Wednesday, February 26, 2020

Review of Literature on Multicultural Literarture Dissertation

Review of Literature on Multicultural Literarture - Dissertation Example A very good introduction to the issues involved in multicultural literacy is provided by Carol D. Lee in her book Culture, Literacy and Learning: Taking Blook in the Whirlwind (Lee, 2007). The second part of the title is taken from a poem by Gwendolyn Brooks which advocates living and flourishing in a maelstrom of contradictory forces and this metaphor is used to illuminate the many pressures that children in some ethnic groups, and especially African Americans, experience when they are growing up. Lee argues for definitions that go beyond simple categorizations: â€Å"To analyse group membership in ways that take history and cultural practices into account, ethnicity is a more powerful and universal concept than race. Ethnicity takes into account history, identity, practices and beliefs.† (Lee, 2007, 11) This implies that educators must have a deep knowledge of their subject but also of the routine practices that go on outside the school gates, in families and among peer grou ps. If the experiences that the learner has in school are unrelated to the outside experiences, then many opportunities for learning are lost. Prior knowledge cannot be tapped into, and students are likely to have poor recollection of what they learn, and be unable to apply it in any realistic context. There is also likely to be a lack of motivation because the relevance of school learning is will be perceived as low. This means that a fundamental task of the teacher is to make sure that there is overlap between the world outside and the world of classroom learning. Programs like â€Å"Funds of knowledge† which bring in a diverse range of adults from the community, or the â€Å"Cultural Modeling Framework† which adds a focus on youth behaviour and â€Å"the very different demands of subject matter learning.† (Lee, 2007,11) Lee homes in on the type of assessments used, and describes interventions in a school with a high proportion of African American learners. Fa ctors like time limiting reading tasks are found to be counter-productive, and exercises such as reading and then talking are suggested as a better way of establishing how the reader engages with a text and makes sense of it than formal writing. Dialogue with the teacher is important, in order to bridge the gap between everyday language and reasoning, and the styles and standards expected in the academic setting. The book concludes that â€Å"displays of competence depend a lot on how competence is both defined and assessed †¦ we privilege particular kinds of displays as evidence of processes of internalization†¦Ã¢â‚¬  The implications of these insights for literacy are that teachers must seek a variety of ways of linking academic reasoning with everyday experiences, and must appreciate different learner styles, for example valuing the quiet learner who may be â€Å"inwardly attentive in ways that are difficult to assess.† (Lee, 2007, 174) Flores-Duenas (2004) dis cusses similar issues and presents a case study of four Latina(o) students illustrating the need to provide reading materials and discussion opportunities which validate the experience of a wide range of students and not just white European American students. The article is prefaced with a very interesting first person narrative

Monday, February 10, 2020

Cybercrime Prevention Guide Essay Example | Topics and Well Written Essays - 1500 words

Cybercrime Prevention Guide - Essay Example Thus, any unlawful activity where a computer is used as a tool or a target or both comes under the definition of the cyber crime. Cyber Crimes can be categorized in the followings, according to Potts (2002): A crime where a computer or different computers are targeted over the network, for example, spreading of viruses etc. The computer may also be used to commit the traditional crimes, as widely used and easy access; for example, illegal gambling, money frauds etc. The computer may also be used as a file cabinet to store illegal information. For instance, drug trafficker using the computer to store the data of his sources, inventory etc. There seems to be not much between conventional crimes and the cyber crimes, but still if we dig deep then as per the above mentioned definitions a cyber crime is any crime where the computer is used. Laws are introduced and enforced in most of the countries to counter the cyber crime because there used to be a time when this was not unlawful as per the laws of most the countries and provisions are being made in order to cater this. With the growth in computer technology, new ways are being devised by the criminals in order to perform the illegal activities; the same is being done in order to cater against these (Brenner, 2010). ... code induced into the software of an application or the operating system of an organization that is triggered on a specific time period or by some triggering action of it. The nature of Logic Bombs is basically malicious, and they act same as a virus or a Trojan horse when activated by the triggering action. All those viruses that are to be released at some triggering action also fall into the category of a logic bomb (Parsons, Oja and Low, 1999). An organization applications and database are always vulnerable to such attacks. As the data represent the most critical factor for any organization, most of the applications that are being used are there to perform the operations and keep the data in an organized manner (Venkatraman, 2003). When such an attack is planted on data, nobody knows to what extent it may damage the organization because such an attack may not only destroy the data on the hard disks of the individual user, but may be planted to destroy the data kept in the servers. It may be planted to cover some financial frauds by some individual or a group of individuals, because when records are destroyed, they cannot be held responsible for anything. It may be planted on the application program by some cranky that runs the production unit. That may change the recipe, and the mixing of the raw materials to generate the final project; that is also financially not suitable for the organization. It will clearly mean that the end product made by this is a waste and it will hit the company badly because it will increase the wasted products amount (Brenner, 2010). Signs of Logic Bomb Attack Parsons, Oja and Low (1999) mentioned in their book that sometimes it is very easy to detect a logic bomb attack, especially if it is a virus attack on the network of an