1,175,166 research outputs found
Using evidence-informed logic models to bridge methods in educational evaluation
Designs combining different types of data are increasingly used in educational evaluation, to provide both evidence of impact and an explanation of the processes by which impacts are created. Logic models are visual representations of how an intervention leads via a set of steps from resources and inputs to outputs and then sets of outcomes. Their use has become widespread to underpin evaluations; and they have become of more interest in education as they have been promoted by policy makers and funders including the Education Endowment Foundation (EEF) in England. This paper addresses the question: how can logic models be used to frame and implement educational evaluations using combinations of methods? To do so, the paper draws on theory-based evaluation literature to identify a set of issues to be considered: the role of implementation logic; causal mechanisms; the context of interventions; and the importance of considering and addressing issues around complexity. Using detailed examples from two study designs for EEF evaluations, the paper presents an evidence-informed logic model approach to deal with these issues. The paper concludes by reflecting on the practical and theoretical implications of this approach, laying out a set of key issues to address in future evaluations for which a design framed by an evidence-informed logic model may be appropriate
Role of Extension in Building Sustainable Partnerships with Multiple Stakeholders for Land Conservation
The complexity of issues facing rural landscapes in the United States has resulted in a shift from the traditional Extension model to a partnership building approach. In North Carolina, Extension was charged with coordinating a partnership with a diverse set of stakeholders representing the interests of working lands, conservation, and national defense to address shared land compatibility issues. Using a single case study design, we evaluate the role of Extension in the coordination of diverse stakeholder groups for conservation of rural landscapes to protect the military training mission based on insights from the North Carolina Sentinel Landscapes Partnership. The case study includes analysis of key informant interviews and organizational documents through the constant comparative method that provides themes for Extension to consider for such efforts. We found that Extension plays a leadership role in convening a diverse set of interests, facilitating organizational development and educating a broad range of stakeholders. We provide eight key recommendations to accelerate the process of initiation and implementation of such efforts based on an ability to implement a realistic and feasible program that is informed by knowledge of what works elsewhere
Implementing Privacy by Design through Privacy Impact Assessments
Privacy has come a long way from being a fundamental physical right to being implemented as virtual online privacy under GDPR. Recent privacy breaches around the world have highlighted the role of the design of information systems in protecting the privacy of individuals online. GDPR envisions to achieve this through Privacy by Design (PbD) in business and technological systems. Privacy by Design is the law regulating the architecture of information systems through its code and organizational measures to facilitate usercentric privacy. It is relatively a new concept initially developed by Ann Cavoukian along with PbD Principles. The principles themselves do not ensure the holistic implementation of the PbD process. What is lacking in the current model of PbD is an implementation mechanism to operationalize the PbD as a process. This study builds upon the model suggested by Kroener and Wright to operationalize PbD through a dual approach: a set of principles (PbD Principles) and a process (PIAs). Firstly, this study starts an informed discussion on PbD and its robust theoretical basis under Lessig's Theory of Regulation. Secondly, it proposes to address the lack of operationalization by using Privacy Impact Assessments (PIAs) as a tool to conduct the PbD process. It brings together the two concepts and shows how PbD, as a process, can be better performed if complemented with PIAs. Lastly, it develops a framework for such a PbD process and constructs a lifecycle model to address the gaps in its operationalization. It demonstrates the feasibility of the developed PbD operationalization model by applying it to an existing information system: the Föli Mobile Application
Recommended from our members
Design as interactions of problem framing and problem solving: a formal and empirical basis for problem framing in design
In this thesis, I present, illustrate and empirically validate a novel approach to modelling and explaining design process. The main outcome of this work is the formal definition of the problem framing, and the formulation of a recursive model of framing in design. The model (code-named RFD), represents a formalisation of a grey area in the science of design, and sees the design process as a recursive interaction of problem framing and problem solving.
The proposed approach is based upon a phenomenon introduced in cognitive science and known as (reflective) solution talkback. Previously, there were no formalisations of the knowledge interactions occurring within this complex reasoning operation. The recursive model is thus an attempt to express the existing knowledge in a formal and structured manner. In spite of rather abstract, knowledge level on which the model is defined, it is a firm step in the clarification of design process. The RFD model is applied to the knowledge-level description of the conducted experimental study that is annotated and analysed in the defined terminology. Eventually, several schemas implied by the model are identified, exemplified, and elaborated to reflect the empirical results.
The model features the mutual interaction of predicates âspecifiesâ and âsatisfiesâ. The first asserts that a certain set of explicit statements is sufficient for expressing relevant desired states the design is aiming to achieve. The validity of predicate âspecifiesâ might not be provable directly in any problem solving theory. A particular specification can be upheld or rejected only by drawing upon the validity of a complementary predicate âsatisfiesâ and the (un-)acceptability of the considered candidate solution (e.g. technological artefact, product). It is the role of the predicate âsatisfiesâ to find and derive such a candidate solution. The predicates âspecifiesâ and âsatisfiesâ are contextually bound and can be evaluated only within a particular conceptual frame. Thus, a solution to the design problem is sound and admissible with respect to an explicit commitment to a particular specification and design frame. The role of the predicate âacceptableâ is to compare the admissible solutions and frames against the ârealâ design problem. As if it answered the question: âIs this solution really what I wanted/intended?â
Furthermore, I propose a set of principled schemas on the conceptual (knowledge) level with an aim to make the interactive patterns of the design process explicit. These conceptual schemas are elicited from the rigorous experiments that utilised the structured and principled approach to recording the designerâs conceptual reasoning steps and decisions. They include the refinement of an explicit problem specification within a conceptual frame; the refinement of an explicit problem specification using a re-framed reference; and the conceptual re-framing (i.e. the identification and articulation of new conceptual terms)
Since the conceptual schemas reflect the sequence of the âtypicalâ decisions the designer may make during the design process, there is no single, symbol-level method for the implementation of these conceptual patterns. Thus, when one decides to follow the abstract patterns and schemas, this abstract model alone can foster a principled design on the knowledge level. It must be acknowledged that for the purpose of computer-based support, these abstract schemas need to be turned into operational models and consequently suitable methods. However, such operational perspective was beyond the time and resource constraints placed on this research
Formal certification and compliance for run-time service environments
With the increased awareness of security and safety of services in on-demand distributed service provisioning (such
as the recent adoption of Cloud infrastructures), certification and compliance checking of services is becoming a key element for service engineering. Existing certification techniques tend to support mainly design-time checking of service properties and tend not to support the run-time monitoring and progressive certification in the service execution environment. In this paper we discuss an approach which provides both design-time and runtime behavioural compliance checking for a services architecture, through enabling a progressive event-driven model-checking technique. Providing an integrated approach to certification and compliance is a challenge however using analysis and monitoring techniques we present such an approach for on-going compliance checking
Static Enforcement of Role-Based Access Control
We propose a new static approach to Role-Based Access Control (RBAC) policy
enforcement. The static approach we advocate includes a new design methodology,
for applications involving RBAC, which integrates the security requirements
into the system's architecture. We apply this new approach to policies
restricting calls to methods in Java applications. We present a language to
express RBAC policies on calls to methods in Java, a set of design patterns
which Java programs must adhere to for the policy to be enforced statically,
and a description of the checks made by our static verifier for static
enforcement.Comment: In Proceedings WWV 2014, arXiv:1409.229
Implementing 5D BIM on construction projects: Contractor perspectives from the UK construction sector
This is an accepted manuscript of an article published by Emerald in Journal of Engineering, Design and Technology on 09/05/2020: https://doi.org/10.1108/JEDT-01-2020-0007
The accepted version of the publication may differ from the final published version.Purpose
The purpose of this paper is to report on primary research findings that sought to investigate and analyse salient issues on the implementation of 5D building information modelling (BIM) from the UK contractorsâ perspective. Previous research and efforts have predominantly focussed on the use of technologies for cost estimation and quantity takeoff within a more traditional-led procurement, with a paucity of research focussing on how 5D BIM could facilitate costing within contractor-led procurement. This study fills this current knowledge gap and enhances the understanding of the specific costing challenges faced by contractors in contractor-led projects, leading to the development of 5D framework for use in future projects.
Design/methodology/approach
To develop a fully detailed understanding of the challenges and issues being faced in this regard, a phenomenological, qualitative-based study was undertaken through interviews involving 21 participants from UK-wide construction organisations. A thematic data analytical process was applied to the data to derive key issues, and this was then used to inform the development of a 5D-BIM costing framework.
Findings
Multi-disciplinary findings reveal a range of issues faced by contractors when implementing 5D BIM. These exist at strategic, operational and technological levels which require addressing successful implementation of 5D BIM on contractor-led projects adhering to Level 2 BIM standards. These findings cut across the range of stakeholders on contractor-led projects. Ultimately, the findings suggest strong commitment and leadership from organisational management are required to facilitate cost savings and generate accurate cost information.
Practical implications
This study highlights key issues for any party seeking to effectively deploy 5D BIM on a contractor-led construction project. A considerable cultural shift towards automating and digitising cost functions virtually, stronger collaborative working relationship relative to costing in design development, construction practice, maintenance and operation is required.
Originality/value
By analysing findings from primary research data, the work concludes with the development of a 5D BIM costing framework to support contractor-led projects which can be implemented to ensure that 5D BIM is successfully implemented
A Systematic Aspect-Oriented Refactoring and Testing Strategy, and its Application to JHotDraw
Aspect oriented programming aims at achieving better modularization for a
system's crosscutting concerns in order to improve its key quality attributes,
such as evolvability and reusability. Consequently, the adoption of
aspect-oriented techniques in existing (legacy) software systems is of interest
to remediate software aging. The refactoring of existing systems to employ
aspect-orientation will be considerably eased by a systematic approach that
will ensure a safe and consistent migration.
In this paper, we propose a refactoring and testing strategy that supports
such an approach and consider issues of behavior conservation and (incremental)
integration of the aspect-oriented solution with the original system. The
strategy is applied to the JHotDraw open source project and illustrated on a
group of selected concerns. Finally, we abstract from the case study and
present a number of generic refactorings which contribute to an incremental
aspect-oriented refactoring process and associate particular types of
crosscutting concerns to the model and features of the employed aspect
language. The contributions of this paper are both in the area of supporting
migration towards aspect-oriented solutions and supporting the development of
aspect languages that are better suited for such migrations.Comment: 25 page
Recommended from our members
Towards an aspect weaving BPEL engine
This position paper proposes the use of dynamic aspects and
the visitor design pattern to obtain a highly configurable and
extensible BPEL engine. Using these two techniques, the
core of this infrastructural software can be customised to
meet new requirements and add features such as debugging,
execution monitoring, or changing to another Web Service
selection policy. Additionally, it can easily be extended to
cope with customer-specific BPEL extensions. We propose
the use of dynamic aspects not only on the engine itself
but also on the workflow in order to tackle the problems of
Web Service hot deployment and hot fixes to long running
processes. In this way, composing aWeb Service "on-the-fly"
means weaving its choreography interface into the workflow
A metaobject architecture for fault-tolerant distributed systems : the FRIENDS approach
The FRIENDS system developed at LAAS-CNRS is a metalevel architecture providing libraries of metaobjects for fault
tolerance, secure communication, and group-based distributed applications. The use of metaobjects provides a nice separation of concerns between mechanisms and applications. Metaobjects can be used transparently by applications and can be composed according to the needs of a given application, a given architecture, and its underlying properties. In FRIENDS, metaobjects are used recursively to add new properties to applications. They are designed using an object oriented design method and implemented on top of basic system services. This paper describes the FRIENDS software-based architecture, the object-oriented development of metaobjects, the experiments that we have done, and summarizes the advantages and drawbacks of a metaobject approach for building fault-tolerant system
- âŠ