30,039 research outputs found

    Innovation and failure in mechatronics design education

    Get PDF
    Innovative engineering design always has associated with it the risk of failure, and it is the role of the design engineer to mitigate the possibilities of failure in the final system. Education should however provide a safe space for students to both innovate and to learn about and from failures. However, pressures on course designers and students can result in their adopting a conservative, and risk averse, approach to problem solving. The paper therefore considers the nature of both innovation and failure, and looks at how these might be effectively combined within mechatronics design education

    Website Blocked: Filtering Technology in Schools and School Libraries

    Get PDF
    This paper investigates the impact of filtering software in K-12 schools and school libraries. The Children\u27s Internet Protection Act, or CIPA, requires that public schools and school libraries use filtering technology in order to receive discounted rates on technology. As a result, nearly all public elementary and secondary schools today use filtering technology. While the provisions of CIPA narrowly define the content to be blocked, filters are often set to block much more than is required. Filtering technology is often ineffective, and many unobjectionable sites end up being blocked, including Web 2.0 sites and tools needed to educate students in a 21st century learning environment. Filtering software raises other issues as well, such as First Amendment implications, a possible digital divide between students that have unfiltered access to online content at home and those that do not, and the loss of opportunity to educate students on how to be good digital citizens. These issues should be acknowledged and addressed. There are many options available to librarians, educators, administrators, and other stakeholders that can increase students\u27 access to online information and educational tools while still protecting children from inappropriate online content and complying with the requirements of CIPA

    Federated Embedded Systems – a review of the literature in related fields

    Get PDF
    This report is concerned with the vision of smart interconnected objects, a vision that has attracted much attention lately. In this paper, embedded, interconnected, open, and heterogeneous control systems are in focus, formally referred to as Federated Embedded Systems. To place FES into a context, a review of some related research directions is presented. This review includes such concepts as systems of systems, cyber-physical systems, ubiquitous computing, internet of things, and multi-agent systems. Interestingly, the reviewed fields seem to overlap with each other in an increasing number of ways

    Cybersecurity: mapping the ethical terrain

    Get PDF
    This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others. Foreword Governments and society are increasingly reliant on cyber systems. Yet the more reliant we are upon cyber systems, the more vulnerable we are to serious harm should these systems be attacked or used in an attack. This problem of reliance and vulnerability is driving a concern with securing cyberspace. For example, a ‘cybersecurity’ team now forms part of the US Secret Service. Its job is to respond to cyber-attacks in specific environments such as elevators in a building that hosts politically vulnerable individuals, for example, state representatives. Cybersecurity aims to protect cyberinfrastructure from cyber-attacks; the concerning aspect of the threat from cyber-attack is the potential for serious harm that damage to cyber-infrastructure presents to resources and people. These types of threats to cybersecurity might simply target information and communication systems: a distributed denial of service (DDoS) attack on a government website does not harm a website in any direct way, but prevents its normal use by stifling the ability of users to connect to the site. Alternatively, cyber-attacks might disrupt physical devices or resources, such as the Stuxnet virus, which caused the malfunction and destruction of Iranian nuclear centrifuges. Cyber-attacks might also enhance activities that are enabled through cyberspace, such as the use of online media by extremists to recruit members and promote radicalisation. Cyber-attacks are diverse: as a result, cybersecurity requires a comparable diversity of approaches. Cyber-attacks can have powerful impacts on people’s lives, and so—in liberal democratic societies at least—governments have a duty to ensure cybersecurity in order to protect the inhabitants within their own jurisdiction and, arguably, the people of other nations. But, as recent events following the revelations of Edward Snowden have demonstrated, there is a risk that the governmental pursuit of cybersecurity might overstep the mark and subvert fundamental privacy rights. Popular comment on these episodes advocates transparency of government processes, yet given that cybersecurity risks represent major challenges to national security, it is unlikely that simple transparency will suffice. Managing the risks of cybersecurity involves trade-offs: between security and privacy; individual rights and the good of a society; and types of burdens placed on particular groups in order to protect others. These trade-offs are often ethical trade-offs, involving questions of how we act, what values we should aim to promote, and what means of anticipating and responding to the risks are reasonably—and publicly—justifiable. This Occasional Paper (prepared for the National Security College) provides a brief conceptual analysis of cybersecurity, demonstrates the relevance of ethics to cybersecurity and outlines various ways in which to approach ethical decision-making when responding to cyber-attacks

    The Emergent Use of Online Learning in Secondary Education: A Preliminary Review of the Literature

    Get PDF
    While the preponderance of online learning is geared toward adult learners, its use in the United States for secondary education students has been around for over a decade and has a growing literature. As online learning for adolescents gains popularity, questions are being raised about the quality, strategies, and effectiveness of the programs being offered. There are several delivery methods of online learning from the full-time virtual school to the ‘blended’ model. This review of the literature will provide an understanding of current theory and practice online learning for secondary students, recommendations for implementation, and where it may lead

    SLIS Student Research Journal, Vol. 4, Iss. 2

    Get PDF

    Secure web application development and global regulation

    Get PDF
    The World Wide Web (WWW) has been predominantly responsible for instigating radical paradigm transformations in today’s global information rich civilizations. Many societies have basic operational economical components that depend on Web enabled systems in order to support daily commercial activities. The acceptance of E-commerce as a valid channel for conducting business coupled with societal integration and dependence on Web enabled technology has instigated the development of local, national, and global efforts to regulate criminal activities on the World Wide Web. This paper makes two contributions. The first contribution is the high-level review of the United States and United Kingdom legislation that has developed from the escalation and integration of the World Wide Web into society. The second contribution is the support for the idea that legislative compatibility, in concert with an organization’s policy compatibility, needs to be acknowledged in secure Web application development methodologies
    • …
    corecore