Social learning theoryExternal link:open_in_new has four mediational processes that help determine whether a new behavior is acquired:Attention: The degree to which we notice the behavior. A behavior must grab our attention before it can be imitated. Considering the number of behaviors we observe...
Social work intervention refers to social workers providing some type of care for people in a community. Social work interventions are meant to rescue people who are vulnerable because of illness or addiction. In some cases, it is mandated by law....
In the social sciences, social work refers to the giving of care by the people in society with such resources to the people in society who lack such resources. This is done through social workers, who learn various procedures to improve human behavior....
It has been argued that the applied nature of social work renders the appreciation of social theory by practitioners as unnecessary. This paper takes issue with this controversial stance and shows how social work itself can not be understood outside of the social context in which it is located....
The purpose of this article is to examine the idea of the disappearance of the 'social' in social work. Capitalising on theoretical resources derived from Bruno Latour and actor-network theory, we argue that the 'social' is not a property or dimension of its own that can expand or decrease...
Social choice theory is an economic theory that considers whether a society can be ordered in a way that reflects individual preferences.
A social intranet can help create a culture of openness, inspire collaboration, and ignite connections across all teams and departments.
Social identity is a company's image as derived from its relationships with all of its stakeholders.
Social-sharing features. “Going viral” on social media networks is the equivalent of winning an online lottery. To achieve the same calibre of sharing in your intranet, you need the ability to pass content along easily. When users can like and comment, follow colleagues, and @mention cowork...
creating threat models, and doing code analysis, such asstatic code analysis,interactive application security testing, andsoftware composition analysis, should all be on a developer’s blockchain application roadmap. Building security in from the start is critical to ensuring a successful and secure ...