Results 91 to 100 of about 2,320 (256)

‘Where are the adults?’: Troubling child‐activism and children's political participation

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Children's political participation is a well‐established theme in childhood studies. In this article we offer an original account of child activism that takes into account the entangled and emergent aspect of children as activists. We begin with a historical and a conceptual review, noting the importance of mid‐20th century developments such ...
Sharon Hunter, Claire Cassidy
wiley   +1 more source

Sustaining the teaching profession: Innovating the ‘golden thread’ in university‐led teacher education

open access: yesBritish Educational Research Journal, EarlyView.
Abstract This paper examines the implications of England's ‘golden thread’ policy framework for teacher education, which describes a state‐mandated, linear model of professional learning from initial teacher training and education through to continuing professional development.
Amanda Nuttall   +3 more
wiley   +1 more source

System failure? Exploring the interplay of fear of failure, competition, cooperation and sense of belonging in education in England and Flanders

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Fear of failure is damaging in a host of ways yet is rife in many schools. Drawing on self‐worth theory, we explore whether fear of academic failure is higher in education systems with features that increase students' experiences of competition. To do this, we compare two very different education systems: England, where, for instance, national
Carolyn Jackson, Mieke Van Houtte
wiley   +1 more source

What characterises well‐connected schools? Exploring centrality in inter‐organisational school networks

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Within the educational literature, inter‐organisational school networks are commonly considered instruments for administration, management, and school improvement, but are rarely scrutinised as objects of study themselves. Conversely, in organisational studies, this perspective is given more prominence.
Ignacio Wyman, Paul Wilfred Armstrong
wiley   +1 more source

Perfect Secrecy Designs for Contracted Rule Mining

open access: yesInternational Journal of Advanced Research in Science and Technology, 2015
Activates in allocated processing developments impelled the idea of providing details exploration as a management from thought to truth. Continuous performance of machines like Stat crunch, Data wrangler and so on appears verification to above case.
openaire   +1 more source

‘They just want the perfect kids on show’: The illegal exclusion of children with special educational needs and disabilities from primary schools

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Guidance from the Department for Education stipulates that permanent exclusions should only be used as a last resort and where there is potential for harm to come to anyone in the school setting. Suspensions are positioned as a tool to communicate to a pupil that their behaviour is in breach of the school's behaviour policy.
Megan Whitehouse
wiley   +1 more source

Quantum steganography for secure data transmission

open access: yesCybersecurity
Quantum steganography is an advanced method of hiding information within quantum systems, leveraging the unique properties of quantum mechanics-such as superposition, entanglement, and the no-cloning theorem-to achieve unbreakable secrecy.
Gabriela Mogos, Ho-Pun Lam
doaj   +1 more source

Learning to ‘be’ an activist: Exploring the relationship between activism and informal education in a youth activism group case study

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Young people in the United States (and beyond) access spaces for activism in varied ways, including the out‐of‐school time sector, where youth activism (YA) groups draw on informal learning pedagogies to engage young people in collective action.
Laura Weiner
wiley   +1 more source

Revisiting linearly extended discrete functions

open access: yesJournal of Mathematical Cryptology
The authors introduced a new family of cryptographic schemes in a previous research article, which includes many practical encryption schemes, such as the Feistel family. Given a finite field of order qq, any n>m≥0n\gt m\ge 0, the authors described a new
Gravel Claude, Panario Daniel
doaj   +1 more source

Home - About - Disclaimer - Privacy