318 research outputs found

    Teaching Effective Communication Principles: Characteristics of Effective Preaching to Young Adult in a North American Context

    Get PDF
    The purpose of this dissertation is to help preachers to be more effective in the pulpit. The characteristics for what make a preacher effective in the pulpit are explored and considered in this project. The seminar: Preaching to the iPod Mind was presented to four different groups of preachers in the North American Division. A survey was provided to each participant.https://digitalcommons.andrews.edu/hrsa/1005/thumbnail.jp

    Research Objects: Towards Exchange and Reuse of Digital Knowledge

    Get PDF
    What will researchers be publishing in the future? Whilst there is little question that the Web will be the publication platform, as scholars move away from paper towards digital content, there is a need for mechanisms that support the production of self-contained units of knowledge and facilitate the publication, sharing and reuse of such entities.

 In this paper we discuss the notion of _research objects_, semantically rich aggregations of resources, that can possess some scientific intent or support some research objective. We present a number of principles that we expect such objects and their associated services to follow

    Research Objects: Towards Exchange and Reuse of Digital Knowledge

    No full text
    What will researchers be publishing in the future? Whilst there is little question that the Web will be the publication platform, as scholars move away from paper towards digital content, there is a need for mechanisms that support the production of self-contained units of knowledge and facilitate the publication, sharing and reuse of such entities. In this paper we discuss the notion of research objects, semantically rich aggregations of resources, that possess some scientifi?c intent or support some research objective. We present a number of principles that we expect such objects and their associated services to follow

    Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards

    Get PDF
    Companies and government organizations are increasingly compelled, if not required by law, to ensure that their information systems will comply with various federal and industry regulatory standards, such as the NIST Special Publication on Security Controls for Federal Information Systems (NIST SP-800-53), or the Common Criteria (ISO 15408-2). Such organizations operate business or mission critical systems where a lack of or lapse in security protections translates to serious confidentiality, integrity, and availability risks that, if exploited, could result in information disclosure, loss of money, or, at worst, loss of life. To mitigate these risks and ensure that their information systems meet regulatory standards, organizations must be able to (a) contextualize regulatory documents in a way that extracts the relevant technical implications for their systems, (b) formally represent their systems and demonstrate that they meet the extracted requirements following an accreditation process, and (c) ensure that all third-party systems, which may exist outside of the information system enclave as web or cloud services also implement appropriate security measures consistent with organizational expectations. This paper introduces a step-wise process, based on semantic hierarchies, that systematically extracts relevant security requirements from control standards to build a certification baseline for organizations to use in conjunction with formal methods and service agreements for accreditation. The approach is demonstrated following a case study of all audit-related controls in the SP-800-53, ISO 15408-2, and related documents. Accuracy, applicability, consistency, and efficacy of the approach were evaluated using controlled qualitative and quantitative methods in two separate studies

    Introduction to the political economy of the sub-prime crisis in Britain : constructing and contesting competence

    Get PDF
    It is almost always inadvisable to try to second-guess the character of a General Election campaign before it begins in earnest. Yet, even in today’s shadow-boxing phase in advance of the British General Election due to be called in 2010, a number of important campaign contours are already in evidence. It is one of the unwritten laws of British electoral politics that governments unravel – particularly those of a certain longevity – as events appear ever more to have spiralled out of their control. The task for the Brown Government in the upcoming General Election campaign is to try to convince voters that there is still life left within Labour despite its current travails with the credit crunch and British banks’ self-imposed entrapment in the subprime crisis. Claim and counter-claim are likely to pass between the Government and the opposition parties as to where the blame lies for the current disarray of the banking sector, whose model of regulation is most responsible and who is best placed to ensure a successful clean-up operation. Whoever is perceived to have come out on top in this debate is likely to stand a very good chance of winning the election

    Collaborative Learning in Software Development Teams

    Get PDF
    Recently Web 2.0 has emerged as a framework to study collaborative learning. Assessing learning in team projects is onemechanism used to improve teaching methodologies and tool support. Web 2.0 technologies enable automated assessmentcapabilities, leading to both rapid and incremental feedback. Such feedback can catch problems in time for pedagogicadjustment, to better guide students toward reaching learning objectives. Our courseware, SEREBRO, couples a social,tagging enabled, idea network with a range of modular toolkits, such as wikis, feeds and project management tools into aWeb 2.0 environment for collaborating teams. In this paper, we first refine a set of published learning indicators intocommunication patterns that are facilitated in SEREBRO. We apply these indicators to student software development teamdiscussions regarding their collaborative activities. We show how the refined patterns, captured by SEREBRO\u27s Web 2.0modules, are catalysts to the learning process involved in software development

    ORE User Guide - Resource Map Implementation in JSON-LD 0.9

    Get PDF
    Open Archives Initiative Object Reuse and Exchange (OAI-ORE) defines standards for the description and exchange of aggregations of Web resources. OAI-ORE introduces the notion of a Resource Map, an RDF Graph which describes the Aggregation, the aggregated Resources of which it is composed, and the relationships between them (and/or the relationships between these and other resources). Since a Resource Map is an RDF Graph, it can be serialized using any RDF syntax. This document outlines the use of one such syntax for the serialization of Resource Maps: JSON-LD. This document is intended for implementers who have an understanding of ORE concepts and are responsible for the development of applications which generate or process Resource Maps using JSON-LD.This document is available at http://www.openarchives.org/ore/0.9/jsonl
    • 

    corecore