118,847 research outputs found

    Social Web Applications as Means to Enhance Lifelong Learning and Professional Development of Teachers: A Tool to Support Assessment of Their Impact

    Get PDF
    The application of new technologies in classroom has made the need for constant professional development more important for teachers. They should be able to keep up with the technological development in the classroom. Their professional development includes constant upgrade of their skills and knowledge on how they can meet the needs of their students or address issues derived from ICTs application in classroom. Social Web applications are providing new opportunities to build and gain such professional development by assisting to remain current on skills and issues important for a professional role. Aim of the present work is to contribute to the assessment of impact of Social Web applications for teachers’ professional development by presenting specific case studies and proposing an ICT tool to be used for the collection of useful quantitative indicators supporting this impact assessment. The assesment derived from a specific showcase of its application, provided real case results on the usage of Social Web tools from teachers which could be a useful asset towards the design of teacher training programs for the effective use of social networking tools

    Securing library information system: Vulnerabilities and threats

    Get PDF
    Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet. Library Information Systems is also vulnerable to attack since it is a public access institution. Majority of users are naive when it comes to computer and network securities. Some breaches in Library Information System are intentional and some are unintentional. Risks analysis should be done to find the threats and risks in designing the Library Information System. Threats are made possible due to lack of proper procedures, software flaws and policies. The administrators should anticipate all the possible attacks and their mitigation techniques. In this paper, we will try to address various issues arise from this vulnerabilities and threats. We will also describe how we can reduce and overcome this vulnerabilities and threats

    A Process Framework for Semantics-aware Tourism Information Systems

    Get PDF
    The growing sophistication of user requirements in tourism due to the advent of new technologies such as the Semantic Web and mobile computing has imposed new possibilities for improved intelligence in Tourism Information Systems (TIS). Traditional software engineering and web engineering approaches cannot suffice, hence the need to find new product development approaches that would sufficiently enable the next generation of TIS. The next generation of TIS are expected among other things to: enable semantics-based information processing, exhibit natural language capabilities, facilitate inter-organization exchange of information in a seamless way, and evolve proactively in tandem with dynamic user requirements. In this paper, a product development approach called Product Line for Ontology-based Semantics-Aware Tourism Information Systems (PLOSATIS) which is a novel hybridization of software product line engineering, and Semantic Web engineering concepts is proposed. PLOSATIS is presented as potentially effective, predictable and amenable to software process improvement initiatives

    Mobile reflections (MoRe) pilot, developing reflection within initial teacher training for students with dyslexia

    Get PDF
    The MoRe (Mobile Reflections) pilot was designed to explore whether the use of freely available Web 2.0 technology and mobile phones could assist dyslexic student teachers to develop reflective skills by capturing their reflections using audio within a shared online learning space

    About using Mobile Reflections

    Get PDF
    a short guid

    Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures

    Get PDF
    An IT risk assessment must deliver the best possible quality of results in a time-effective way. Organisations are used to customise the general-purpose standard risk assessment methods in a way that can satisfy their requirements. In this paper we present the QualTD Model and method, which is meant to be employed together with standard risk assessment methods for the qualitative assessment of availability risks of IT architectures, or parts of them. The QualTD Model is based on our previous quantitative model, but geared to industrial practice since it does not require quantitative data which is often too costly to acquire. We validate the model and method in a real-world case by performing a risk assessment on the authentication and authorisation system of a large multinational company and by evaluating the results w.r.t. the goals of the stakeholders of the system. We also perform a review of the most popular standard risk assessment methods and an analysis of which one can be actually integrated with our QualTD Model

    Toward an overall analytical framework for the integrated sustainability assessment of the production and supply of raw materials and primary energy carriers

    Get PDF
    The sustainable production and supply of raw materials (nonenergy raw materials) and primary energy carriers (energy raw materials) is a core element of many policies. The natural resource base for their production and supply, and the access thereto, are limited. Moreover, raw material supply is high on environmental and social impact agendas as well. A broad, quantitative framework that supports decision makers is recommended so as to make use of raw materials and primary energy carriers more sustainably. First, this article proposes a holistic classification of raw materials and primary energy carriers. This is an essential prerequisite for developing an integrated sustainability assessment framework (ISAF). Indeed, frequently, only a subset of raw materials and primary energy carriers are considered in terms of their source, sector, or final application. Here, 85 raw materials and 30 primary energy carriers overall are identified and grouped into seven and five subgroups, respectively. Next, this article proposes a quantitative ISAF for the production and supply of raw materials and primary energy carriers, covering all the sustainability pillars. With the goal of comprehensiveness, the proposed ISAF integrates sustainability issues that have been covered and modeled in quite different quantitative frameworks: ecosystem services; classical life cycle assessment (LCA); social LCA; resource criticality assessment; and particular international concerns (e.g., conflict minerals assessment). The resulting four areas of concerns (i.e., environmental, technical, economic, and social/societal) are grouped into ten specific sustainability concerns. Finally, these concerns are quantified through 15 indicators, enabling the quantitative sustainability assessment of the production and supply of raw materials and primary energy carriers

    Building in web application security at the requirements stage : a tool for visualizing and evaluating security trade-offs : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Albany, New Zealand

    Get PDF
    One dimension of Internet security is web application security. The purpose of this Design-science study was to design, build and evaluate a computer-based tool to support security vulnerability and risk assessment in the early stages of web application design. The tool facilitates risk assessment by managers and helps developers to model security requirements using an interactive tree diagram. The tool calculates residual risk for each component of a web application and for the application overall so developers are provided with better information for making decisions about which countermeasures to implement given limited resources tor doing so. The tool supports taking a proactive approach to building in web application security at the requirements stage as opposed to the more common reactive approach of putting countermeasures in place after an attack and loss have been incurred. The primary contribution of the proposed tool is its ability to make known security-related information (e.g. known vulnerabilities, attacks and countermeasures) more accessible to developers who are not security experts and to translate lack of security measures into an understandable measure of relative residual risk. The latter is useful for managers who need to prioritize security spending. Keywords: web application security, security requirements modelling, attack trees, threat trees, risk assessment
    • …
    corecore