منابع مشابه
Participation under Compulsion
Benefits of Social Software in teaching and learning are a research subject of great interest, especially in higher education. Even though the opportunities to encourage students’ participation are promising, there is a neglected area we intend to illuminate: heteronomy. Compulsion and external control are used to foster participation. In our study we examined 16 international evaluation and re...
متن کاملLetter from chicago: compulsion.
About a quarter of a century ago I failed psychiatry because of my imperfect understanding of the obsessive-compulsive disorders. I had not grasped the difference between compulsions and obsessions, the professor pointed out from behind his big desk; and I had written that these disorders were rare when in fact they were exceedingly common. So I spent the summer clarifying these points in my mi...
متن کاملParticipation under Uncertainty
This essay reviews a number of theoretical perspectives about uncertainty and participation in the present-day knowledge-based society. After discussing the on-going reconfigurations of science, technology and society, we examine how appropriate for policy studies are various theories of social complexity. Post-normal science is such an example of a complexity-motivated approach, which justifie...
متن کاملInheritance under Participation Constraints
Traditional database systems have been successful in handling large amounts of data but lack mechanisms for schema derivations and schema veriication. In this paper, we propose (i) structures that carry expressive and useful information on the database schema, (ii) a set of inference rules for schema derivations, and (iii) a mechanism for discovering contradictory schema declarations. To this e...
متن کاملCompulsion Resistant Anonymous Communications
We study the effect compulsion attacks, through which an adversary can request a decryption or key from an honest node, have on the security of mix based anonymous communication systems. Some specific countermeasures are proposed that increase the cost of compulsion attacks, detect that tracing is taking place and ultimately allow for some anonymity to be preserved even when all nodes are under...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Emerging Technologies in Learning (iJET)
سال: 2010
ISSN: 1863-0383
DOI: 10.3991/ijet.v5i4.1458