Social work and digitalisation: bridging the knowledge gaps

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Negotiating Knowledge Gaps in Dispersed Knowledge Work

Reviews from the two streams of research knowledge based view of the firm and dispersed work – offers evidence for knowledge gaps that exist among dispersed members. Dispersed members therefore cannot take for granted that they have a common context, making dispersed collaboration problematic. A major challenge for such teams is thus to co-create a commonly shared context. This paper examines t...

متن کامل

Bridging the gaps.

Through Bridging the Gaps, an internship program that links health-related service with interdisciplinary training, Penn Dental Medicine students reach out to Philadelphia's neediest neighborhoods--and receive huge rewards in return.

متن کامل

Bridging the gap: gerontology and social work education.

The following study was implemented to explore the potential for a four-week curriculum module in gerontological social work education to positively impact students' practice-related knowledge concerning older adults, as well as their attitudes toward elderly persons and interest in working with them. Pertinent literature was reviewed to conceptualize the building of a gerontology curriculum mo...

متن کامل

Bridging Knowledge Gaps in Policy Analysis with Information Visualization

Today’s politicians are confronted with new (digital) ways to tackle complex decision-making problems. In order to make the right decisions profound analysis of the problems and possible solutions has to be performed. Therefore policy analysts need to collaborate with external experts consulted as advisors. Due to different expertises of these stakeholders the whole process may suffer from know...

متن کامل

Triple and Quadruple Encryption: Bridging the Gaps

Triple encryption is a cascade of three block cipher evaluations with independent keys, in order to enlarge its key size. This design is proven secure up to approximately 2κ+min{κ/2,n/2} queries (by Bellare and Rogaway, EUROCRYPT 2006, and Gaži and Maurer, ASIACRYPT 2009), where κ denotes the key size and n the block length of the underlying block cipher. On the other hand, the best known attac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Social Work Education

سال: 2017

ISSN: 0261-5479,1470-1227

DOI: 10.1080/02615479.2017.1361924