Following on from the NACNE and COMA reports, the Ministry of Agriculture, Fisheries and Foods (MAFF) have entered the arena to try and raise public awareness of the fat content…
Abstract
Following on from the NACNE and COMA reports, the Ministry of Agriculture, Fisheries and Foods (MAFF) have entered the arena to try and raise public awareness of the fat content of foods. In February 1986 MAFF issued proposals for the requirement of foods to be labelled with their total fat and saturated fatty acid content1, 2. (Also reported in the May 1986 issue of this journal.) These requirements are mainly directed at foods sold by retailers but also at some fast food establishments.
Tonia R. Durden and Stephanie M. Curenton
In this chapter, we dismantle the current educational rhetoric that pervasively characterizes Black children as being at-risk, deficient, or underachievers. Instead, we replace…
Abstract
In this chapter, we dismantle the current educational rhetoric that pervasively characterizes Black children as being at-risk, deficient, or underachievers. Instead, we replace this deficit-oriented rhetoric with one that encapsulates the cultural and educational excellence that inspires Black children to reach their potential. First, we provide an overview of the current educational landscape for Black children and articulate by whom and how Black children are being educated. Next, we then define educational success and excellence within the context of an African-centric perspective of holistic development and wellness. Then, we highlight programs, schools, and approaches that have been successful in educating Black children. Finally, we identify key principles and guidelines in educating Black children that will have educational, research, and policy implications.
Details
Keywords
Stephanie M. Curenton, Iheoma U. Iruka and Tonia R. Durden
This introduction chapter provides an overview of the key issues highlighted throughout this book. First, we tackle why it is problematic to only characterize Black children’s…
Abstract
This introduction chapter provides an overview of the key issues highlighted throughout this book. First, we tackle why it is problematic to only characterize Black children’s accomplishment in terms of the “academic achievement gap.” Second, we discuss the importance of the home-school environment connection. Finally, we discuss the changes that need to be made in terms of teacher preparation in order to ensure that the workforce can practice racial equity in the classroom. All these issues are woven together by a call for closing the education opportunity gap via “equity adjustments” that can target educational and health disparities facing the Black community.
Details
Keywords
THE continuance of war into the New Year proves again the fatuousness of prophecy which had assured us of peace, or at least the cessation of hostilities, by Christmas. We have to…
Abstract
THE continuance of war into the New Year proves again the fatuousness of prophecy which had assured us of peace, or at least the cessation of hostilities, by Christmas. We have to face now what must be another year of conflict, unless miracles occur as they sometimes do in war, and thus the postponement of many of the plans that the Library Association and a great many other bodies and persons have been making; but we must not offend by prophesying. At this time a glance back on the record of 1944 is justifiable and may be salutary.
This chapter examines how opponents of same-sex marriage have used rights discourse to construct an identity of themselves as victims, and construct gays and lesbians as deviant…
Abstract
This chapter examines how opponents of same-sex marriage have used rights discourse to construct an identity of themselves as victims, and construct gays and lesbians as deviant “others.” I find that conservative rights discourse has been more effective outside the courtroom than in it. This is because these arguments rely on implicit discriminatory stereotypes which are frequently exposed under the scrutiny of dispassionate judicial actors. However, in a popular arena, they are free to operate with considerably less scrutiny. Here, rights discourse is used to mask discriminatory stereotypes and lend legitimacy to positions that would be rejected if made explicitly.
Malicious activities conducted by disgruntled employees via an email platform can cause profound damage to an organization such as financial and reputational losses. This threat…
Abstract
Purpose
Malicious activities conducted by disgruntled employees via an email platform can cause profound damage to an organization such as financial and reputational losses. This threat is known as an “Insider IT Sabotage” threat. This involves employees misusing their access rights to harm the organization. Events leading up to the attack are not technical but rather behavioural. The problem is that owing to the high volume and complexity of emails, the risk of insider IT sabotage cannot be diminished with rule-based approaches.
Design/methodology/approach
Malicious human behaviours that insiders within the insider IT sabotage category would possess are studied and mapped to phrases that would appear in email communications. A large email data set is classified according to behavioural characteristics of these employees. Machine learning algorithms are used to identify occurrences of this insider threat type. The accuracy of these approaches is measured.
Findings
It is shown in this paper that suspicious behaviour of disgruntled employees can be discovered, by means of machine intelligence techniques. The output of the machine learning classifier depends mainly on the depth and quality of the phrases and behaviour analysis, cleansing and number of email attributes examined. This process of labelling content in isolation could be improved if other attributes of the email data are included, such that a confidence score can be computed for each user.
Originality/value
This research presents a novel approach to show that the creation of a prototype that can automate the detection of insider IT sabotage within email systems to mitigate the risk within organizations.