Search results
1 – 8 of 8When a company considers the introduction of new technology, acomplete appraisal is required. Such an appraisal should encompass notonly the short‐term factors of a financial and…
Abstract
When a company considers the introduction of new technology, a complete appraisal is required. Such an appraisal should encompass not only the short‐term factors of a financial and technology nature, but also the longer‐term factors of the people and management skills that need to be identified and developed.
Details
Keywords
Patricia Sloper, Lisa Jones, Suzanne Triggs, Jane Howarth and Katy Barton
The authors describe the rationale for key worker services for disabled children, factors to consider in developing such services, the role of key workers, how a key worker…
Abstract
The authors describe the rationale for key worker services for disabled children, factors to consider in developing such services, the role of key workers, how a key worker service is operating in one authority and the impact it has had for families who received it.
Details
Keywords
Alex Morfaki, Helen Bovill and Nicola Bowden-Clissold
Despite the rhetoric emphasising partnership working, there has been a dearth of research related to the educational practices that reify interprofessional partnerships for young…
Abstract
Despite the rhetoric emphasising partnership working, there has been a dearth of research related to the educational practices that reify interprofessional partnerships for young children with special educational needs. This doctoral study examined the subtle power shifts in the interactions between early years educators and other professionals against the backdrop of deficit policy discourses and institutional challenges. This research adopted a case study approach and utilised methodological triangulation to unveil educators' phronetic knowledge. The findings point to power differentials and partnership inequities which affect the roles and identities of early years educators. Participants assumed emergent leadership roles that encompassed elements of social pedagogy and pedagogical eclecticism which eschewed medicalised interventions in favour of intuitive pedagogical approaches centred on the child and family.
Details
Keywords
THE end of October saw the return of most of our overseas visitors, continental and otherwise, to their homes, leaving with us pleasant memories of a mutually successful visit…
Abstract
THE end of October saw the return of most of our overseas visitors, continental and otherwise, to their homes, leaving with us pleasant memories of a mutually successful visit. The Englishman's proverbial difficulties with foreign tongues, even of neighbouring France, did not complicate matters unduly or reduce too much those interchanges which conference and school afforded. We can repeat our frequently‐expressed hope that there will be an ever increasing series of visits, both of the foreigner to England and of ourselves as foreigners to other countries. We would welcome longer stays in both cases. Nothing but good can come from them.
Steven M. Furnell and Paul S. Dowland
The detection and prevention of authorised activities, by both external parties and internal personnel, is an important issue within IT systems. Traditional methods of user…
Abstract
The detection and prevention of authorised activities, by both external parties and internal personnel, is an important issue within IT systems. Traditional methods of user authentication and access control do not provide comprehensive protection and offer opportunities for compromise by various classes of abuser. A potential solution is provided in the form of intrusion detection systems, which are able to provide proactive monitoring of system activity and apply automatic responses in the event of suspected problems. This paper presents the principles of intrusion monitoring and then proceeds to describe the conceptual architecture of the Intrusion Monitoring System (IMS), an approach that is the focus of current research and development by the authors. The main functional elements of the IMS architecture are described, followed by thoughts regarding the practical implementation and the associated advantages (and potential disadvantages) that this would deliver. It is concluded that whilst an IMS‐type approach would not represent a total replacement for conventional controls, it would represent an effective means to complement the protection already provided.
Details