Search results

1 – 10 of 24
Open Access
Book part
Publication date: 16 October 2020

Abstract

Details

Gender and the Violence(s) of War and Armed Conflict: More Dangerous to Be a Woman?
Type: Book
ISBN: 978-1-78769-115-5

Open Access
Book part
Publication date: 8 February 2019

Alison Bowes and Alison Dawson

Abstract

Details

Designing Environments for People with Dementia
Type: Book
ISBN: 978-1-78769-974-8

Open Access
Article
Publication date: 1 June 2021

Ondřej Bublík, Libor Lobovský, Václav Heidler, Tomáš Mandys and Jan Vimmr

The paper targets on providing new experimental data for validation of the well-established mathematical models within the framework of the lattice Boltzmann method (LBM), which…

Abstract

Purpose

The paper targets on providing new experimental data for validation of the well-established mathematical models within the framework of the lattice Boltzmann method (LBM), which are applied to problems of casting processes in complex mould cavities.

Design/methodology/approach

An experimental campaign aiming at the free-surface flow within a system of narrow channels is designed and executed under well-controlled laboratory conditions. An in-house lattice Boltzmann solver is implemented. Its algorithm is described in detail and its performance is tested thoroughly using both the newly recorded experimental data and well-known analytical benchmark tests.

Findings

The benchmark tests prove the ability of the implemented algorithm to provide a reliable solution when the surface tension effects become dominant. The convergence of the implemented method is assessed. The two new experimentally studied problems are resolved well by simulations using a coarse computational grid.

Originality/value

A detailed set of original experimental data for validation of computational schemes for simulations of free-surface gravity-driven flow within a system of narrow channels is presented.

Details

Engineering Computations, vol. 38 no. 10
Type: Research Article
ISSN: 0264-4401

Keywords

Open Access
Article
Publication date: 10 June 2019

Michele Loi, Markus Christen, Nadine Kleine and Karsten Weber

Cybersecurity in healthcare has become an urgent matter in recent years due to various malicious attacks on hospitals and other parts of the healthcare infrastructure. The purpose…

3969

Abstract

Purpose

Cybersecurity in healthcare has become an urgent matter in recent years due to various malicious attacks on hospitals and other parts of the healthcare infrastructure. The purpose of this paper is to provide an outline of how core values of the health systems, such as the principles of biomedical ethics, are in a supportive or conflicting relation to cybersecurity.

Design/methodology/approach

This paper claims that it is possible to map the desiderata relevant to cybersecurity onto the four principles of medical ethics, i.e. beneficence, non-maleficence, autonomy and justice, and explore value conflicts in that way.

Findings

With respect to the question of how these principles should be balanced, there are reasons to think that the priority of autonomy relative to beneficence and non-maleficence in contemporary medical ethics could be extended to value conflicts in health-related cybersecurity.

Research limitations/implications

However, the tension between autonomy and justice, which relates to the desideratum of usability of information and communication technology systems, cannot be ignored even if one assumes that respect for autonomy should take priority over other moral concerns.

Originality/value

In terms of value conflicts, most discussions in healthcare deal with the conflict of balancing efficiency and privacy given the sensible nature of health information. In this paper, the authors provide a broader and more detailed outline.

Details

Journal of Information, Communication and Ethics in Society, vol. 17 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Abstract

Details

Video Games Crime and Next-Gen Deviance
Type: Book
ISBN: 978-1-83867-450-2

Open Access
Article
Publication date: 1 December 2017

Robyn Albers, Christina J. Davison and Bradley Johnson

Considerable research has shown the value of Inquiry-Based Learning (IBL) regarding student engagement and motivation, depth of learning, and cognitive flexibility. Student…

Abstract

Considerable research has shown the value of Inquiry-Based Learning (IBL) regarding student engagement and motivation, depth of learning, and cognitive flexibility. Student collaboration is one component of this approach, since students must communicate and work together inside and outside of class time when engaging with an IBL project. Choosing a mobile learning tool can benefit student collaboration in so far as the tool enables anytime/anywhere collaborative learning. This study looked at how 118 Emirati undergraduate students in a government-sponsored university in the United Arab Emirates chose to collaborate in an IBL semester-long assignment. Unlike some approaches that dictate the technology selection to students (Barczyk & Duncan, 2013; Prescott, Wilson & Becket, 2013), in this project course instructors gave the students autonomy to choose the best mobile learning tools for their group. The study used a mixed-methods approach to collect data on which tools students perceived as best for IBL. Participants were surveyed three times about which tool they preferred for university work: a pre-project survey, a mid-project survey, and post-project survey. Results show that students changed their preferred tool to WhatsApp over the course of the semester. A focus group with each course section provided qualitative data as to why students preferred WhatsApp. The students also delivered poster presentations as to how WhatsApp helped them complete their community-based IBL projects. This study will show how WhatsApp can be a successful mobile learning tool for student collaboration in IBL.

Details

Learning and Teaching in Higher Education: Gulf Perspectives, vol. 14 no. 2
Type: Research Article
ISSN: 2077-5504

Open Access
Article
Publication date: 15 December 2008

Paige Haber and Susan R. Komives

This study explored the extent to which co-curricular involvement, holding formal leadership roles, and participating in leadership programs contributed to female and male college…

Abstract

This study explored the extent to which co-curricular involvement, holding formal leadership roles, and participating in leadership programs contributed to female and male college students’ capacity for socially responsible leadership. It focused specifically on the individual values of the Social Change Model of Leadership Development. An adapted version of Astin’s Input-Environment-Outcome Model was the conceptual framework and the Social Change Model individual values including consciousness of self, congruence, and commitment served as the theoretical framework. Data were collected from a random sample of 3,410 undergraduates at one institution through the Multi-Institutional Study of Leadership. Participants completed a web-based survey including the Socially Responsible Leadership Scale-Revised2. Data were analyzed using hierarchical multiple regression to identify the extent to which the environmental variables contributed to outcomes. Involvement in student organizations was the most significant environmental variable and community involvement emerged as significant for women. A discussion of findings and implications is presented.

Details

Journal of Leadership Education, vol. 7 no. 3
Type: Research Article
ISSN: 1552-9045

Open Access
Book part
Publication date: 4 June 2021

Bridget Harris and Delanie Woodlock

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…

Abstract

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Abstract

Details

Gender and the Violence(s) of War and Armed Conflict: More Dangerous to Be a Woman?
Type: Book
ISBN: 978-1-78769-115-5

Open Access

Abstract

Details

Designing Environments for People with Dementia
Type: Book
ISBN: 978-1-78769-974-8

1 – 10 of 24