246,693 research outputs found
A Tool to Evaluate the Level of Inclusion of Digital Learning Objects
AbstractInclusive learning integrates pedagogical and technological variables. It means to adapt to students according to their characteristics (personal, physical, cognitive, social…), needs and interests. With the aim of evaluating the level of inclusion of digital learning objects we have developed a questionnaire that collects information about pedagogical and technological aspects that promote or discourage inclusion. Features like the pedagogical model, function of activities, type of assessment, multimedia resources, human-computer interaction, accessibility and usability criteria, etc. are variables that impact in the level of inclusion of educational objects and items that have been included in the questionnaire. This is the second version of the tool, refined with the conclusions obtained from the application of the draft version to more than 50 learning objects developed under the funding and supervision of the Basque Government. These objects are available under Creative Commons license in the Agrega web page of the Education Department, and represent the style and characteristics of more than 350 objects
Authentication of Students and Students’ Work in E-Learning : Report for the Development Bid of Academic Year 2010/11
Global e-learning market is projected to reach $107.3 billion by 2015 according to a new report by The Global Industry Analyst (Analyst 2010). The popularity and growth of the online programmes within the School of Computer Science obviously is in line with this projection. However, also on the rise are students’ dishonesty and cheating in the open and virtual environment of e-learning courses (Shepherd 2008). Institutions offering e-learning programmes are facing the challenges of deterring and detecting these misbehaviours by introducing security mechanisms to the current e-learning platforms. In particular, authenticating that a registered student indeed takes an online assessment, e.g., an exam or a coursework, is essential for the institutions to give the credit to the correct candidate. Authenticating a student is to ensure that a student is indeed who he says he is. Authenticating a student’s work goes one step further to ensure that an authenticated student indeed does the submitted work himself. This report is to investigate and compare current possible techniques and solutions for authenticating distance learning student and/or their work remotely for the elearning programmes. The report also aims to recommend some solutions that fit with UH StudyNet platform.Submitted Versio
Recommended from our members
Mining learning preferences in web-based instruction: Holists vs. Serialists
Web-based instruction programs are used by learners with diverse knowledge, skills and needs. These differences determine their preferences for the design of Web-based instruction programs and ultimately influence learners' success in using them. Cognitive style has been found to significantly affect learners' preferences of web-based instruction programs. However, the majority of previous studies focus on Field Dependence/Independence. Pask's Holist/Serialist dimension has conceptual links with Field Dependence/Independence but it is left mostly unstudied. Therefore, this study focuses on identifying how this dimension of cognitive style affects learner preferences of Web-based instruction programs. A data mining approach is used to illustrate the difference in preferences between Holists and Serialists. The findings show that there are clear differences in regard to content presentation and navigation support. A set of design features were then produced to help designers incorporate cognitive styles into the development of Web-based instruction programs to ensure that they can accommodate learners' different preferences.This work is partially funded by National Science Council, Taiwan, ROC (NSC 98-2511-S-008-012- MY3; NSC 99-
2511-S-008 -003 -MY2; NSC 99-2631-S-008-001)
DeltaPhish: Detecting Phishing Webpages in Compromised Websites
The large-scale deployment of modern phishing attacks relies on the automatic
exploitation of vulnerable websites in the wild, to maximize profit while
hindering attack traceability, detection and blacklisting. To the best of our
knowledge, this is the first work that specifically leverages this adversarial
behavior for detection purposes. We show that phishing webpages can be
accurately detected by highlighting HTML code and visual differences with
respect to other (legitimate) pages hosted within a compromised website. Our
system, named DeltaPhish, can be installed as part of a web application
firewall, to detect the presence of anomalous content on a website after
compromise, and eventually prevent access to it. DeltaPhish is also robust
against adversarial attempts in which the HTML code of the phishing page is
carefully manipulated to evade detection. We empirically evaluate it on more
than 5,500 webpages collected in the wild from compromised websites, showing
that it is capable of detecting more than 99% of phishing webpages, while only
misclassifying less than 1% of legitimate pages. We further show that the
detection rate remains higher than 70% even under very sophisticated attacks
carefully designed to evade our system.Comment: Preprint version of the work accepted at ESORICS 201
Empirical evaluation of an adaptive e-learning system and the effects of knowledge, learning styles and multimedia mode on student achievement
This paper presents an empirical evaluation of an adaptive e-learning system (AES). The system was evaluated in an experimental research. During the 9 weeks of experimentation, the students studied the learning material in two randomly allocated groups, an experimental group using the AES and a control group using the non-AES. Research findings are described as follows. Students who learned using the AES performed better significantly than those who learned using the non-AES. The implementation of test repetition as a function of knowledge adaptation in the AES increased student achievement significantly. When the effect of test repetition was removed, the implementation of learning style and multimedia mode adaptation in the AES was still found to have significant effect upon student performance. Students whose learning style and multimedia preferences were matched with the system achieved better results
The design and implementation of an adaptive e-learning system
This paper describes the design and implementation of an adaptive e-learning system that provides a template for different learning materials as well as a student model that incorporates five distinct student characteristics as an aid to learning: primary characteristics are prior knowledge, learning style and the presence or absence of animated multimedia aids (multimedia mode); secondary characteristics include page background preference and link colour preference. The use of multimedia artefacts as a student characteristic has not previously been implemented or evaluated.
The system development consists of a requirements analysis, design and implementation. The design models including use case diagrams, conceptual design, sequence diagrams, navigation design and presentation design are expressed using Unified Modelling Language (UML). The adaptive e-learning system was developed in a template implemented using Java Servlets, XHTML, XML, JavaScript and HTML. The template is a domain-independent adaptive e-learning system that has functions of both adaptivity and adaptability
- …