1,175,166 research outputs found

    Using evidence-informed logic models to bridge methods in educational evaluation

    Get PDF
    Designs combining different types of data are increasingly used in educational evaluation, to provide both evidence of impact and an explanation of the processes by which impacts are created. Logic models are visual representations of how an intervention leads via a set of steps from resources and inputs to outputs and then sets of outcomes. Their use has become widespread to underpin evaluations; and they have become of more interest in education as they have been promoted by policy makers and funders including the Education Endowment Foundation (EEF) in England. This paper addresses the question: how can logic models be used to frame and implement educational evaluations using combinations of methods? To do so, the paper draws on theory-based evaluation literature to identify a set of issues to be considered: the role of implementation logic; causal mechanisms; the context of interventions; and the importance of considering and addressing issues around complexity. Using detailed examples from two study designs for EEF evaluations, the paper presents an evidence-informed logic model approach to deal with these issues. The paper concludes by reflecting on the practical and theoretical implications of this approach, laying out a set of key issues to address in future evaluations for which a design framed by an evidence-informed logic model may be appropriate

    Role of Extension in Building Sustainable Partnerships with Multiple Stakeholders for Land Conservation

    Get PDF
    The complexity of issues facing rural landscapes in the United States has resulted in a shift from the traditional Extension model to a partnership building approach. In North Carolina, Extension was charged with coordinating a partnership with a diverse set of stakeholders representing the interests of working lands, conservation, and national defense to address shared land compatibility issues. Using a single case study design, we evaluate the role of Extension in the coordination of diverse stakeholder groups for conservation of rural landscapes to protect the military training mission based on insights from the North Carolina Sentinel Landscapes Partnership. The case study includes analysis of key informant interviews and organizational documents through the constant comparative method that provides themes for Extension to consider for such efforts. We found that Extension plays a leadership role in convening a diverse set of interests, facilitating organizational development and educating a broad range of stakeholders. We provide eight key recommendations to accelerate the process of initiation and implementation of such efforts based on an ability to implement a realistic and feasible program that is informed by knowledge of what works elsewhere

    Implementing Privacy by Design through Privacy Impact Assessments

    Get PDF
    Privacy has come a long way from being a fundamental physical right to being implemented as virtual online privacy under GDPR. Recent privacy breaches around the world have highlighted the role of the design of information systems in protecting the privacy of individuals online. GDPR envisions to achieve this through Privacy by Design (PbD) in business and technological systems. Privacy by Design is the law regulating the architecture of information systems through its code and organizational measures to facilitate usercentric privacy. It is relatively a new concept initially developed by Ann Cavoukian along with PbD Principles. The principles themselves do not ensure the holistic implementation of the PbD process. What is lacking in the current model of PbD is an implementation mechanism to operationalize the PbD as a process. This study builds upon the model suggested by Kroener and Wright to operationalize PbD through a dual approach: a set of principles (PbD Principles) and a process (PIAs). Firstly, this study starts an informed discussion on PbD and its robust theoretical basis under Lessig's Theory of Regulation. Secondly, it proposes to address the lack of operationalization by using Privacy Impact Assessments (PIAs) as a tool to conduct the PbD process. It brings together the two concepts and shows how PbD, as a process, can be better performed if complemented with PIAs. Lastly, it develops a framework for such a PbD process and constructs a lifecycle model to address the gaps in its operationalization. It demonstrates the feasibility of the developed PbD operationalization model by applying it to an existing information system: the Föli Mobile Application

    Formal certification and compliance for run-time service environments

    Get PDF
    With the increased awareness of security and safety of services in on-demand distributed service provisioning (such as the recent adoption of Cloud infrastructures), certification and compliance checking of services is becoming a key element for service engineering. Existing certification techniques tend to support mainly design-time checking of service properties and tend not to support the run-time monitoring and progressive certification in the service execution environment. In this paper we discuss an approach which provides both design-time and runtime behavioural compliance checking for a services architecture, through enabling a progressive event-driven model-checking technique. Providing an integrated approach to certification and compliance is a challenge however using analysis and monitoring techniques we present such an approach for on-going compliance checking

    Static Enforcement of Role-Based Access Control

    Full text link
    We propose a new static approach to Role-Based Access Control (RBAC) policy enforcement. The static approach we advocate includes a new design methodology, for applications involving RBAC, which integrates the security requirements into the system's architecture. We apply this new approach to policies restricting calls to methods in Java applications. We present a language to express RBAC policies on calls to methods in Java, a set of design patterns which Java programs must adhere to for the policy to be enforced statically, and a description of the checks made by our static verifier for static enforcement.Comment: In Proceedings WWV 2014, arXiv:1409.229

    Implementing 5D BIM on construction projects: Contractor perspectives from the UK construction sector

    Get PDF
    This is an accepted manuscript of an article published by Emerald in Journal of Engineering, Design and Technology on 09/05/2020: https://doi.org/10.1108/JEDT-01-2020-0007 The accepted version of the publication may differ from the final published version.Purpose The purpose of this paper is to report on primary research findings that sought to investigate and analyse salient issues on the implementation of 5D building information modelling (BIM) from the UK contractors’ perspective. Previous research and efforts have predominantly focussed on the use of technologies for cost estimation and quantity takeoff within a more traditional-led procurement, with a paucity of research focussing on how 5D BIM could facilitate costing within contractor-led procurement. This study fills this current knowledge gap and enhances the understanding of the specific costing challenges faced by contractors in contractor-led projects, leading to the development of 5D framework for use in future projects. Design/methodology/approach To develop a fully detailed understanding of the challenges and issues being faced in this regard, a phenomenological, qualitative-based study was undertaken through interviews involving 21 participants from UK-wide construction organisations. A thematic data analytical process was applied to the data to derive key issues, and this was then used to inform the development of a 5D-BIM costing framework. Findings Multi-disciplinary findings reveal a range of issues faced by contractors when implementing 5D BIM. These exist at strategic, operational and technological levels which require addressing successful implementation of 5D BIM on contractor-led projects adhering to Level 2 BIM standards. These findings cut across the range of stakeholders on contractor-led projects. Ultimately, the findings suggest strong commitment and leadership from organisational management are required to facilitate cost savings and generate accurate cost information. Practical implications This study highlights key issues for any party seeking to effectively deploy 5D BIM on a contractor-led construction project. A considerable cultural shift towards automating and digitising cost functions virtually, stronger collaborative working relationship relative to costing in design development, construction practice, maintenance and operation is required. Originality/value By analysing findings from primary research data, the work concludes with the development of a 5D BIM costing framework to support contractor-led projects which can be implemented to ensure that 5D BIM is successfully implemented

    A Systematic Aspect-Oriented Refactoring and Testing Strategy, and its Application to JHotDraw

    Full text link
    Aspect oriented programming aims at achieving better modularization for a system's crosscutting concerns in order to improve its key quality attributes, such as evolvability and reusability. Consequently, the adoption of aspect-oriented techniques in existing (legacy) software systems is of interest to remediate software aging. The refactoring of existing systems to employ aspect-orientation will be considerably eased by a systematic approach that will ensure a safe and consistent migration. In this paper, we propose a refactoring and testing strategy that supports such an approach and consider issues of behavior conservation and (incremental) integration of the aspect-oriented solution with the original system. The strategy is applied to the JHotDraw open source project and illustrated on a group of selected concerns. Finally, we abstract from the case study and present a number of generic refactorings which contribute to an incremental aspect-oriented refactoring process and associate particular types of crosscutting concerns to the model and features of the employed aspect language. The contributions of this paper are both in the area of supporting migration towards aspect-oriented solutions and supporting the development of aspect languages that are better suited for such migrations.Comment: 25 page

    A metaobject architecture for fault-tolerant distributed systems : the FRIENDS approach

    Get PDF
    The FRIENDS system developed at LAAS-CNRS is a metalevel architecture providing libraries of metaobjects for fault tolerance, secure communication, and group-based distributed applications. The use of metaobjects provides a nice separation of concerns between mechanisms and applications. Metaobjects can be used transparently by applications and can be composed according to the needs of a given application, a given architecture, and its underlying properties. In FRIENDS, metaobjects are used recursively to add new properties to applications. They are designed using an object oriented design method and implemented on top of basic system services. This paper describes the FRIENDS software-based architecture, the object-oriented development of metaobjects, the experiments that we have done, and summarizes the advantages and drawbacks of a metaobject approach for building fault-tolerant system
    • 

    corecore