You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The study investigates interactions between 29 tandem partners from a German and a North American university, who met twice a week in a text-based online environment that allowed them to communicate with each other in real time via a computer keyboard. The analysis focuses on learners' codeswitching, negotiation of meaning, error correction, and the use of specific spellings and punctuation. The data suggest that most partners complied with the principle of reciprocity and that the non-threatening atmosphere of the MOO encouraged them to test their hypotheses about their L2. Moreover, the analysis revealed a noticeable increase in learners' awareness of the target language. All students frequently engaged in negotiation of meaning, but there was a conspicuous absence of corrective feedback.
The late antique and early medieval Mediterranean was characterized by wide-ranging cultural and linguistic diversity. Yet, under the influence of Christianity, communities in the Mediterranean world were bound together by common concepts of good rulership, which were also shaped by Greco-Roman, Persian, Caucasian, and other traditions. This collection of essays examines ideas of good Christian rulership and the debates surrounding them in diverse cultures and linguistic communities. It grants special attention to communities on the periphery, such as the Caucasus and Nubia, and some essays examine non-Christian concepts of good rulership to offer a comparative perspective. As a whole, the studies in this volume reveal not only the entanglement and affinity of communities around the Mediterranean but also areas of conflict among Christians and between Christians and other cultural traditions. By gathering various specialized studies on the overarching question of good rulership, this volume highlights the possibilities of placing research on classical antiquity and early medieval Europe into conversation with the study of eastern Christianity.
The Locations of Composition examines how spaces, places, and locations define, problematize, and shape composition studies. From a wide variety of perspectives, including critical theory, rhetoric, cultural geography, genre theory, postcolonial studies, and media studies, the contributors explore the disciplinary boundaries and authority of composition studies, how teachers of writing can engage students in more place-centered pedagogies, and how compositionists can sort through the often hidden and intricate relationships between and among composition's places. The book reveals the complex ways that places are central to the field's history, identity, and ability to move and change.
The last twenty years has seen a huge evolution in approaches to language-learning, due to new technology as well changing theories on how to best teach languages. Recognising the key relationship between research, practice and program development, Changing Language Education Through CALL is an important text advocating change that makes effective use of new research into learning styles, as well as new technology. Bringing together sixteen internationally respected experts in second-language acquisition and computer technologies, it presents teachers with user-friendly, flexible ways to incorporate technology into the language learning process and provides both the theoretical and practical basis for CALL applications across a broad spectrum of teaching styles, textbooks and courses. Practical and clearly presented, each chapter in this book concentrates on the learning process and the teacher’s role in facilitating this through the proper and effective use of technology - thus ensuring that the partnership of pedagogical expertise and technological innovation remains the work’s focus.
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Arguably one of the most important challenges of the 21st century, with millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. This volume explores the state of threats present in the cyber fraud underground. It discusses phishing/pharming, trojans/toolkits, direct threats, and pump-and-dump scams. By examining the operations of the cyber criminal, the book provides perspective into the general incentives, risks, and behavioral patterns of the fraudsters. Armed with this information, organizations and individuals are better able to develop countermeasures and crafting tactics to disrupt the fraud underground and secure their systems.
This book makes a contribution to understanding the structure of markets on which such illegal transactions occur. The authors apply the tools of economic sociology to develop conceptual frames allowing to understand the organization of such markets and present case studies that provide insights into the illegal side of the economy.
Vision geht weiter als die Aufnahme optischer Reize aus der realen Welt oder die gedankliche Vorstellung von etwas Sichtbarem, das man sich vor Augen führt: Sie umfasst die innere interpretative Transformation des wie auch immer »Gesehenen« in eine gegenwartsbezogene Erscheinung oder in eine zukunftsbezogene Vorstellung. Vision als »Brücke in die Zukunft« – wie tragfähig ist sie in der heutigen Welt? Autorinnen und Autoren aller Fakultäten der Universität Siegen erzählen Visionen der Vergangenheit nach (aus Literatur und Philosophie), beschreiben gegenwärtige Visionen (vor allem in Architektur und Wirtschaft) und verfassen eigene Visionen für die Zukunft (auf den Feldern Gesund...
Rooted in the creative success of over 30 years of supermarket tabloid publishing, the Weekly World News has been the world's only reliable news source since 1979. The online hub www.weeklyworldnews.com is a leading entertainment news site.
When Emperor Constantine triggered the rise of a Christian state, he opened a new chapter in the history of Constantinople and Jerusalem. In the centuries that followed, the two cities were formed and transformed into powerful symbols of Empire and Church. For the first time, this book investigates the increasingly dense and complex net of reciprocal dependencies between the imperial center and the navel of the Christian world. Imperial influence, initiatives by the Church, and projects of individuals turned Constantinople and Jerusalem into important realms of identification and spaces of representation. Distinguished international scholars investigate this fascinating development, focusing on aspects of art, ceremony, religion, ideology, and imperial rule. In enriching our understanding of the entangled history of Constantinople and Jerusalem in Late Antiquity, City of Caesar, City of God illuminates the transition between Antiquity, Byzantium, and the Middle Ages.
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them. Instructor Materials for Hacker Techniques, Tools, and Incident Handling include: PowerPoint Lecture Slides Exam Questions Case Scenarios/Handouts