4,961,728 research outputs found

    Best practice, best teaching

    Get PDF
    Keynote address discussing examples from my own, colleagues, and attendees practice. Conference participants worked in groups to share and build upon their existing teaching and learning strategies

    Safeguarding in schools : best practice

    Get PDF
    "This report illustrates and evaluates the features of best practice in safeguarding, based on inspection evidence from the 19% of all maintained primary, secondary and special schools, residential special schools and pupil referral units inspected between September 2009 and July 2010 where safeguarding had been judged outstanding. It also draws on a more detailed analysis and evaluation of safeguarding practice in a small sample of outstanding schools visited by Her Majesty’s Inspectors" -- front cover

    Responsible online gambling and best practice

    Get PDF
    Professor Mark Griffiths, one of two authors of the British Gambling Prevalence Study, comments on the need for the online gambling industry to adopt best practice and what this should involve in order to dispel government and public concerns about addiction to online gambling

    Constituting best practice in management consulting

    Get PDF
    This paper offers critical reflections on the construction and propagation of ‘best practice’: a concept which has become increasingly important in the business world and in civic life more generally. Focusing upon the activities of the Management Consultancies Association (MCA) we offer an analysis of the awards process instituted to applaud ‘best practice’ in the arena of consulting. Departing from existing academic representations of the advice industry which generally exclude this trade body from the analytical frame we consider the role which the MCA performs in the field of consulting. Situating the MCA’s attempt to constitute best practice within the work of Bruno Latour we argue that this construct depends upon the mobilization of an extended network of allies, advocates and spectators whose interactions have been written-out of academic analysis. The paper concludes by proposing the need for further research designed to explore, both, the heterogeneity and the porosity of the networks that construct, convey and applaud key knowledge products such as ‘best practice’

    Best Practice In Company Standardisation

    Get PDF
    Though the majority of standards are company standards, scientificstandardisation literature pays hardly any attention to them. In thispaper we describe results from a research project on companystandardisation (Oly & Slob, 1999). The researchers investigated sixchemical and petrochemical industries in the Netherlands: Akzo Nobel,Dow Chemical, DSM, Gasunie, NAM and Shell. These companies havenumerous standards for their installations. Best practice fordeveloping such standards was developed by examining the companies andusing insights from relevant literature. This paper describes thescientific approach used and some of the best practice results.benchmarking;standard;standardization;company standardization;process industry

    Aiming high for disabled children : best practice to common practice

    Get PDF

    Do you want to bet? The prevalence of problem gambling amongst athletes in the UK

    Get PDF
    This presentation was given as part of the 2011 London Workshop on Problem Gambling: Theory and (Best) Practice by Dr Daniel Rhind from the Sports Sciences subject area at Brunel University. The workshop was organised by Professor Fernand Gobet and Dr Marvin Schiller and hosted by Brunel University on the 13th September 2011

    Communication and presentation skills: Best practice report

    Get PDF

    Creating agroforestry innovation and best practice leaflets

    Get PDF
    N/

    Best Effort and Practice Activation Codes

    Get PDF
    Activation Codes are used in many different digital services and known by many different names including voucher, e-coupon and discount code. In this paper we focus on a specific class of ACs that are short, human-readable, fixed-length and represent value. Even though this class of codes is extensively used there are no general guidelines for the design of Activation Code schemes. We discuss different methods that are used in practice and propose BEPAC, a new Activation Code scheme that provides both authenticity and confidentiality. The small message space of activation codes introduces some problems that are illustrated by an adaptive chosen-plaintext attack (CPA-2) on a general 3-round Feis- tel network of size 2^(2n) . This attack recovers the complete permutation from at most 2^(n+2) plaintext-ciphertext pairs. For this reason, BEPAC is designed in such a way that authenticity and confidentiality are in- dependent properties, i.e. loss of confidentiality does not imply loss of authenticity.Comment: 15 pages, 3 figures, TrustBus 201
    corecore