11,162 research outputs found

    U-ATM: An Autonomous Trust Model for Exploring Ubiquitous Collective

    Get PDF
    Ubiquitous e-service is one of the most recent links in the chain of evolution that has characterized the different eras of the internetworking environment. In order to leap the trust barrier for the user to embracing these ubiquitous e-services, we propose an Autonomous Trust Model for exploring collective wisdom in the ubiquitous environment (hereafter termed “U-ATM”) as an instance of ASEM. ASEM (Ambient e-Service Embracing Model) addresses the core elements (of relevance to the integrated concern of trust, reputation and privacy) required for assuring such desired features as convenience, safety, fairness and collaboration for mobile users when they engage with ambient e-services. The U-ATM highlights the distributed peer-to-peer interactions under an ad-hoc network composition. It especially accommodates the dynamic short-lived identity characteristics and lightweight computational capacity of mobile devices. The U-ATM we have developed is based on the ZigBee architecture as a collaborative application in the upper layer of the ubiquitous environment. U-ATM design concepts are elaborated and evaluated. A simulation is conducted. Simulation outcomes for trust decision quality enhancement show significant improvement over traditional designs. U-ATM makes it possible for users to collaborate with the nearby user groups for establishing a reliable and trustworthy interaction environment. It also facilitates and empowers the potential benefits of various ubiquitous e-service applications

    In what ways does policy on academic integrity, copyright and privacy need to respond in order to accommodate assessment with Web 2.0 tools?

    Full text link
    Increasingly social web technologies, such as blogging and micro-blogging, audio and video podcasting, photo/video, social bookmarking, social networking, wiki writing or virtual worlds are being used as forms of authoring or content creation to support students&rsquo; learning in higher education. As Web 2.0 teaching practice is characterised by open access to information and collaborative networks there are both familiar and novel challenges for policy-makers in higher education institutions. The Government 2.0 Taskforce heralded legislative and practice changes necessary because of Web 2.0. We reflect on the qualitative feedback received from innovative higher education practitioners using Web 2.0 to assess student work. This indicates a need for information policy review to accommodate the cultural shift towards information exchange and communication across traditional institutional boundaries. Issues involved when implementing Web 2.0 assessments are identified to highlight requisite areas for policy improvement in higher education, in particular for academic integrity, copyright and privacy policies<br /

    Emerging technologies for learning (volume 2)

    Get PDF

    In what ways does policy on academic integrity, copyright and privacy need to respond in order to accommodate assessment with Web 2.0 tools?

    Get PDF
    Increasingly social web technologies, such as blogging and micro-blogging, audio and video podcasting, photo/video, social bookmarking, social networking, wiki writing or virtual worlds are being used as forms of authoring or content creation to support students’ learning in higher education. As Web 2.0 teaching practice is characterised by open access to information and collaborative networks there are both familiar and novel challenges for policy-makers in higher education institutions. The Government 2.0 Taskforce heralded legislative and practice changes necessary because of Web 2.0. We reflect on the qualitative feedback received from innovative higher education practitioners using Web 2.0 to assess student work. This indicates a need for information policy review to accommodate the cultural shift towards information exchange and communication across traditional institutional boundaries. Issues involved when implementing Web 2.0 assessments are identified to highlight requisite areas for policy improvement in higher education, in particular for academic integrity, copyright and privacy policie

    Linking information and people in a social system for academic conferences

    Get PDF
    This paper investigates the feasibility of maintaining a social information system to support attendees at an academic conference. The main challenge of this work was to create an infrastructure where users’ social activities, such as bookmarking, tagging, and social linking could be used to enhance user navigation and maximize the users’ ability to locate two important types of information in conference settings: presentations to attend and attendees to meet. We developed Conference Navigator 3, a social conference support system that integrates a conference schedule planner with a social linking service. We examined its potential and functions in the context of a medium-scale academic conference. In this paper, we present the design of the system’s socially enabled features and report the results of a conference-based study. Our study demonstrates the feasibility of social information systems for supporting academic conferences. Despite the low number of potential users and the short timeframe in which conferences took place, the usage of the system was high enough to provide sufficient data for social mechanisms. The study shows that most critical social features were highly appreciated and used, and provides direction for further research

    From Social Data Mining to Forecasting Socio-Economic Crisis

    Full text link
    Socio-economic data mining has a great potential in terms of gaining a better understanding of problems that our economy and society are facing, such as financial instability, shortages of resources, or conflicts. Without large-scale data mining, progress in these areas seems hard or impossible. Therefore, a suitable, distributed data mining infrastructure and research centers should be built in Europe. It also appears appropriate to build a network of Crisis Observatories. They can be imagined as laboratories devoted to the gathering and processing of enormous volumes of data on both natural systems such as the Earth and its ecosystem, as well as on human techno-socio-economic systems, so as to gain early warnings of impending events. Reality mining provides the chance to adapt more quickly and more accurately to changing situations. Further opportunities arise by individually customized services, which however should be provided in a privacy-respecting way. This requires the development of novel ICT (such as a self- organizing Web), but most likely new legal regulations and suitable institutions as well. As long as such regulations are lacking on a world-wide scale, it is in the public interest that scientists explore what can be done with the huge data available. Big data do have the potential to change or even threaten democratic societies. The same applies to sudden and large-scale failures of ICT systems. Therefore, dealing with data must be done with a large degree of responsibility and care. Self-interests of individuals, companies or institutions have limits, where the public interest is affected, and public interest is not a sufficient justification to violate human rights of individuals. Privacy is a high good, as confidentiality is, and damaging it would have serious side effects for society.Comment: 65 pages, 1 figure, Visioneer White Paper, see http://www.visioneer.ethz.c

    Emerging technologies for learning report (volume 3)

    Get PDF

    Mobility, physical space and learning

    Get PDF
    Our biological inheritance is to sense the world through many channels including the non verbal. Learning theory, in both organizational and pedagogic contexts, has come to recognise as much, yet the dominant physical expressions given to learning space in both contexts remain rooted in linear arrangements. The advent of contemporary human processing tools and artefacts have the potential to liberate the learner yet space designs, driven by dictates of notional efficiency and a view of work and learning as separate, stationary processes, constrain through a reduction in the natural reliance on sensorial, embodied human capacities. With an example of case material, we suggest an asynchronous co-evolutionary process, a syncretisation of learning theories and space design. Granting physical expression to modern views of the learning process as mobile and corporeal can, accelerate learning. Key words Workspace, workplace, learning, complexity, organizational ecology, mobilit

    Social Media in the Dental School Environment, Part A: Benefits, Challenges, and Recommendations for Use

    Get PDF
    Social media consist of powerful tools that impact not only communication but relationships among people, thus posing an inherent challenge to the traditional standards of who we are as dental educators and what we can expect of each other. This article examines how the world of social media has changed dental education. Its goal is to outline the complex issues that social media use presents for academic dental institutions and to examine these issues from personal, professional, and legal perspectives. After providing an update on social media, the article considers the advantages and risks associated with the use of social media at the interpersonal, professional, and institutional levels. Policies and legal issues of which academic dental institutions need to be aware from a compliance perspective are examined, along with considerations and resources needed to develop effective social media policies. The challenge facing dental educators is how to capitalize on the benefits that social media offer, while minimizing risks and complying with the various forms of legal constraint
    • …
    corecore