Results 1 - 10
of
22
The Counseling Psychologist Research Counseling Adopted Persons in Adulthood: Integrating Practice and Counseling Adopted Persons in Adulthood: Integrating Practice and Research
"... For the past 50 years, adults who were adopted during infancy have been research participants for empirical studies with goals ranging from twin studies for heritability, to adjustment following adoption, to attachment. While the research body is broad, it has given little attention to counseling p ..."
Abstract
- Add to MetaCart
practices with adopted adults. Because empirical research and clinical practice can inform each other, this article integrates literatures in both areas so that counseling practice with adopted adults can guide research, just as research guides practice. The authors grouped the clinically relevant
Responsible Conduct of Research: Administrative Issues Concerning Research Integrity and Compliance
"... Science is built on a foundation of trust, which grows out of the scientific community’s adherence to the values associated with ethical scientific conduct (NAS, 1995). Research misconduct undermines public trust and, in some cases, potentially could harm the public. Yet Martinson et al. (2005) foun ..."
Abstract
- Add to MetaCart
or results in two or more publications) were higher than those recorded for the top 10 negative behaviors. The authors of the study concluded that U.S. scientists “engage in a range of behaviors extending far beyond FFP (fabrication, falsification and plagiarism) that can damage the integrity of science.” So
SecureSMART: A Security Architecture for BFT Replication Libraries
"... Abstract—Several research projects have shown that Byzantine fault tolerance (BFT) is practical today in terms of performance. Deficiencies in other aspects might still be an obstacle to a more wide-spread deployment in real-world applications. One of these aspects is an over-all security architectu ..."
Abstract
- Add to MetaCart
architecture beyond the low-level protocol. This paper proposes the security architecture SecureSMART, which provides dynamic key distribution, internal and external integrity and confidentiality measures, as well as mechanisms for availability and access control. For this purpose, it implements security
Folding: Integrating Algorithms into the Floor of the New York Stock Exchange, Available at http://ssrn.com/abstract=2265849, accessed December 2
, 2013
"... Abstract How does automation reshape markets? Existing sociological studies have argued that market automation need not entail a dilution of social relations, but the empirical evidence is inconclusive. Our multi-period ethnography of the New York Stock Exchange addresses this gap by exploring how ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
us to identify the mechanism that underlies a successful integration of algorithms into the Exchange. Second, we compare the practices at the NYSE before automation was introduced in 2003 with those after the second phase of automation in 2008-10. This allows us to gauge the extent to which
By
, 2013
"... I declare that this thesis is my own account of my research and contains as its main content work which has not previously been submitted for a degree at any tertiary education institution. ..."
Abstract
- Add to MetaCart
I declare that this thesis is my own account of my research and contains as its main content work which has not previously been submitted for a degree at any tertiary education institution.
Suicides by mentally ill people
- ScientificWorldJournal
"... In 1992, following consultations with the Royal College of Psychiatrists, the confidential inquiry into homicides and suicides by mentally ill people was set up by the United Kingdom Department of Health. The inquiry collects detailed information on contact with secondary mental health services by ..."
Abstract
-
Cited by 4 (2 self)
- Add to MetaCart
In 1992, following consultations with the Royal College of Psychiatrists, the confidential inquiry into homicides and suicides by mentally ill people was set up by the United Kingdom Department of Health. The inquiry collects detailed information on contact with secondary mental health services
guidance of Prof. Raj Jain)
"... Kerberos was initially developed at MIT as a part of Project Athena and in these days it is widely deployed single sign-on protocol that is developed to authenticate clients to multiple networked services. Furthermore, Cross-realm authentication is a useful and interesting component of Kerberos aime ..."
Abstract
- Add to MetaCart
Kerberos was initially developed at MIT as a part of Project Athena and in these days it is widely deployed single sign-on protocol that is developed to authenticate clients to multiple networked services. Furthermore, Cross-realm authentication is a useful and interesting component of Kerberos aimed at enabling secure access to services astride organizational boundaries. Also, Kerberos has continued to evolve as new functionalities are added to the basic protocol and one of well-known these protocols is PKINIT. First, I review and analyze the structure of Kerberos recently proposed and the cross-realm authentication model of Kerberos. Also, I discuss PKINT, an extension version of Kerberos, which modifies the basic protocol to allow public-key authentication. Although Kerberos has been proven its strengths so far, it also has a number of limitations and some flaws. I dedicate my efforts to an analysis of PKINIT and mainly focus on a number of vulnerability, flaws and attacks lately discovered on Kerberos as well as PKINIT in this paper. Lastly, I introduce several possible solutions to
Teacher-writer memoirs as lens for writing emotionally in a primary teacher education programme, Teaching Education
, 2008
"... This paper examines student teachers experiences of writing emotionally through the lens of teacherwriter memoirs. The participants were ninety-nine postgraduate student teachers in a sociology of teaching module in an initial primary teacher education programme in the Republic of Ireland. Analysis ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
the teacher I am becoming? When confronted by some of the cultures of teaching or emotions of teaching that I know get in the way of good teaching, how will I react? What will I do? Response journals served as an integral component for generating conversation building, skill and technique development
Camp & Ka-Ping Yee Human implications of technology
, 2003
"... Abstract The relationship between technology and society is characterized by feedback. Technological determinists and social determinists perspectives are offer informative but narrow insights into either side of the process. Innovative individuals can generate new technologies that alter the lives ..."
Abstract
- Add to MetaCart
the lives, practices, and even ways of thinking in a society. Societies alter technologies as they adopt them, often yielding results far from the hopes or fears of the original designers. Design for values, also called value sensitive design, are methods that explicitly address the human element. s
unknown title
"... This article explores a significant element of faculty development that is often missing or given little attention. The author analyzes the results of a series of Courage Study Circles, which provided time and space for faculty members to reflect upon and revitalize their identity as teachers. Th ..."
Abstract
- Add to MetaCart
on his work. These writings explored the relationship of inner and outer life, the spiritual aspects of teaching, and the importance of identity and integrity in the teaching/learning process. Eager to bring this practice and energy to others, I sent out an invitation to faculty at my university to come
Results 1 - 10
of
22