7,933 research outputs found
Recommended from our members
Evaluating empowerment and control of HE e-learning in a secure environment
With the increased spread of HE distance learning into a wide variety of contexts it is important for us to understand the factors involved in its successful deployment for students. E-learning has a great potential to support effective and empowering HE distance learning (Wilson, 2007; Adams, 2005; Hughes, 2005). However, within two secure environments, prisons and health service, the factors involved are complex. This paper reviews HE e-learning technology perceptions within these two contrasting contexts from 225 students' and stakeholders' perspectives. Previous research has detailed literature limitations on obtaining students' perspectives of e-learning (Conole et al, 2006). These limitations are compounded when other stakeholder perceptions are not integrated (Sun et al, 2007; Adams et al, 2005; Millen at al, 2002). This paper developed and applied an e-learning framework for student and stakeholder perceptions. This social psychological framework, is based on previous practice based e-learning studies and is used here to synthesise two large-scale case studies. The framework focuses on three concepts learner Access (e.g. learning design, technology design, physical access), Awareness (e.g. of resources, their usage and support for e-learning tasks) and Acceptability (e.g. trust, privacy, aesthetics, engagement). Students' and stakeholders' perceptions identified high levels of students' empowerment through e-learning whilst still requiring a further pedagogical tailoring and an awareness of support. However, serious problems within these contexts have identified blocks to e-learning through stakeholders perceptions and fears of acceptability (i.e. issues of risk and trust). Ultimately, through understanding competing perceptions and needs within these complex environments we can support the effective technological development, pedagogical design and deployment of e-learning systems
Recommended from our members
JuxtaLearn DELIVERABLE Report D3.5 Service scenario documentation
The purpose of Deliverable 3.5 is to provide guidelines to creating juxtaposed performance, particularly to advise non-drama teachers on what to do and how to manage performance in stage 3 of the JuxtaLearn process. Building on pedagogies of threshold concepts and juxtaposed learning, it explains the performance steps, orchestrating learning through participative video making and story making with peers. It provides guidance for teachers, offering resources that include suggested lesson plans and example timings.
Thus, in the absence of a shared touchable with JuxtaLearn software, it suggests a practical additional and alternative to using the software of WP4 touch table
Recommended from our members
Effectiveness of mobile learning across various settings
This paper reviews three ‘mobile learning’ projects to understand the nature of and extent to which learning is enhanced and facilitated by the inclusion of mobile technologies in the different teaching/learning activities that were carried out. Reviews will be taken from a number of projects; Mobile Learning in Informal Science Settings (MELISSA),Mobile Clinical Learning and Out There in Here (OTIH) projects. Melissa was a European project dealing with a range of learning systems. The Mobile Clinical Learning project investigated the potential of learning resources provided in Personal Digital Assistants (PDAs) and the ways in which clinical learning within two comparative health care institutions can be supported by using small handheld computers. OTIH is seeking to support collaborative remote experimentation where learners work together in different contexts. Within these projects a range of mobile devices (e.g. smartphones, laptops, ipads) were used to allow a broader understanding of a changing mobile device landscape. The research literature suggests that learning opportunities are more likely to arise in environments where interaction is facilitated. By reviewing these projects we are able to identify elements that are facilitated by mobile technologies and explore ways that learning is supported
Recommended from our members
Evidence Cafés and Practitioner Cafés supported by online resources: A route to innovative training in practice based approaches
Current radical changes in the Police service internationally and in England and Wales are being driven by movements to adopt an Evidence-Based Practice (EBP) approach to policing. However this poses a challenge as early adopters have experienced resistance to EBP, a relatively unknown, and more importantly misunderstood approach for policing (Sherman, 2015). This resistance is not limited to police with international research highlighting implementation issues for evidence based medicine (Altman, 1996; Fairhurst & Dowrick, 1996; Murphy and Adams, 2005), evidence based management (Adams & Sasse, 1999; Rousseau, 2012), and evidence based teaching (Beista, 2007, Perry & Smart, 2007; Adams & Clough, 2015). One reason is the lack of training in EBP, which is coupled with recent concerns over the general quality of training and level of professionalism within UK police organisation (Davies et al, 1996). There have been international initiatives aimed at increasing learning around evidence based practice (Rousseau, 2012; Hall and Roussel, 2014). Some UK police forces have adopted approaches from other domains to counteract these problems (e.g. champions, enquiry visits). Mapping clear pathways that link training, experience and evidence-based practice is crucial to developing the capacity for an evidence-based workforce. This paper presents evidence from recent research that used Evidence Cafés and Practitioner Cafés connected to online resources as a route to increase understanding and awareness of evidence based practice amongst frontline police officers. Evidence Cafés are coordinated by a knowledge exchange expert with an academic and a police practitioner who facilitate the translation of research into practice. This paper presents evidence of the benefit and limitations of these events. Analytics and learning analytics of events’ online resources also provide insights into these approaches and identify triggers for increased engagement across a wide geographical context
Recommended from our members
Police Knowledge Exchange: Summary Report
[Executive Summary]
This report draws on research commissioned by the Association of Police and Crime Commissioners (APCC), the National Police Chiefs Council (NPCC) and the Home Office to investigate cultural aspects of knowledge sharing across the police service. The research reviews literature and police perceptions to identify the enablers and barriers to effective knowledge exchange and sharing within and between police forces and police partners, including the public. Data were collected from 11 police forces; 42 in-depth interviews/focus groups and 47 survey responses. The literature-guided analysis identified four core research themes: who, why, what and how we share. Detailed findings are presented in the full report; this summary report presents the core research findings. Recommendations from this study will inform the next phase of activity for the Board.
The research identified that cross-force, cross-organisation, national and international sharing relies on a culture supporting individuals who have an independent and reflective sharing approach.
A key enabler to police sharing is that, regardless of police rank and role, they all have a strong collaborative nature, through a deep motivation to share, that benefits the wider social community. This collaborative nature is driven by processes that reveal reciprocal benefit and safe sharing, as well as how to effectively ‘get the job done’ and foster professional learning.
A key barrier to police sharing is a strong hierarchical culture that does not encourage the independent nature of sharing. Whilst police officers and staff act independently within the confines of their prescribed roles, they rarely independently share beyond this. This hierarchical culture
means that innovations in sharing are often initiated or approved top-down and tied to leadership. Hierarchical structures are seen to support a competitive culture combining concepts of risk aversion and blame. The
hierarchical culture is also perceived as providing poor clarity on what is of value to share and how to effectively share.
There are two key recommendations to overcome this barrier: one long-term and one short-term.
Long-term: ‘Become independent sharers’ by changing the nature and culture of the police to encourage this independent nature, so that specific sharing barriers are effectively solved by individuals. Professionalising the police and working collaboratively with academia are steps towards this long-term goal.
Short-term: ‘Guide and authorise independent sharing’ by using the hierarchy to scaffold/support and direct police towards effective and approved sharing approaches. This will show the police, through the hierarchy, how and why this independent sharing nature is safe, effective and valued
Sharing, privacy and trust issues for photo collections
Digital libraries are quickly being adopted by the masses. Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible collections. However, users may not be fully aware of the potential privacy implications of submitting their documents to a digital library, and may hold misconceptions of the technological support for preserving their privacy.
We present results from 18 autoethnographic investigations and 19 observations / interviews into privacy issues that arise when people make their personal photo collections available online. The Adams' privacy model is used to discuss the findings according to information receiver, information sensitivity, and information usage. Further issues of trust and ad hoc poorly supported protection strategies are presented. Ultimately while photographic data is potentially highly sensitive, the privacy risks are often hidden and the protection mechanisms are limited
- …
