Search Results

You are looking at 21 - 30 of 83 items for :

  • Social Sciences and Law x
  • All content x
Clear All

Concert visits with the music class: A Salzburg case study

A Cooperation project with varying goals, tasks and expectations

Hungarian Educational Research Journal
Author: Andreas Bernhofer

project. In addition, the music teacher is responsible to organize the concert tickets as well as the transportation of the whole group to the concert hall and back home. For all of this, the music teacher is at the mercy of the school principal who needs

Open access

work and housework has been made simpler by numerous home appliances ( Church et al., 2011 ). On the other hand, there has been an increase in the amount of free time, which is rarely filled actively. Watching television, computer games and surfing the

Open access

computers per citizen, computers at home and the use of the Internet ( Lasagabaster & Sierra, 2003 , p. 301). Regarding the frequency of the use of technology at school, it is close to the EU mean. However, and despite the fact that the general majority of

Open access

their country contexts. Instead of borrowing or experimenting with higher education models from other regions, or develop their home-grown models, CEE countries joined the emerging European model put forward by the Bologna Process. Across the board, it

Open access

certain things because they do not know them”. Many teachers observe the connection between attitudes towards art and cultural capital acquired at home, therefore they believe it is important that schools organise these events for children as some of them

Open access

environment” has been described as a “ sprawling web of immigration controls now embedded at the heart of the UK’s public services and communities ” ( Liberty, 2019 , p. 7). First mentioned by Theresa May as Home Secretary in an interview with The Telegraph in

Open access

a problem with pedagogues as well, having a bad attitude and lack of devotion and readiness. The majority of children does not encounter valuable, high standard music neither at home nor in daily life ( Marosz, 2013 ). The subject lost a lot of

Open access

Összefoglalás. Az elektronikusan tárolt információ biztonsága, általánosabban véve a kiberbiztonság, az egyik legnagyobb kihívás a 21. században. Folyamatosan jelennek meg újabb és újabb fenyegetések, melyekre innovatív és újszerű megoldásokat kell adni. Ezek az innovatív megoldások mindenképpen magukkal hozzák az olyan új típusú technológiák használatát az információbiztonságban, mint például a Nagy Adatokból (Big Data) való építkezés és az erre épülő mesterséges intelligencia. Ennek támogatása érdekében az Európai Unió a 2021 és 2027 közötti időszakban kiemelt fontosságúnak tartja a kiberbiztonsági innovációkat. A tanulmány bemutatja a kiberbiztonsági kompetenciahálózatok tervezetét, illetve ismerteti, hogy milyen kutatás-fejlesztés-innovációs lehetőségek lesznek a következő évtizedben Európában.

Summary. Security of stored digital information and more generally, cybersecurity is one of the biggest challenges of the 21st century. Besides the negative effects of cybercrime, cyberespionage, or other state sponsored activities, like cyberwarfare, our society and economy should face the exposure of infocommunication systems all around us. At the dawn of 4th industrial revolution when the whole world is going to be digitalized and will be surrounded by networked digital devices in homes, cities and industry, new threats are constantly emerging that need to be responded with new innovative solutions. These innovative solutions should include the usage of big data and artificial intelligence built onto it. They should also give a response for the inherited risks of legacy systems that can be found in many critical information infrastructures. Meanwhile, they should protect the digital privacy of citizens by not giving out unnecessary user data which is contradictory with the need of big data and AI mentioned before.

Due to the emerging cybersecurity threats and the virtually non-existence of European cybersecurity market, European Union gives high importance for cybersecurity innovation and will support it between 2021 and 2027. In the proposed budget for this period, approximately 3 billion of euros is expected to be spent to cybersecurity related research. On the one hand, that fund may help European research institutes, enterprises, and startups to appear on the global market, on the other hand this is the only possible way to regain Europe’s digital independence from the United States and China. In alignment with the European security policy, these innovative solutions may also lead to reducing the amount of cybercrime, ensure the resilience of continental critical information infrastructure and can help to establish strong European cyberwarfare capabilities. As Ursula von der Leyden, president of the European Commission said in her op-ed in February 2020, “The point is that Europe’s digital transition must protect and empower citizens, businesses and society as a whole. It has to deliver for people so that they feel the benefits of technology in their lives. To make this happen, Europe needs to have its own digital capacities – be it quantum computing, 5G, cybersecurity or artificial intelligence (AI). These are some of the technologies we have identified as areas for strategic investment, for which EU funding can draw in national and private sector funds.” The study presents the draft of cybersecurity competence networks and describes what R&D&I possibilities will be in Europe in the next decade.

Open access

strenghten persistence – town or city as home settlement and students’ dorm as accommodation – through which students are really closely integrated into their respective institutions. In connection with the female students, we found a higher degree of

Open access

. Issad , M. , Mezhdunarodnoye chastnoye pravo (Private International Law) (Progress 1989 ). Kegel , G. , ‘ Paternal Home and Dream Home: Traditional Conflict of

Full access