This article expands upon important and growing dialogue around how non-Indigenous peoples can work in solidarity with Indigenous peoples to support their nationhood and sovereignty in the wake of ongoing white settler...
Map of Labrador showing communities relevant to theis issue of RLS and more recently established communities. Prepared by David Mercer, Library Assistant, Map Room, QEII Library, Memorial University.
When the following monograph first appeared, as a thesis successfully defended at the Toronto School of Theology in 1968, very little work had been done on Schleiermacher’s sermons. Ian Wishart produced one of the most careful...
One thing, certainly, can be said about David Bentley Hart’s book and it is this: that its author takes atheism very seriouslyor rather, the “New Atheism,” as it is called, a recent ideologico-cultural “movement” whose...
The periodicity of natural signals from our environment since the dawn of life on earth has provided the foundation for development of rhythmic responses innate to living organisms, ranging from ancient bacteria to modern...
This article presents an evaluation of the use of peer and self-assessment as part of the learning process in a public speaking assessment coursework, with students from two departments taking part. Students were assessed by...
Physical field trips have long been used in education, but virtual field trips are increasingly being used to enhance them. This article focuses on the use of mixed reality to enhance a physical field trip before, during, and...
Literature has mainly analyzed the technical attributes of voice for enterprise technical applications, such as voice signature and speech recognition. This paper aims at identifying voice and speech attributes that reflect...
This chapter is a reflection on practice that resulted in the incorporation of an active blended learning approach in courses which the author facilitates for transnational students. These courses were popular, received very...
Transitive verbs in Totonac-Tepehua languages show apparent irregularities in agreement in verb forms where both subject and object are speech act participants (that is, 1 H 2 combinations) and one or both are plural. Data from...
Previous grounded theoretical analyses of rural adolescents' romantic relationship discussions identified media as critical conditions in negotiating gender expectations in intimate relations. More recent emergent fit analyses...
Online learning is part of the future of K-12 education. However, few online K-12 instructors have been formally trained in online pedagogy. This chapter describes best practices in creating online courses for K-12 students....
This chapter begins with a brief discussion of the basic concepts related to the unconscious life of an organization, and then addresses specific aspects of knowledge, learning, and memory, developing a language and framework...
There are several studies showing that a breakdown in the continuum of care occurs when a person crosses an international boundary for healthcare, such as migrants and medical tourists. This study attempted to measure the impact...
E-learning is treated as a learning approach in higher education worldwide. E-learning systems are all about using digital technologies to acquire, store, and process learning resources. This article aims to examine the...
I am going to sketch the personal role of dialectic in the emergence of explicit metaphysics. Of necessity, it is a sketch since a full account would require more than an essay. If we consider the full sweep of Lonergan’s views...
Traditional practices from the past are deep rooted and slow to change. Today's technology being then unknown made development of the singing voice entirely dependent upon the ear, the good taste in style, and the musicality of...
Focused in the physical, people are primarily experiential learners. Yet with the creation and sophistication of measurement techniques at the turn of the century, an understanding of experiential learning from the inside-out...
Mobile communication systems employ an encoding-encryption model to ensure secure data transmission over the network. This model encodes the data and encrypts it before transmitting it to the receiver's end. A non-trivial...