731 research outputs found

    CHILDCARE PRACTICES IN THREE ASIAN COUNTRIES

    Get PDF
    Childcare practices such as feeding, toilet training, sleeping arrangement and discipline in three Asian countries (Chinese, Japan, and India) are compared. These countries differ from each other in culture, religion, language and ethnic makeup from Euro-American culture. The differences in childcare practices are broadly related to the differences in family values, traditions, and religions among these countries. Educational implications of sensitivity to cultural differences are also discussed

    How Parents Can Encourage Creativity in Children

    Get PDF

    Childcare Practices in Three Asian Countries

    Get PDF
    Childcare practices such as feeding, toilet training, sleeping arrangement and discipline in three Asian countries (Chinese, Japan, and India) are compared. These countries differ from each other in culture, religion, language and ethnic makeup from Euro-American culture. The differences in childcare practices are broadly related to the differences in family values, traditions, and religions among these countries. Educational implications of sensitivity to cultural differences are also discussed

    Password Theft: Rethinking an Old Crime in a New Era

    Get PDF
    By putting themselves out in front as the victims, the Recording Industry Association of America (RIAA) helped reshape the governing norms of the times, and as a result, people viewed the act of file-sharing differently. By forcing people to see music downloading as a form of theft, the RIAA was quite successful in deterring it. In the process, they also proposed a radical view of theft that changes our basic economic understandings of the action[...] This paper argues that the RIAA\u27s model for deterring music theft could be successfully used to deter many other forms of computer theft, and, specifically, stealing passwords. By focusing on the victim, content-providers can alter people\u27s views of their own actions, thereby properly bringing what was once an innocuous activity into the realm of the criminal where it belongs. To accomplish this task, however, we have to comport our traditional views of theft to the realities of the Internet. First, economic notions of rivalry and non-rivalry are undermined in a digital world where data is infinitely copyable, and these notions need to be updated appropriately. Secondly, finding real space analogues to password theft is important when locating an existing legal framework in which to work. This Note attempts to do both. Part I of this Note gives a brief background and explication of rivalrous and non-rivalrous theft, and the problems that the Internet poses, specifically in the music downloading area. In so doing, I propose a new way of conceiving of rivalry that fits into the realities of digital networks. Part II is an analysis of password theft, in particular the distinction between first-party and second-party password theft. First-party password theft concerns actions--stealing personal identification numbers and the like--that are probably familiar to most readers. Second-party password theft, however, is a far more radical notion that is crucial for understanding why password theft in general is criminal, and why it can be so damaging. I analogize first and second-party password theft to larceny and embezzlement, respectively; the purpose of this is to provide a legal framework for analyzing password theft as a criminal activity. Additionally, I show how the updated views of rivalry proposed in Part I allow us to evaluate properly the harm that password theft causes. Finally, Part III argues that by following the model of the RIAA, the government, content-providers, and law enforcement can effectively deter password theft in a variety of ways

    Password Theft: Rethinking an Old Crime in a New Era

    Get PDF
    By putting themselves out in front as the victims, the Recording Industry Association of America (RIAA) helped reshape the governing norms of the times, and as a result, people viewed the act of file-sharing differently. By forcing people to see music downloading as a form of theft, the RIAA was quite successful in deterring it. In the process, they also proposed a radical view of theft that changes our basic economic understandings of the action[...] This paper argues that the RIAA\u27s model for deterring music theft could be successfully used to deter many other forms of computer theft, and, specifically, stealing passwords. By focusing on the victim, content-providers can alter people\u27s views of their own actions, thereby properly bringing what was once an innocuous activity into the realm of the criminal where it belongs. To accomplish this task, however, we have to comport our traditional views of theft to the realities of the Internet. First, economic notions of rivalry and non-rivalry are undermined in a digital world where data is infinitely copyable, and these notions need to be updated appropriately. Secondly, finding real space analogues to password theft is important when locating an existing legal framework in which to work. This Note attempts to do both. Part I of this Note gives a brief background and explication of rivalrous and non-rivalrous theft, and the problems that the Internet poses, specifically in the music downloading area. In so doing, I propose a new way of conceiving of rivalry that fits into the realities of digital networks. Part II is an analysis of password theft, in particular the distinction between first-party and second-party password theft. First-party password theft concerns actions--stealing personal identification numbers and the like--that are probably familiar to most readers. Second-party password theft, however, is a far more radical notion that is crucial for understanding why password theft in general is criminal, and why it can be so damaging. I analogize first and second-party password theft to larceny and embezzlement, respectively; the purpose of this is to provide a legal framework for analyzing password theft as a criminal activity. Additionally, I show how the updated views of rivalry proposed in Part I allow us to evaluate properly the harm that password theft causes. Finally, Part III argues that by following the model of the RIAA, the government, content-providers, and law enforcement can effectively deter password theft in a variety of ways

    [Malaysia] Early Education and Development in Malaysia: Issues and Challenges in Providing a Framework for a Multiethnic Society

    Get PDF
    This paper provides a brief overview of early education in Malaysia with focus on the issues and challenges in providing quality early education for a multiethnic society. Conflicting interests between majority and minority ethnic groups not only cause different educational outcomes and expectations for children and families but also create challenges to the government to provide quality and equality of education to all young children. Some suggestions for a framework for early education in Malaysia are discussed

    “Math is Hard,” Said Mrs. Ford; “Not for Me,” Said Mrs. Honda: Does Culture Matter in Teaching and Learning in Elementary Mathematics?

    Get PDF
    This article is a discussion of the practices of teaching and learning in elementary mathematics from the perspectives of Eastern and Western cultures. It focuses on the differences in teaching pedagogy in math between the United States and three Asian countries: Singapore, Japan, and China

    How Parents Can Encourage Creativity in Children

    Get PDF
    Henry, age four, wanted to be a knight for Halloween. The day before he learned the Biblical soldier terms of breast plate of righteousness, sword of faith and helmet of salvation. However, the day after Halloween the sword became a fire hose, the breastplate a fire fighting vest, the helmet was tipped back to protect his neck and the distinctive rhythmic sounds of a firefighters oxygen supply could be heard coming through the former knights face piece which was now a smoke filtering mask. The creativity vivaciousness of a four year old led the adults in his life to say, “What next?” Children are apt to be far more gifted that their parents or teachers realize – and in different ways. IQ tests do not measure creativity talent (Fasko, 2001; Proctor & Burnett, 2004). By depending on them, we miss seventy of our most gifted youngsters. Most children start life with valuable creative potential. Unfortunately many of them have it knocked out them by the time they reach the fourth grade (Worthington & Carruthers 2003). It is that parents and teachers deliberately squelch creativity; it is rather that they fail to recognize (Runco, 2003). They mistake it for unruliness, eccentricity and even stupidity. Creativity involves getting away from the obvious, safe and expected an

    “Math is Hard,” Said Mrs. Ford; “Not for Me,” Said Mrs. Honda: Does Culture Matter in Teaching and Learning in Elementary Mathematics?

    Get PDF
    This article is a discussion of the practices of teaching and learning in elementary mathematics from the perspectives of Eastern and Western cultures. It focuses on the differences in teaching pedagogy in math between the United States and three Asian countries: Singapore, Japan, and China
    • …
    corecore