ISIS’s Recruitment of Women in the Physical and Online Space: Lessons Learned

2021 ◽  
Author(s):  
Lora Pitman

This article explores ISIS’s recruitment of women in the physical and online space and the circumstances and factors that lead to them joining the organization. It begins with a general overview of the overall recruitment efforts of ISIS. Next, it analyzes a case study involving three young women – Khadiza Sultana, Amira Abase, and Shamima Begum, who were recruited by ISIS and, consequently, traveled to Syria from their London homes to become members of the organization. Then, it provides a discussion of the measures against ISIS’s recruitment efforts so far. The chapter concludes with recommended strategies against the recruitment of women for radical organizations. These strategies are grouped into three categories – strategies aimed at the organization itself, strategies aiming at protecting women from becoming vulnerable recruitment targets, and lastly, strategies against the intermediaries who make the recruitment possible.

2011 ◽  
Vol 15 (1) ◽  
Author(s):  
Michael L. Fetters ◽  
Tova Garcia Duby

Faculty development programs are critical to the implementation and support of curriculum innovation. In this case study, the authors present lessons learned from ten years of experience in faculty development programs created to support innovation in technology enhanced learning. Stages of curriculum innovation are matched to stages of faculty development, and important lessons for success as well as current challenges are delineated and discussed.


Author(s):  
Kaye Chalwell ◽  
Therese Cumming

Radical subject acceleration, or moving students through a subject area faster than is typical, including skipping grades, is a widely accepted approach to support students who are gifted and talented. This is done in order to match the student’s cognitive level and learning needs. This case study explored radical subject acceleration for gifted students by focusing on one school’s response to the learning needs of a ten year old mathematically gifted student. It provides insight into the challenges, accommodations and approach to radical subject acceleration in an Australian school. It explored the processes and decisions made to ensure that a gifted student’s learning needs were met and identified salient issues for radical subject acceleration. Lessons learned from this case study may be helpful for schools considering radical acceleration.


i-com ◽  
2021 ◽  
Vol 20 (1) ◽  
pp. 19-32
Author(s):  
Daniel Buschek ◽  
Charlotte Anlauff ◽  
Florian Lachner

Abstract This paper reflects on a case study of a user-centred concept development process for a Machine Learning (ML) based design tool, conducted at an industry partner. The resulting concept uses ML to match graphical user interface elements in sketches on paper to their digital counterparts to create consistent wireframes. A user study (N=20) with a working prototype shows that this concept is preferred by designers, compared to the previous manual procedure. Reflecting on our process and findings we discuss lessons learned for developing ML tools that respect practitioners’ needs and practices.


2021 ◽  
pp. 026732312110283
Author(s):  
Judith Simon ◽  
Gernot Rieder

Ever since the outbreak of the COVID-19 pandemic, questions of whom or what to trust have become paramount. This article examines the public debates surrounding the initial development of the German Corona-Warn-App in 2020 as a case study to analyse such questions at the intersection of trust and trustworthiness in technology development, design and oversight. Providing some insights into the nature and dynamics of trust and trustworthiness, we argue that (a) trust is only desirable and justified if placed well, that is, if directed at those being trustworthy; that (b) trust and trustworthiness come in degrees and have both epistemic and moral components; and that (c) such a normatively demanding understanding of trust excludes technologies as proper objects of trust and requires that trust is directed at socio-technical assemblages consisting of both humans and artefacts. We conclude with some lessons learned from our case study, highlighting the epistemic and moral demands for trustworthy technology development as well as for public debates about such technologies, which ultimately requires attributing epistemic and moral duties to all actors involved.


Author(s):  
Dang Duy Bui ◽  
Kazuhiro Ogata

AbstractThe mutual exclusion protocol invented by Mellor-Crummey and Scott (called MCS protocol) is used to exemplify that state picture designs based on which the state machine graphical animation (SMGA) tool produces graphical animations should be better visualized. Variants of MCS protocol have been used in Java virtual machines and therefore the 2006 Edsger W. Dijkstra Prize in Distributed Computing went to their paper on MCS protocol. The new state picture design of a state machine formalizing MCS protocol is assessed based on Gestalt principles, more specifically proximity principle and similarity principle. We report on a core part of a formal verification case study in which the new state picture design and the SMGA tool largely contributed to the successful completion of the formal proof that MCS protocol enjoys the mutual exclusion property. The lessons learned acquired through our experiments are summarized as two groups of tips. The first group is some new tips on how to make state picture designs. The second one is some tips on how to conjecture state machine characteristics by using the SMGA tool. We also report on one more case study in which the state picture design has been made for the mutual exclusion protocol invented by Anderson (called Anderson protocol) and some characteristics of the protocol have been discovered based on the tips.


2021 ◽  
pp. 104973152098560 ◽  
Author(s):  
Katarzyna Celinska

Purpose: This case study is the introspective account of the evaluation process of Functional Family Therapy (FFT) as implemented in Middlesex County in New Jersey between 2005 and 2011. The study presents challenges and issues in evaluation falling into three main categories. Methods: The case study is based on the recollections and documented experiences of the author who was responsible for all major aspects of the evaluation including designing the study, collecting the data, and handling daily evaluation activities. Results: The author differentiated among three main categories of challenges. In respect to research design, the relative merits of experimental versus nonexperimental designs and quantitative versus qualitative research methods are discussed. The second set of issues involves developing and exercising the social competence skills necessary to form working partnerships with service providers. The third set encompasses logistical barriers encountered during daily evaluation activities. Conclusions: The challenges and lessons learned from conducting the outcome evaluation of FFT are situated within scholarly debates on evaluation research, with the goal of providing further insights into the on-the-ground implementation and process of program evaluations. The experiences, recollections and processes illustrate challenges and solutions applicable to evaluations of other family-based violence prevention interventions.


2020 ◽  
Vol 35 (9) ◽  
pp. 2675-2679 ◽  
Author(s):  
Katharine Lawrence ◽  
Kathleen Hanley ◽  
Jennifer Adams ◽  
Daniel J Sartori ◽  
Richard Greene ◽  
...  

2005 ◽  
Vol 10 (sup1) ◽  
pp. 219-233 ◽  
Author(s):  
Alfred C. Marcus ◽  
Jerianne Heimendinger ◽  
Ellen Berman ◽  
Victor Strecher ◽  
Mary Anne Bright ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document