Sridhar Ramamoorti, David E. Morrison III, Joseph W. Koletar, and Kelly R. Pope
Get practical insights on the psychology of white-collar criminals--and how to outsmart them Understand how the psychologies of fraudsters and their victims interact as well as what makes auditors/investigators/regulators let down their guard. Learn about the psychology of fraud victims, including boards of directors and senior management, and what makes them want to believe fraudsters, and therefore making them particularly vulnerable to deception. Just as IT experts gave us computer forensics, we now have a uniquely qualified team immersed in psychology, sociology, psychiatry as well as accounting and auditing, introducing the emerging field of behavioral forensics to address the phenomenon of fraud. Ever wonder what makes a white-collar criminal tick? Why does she or he do what they do? For the first time ever, see the mind of the fraudster laid bare, including their sometimes twisted rationalizations; think like a crook to catch a crook! The A.B.C.'s of Behavioral Forensics takes you there, with expert advice from a diverse but highly specialized authoring team of professionals (three out of the four are Certified Fraud Examiners): a former accounting firm partner who has a PhD in psychology, a former FBI special agent who has been with investigative practices of two of the Big Four firms, an industrial psychiatrist who has worked closely with the C-level suite of large and small companies, and an accounting professor who has interviewed numerous convicted felons. Along with a fascinating exploration of what makes people fall for the common and not-so-common swindles, the book provides a sweeping characterization of the ecology of fraud using The A.B.C.'s of Behavioral Forensics paradigm: the bad Apple (rogue executive), the bad Bushel (groups that collude and behave like gangs), and the bad Crop (representing organization-wide or even societally-sanctioned cultures that are toxic and corrosive). The book will make you take a longer look when hiring new employees and offers a deeper more complex understanding of what happens in organizations and in their people. The A.B.C. model will also help those inside and outside organizations inoculate against fraud and make you reflect on instilling the core values of your organization among your people and create a culture of excellence and integrity that acts as a prophylactic against fraud. Ultimately, you will discover that, used wisely, behavioral methods trump solely economic incentives. With business fraud on the rise globally, The A.B.C.'s of Behavioral Forensics is the must-have book for investigators, auditors, the C-suite and risk management professionals, the boards of directors, regulators, and HR professionals. Examines the psychology of fraud in a practical way, relating it to aspects of fraud prevention, deterrence, detection, and remediation Helps you understand that trust violation--the essence of fraud--is a betrayal of behavioral assumptions about "trusted" people Explains how good people go bad and how otherwise honest people cross the line Underscores the importance of creating a culture of excellence and integrity that inoculates an organization from fraud risk (i.e., honest behavior pays, while dishonesty is frowned upon) Provides key takeaways on what to look for when hiring new employees and in your current employees, as well as creating and maintaining a culture of control consciousness Includes narrative accounts of interviews with convicted white-collar criminals, as well as interpretive insights and analysis of their rationalizations Furnishes ideas about how to enhance professional skepticism, how to resist fraudsters, how to see through their schemes, how to infuse internal controls with the people/behavioral element, and make them more effective in addressing behavioral/integrity risks Provides a solid foundation for training programs across the fraud risk management life cycle all the way from the discovery of fraud to its investigation as well as remediation (so the same fraud doesn't happen again) Enables auditors/investigators to engage in self-reflection and avoid cognitive and emotional biases and traps that lead to professional judgment errors (e. g., overconfidence, confirmation, self-deception, groupthink, halo effect, availability, speed-accuracy trade-off, etc.) Ever since the accounting scandals surrounding Enron and WorldCom surfaced, leading to the passage of the Sarbanes Oxley Act of 2002, as well as the continuing fall out from the Wall Street financial crisis precipitating the Dodd-Frank Act of 2010, fraud has been a leading concern for executives globally. If you thought you knew everything there was to know about financial fraud, think again. Get the real scoop with The A.B.C.'s of Behavioral Forensics.
James M. Martinez
Protecting the natural environment and promoting sustainability have become important objectives, but achieving such goals presents myriad challenges for even the most committed environmentalist. American Environmentalism: Philosophy, History, and Public Policy examines whether competing interests can be reconciled while developing consistent, coherent, effective public policy to regulate uses and protection of the natural environment without destroying the national economy. It then reviews a range of possible solutions.
The book delves into key normative concepts that undergird American perspectives on nature by providing an overview of philosophical concepts found in the western intellectual tradition, the presuppositions inherent in neoclassical economics, and anthropocentric (human-centered) and biocentric (earth-centered) positions on sustainability. It traces the evolution of attitudes about nature from the time of the Ancient Greeks through Europeans in the Middle Ages and the Renaissance, the Enlightenment and the American Founders, the nineteenth and twentieth centuries, and up to the present. Building on this foundation, the author examines the political landscape as non-governmental organizations (NGOs), industry leaders, and government officials struggle to balance industrial development with environmental concerns.
Outrageous claims, silly misrepresentations, bogus arguments, absurd contentions, and overblown prophesies of impending calamities are bandied about by many parties on all sides of the debate—industry spokespeople, elected representatives, unelected regulators, concerned citizens, and environmental NGOs alike. In lieu of descending into this morass, the author circumvents the silliness to explore the crucial issues through a more focused, disciplined approach. Rather than engage in acrimonious debate over minutiae, as so often occurs in the context of "green" claims, he recasts the issue in a way that provides a cohesive look at all sides. This effort may be quixotic, but how else to cut the Gordian knot?
David J. Martin and Kimberly S. Loomis
Designed from the ground up with a constructivist framework, BUILDING TEACHERS: A CONSTRUCTIVIST APPROACH TO INTRODUCING EDUCATION, 2nd Edition helps future teachers create their own understanding of education. As the authors address the key topics generally covered in an introductory book, they encourage readers to develop their own understandings by connecting their prior knowledge, experiences, and biases with new experiences to which they will be exposed during the course. Highlights of the new edition include stronger standards integration and expanded material on diversity and technology. By interacting with the materials presented, rather than merely memorizing the book's content, readers learn what teaching is all about in an exploratory, inquiring, constructivist-based manner. In turn, they can help the children in their classrooms learn meaningfully. Available with InfoTrac Student Collections http://gocengage.com/infotrac.
Brian Steel Wills
During the Civil War, North Carolinian William Dorsey Pender established himself as one of the Confederate Army of Northern Virginia s best young generals. He served in most of the significant engagements of the war in the eastern theater while under the command of Joseph E. Johnston at Seven Pines and Robert E. Lee from the Seven Days to Gettysburg. His most crucial contributions to Confederate success came at the battles of Second Manassas, Shepherdstown, Fredericksburg, and Chancellorsville. After an effective first day at Gettysburg, Pender was struck by a shell and disabled, necessitating his return to Virginia for what he hoped would be only an extended convalescence. Although Pender initially survived the wound, he died soon thereafter due to complications from his injury.
In this thorough biography of Pender, noted Civil War historian Brian Steel Wills examines both the young general s military career and his domestic life. While Pender devoted himself to military service, he also embraced the Episcopal Church and was baptized before his command in the field. According to Wills, Pender had an insatiable quest for glory in both earthly and heavenly realms, and he delighted in his role as a husband and father. In Pender s voluminous correspondence with his wife, Fanny, he shared his beliefs and offered views and opinions on a vast array of subjects. In the end, Wills suggests that Pender s story captures both the idealistic promise and the despair of a war that cost the lives of many Americans and changed the nation forever.
Susan S. Raines
Conflict Management for Managers takes a theory-to-practice approach, focusing on commons types of conflicts managers face. Because of the hands-on nature of conflict management skills, it provides opportunities for interaction and skill practice. The text is divided into four sections. The first section is an overview of the ways in which conflict management techniques and concepts can and should be applied to improve management and performance. Next, the book deals specifically with internal business disputes. The third section of the book focuses on the management of external disputes with customers and within the supply-chain. The last part of the book addresses disputes between regulators and the regulated.
Even if risk behaviors are not limited to one period of life, adolescence has a special importance since risk behaviors to a large extent established in this period. Despite the fact that some adolescent risk behaviors can be considered to be developmentally normative and appropriate, the engagement in multiple risk behaviors during adolescence may increase the likelihood of undesirable outcomes. Various factors have been associated with adolescents’ involvement in risk taking behaviors. These include parental behaviors, peer influence and adolescent risk perception. Because of their curiosity, enthusiasm and urge to try and see new phenomenon, a considerable number of youth have become addicted to alcohol, smoking cigarette, chewing “khat”, dangerous medical drugs and narcotics drug. These multiple risk behavior is detrimental to many health hazards that challenge adolescents’ proper physical, mental and psychological development.
Brent Turvey and Stan Crowder
A teaching tool that provides both the sociological and forensic perspective as it relates to ethics in criminology.
This textbook was developed from an idiom shared by the authors and contributors alike: ethics and ethical challenges are generally black and white - not gray. They are akin to the pregnant woman or the gunshot victim; one cannot be a little pregnant or a little shot. Consequently, professional conduct is either ethical or it is not.
Unafraid to be the harbingers, Turvey and Crowder set forth the parameters of key ethical issues across the five pillars of the criminal justice system: law enforcement, corrections, courts, forensic science, and academia. It demonstrates how each pillar is dependent upon its professional membership, and also upon the supporting efforts of the other pillars - with respect to both character and culture.
With contributions from case-working experts across the CJ spectrum, this text reveals hard-earned insights into issues that are often absent from textbooks born out of just theory and research. Part 1 examines ethic issues in academia, with chapters on ethics for CJ students, CJ educators, and ethics in CJ research. Part 2 examines ethical issues in law enforcement, with separate chapters on law enforcement administration and criminal investigations. Part 3 examines ethical issues in the forensic services, considering the separate roles of crime lab administration and evidence examination. Part 4 examines ethical issues in the courts, with chapters discussing the prosecution, the defense, and the judiciary. Part 5 examines ethical issues in corrections, separately considering corrections staff and treatment staff in a forensic setting. The text concludes with Part 6, which examines ethical issues in a broad professional sense with respect to professional organizations and whistleblowers.
Ethical Justice: Applied Issues for Criminal Justice Students and Professionals is intended for use as a textbook at the college and university, by undergraduate students enrolled in a program related to any of the CJ professions. It is intended to guide them through the real-world issues that they will encounter in both the classroom and in the professional community. However, it can also serve as an important reference manual for the CJ professional that may work in a community that lacks ethical mentoring or leadership.
Michael E. Whitman, Herbert J. Mattord, David Mackey, and Andrew W. Green
GUIDE TO NETWORK SECURITY is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the role of data communications and encryption. The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key infrastructure, wireless security, and web commerce. The final section covers additional topics relevant for information security practitioners, such as assessing network security, professional careers in the field, and contingency planning. Perfect for both aspiring and active IT professionals, GUIDE TO NETWORK SECURITY is an ideal resource for students who want to help organizations protect critical information assets and secure their systems and networks, both by recognizing current threats and vulnerabilities, and by designing and developing the secure systems of the future.
Utterly unknown during his lifetime, Henry Darger led a quiet, secluded existence as a janitor on Chicago's North Side. When he died, his landlord discovered a treasure trove of more than three hundred canvases and more than 30,000 manuscript pages depicting a rich, shocking fantasy world—many featuring hermaphroditic children being eviscerated, crucified, and strangled.
While some art historians tend to dismiss Darger as possibly psychotic, Jim Elledge cuts through the cloud of controversy and rediscovers Darger as a damaged and fearful gay man, raised in a world unaware of the consequences of child abuse or gay shame. This thoughtful, sympathetic biography tells the true story of a tragically misunderstood artist. Drawn from fascinating histories of the vice-ridden districts of 1900s Chicago, tens of thousands of pages of primary source material, and Elledge's own work in queer history, Henry Darger, Throwaway Boy also features a full-color reproduction of a never-before-seen canvas from a private gallery in New York, as well as a previously undiscovered photograph of Darger with his lifelong companion William Schloeder, or "Whillie" as Henry affectionately referred to him.
Engaging, arresting, and ultimately illuminating, Henry Darger, Throwaway Boy brings alive a complex, brave, and compelling man whose outsider art is both challenging and a triumph over trauma.
José M. Garrido
Introduction to Computational Modeling Using C and Open-Source Tools presents the fundamental principles of computational models from a computer science perspective. It explains how to implement these models using the C programming language. The software tools used in the book include the Gnu Scientific Library (GSL), which is a free software library of C functions, and the versatile, open-source GnuPlot for visualizing the data. All source files, shell scripts, and additional notes are located at science.kennesaw.edu/~jgarrido/comp_models
The book first presents an overview of problem solving and the introductory concepts, principles, and development of computational models before covering the programming principles of the C programming language. The author then applies programming principles and basic numerical techniques, such as polynomial evaluation, regression, and other numerical methods, to implement computational models. He also discusses more advanced concepts needed for modeling dynamical systems and explains how to generate numerical solutions. The book concludes with the modeling of linear optimization problems.
Emphasizing analytical skill development and problem solving, this book helps you understand how to reason about and conceptualize the problems, generate mathematical formulations, and computationally visualize and solve the problems. It provides you with the foundation to understand more advanced scientific computing, including parallel computing using MPI, grid computing, and other techniques in high-performance computing.
Il volume ha il pregio di parlare chiaro e di servirsi degli strumenti affilatissimi della semantica storica, della stilistica e della metricologia, per mettere in luce da un lato le peculiarità di autori cardine della ricerca poetica nel secondo Novecento: Pagliarani, Rosselli, Zanzotto, Emilio Villa, i poeti della linea lombarda e il primo Cucchi - dall'altro, di rendere plausibile affinità insperate, quando non addirittura osteggiate dagli stessi protagonisti di queste pagine. Cucchi e Villa in un unico ventaglio? Zanzotto e Pagliarani? Una campionatura di comportamenti poetici prima ancora che una galleria di ritratti, una disanima scientifica, ma molto umana, del teatro poetico italiano. Con una prefazione del poeta Luigi Ballerini.
Amanda Richey and Linda S. Evans
“The overlaps between mothering and literacy are numerous and complex. This innovative work brings together new perspectives to deepen our under- standing of mothering, literacy, and the spaces in between. Highly recommended reading for students and scholars of many fields.
—Catherine Mutti-Driscoll, University of Washington–Seattle
“Mothering and Literacies is a compelling collection of chapters that utilize a wide-ranging set of lenses through which literacy and mothering are rep- resented and problematized in both local and global contexts. Through the telling of their individual stories, women scholars in the collection contribute to larger contested stories of race, gender, sexuality, class, region, nation, and language as these intersect—sometimes collide with—how literacy has been historically conceptualized. Interdisciplinary and accessible, this unique collection invites readers to challenge historical and contemporary notions of what mothering means in the contested space of literacy practices, and it provides up-to-date analyses of digital literacies and literacy practices in global contexts.
—Nichole A. Guillory, Kennesaw State University, Bagwell College of Educa- tion, Georgia
Letizia M. Guglielmo
In 2009, 16 and Pregnant premiered on MTV, closely followed by the spinoffs Teen Mom and Teen Mom 2. Because of their controversial portrayals of teenage mothers, the shows have received ongoing media attention. While some argue that the programs could play a factor in reducing the number of teen pregnancies, others claim the shows exploit young women and glamorize their situations. Among these debates, there have been surprisingly few in-depth discourses that discuss the roles such shows have on teenage audiences. In MTV and Teen Pregnancy: Critical Essays on 16 and Pregnant and Teen Mom, contributors from a variety of backgrounds and expertise offer potent essays about these programs. Divided into four parts, the book tackles the controversial representations of teen pregnancy from various disciplines. Part I explores gendered social norms and the shows’ roles as either educational resources or idealized depictions of teenage motherhood. Part II prompts readers to consider the intersections of race, class, gender, and the social and cultural power structures often glossed over in these programs. Part III focuses on teenage fathers, the portrayal of masculinity, and “good” vs. “bad” parents. Part IV draws from TVs representations of reality to discuss the impact of these shows on the viewing audience. This section includes a narrative from a teen mother who argues that the shows do not accurately reflect the life she leads. As the debates about 16 and Pregnant and Teen Mom continue, this collection provides a valuable critical discourse to be used both inside and outside the classroom. Those engaged in courses on gender and women’s studies, as well as media studies, social work, and family and childhood development, will find MTV and Teen Pregnancy especially insightful—as will those involved in community outreach programs, not to mention teens and young mothers themselves.
Jennifer W. Dickey, Samir El Azhar, and Catherine Lewis
Museums reflect a nation's character, as well as define it. Museums around the world have been shaped by globalization, and in turn have shaped a global public's understanding of local, regional, or national identity. Essayists consider the politics of museum interpretation in the global context, issues of cultural patrimony and heritage tourism, the risks of crossing boundaries and borders to present controversial subjects, and strategies for engaging audiences and communities. International case studies from Germany, Morocco, Saudi Arabia, Qatar, South Africa, Niger, and Vietnam underscore the common motives and sensibilities, as well as the challenges, of the world's museums in their efforts to educate and inspire.
José M. Garrido, Richard Schlesinger, and Kenneth E. Hoganson
This revised and updated Second Edition presents a practical introduction to operating systems and illustrates these principles through a hands-on approach using accompanying simulation models developed in Java and C++. This text is appropriate for upper-level undergraduate courses in computer science. Case studies throughout the text feature the implementation of Java and C++ simulation models, giving students a thorough look at both the theoretical and the practical concepts discussed in modern OS courses. This pedagogical approach is designed to present a clearer, more practical look at OS concepts, techniques, and methods without sacrificing the theoretical rigor that is necessary at this level. It is an ideal choice for those interested in gaining comprehensive, hands-on experience using the modern techniques and methods necessary for working with these complex systems. Every new printed copy is accompanied with a CD-ROM containing simulations.
New material added to the revised and updated Second Edition:
- Chapter 11 (Security) has been revised to include the most up-to-date information
- Chapter 12 (Firewalls and Network Security) has been updated to include material on middleware that allows applications on separate machines to communicate (e.g., RMI, COM+, and Object Broker)
- Includes a new chapter dedicated to Virtual Machines
- Provides introductions to various types of scams
- Updated to include information on Windows 7 and Mac OS X throughout the text
- Contains new material on basic hardware architecture that operating systems depend on
- Includes new material on handling multi-core CPUs
Michael J. Dias, Charles J. Eick, and Laurie Brantley-Dias
Science teacher educators prepare and provide professional development for teachers at all grade levels. They seek to improve conditions in classroom teaching and learning, professional development, and teacher recruitment and retention.
Science Teacher Educators as K-12 Teachers: Practicing What We Teach tells the story of sixteen teacher educators who stepped away from their traditional role and entered the classroom to teach children and adolescents in public schools and informal settings. It details the practical and theoretical insights that these members of the Association of Science Teacher Educators (ASTE) earned from experiences ranging from periodic guest teaching to full-time engagement in the teaching role.
Science Teacher Educators as K-12 Teachers shows science teacher educators as professionals engaged in reflective analysis of their beliefs about and experiences with teaching children or adolescents science. With their ideas about instruction and learning challenged, these educators became more aware of the circumstances today's teachers face. Their honest accounts reveal that through teaching children and adolescents, teacher educators can also renew themselves and expand their identities as well as their understanding of themselves in the profession and in relation to others.
Science Teacher Educators as K-12 Teachers will appeal to all those with an interest in science education, from teacher educators to science teachers, as well as teacher educators in other disciplines. Its narratives and insights may even inspire more teacher educators to envision new opportunities to serve teachers, K-12 learners and the local community through a variety of teaching arrangements in public schools and informal education settings.
Brandon D. Lundy and Solomon Negash
Teaching Africa introduces innovative strategies for teaching about Africa. The contributors address misperceptions about Africa and Africans, incorporate the latest technologies of teaching and learning, and give practical advice for creating successful lesson plans, classroom activities, and study abroad programs. Teachers in the humanities, sciences, and social sciences will find helpful hints and tips on how to bridge the knowledge gap and motivate understanding of Africa in a globalizing world.
Paul M. Dover
houghtful and scholarly, yet accessible, The Changing Face of the Past: An Introduction to Western Historiography provides readers with an overview of the changing approaches to understanding the past in the western world over the last 2,500 years. Arguing that it is indispensable for students of history to have a familiarity with the history of their discipline, it demonstrates how these precursors were essential in forming our present views on how history should be composed. Beginning with the earliest historical thought—and ending with the twentieth century—the book explores diverse voices and perspectives on the past through a combination of expository essays by the author and carefully selected primary-source selections that reflect the essays’ most important themes.
The opening chapter addresses the basic concepts of history, historians, and historiography, providing definitions of key terms and critical information on the role and conventions of historians.
Subsequent chapters survey periods of history chronologically, adding philosophical context, and exploring the significance of varying viewpoints from the writers of the time. These chapters include: Beginnings: The Invention of History; Roman History; History in the Middle Ages; Early Modern Historiography; History and Enlightenment; Historicism and Empiricism; and Into the Twentieth Century.
As students read through the material they are exposed to some of the most important figures in the development of western historical thought, including Herodotus, Tacitus, Guicciardini, Gibbon, and Marx. They learn that history has never been the mere representation of past events. History can be purely pragmatic. It can be a moral enterprise. It can be an expression of culture. It can reflect the highest aspirations, and it can come from a place of crisis.
The Changing Face of the Past gives students a sweeping yet detailed introduction to important primary source material. It challenges them to consider what these writings say about the past and more importantly, what they say about history’s ongoing endeavor to describe, explain, and interpret it.
Patrick Steward and Bryan P. McGovern
Aspirations of social mobility and anti-Catholic discrimination were the lifeblood of subversive opposition to British rule in Ireland during the mid-nineteenth century. Refugees of the Great Famine who congregated in ethnic enclaves in North America and the United Kingdom supported the militant Fenian Brotherhood and its Dublin-based counterpart, the Irish Republican Brotherhood (IRB), in hopes of one day returning to an independent homeland. Despite lackluster leadership, the movement was briefly a credible security threat which impacted the history of nations on both sides of the Atlantic.
Inspired by the failed Young Ireland insurrection of 1848 and other nationalist movements on the European continent, the Fenian Brotherhood and the IRB (collectively known as the Fenians) surmised that insurrection was the only path to Irish freedom. By 1865, the Fenians had filled their ranks with battle-tested Irish expatriate veterans of the
Union and Confederate armies who were anxious to liberate Ireland. Lofty Fenian ambitions were ultimately compromised by several factors including United States government opposition and the resolution of volunteer Canadian militias who repelled multiple Fenian incursions into New Brunswick, Quebec, Ontario, and Manitoba. The Fenian legacy is thus multi-faceted. It was a mildly-threatening source of nationalist pride for discouraged Irish expatriates until the organization fulfilled its pledge to violently attack British soldiers and subjects. It also encouraged the confederation of Canadian provinces under the 1867 Dominion Act.
In this book, Patrick Steward and Bryan McGovern present the first holistic, multi-national study of the Fenian movement. While utilizing a vast array of previously untapped primary sources, the authors uncover the socio-economic roots of Irish nationalist behavior at the height of the Victorian Period. Concurrently, they trace the progression of Fenian ideals in the grassroots of Young Ireland to its de facto collapse in 1870s. In doing so, the authors change the perception of the Fenians from fanatics who aimlessly attempted to free their homeland to idealists who believed in their cause and fought with a physical and rhetorical force that was not nonsensical and hopeless as some previous accounts have suggested.
Federica Santini and Giovanna Summerfield
Through a series of original analyses of poetic works belonging to the Italian canon or purposely posing themselves at the margins of it, the project seeks to highlight poetry as an art form which has the capacity to show the incongruities of society, not just semantically, but especially through the use it makes of signifiers, which allow meaning to come through notwithstanding linear communication. Specifically, this project identifies and analyzes a line of diverse early modern to contemporary Italian poetic works in which the goal is not only to imitate or represent the world, but to enact a change upon it. Rather than resulting in an exercise in self-indulgence, these works focus on poetics as an agent of social transformation. Deleuze and Guattari used, in 1976, the metaphor of the rhizome: a subterranean -- and therefore subversive - root, a growth that develops in hidden, unpredictable directions. The rhizome is a figure of alterity and discontinuity, in opposition to the binary logic proper of hierarchical structures. Each of the works analyzed in this volume enhances, in different ways, this intuition by proposing a non-linear undergrowth that affects poetics and invades the very logic of society, finally enacting a revolt, and transforming the world from within.
Robert A. Devillar, Binbin Jiang, and Jim Cummins
This research-based volume presents a substantive, panoramic view of ways in which Australia and countries in Africa, Asia, Europe, and North and South America engage in educational programs and practices to transform the learning processes and outcomes of their students. It reveals and analyzes national and global trajectories in key areas of educational development, and enhances readers’ understanding of the nature and complexity of educational transformation in a global context. The book’s comprehensive analysis of factors associated with transforming education within globally representative geographical, cultural, and political contexts contributes to critical scholarship; its discussion of individual country findings and cross-country patterns has significant implications for educational practitioners and leaders. The volume has direct practical relevance for educational practitioners and leaders, policymakers, and researchers, as nations remain in dire need of effective ways and means to transform their respective educational systems to (1) more ably realize educational equity, (2) make learning relevant to an increasingly diverse overall student populace, (3) ensure individual and general prosperity, and (4) promote substantive global collaboration in developing the new economy.
This book examines the polarization of positions surrounding the transnational boycott, divestment, and sanctions (BDS) movement aimed at ending the Israeli occupation. The author compares four US-based case studies in which activists for and against BDS struggle over issues of identity, morality, legitimacy, and conceptions of "peace."
Transnational Civil Society and the World Bank: Investigating Civil Society's Potential to Democratize Global Governance
Christopher L. Pallas
Academics and practitioners alike recognize that global governance institutions suffer from a democratic deficit. Many have looked to transnational civil society as a means of remediation. Yet a clear gap has begun to emerge between normative hopes and empirical reality. Using new data from civil society engagements with the World Bank, this book shows how transnational civil society organizations prioritize pre-existing mission over responsiveness to claimed stakeholders, undertake activism in line with financial incentives, achieve impacts using elite channels of influence, and undercut the authority of developing country governments. It explores the structural roots of these patterns and examines their impact on democratic representation. It also offers practical advice for how these negative patterns can be moderated through new practices at the Bank and new norms within civil society.
He Selena, Shouling Ji, Yi Pan, and Yingshu Li
Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area.
The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current thinking on the topic, and a discussion of unsolved problems. The book is organized into three sections. Section I introduces the basic concepts of WSNs and their applications, followed by the summarization of the network management techniques used in WSNs.
Section II begins by examining virtual backbone-based network management techniques. It points out some of the drawbacks in classical and existing methods and proposes several new network management techniques for WSNs that can address the shortcomings of existing methods. Each chapter in this section examines a new network management technique and includes an introduction, literature review, network model, algorithm description, theoretical analysis, and conclusion.
Section III applies proposed new techniques to some important applications in WSNs including routing, data collection, data aggregation, and query processing. It also conducts simulations to verify the performance of the proposed techniques. Each chapter in this section examines a particular application using the following structure: brief application overview, application design and implementation, performance analysis, simulation settings, and comments for different test cases/scenario configurations.