12 research outputs found

    The Theory and Practice of Online Learning

    Get PDF
    Every chapter in the widely distributed first edition has been updated, and four new chapters on current issues such as connectivism and social software innovations have been added. Essays by practitioners and scholars active in the complex, diverse, and rapidly evolving field of distance education blend scholarship and research; practical attention to the details of teaching and learning; and mindful attention to the economics of the business of education

    Poland, Slovenia, the World : Challenges of present-day education

    Get PDF
    Publikacja recenzowana / Peer-reviewed publicationTransformations of education in changing Europe are multifaceted. One of the latter is the process of strengthening the cooperation among universities in this part of the world. This cooperation is carried out in many fields – from joint projects and researches – to joint analyses, discourses and publications. This monograph – a collection of reflections, thoughts and polemics deriving from theoretical and empirical researches, carried out as a part of a joint research project simultaneously undertaken at both these universities under the name “Problems and challenges of modern education” – constitutes one of the fruits of the cooperation between Andrzej Frycz Modrzewski Cracow University and the University of Ljubljana

    Best Practices and Recommendations for Cybersecurity Service Providers

    Full text link
    This chapter outlines some concrete best practices and recommendations for cybersecurity service providers, with a focus on data sharing, data protection and penetration testing. Based on a brief outline of dilemmas that cybersecurity service providers may experience in their daily operations, it discusses data handling policies and practices of cybersecurity vendors along the following five topics: customer data handling; information about breaches; threat intelligence; vulnerability-related information; and data involved when collaborating with peers, CERTs, cybersecurity research groups, etc. There is, furthermore, a discussion of specific issues of penetration testing such as customer recruitment and execution as well as the supervision and governance of penetration testing. The chapter closes with some general recommendations regarding improving the ethical decision-making procedures of private cybersecurity service providers

    Ethical and Unethical Hacking

    Get PDF
    The goal of this chapter is to provide a conceptual analysis of ethical, comprising history, common usage and the attempt to provide a systematic classification that is both compatible with common usage and normatively adequate. Subsequently, the article identifies a tension between common usage and a normativelyadequate nomenclature. ‘Ethical hackers’ are often identified with hackers that abide to a code of ethics privileging business-friendly values. However, there is no guarantee that respecting such values is always compatible with the all-things-considered morally best act. It is recognised, however, that in terms of assessment, it may be quite difficult to determine who is an ethical hacker in the ‘all things considered’ sense, while society may agree more easily on the determination of who is one in the ‘business-friendly’ limited sense. The article concludes by suggesting a pragmatic best-practice approach for characterising ethical hacking, which reaches beyond business-friendly values and helps in the taking of decisions that are respectful of the hackers’ individual ethics in morally debatable, grey zones

    The Ethics of Cybersecurity

    Get PDF
    This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies

    From Field to Virtual: Developing Hybrid-Learning Media of Earthquake and Tsunami Disaster Resilience Strategy of Fishing Village Community in Bandar Lampung

    Get PDF
    Indonesia is an earthquake and tsunami prone area, therefor, disaster resilience strategy is important for surviving and living. The topic of disaster resilience strategy of earthquake and tsunami and case study at Kangkung village in Bandar Lampung then become a topic of hybrid-learning for students with videos as media. It brings a case study of earthquake and tsunami disaster resilience strategy from field to the class by virtual learning media. The research conducted by mix method of (1) Fieldwork approach; (2) Hybrid-learning media production; and (3) Qualitative approach. Fieldwork conducted by observation and documentation (pictures and movies) of Kangkung fishing village community in Bandar Lampung while qualitative approach conducted by questionnaires and in-depth interview to students of Department of Infrastructure and Environmental Engineering, Soegijapranata Catholic University. The results have been analyzed by scoring method. Several conclusions can be described as: (1) five aspects of attractiveness, delivery, learning atmosphere, understanding, and motivation inflicted, can be applied in scoring method; and (2) hybrid-learning media is very good to implemented to learn disaster resilience strategy of earthquake and tsunami at Kangkung fishing village in Bandar Lampung

    The use of Internet-based communication by people with autism

    Get PDF
    Despite having difficulties in the areas of social interaction and communication, the introduction of the Internet seems to have encouraged some high-functioning autistic people to communicate with each other via chat rooms and bulletin boards. The Internet can address the social isolation of autism by improving the potential to find others who have similar experiences. Additionally it may be that, for autistic people, the Internet also offers a comfortable space more suited to their communication style, perhaps one in which their interaction seems less odd. If so, there are possible implications for this group of people in terms of education, employment and social inclusion. However there are risks. Autistic people may be particularly vulnerable to individuals misrepresenting themselves or to the possibility of over-reliance on computer-mediated interaction resulting in an exacerbation of obsessive behaviour and withdrawal from face-to-face interaction. An initial survey, to discover the extent of Internet use among people with autism and investigate their motivations for using it, was carried out, obtaining responses from 138 people with high-functioning autism or Asperger syndrome. Results indicated a high level of computer and Internet use amongst respondents and implied that email was a popular means of communication, more so than face-to-face communication even when interacting with friends. This introductory survey raised issues and questions which were explored in more depth with a subset of the respondents who were interviewed by email about their experiences, motivations and perceptions regarding Internet-based communication. In addition to 19 email interviews, data were also collected from 4 non or reluctant users of the Internet who were sent a series of questions by post. A grounded theory analysis of the data revealed a heightened awareness of communication amongst this group of participants, who offered insights into the process of communication in terms of its component parts and how it breaks down for them. Central to the analysis is a theme of the interviewee as observer, feeling detached to some degree from mainstream interaction and like an outsider. From this perspective participants offered their analysis of the complex process of communication, online and offline as they experienced it, highlighting key aspects of the Internet in relation to their own needs, ones which made it a unique form of communication. Their insights into communication are described in four themes: control, clarity, the role of nonverbal communication and the social role of communication. Additionally the interviewees expressed a sense of liberation that could come with online communication for people with Asperger syndrome/high-functioning autism such that they may interact with others on a more equal basis. This could be empowering but with the sense of liberation there was a risk of losing control over one’s interactions. The interviewees’ perceptions of CMC are explored within a uses and gratifications framework which posits that people use particular communication channels to satisfy their individual needs and motives. By using computer-mediated communication some of the social and communication barriers which contribute to the disability of autism may be broken down
    corecore