119,048 research outputs found
The Planning and Implementation of Computer-based Games for Project Risk Management Education: A Preliminary Case Study
This paper reports the preliminary stages of an action research project for the design, development and assessment of a computer-based game for student learning about project risk management. A computer game was created through the use of systems dynamic software (Simsoft) incorporating a land development project. The game was played by final year undergraduate construction management students who had to make decisions in identifying, assessing and managing project risks. A survey of their experience found: that most students had not experienced this form of online educational game previously in their studies despite the ubiquity of information technology for learning purposes in the university sector; there was no strong support for the idea that the acquisition of knowledge was better compared to conventional learning through lectures and books; the computer-based experience was enjoyable thus indicating it drew them into the learning environment; and student testing found they had gained understanding of the project risk management process
Recommended from our members
Police Knowledge Exchange: Full Report 2018
[Executive Summary]
This report was commissioned to explore the enablers and barriers to sharing within and between police forces and between police forces and partners, including the public. This was completed from an interdisciplinary review of international literature covering sharing, knowledge exchange, learning and organisational learning. The literature broke down into four main factors; who, why, what and how. An introduction to the literature is presented with âWhoâ is sharing which considers both personal identity and different institutional issues. The âWhyâ literature covers issues of cultural and community motivators and barriers. The âWhatâ segment reviews concepts of data, information and knowledge and related legislative issues. Finally, the âhowâ section spans face to face sharing approaches to technologies that produce both enablers and barriers. A series of 42 in-depth interviews and focus groups were completed and combined with 47 survey responses . The aim of the interviews, focus groups and survey was to show perceptions and beliefs around knowledge sharing from a small sample across policing in order to complement the findings from the literature review.
The survey was adapted from a standardised questionnaire (Biggs, 1987). The Biggs questionnaire focused on what motivated students to learn and how they approached their learning. Our adapted survey looked at what motivated police to share, and how they approached sharing. The responses showed a trend, across the police, towards a motivation for sharing to develop a deeper understanding of issues. However, the approaches and the strategies they used to share with others, which were primarily driven by achieving and surface approaches (to get promoted and get the job done). According to Biggs (1987) this could leave them discontented as they never progress to a deeper understanding of issues. Scaffolding sharing within the police through processes that are clearly defined, effective and valued could help to overcome these issues.
Within the interviews and focus group findings a similar structured approach to sharing was adopted. Within the âwhoâ section some key aspects around personal relationships, reciprocity and reputation were identified. The âwhyâ the police share was one of the largest discussion points. Not only was there a deep motivation to solve key policing issues there was an approach of reciprocity. Police sharing was deeply motivated to support âgood practiceâ in the prevention and detection of crime. However, a sharing barrier was identified in the parity of value given to different types of knowledge for example between professional judgement and research evidence knowledge. Sharing was achieved when there were reciprocal benefits, in particular with personal networks or face to face sharing which was noted as âsafeâ. Again, this was inhibited by misunderstandings around the ârisksâ of sharing, frequently attributed to data protection legislation; producing cautious reactions and as an avoidance tactic to save time and effort sharing. However, a divide was noted between technical users and those who avoided any online systems for sharing; often due to poorly designed systems and a lack of confidence in how to use systems. The police culture was identified as being risk-adverse, and competitive due to multiple factors, a lack of supported time to share, Her Majestyâs Inspectorate of Constabulary (HMIC) reviews and promotion criteria. The result was perceived to be a poor cultural ability to learn from mistakes and a likelihood to repeat errors.
A set of strategic recommendations are given and include the use of a sharing authorised professional practice for HMIC reviews, sharing networks and training. A further set of operational recommendations are given such as; sharing impact cases for evidence based practice, data sharing officers and evaluating mechanisms for sharing.
This full report is supported by the Police Knowledge Exchange Summary Report 2018 which gives an overview of the findings and recommendations
Recommended from our members
E-learning adoption in higher education in Jordan: vision, reality and change
This paper discusses the implementation of an e-learning program at a Jordanian University (Al-Ahliyya Amman University). The program originally aimed to establish a virtual university which offers totally online courses but due to a number of reasons there had to be some changes in the implementation process. The paper discusses such changes and challenges faced by AAU in implementing its e-learning program from an IS project management point of view. Findings suggest that implementing such projects needs careful consideration of a variety of issues to ensure that the objectives are achieved. The case provides rich insights to other educational institutions wishing to implement such projects
Next Generation User Skills
The world is awash with statistics on the impact of the web on 21st century living, learning and working. They are accompanied by the pronouncements and predictions of experts from every camp, from those heralding a new brave new world of co-creation and choice, to warnings from the dark side in terms of ethics and educational standards, tempered by increasing recognition that âweâ may no longer be in control of such matters. Meanwhile, surveys report that around 80% of businesses have invested in IT and 60% have websites. Whilst the extent and value of adoption differs significantly across businesses and sectors, the foundations for new ways of working and doing business are broadly in place, with older and static businesses typifying the laggards. It would not be unsafe to project that, by 2013, even more people will be required to use ICT in the workplace and in their everyday lives, increasingly involving online communication and web-based applications. This represents a scenario to which those responsible for developing curricula and awards must respond â in the primary and secondary phases, vocational and applied learning, work based and adult community provision and higher education. To ensure the relevance of and to influence the ongoing enhancement of user ICT provision and the associated awards, Digital 2020 and the Scottish Qualifications Authority jointly commissioned Sero Consulting to develop a vision for ICT user skills in 2013 â âNext Generation User Skillsâ â taking account of: âą Skills that all employers will need, which they may not currently recognise. âą Skills that people (especially young people) will already have, but which may not be accredited. âą Essential skills for living and learning in a digital age. This paper is drawn from the resulting public report, âNext Generation User Skills â Working, Learning & Living Online in 2013â (September 2008), which provides: âą An overview of the current ICT user skills landscape. âą A model representing digital activities and competencies that might constitute the âNext Generation User Skillscapeâ. âą A mapping of that activity space onto tools and awards, with a gap analysis identifying weaknesses in provision. âą An overview of the recommendations to the report sponsors
Identifying immersive environmentsâ most relevant research topics: an instrument to query researchers and practitioners
This paper provides an instrument for ascertaining researchersâ perspectives on the relative relevance of technological challenges facing immersive environments in view of their adoption in learning contexts, along three dimensions: access, content production, and deployment. It described its theoretical grounding and expert-review process, from a set of previously-identified challenges and expert feedback cycles. The paper details the motivation, setup, and methods employed, as well as the issues detected in the cycles and how they were addressed while developing the instrument. As a research instrument, it aims to be employed across diverse communities of research and practice, helping direct research efforts and hence contribute to wider use of immersive environments in learning, and possibly contribute towards the development of news
and more adequate systems.The work presented herein has been partially funded under the European H2020 program H2020-ICT-2015, BEACONING project, grant agreement nr. 687676.info:eu-repo/semantics/publishedVersio
Addressing the cyber safety challenge: from risk to resilience
Addressing the cyber safety challenge: from risk to resilience describes the cyber safety issues emerging from a range of technology trends, how different populations are using technologies and the risks they face, and how we can effectively respond to each groupâs unique cyber safety needs.
Written by the University of Western Sydney for Telstra Corporation Ltd, the report advocates for continuing to move cyber safety from a ârisk and protectionâ framework to one that focuses on building digital resilience, as well as fostering trust and confidence in the online environment. To do this we need to:
Address the needs of populations often neglected by current policies and programs â including adults, seniors, parents, and small to medium enterprises
Continue to build the digital literacy skills of all populations, because digital literacy strongly influences usersâ ability to engage safely online â this is best achieved by a hands-on learning approach
Keep risk in perspective â the risks and benefits of digital participation go hand in hand
Broaden the focus from awareness-raising to long-term behaviour change.
As digital technologies become further integrated into the everyday lives of Australians, users are potentially exposed to greater risks. However, the risks and benefits of digital participation go hand in hand. The challenge, therefore, is to support users to minimise the risks without limiting their digital participation and their capacity to derive the full benefits of connectivity. If Australians are to benefit as either consumers or providers of online services and products in the e-commerce environment, consumer safety and trust need to be improved.
Cyber safety needs to be considered against a transforming backdrop of technology trends, products and practices. While the rise of social media has tended to dominate recent debate and developments in cyber safety, particularly in relation to young people, a range of other trends is also shaping how users engage online, the risks they potentially face in the new media landscape, and the strategies used to address them. These trends include the rise of user generated content and content sharing platforms; the uptake of mobile technologies and, in particular, the adoption of smartphones; cloud computing; platform integration and single sign-on mechanisms; and the rise of GPS and location based services
Planning strategically, designing architecturally : a framework for digital library services
In an era of unprecedented technological innovation and evolving user expectations and information seeking behaviour, we are arguably now an online society, with digital services increasingly common and increasingly preferred. As a trusted information provider, libraries are in an advantageous position to respond, but this requires integrated strategic and enterprise architecture planning, for information technology (IT) has evolved from a support role to a strategic role, providing the core management systems, communication networks, and delivery channels of the modern library. Further, IT components do not function in isolation from one another, but are interdependent elements of distributed and multidimensional systems encompassing people, processes, and technologies, which must consider social, economic, legal, organisational, and ergonomic requirements and relationships, as well as being logically sound from a technical perspective. Strategic planning provides direction, while enterprise architecture strategically aligns and holistically integrates business and information system architectures. While challenging, such integrated planning should be regarded as an opportunity for the library to evolve as an enterprise in the digital age, or at minimum, to simply keep pace with societal change and alternative service providers. Without strategy, a library risks being directed by outside forces with independent motivations and inadequate understanding of its broader societal role. Without enterprise architecture, it risks technological disparity, redundancy, and obsolescence. Adopting an interdisciplinary approach, this conceptual paper provides an integrated framework for strategic and architectural planning of digital library services. The concept of the library as an enterprise is also introduced
E-safety and Web 2.0: Web 2.0 technologies for learning at Key Stages 3 and 4
Becta commissioned the University of Nottingham in conjunction with London Knowledge Lab and Manchester Metropolitan University to research Web 2.0 technologies for learning at Key Stages 3 and 4. This is the fourth report from that research and concentrates on the e-safety aspects of Web 2.0 in education
Bringing Global Sourcing into the Classroom: Experiential Learning via Software Development Project
Global sourcing of software development has imposed new skill requirements on Information Technology (IT) personnel. In the U.S., this has resulted in a paradigm shift from technical to softer skills such as communications and virtual team management. Higher education institutions must, consequently, initiate innovative curriculum transformations to better prepare students for these emerging workforce needs. This paper describes one such venture between Marquette University (MU), U.S.A. and Management Development Institute (MDI), India, wherein IT students at MU collaborated with Management Information Systems (MIS) students at MDI on an offshore software development project. The class environment replicated an offshore client/vendor relationship in a fully virtual setting while integrating communications and virtual team management with traditional IT project management principles. Course measures indicated that students benefited from this project, gained first-hand experience in the process of software offshoring, and learned skills critical for conduct of global business. For faculty considering such initiatives, we describe the design and administration of this class over two semesters, lessons learned from our engagement, and factors critical to success of such initiatives and those detrimental to their sustenance
EU - Information and Communication Technology (ICT) and e-learning in Education Project - Phase II
The training needs analysis was conducted beteeen February and April 2015 for the EU funded project: ICT in Education in Kosovo. The processes required to perform the traning needs analysis have been. The design of a framework of competences; The identification of target groups; The creation and implementation of an online survey to assess the competence of education sector personnel against the competences contained in the framework; The collation, preparation and analysis of the survey data; and Reporting the research findings.European Union Office in KosovoEuropeAid/133846/C/SER/X
- âŠ