71,066 research outputs found

    Personalised trails and learner profiling within e-learning environments

    Get PDF
    This deliverable focuses on personalisation and personalised trails. We begin by introducing and defining the concepts of personalisation and personalised trails. Personalisation requires that a user profile be stored, and so we assess currently available standard profile schemas and discuss the requirements for a profile to support personalised learning. We then review techniques for providing personalisation and some systems that implement these techniques, and discuss some of the issues around evaluating personalisation systems. We look especially at the use of learning and cognitive styles to support personalised learning, and also consider personalisation in the field of mobile learning, which has a slightly different take on the subject, and in commercially available systems, where personalisation support is found to currently be only at quite a low level. We conclude with a summary of the lessons to be learned from our review of personalisation and personalised trails

    A Deformable Model for Magnetic Vortex Pinning

    Get PDF
    A two-parameter analytical model of the magnetic vortex in a thin disk of soft magnetic material is constructed. The model is capable of describing the change in evolution of net vortex state magnetization and of core position when the vortex core interacts with a magnetic pinning site. The model employs a piecewise, physically continuous, magnetization distribution obtained by the merger of two extensively used one-parameter analytical models of the vortex state in a disk. Through comparison to numerical simulations of ideal disks with and without pinning sites, the model is found to accurately predict the magnetization, vortex position, hysteretic transitions, and 2-D displacement of the vortex in the presence of pinning sites. The model will be applicable to the quantitative determination of vortex pinning energies from measurements of magnetization.Comment: 27 pages, 7 figures, including supplementary information, ancillary files:3 supplementary movie

    Risks, Goals, and Pictographs: Lawyering to the Social Entrepreneur

    Get PDF
    Scholars have argued that transactional lawyers add value by mitigating the potential for post-transaction litigation, reducing transaction costs, acting as reputational intermediaries, and lowering regulatory costs. Effective transactional attorneys understand their clients’ businesses and the industries or contexts in which those businesses operate. Applied to the start-up social enterprise context, understanding the client includes understanding the founders’ values, preferences, and proclivity for risk. The novel transactions and innovative solutions pursued by emerging social entrepreneurs may not lend themselves well to risk avoidance. For example, new corporate forms such as the benefit corporation are untested, yet appeal to many social entrepreneurs who wish to use a single entity to pursue dual missions. Novelty in a transaction or governance arrangement, as opposed to precedent, means that the risk of litigation or regulatory inquiry may rise. However, a lawyer—and particularly the student attorney without practice experience—may be prone to risk aversion. Lawyers are often described by themselves and by others as “conservative, risk-averse, precedent-bound, and wedded to a narrow, legalistic range of problem solving strategies.” On one hand, risk aversion can inhibit a lawyer’s ability to “think outside the box” and take the innovative approaches that their social enterprise clients need. On the other hand, a lawyer’s risk aversion may add value to a social enterprise to the extent that the lawyer can be a “sounding board to help clients balance risk-prone ideas.” In the Social Enterprise & Nonprofit Law Clinic at Georgetown Law, student attorneys learn to practice client-centered lawyering in their representation of social enterprise clients. In this Essay, I discuss (i) plausible risk profiles of student attorneys and their social enterprise clients; (ii) a client-centered lawyering approach that deters a student attorney from projecting her own risk aversion onto her clients and allows her to act as a “sounding board” armed with legal analysis to help her client make informed decisions; and (iii) one of the counseling tools that facilitates this client-centered approach. The counseling tool—a pictograph, or visual representation that communicates three-dimensional qualitative information—dictates that the client’s preferences take priority over the student attorney’s risk profile, but also allows the student attorney to present and frame the advantages and disadvantages of a particular decision point in relation to the client’s expressed goals

    Incorporating Security Behaviour into Business Models Using a Model Driven Approach

    Get PDF
    There has, in recent years, been growing interest in Model Driven Engineering (MDE), in which models are the primary design artifacts and transformations are applied to these models to generate refinements leading to usable implementations over specific platforms. There is also interest in factoring out a number of non-functional aspects, such as security, to provide reusable solutions applicable to a number of different applications. This paper brings these two approaches together, investigating, in particular, the way behaviour from the different sources can be combined and integrated into a single design model. Doing so involves transformations that weave together the constraints from the various aspects and are, as a result, more complex to specify than the linear pipelines of transformations used in most MDE work to date. The approach taken here involves using an aspect model as a template for refining particular patterns in the business model, and the transformations are expressed as graph rewriting rules for both static and behaviour elements of the models

    Performance measures of net-enabled hypercompetitive industries: the case of tourism

    Get PDF
    This paper investigates the theory and practise of e-metrics. It examines the tourism sector as one of the most successful sectors on-line and identifies best practice in the industry. Qualitative research with top e-Marketing executives demonstrates the usage and satisfaction levels from current e-metrics deployment, selection of e-metrics for ROI calculation as well as intention of new e-metrics implementation and future trends and developments. This paper concludes that tourism organizations gradually realise the value of e-measurement and are willing to implement e-metrics to enable them evaluate the effectiveness of their planning processes and assess their results against their short and the long term objectives

    How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL

    Get PDF
    Social relationships are a natural basis on which humans make trust decisions. Online Social Networks (OSNs) are increasingly often used to let users base trust decisions on the existence and the strength of social relationships. While most OSNs allow users to discover the length of the social path to other users, they do so in a centralized way, thus requiring them to rely on the service provider and reveal their interest in each other. This paper presents Social PaL, a system supporting the privacy-preserving discovery of arbitrary-length social paths between any two social network users. We overcome the bootstrapping problem encountered in all related prior work, demonstrating that Social PaL allows its users to find all paths of length two and to discover a significant fraction of longer paths, even when only a small fraction of OSN users is in the Social PaL system - e.g., discovering 70% of all paths with only 40% of the users. We implement Social PaL using a scalable server-side architecture and a modular Android client library, allowing developers to seamlessly integrate it into their apps.Comment: A preliminary version of this paper appears in ACM WiSec 2015. This is the full versio
    • 

    corecore