768 research outputs found
Lessons of History: An Impossible Equation? Towards New Perspectives on Historical Learning
Lessons of history are two-sided cultural products. They serve as activeinstruments of temporal orientation in a society in which historical trajectories seem obsolete and the future open, but they are also passively framed within historical cultures that often have prefigured them. Thus, lessons are seldom arbitrarily constructed. While lessons of history for many centuries were highly esteemed as guides to the future from the viewpoint of a practical past, and still are among economists, politicians and social scientists, few professional historians have trust in lessons. The distrust is explained from the lessonsâ lack of congruence with traditional professional standards, but also from a frequent use of historical lessons for ideological and political purposes. The purpose of this essay is partly to discuss the theoretical assumptions behind lessons of history, partly to argue in favour of a more constructive use of lessons that can meet reasonable scholarly requirements
Lessons of History: An Impossible Equation? Towards New Perspectives on Historical Learning
Lessons of history are two-sided cultural products. They serve as activeinstruments of temporal orientation in a society in which historical trajectories seem obsolete and the future open, but they are also passively framed within historical cultures that often have prefigured them. Thus, lessons are seldom arbitrarily constructed. While lessons of history for many centuries were highly esteemed as guides to the future from the viewpoint of a practical past, and still are among economists, politicians and social scientists, few professional historians have trust in lessons. The distrust is explained from the lessonsâ lack of congruence with traditional professional standards, but also from a frequent use of historical lessons for ideological and political purposes. The purpose of this essay is partly to discuss the theoretical assumptions behind lessons of history, partly to argue in favour of a more constructive use of lessons that can meet reasonable scholarly requirements
Recommended from our members
Feature Engineering for Detection of Wormhole Attacking in Mobile Ad Hoc Networks with Machine Learning Methods
Due to the self-configuring nature of a Mobile Ad Hoc Network (MANET), each node must participate in the routing process, in addition to its other activities. Therefore, routing in a MANET is especially vulnerable to malicious node activity leading to potentially severe disruption in network communications. The wormhole attack is a particularly severe MANET routing threat since it is easy to launch, can be launched in several modes, difficult to detect, and can cause significant communication disruption. In this paper we establish a practice for feature engineering of network data for wormhole attack prevention and detection with intrusion detection methods based on machine learning
Method Engineering as Design Science
In this paper, we motivate, devise, demonstrate, and evaluate an approach for the research-based development of information systems development methods (ISDMs). This approach, termed âmethod engineering as design scienceâ (ME-DS), emerged from the identified need for scholars to develop ISDMs using proper research methods that meet the standards of both rigor and relevance. ISDMs occupy a position of central importance to information systems development and scholars have therefore invested extensive resources over the years in developing such methods. The method engineering (ME) discipline has developed different frameworks and methods to guide such development work and, for that purpose, they are well-suited. Still, there remains a need for applications and evaluations of ISDMs based on the demands for knowledge justification. Unfortunately, in many cases, scholars come up short with regard to how ISDMs are generated and empirically validated. While design science (DS) stresses knowledge justification, prominent DS approaches seem to be biased toward the development of IT artifacts, making this approach ill-suited for the development of method artifacts. We therefore propose eight principles that marry ME and DS, resulting in a process model with six activities to support research-based development of ISDMs. We demonstrate and evaluate ME-DS by assessing three existing research papers that propose ISDMs. These retrospectives show how ME-DS directs attention to certain aspects of the research process and provides support for future ISDM development
The Holocaust on Postwar Battlefields : Genocide as Historical Culture
The book is the sixth collection of reports from The Holocaust and European Historical Culture, a research project based at Lund University. The aim of the project and the book is to study the interpretations and representations of the Holocaust in various post-war European societies and states
Holocaust Heritage : Inquiries into European Historical Cultures
The book is a conference volume, throwing light on theoretical, analytical and empirical questions on how the Holocaust has been interpreted and represented in various European countries in the post-War era
Some Implementation Issues for Security Services based on IBE
Identity Based Encryption (IBE) is a public key cryptosystem where a unique identity string, such as an e-mail address, can be used as a public key. IBE is simpler than the traditional PKI since certificates are not needed. An IBE scheme is usually based on pairing of discrete points on elliptic curves. An IBE scheme can also be based on quadratic residuosity. This paper presents an overview of these IBE schemes and surveys present IBE based security services. Private key management is described in detail with protocols to authenticate users of Private Key Generation Authorities (PKG), to protect submission of generated private keys, and to avoid the key escrow problem. In the security service survey IBE implementations for smartcards, for smart phones, for security services in mobile networking, for security services in health care information systems, for secure web services, and for grid network security are presented. Also the performance of IBE schemes is estimated
Future-proofing in healthcare building design
Objective - The objective of the study is to explore how future-proofing (FP) in healthcare building design is approached by Swedish architects.
Background - Buildings are changing due to physical, economical, functional, technological, social and legal drivers. These changing circumstances results in new requirements on the buildings and drive change in healthcare building design projects. This results in a need to consider future-proofing (FP) approaches to manage this situation. Previous research on FP approaches has mostly focused on the importance of FP as such. There has been little attention on how the architectural practice actually worked with healthcare buildings related to FP, or their interpretations of related concepts to FP, such as flexibility.
Research question - How do Swedish architects approach and address FP and what design strategies have they applied in healthcare projects?
Methods - The paper is an explorative, qualitative, multi-case study of planned and/or built Swedish healthcare buildings. Data has been collected from presentations of healthcare building design projects encompassing FP approaches and through semi-structured interviews with architects designing healthcare buildings. The interviews were transcribed and analysed through content analysis focussing on the architects view and interpretation of FP in their projects.
Results - Sixteen different types of building design strategies addressing future changes were identified in the projects that were studied. The differences in the design strategies related to dissimilar contexts, budgets, stakeholders and design processes.
Conclusion - The view among the architects, that were included in the study, on FP approaches is found to be based on a narrow scope and include a vague terminology. While it is difficult, even impossible, to predict all future changes in a healthcare building design project, there is a need to develop design strategies that can address FP. However, and herein lies the challenge, an FP approach needs to be broad enough to allow for variations and defined enough to be justifiable from a project cost and delivery perspective as well as enabling a design supporting the healthcare activities.publishedVersio
Empiriska synpunkter pÄ tvÄsprÄkig lexikografi
I artikeln ges en redogörelse för tillkornsten av Stora svensk-finska ordboken (SSFO) som Ă„ren 1982-1987 utkom i tre delar pĂ„ inalles drygt 3 000 sidor. Arbetet inleddes i början av 1960-talet vid Finska institutionen vid Ă
bo Akademi. Det skedde i Finska LitteratursÀllskapets regi och med finansiellt understöd av Finlands undervisningsministerium. I redogörelsen behandlas bl.a vissa innovationer i angivaodet av uppslagsordens uttal och betoning samt i utformningen av fraseologien. I senare hÀlften av föredraget ges en rapport om det arbete pÄ en nedbantad version av SSFO som författaren f.n. Àr sysselsatt med. Den nya versionen Àr planerad att omfatta c:a 65-70 procent av innehÄllet i SSFO, och författaren redovisar de olika utrymmesbesparande ÄtgÀrder genom vilka omfÄnget minskas utan att den lexikaliska informationen i samma grad gÄr förlorad
- âŠ