Search results

1 – 10 of 21
Open Access
Book part
Publication date: 16 October 2020

Abstract

Details

Gender and the Violence(s) of War and Armed Conflict: More Dangerous to Be a Woman?
Type: Book
ISBN: 978-1-78769-115-5

Open Access
Book part
Publication date: 8 February 2019

Alison Bowes and Alison Dawson

Abstract

Details

Designing Environments for People with Dementia
Type: Book
ISBN: 978-1-78769-974-8

Open Access
Article
Publication date: 1 June 2021

Ondřej Bublík, Libor Lobovský, Václav Heidler, Tomáš Mandys and Jan Vimmr

The paper targets on providing new experimental data for validation of the well-established mathematical models within the framework of the lattice Boltzmann method (LBM), which…

Abstract

Purpose

The paper targets on providing new experimental data for validation of the well-established mathematical models within the framework of the lattice Boltzmann method (LBM), which are applied to problems of casting processes in complex mould cavities.

Design/methodology/approach

An experimental campaign aiming at the free-surface flow within a system of narrow channels is designed and executed under well-controlled laboratory conditions. An in-house lattice Boltzmann solver is implemented. Its algorithm is described in detail and its performance is tested thoroughly using both the newly recorded experimental data and well-known analytical benchmark tests.

Findings

The benchmark tests prove the ability of the implemented algorithm to provide a reliable solution when the surface tension effects become dominant. The convergence of the implemented method is assessed. The two new experimentally studied problems are resolved well by simulations using a coarse computational grid.

Originality/value

A detailed set of original experimental data for validation of computational schemes for simulations of free-surface gravity-driven flow within a system of narrow channels is presented.

Details

Engineering Computations, vol. 38 no. 10
Type: Research Article
ISSN: 0264-4401

Keywords

Open Access
Article
Publication date: 10 June 2019

Michele Loi, Markus Christen, Nadine Kleine and Karsten Weber

Cybersecurity in healthcare has become an urgent matter in recent years due to various malicious attacks on hospitals and other parts of the healthcare infrastructure. The purpose…

3737

Abstract

Purpose

Cybersecurity in healthcare has become an urgent matter in recent years due to various malicious attacks on hospitals and other parts of the healthcare infrastructure. The purpose of this paper is to provide an outline of how core values of the health systems, such as the principles of biomedical ethics, are in a supportive or conflicting relation to cybersecurity.

Design/methodology/approach

This paper claims that it is possible to map the desiderata relevant to cybersecurity onto the four principles of medical ethics, i.e. beneficence, non-maleficence, autonomy and justice, and explore value conflicts in that way.

Findings

With respect to the question of how these principles should be balanced, there are reasons to think that the priority of autonomy relative to beneficence and non-maleficence in contemporary medical ethics could be extended to value conflicts in health-related cybersecurity.

Research limitations/implications

However, the tension between autonomy and justice, which relates to the desideratum of usability of information and communication technology systems, cannot be ignored even if one assumes that respect for autonomy should take priority over other moral concerns.

Originality/value

In terms of value conflicts, most discussions in healthcare deal with the conflict of balancing efficiency and privacy given the sensible nature of health information. In this paper, the authors provide a broader and more detailed outline.

Details

Journal of Information, Communication and Ethics in Society, vol. 17 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Abstract

Details

Video Games Crime and Next-Gen Deviance
Type: Book
ISBN: 978-1-83867-450-2

Open Access
Article
Publication date: 1 December 2017

Robyn Albers, Christina J. Davison and Bradley Johnson

Considerable research has shown the value of Inquiry-Based Learning (IBL) regarding student engagement and motivation, depth of learning, and cognitive flexibility. Student…

Abstract

Considerable research has shown the value of Inquiry-Based Learning (IBL) regarding student engagement and motivation, depth of learning, and cognitive flexibility. Student collaboration is one component of this approach, since students must communicate and work together inside and outside of class time when engaging with an IBL project. Choosing a mobile learning tool can benefit student collaboration in so far as the tool enables anytime/anywhere collaborative learning. This study looked at how 118 Emirati undergraduate students in a government-sponsored university in the United Arab Emirates chose to collaborate in an IBL semester-long assignment. Unlike some approaches that dictate the technology selection to students (Barczyk & Duncan, 2013; Prescott, Wilson & Becket, 2013), in this project course instructors gave the students autonomy to choose the best mobile learning tools for their group. The study used a mixed-methods approach to collect data on which tools students perceived as best for IBL. Participants were surveyed three times about which tool they preferred for university work: a pre-project survey, a mid-project survey, and post-project survey. Results show that students changed their preferred tool to WhatsApp over the course of the semester. A focus group with each course section provided qualitative data as to why students preferred WhatsApp. The students also delivered poster presentations as to how WhatsApp helped them complete their community-based IBL projects. This study will show how WhatsApp can be a successful mobile learning tool for student collaboration in IBL.

Details

Learning and Teaching in Higher Education: Gulf Perspectives, vol. 14 no. 2
Type: Research Article
ISSN: 2077-5504

Open Access
Book part
Publication date: 4 June 2021

Bridget Harris and Delanie Woodlock

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…

Abstract

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Abstract

Details

Gender and the Violence(s) of War and Armed Conflict: More Dangerous to Be a Woman?
Type: Book
ISBN: 978-1-78769-115-5

Open Access

Abstract

Details

Designing Environments for People with Dementia
Type: Book
ISBN: 978-1-78769-974-8

Open Access
Article
Publication date: 11 April 2024

Robin Alison Mueller, Harrison Campbell and Tatiana Losev

The purpose of our research is to better understand inquiry-based pedagogy in the context of leadership education. Specifically, we sought to learn about how leadership learning…

Abstract

Purpose

The purpose of our research is to better understand inquiry-based pedagogy in the context of leadership education. Specifically, we sought to learn about how leadership learning is characterized in an immersive inquiry course, and how inquiry-based pedagogy is experienced by students engaged in interdisciplinary leadership learning.

Design/methodology/approach

We used a case study approach as an overarching methodology. The research methods employed to collect data were World Cafe and episodic narrative interview. Further, we used collocation analysis and systematic text condensation as analytical strategies to interpret data.

Findings

Our findings led us to four primary conclusions: (1) inquiry-based learning helps to foster an inquiry mindset amongst leadership education students; (2) the challenges and tensions associated with inquiry-based learning are worth the learning gains for leadership students; (3) the opportunity to learn in relationship is beneficial for leadership development outcomes and (4) students’ experiences of inquiry-based learning in leadership education often included instances of transformation.

Research limitations/implications

Limitations of the research were: (1) it is a case study situated within a unique, particular social and educational context; (2) demographic data were not collected from participants, so results cannot be disaggregated based on particular demographic markers and (3) the small sample size involved in the study makes it impossible to generalize across a broad population.

Practical implications

This research has enabled a deep understanding of structural and relational supports that can enable effective inquiry-based learning in leadership education. It also offers evidence to support institutional shifts to inquiry-based pedagogy in leadership education.

Social implications

Our research demonstrates that use of inquiry-based pedagogy in leadership education has long-lasting positive effects on students' capacity for applied leadership practice. Consequently, participants in this type of leadership learning are better positioned to effectively lead social change that is pressing in our current global context.

Originality/value

There is scant (if any) published research that has focused on using inquiry-based pedagogies in leadership education. This research makes a significant contribution to the scholarship of leadership education.

Details

Journal of Leadership Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1552-9045

Keywords

1 – 10 of 21