12 research outputs found
The Theory and Practice of Online Learning
Every chapter in the widely distributed first edition has been updated, and four new chapters on current issues such as connectivism and social software innovations have been added. Essays by practitioners and scholars active in the complex, diverse, and rapidly evolving field of distance education blend scholarship and research; practical attention to the details of teaching and learning; and mindful attention to the economics of the business of education
Poland, Slovenia, the World : Challenges of present-day education
Publikacja recenzowana / Peer-reviewed publicationTransformations of education in changing Europe are multifaceted. One of the latter is the process of strengthening the cooperation among universities in this part of the world. This cooperation is carried out in many fields – from joint projects and researches – to joint analyses, discourses and publications. This monograph – a collection of reflections, thoughts and polemics deriving from theoretical and empirical researches, carried out as a part of a joint research project simultaneously undertaken at both these universities under the name “Problems and challenges of modern education” – constitutes one of the fruits of the cooperation between Andrzej Frycz Modrzewski Cracow University and the University of Ljubljana
Best Practices and Recommendations for Cybersecurity Service Providers
This chapter outlines some concrete best practices and recommendations for cybersecurity service providers, with a focus on data sharing, data protection and penetration testing. Based on a brief outline of dilemmas that cybersecurity service providers may experience in their daily operations, it discusses data handling policies and practices of cybersecurity vendors along the following five topics: customer data handling; information about breaches; threat intelligence; vulnerability-related information; and data involved when collaborating with peers, CERTs, cybersecurity research groups, etc. There is, furthermore, a discussion of specific issues of penetration testing such as customer recruitment and execution as well as the supervision and governance of penetration testing. The chapter closes with some general recommendations regarding improving the ethical decision-making procedures of private cybersecurity service providers
Ethical and Unethical Hacking
The goal of this chapter is to provide a conceptual analysis of ethical, comprising history, common usage and the attempt to provide a systematic classification that is both compatible with common usage and normatively adequate. Subsequently, the article identifies a tension between common usage and a normativelyadequate nomenclature. ‘Ethical hackers’ are often identified with hackers that abide to a code of ethics privileging business-friendly values. However, there is no guarantee that respecting such values is always compatible with the all-things-considered morally best act. It is recognised, however, that in terms of assessment, it may be quite difficult to determine who is an ethical hacker in the ‘all things considered’ sense, while society may agree more easily on the determination of who is one in the ‘business-friendly’ limited sense. The article concludes by suggesting a pragmatic best-practice approach for characterising ethical hacking, which reaches beyond business-friendly values and helps in the taking of decisions that are respectful of the hackers’ individual ethics in morally debatable, grey zones
The Ethics of Cybersecurity
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies
From Field to Virtual: Developing Hybrid-Learning Media of Earthquake and Tsunami Disaster Resilience Strategy of Fishing Village Community in Bandar Lampung
Indonesia is an earthquake and tsunami prone area, therefor, disaster resilience strategy is important for surviving and living. The topic of disaster resilience strategy of earthquake and tsunami and case study at Kangkung village in Bandar Lampung then become a topic of hybrid-learning for students with videos as media. It brings a case study of earthquake and tsunami disaster resilience strategy from field to the class by virtual learning media. The research conducted by mix method of (1) Fieldwork approach; (2) Hybrid-learning media production; and (3) Qualitative approach. Fieldwork conducted by observation and documentation (pictures and movies) of Kangkung fishing village community in Bandar Lampung while qualitative approach conducted by questionnaires and in-depth interview to students of Department of Infrastructure and Environmental Engineering, Soegijapranata Catholic University. The results have been analyzed by scoring method. Several conclusions can be described as: (1) five aspects of attractiveness, delivery, learning atmosphere, understanding, and motivation inflicted, can be applied in scoring method; and (2) hybrid-learning media is very good to implemented to learn disaster resilience strategy of earthquake and tsunami at Kangkung fishing village in Bandar Lampung
Recommended from our members
Information and communication technology in management learning - Volume 1
This submission combines a number of papers written over a span of eleven years, which document research in the application of information and communication technology (ICl) to management education. In addition an integrating review grounds this research, surveys some of the relevant literature, and analyses the common threads running through the research.
The constituent papers discuss the introduction of a wide range of exercises, using innovative information and communication technology (ICl), into teaching at the Business School of City University from 1992 onwards. There is analysis of how using the Internet evolved to add practical value to students’ learning experiences, and the papers together record the introduction of such exercises at the Business School before the Internet was widely used outside the academic, research, and United States government communities. These applications of technology in learning were adapted over the years, to respond to changes in the available technology, and in students’ expectations, and these changes led to an extensive understanding of students’ response to new technology. The inclusion of ICT, and virtual learning methods in courses, where the principal mode of tuition was face-to-face, anticipated the current interest in ‘e-learning’ by up to ten years.
One common thread includes the understanding of both the virtual and the physical environment for learning in a business school, in the light of the technologies available at different periods. A second relates to how some of the tools and techniques most commonly associated with distance learning could also be applied in a face-to-face setting. A third relates to changing views of how the subject of information literacy should be built into the material taught in a business school.
The integrating paper locates the constituent papers in relation to literature both about ICT and about pedagogy in higher education. A common dimension is the importance of reflective practice and of knowledge acquisition, and these are used to gain insights into the teaching and learning covered by the papers. In particular there is discussion of how ICT can encourage the framing of new and insightful questions to enhance understanding. While the research is focused on understanding the issues, there is discussion of further research which could lead from it, which could include steps to evaluate the tangible benefits added by ICT
The use of Internet-based communication by people with autism
Despite having difficulties in the areas of social interaction and communication, the introduction of the Internet seems to have encouraged some high-functioning autistic people to communicate with each other via chat rooms and bulletin boards. The Internet can address the social isolation of autism by improving the potential to find others who have similar experiences. Additionally it may be that, for autistic people, the Internet also offers a comfortable space more suited to their communication style, perhaps one in which their interaction seems less odd. If so, there are possible implications for this group of people in terms of education, employment and social inclusion. However there are risks. Autistic people may be particularly vulnerable to individuals misrepresenting themselves or to the possibility of over-reliance on computer-mediated interaction resulting in an exacerbation of obsessive behaviour and withdrawal from face-to-face interaction. An initial survey, to discover the extent of Internet use among people with autism and investigate their motivations for using it, was carried out, obtaining responses from 138 people with high-functioning autism or Asperger syndrome. Results indicated a high level of computer and Internet use amongst respondents and implied that email was a popular means of communication, more so than face-to-face communication even when interacting with friends. This introductory survey raised issues and questions which were explored in more depth with a subset of the respondents who were interviewed by email about their experiences, motivations and perceptions regarding Internet-based communication. In addition to 19 email interviews, data were also collected from 4 non or reluctant users of the Internet who were sent a series of questions by post. A grounded theory analysis of the data revealed a heightened awareness of communication amongst this group of participants, who offered insights into the process of communication in terms of its component parts and how it breaks down for them. Central to the analysis is a theme of the interviewee as observer, feeling detached to some degree from mainstream interaction and like an outsider. From this perspective participants offered their analysis of the complex process of communication, online and offline as they experienced it, highlighting key aspects of the Internet in relation to their own needs, ones which made it a unique form of communication. Their insights into communication are described in four themes: control, clarity, the role of nonverbal communication and the social role of communication. Additionally the interviewees expressed a sense of liberation that could come with online communication for people with Asperger syndrome/high-functioning autism such that they may interact with others on a more equal basis. This could be empowering but with the sense of liberation there was a risk of losing control over one’s interactions. The interviewees’ perceptions of CMC are explored within a uses and gratifications framework which posits that people use particular communication channels to satisfy their individual needs and motives. By using computer-mediated communication some of the social and communication barriers which contribute to the disability of autism may be broken down