Results 131 to 140 of about 225,999 (330)
Extra Editorial: On the Release of Patron Data in Issue 58 of Code4Lib Journal
We, the editors of the Code4Lib Journal, sincerely apologize for the recent incident in which Personally Identifiable Information (PII) was released through the publication of an article in issue 58.
Code4Lib Editorial Board
doaj
RFID-Radio Frequency Identification-is a powerful enabling technology with a wide range of potential applications. Its proponents initially overhyped its capabilities and business case: RFID deployment is proceeding along a much slower and less ...
Weinberg, Jonathan
core +1 more source
Abstract Mental health problems are common among UK undergraduate students. In response, many universities have put considerable effort into raising awareness about student mental health problems and avenues of support (e.g., via workshops, posters, email newsletters and social media posts).
Sorcha Finan, Lucy Foulkes
wiley +1 more source
E-Brightpass: A Secure way to access social networks on smartphones
Social network providers offer a variety of entertainment services in exchange for end users’ personal information, such as their identity. The majority of users access social networking sites via their smartphones, which they utilize in conjunction with
Chaitanyateja Thotadi +7 more
doaj +1 more source
Abstract Environmental literacy and global citizenship education (GCE) are necessary to the development of a fairer, more peaceful and more sustainable world, but teachers frequently lack practical examples of their implementation in the classroom.
Claire Lee +2 more
wiley +1 more source
Abstract As the UK higher education sector becomes increasingly market‐driven and focused on preparing students for the graduate labour market, universities must define and contextualise employability and their role in supporting students beyond academia.
Michael Maher +3 more
wiley +1 more source
Design of Privacy Preservation Model for Data Stream Using Condensation Based Anonymization
In modern world, continuous data flows that may be analyzed in real-time and are created from multiple sources are referred to as data streams. As data streams become increasingly prevalent across various sectors, preserving the privacy of sensitive ...
Latha P, Thangaraj M
doaj +1 more source
Tell the Smart House to Mind its Own Business!: Maintaining Privacy and Security in the Era of Smart Devices [PDF]
Consumers want convenience. That convenience often comes in the form of everyday smart devices that connect to the internet and assist with daily tasks.
McMahon, Kathryn
core +1 more source
Positioning teachers in climate change education: Insights from a Hong Kong Global South perspective
Abstract This study examines how prospective teachers in Hong Kong (N = 13) position themselves within climate change education through ‘Global Dialogue for Climate Change Education’, a cross‐institutional teacher education programme facilitating online global dialogues between Hong Kong and the UK.
Sally Wai‐Yan Wan +5 more
wiley +1 more source
From paradise lost to paradise regained: A compassionate retuning of assessed seminars
Abstract Universities often aim to deliver a curriculum that is both research‐based and develops transferable skills in students, thereby enhancing their competitiveness in the job market. At the same time, evidence indicates that university students experience significant stress owing to the competitive nature of the assessments, an aspect that is ...
Sarah Stephen
wiley +1 more source

