1000 resultados para workshop


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this project was to raise awareness surrounding child and adolescent mental health in an effort to reduce preconceived stigmas in relation to this specialized field. This project presented a literature review of the current state of child and adolescent mental health in Canada today, including the prevalence and several treatment options for young people confronting mental health challenges. Consideration of the powerful role of the education system upon youth with mental health issues became evident, specifically regarding early identification and prevention. A needs assessment was conducted to gather feedback from the clinical practitioners of a Section 23 classroom within a Southern Ontario hospital. This assessment was used to develop an informational and pedagogical workshop resource to extend practitioner understanding of this pertinent issue and support the social and emotional needs of young people confronting mental heath challenges. Results of the assessment indicated the significant need for such a workshop resource, and these responses were used to guide the development of Group Chat: A Workshop to Support the Emotional and Social Needs of Youth. The latter was subsequently presented to participants, whereby evaluative questionnaires indicated the efficacy and usefulness of this workshop resource to both practitioners and students alike.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite the growing popularity of participatory video as a tool for facilitating youth empowerment, the methodology and impacts of the practice are extremely understudied. This paper describes a study design created to examine youth media methodology and the ethical dilemmas that arose in its attempted implementation. Specifically, elements that added “rigor” to the study (i.e., randomization, pre- and post-measures, and an intensive interview) conflicted with the fundamental tenets of youth participation. The paper concludes with suggestions for studying participatory media methodologies that are more in line with an ethics of participation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Regional Workshop conducted by University Library in collaboration with UGC INFLIBNET and Cochin University of Science & Technology, on 9th Feb 2015

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dieser Tagungsband enthält die gesammelten Zusammenfassungen der acht eingereichten Vorträge des 5. Krypto-Tags. Der Kryptotag ist eine zentrale Aktivität der Fachgruppe "Angewandte Kryptologie" der Gesellschaft für Informatik e.V. Er ist eine wissenschaftliche Veranstaltung im Bereich der Kryptologie und von der organisatorischen Arbeit der Fachgruppe getrennt.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With this document, we provide a compilation of in-depth discussions on some of the most current security issues in distributed systems. The six contributions have been collected and presented at the 1st Kassel Student Workshop on Security in Distributed Systems (KaSWoSDS’08). We are pleased to present a collection of papers not only shedding light on the theoretical aspects of their topics, but also being accompanied with elaborate practical examples. In Chapter 1, Stephan Opfer discusses Viruses, one of the oldest threats to system security. For years there has been an arms race between virus producers and anti-virus software providers, with no end in sight. Stefan Triller demonstrates how malicious code can be injected in a target process using a buffer overflow in Chapter 2. Websites usually store their data and user information in data bases. Like buffer overflows, the possibilities of performing SQL injection attacks targeting such data bases are left open by unwary programmers. Stephan Scheuermann gives us a deeper insight into the mechanisms behind such attacks in Chapter 3. Cross-site scripting (XSS) is a method to insert malicious code into websites viewed by other users. Michael Blumenstein explains this issue in Chapter 4. Code can be injected in other websites via XSS attacks in order to spy out data of internet users, spoofing subsumes all methods that directly involve taking on a false identity. In Chapter 5, Till Amma shows us different ways how this can be done and how it is prevented. Last but not least, cryptographic methods are used to encode confidential data in a way that even if it got in the wrong hands, the culprits cannot decode it. Over the centuries, many different ciphers have been developed, applied, and finally broken. Ilhan Glogic sketches this history in Chapter 6.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the rise of the industrial revolution, there are few challenges that compare in scale and scope with the challenge of implementing lean principles in order to achieve high performance work systems. This report summarize key insights and learning by representatives from a cross section of organizations who are on this journey. Specifically, we report on findings from the first Lean Aircraft Initiative (LAI) Implementation Workshop, which was held on February 5-6, 1997.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The descriptions below and the attached diagrams are outputs of the 1998 LAI Product Development Focus Team workshop on the Value Chain in Product Development. A working group at that workshop was asked to model the product development process: in terms of the phases of product development and their interfaces, boundaries and outputs. Their work has proven to be generally useful to LAI researchers and industry members, and so is formalized here.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the rise of the industrial revolution, there are few challenges that compare in scale and scope with the challenge of implementing lean principles in order to achieve high performance work systems. This report summarize key insights and learning by representatives from a cross section of organizations who are on this journey. Specifically, we report on findings from the first Lean Aircraft Initiative (LAI) Implementation Workshop, which was held on February 5-6, 1997. The report is not a “cookbook” or a “how to” manual. Rather, it is a summary of the first phase in a learning process. It is designed to codify lessons learning, facilitate diffusion among people not at the session, and set the stage for further learning about implementation.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resum del "VII Workshop REBIUN sobre proyectos digitales". Ens dóna el marc tecnològic (Driver) i legal (Cedro, Rebiun), parla del Open Access i exposa alguns projectes digitals de biblioteques

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the summary of the lively discussion at the bLOODHOUND@University kick-off meeting held at the University of the West of England Bristol on 15th September 2009.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Slides and activity sheets to accompany a set of practical workshop activities which help participants identify some of their individual skills, as the basis for a future coursework to produce a CV

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A presentation from 2009 on who to enable staff to plan workshops within the School.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is about open innovation, open source and assistive technology as part of a JISC project developing an innovation market place for AT projects.