This essay is based on research promoted by INDIRE, Italian NationalInstitute for Documentation, Innovation and Educational Researchin Education, and is developed under the research on ‘Professionalnetworks, Educational models and School principal’s profile in Italy’. Onthe basis of observation and analysis of research data, a new theoryis assumed and new characteristics are defined, belonging to bothprofessional networks and educational models applied to all typesof professional networks. The characteristics so far identified are:plastic nature of networks, network punctuated equilibrium, networkconnectivity, emergent behavior and sociality of network members.It is also shown how the knowledge shared in a network materializes inEvents that produce Event Capital. The theory will be complemented byan experimentation phase.
MULTIFILE
Hoofdstuk 2 gaat over peer en professionele online support voor ouders bij het opvoeden. In totaal bevat het boek 31 hoofdstukken over sociaal netwerken, geschreven door tientallen onderzoekers wereldwijd.
MULTIFILE
Climate change is one of the key societal challenges of our times, and its debate takes place across scientific disciplines and into the public realm, traversing platforms, sources, and fields of study. The analysis of such mediated debates has a strong tradition, which started in communication science and has since then been applied across a wide range of academic disciplines.So-called ‘content analysis’ provides a means to study (mass) media content in many media shapes and formats to retrieve signs of the zeitgeist, such as cultural phenomena, representation of certain groups, and the resonance of political viewpoints. In the era of big data and digital culture, in which websites and social media platforms produce massive amounts of content and network this through hyperlinks and social media buttons, content analysis needs to become adaptive to the many ways in which digital platforms and engines handle content.This book introduces Networked Content Analysis as a digital research approach, which offers ways forward for students and researchers who want to work with digital methods and tools to study online content. Besides providing a thorough theoretical framework, the book demonstrates new tools and methods for research through case studies that study the climate change debate with search engines, Twitter, and the encyclopedia project of Wikipedia.
MULTIFILE
Prompt and timely response to incoming cyber-attacks and incidents is a core requirement for business continuity and safe operations for organizations operating at all levels (commercial, governmental, military). The effectiveness of these measures is significantly limited (and oftentimes defeated altogether) by the inefficiency of the attack identification and response process which is, effectively, a show-stopper for all attack prevention and reaction activities. The cognitive-intensive, human-driven alarm analysis procedures currently employed by Security Operation Centres are made ineffective (as opposed to only inefficient) by the sheer amount of alarm data produced, and the lack of mechanisms to automatically and soundly evaluate the arriving evidence to build operable risk-based metrics for incident response. This project will build foundational technologies to achieve Security Response Centres (SRC) based on three key components: (1) risk-based systems for alarm prioritization, (2) real-time, human-centric procedures for alarm operationalization, and (3) technology integration in response operations. In doing so, SeReNity will develop new techniques, methods, and systems at the intersection of the Design and Defence domains to deliver operable and accurate procedures for efficient incident response. To achieve this, this project will develop semantically and contextually rich alarm data to inform risk-based metrics on the mounting evidence of incoming cyber-attacks (as opposed to firing an alarm for each match of an IDS signature). SeReNity will achieve this by means of advanced techniques from machine learning and information mining and extraction, to identify attack patterns in the network traffic, and automatically identify threat types. Importantly, SeReNity will develop new mechanisms and interfaces to present the gathered evidence to SRC operators dynamically, and based on the specific threat (type) identified by the underlying technology. To achieve this, this project unifies Dutch excellence in intrusion detection, threat intelligence, and human-computer interaction with an industry-leading partner operating in the market of tailored solutions for Security Monitoring.