7,129 research outputs found

    Emerging trends on the topic of Information Technology in the field of Educational Sciences: a bibliometric exploration

    Get PDF
    The paper presents a bibliometric analysis on the topic of Information Technology (IT) in the field of Educational Sciences, aimed at envisioning the research emerging trends. The ERIC data base is used as a consultation source; the results were subjected to productivity by authors, journals, and term co-occurrence analysis indicators for the period 2009-2013. The productivity of Computers & Education, and Turkish Online Journal of Educational Technology-TOJET, as well as the preceding authors from Canada, have been emphasized. The more used terms are the following: Information technology, foreign countries, educational technology, technology integration, and student attitudes. Researches performed here seem to have a largely qualitative character, highlighting computers and internet as the mostly explored technological objects. The largest subject matter trend refers to the integration of IT in the higher education learning context, and its incidence over the teaching methods

    Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning

    Get PDF
    Learning-based pattern classifiers, including deep networks, have shown impressive performance in several application domains, ranging from computer vision to cybersecurity. However, it has also been shown that adversarial input perturbations carefully crafted either at training or at test time can easily subvert their predictions. The vulnerability of machine learning to such wild patterns (also referred to as adversarial examples), along with the design of suitable countermeasures, have been investigated in the research field of adversarial machine learning. In this work, we provide a thorough overview of the evolution of this research area over the last ten years and beyond, starting from pioneering, earlier work on the security of non-deep learning algorithms up to more recent work aimed to understand the security properties of deep learning algorithms, in the context of computer vision and cybersecurity tasks. We report interesting connections between these apparently-different lines of work, highlighting common misconceptions related to the security evaluation of machine-learning algorithms. We review the main threat models and attacks defined to this end, and discuss the main limitations of current work, along with the corresponding future challenges towards the design of more secure learning algorithms.Comment: Accepted for publication on Pattern Recognition, 201

    "If I join forces with Mr. Kuhn": Polanyi and Kuhn as Mutually Supportive and Corrective

    Get PDF
    My purpose is to examine how Kuhn and Polanyi might be mutually supportive and corrective so as to join forces in providing a more comprehensive understanding of the progress of science. My presentation will be divided into three parts: (I) The common ground Kuhn shares with Polanyi; (II) Four soft spots in Kuhn and their remedy; (III) Clarifying and upgrading Polanyi appeal to "objective reality.

    Electronic Visit Verification: The Weight of Surveillance and the Fracturing of Care

    Get PDF
    In Electronic Visit Verification: The Weight of Surveillance and the Fracturing of Care, Data & Society Researcher Alexandra Mateescu finds that the surveillance of US home care workers through a state-funded mobile app called electronic visit verification ("EVV") erodes critical support for people with disabilities and older adults while offloading significant, unacknowledged burdens onto both workers and service recipients.Drawing on interviews with advocates, activists, and twenty workers and service recipients across the country, Mateescu describes how the rollout of EVV systems within Medicaid home- and community-based programs was built on a poor understanding of how services are actually provided

    Education alignment

    Get PDF
    This essay reviews recent developments in embedding data management and curation skills into information technology, library and information science, and research-based postgraduate courses in various national contexts. The essay also investigates means of joining up formal education with professional development training opportunities more coherently. The potential for using professional internships as a means of improving communication and understanding between disciplines is also explored. A key aim of this essay is to identify what level of complementarity is needed across various disciplines to most effectively and efficiently support the entire data curation lifecycle
    • …
    corecore