanging information in a group. The primary advantage enjoyed by the instructors was the opportunity to collaborate with colleagues to reduce the preparation required to create effective library instruction sessions. Opportunities for further research were also discovered, including the degree to which “social loafing” plays a role in collaborative, active learning.
Resumo:
This case study traces the evolution of library assignments for biological science students from paper-based workbooks in a blended (hands-on) workshop to blended learning workshops using online assignments to online active learning modules which are stand-alone without any face-to-face instruction. As the assignments evolved to adapt to online learning supporting materials in the form of PDFs (portable document format), screen captures and screencasting were embedded into the questions as teaching moments to replace face-to-face instruction. Many aspects of the evolution of the assignment were based on student feedback from evaluations, input from senior lab demonstrators and teaching assistants, and statistical analysis of the students’ performance on the assignment. Advantages and disadvantages of paper-based and online assignments are discussed. An important factor for successful online learning may be the ability to get assistance.
Resumo:
Much attention has been given to financial conflicts of interest (COI) in bioscience research. Yet to date, surprisingly little attention has focused on other COIs that arise in supervisor-student relations. We examine a spectrum of related situations, ranging from standard graduate supervision through to dual relationships sometimes found in research with commercial potential. We illustrate some of the less-obvious factors that can bias supervisory judgment, and situate financial COI along a spectrum of forces that are deserving of recognition. We conclude by providing two sets of recommendations: one for individual supervisors, and the other for institutions and policy-makers.
Resumo:
2e Prix du concours d'initiation à la recherche organisé par le Regroupement Droit et Changements. L'auteure était étudiante au baccalauréat en droit à l'Université McGill lors de la rédaction de cet article.
Resumo:
Université de Montréal implemented an interprofessional education (IPE) curriculum on collaborative practice in a large cohort of students (>1,100) from 10 health sciences and psychosocial sciences training programs. It is made up of three one-credit undergraduate courses (CSS1900, CSS2900, CSS3900) spanning the first 3 years of training. The course content and activities aim for development of the six competency domains identified by the Canadian Interprofessional Health Collaborative. This paper describes the IPE curriculum and highlights the features contributing to its success and originality. Among main success key factors were: administrative cooperation among participating faculties, educators eager to develop innovative approaches, extensive use of clinical situations conducive to knowledge and skill application, strong logistic support, close cooperation with health care delivery organizations, and partnership between clinicians and patients. A distinguishing feature of this IPE curriculum is the concept of partnership in care between the patient and caregivers. Patients’ representatives were involved in course planning, and patients were trained to become patients-as-trainers (PT) and cofacilitate interprofessional discussion workshops. They give feed- back to students regarding integration and application of the patient partnership concept from a patient’s point of view. Lire l'article/Read the article : http://openurl.ingenta.com/content?genre=article&issn=0090-7421&volume=42&issue=4&spage=97E&epage=106E
Resumo:
La pléthymographie pénienne est considérée comme la méthode la plus objective pour évaluer les intérêts sexuels d'hommes adultes. Par contre, un nombre grandissant de chercheurs déplorent le manque de correspondance qui existe entre les stimuli présentés dans ce type d'évaluation et la réalité. Il est proposé de tenter de remédier à cette lacune en utilisant des personnages virtuels générés par ordinateur et présentant une variété de dispositions affectives lors d'évaluations pléthysmographiques. Ces stimuli n'ont jamais été utilisés dans l'évaluation des intérêts sexuels auprès d’agresseurs sexuels d'enfants. Cette thèse est composée de deux articles qui visent à soutenir le recours à ce type de stimuli lors d'évaluations pléthysmographiques. Afin d'atteindre cet objectif, des hommes ayant eu ou non des contacts sexuels avec des enfants ont été recrutés dans le but de les comparer. Une première étude empirique est bipartite. Elle vise en premier lieu à déterminer auprès d'une population étudiante si les dispositions affectives simulées par les personnages virtuels sont identifiables. Elle cherche ensuite à déterminer la capacité des personnages virtuels à générer un profil d'excitation sexuelle propre à un groupe d'individus n'ayant pas de problématique sexuelle. La seconde étude expérimentale porte sur la comparaison des profils de réponses érectiles issus de la présentation des personnages virtuels et évalue leur capacité à discriminer les individus selon qu'ils possèdent ou non des antécédents en matière de délinquance sexuelle envers les enfants. Dans l'ensemble, les résultats soutiennent l'utilisation de ces stimuli lors d'évaluations pléthysmographiques. Ils démontrent que les personnages virtuels simulent les dispositions affectives prévues et qu'ils génèrent des profils d'excitation sexuelle et des indices de déviance permettant de discriminer entre les groupes à l'étude. Ce projet de recherche présente les avantages associés à la présentation des personnages virtuels simulant différentes dispositions affectives lors de l'évaluation des intérêts sexuels chez les agresseurs d'enfants et propose des avenues intéressantes en termes d'évaluation et de traitement auprès de cette population.
Resumo:
With this document, we provide a compilation of in-depth discussions on some of the most current security issues in distributed systems. The six contributions have been collected and presented at the 1st Kassel Student Workshop on Security in Distributed Systems (KaSWoSDS’08). We are pleased to present a collection of papers not only shedding light on the theoretical aspects of their topics, but also being accompanied with elaborate practical examples. In Chapter 1, Stephan Opfer discusses Viruses, one of the oldest threats to system security. For years there has been an arms race between virus producers and anti-virus software providers, with no end in sight. Stefan Triller demonstrates how malicious code can be injected in a target process using a buffer overflow in Chapter 2. Websites usually store their data and user information in data bases. Like buffer overflows, the possibilities of performing SQL injection attacks targeting such data bases are left open by unwary programmers. Stephan Scheuermann gives us a deeper insight into the mechanisms behind such attacks in Chapter 3. Cross-site scripting (XSS) is a method to insert malicious code into websites viewed by other users. Michael Blumenstein explains this issue in Chapter 4. Code can be injected in other websites via XSS attacks in order to spy out data of internet users, spoofing subsumes all methods that directly involve taking on a false identity. In Chapter 5, Till Amma shows us different ways how this can be done and how it is prevented. Last but not least, cryptographic methods are used to encode confidential data in a way that even if it got in the wrong hands, the culprits cannot decode it. Over the centuries, many different ciphers have been developed, applied, and finally broken. Ilhan Glogic sketches this history in Chapter 6.