977 resultados para Web Security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

To support student learning in a large Metabolism and Nutrition class, we have introduced a web-based package, using a commercially available program, WebCT. The package was developed at a minimal cost and with limited resources. In addition to downloadable (PDF) versions of lecture Powerpoint presentations, tutorial outlines and a practical class exercise, web-based self-directed learning exercises were included to reinforce and extend lecture material in an active learning environment. The web-site also contained a variety of formative and summative assessment tasks that examined both factual recall and higher order thinking Detailed course information, timetables and a bulletin board were also readily accessible. Student usage of the site was generally high, but varied widely between individual students. Students who achieved a high overall score for the course completed on average three times as many formative assessment items and achieved a higher score for all tests than students who did poorly. Student feedback about the site was very positive with the majority of students reporting that the course material and assessment items that were available were useful to their learning. Administration of the course was also facilitated. (C) 2001 IUBMB. Published by Elsevier Science Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The summit meeting between the two Korean heads of state, which took place in Pyongyang in June 2000, constitutes a major turning point in the peninsula's history. As the effects of the meeting are gradually unfolding, a period of detente no longer seems impossible. But major difficulties remain unsolved and Korea will continue to be one of the world's most volatile areas. The task of this essay is to identify and analyse some of the entrenched political patterns that will challenge policy-makers in the years ahead. To do so it is necessary to portray the conflict in Korea not only in conventional ideological and geopolitical terms, but also, and primarily, as a question of identity. From such a vantage-point two components are essential in the search for a more peaceful peninsula. Substantial progress has recently been made in the first realm, the need to approach security problems, no matter how volatile they seem. in a cooperative and dialogical, rather than merely a coercive manner. The second less accepted but perhaps more important factor, revolves around the necessity to recognize that dialogue has its limits, that the party on the other side of the DMZ cannot always be accommodated or subsumed into compromise. Needed is an ethics of difference: a willingness to accept that the other's sense of identity and politics may be inherently incompatible with one's own.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Reviews the book 'Asia Pacific Security Outlook 2000,' edited by Richard W. Baker and Charles M. Morrison.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Industry professionals of the near future will be supported by an IT infrastructure that enables them to complete a task by drawing on resources and people with expertise anywhere in the world, and access to knowledge through specific training programs that address the task requirements. The increasing uptake of new technologies enables information to reach a diverse population and to provide flexible learning environments 24 hours a day, 7 days a week. This paper examines one of the key areas where the World Wide Web will impact on the water and wastewater industries, namely technology transfer and training. The authors will present their experiences of developing online training courses for wastewater industry professionals over the last two years. The perspective is that of two people working at the coalface.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the inception, planning and first delivery of a security course as part of a postgraduate ecommerce program. The course is reviewed in terms of existing literature on security courses, the common body of knowledge established for security professionals and the job market into which students will graduate. The course described in this paper is a core subject for the e-commerce program. This program was established in 1999 and the first batch of students graduated in 2001. The program is offered at both postgraduate and undergraduate level. The work described here relates to the postgraduate offering. Students on this program are graduates of diverse disciplines and do not have a common e-commerce or business background.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article tells about the relationship between resource politics and security in international relations. Using the Mekong River Basin as its case study, the article examines the place of resource and development issues in attempts to develop regional institutions. The question of whether a resource development regime with apparently low productivity in terms of technical output, but high levels of resilience and longevity, should be considered a failure or not, is considered. This question is examined within the broader context of Southeast Asian politics during the First, Second, and Third Indochina conflicts as well as the post-cold war era. The article argues that survival and a capacity to change to meet the challenges of extreme broader events are clear evidence of regime success. From this standpoint, the article explores ways in which the Mekong resource regime is linked to more general concerns for political security and stability and may in fact reflect political concerns for subregional neighborhood maintenance.

Relevância:

20.00% 20.00%

Publicador: