67,166 research outputs found
Recommended from our members
Landscape Study in Wireless and Mobile Learning in the post-16 sector
In the post-16 sector (further and higher education, and adult and community learning) there is a need to understand how wireless and mobile technologies can contribute to improving the student experience of learning, and help institutions fulfil their missions in an age of incomparably fast technological change. In the context of this interest and growing need, a Landscape Study project was commissioned by JISC through the Innovation strand of the JISC e-Learning Programme in 2004-5. Our project aims were to take a birds-eye view of developments and practice in the UK and internationally, and to communicate our findings to a broad and varied audience. The Summary report is accompanied by 3 associated reports on 'Current Uses', 'Potential Uses' and 'Strategic Aspects'. (The four reports are available in one single document here.
Supporting community engagement through teaching, student projects and research
The Education Acts statutory obligations for ITPs are not supported by the Crown funding model. Part of the statutory role of an ITP is â... promotes community learning and by research, particularly applied and technological research ...â [The education act 1989]. In relation to this a 2017 TEC report highlighted impaired business models and an excessive administrative burden as restrictive and impeding success. Further restrictions are seen when considering ITPs attract < 3 % of the available TEC funding for research, and ~ 20 % available TEC funding for teaching, despite having overall student efts of ~ 26 % nationally.
An attempt to improve performance and engage through collaboration (community, industry, tertiary) at our institution is proving successful. The cross-disciplinary approach provides students high level experience and the technical stretch needed to be successful engineers, technologists and technicians.
This study presents one of the methods we use to collaborate externally through teaching, student projects and research
Recommended from our members
mHealth Research Applied to Regulated and Unregulated Behavioral Health Sciences
Behavioral scientists are developing new methods and frameworks that leverage mobile health technologies to optimize individual level behavior change. Pervasive sensors and mobile apps allow researchers to passively observe human behaviors âin the wildâ 24/7 which supports delivery of personalized interventions in the real-world environment. This is all possible because these technologies contain an incredible array of sensors that allow applications to constantly record user location and can contextualize current environmental conditions through barometers, thermometers, and ambient light sensors and can also capture audio and video of the user and their surroundings through multiple integrated high-definition cameras and microphones. These tools are a game changer in behavioral health research and, not surprisingly, introduce new ethical, regulatory/legal and social implications described in this article
Preparing millennials as digital citizens and socially and environmentally responsible business professionals in a socially irresponsible climate
As of 2015, a millennial born in the 1990's became the largest population in
the workplace and are still growing. Studies indicate that a millennial is tech
savvy but lag in the exercise of digital responsibility. In addition, they are
passive towards environmental sustainability and fail to grasp the importance
of social responsibility. This paper provides a review of such findings
relating to business communications educators in their classrooms. The
literature should enable the development of a millennial as an excellent global
citizen through business communications curricula that emphasizes digital
citizenship, environmental sustainability and social responsibility. The
impetus for this work is to provide guidance in the development of courses and
teaching strategies customized to the development of each millennial as a
digital, environmental and socially responsible global citizen
Resource Efficient Authentication and Session Key Establishment Procedure for Low-Resource IoT Devices
open access journalThe Internet of Things (IoT) can includes many resource-constrained devices, with most usually needing to securely communicate with their network managers, which are more resource-rich devices in the IoT network. We propose a resource-efficient security scheme that includes authentication of devices with their network managers, authentication between devices on different networks, and an attack-resilient key establishment procedure. Using automated validation with internet security protocols and applications tool-set, we analyse several attack scenarios to determine the security soundness of the proposed solution, and then we evaluate its performance analytically and experimentally. The performance analysis shows that the proposed solution occupies little memory and consumes low energy during the authentication and key generation processes respectively. Moreover, it protects the network from well-known attacks (man-in-the-middle attacks, replay attacks, impersonation attacks, key compromission attacks and denial of service attacks)
- âŠ