26 research outputs found

    Teaching in context : some implications for e-learning design

    Full text link
    One of the major advantages of e-learning technologies is the expanded opportunities that they offer for when and where learning takes place. Until recently, little attention has been given to the implications that variation in the learner&rsquo;s context creates for e-learning design. The context of learning with technologies is often considered quite narrowly, sometimes at the level of specific learning transactions, with limited acknowledgement of whether learners will be engaging with them on-campus, off-campus, across national boundaries or in some other contexts. While there are limitations to teachers&rsquo; control of contextual variation, their knowledge of the student cohorts to whom a particular unit of study will be offered provides some clear implications for choices to be made in relation to e-learning design. This paper illustrates these choices through the use of examples from e-learning showcase sites at two institutions. The examples are analysed within a selected theoretical framework to provide preliminary guidelines for accommodating contextual variation in elearning.<br /

    Perceptions of Transactional Distance from Black Males in Asynchronous Online Math Courses

    Get PDF
    Transactional distance theory (Moore, 1973, 1993, 2013, 2019) identifies transactional distance as a psychological or communication gap that can be perceived by learners based on their personal educational needs and/or preferences. These perceptions of distance can occur in any learning environment but especially in distance learning or online learning environments and can influence course satisfaction, participation, and persistence (Tinto, 2009). Perceptions of transactional distance are observed through interactions (learner-instructor, learner-learner, learner-content; Moore, 1989) and are influenced by the theory’s three main tenets of course structure, dialogue, and learner autonomy through instructional design and personalization. Qualitative interviews were conducted with Black males taking online asynchronous math courses at a mid-sized southern university to determine how the participants’ perceived instances of transactional distance in their online asynchronous math courses. Semi-structured qualitative interview questions were developed based partly on Monica Aixiu Zhang’s quantitative measuring tool (2003) for measuring transactional distance based on learner interactions (learner-instructor, learner-learner, learner-content, learner-LMS, and learner-institution) which was updated by Paul et. al. (2015), including Zhang in 2015. Perceptions were recorded, analyzed, and organized per tenet and type of interaction. Results of the study support the theory’s purport that learners perceive levels of transactional distance based on their personalized educational needs and/or preferences. The findings also support empirical research findings stating that educational disadvantages can be exacerbated in distance learning environments, especially for marginalized or underprepared populations (Paul et al., 2015; Salvo et al., 2019; Stewart et al., 2010; Xu & Jaggars, 2013). Reportedly, the findings of this study support the need for learners to experience varied interactions with options available to meet their personal educational needs and or preferences. Participants experienced levels of transactional distance concerning dialogue within the learning environment, concerning autonomous learning management and support, and concerning their reactions to course structures based on their personalized needs and preferences. Instructors, instructional designers, and stakeholders have the opportunity to support learners through professional development for instructors and course designers, cycles of feedback, learner support programs, options for personalization, and varied course design which should include interactions, dialogue, opportunities for autonomy, and course structures appropriate for online learning environments

    Regulating Mass Surveillance as Privacy Pollution: Learning from Environmental Impact Statements

    Get PDF
    Encroachments on privacy through mass surveillance greatly resemble the pollution crisis in that they can be understood as imposing an externality on the surveilled. This Article argues that this resemblance also suggests a solution: requiring those conducting mass surveillance in and through public spaces to disclose their plans publicly via an updated form of environmental impact statement, thus requiring an impact analysis and triggering a more informed public conversation about privacy. The Article first explains how mass surveillance is polluting public privacy and surveys the limited and inadequate doctrinal tools available to respond to mass surveillance technologies. Then, it provides a quick summary of the Privacy Impact Notices ( PINs ) proposal to make a case in principle for the utility and validity of PINs. Next, the Article explains how environmental law responded to a similar set problems (taking the form of physical harms to the environment) with the National Environmental Policy Act of 1969 ( NEPA ), requiring Environmental Impact Statement ( EIS ) requirements for environmentally sensitive projects. Given the limitations of the current federal privacy impact analysis requirement, the Article offers an initial sketch of what a PIN proposal would cover and its application to classic public spaces, as well as virtual spaces such as Facebook and Twitter. The Article also proposes that PINs apply to private and public data collection -including the NSA\u27s surveillance of communications. By recasting privacy harms as a form of pollution and invoking a familiar (if not entirely uncontroversial) domestic regulatory solution either directly or by analogy, the PINs proposal seeks to present a domesticated form of regulation with the potential to ignite a regulatory dynamic by collecting information about the privacy costs of previously unregulated activities that should, in the end, lead to significant results without running afoul of potential U.S. constitutional limits that may constrain data retention and use policies. Finally, the Article addresses three counterarguments focusing on the First Amendment right to data collection, the inadequacy of EISs, and the supposed worthlessness of notice-based regimes

    Regulating Mass Surveillance as Privacy Pollution: Learning from Environmental Impact Statements

    Get PDF
    Encroachments on privacy through mass surveillance greatly resemble the pollution crisis in that they can be understood as imposing an externality on the surveilled. This Article argues that this resemblance also suggests a solution: requiring those conducting mass surveillance in and through public spaces to disclose their plans publicly via an updated form of environmental impact statement, thus requiring an impact analysis and triggering a more informed public conversation about privacy. The Article first explains how mass surveillance is polluting public privacy and surveys the limited and inadequate doctrinal tools available to respond to mass surveillance technologies. Then, it provides a quick summary of the Privacy Impact Notices ( PINs ) proposal to make a case in principle for the utility and validity of PINs. Next, the Article explains how environmental law responded to a similar set problems (taking the form of physical harms to the environment) with the National Environmental Policy Act of 1969 ( NEPA ), requiring Environmental Impact Statement ( EIS ) requirements for environmentally sensitive projects. Given the limitations of the current federal privacy impact analysis requirement, the Article offers an initial sketch of what a PIN proposal would cover and its application to classic public spaces, as well as virtual spaces such as Facebook and Twitter. The Article also proposes that PINs apply to private and public data collection -including the NSA\u27s surveillance of communications. By recasting privacy harms as a form of pollution and invoking a familiar (if not entirely uncontroversial) domestic regulatory solution either directly or by analogy, the PINs proposal seeks to present a domesticated form of regulation with the potential to ignite a regulatory dynamic by collecting information about the privacy costs of previously unregulated activities that should, in the end, lead to significant results without running afoul of potential U.S. constitutional limits that may constrain data retention and use policies. Finally, the Article addresses three counterarguments focusing on the First Amendment right to data collection, the inadequacy of EISs, and the supposed worthlessness of notice-based regimes

    Scheduling and synchronization for multicore concurrency platforms

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.Cataloged from PDF version of thesis.Includes bibliographical references (p. 217-230).Developing correct and efficient parallel programs is difficult since programmers often have to manage low-level details like scheduling and synchronization explicitly. Recently, however, many hardware vendors have been shifting towards building multicore computers. This trend creates an enormous pressure to create concurrency platforms - platforms that provide an easier interface for parallel programming and enable ordinary programmers to write scalable, portable and efficient parallel programs. This thesis provides some provably-good practical solutions to problems that arise in the implementation of concurrency platforms, particularly in the domain of scheduling and synchronization. The first part of this thesis describes work on scheduling of parallel programs written in dynamic multithreaded languages (such as Cilk, Hood etc.). These languages allow the programmer to express parallelism of their code in a natural manner, while an automatic scheduler in the concurrency platform is responsible for scheduling the program on the underlying parallel hardware. This thesis presents designs to increase the functionality of these concurrency platforms. The second part of the thesis presents work on transactional memory semantics and design. Transactional memory (TM), has been recently proposed as an alternative to locks. TM provides a transactional interface to memory. The programmers can specify their critical sections inside a transaction, and the TM concurrency platform guarantees that the region executes atomically. One of the purported advantages of TM over locks is that transactional code is composable.(cont.) Most of the current TM concurrency platforms do not support full composability, however. This thesis addresses two of the composability problems in existing TM concurrency platforms.by Kunal Agrawal.Ph.D

    Memory abstractions for parallel programming

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.Cataloged from PDF version of thesis.Includes bibliographical references (p. 156-163).A memory abstraction is an abstraction layer between the program execution and the memory that provides a different "view" of a memory location depending on the execution context in which the memory access is made. Properly designed memory abstractions help ease the task of parallel programming by mitigating the complexity of synchronization or admitting more efficient use of resources. This dissertation describes five memory abstractions for parallel programming: (i) cactus stacks that interoperate with linear stacks, (ii) efficient reducers, (iii) reducer arrays, (iv) ownershipaware transactions, and (v) location-based memory fences. To demonstrate the utility of memory abstractions, my collaborators and I developed Cilk-M, a dynamically multithreaded concurrency platform which embodies the first three memory abstractions. Many dynamic multithreaded concurrency platforms incorporate cactus stacks to support multiple stack views for all the active children simultaneously. The use of cactus stacks, albeit essential, forces concurrency platforms to trade off between performance, memory consumption, and interoperability with serial code due to its incompatibility with linear stacks. This dissertation proposes a new strategy to build a cactus stack using thread-local memory mapping (or TLMM), which enables Cilk-M to satisfy all three criteria simultaneously. A reducer hyperobject allows different branches of a dynamic multithreaded program to maintain coordinated local views of the same nonlocal variable. With reducers, one can use nonlocal variables in a parallel computation without restructuring the code or introducing races. This dissertation introduces memory-mapped reducers, which admits a much more efficient access compared to existing implementations. When used in large quantity, reducers incur unnecessarily high overhead in execution time and space consumption. This dissertation describes support for reducer arrays, which offers the same functionality as an array of reducers with significantly less overhead. Transactional memory is a high-level synchronization mechanism, designed to be easier to use and more composable than fine-grain locking. This dissertation presents ownership-aware transactions, the first transactional memory design that provides provable safety guarantees for "opennested" transactions. On architectures that implement memory models weaker than sequential consistency, programs communicating via shared memory must employ memory-fences to ensure correct execution. This dissertation examines the concept of location-based memoryfences, which unlike traditional memory fences, incurs latency only when synchronization is necessary.by I-Ting Angelina Lee.Ph.D

    Student Comments

    Get PDF
    Comments on court cases by Stephen J. Squeri, Terry Karnaze, Genevieve M. Keating, James P. Kelley, Thomas W. Millet, Paula Jean Fulks, Gregory G. Murphy, Duane L. Tarnacki, James A. Mayotte, Arthur A, Vogel, Jr., Janet L. Miller, Frank Charles Sabatino, Kathleen M. Gallogly, David A. York, Thomas P. Fitzgerald, Gerald M. Richardson, John K. Vincent, Daniel M. Snow, Lawrence E. Carr III, Margaret M. Jackson, and Martin E. Mooney

    Student Comments

    Get PDF
    Comments on court cases by Maureen E. Reidy, Frederick H. Kopko, Deborah L. Thomas, Diane L. Wolf, Ruth Ann Beyer, Jerome R. Doak, Harold F. Moore, Russell Thomas Alba, Richard S. Myers, Bernadette Muller, Timothy J. Carey, Alcides I. Avila, David F. Parchem, Glenn A. Clark, Thomas P. Powers, Judith A. McMorrow, and Anthony F. Kahn
    corecore