4,397 research outputs found

    Early evaluation of Unistats: user experiences

    Get PDF
    This paper sets out the findings of the user evaluation of Unistats.UK Higher Education Funding Bodie

    First steps in the study of cyber-psycho-cognitive operations

    Get PDF
    Dissertação (mestrado)—Universidade de BrasĂ­lia, Instituto de RelaçÔes Internacionais, Programa de PĂłs-Graduação em RelaçÔes Internacionais, 2019.O presente trabalho Ă© uma anĂĄlise dos mecanismos informĂĄticos e tecno-comunicacionais envolvidos na articulação de mundos da vida orientados estrategicamente para estimular, prever ou minar o desenvolvimento das condiçÔes psico-cognitivas adequadas para a construção e sustento da legitimidade racional de uma autoridade ou ação polĂ­tica. A aplicação de instrumentos “arqueolĂłgicos” Foucauldianos ao estudo das narrativas polĂ­ticas que engendraram e surgiram de “Russiagate” permitiu situar a teoria num contexto histĂłrico e validar a premissa da convergĂȘncia e incorporação de tendĂȘncias de agendamento comuns e de prĂĄticas tĂ­picas de operaçÔes psicolĂłgicas tradicionais. Contudo, os efeitos tanto da disponibilidade comercial das TICs com capacidade de “deep learning”, quanto da estruturação baseada em conhecimento permitida pela ubiquidade e centralidade econĂŽmica dessas tecnologias, tornam o conjunto de mecanismos analisados num fenĂŽmeno que merece uma conceptualização e marco investigativo Ășnicos. A obra Ă© uma contribuição a esse empreendimento.This is an analysis of the ICT-based mechanisms involved in the articulation of lifeworlds that are strategically oriented to foster, prevent or undermine the development of psycho-cognitive conditions adequate for the construction or sustainability of an authority’s or a political action’s rational legitimacy. While grounding theory to a historical context, the application of Foucauldian “archeological” instruments to the study of the political narratives giving birth and springing from “Russiagate” also served to validate the premised convergence and incorporation of common agenda-setting trends and practices typical of traditional psychological operations. However, the effects of both the commercial availability of deep-learning ICTs and the cognition-based structuration afforded by their ubiquity and economic centrality set this “dispositif” apart, thereby deserving a unique conceptualization and research framework. This study is a contribution to such endeavor

    An Inquiry into Bloom's Taxonomy as a Hierarchy and Means for Teaching Legal Research Skills

    Get PDF
    Includes bibliographic references.Pedagogy requires both a theory and a consistent method of implementation. While the literature of law librarianship abounds in suggestions and descriptions about how legal research is being taught, it lacks sufficient consideration of pedagogical theory from the field of education. In light of the Carnegie Report, and efforts at comprehensive curriculum reform, the time is ripe for law librarianship to develop a comprehensive and properly grounded pedagogy for legal research instruction. This paper proposes and illustrates adapting Bloom's Taxonomy as a means to identify legal research skills, prioritize objectives, and organize course curricula

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    An overview of the research evidence on ethnicity and communication in healthcare

    Get PDF
    ‱ The aim of the present study was to identify and review the available research evidence on 'ethnicity and communication' in areas relevant to ensuring effective provision of mainstream services (e.g. via interpreter, advocacy and translation services); provision of services targeted on communication (e.g. speech and language therapy, counselling, psychotherapy); consensual/ participatory activities (e.g. consent to interventions), and; procedures for managing and planning for linguistic diversity

    RISK REDUCTION THROUGH TECHNOLOGICAL CONTROL OF PERSONAL INFORMATION

    Get PDF
    Abuse and harm to individuals, through harassment and bullying, coexist with Identity Theft as criminal behaviours supported by the ready availability of personal information. Incorporating privacy protection measures into software design requires a thorough understanding about how an individual's privacy is affected by Internet technologies. This research set out to incorporate such an understanding by examining privacy risks for two groups of individuals, for whom privacy was an important issue, domestic abuse survivors and teenagers. The purpose was to examine the reality of the privacy risks for these two groups. This research combined a number of approaches underpinned by a selection of foundation theories from four separate domains: software engineering; information systems; social science; and criminal behaviour. Semi-structured interviews, focus groups, workshops and questionnaires gathered information from managers of refuges and outreach workers from Women's Aid; representatives from probation and police domestic violence units; and teenagers. The findings from these first interactions provided specific examples of risks posed to the two groups. These findings demonstrated that there was a need for a selection of protection mechanisms that promoted awareness of the potential risk among vulnerable individuals. Emerging from these findings were a set of concepts that formed the basis of a novel taxonomy of threat framework designed to assist in risk assessment. To demonstrate the crossover between understanding the social environment and the use of technology, the taxonomy of threat was incorporated into a novel Vulnerability Assessment Framework, which in turn provided a basis for an extension to standard browser technology. A proof-of-concept prototype was implemented by creating an Internet Explorer 7.0 browser helper object. The prototype also made use of the Semantic Web protocols of Resource Description Framework and the Web Ontology Language for simple data storage and reasoning. The purpose of this combination was to demonstrate how the environment in which the individual primarily interacted with the Internet could be adapted to provide awareness of the potential risk, and to enable the individual to take steps to reduce that risk. Representatives of the user-groups were consulted for evaluation of the acceptability of the prototype approach. The favourable ratings given by the respondents demonstrated the acceptability of such an approach to monitoring personal information, with the provision that control remained with the individual. The evaluation exercise also demonstrated how the prototype would serve as a useful tool to make individuals aware of the dangers. The novel contribution of this research contains four facets: it advances understanding of privacy protection for the individual; illustrates an effective combination of methodology frameworks to address the complex issue of privacy; provides a framework for risk assessment through the taxonomy of threat; and demonstrates the novel vulnerability assessment framework through a proof-of-concept prototype

    The Future of Information Sciences : INFuture2015 : e-Institutions – Openness, Accessibility, and Preservation

    Get PDF

    Targeted youth support: Rapid Evidence Assessment of effective early interventions for youth at risk of future poor outcomes

    Get PDF
    This report describes the findings and methods of a systematic rapid evidence assessment (REA) of research relevant to interventions of interest to Targeted Youth Support. It was commissioned by the Department for Children, Schools and Families (DCSF) to inform the development of policy and practice in relation to this initiative

    FDTL voices : drawing from learning and teaching projects

    Get PDF
    This publication draws on insights and experiences from individuals and teams within learning and teaching development projects in higher education. It considers lessons learnt from the processes, outcomes and tangible outputs of the projects across the spectrum of the FDTL initiative, with the intention that colleagues can draw on and benefit from this experience. The overriding theme at the heart of every FDTL project has been the desire to achieve some form of positive and meaningful change at the level of the individual, institution or discipline. The continuing legacy of the programme has been to create wider community involvement as projects have engaged with the higher education sector on multiple levels - personal, institutional, practice, and policy. This publication has remained throughout a collaborative endeavour, supported by Academy colleagues. It is based around the four themes emerging from the initiative as a whole: ‱ Sectoral/Organisational Change ‱ Conceptual Change ‱ Professional and Personal Development Partnership and ‱ Project Managemen
    • 

    corecore