4,961,728 research outputs found
Best practice, best teaching
Keynote address discussing examples from my own, colleagues, and attendees practice. Conference participants worked in groups to share and build upon their existing teaching and learning strategies
Safeguarding in schools : best practice
"This report illustrates and evaluates the features of best practice in safeguarding, based on inspection evidence from the 19% of all maintained primary, secondary and special schools, residential special schools and pupil referral units inspected between September 2009 and July 2010 where safeguarding had been judged outstanding. It also draws on a more detailed analysis and evaluation of safeguarding practice in a small sample of outstanding schools visited by Her Majesty’s Inspectors" -- front cover
Responsible online gambling and best practice
Professor Mark Griffiths, one of two authors of the British Gambling Prevalence Study, comments on the need for the online gambling industry to adopt best practice and what this should involve in order to dispel government and public concerns about addiction to online gambling
Constituting best practice in management consulting
This paper offers critical reflections on the construction and propagation of ‘best practice’: a concept which has become increasingly important in the business world and in civic life more generally. Focusing upon the activities of the Management Consultancies Association (MCA) we offer an analysis of the awards process instituted to applaud ‘best practice’ in the arena of consulting. Departing from existing academic representations of the advice industry which generally exclude this trade body from the analytical frame we consider the role which the MCA performs in the field of consulting. Situating the MCA’s attempt to constitute best practice within the work of Bruno Latour we argue that this construct depends upon the mobilization of an extended network of allies, advocates and spectators whose interactions have been written-out of academic analysis. The paper concludes by proposing the need for further research designed to explore, both, the heterogeneity and the porosity of the networks that construct, convey and applaud key knowledge products such as ‘best practice’
Best Practice In Company Standardisation
Though the majority of standards are company standards, scientificstandardisation literature pays hardly any attention to them. In thispaper we describe results from a research project on companystandardisation (Oly & Slob, 1999). The researchers investigated sixchemical and petrochemical industries in the Netherlands: Akzo Nobel,Dow Chemical, DSM, Gasunie, NAM and Shell. These companies havenumerous standards for their installations. Best practice fordeveloping such standards was developed by examining the companies andusing insights from relevant literature. This paper describes thescientific approach used and some of the best practice results.benchmarking;standard;standardization;company standardization;process industry
Do you want to bet? The prevalence of problem gambling amongst athletes in the UK
This presentation was given as part of the 2011 London Workshop on Problem Gambling: Theory and (Best) Practice by Dr Daniel Rhind from the Sports Sciences subject area at Brunel University. The workshop was organised by Professor Fernand Gobet and Dr Marvin Schiller and hosted by Brunel University on the 13th September 2011
Best Effort and Practice Activation Codes
Activation Codes are used in many different digital services and known by
many different names including voucher, e-coupon and discount code. In this
paper we focus on a specific class of ACs that are short, human-readable,
fixed-length and represent value. Even though this class of codes is
extensively used there are no general guidelines for the design of Activation
Code schemes. We discuss different methods that are used in practice and
propose BEPAC, a new Activation Code scheme that provides both authenticity and
confidentiality. The small message space of activation codes introduces some
problems that are illustrated by an adaptive chosen-plaintext attack (CPA-2) on
a general 3-round Feis- tel network of size 2^(2n) . This attack recovers the
complete permutation from at most 2^(n+2) plaintext-ciphertext pairs. For this
reason, BEPAC is designed in such a way that authenticity and confidentiality
are in- dependent properties, i.e. loss of confidentiality does not imply loss
of authenticity.Comment: 15 pages, 3 figures, TrustBus 201
- …
