4,815 research outputs found
Recommended from our members
The THREAT-ARREST Cyber-Security Training Platform
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations. This paper presets a cyber security training platform, called THREAT-ARREST. The various platform modules can analyze an organizationās system, identify the most critical threats, and tailor a training program to its personnel needs. Then, different training programmes are created based on the trainee types (i.e. administrator, simple operator, etc.), providing several teaching procedures and accomplishing diverse learning goals. One of the main novelties of THREAT-ARREST is the modelling of these programmes along with the runtime monitoring, management, and evaluation operations. The platform is generic. Nevertheless, its applicability in a smart energy case study is detailed
Modelling human teaching tactics and strategies for tutoring systems
One of the promises of ITSs and ILEs is that they will teach and assist learning in an intelligent manner. Historically this has tended to mean concentrating on the interface, on the representation of the domain and on the representation of the studentās knowledge. So systems have attempted to provide students with reifications both of what is to be learned and of the learning process, as well as optimally sequencing and adjusting activities, problems and feedback to best help them learn that domain. We now have embodied (and disembodied) teaching agents and computer-based peers, and the field demonstrates a much greater interest in metacognition and in collaborative activities and tools to support that collaboration. Nevertheless the issue of the teaching competence of ITSs and ILEs is still important, as well as the more specific question as to whether systems can and should mimic human teachers. Indeed increasing interest in embodied agents has thrown the spotlight back on how such agents should behave with respect to learners. In the mid 1980s Ohlsson and others offered critiques of ITSs and ILEs in terms of the limited range and adaptability of their teaching actions as compared to the wealth of tactics and strategies employed by human expert teachers. So are we in any better position in modelling teaching than we were in the 80s? Are these criticisms still as valid today as they were then? This paper reviews progress in understanding certain aspects of human expert teaching and in developing tutoring systems that implement those human teaching strategies and tactics. It concentrates particularly on how systems have dealt with student answers and how they have dealt with motivational issues, referring particularly to work carried out at Sussex: for example, on responding effectively to the studentās motivational state, on contingent and Vygotskian inspired teaching strategies and on the plausibility problem. This latter is concerned with whether tactics that are effectively applied by human teachers can be as effective when embodied in machine teachers
Pattern-based software architecture for service-oriented software systems
Service-oriented architecture is a recent conceptual framework for service-oriented software platforms. Architectures are of great importance for the evolution of
software systems. We present a modelling and transformation technique for service-centric distributed software systems. Architectural configurations, expressed through hierarchical architectural patterns, form the core of a specification and transformation technique. Patterns on different levels of abstraction form transformation invariants that structure and constrain the transformation
process. We explore the role that patterns can play in architecture transformations in terms of functional properties, but also non-functional quality aspects
Multimedia e-learning on technologies for efficient water use
One of the Millennium Development Goals is āTo ensure environmental sustainabilityā, with a special task dedicated to
halve by 2015 the proportion of people without sustainable access to safe drinking water. This task collides with alarming
studies that, for instance, foresee an acute water shortage in India and other Asian countries by 2050. In this conflicting
context we present ED-WAVE, a developing project funded by the Asia-Link Programme, participating six countries
(India, Sri Lanka, Thailand, Greece, Spain and Finland). Its goal is to create a sustainable international cooperation
framework and to develop a multimedia tool for e-Learning on technologies for conservation, reclamation and reuse of
natural resources. We therefore use IT tools aimed at improving peopleās education, including analysis of current water
use status in Asia and Europe, review of potential technological interventions, simulation of impacts of specific technology
interventions and translation of knowledge into electronic teaching material
Collaboration in the Semantic Grid: a Basis for e-Learning
The CoAKTinG project aims to advance the state of the art in collaborative mediated spaces for the Semantic Grid. This paper presents an overview of the hypertext and knowledge based tools which have been deployed to augment existing collaborative environments, and the ontology which is used to exchange structure, promote enhanced process tracking, and aid navigation of resources before, after, and while a collaboration occurs. While the primary focus of the project has been supporting e-Science, this paper also explores the similarities and application of CoAKTinG technologies as part of a human-centred design approach to e-Learning
E-government simulation tool for accounting education: personal income tax simulator
This chapter describes a simulator used by accounting students to mimic the official process of filling out a Personal Income Tax form. According to the Portuguese law, this form describes the amount of the employeesā Personal Income Tax withheld within a company, which must be submitted periodically to the Portuguese Tax Administration. This process is accomplished through an E-government tool accessed by only authorized company staff, which makes it impossible for accounting students to use it. This presents an obstacle for students who are learning about accounting because they cannot experiment with the ārealā process in the courses they are studying. By using the proposed simulator that imitates the behavior and interface of the official tools, students can ālearn by doing.
Evaluating the impact of adopting a component-based approach within the automotive domain
Component-based technology applied to the control system of production machinery is
one of the new research developments in the automotive sector. Although it is
important to evaluate the technical aspects of this new paradigm, an appreciation of the
impact from the business and human aspects is equally important to the stakeholders in
the industry. However, the current evaluation approaches do not offer a method to
capture and analyse the component-based technology that is simple to use and
produces results that are readily understood by the stakeholders involved in the process.
This study is based upon a research project at Loughborough University to look into the
effect of the implementation of a component-based control system for production
machinery in the automotive sector (referred to as the component-based approach)
and is focused on the business and the human aspects of the approach. [Continues.
A system dynamics approach to evaluate advanced persistent threat vectors.
Cyber-attacks targeting high-profile entities are focused, persistent, and employ common vectors with varying levels of sophistication to exploit social-technical vulnerabilities. Advanced persistent threats (APTs) deploy zero-day malware against such targets to gain entry through multiple security layers, exploiting the dynamic interplay of vulnerabilities in the target network. System dynamics (SD) offers an alternative approach to analyze non-linear, complex, and dynamic social-technical systems. This research applied SD to three high-profile APT attacks - Equifax, Carphone, and Zomato - to identify and simulate socio-technical variables leading to breaches. By modeling APTs using SD, managers can evaluate threats, predict attacks, and reduce damage by mitigating specific socio-technical cues. This study provides valuable insights into the dynamics of cyber threats, making it the first to apply SD to APTs
- ā¦