50 research outputs found

    Educational innovation

    Get PDF
    ConferĂȘncia realizada no Porto, Portugal, de 7 a 9 de Outubro de 2015An effective way to understand, improve and apply educational innovation is through the analysis of good practices. Sharing the acquired knowledge in the development and application of good practices helps teachers to implement educational innovation. Good practices help to reduce the teachers’ effort and to contribute structural to the educational institutions. This paper presents the good practices of the track “Educational Innovation” at the conference TEEM’15. They are organized in 5 lines corresponding to tendencies on educational innovation: Learning Communities, Learning personalization/Adaptive learning, Training and assessment of teamwork, New learning models and Innovation in online learning methods.info:eu-repo/semantics/publishedVersio

    Security in 5G-Enabled Internet of Things Communication: Issues: Challenges, and Future Research Roadmap

    Get PDF
    5G mobile communication systems promote the mobile network to not only interconnect people, but also interconnect and control the machine and other devices. 5G-enabled Internet of Things (IoT) communication environment supports a wide-variety of applications, such as remote surgery, self-driving car, virtual reality, flying IoT drones, security and surveillance and many more. These applications help and assist the routine works of the community. In such communication environment, all the devices and users communicate through the Internet. Therefore, this communication agonizes from different types of security and privacy issues. It is also vulnerable to different types of possible attacks (for example, replay, impersonation, password reckoning, physical device stealing, session key computation, privileged-insider, malware, man-in-the-middle, malicious routing, and so on). It is then very crucial to protect the infrastructure of 5G-enabled IoT communication environment against these attacks. This necessitates the researchers working in this domain to propose various types of security protocols under different types of categories, like key management, user authentication/device authentication, access control/user access control and intrusion detection. In this survey paper, the details of various system models (i.e., network model and threat model) required for 5G-enabled IoT communication environment are provided. The details of security requirements and attacks possible in this communication environment are further added. The different types of security protocols are also provided. The analysis and comparison of the existing security protocols in 5G-enabled IoT communication environment are conducted. Some of the future research challenges and directions in the security of 5G-enabled IoT environment are displayed. The motivation of this work is to bring the details of different types of security protocols in 5G-enabled IoT under one roof so that the future researchers will be benefited with the conducted work

    Human Swarm Problem Solving

    Get PDF
    Chapter 4 in Cultural-historical perspectives on collective intelligence In the era of digital communication, collective problem solving is increasingly important. Large groups can now resolve issues together in completely different ways, which has transformed the arts, sciences, business, education, technology, and medicine. Collective intelligence is something we share with animals and is different from machine learning and artificial intelligence. To design and utilize human collective intelligence, we must understand how its problem-solving mechanisms work. From democracy in ancient Athens, through the invention of the printing press, to COVID-19, this book analyzes how humans developed the ability to find solutions together. This wide-ranging, thought-provoking book is a game-changer for those working strategically with collective problem solving within organizations and using a variety of innovative methods. It sheds light on how humans work effectively alongside machines to confront challenges that are more urgent than what humanity has faced before. This title is also available as Open Access on Cambridge Core.Chapter 4 discusses human swarm problem solving as a distinct subtype of CI with biological antecedents in nest siting among honeybees and flocking behavior. Building on recent biological research, this chapter discusses five mechanisms that are also relevant for human swarm problem solving. These mechanisms are decision threshold methods, averaging, large gatherings, heterogeneous social interaction, and environmental sensing. Studies of collective animal behavior show that they often make decisions that build on statistical rules (e.g. averaging, threshold responses). Even when in a group, individuals will often seek and assess information independently of others with the intention of optimizing decisions through the “many wrongs principle” or the “many eyes principle.” Similarly, human ‘wisdom of the crowd’ studies examine similar statistical rules and principles like the importance of making independent contributions. However, while early research on the wisdom of crowds addressed the importance of independent contributions, newer studies also examine the possible positive influence of dependent contributions. The increasing variety of crowdsourcing studies are in this chapter explained with the framework of different swarm mechanisms. In the summary, four basic characteristics of human swarm problem solving are highlighted: predefined problems, pre-specified problem solving procedures, rapid time-limited problem solving, and individual learning.publishedVersio

    Five ways to wellbeing at the zoo: improving human health and connection to nature

    Get PDF
    Good mental and physical health go hand-in-hand when identifying factors that lead people to experience a better overall quality of life. A growing disconnect to the natural world is worsening the mental health of individuals in many societies. Numerous scientific publications have evidenced that being in nature and access to green and blue spaces positively impact upon humans’ physical and mental health. For many people, particularly those living in more urbanized areas, managed natural spaces and borrowed landscapes, such as those found in public parks, wildlife reserves and zoological gardens give the only opportunities for wider engagement with nature. Many zoos are designated green spaces and therefore human visitors can engage with native fauna and flora as well as exotic wild animals. This article reviews the UK Government’s “The Five Ways to Wellbeing” concept, applied to zoos and aquariums and thus suggests how zoos and aquariums can use this framework to promote positive nature-connectivity experiences for their visitors and promote good wellbeing. The Five Ways to Wellbeing are Connect, Be active, Take notice, Keep learning, and Give. We illustrate how zoos and aquariums could model their approaches to educational and engagement roles, as well as design initiatives to reach out to local communities via the Five Ways to Wellbeing concept. We show that many of the positive programs and works conducted by zoos and aquariums lend themselves to further engagement with the Five Ways to Wellbeing structure. By taking such a structured approach in the design, implementation and evaluation of their activities, zoos can expand their abilities in connecting humans with nature and further add value to their living collections of animals and plants. By including Wellbeing as a defined aim of the modern zoo, it will be clear to all of those involved in their work, visitors, workers, stakeholders, that zoos are working to promote, protect and preserve positive wellbeing outputs for humans and animals alike

    Five ways to wellbeing at the zoo: improving human health and connection to nature

    Get PDF
    This is the final version. Available on open access from Frontiers Media via the DOI in this recordGood mental and physical health go hand-in-hand when identifying factors that lead people to experience a better overall quality of life. A growing disconnect to the natural world is worsening the mental health of individuals in many societies. Numerous scientific publications have evidenced that being in nature and access to green and blue spaces positively impact upon humans’ physical and mental health. For many people, particularly those living in more urbanized areas, managed natural spaces and borrowed landscapes, such as those found in public parks, wildlife reserves and zoological gardens give the only opportunities for wider engagement with nature. Many zoos are designated green spaces and therefore human visitors can engage with native fauna and flora as well as exotic wild animals. This article reviews the UK Government’s “The Five Ways to Wellbeing” concept, applied to zoos and aquariums and thus suggests how zoos and aquariums can use this framework to promote positive nature-connectivity experiences for their visitors and promote good wellbeing. The Five Ways to Wellbeing are Connect, Be active, Take notice, Keep learning, and Give. We illustrate how zoos and aquariums could model their approaches to educational and engagement roles, as well as design initiatives to reach out to local communities via the Five Ways to Wellbeing concept. We show that many of the positive programs and works conducted by zoos and aquariums lend themselves to further engagement with the Five Ways to Wellbeing structure. By taking such a structured approach in the design, implementation and evaluation of their activities, zoos can expand their abilities in connecting humans with nature and further add value to their living collections of animals and plants. By including Wellbeing as a defined aim of the modern zoo, it will be clear to all of those involved in their work, visitors, workers, stakeholders, that zoos are working to promote, protect and preserve positive wellbeing outputs for humans and animals alike

    Parks, Peace, and Partnership

    Get PDF
    Today, over 3,000 protected areas around the world contribute to the protection of biodiversity, peaceful relations between neighbouring countries, and the well-being of people living in and around the protected environs. Historical and geo-political constraints are disappearing in a new spirit of collaboration to address common issues confronting ecosystems, species, and communities. Managing across boundaries is seen as the only way to ensure the long-term viability of ecological systems and sustainable communities. Current international thinking in this area is reflected in this collection of essays by park managers, biologists, scholars, scientists, and researchers. From Waterton-Glacier International Park to the European Alps, and Lake Titicaca in Peru and Bolivia, the essays provide illustrative examples of the challenges and new solutions that are emerging around the world

    A Holistic Methodology for Profiling Ransomware Through Endpoint Detection

    Get PDF
    Computer security incident response is a critical capability in light of the growing threat of malware infecting endpoint systems today. Ransomware is one type of malware that is causing increasing harm to organizations. Ransomware infects an endpoint system by encrypting files until a ransom is paid. Ransomware can have a negative impact on an organization’s daily functions if critical business files are encrypted and are not backed up properly. Many tools exist that claim to detect and respond to malware. Organizations and small businesses are often short-staffed and lack the technical expertise to properly configure security tools. One such endpoint detection tool is Sysmon, which logs critical events to the Windows event log. Sysmon is free to download on the Internet. The details contained in Sysmon events can be extremely helpful during an incident response. The author of Sysmon states that the Sysmon configuration needs be iteratively assessed to determine which Sysmon events are most effective. Unfortunately, an organization may not have the time, knowledge, or infrastructure to properly configure and analyze Sysmon events. If configured incorrectly, the organization may have a false sense of security or lack the logs necessary to respond quickly and accurately during a malware incident. This research seeks to answer the question “What methodology can an organization follow to determine which Sysmon events should be analyzed to identify ransomware in a Windows environment?” The answer to this question helps organizations make informed decisions regarding how to configure Sysmon and analyze Sysmon logs. This study uses design science research methods to create three artifacts: a method, an instantiation, and a tool. The artifacts are used to analyze Sysmon logs against a ransomware dataset consisting of publicly available samples from three ransomware families that were major threats in 2017 according to Symantec. The artifacts are built using software that is free to download on the Internet. Step-by-step instructions, source code, and configuration files are provided so that other researchers can replicate and expand on the results. The end goal provides concrete results that organizations can apply directly to their environment to begin leveraging the benefits of Sysmon and understand the analytics needed to identify suspicious activity during an incident response

    Security in 5G-enabled Internet of Things communication: issues, challenges, and future research roadmap

    Get PDF
    5G mobile communication systems promote the mobile network to not only interconnect people, but also interconnect and control the machine and other devices. 5G-enabled Internet of Things (IoT) communication environment supports a wide-variety of applications, such as remote surgery, self-driving car, virtual reality, flying IoT drones, security and surveillance and many more. These applications help and assist the routine works of the community. In such communication environment, all the devices and users communicate through the Internet. Therefore, this communication agonizes from different types of security and privacy issues. It is also vulnerable to different types of possible attacks (for example, replay, impersonation, password reckoning, physical device stealing, session key computation, privileged-insider, malware, man-in-the-middle, malicious routing, and so on). It is then very crucial to protect the infrastructure of 5G-enabled IoT communication environment against these attacks. This necessitates the researchers working in this domain to propose various types of security protocols under different types of categories, like key management, user authentication/device authentication, access control/user access control and intrusion detection. In this survey paper, the details of various system models (i.e., network model and threat model) required for 5G-enabled IoT communication environment are provided. The details of security requirements and attacks possible in this communication environment are further added. The different types of security protocols are also provided. The analysis and comparison of the existing security protocols in 5G-enabled IoT communication environment are conducted. Some of the future research challenges and directions in the security of 5G-enabled IoT environment are displayed. The motivation of this work is to bring the details of different types of security protocols in 5G-enabled IoT under one roof so that the future researchers will be benefited with the conducted work
    corecore