|
|
Books > Promotion > JB Academic
This dynamic and beautifully written textbook takes a modern and
innovative approach to strategy by placing technology at its heart,
bridging the gap between general strategy texts and specialist
technology and innovation literature. It addresses the challenges
and opportunities presented to organisations by disruptive
technological change and takes into account the navigation of
uncertain business environments. In addition to examining more
established concepts and theories, the text also explores new
disruptive business models and non-traditional approaches to
strategy development such as effectuation, the Business Model
Canvas and prediction logic. This comprehensive and critical
approach is supported by a rich assortment of practical examples
and cases drawn from different sectors and a range of exciting
companies from all over the world, helping students and
practitioners to apply theory to practice. This will be an
essential core text for modules on technology strategy and
innovation at upper undergraduate, postgraduate and MBA levels, and
invaluable reading for senior executives and aspiring managers who
seek to understand how to implement strategy in a volatile
disruptive environment.
How do you tailor education to the learning needs of adults? Do
they learn differently from children? How does their life
experience inform their learning processes? These were the
questions at the heart of Malcolm Knowles' pioneering theory of
andragogy which transformed education theory in the 1970s. The
resulting principles of a self-directed, experiential,
problem-centred approach to learning have been hugely influential
and are still the basis of the learning practices we use today.
Understanding these principles is the cornerstone of increasing
motivation and enabling adult learners to achieve. The 9th edition
of The Adult Learner has been revised to include: Updates to the
book to reflect the very latest advancements in the field. The
addition of two new chapters on diversity and inclusion in adult
learning, and andragogy and the online adult learner. An updated
supporting website. This website for the 9th edition of The Adult
Learner will provide basic instructor aids including a PowerPoint
presentation for each chapter. Revisions throughout to make it more
readable and relevant to your practices. If you are a researcher,
practitioner, or student in education, an adult learning
practitioner, training manager, or involved in human resource
development, this is the definitive book in adult learning you
should not be without.
Research Skills for Journalists is a comprehensive, engaging and highly practical guide to developing the varied skillset needed for producing well researched, quality journalism across a range of platforms.
Illustrated with original interviews and case studies, the book guides readers through a clear understanding of sources of news, as well as illustrating the skills needed to undertake successful digital and non-digital research and to conduct interviews for a variety of media. It examines the skills needed for basic data journalism and presents an in-depth exploration of the different research skills specific to producing print and online text, as well as those for broadcast and multimedia journalism.
Key research skills explored in the book include:
Developing digital research skills, including researching through search engines, messages boards, discussion groups and web forums, social media, apps, and using user generated content
Working with data, including sourcing, auditing and analysing data, data visualisation and understanding the importance of accuracy and context
Essential non-digital research skills, including telephone technique, using libraries and working with librarians, understanding copyright, working with picture libraries and research services, and producing freedom of information requests
Working directly with people to research stories, including the power of persuasion, tracking down great contributors, managing and protecting sources, planning and managing interviews, and interviewing vulnerable people
Researching for multimedia production of stories, including researching a radio story, podcast or video story, and planning for outside broadcasts.
Research Skills for Journalists also explores specialist research skills needed for working overseas and investigates new areas, which could be used for journalism research in the future.
The book is illustrated with original contributions by journalists from a variety of backgrounds; including veteran investigative journalist John Pilger, pioneering data journalist Simon Rogers and The Bureau of Investigative Journalism’s award-winning reporter Abigail Fielding-Smith. It is an invaluable guide for students and practitioners of journalism to the skills needed for finding and developing original news stories today.
Table of Contents
1. Introduction 2. Sources of News 3. Digital Research 4. Data Journalism 5. Non-Digital Research 6. People 7. Interviews 8. Research for Print and Text 9. Research for Broadcast and Multimedia 10. Working Overseas 11. The Future
Safety Management Systems: Applications for the Aviation Industry
provides an in-depth review of specific applications of an
aviation-related Safety Management System (SMS) by following it
from design through application. Readers will gain an understanding
on SMS and how it related to their daily activities. Also, specific
information will be provided on the rotocraft industry, due to
variations in the challenges it faces.
From question development and research design to data collection
and statistical analysis, this text guides the reader through every
aspect of social research. Encouraging a critical approach in each
chapter, this 4th edition includes enhanced coverage of internet
sampling, mixed methods, conversation analysis and feminist
research. Accompanying online resources for this title can be found
at bloomsburyonlineresources.com/social-research-4e. These
resources are designed to support teaching and learning when using
this textbook and are available at no extra cost.
Browse's Introduction to the Symptoms & Signs of Surgical Disease is essential reading for all medical students learning the fundamentals of history taking and patient examination, when undertaking a surgical rotation, when preparing for their surgical exams and as they transition to postgraduate studies. Maintaining the engaging and readable style so central to Sir Norman Browse's early editions, the sixth edition of this classic text retains all the features beloved by generations of students while being fully revised and updated throughout in line with current surgical practice.
Key Features:
Current – fully revised and updated
Accessible – highly structured and consistent layout, supplemented by tables and revision panels for rapid reference in the pressured run up to qualifying exams
Beautifully illustrated – packed with an unrivalled collection of colour photographs and explanatory line diagrams, refreshed for this new edition
Expert editors – with a wealth of clinical and teaching experience, supported by contributors new to this edition bringing a fresh approach
Companion website – visit www.routledge.com/cw/gossage for digital resources to supplement this textbook including self-assessment material, video animations and an image library
Now supplemented by online resources for the complete learning and revision package, this sixth edition remains indispensable for the clinical years of undergraduate study to postgraduate surgical training and beyond.
Table of Contents
History Taking and Examination. The Heart, Lungs and Pleura. The Brain, CNS and Peripheral Nerves. The Skin and Subcutaneous Tissue. The Symptoms, Signs and Emergency Management of Major Injuries. Musculoskeletal Conditions. Bones and Joints of the Upper Limbs (Including Hands). Bones and Joints of the Lower Limbs (Including Feet). The Spine and Pelvis. The Arteries, Veins and Lymphatics. The Mouth, Tongue and Lips. The Neck and Salivary Glands. The Breast. The Abdominal Wall, Herniae and the Umbilicus. The Abdomen. The Rectum and Anal Canal. The Kidneys, Urinary Tract and Prostate. The External Genitalia.
Routledge English Language Introductions cover core areas of language study and are one-stop resources for students.
Assuming no prior knowledge, books in the series offer an accessible overview of the subject, with activities, study questions, sample analyses, commentaries and key readings – all in the same volume. The innovative and flexible ‘two-dimensional’ structure is built around four sections – introduction, development, exploration and extension – which offer self-contained stages for study. Each topic can also be read across these sections, enabling the reader to build gradually on the knowledge gained.
Introducing English Language:
- is the foundational book in the Routledge English Language Introductions series, providing an accessible introduction to the English language
- contains newly expanded coverage of morphology, updated and revised exercises, and an extended Further Reading section
- comprehensively covers key disciplines of linguistics such as historical linguistics, sociolinguistics and psycholinguistics, as well as core areas in language study including acquisition, standardisation and the globalisation of English
- uses a wide variety of real texts and images from around the world, including a Monty Python sketch, excerpts from novels such as Virginia Woolf’s To the Lighthouse, and news items from Metro and the BBC
- provides updated classic readings by the key names in the discipline, including Guy Cook, Andy Kirkpatrick and Zoltán Dörnyei
- is accompanied by a website with extra activities, project ideas for each unit, suggestions for further reading, links to essential English language resources, and course templates for lecturers
Written by two experienced teachers and authors, this accessible textbook is an essential resource for all students of the English language and linguistics.
This colourful guide will introduce you to the fundamentals of
horticulture, whether you are taking a Level 2 RHS, City and Guilds
or BTEC course, are a keen amateur or seasoned gardener. Written in
a clear and accessible style, this book covers the principles that
underpin growing plants for the garden and on the allotment, with
reference to how these are tackled by professionals. With
highlighted definitions, key points, and illustrated in full
colour, this book will be a useful companion as you progress in the
study and practice of horticulture. Complete with a companion
website which includes extended horticultural information,
questions and exercises to test your knowledge, syllabus
cross-referencing and downloadable tutor and student support
materials. Available at www.routledge.com/adams
It is easy for newcomers to educational research to be confused by
the wide range of terms used in the field and consequently for them
to find it challenging to relate such terms to their own research
and practice. This comprehensive guide consists of 120 concise but
illuminative essays providing: - an explanation and definition of
the term - alternative explanations and definitions of the term -
the context in which it is used by educational researchers -
exemplars as to how the term is used and used be used in practice -
references to further literature - cross-references to other terms
in the book.
In the third edition of this comprehensive guide to the what and
how of literary study, attention is paid to the details of literary
language and a wide variety of examples is included. More emphasis
has been placed on contextualizing literature and this updated
version takes these changes into account by incorporating more
material on historical and cultural contexts as well as in-depth
discussions on novels, drama, and poetry.
In order to fully understand the evolution and future growth of economic systems, we must draw on the lessons of economic history. The 2008 Financial Crisis, for example, mirrored past economic meltdowns with uncanny accuracy. Just like the Great Depression of the 1930s and the Savings and Loan Crisis of the 1980s, it featured deregulated lenders taking incredible risks with other people’s money. Historical analysis is crucial to understanding trends and patterns that can help us predict the future.
This text presents a ground-breaking, pluralistic introduction to economic history and the history of economic thought. Tracing the development of economic systems and economic thought, the text introduces students to the story from ancient times to contemporary capitalism, and also its critics. Focusing in particular on Smith, Marx, Veblen, and Keynes, the text encourages students to consider which ideas and systems are still relevant in the modern world. This book can be used as a standalone text for relevant classes or as a supplement in any principles course.
Table of Contents
PART I: Economics: A pluralistic definition. 1. What is economics? 2. Scarcity, opportunity cost, and choice. PART II: The evolution of economic ideas and systems. 3. The evolution of pre-capitalist economic systems. 4. Adam Smith and the rise of capitalism. 5. Karl Marx and the dark age of capitalism. 6. Thorstein Veblen and monopoly capitalism. 7. Keynes and mixed market capitalism. 8. Modern economic systems.
Construction for Interior Designers is a highly readable, comprehensive and informative text proving all the technical information required. The second edition has been fully updated to reflect the 1991 amendments if the 1985 Building Regulations and includes a new chapter on environmental issues affecting construction. Important concepts are explained from first principles with three-dimensional diagrams and informative tables. No previous knowledge of the subject is assumed.
Table of Contents
Preface 1. Structural Principles 2. External Structure : Foundations and Walls 3. Roofs and Floors 4. Work to Existing Buildings 5. Internal Structure 6. Internal Furnishings and Fittings 7. Structural Materials: Timber, Metals, Concrete and Plastics 8. Internal Finishes and Materials 9. Environmental Issues Bibliography Index
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.
Table of Contents
I Introduction and Classical Cryptography
1. Introduction
Cryptography and Modern Cryptography
The Setting of Private-Key Encryption
Historical Ciphers and Their Cryptanalysis
Principles of Modern Cryptography
Principle 1 - Formal Definitions
Principle 2 - Precise Assumptions
Principle 3 - Proofs of Security
Provable Security and Real-World Security
References and Additional Reading
Exercises
2. Perfectly Secret Encryption
Definitions
The One-Time Pad
Limitations of Perfect Secrecy
*Shannon's Theorem
References and Additional Reading
Exercises
II Private-Key (Symmetric) Cryptography
3. Private-Key Encryption
Computational Security
The Concrete Approach
The Asymptotic Approach
Defining Computationally Secure Encryption
The Basic Definition of Security (EAV-Security)
*Semantic Security
Constructing an EAV-Secure Encryption Scheme
Pseudorandom Generators
Proofs by Reduction
EAV-Security from a Pseudorandom Generator
Stronger Security Notions
Security for Multiple Encryptions
Chosen-Plaintext Attacks and CPA-Security
CPA-Security for Multiple Encryptions
Constructing a CPA-Secure Encryption Scheme
Pseudorandom Functions and Permutations
CPA-Security from a Pseudorandom Function
Modes of Operation and Encryption in Practice
Stream Ciphers
Stream-Cipher Modes of Operation
Block Ciphers and Block-Cipher Modes of Operation
*Nonce-Based Encryption
References and Additional Reading
Exercises
4. Message Authentication Codes
Message Integrity
Secrecy vs Integrity
Encryption vs Message Authentication
Message Authentication Codes (MACs) - Definitions
Constructing Secure Message Authentication Codes
A Fixed-Length MAC
Domain Extension for MACs
CBC-MAC
The Basic Construction
*Proof of Security
GMAC and Poly
MACs from Difference-Universal Functions
Instantiations
*Information-Theoretic MACs
One-Time MACs from Strongly Universal Functions
One-Time MACs from Difference-Universal Functions
Limitations on Information-Theoretic MACs
References and Additional Reading
Exercises
5. CCA-Security and Authenticated Encryption
Chosen-Ciphertext Attacks and CCA-Security
Padding-Oracle Attacks
Defining CCA-Security
Authenticated Encryption
Defining Authenticated Encryption
CCA Security vs Authenticated Encryption
Authenticated Encryption Schemes
Generic Constructions
Standardized Schemes
Secure Communication Sessions
References and Additional Reading
Exercises
6. Hash Functions and Applications
Definitions
Collision Resistance
Weaker Notions of Security
Domain Extension: The Merkle-Damgard Transform
Message Authentication Using Hash Functions
Hash-and-MAC
HMAC
Generic Attacks on Hash Functions
Birthday Attacks for Finding Collisions
Small-Space Birthday Attacks
*Time/Space Tradeo s for Inverting Hash Functions
The Random-Oracle Model
The Random-Oracle Model in Detail
Is the Random-Oracle Methodology Sound?
Additional Applications of Hash Functions
Fingerprinting and Deduplication
Merkle Trees
Password Hashing
Key Derivation
Commitment Schemes
References and Additional Reading
Exercises
7. Practical Constructions of Symmetric-Key Primitives
Stream Ciphers
Linear-Feedback Shift Registers
Adding Nonlinearity
Trivium
RC4
ChaCha20
Block Ciphers
Substitution-Permutation Networks
Feistel Networks
DES - The Data Encryption Standard
3 DES: Increasing the Key Length of a Block Cipher
AES -The Advanced Encryption Standard
*Differential and Linear Cryptanalysis
Compression Functions and Hash Functions
Compression Functions from Block Ciphers
MD5, SHA-1, and SHA-2
The Sponge Construction and SHA-3 (Keccak)
References and Additional Reading
Exercises
8. *Theoretical Constructions of Symmetric-Key Primitives
One-Way Functions
Definitions
Candidate One-Way Functions
Hard-Core Predicates
From One-Way Functions to Pseudorandomness
Hard-Core Predicates from One-Way Functions
A Simple Case
A More Involved Case
The Full Proof
Constructing Pseudorandom Generators
Pseudorandom Generators with Minimal Expansion
Increasing the Expansion Factor
Constructing Pseudorandom Functions
Constructing (Strong) Pseudorandom Permutations
Assumptions for Private-Key Cryptography
Computational Indistinguishability
References and Additional Reading
Exercises
III Public-Key (Asymmetric) Cryptography
9. Number Theory and Cryptographic Hardness Assumptions
Preliminaries and Basic Group Theory
Primes and Divisibility
Modular Arithmetic
Groups
The Group ZN
*Isomorphisms and the Chinese Remainder Theorem
Primes, Factoring, and RSA
Generating Random Primes
*Primality Testing
The Factoring Assumption
The RSA Assumption
*Relating the Factoring and RSA Assumptions
Cryptographic Assumptions in Cyclic Groups
Cyclic Groups and Generators
The Discrete-Logarithm/Diffie-Hellman Assumptions
Working in (Subgroups of) Zp
Elliptic Curves
*Cryptographic Applications
One-Way Functions and Permutations
Collision-Resistant Hash Functions
References and Additional Reading
Exercises
10. *Algorithms for Factoring and Computing Discrete Logarithms
Algorithms for Factoring
Pollard's p - Algorithm
Pollard's Rho Algorithm
The Quadratic Sieve Algorithm
Generic Algorithms for Computing Discrete Logarithms
The Pohlig-Hellman Algorithm
The Baby-Step/Giant-Step Algorithm
Discrete Logarithms from Collisions
Index Calculus: Computing Discrete Logarithms in Zp
Recommended Key Lengths
References and Additional Reading
Exercises
11. Key Management and the Public-Key Revolution
Key Distribution and Key Management
A Partial Solution: Key-Distribution Centers
Key Exchange and the Diffie-Hellman Protocol
The Public-Key Revolution
References and Additional Reading
Exercises
12. Public-Key Encryption
Public-Key Encryption - An Overview
Definitions
Security against Chosen-Plaintext Attacks
Multiple Encryptions
Security against Chosen-Ciphertext Attacks
Hybrid Encryption and the KEM/DEM Paradigm
CPA-Security
CCA-Security
CDH/DDH-Based Encryption
El Gamal Encryption
DDH-Based Key Encapsulation
*A CDH-Based KEM in the Random-Oracle Model
*Chosen-Ciphertext Security and DHIES/ECIES
RSA-Based Encryption
Plain RSA Encryption
Padded RSA and PKCS # v
*CPA-Secure Encryption without Random Oracles
OAEP and PKCS # v
*A CCA-Secure KEM in the Random-Oracle Model
RSA Implementation Issues and Pitfalls
References and Additional Reading
Exercises
13. Digital Signature Schemes
Digital Signatures - An Overview
Definitions
The Hash-and-Sign Paradigm
RSA-Based Signatures
Plain RSA Signatures
RSA-FDH and PKCS #1 Standards
Signatures from the Discrete-Logarithm Problem
Identification Schemes and Signatures
The Schnorr Identification/Signature Schemes
DSA and ECDSA
Certificates and Public-Key Infrastructures
Putting It All Together { TLS
*Signcryption
References and Additional Reading
Exercises
14. *Post-Quantum Cryptography
Post-Quantum Symmetric-Key Cryptography
Grover's Algorithm and Symmetric-Key Lengths
Collision-Finding Algorithms and Hash Functions
Shor's Algorithm and its Impact on Cryptography
Post-Quantum Public-Key Encryption
Post-Quantum Signatures
Lamport's Signature Scheme
Chain-Based Signatures
Tree-Based Signatures
References and Additional Reading
Exercises
15. *Advanced Topics in Public-Key Encryption
Public-Key Encryption from Trapdoor Permutations
Trapdoor Permutations
Public-Key Encryption from Trapdoor Permutations
The Paillier Encryption Scheme
The Structure of Z_N
The Paillier Encryption Scheme
Homomorphic Encryption
Secret Sharing and Threshold Encryption
Secret Sharing
Verifiable Secret Sharing
Threshold Encryption and Electronic Voting
The Goldwasser-Micali Encryption Scheme
Quadratic Residues Modulo a Prime
Quadratic Residues Modulo a Composite
The Quadratic Residuosity Assumption
The Goldwasser-Micali Encryption Scheme
The Rabin Encryption Scheme
Computing Modular Square Roots
A Trapdoor Permutation Based on Factoring
The Rabin Encryption Scheme
References and Additional Reading
Exercises
Index of Common Notation
Appendix A Mathematical Background
A Identities and Inequalities
A Asymptotic Notation
A Basic Probability
A The \Birthday" Problem
A *Finite Fields
Appendix B Basic Algorithmic Number Theory
B Integer Arithmetic
B Basic Operations
B The Euclidean and Extended Euclidean Algorithms
B Modular Arithmetic
B Basic Operations
B Computing Modular Inverses
B Modular Exponentiation
B *Montgomery Multiplication
B Choosing a Uniform Group Element
B *Finding a Generator of a Cyclic Group
B Group-Theoretic Background
B Efficient Algorithms
References and Additional Reading
Exercises
/
Assuming little or no background knowledge and using original examples and exercises (with answers supplied), Understanding Phonetics provides you with an accessible introduction to the basics of phonetics and a comprehensive analysis of traditional phonetic theory - the articulation and physical characteristics of speech sounds.
Examples from a wide range of languages are presented throughout using symbols of the International Phonetic Alphabet. To help you develop your skills in this alphabet, Understanding Phonetics includes ear-training exercises that are freely available online, along with audio files of authentic listening material, for you to download from www.routledge.com/cw/ashby.
Understanding Phonetics outlines the production of consonants, vowels, phonation types, pitch and intonation, and aspects of connected speech. Reading through chapter by chapter, you will see your knowledge develop as you engage in the step-by-step phonetic study of a selected word.
Understanding Phonetics is designed to be used not only as a class textbook but also for self-study. It can be read systematically or used for reference purposes.
Table of Contents
Preface
Acknowledgements
Symbols for transcribing English
IPA chart
1. Starting phonetics
2. The role of the larynx
3. Place of articulation
4. Manner of articulation
5. Airstream mechanisms
6. Describing vowels
7. Further parameters of variation in vowels
8. Further parameters of variation in consonants
9. Connected speech - segment dynamics
10. Beyond the segment
Answers to exercises
Bibliography
Index
Most of us find ourselves listening to other people's problems at
some time or another - either our friends' or, in the course of our
work, patients, pupils, clients, colleagues. This book, written
clearly in user friendly language, takes the reader step by step
through a range of skills to help them become a better listener,
communicator and helper in their everyday lives, progressing from
inviting the person to talk to ending a helping conversation. Using
plenty of examples, tips, exercises and sample conversations, the
authors show how the skills described can be easily learned and can
fit comfortably into everyday life. This book is essential reading
for everyone interested in improving their communication and
helping skills as well as those students taking introductory
courses in counselling and counselling skills. KATHERYN GELDARD is
a Child and Family Therapist and a visiting lecturer at the
Queensland University of Technology, Australia. DAVID GELDARD is a
Counselling Psychologist. Together they are the authors of several
books on counselling. They jointly manage a counselling practice
where they specialise in working with children, adolescents, and
their families. They also run training programmes for helping
professionals who wish to enhance their counselling skills.
Now in a fifth edition, this bestselling introductory textbook remains the cornerstone volume for the study of second language acquisition (SLA). Its chapters have been fully updated, and reorganized where appropriate, to provide a comprehensive yet accessible overview of the field and its related disciplines. In order to reflect current developments, new sections and expanded discussions have been added.
The fifth edition of Second Language Acquisition retains the features that students found useful in previous editions. This edition provides pedagogical tools that encourage students to reflect upon the experiences of second language learners. As with previous editions, discussion questions and problems at the end of each chapter help students apply their knowledge, and a glossary defines and reinforces must-know terminology. This clearly written, comprehensive, and current textbook, by Susan Gass, Jennifer Behney, and Luke Plonsky, is the ideal textbook for an introductory SLA course in second language studies, applied linguistics, linguistics, TESOL, and/or language education programs.
This textbook is supported with a Companion Website containing instructor and student resources including PowerPoint slides, exercises, stroop tests, flashcards, audio and video links: https://routledgetextbooks.com/textbooks/9781138743427/
Table of Contents
Part One: Preliminaries
Chapter One: Introduction
1.1 THE STUDY OF SECOND LANGUAGE ACQUISITION
1.2 DEFINITIONS
1.3 THE NATURE OF LANGUAGE
1.3.1 Semantics
1.3.2 Pragmatics
1.3.3 Syntax
1.3.4 Morphology and the Lexicon
1.3.5 Sound Systems
1.4 THE NATURE OF NONNATIVE SPEAKER KNOWLEDGE
1.5 CONCLUSION
Chapter Two: Where Do Data Come From?
2.1 DATA TYPES
2.2 LEARNER CORPORA
2.3 DATA ELICITATION
2.3.1 Measuring General Proficiency
2.3.2 Measuring Nonlinguistic Information
2.3.3 Verbal Report Data
2.3.3.1 Think-Alouds
2.3.3.2 Stimulated Recall
2.3.3.3 Post-Production Interviews
2.3.4 Narrative Inquiry
2.3.5 Language-Elicitation Measures
2.3.5.1 Elicited Imitation
2.3.5.2 Judgments
2.3.5.3 Language Games
2.3.5.4 Discourse Completion
2.3.6 PROCESSING DATA
2.3.6.1 Reaction Time
2.3.6.2 Self-paced Reading
2.3.6.3 Eye-Tracking
2.3.6.4 Neurolinguistic Data
2.4 REPLICATION
2.5 META-ANALYSES
2.6 ISSUES IN DATA ANALYSIS
2.7 WHAT IS ACQUISITION?
2.8 CONCLUSION
Part Two: Historical Underpinnings of SLA Research
Chapter Three: The Role of the Native Language - A Historical Overview
3.1 INTRODUCTION
3.2 BEHAVIORISM
3.2.1 Linguistic Background
3.2.2 Psychological Background
3.3 CONTRASTIVE ANALYSIS HYPOTHESIS
3.4 ERROR ANALYSIS
3.5 CONCLUSION
Chapter Four: The Transition Period
4.1 INTRODUCTION
4.2 FIRST LANGUAGE ACQUISITION
4.2.1 Words
4.2.2 Sounds and Pronunciation
4.2.3 Syntax
4.2.4 Morphology
4.3 CHILD L2 ACQUISITION
4.4 CHILD L2 MORPHEME ORDER STUDIES
4.5 ADULT L2 MORPHEME ORDER STUDIES
4.6 THE MONITOR MODEL
4.6.1 The Acquisition-Learning Hypothesis
4.6.2 The Natural Order Hypothesis
4.6.3 The Monitor Hypothesis
4.6.4 The Input Hypothesis
4.6.5 The Affective Filter Hypothesis
4.6.6 Limitations
4.7 CONCLUSION
Chapter Five: Alternative Approaches to the Role of Previously Known Languages
5.1 REVISED PERSPECTIVES ON THE ROLE OF THE NATIVE LANGUAGE
5.1.1 Avoidance
5.1.2 Differential Learning Rates
5.1.3 Different Paths
5.1.4 Overproduction
5.1.5 Predictability/Selectivity
5.1.6 L1 Influences in L2 Processing
5.1.7 Morpheme Order
5.2 CONCLUSION
Part Three: A Focus on Form - Language Universals
Chapter Six: Formal Approaches to SLA
6.1 INTRODUCTION
6.2 UNIVERSAL GRAMMAR
6.2.1 Initial State
6.2.1.1Fundamental Difference Hypothesis
6.2.1.2Access to UG Hypothesis
6.2.2 UG Principles
6.2.3 UG Parameters
6.2.4 Minimalist Program
6.2.5 Falsification
6.3 TRANSFER: THE GENERATIVE/UG PERSPECTIVE
6.3.1 Levels of Representation
6.3.2 Clustering
6.3.3 Learnability
6.4 THE FUNDAMENTAL DIFFERENCE HYPOTHESIS REVISED
6.5 SEMANTICS AND THE SYNTAX–SEMANTICS INTERFACE HYPOTHESIS
6.5.1 Semantics
6.5.2 Syntax and Semantics: The Interface Hypothesis
6.6 PHONOLOGY
6.6.1 Markedness Differential Hypothesis
6.6.2 Similarity/Dissimilarity: Speech Learning Model
6.6.3 Optimality Theory
6.6.4 Ontogeny Phylogeny Model
6.7 CONCLUSION
Chapter Seven: Typological Approaches
7.1 TYPOLOGICAL UNIVERSALS
7.1.1 Test Case I: The Accessibility Hierarchy
7.1.2 Test Case II: The Acquisition of Questions
7.1.3 Test Case III: Voiced/Voiceless Consonants
7.2 FALSIFIABILITY
7.3 TYPOLOGICAL UNIVERSALS: CONCLUSION
7.4 TYPOLOGICAL PRIMACY MODEL
7.5 THE ROLE OF THE L1: THREE APPROACHES
7.6 CONCLUSION: GENERAL COMMENTS ABOUT UNIVERSALS
Part Four: A Focus on Meaning
Chapter Eight: Meaning-based Approaches
8.1 INTRODUCTION
8.2 FUNCTIONAL APPROACHES
8.2.1 The Relationship between Form and Function: Form-to-Function
8.2.2 Concept-oriented Approach
8.3 TENSE AND ASPECT: THE ASPECT HYPOTHESIS
8.4 THE DISCOURSE HYPOTHESIS
8.5 CONCLUSION
Chapter Nine: The Lexicon
9.1 THE SIGNIFICANCE OF THE LEXICON
9.2 LEXICAL KNOWLEDGE: WHAT DOES IT MEAN TO KNOW A WORD?
9.2.1 Production and Reception
9.2.2 Knowledge and Control
9.2.3 Breadth and Depth
9.2.4 Subcategorization
9.2.5 Word Associations and Networks
9.2.6 Word Formation
9.2.7 Formulaic Language, Collocations, and Chunking
9.2.7.1 Use of Multiword Units
9.2.7.2 Learning of Multiword Units
9.2.7.3 Processing of Multiword Units
9.3 INFLUENCES ON L2 VOCABULARY AND DEVELOPMENT
9.3.1 The Role of the L1
9.3.2 Incidental Vocabulary Learning
9.3.2.1 Input Type
9.3.2.2 What Helps Learning?
9.3.3 Depth of Processing
9.3.4 Incremental Vocabulary Learning
9.4 USING LEXICAL SKILLS
9.4.1 Production
9.4.2 Perception
9.5 CONCLUSION
Part Five: Cognitive and Processing Approaches to SLA
Chapter Ten: Psycholinguistic Approaches to Learning
10.1 INTRODUCTION
10.2 MODELS OF LANGUAGE PRODUCTION
10.3 PROCESSABILITY THEORY
10.4 PROCESSING OF INPUT
10.4.1 Input Processing
10.4.2 Processing Determinism
10.4.3 Autonomous Induction Theory
10.4.4 Shallow Structure Hypothesis
10.5 EMERGENTIST MODELS
10.5.1 Competition Model
10.5.2 Frequency-based Accounts
10.6 COMPLEX DYNAMIC SYSTEMS
10.7 SKILL ACQUISITION THEORY
10.8 CONCLUSION
Chapter Eleven: Psycholinguistic Constructs and Knowledge Types
11.1 INTRODUCTION
11.2 INFORMATION PROCESSING
11.2.1 Automaticity
11.2.2 Restructuring
11.2.3 U-shaped Learning
11.2.4 Attention
11.2.5 Working Memory
11.2.6. Salience
11.2.7 Priming
11.3 KNOWLEDGE TYPES
11.3.1 Acquisition/Learning
11.3.2 Declarative/Procedural
11.3.3 Implicit/Explicit
11.3.4 Representation/Control
11.4 INTERFACE OF KNOWLEDGE TYPES
11.4.1 No Interface
11.4.2 Weak Interface
11.4.3 Strong Interface
11.5 CONCLUSION
Part Six: The Social Environment of Learning
Chapter Twelve: Interlanguage in Context
12.1 INTRODUCTION
12.2 SOCIOCULTURAL APPROACHES
12.2.1 Mediation
12.2.2 Internalization
12.2.3 Zone of Proximal Development
12.2.4 Private Speech
12.2.5 Learning in a Sociocultural Framework
12.2.6 Gesture and SLA
12.3 SOCIOLINGUISTIC VARIATION
12.4 SYSTEMATIC VARIATION
12.4.1 Linguistic Context
12.4.2 Social Context Relating to the Native Language
12.4.3 Social Context Relating to Interlocutor, Task Type, and Conversational Topic
12.4.4 Sociolinguistic Norms
12.5 CONVERSATION ANALYSIS
12.6 COMMUNICATION STRATEGIES
12.7 L2 PRAGMATICS
12.8 CONCLUSION: SLA AND OTHER DISCIPLINES
Chapter Thirteen: Input, Interaction, and Output
13.1 INTRODUCTION
13.2 INPUT
13.3 COMPREHENSION
13.4 INTERACTION
13.5 OUTPUT
13.5.1 Hypothesis Testing
13.5.2 Automaticity
13.5.3 Meaning-based to Grammar-Based Processing
13.6. Feedback
13.6.1 Negotiation
13.6.2 Corrective Feedback
13.6.2.1 Recasts
13.6.2.2 Elicitation
13.6.2.3 Metalinguistic Feedback
13.7 THE ROLE OF INPUT AND INTERACTION IN LANGUAGE LEARNING
13.7.1 The Functions of Input and Interaction
13.7.2 Effectiveness of Feedback
13.7.2.1 Attention
13.7.2.2 Contrast Theory
13.7.2.3 Metalinguistic Awareness
13.7.3 Who Benefits From Interaction: When and Why?
13.8 LIMITATIONS OF INPUT
13.9 CONCLUSION
Chapter Fourteen: Contexts of Language Learning - Classrooms, Study Abroad, and Technology
14.1 INTRODUCTION
14.2 CLASSROOM-BASED INSTRUCTION
14.2.1 Classroom Language
14.2.2 Teachability/Learnability
14.2.3 Focus on Form and Task-based Language Teaching
14.2.3.1 Timing
14.2.3.2 Forms to Focus On
14.2.3.3 Task Design
14.2.3.4 Input Manipulation and Input Enhancement
14.3 COMPLEXITY, ACCURACY, FLUENCY, AND PLANNING
14.4 PROCESSING INSTRUCTION
14.5 UNIQUENESS OF INSTRUCTION
14.6 EFFECTIVENESS OF INSTRUCTION
14.7 SLA AND CLASSROOM PRACTICES
14.8 ADDITIONAL CONTEXTS
14.8.1 Study Abroad
14.8.2 Technology-enhanced Language Learning
14.9 CONCLUSION
Part Seven: The Individual Language Learner
Chapter Fifteen: Learner-internal Influences
15.1 INTRODUCTION
15.2 THE INFLUENCE OF PSYCHOLOGY IN SLA
15.3 METHODOLOGICAL CONSIDERATIONS
15.4 AGE DIFFERENCES
15.5 APTITUDE
15.6 MOTIVATION
15.6.1 Motivation as a Function of Time and Success
15.6.2 Changes over Time
15.6.3 The L2 Motivational Self System
15.6.4 Influence of Success on Motivation and Demotivation
15.7 AFFECT
15.7.1 Anxiety
15.7.2 Other Emotional Variables
15.8 PERSONALITY
15.8.1 Extroversion and Introversion
15.8.2 Grit
15.9 LEARNING STRATEGIES
15.10 CONCLUSION
Chapter Sixteen: Related Disciplines - A Focus on the Multilingual and Multimodal Learner
16.1 INTRODUCTION
16.2 BILINGUAL ACQUISITION
16.3 THIRD LANGUAGE ACQUISITION/MULTILINGUALISM
16.4 HERITAGE LANGUAGE ACQUISITION
16.5 SLA BY THE DEAF/HARD OF HEARING
16.6 CONCLUSION
Part Eight: Conclusion
Chapter Seventeen: An Integrated View of Second Language Acquisition
17.1 AN INTEGRATION OF SUB-AREAS
17.1.1 Apperceived Input
17.1.2 Comprehended Input
17.1.3 Intake
17.1.4 Integration
17.1.5 Output
17.2 CONCLUSION
This authoritative, reader-friendly text presents core principles of good map design that apply regardless of production methods or technical approach. The book addresses the crucial questions that arise at each step of making a map: Who is the audience? What is the purpose of the map? Where and how will it be used? Students get the knowledge needed to make sound decisions about data, typography, color, projections, scale, symbols, and nontraditional mapping and advanced visualization techniques.
Â
Pedagogical Features:
*Over 200 illustrations (also available at the companion website as PowerPoint slides), including 23 color plates
*Suggested readings at the end of each chapter.
*Recommended Web resources.
*Instructive glossary
Table of Contents
I. Map Design
1. Introduction
2. Planning and Composition
3. Text Material and Typography
4. Color in Cartographic Design
II. Geographic and Cartographic Framework
5. Scale, Compilation, and Generalization
6. The Earth's Graticule and Projections
III. Symbolization
7. Basics of Symbolization
8. Symbolizing Geographic Data
9. Multivariate Mapping
IV. Nontraditional Mapping
10. Cartograms and Diagrams
11. Continuity and Change in the Computer Era
V. Critique of Maps
12. Putting It All Together
Appendix A. Commonly Used Projections
Appendix B. Resources
Appendix C. Glossary
|
|