230,011 research outputs found

    E-learning Series No. 1: A guide for senior managers

    Get PDF
    This guide to e-learning for senior managers in universities outlines the context for e-learning and its use in higher education, both nationally and internationally. It identifies potential benefits and addresses the key issues in implementing e-learning successfully, including costs. It also highlights likely future developments

    Identifying immersive environments’ most relevant research topics: an instrument to query researchers and practitioners

    Get PDF
    This paper provides an instrument for ascertaining researchers’ perspectives on the relative relevance of technological challenges facing immersive environments in view of their adoption in learning contexts, along three dimensions: access, content production, and deployment. It described its theoretical grounding and expert-review process, from a set of previously-identified challenges and expert feedback cycles. The paper details the motivation, setup, and methods employed, as well as the issues detected in the cycles and how they were addressed while developing the instrument. As a research instrument, it aims to be employed across diverse communities of research and practice, helping direct research efforts and hence contribute to wider use of immersive environments in learning, and possibly contribute towards the development of news and more adequate systems.The work presented herein has been partially funded under the European H2020 program H2020-ICT-2015, BEACONING project, grant agreement nr. 687676.info:eu-repo/semantics/publishedVersio

    Learning How to Play Nicely: Repositories and CRIS

    Get PDF
    More than 60 delegates convened at the Rose Bowl in Leeds on 7 May 2010 for this event to explore the developing relationship and overlap between Open Access research repositories and so called 'CRISs' – Current Research Information Systems – that are increasingly being implemented at universities. The Welsh Repository Network (WRN) [1], a collaborative venture between the Higher Education institutions (HEIs) in Wales, funded by JISC, had clearly hit upon an engaging topic du jour. The event, jointly supported by JISC [2] and ARMA (Association of Research Managers and Administrators)[3], was fully booked within just five days of being announced. In the main, delegates were either research managers and administrators, or repository managers, and one of the themes that came up throughout the day was the need for greater communication between research offices and libraries (where repository services are often managed.) As well as JISC and ARMA, euroCRIS [4], a not-for- profit organisation that aims to be an internationally recognised point of reference for CRISs, was represented at the event. Delegates could also visit the software exhibition and speak with representatives of Atira, Symplectic Ltd and Thomson Reuters, among others

    Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization

    Full text link
    Logs are one of the most fundamental resources to any security professional. It is widely recognized by the government and industry that it is both beneficial and desirable to share logs for the purpose of security research. However, the sharing is not happening or not to the degree or magnitude that is desired. Organizations are reluctant to share logs because of the risk of exposing sensitive information to potential attackers. We believe this reluctance remains high because current anonymization techniques are weak and one-size-fits-all--or better put, one size tries to fit all. We must develop standards and make anonymization available at varying levels, striking a balance between privacy and utility. Organizations have different needs and trust other organizations to different degrees. They must be able to map multiple anonymization levels with defined risks to the trust levels they share with (would-be) receivers. It is not until there are industry standards for multiple levels of anonymization that we will be able to move forward and achieve the goal of widespread sharing of logs for security researchers.Comment: 17 pages, 1 figur

    Secure Identification in Social Wireless Networks

    Get PDF
    The applications based on social networking have brought revolution towards social life and are continuously gaining popularity among the Internet users. Due to the advanced computational resources offered by the innovative hardware and nominal subscriber charges of network operators, most of the online social networks are transforming into the mobile domain by offering exciting applications and games exclusively designed for users on the go. Moreover, the mobile devices are considered more personal as compared to their desktop rivals, so there is a tendency among the mobile users to store sensitive data like contacts, passwords, bank account details, updated calendar entries with key dates and personal notes on their devices. The Project Social Wireless Network Secure Identification (SWIN) is carried out at Swedish Institute of Computer Science (SICS) to explore the practicality of providing the secure mobile social networking portal with advanced security features to tackle potential security threats by extending the existing methods with more innovative security technologies. In addition to the extensive background study and the determination of marketable use-cases with their corresponding security requirements, this thesis proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have implemented an initial prototype using PHP Socket and OpenSSL library to simulate the secure identification procedure based on the proposed design. The design is in compliance with 3GPP‟s Generic Authentication Architecture (GAA) and our implementation has demonstrated the flexibility of the solution to be applied independently for the applications requiring secure identification. Finally, the thesis provides strong foundation for the advanced implementation on mobile platform in future

    Framework of Social Customer Relationship Management in E-Health Services

    Full text link
    Healthcare organization is implementing Customer Relationship Management (CRM) as a strategy for managing interactions with patients involving technology to organize, automate, and coordinate business processes. Web-based CRM provides healthcare organization with the ability to broaden service beyond its usual practices in achieving a complex patient care goal, and this paper discusses and demonstrates how a new approach in CRM based on Web 2.0 or Social CRM helps healthcare organizations to improve their customer support, and at the same time avoiding possible conflicts, and promoting better healthcare to patients. A conceptual framework of the new approach will be proposed and highlighted. The framework includes some important features of Social CRM such as customer's empowerment, social interactivity between healthcare organization-patients, and patients-patients. The framework offers new perspective in building relationships between healthcare organizations and customers and among customers in e-health scenario. It is developed based on the latest development of CRM literatures and case studies analysis. In addition, customer service paradigm in social network's era, the important of online health education, and empowerment in healthcare organization will be taken into consideration.Comment: 15 pages. arXiv admin note: substantial text overlap with arXiv:1204.3689, arXiv:1203.3919, arXiv:1204.3685, arXiv:1203.4309, arXiv:1204.3691, arXiv:1203.392

    eCRM in the Travel Industry

    Get PDF
    We are bombarded with Internet forecasts and statistics every day, however there is little doubt that the Internet has permanently changed the face of travel promotion and distribution. While only a minority of consumers are actually prepared to buy online at the present time, this minority is growing and there are large numbers of consumers who wish to use the Internet for information and communication. Travel and hospitality companies are selling an information-rich product and will need to leverage the full range of offline and e-channels to engage their customers in dialogue. The Internet does not have any respect for geographic or organisational boundaries and companies will have to forge new business models, involving partnerships and customer-driven product design, in order to meet the needs of the online consumer. There are major challenges and opportunities for companies wishing to add the e to their CRM strategy

    Quality interoperability within digital libraries: the DL.org perspective

    Get PDF
    Quality is the most dynamic aspect of DLs, and becomes even more complex with respect to interoperability. This paper formalizes the research motivations and hypotheses on quality interoperability conducted by the Quality Working Group within the EU-funded project DL.org (<a href="http://www.dlorg.eu">http://www.dlorg.eu/</a>). After providing a multi-level interoperability framework – adopted by DL.org - the authors illustrate key-research points and approaches on the way to the interoperability of DLs quality, grounding them in the DELOS Reference Model. By applying the DELOS Reference Model Quality Concept Map to their interoperability motivating scenario, the authors subsequently present the two main research outcomes of their investigation - the Quality Core Model and the Quality Interoperability Survey
    • 

    corecore