4,397 research outputs found
Early evaluation of Unistats: user experiences
This paper sets out the findings of the user evaluation of Unistats.UK Higher Education Funding Bodie
First steps in the study of cyber-psycho-cognitive operations
Dissertação (mestrado)âUniversidade de BrasĂlia, Instituto de RelaçÔes Internacionais, Programa de PĂłs-Graduação em RelaçÔes Internacionais, 2019.O presente trabalho Ă© uma anĂĄlise dos mecanismos informĂĄticos e tecno-comunicacionais envolvidos na articulação de mundos da vida orientados estrategicamente para estimular, prever ou minar o desenvolvimento das condiçÔes psico-cognitivas adequadas para a construção e sustento da legitimidade racional de uma autoridade ou ação polĂtica. A aplicação de instrumentos âarqueolĂłgicosâ Foucauldianos ao estudo das narrativas polĂticas que engendraram e surgiram de âRussiagateâ permitiu situar a teoria num contexto histĂłrico e validar a premissa da convergĂȘncia e incorporação de tendĂȘncias de agendamento comuns e de prĂĄticas tĂpicas de operaçÔes psicolĂłgicas tradicionais. Contudo, os efeitos tanto da disponibilidade comercial das TICs com capacidade de âdeep learningâ, quanto da estruturação baseada em conhecimento permitida pela ubiquidade e centralidade econĂŽmica dessas tecnologias, tornam o conjunto de mecanismos analisados num fenĂŽmeno que merece uma conceptualização e marco investigativo Ășnicos. A obra Ă© uma contribuição a esse empreendimento.This is an analysis of the ICT-based mechanisms involved in the articulation of lifeworlds that are strategically oriented to foster, prevent or undermine the development of psycho-cognitive conditions adequate for the construction or sustainability of an authorityâs or a political actionâs rational legitimacy. While grounding theory to a historical context, the application of Foucauldian âarcheologicalâ instruments to the study of the political narratives giving birth and springing from âRussiagateâ also served to validate the premised convergence and incorporation of common agenda-setting trends and practices typical of traditional psychological operations. However, the effects of both the commercial availability of deep-learning ICTs and the cognition-based structuration afforded by their ubiquity and economic centrality set this âdispositifâ apart, thereby deserving a unique conceptualization and research framework. This study is a contribution to such endeavor
An Inquiry into Bloom's Taxonomy as a Hierarchy and Means for Teaching Legal Research Skills
Includes bibliographic references.Pedagogy requires both a theory and a consistent method of implementation. While
the literature of law librarianship abounds in suggestions and descriptions about
how legal research is being taught, it lacks sufficient consideration of pedagogical
theory from the field of education. In light of the Carnegie Report, and efforts at
comprehensive curriculum reform, the time is ripe for law librarianship to develop a
comprehensive and properly grounded pedagogy for legal research instruction. This
paper proposes and illustrates adapting Bloom's Taxonomy as a means to identify
legal research skills, prioritize objectives, and organize course curricula
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
An overview of the research evidence on ethnicity and communication in healthcare
âą The aim of the present study was to identify and review the available
research evidence on 'ethnicity and communication' in areas relevant to
ensuring effective provision of mainstream services (e.g. via interpreter,
advocacy and translation services); provision of services targeted on
communication (e.g. speech and language therapy, counselling,
psychotherapy); consensual/ participatory activities (e.g. consent to
interventions), and; procedures for managing and planning for linguistic
diversity
RISK REDUCTION THROUGH TECHNOLOGICAL CONTROL OF PERSONAL INFORMATION
Abuse and harm to individuals, through harassment and bullying, coexist with Identity
Theft as criminal behaviours supported by the ready availability of personal information.
Incorporating privacy protection measures into software design requires a thorough
understanding about how an individual's privacy is affected by Internet technologies. This
research set out to incorporate such an understanding by examining privacy risks for two
groups of individuals, for whom privacy was an important issue, domestic abuse survivors
and teenagers. The purpose was to examine the reality of the privacy risks for these two
groups.
This research combined a number of approaches underpinned by a selection of foundation
theories from four separate domains: software engineering; information systems; social
science; and criminal behaviour. Semi-structured interviews, focus groups, workshops
and questionnaires gathered information from managers of refuges and outreach workers
from Women's Aid; representatives from probation and police domestic violence units; and
teenagers.
The findings from these first interactions provided specific examples of risks posed to the
two groups. These findings demonstrated that there was a need for a selection of
protection mechanisms that promoted awareness of the potential risk among vulnerable
individuals. Emerging from these findings were a set of concepts that formed the basis of
a novel taxonomy of threat framework designed to assist in risk assessment.
To demonstrate the crossover between understanding the social environment and the use
of technology, the taxonomy of threat was incorporated into a novel Vulnerability
Assessment Framework, which in turn provided a basis for an extension to standard
browser technology. A proof-of-concept prototype was implemented by creating an
Internet Explorer 7.0 browser helper object. The prototype also made use of the Semantic
Web protocols of Resource Description Framework and the Web Ontology Language for
simple data storage and reasoning. The purpose of this combination was to demonstrate
how the environment in which the individual primarily interacted with the Internet could be
adapted to provide awareness of the potential risk, and to enable the individual to take
steps to reduce that risk. Representatives of the user-groups were consulted for evaluation
of the acceptability of the prototype approach. The favourable ratings given by the
respondents demonstrated the acceptability of such an approach to monitoring personal
information, with the provision that control remained with the individual. The evaluation
exercise also demonstrated how the prototype would serve as a useful tool to make
individuals aware of the dangers.
The novel contribution of this research contains four facets: it advances understanding of
privacy protection for the individual; illustrates an effective combination of methodology
frameworks to address the complex issue of privacy; provides a framework for risk
assessment through the taxonomy of threat; and demonstrates the novel vulnerability
assessment framework through a proof-of-concept prototype
Targeted youth support: Rapid Evidence Assessment of effective early interventions for youth at risk of future poor outcomes
This report describes the findings and methods of a systematic rapid evidence assessment (REA) of research relevant to interventions of interest to Targeted Youth Support. It was commissioned by the Department for Children, Schools and Families (DCSF) to inform the development of policy and practice in relation to this initiative
FDTL voices : drawing from learning and teaching projects
This publication draws on insights and experiences from individuals and teams within learning and teaching development projects in higher education. It considers lessons learnt from the processes, outcomes and tangible outputs of the projects across the spectrum of the FDTL initiative, with the intention that colleagues can draw on and benefit from this experience. The overriding theme at the heart of every FDTL project has been the desire to achieve some form of positive and meaningful change at the level of the individual, institution or discipline. The continuing legacy of the programme has been to create wider community involvement as projects have engaged with the higher education sector on multiple levels - personal, institutional, practice, and policy. This publication has remained throughout a collaborative endeavour, supported by Academy colleagues. It is based around the four themes emerging from the initiative as a whole: âą Sectoral/Organisational Change âą Conceptual Change âą Professional and Personal Development Partnership and âą Project Managemen
Recommended from our members
Learning from the learners' experience: e-Learning@greenwich post-conference reflections
This publication comprises papers from presenters who, having made a conference presentation, were invited to author an academic paper about their work
- âŠ