4,954 research outputs found

    Project- and Group-Based Learning of Junior Writing in Biology

    Get PDF
    Writing in Biology, part of the Junior Writing Program, is inherently a project-based learning course. After a Science, Technology, Engineering, and Mathematics Teacher Education Collaborative (STEMTEC) workshop, the course was thoroughly revised. Each of six projects was modified to increase student-active and group participation. Base groups with a balanced experience constitution are established using voluntary ordering and random assignment. A walk-around during the initial meeting serves to establish bonding within the base groups. Random groups are used within exercises to stimulate student interaction and familiarity with ad hoc group cooperation. Digital images of, and by, students are used to encourage student interaction and name recognition. A website with the entire course plan is available at an archival site to complement and help elucidate the course

    Indifference and Secondary Liability for Copyright Infringement

    Get PDF
    Indifference and Secondary Liability for Copyright Infringemen

    Strengthening Credit Freeze Legislation in the States: Empowering Consumers to Prevent Economic Loss from Identity Theft

    Get PDF
    This article discusses the need for laws that will help to protect consumers from economic loss caused by identity theft. It reviews the nature of the identity theft schemes, the economic losses caused and the broad extent of identity theft. Second, the article reviews exisiting law that have been largely ineffective. Third, the articles reviews the vulnerabilities of existing identification systems and risky lending practices that enable identity theft. Finally, the article proposes new state credit freeze legislation focused on economic loss prevention. Permitting consumers to obtain a security freeze on their credit reports, thereby disrupting ability of identity thieves to open new accounts, is the most feasible and effective means to prevent economic loss. It also is an important first step toward further strengthening consumer control over their credit information

    Protecting Consumers From Spyware: A Proposed Consumer Digital Trespass Act

    Get PDF
    “Spyware” is a broad term used to describe software that resides on a user’s computer and monitors the user’s online behavior. Though spyware may be helpful or benign, it can also be used for malicious purposes, commonly classified as “malware”. Consumers, who lack sophistication to avoid unintentionally downloading spyware, are especially vulnerable to the threat of malware. In lieu of this threat, it is important to understand the nature and scope of spyware problems affecting consumers. The paper will discuss how common law tort theories of trespass and trespass to chattel are difficult to apply to spyware, and how a consumer’s desktop is analogous to real property. Given this risk and lack of clear case law on the issue of spyware, a new statute is proposed to address the widespread use of spyware methods by legitimate business interests, and introduce a private cause of action based on real property and tort law

    Colleagues and Friends: A Theoretical Framework of Workplace Friendship

    Get PDF
    Friendships in general, and workplace friendships in particular, are among the most valued interpersonal relationships for individuals. Despite the prevalence and great importance of workplace friendships, there isn’t much research about the theoretical underpinnings of this phenomenon. In this paper we suggest a typology for workplace friendships. We propose looking at this construct as a function of two factors: The Quality of the friendship and its Scope. Consequently, we propose four types of workplace friendships and discuss their likely antecedents and outcomes. Finally, we discuss avenues for future research in this area

    Aberration measurement using in-situ two-beam interferometry

    Get PDF
    A reticle with phase-only blazed gratings ofvaiying azimuthal orientations diffracts light into only two orders, 0 & +1, discretely illuminating a lens pupil. The image ofeach grating is a sinusoidal interference pattern and is recorded as a surface relief in a highly absorbing photoresist. The maximum image contrast occurs when focus is set such that the RMS wavefront error over the two beams is minimized. This maximum contrast vs focus is recorded by a CCD array mounted on a dark-field optical microscope and the aberrations are obtained from an analysis of this record. Repeatability of equivalent primary aberrations ofless than O.OO17RMS are achieved and used to monitor lens stability.published_or_final_versio
    • …
    corecore