|
Showing 1 - 23 of
23 matches in All Departments
Educational Learning and Development: Building and Enhancing
Capacity explores the topic of educational learning and development
in order to examine issues that are impacting, either positively or
negatively, on current research in this area. This is explored
through ten groups of research participants from various countries,
including circus families and teachers, students and teachers in a
senior secondary art classroom, a parent-run alternative school,
and refugees and migrants in a rural setting. These data sets are
analysed through eight 'hot topics' and 'wicked problems' in
contemporary education, seeking to uncover the capacity building
potential of the research projects and what factors impacted on or
assisted their development.
Contemporary Capacity-Building in Educational Contexts extends
current understandings of what capacities and capacity-building are
and of the dimensions that maximise their prospects of success in
current educational policy-making and provision. It does this by
exploring how capacity-building is implemented among nine groups of
research participants, including Australian, Dutch and English
circus families, migrants and refugees in an Australian regional
town, and a university education research team. These data sets are
analysed to address eight 'hot topics' and 'wicked problems' in
contemporary education: consciousness; creativity; dis/empowerment
and agency; diversity and identity; forms of capital and
currencies; knowledge sharing; regionality and rurality; and
resilience.
This text introduces the concepts of information warfare from a
non-military, organizational perspective. It is designed to
stimulate managers to develop policies, strategies, and tactics for
the aggressive use and defence of their data and knowledge base.
The book covers the full gambit of information warfare subjects
from the direct attack on computer systems to the more subtle
psychological technique of perception management. It provides the
framework needed to build management strategies in this area. The
topics covered include the basics of information warfare, corporate
intelligence systems, the use of deception, security of systems,
modes of attack, a methodology to develop defensive measures, plus
specific issues associated with information warfare.
This book will be of interest to executives and managers in any
public or private organization. Specifically, managers or staff in
the areas of information technology, security, knowledge
management, public relations, or marketing should find it directly
useful.
Its main purpose is to make readers aware of the new world of
information saturation; thus decreasing the chance that they will
become victims of those abusing the information age, whilst at the
same time increasing their chances of benefiting from the new
opportunities produced.
Addresses the issues and implications of cyber warfare and how it
directly impacts on companies
This text introduces the concepts of information warfare from a
non-military, organizational perspective. It is designed to
stimulate managers to develop policies, strategies, and tactics for
the aggressive use and defence of their data and knowledge base.
The book covers the full gambit of information warfare subjects
from the direct attack on computer systems to the more subtle
psychological technique of perception management. It provides the
framework needed to build management strategies in this area. The
topics covered include the basics of information warfare, corporate
intelligence systems, the use of deception, security of systems,
modes of attack, a methodology to develop defensive measures, plus
specific issues associated with information warfare. This book will
be of interest to executives and managers in any public or private
organization. Specifically, managers or staff in the areas of
information technology, security, knowledge management, public
relations, or marketing should find it directly useful.Its main
purpose is to make readers aware of the new world of information
saturation; thus decreasing the chance that they will become
victims of those abusing the information age, whilst at the same
time increasing their chances of benefiting from the new
opportunities produced.
|
Applications and Techniques in Information Security - International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings (Paperback, 2014 ed.)
Lynn Batten, Gang Li, Wenjia Niu, Matthew Warren
|
R2,221
Discovery Miles 22 210
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the International
Conference on Applications and Techniques in Information Security,
ATIS 2014, held in Melbourne, Australia, in November 2014. The 16
revised full papers and 8 short papers presented were carefully
reviewed and selected from 56 submissions. The papers are organized
in topical sections on applications; curbing cyber crimes; data
privacy; digital forensics; security implementations.
|
Way to Go: Series 1 (DVD)
Blake Harrison, Marc Wootton, Ben Heathcote, Laura Aikman, Hannah Job, …
1
|
R230
Discovery Miles 2 300
|
Out of stock
|
The entire first series of the BBC black comedy following the
exploits of three 20-somethings who decide to set up a business
specialising in assisted suicide. With his terminally ill neighbour
pleading for a way out of his misery and his brother Joey (Ben
Heathcote) in need of cash to pay off his gambling debts, Scott
(Blake Harrison) and his mate Cozzo (Marc Wootton) come up with
what they think is an ideal, albeit extremely illegal, way to help
both - an assisted suicide machine. But as they struggle to keep
their business under wraps, they soon realise that 'here today,
gone tomorrow' is not the only answer to life's problems.
Modern society is highly dependent on key critical systems either
physical or technology based. They have become more significant as
the information age has developed and societies have found
themselves dependant on these systems. The issue is that these
critical systems can be attacked and disrupted via Information
Warfare attacks and this is the major theme of this collection of
leading edge research. The book assesses how individual countries
deal with Information Warfare in terms of protecting critical
infrastructures or raising security awareness amongst a population
and reflects on other considerations of Information Warfare in
terms of the neutrality in Information Warfare, cooperation and the
role of activism. The paper uses a number case studies and examples
from around the around and particular emphasis is placed upon the
Estonian Cyber War and understanding what happened, why it happened
and ways to mitigate the situation. This book includes 9 important
case studies in this field from 6 different countries and an
introduction to the subject by Professor Matthew Warren from Deakin
University, Australia. Print version. This book contains 157 pages
|
You may like...
Come Boldly
C. S. Lewis
Hardcover
R254
R182
Discovery Miles 1 820
Loot
Nadine Gordimer
Paperback
(2)
R383
R318
Discovery Miles 3 180
Loot
Nadine Gordimer
Paperback
(2)
R383
R318
Discovery Miles 3 180
Hampstead
Diane Keaton, Brendan Gleeson, …
DVD
R63
Discovery Miles 630
Ab Wheel
R209
R149
Discovery Miles 1 490
|