Search results

1 – 5 of 5
Article
Publication date: 1 June 1990

Ian Barclay and Patricia Lunt

When a company considers the introduction of new technology, acomplete appraisal is required. Such an appraisal should encompass notonly the short‐term factors of a financial and…

Abstract

When a company considers the introduction of new technology, a complete appraisal is required. Such an appraisal should encompass not only the short‐term factors of a financial and technology nature, but also the longer‐term factors of the people and management skills that need to be identified and developed.

Details

Leadership & Organization Development Journal, vol. 11 no. 6
Type: Research Article
ISSN: 0143-7739

Keywords

Article
Publication date: 1 February 2003

Patricia Sloper, Lisa Jones, Suzanne Triggs, Jane Howarth and Katy Barton

The authors describe the rationale for key worker services for disabled children, factors to consider in developing such services, the role of key workers, how a key worker…

Abstract

The authors describe the rationale for key worker services for disabled children, factors to consider in developing such services, the role of key workers, how a key worker service is operating in one authority and the impact it has had for families who received it.

Details

Journal of Integrated Care, vol. 11 no. 1
Type: Research Article
ISSN: 1476-9018

Keywords

Book part
Publication date: 4 June 2024

Alex Morfaki, Helen Bovill and Nicola Bowden-Clissold

Despite the rhetoric emphasising partnership working, there has been a dearth of research related to the educational practices that reify interprofessional partnerships for young…

Abstract

Despite the rhetoric emphasising partnership working, there has been a dearth of research related to the educational practices that reify interprofessional partnerships for young children with special educational needs. This doctoral study examined the subtle power shifts in the interactions between early years educators and other professionals against the backdrop of deficit policy discourses and institutional challenges. This research adopted a case study approach and utilised methodological triangulation to unveil educators' phronetic knowledge. The findings point to power differentials and partnership inequities which affect the roles and identities of early years educators. Participants assumed emergent leadership roles that encompassed elements of social pedagogy and pedagogical eclecticism which eschewed medicalised interventions in favour of intuitive pedagogical approaches centred on the child and family.

Details

Critical Perspectives on Educational Policies and Professional Identities
Type: Book
ISBN: 978-1-83753-332-9

Keywords

Article
Publication date: 1 October 1948

THE end of October saw the return of most of our overseas visitors, continental and otherwise, to their homes, leaving with us pleasant memories of a mutually successful visit…

56

Abstract

THE end of October saw the return of most of our overseas visitors, continental and otherwise, to their homes, leaving with us pleasant memories of a mutually successful visit. The Englishman's proverbial difficulties with foreign tongues, even of neighbouring France, did not complicate matters unduly or reduce too much those interchanges which conference and school afforded. We can repeat our frequently‐expressed hope that there will be an ever increasing series of visits, both of the foreigner to England and of ourselves as foreigners to other countries. We would welcome longer stays in both cases. Nothing but good can come from them.

Details

New Library World, vol. 51 no. 4
Type: Research Article
ISSN: 0307-4803

Article
Publication date: 1 May 2000

Steven M. Furnell and Paul S. Dowland

The detection and prevention of authorised activities, by both external parties and internal personnel, is an important issue within IT systems. Traditional methods of user…

Abstract

The detection and prevention of authorised activities, by both external parties and internal personnel, is an important issue within IT systems. Traditional methods of user authentication and access control do not provide comprehensive protection and offer opportunities for compromise by various classes of abuser. A potential solution is provided in the form of intrusion detection systems, which are able to provide proactive monitoring of system activity and apply automatic responses in the event of suspected problems. This paper presents the principles of intrusion monitoring and then proceeds to describe the conceptual architecture of the Intrusion Monitoring System (IMS), an approach that is the focus of current research and development by the authors. The main functional elements of the IMS architecture are described, followed by thoughts regarding the practical implementation and the associated advantages (and potential disadvantages) that this would deliver. It is concluded that whilst an IMS‐type approach would not represent a total replacement for conventional controls, it would represent an effective means to complement the protection already provided.

Details

Information Management & Computer Security, vol. 8 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 5 of 5