890 research outputs found

    The Role of Information Technology in Improving the Effectiveness of Education Management

    Get PDF
    Education is one of the important sectors in the development of a country. To achieve optimal education goals, effective and efficient education management is needed. However, the increasingly complex challenges in education management demand innovation and information technology as a solution. The purpose of this study is to explain the role of information technology in improving the effectiveness of education management in order to provide solutions and recommendations for the development of education in the future. The focus here is on qualitative analysis. Listening to and recording pertinent information was an integral part of data collection, which was followed by data reduction, data display, and inference. This study found that information technology plays an important role in improving the effectiveness of education management. In today's digital era, the use of information technology can help education management to obtain accurate, fast and easily accessible information, as well as facilitate distance learning and increase the accessibility and flexibility of learning. So, for various parties involved in education, it is necessary to improve digital literacy, including learners, educators, and education management

    Indonesian Online Shopping Practices in the COVID-19 Pandemic Era: A Study of Culture and Cyber Security Law

    Get PDF
    Introduction to the Problems: The condition during COVID-19 that made people doing more activities at home drove the increase in spending intensity. This condition referred to a new normal. Online shopping has long been a habit for some people because of the convenience provided. In conditions of increasing online shopping activities certainly have implications for the community—online shopping practices of Indonesian people in the Covid-19 pandemic era, with an approach and cybersecurity.Purpose/ Objective Study: This research aims to examine the relationship between online shopping practices of the Indonesian people in the Covid-19 pandemic era.Design/Methodology/Approach: With an approach to the study of culture and cybersecurity, with integration between culture studies, economy, and digital law studies.Findings: This research finds that massive online shopping practices in Indonesia have implications for social vulnerability. In a cultural context, people could get caught up in alienation. Online shopping activities as productive work (work to make commodities) alienate humans, four sides humans from themselves, productive work objects (instruments and productive work objects), and products consumed. While in the context of security, there was a risk of using misused personal data. It was necessary to ratify the Law of Personal Data Security as a legal regulation mechanism for sanctions for the data privacy misused in.Paper Types: Research articl

    A Hybrid Data-Driven Web-Based UI-UX Assessment Model

    Full text link
    Today, a large proportion of end user information systems have their Graphical User Interfaces (GUI) built with web-based technology (JavaScript, CSS, and HTML). Some of these web-based systems include: Internet of Things (IOT), Infotainment (in vehicles), Interactive Display Screens (for digital menu boards, information kiosks, digital signage displays at bus stops or airports, bank ATMs, etc.), and web applications/services (on smart devices). As such, web-based UI must be evaluated in order to improve upon its ability to perform the technical task for which it was designed. This study develops a framework and a processes for evaluating and improving the quality of web-based user interface (UI) as well as at a stratified level. The study develops a comprehensive framework which is a conglomeration of algorithms such as the multi-criteria decision making method of analytical hierarchy process (AHP) in coefficient generation, sentiment analysis, K-means clustering algorithms and explainable AI (XAI)

    Putting learning back into learning analytics: actions for policy makers, researchers, and practitioners

    Get PDF
    This paper is based on (a) a literature review focussing on the impact of learning analytics on supporting learning and teaching, (b) a Delphi study involving international expert discussion on current opportunities and challenges of learning analytics as well as (c) outlining a research agenda for closing identified research gaps. Issues and challenges facing educators linked to learning analytics and current research gaps were organised into four themes, the further development of which by the expert panel, led to six strategy and action areas. The four themes are 1. development of data literacy in all stakeholders, 2. updating of guiding principles and policies of educational data, 3. standards needed for ethical practices with data quality assurance, and 4. flexible user-centred design for a variety of users of analytics, starting with learners and ensuring that learners and learning is not harmed. The strategies and actions are outcomes of the expert panel discussion and are offered as provocations to organise and focus the researcher, policymaker and practitioner dialogs needed to make progress in the field

    More effective social services

    Get PDF
    In June 2014, the Productivity Commission was asked to look at ways to improve how government agencies commission and purchase social services. The final report was released in mid-September 2015. It makes several recommendations about how to make social services more responsive, client-focused, accountable and innovative. The final inquiry report has two key messages. First, system-wide improvement can be achieved and should be pursued. Second, New Zealand needs better ways to join up services for those with multiple, complex needs. Capable clients should be empowered with more control over the services they receive. Those less capable need close support and a response tailored to their needs, without arbitrary distinctions between services and funds divided into “health”, “education”, etc. These are significant, but extremely worthwhile, changes for New Zealand

    A Theoretical Framework and Practical Toolkit for Ethical Library Assessment

    Get PDF
    Praktiker:innen stehen bei der Bewertung bzw. Evaluation von Bibliotheken unter doppeltem Druck, den Wert der Bibliothek zu demonstrieren und gleichzeitig die Werte der bibliothekarischen Profession einzuhalten. Um eine Praxis der Bibliotheksevaluation zu unterstützen, die sowohl den Wert der Bibliothek als auch die bibliothekarische Werte anspricht, untersucht diese Dissertation die Praxis der Bibliotheksevaluation durch die Perspektive praktischer Ethik und angewandter Werte. Die Hauptforschungsfrage lautet: „Wie kann Bibliotheksbewertung ethisch durchgeführt werden?“ Ich folgte einem dreistufigen Forschungsdesign: eine Literaturrecherche, eine Umfrage und Interviews. Die Literaturrecherche konzentriert sich auf die Ethik, Werte, Dilemmata und Praktiken von Bewertungspraktiker:innen. Eine vignettenbasierte Umfrage untersuchte Werte und Ethik bei der Bewertung von Bibliotheken weiter. Die Umfragedaten wurden mittels der konstruktivistischen Grounded Theory analysiert und die daraus resultierenden Codes etablierten ein neues Rahmenwerk und ein neues Instrument für die ethische Bewertung von Bibliotheken. Schließlich wurde das Instrument mit dem Namen Values-Sensitive Library Assessment Toolkit durch Interviews mit Bewertungspraktiker:innen validiert. Die Forschungsergebnisse zeigen, dass Praktiker:innen der Bibliotheksbewertung eine ethische Praxis anstreben, aber durch eine komplexe und dezentralisierte Wertelandschaft herausgefordert werden, die viele konkurrierende Möglichkeiten zur Identifizierung und Umsetzung von Werten bietet. Das Toolkit dient dazu, einen Satz von Werten zu modellieren, den Praktiker:innen anwenden können, um eine ethische Bewertungspraxis zu unterstützen.Library assessment practitioners face dual pressures to demonstrate library value and adhere to library values. To support a practice of library assessment that addresses both library value and library values, this dissertation examines the practice of library assessment through the lens of practical ethics and applied values. The main research question asks, “How can library assessment be practiced ethically?” I followed a three-step research design: a literature review, a survey, and interviews. The literature review focuses on the ethics, values, dilemmas, and practices of library assessment practitioners. A vignette-based survey further investigated values and ethics in assessment. Survey data was analyzed through constructivist grounded theory, and the resulting set of codes established a new framework and toolkit for ethical library assessment. Finally, the toolkit—named the Values-Sensitive Library Assessment Toolkit—was validated through interviews with assessment practitioners. Research findings indicate that library assessment practitioners seek an ethical practice, but are challenged by a complex and decentralized values landscape that offers many competing choices for identifying and implementing values. The toolkit serves to model a value set that practitioners can apply to support an ethical assessment practice

    The effects of security protocols on cybercrime at Ahmadu Bello University, Zaria, Nigeria.

    Get PDF
    Masters Degree. University of KwaZulu-Natal, Durban.The use of Information Communication Technology (ICT) within the educational sector is increasing rapidly. University systems are becoming increasingly dependent on computerized information systems (CIS) in order to carry out their daily routine. Moreover, CIS no longer process staff records and financial data only, as they once did. Nowadays, universities use CIS to assist in automating the overall system. This automation includes the use of multiple databases, data detail periodicity (i.e. gender, race/ethnicity, enrollment, degrees granted, and program major), record identification (e.g. social security number ‘SSN’), linking to other databases (i.e. linking unit record data with external databases such as university and employment data). The increasing demand and exposure to Internet resources and infrastructure by individuals and universities have made IT infrastructure easy targets for cybercriminals who employ sophisticated attacks such as Advanced Persistent Threats, Distributed Denial of Service attacks and Botnets in order to steal confidential data, identities of individuals and money. Hence, in order to stay in business, universities realise that it is imperative to secure vital Information Systems from easily being exploited by emerging and existing forms of cybercrimes. This study was conducted to determine and evaluate the various forms of cybercrimes and their consequences on the university network at Ahmadu Bello University, Zaria. The study was also aimed at proposing means of mitigating cybercrimes and their effects on the university network. Hence, an exploratory research design supported by qualitative research approach was used in this study. Staff of the Institute of Computing, Information and Communication technology (ICICT) were interviewed. The findings of the study present different security measures, and security tools that can be used to effectively mitigate cybercrimes. It was found that social engineering, denial of service attacks, website defacement were among the types of cybercrimes occurring on the university network. It is therefore recommended that behavioural approach in a form of motivation of staff behaviour, salary increases, and cash incentive to reduce cybercrime perpetrated by these staff

    Facing Down Facebook: Reclaiming Democracy in the Age of (Anti) Social Media

    Get PDF
    A report examining the role Facebook has played in abuses of personal data for political purposes and the spread of disinformation, particularly during the Brexit referendum campaign in 2016. The report examines the growth of Facebook and details the ways in which the social media giant has consistently misrepresented facts to the public and to regulators in order to conceal the ongoing abuses to which it has been party. To ensure that such abuses are curtailed in future, the report ends with some key policy recommendations to EU and UK policy-makers

    Protecting Privacy in Indian Schools: Regulating AI-based Technologies' Design, Development and Deployment

    Get PDF
    Education is one of the priority areas for the Indian government, where Artificial Intelligence (AI) technologies are touted to bring digital transformation. Several Indian states have also started deploying facial recognition-enabled CCTV cameras, emotion recognition technologies, fingerprint scanners, and Radio frequency identification tags in their schools to provide personalised recommendations, ensure student security, and predict the drop-out rate of students but also provide 360-degree information of a student. Further, Integrating Aadhaar (digital identity card that works on biometric data) across AI technologies and learning and management systems (LMS) renders schools a ‘panopticon’. Certain technologies or systems like Aadhaar, CCTV cameras, GPS Systems, RFID tags, and learning management systems are used primarily for continuous data collection, storage, and retention purposes. Though they cannot be termed AI technologies per se, they are fundamental for designing and developing AI systems like facial, fingerprint, and emotion recognition technologies. The large amount of student data collected speedily through the former technologies is used to create an algorithm for the latter-stated AI systems. Once algorithms are processed using machine learning (ML) techniques, they learn correlations between multiple datasets predicting each student’s identity, decisions, grades, learning growth, tendency to drop out, and other behavioural characteristics. Such autonomous and repetitive collection, processing, storage, and retention of student data without effective data protection legislation endangers student privacy. The algorithmic predictions by AI technologies are an avatar of the data fed into the system. An AI technology is as good as the person collecting the data, processing it for a relevant and valuable output, and regularly evaluating the inputs going inside an AI model. An AI model can produce inaccurate predictions if the person overlooks any relevant data. However, the state, school administrations and parents’ belief in AI technologies as a panacea to student security and educational development overlooks the context in which ‘data practices’ are conducted. A right to privacy in an AI age is inextricably connected to data practices where data gets ‘cooked’. Thus, data protection legislation operating without understanding and regulating such data practices will remain ineffective in safeguarding privacy. The thesis undergoes interdisciplinary research that enables a better understanding of the interplay of data practices of AI technologies with social practices of an Indian school, which the present Indian data protection legislation overlooks, endangering students’ privacy from designing and developing to deploying stages of an AI model. The thesis recommends the Indian legislature frame better legislation equipped for the AI/ML age and the Indian judiciary on evaluating the legality and reasonability of designing, developing, and deploying such technologies in schools
    corecore