Information literacy may be defined as the ability to identify a research problem, decide the kinds of information needed to tackle it, find the information efficiently, evaluate the information, and apply it to the problem at hand. Teaching Research Processes suggests a novel way in which information literacy can come within the remit of teaching faculty, supported by librarians, and reconceived as ‘research processes’. The aim is to transform education from what some see as a primarily one-way knowledge communication practice, to an interactive practice involving the core research tasks of subject disciplines.This title is structured into nine chapters, covering: Defining research processes; Research ability inadequacies in higher education; Research processes and faculty understanding; Current initiatives in research processes; The role of disciplinary thinking in research processes; Research processes in the classroom; Tentative case studies in disciplinary research process instruction; Research processes transforming education; and Resourcing the enterprise. The book concludes by encouraging the reader to implement the teaching of research processes.
The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations. This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available. This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.
The efforts of ethnic-minority librarians to become leaders in Western libraries are an important topic for any librarian working towards becoming a leader, with issues such as cross-cultural leadership relevant for all aspiring librarians.Leadership in Libraries covers leadership in various areas, provides examples of successful minority leaders in different fields and statistical data on minorities and librarians in several countries. The title probes library school programs and their efforts to develop leadership skills among librarians in general, and among minority librarians in particular. The book begins by introducing the concept of ethnic-minority leadership, moving on in the first chapter to definitions by culture, profession, and gender. The next three chapters consider managers as leaders, leadership styles, skills, and leadership in school, public and academic libraries in the US, the UK, Canada and Australia. The final chapter includes instances of bad leadership, and offers a conclusion.
In the knowledge economy, professionals have to make decisions about non-tangible, non-monetary, and largely invisible resources. Information professionals need to understand the potential uses, contributions, value, structure, and creation of broadly intangible intellectual capital in libraries. In order to fully realize intellectual capital in libraries, new practices and skills are required for library management practitioners and researchers.Managing Intellectual Capital in Libraries provides research advances, guidelines, methods and techniques for managing intellectual capital in a library environment, and includes analyses and case studies. This book includes a foreword by Anne Woodsworth and is structured into seven chapters, covering: libraries in the knowledge economy; worlds of production and intellectual capital utilization in libraries; identifying and categorizing intellectual capital; measuring libraries’ intellectual capital; financial valuation and reporting of intellectual capital in libraries; and survival analysis for libraries’ intellectual capital resources. The book concludes with a summary, and turns the reader towards future research.
People experiencing disorders in regulation are highly sensitive to stimulation from the environment, emotionally reactive, and have difficulty maintaining an organized and calm life style. They are impulsive, easily frustrated, and as a result make decisions that lead to an overwrought state-or who conversely retreat entirely from the world. This disorder is most likely to accompany diagnoses of bipolar or mood disorder, anxiety, depression, obsessive-compulsive disorder, Asperger’s syndrome, eating or sleep disorders, and/or attention deficit disorder. This book instructs therapists how best to treat the dysregulated adult, providing diagnostic checklists, and a chapter by chapter inventory in approaching treatment of dysregulation in a variety of life skills.
Cyber Attacks, Student Edition, offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure. This approach includes controversial themes such as the deliberate use of deception to trap intruders. This volume thus serves as an attractive framework for a new national strategy for cyber security. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. In this edition, each principle is presented as a separate security strategy and illustrated with compelling examples. The book adds 50-75 pages of new material aimed specifically at enhancing the student experience and making it more attractive for instructors teaching courses such as cyber security, information security, digital security, national security, intelligence studies, technology and infrastructure protection. It now also features case studies illustrating actual implementation scenarios of the principles and requirements discussed in the text, along with a host of new pedagogical elements, including chapter outlines, chapter summaries, learning checklists, and a 2-color interior. Furthermore, a new and complete ancillary package includes test bank, lesson plans, PowerPoint slides, case study questions, and more. This text is intended for security practitioners and military personnel as well as for students wishing to become security engineers, network operators, software designers, technology managers, application developers, etc.
The Encyclopedia of Human Behavior, Second Edition, Three Voluime Set is an award-winning three-volume reference on human action and reaction, and the thoughts, feelings, and physiological functions behind those actions. Presented alphabetically by title, 300 articles probe both enduring and exciting new topics in physiological psychology, perception, personality, abnormal and clinical psychology, cognition and learning, social psychology, developmental psychology, language, and applied contexts. Written by leading scientists in these disciplines, every article has been peer-reviewed to establish clarity, accuracy, and comprehensiveness. The most comprehensive reference source to provide both depth and breadth to the study of human behavior, the encyclopedia will again be a much-used reference source. This set appeals to public, corporate, university and college libraries, libraries in two-year colleges, and some secondary schools. Carefully crafted, well written, and thoroughly indexed, the encyclopedia helps users—whether they are students just beginning formal study of the broad field or specialists in a branch of psychology—understand the field and how and why humans behave as we do.
This comprehensive study examines the global strategies of multinational corporations (MNCs), the strategic evolution and the categories of their subsidiaries in China based on 150 MNCs. It is the first large-scale project of this nature to be conducted. The research has significant bearing on strategic planning for firms that have set up, are setting up or are planning to establish subsidiaries in China, and the firms that try to compete in the global marketplace. The findings are significant for the West, owing to the current economic crisis and the need to determine if subsidiary expansion strategies will help Western firms achieve the portfolio effects in operations and avoid the harmful impact of macro events such as the existing global financial crisis. Additional empirical findings, analysis, discussions, and suggestions for future studies are also presented.
The Handbook of Loss Prevention and Crime Prevention, 5e, is a trusted resource for physical security professionals, students, and candidates for the coveted Certified Protection Professional (CPP) certification administered by ASIS International. The U.S. government recently announced that employees will have to obtain CPP certification to advance in their careers. Edited by the security practitioner and author Lawrence Fennelly, this handbook gathers in a single volume the key information on each topic from eminent subject-matter experts. Taken together, this material offers a range of approaches for defining security problems and tools for designing solutions in a world increasingly characterized by complexity and chaos. The 5e adds cutting-edge content and up-to-the-minute practical examples of its application to problems from retail crime to disaster readiness.