2,284 research outputs found
The Council of Europeâs Framework of Competences for Democratic Culture: Hope for democracy or an allusive Utopia?
Democracies around the world are increasingly polarized along political and cultural lines. To address these challenges, in 2016, the Council of Europe (CoE) produced a model of twenty competences for democratic culture. In 2018, this same model became the basis of the Reference Framework of Competences for Democratic Culture (RFCDC). The RFCDC provides pedagogical instructions to help implement these competences. Together, I call this set of materials âthe Frameworkâ.
This thesis begins with the premise that utopia has long played an important role in the way power is maintained or resisted in democratic education. It questions the assumption that democratic culture can be cultivated instrumentally through policy- based competences without imposing power on subjects and views this assumption to be utopian. It thus excavates the potential utopian ideals at play in the Framework using âhidden utopiasâ as a conceptual lens and method, which draws inspiration from the theories of Michèl Foucault, Ernst Bloch and Ruth Levitas.
It investigates how using âhidden utopiasâ as a theoretical lens might facilitate a deeper understanding of the nature and purpose of the Framework, how implicit utopias might be at play, how this could be problematic and how these theories might shed light on the application of the Framework in pedagogical contexts. The contribution of this thesis is to make visible potential utopias at the heart of the Framework. It suggests that making implicit utopias visible in democratic education can help educators and learners engage with these discourses in critical and innovative ways and think beyond them
Modern computing: Vision and challenges
Over the past six decades, the computing systems field has experienced significant transformations, profoundly impacting society with transformational developments, such as the Internet and the commodification of computing. Underpinned by technological advancements, computer systems, far from being static, have been continuously evolving and adapting to cover multifaceted societal niches. This has led to new paradigms such as cloud, fog, edge computing, and the Internet of Things (IoT), which offer fresh economic and creative opportunities. Nevertheless, this rapid change poses complex research challenges, especially in maximizing potential and enhancing functionality. As such, to maintain an economical level of performance that meets ever-tighter requirements, one must understand the drivers of new model emergence and expansion, and how contemporary challenges differ from past ones. To that end, this article investigates and assesses the factors influencing the evolution of computing systems, covering established systems and architectures as well as newer developments, such as serverless computing, quantum computing, and on-device AI on edge devices. Trends emerge when one traces technological trajectory, which includes the rapid obsolescence of frameworks due to business and technical constraints, a move towards specialized systems and models, and varying approaches to centralized and decentralized control. This comprehensive review of modern computing systems looks ahead to the future of research in the field, highlighting key challenges and emerging trends, and underscoring their importance in cost-effectively driving technological progress
LIPIcs, Volume 251, ITCS 2023, Complete Volume
LIPIcs, Volume 251, ITCS 2023, Complete Volum
A Critical Review Of Post-Secondary Education Writing During A 21st Century Education Revolution
Educational materials are effective instruments which provide information and report new discoveries uncovered by researchers in specific areas of academia. Higher education, like other education institutions, rely on instructional materials to inform its practice of educating adult learners. In post-secondary education, developmental English programs are tasked with meeting the needs of dynamic populations, thus there is a continuous need for research in this area to support its changing landscape. However, the majority of scholarly thought in this area centers on K-12 reading and writing. This paucity presents a phenomenon to the post-secondary community. This research study uses a qualitative content analysis to examine peer-reviewed journals from 2003-2017, developmental online websites, and a government issued document directed toward reforming post-secondary developmental education programs. These highly relevant sources aid educators in discovering informational support to apply best practices for student success. Developmental education serves the purpose of addressing literacy gaps for students transitioning to college-level work. The findings here illuminate the dearth of material offered to developmental educators. This study suggests the field of literacy research is fragmented and highlights an apparent blind spot in scholarly literature with regard to English writing instruction. This poses a quandary for post-secondary literacy researchers in the 21st century and establishes the necessity for the literacy research community to commit future scholarship toward equipping college educators teaching writing instruction to underprepared adult learners
Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT
Internet of Things (IoT) play a vital role in securing IoT.
However, encouraging them to do so is hard. Our study investigates ISPsâ and individualsâ attitudes towards the security
of IoT, the obstacles they face, and their incentives to keep
IoT secure, drawing evidence from Japan.
Due to the complex interactions of the stakeholders, we
follow an iterative methodology where we present issues and
potential solutions to our stakeholders in turn. For ISPs, we
survey 27 ISPs in Japan, followed by a workshop with representatives from government and 5 ISPs. Based on the findings
from this, we conduct semi-structured interviews with 20 participants followed by a more quantitative survey with 328
participants. We review these results in a second workshop
with representatives from government and 7 ISPs. The appreciation of challenges by each party has lead to findings that
are supported by all stakeholders.
Securing IoT devices is neither usersâ nor ISPsâ priority.
Individuals are keen on more interventions both from the
government as part of regulation and from ISPs in terms of
filtering malicious traffic. Participants are willing to pay for
enhanced monitoring and filtering. While ISPs do want to help
users, there appears to be a lack of effective technology to
aid them. ISPs would like to see more public recognition for
their efforts, but internally they struggle with executive buy-in
and effective means to communicate with their customers.
The majority of barriers and incentives are external to ISPs
and individuals, demonstrating the complexity of keeping IoT
secure and emphasizing the need for relevant stakeholders in
the IoT ecosystem to work in tandem
SUTMS - Unified Threat Management Framework for Home Networks
Home networks were initially designed for web browsing and non-business critical applications. As infrastructure improved, internet broadband costs decreased, and home internet usage transferred to e-commerce and business-critical applications. Todayâs home computers host personnel identifiable information and financial data and act as a bridge to corporate networks via remote access technologies like VPN. The expansion of remote work and the transition to cloud computing have broadened the attack surface for potential threats. Home networks have become the extension of critical networks and services, hackers can get access to corporate data by compromising devices attacked to broad- band routers. All these challenges depict the importance of home-based Unified Threat Management (UTM) systems. There is a need of unified threat management framework that is developed specifically for home and small networks to address emerging security challenges. In this research, the proposed Smart Unified Threat Management (SUTMS) framework serves as a comprehensive solution for implementing home network security, incorporating firewall, anti-bot, intrusion detection, and anomaly detection engines into a unified system. SUTMS is able to provide 99.99% accuracy with 56.83% memory improvements. IPS stands out as the most resource-intensive UTM service, SUTMS successfully reduces the performance overhead of IDS by integrating it with the flow detection mod- ule. The artifact employs flow analysis to identify network anomalies and categorizes encrypted traffic according to its abnormalities. SUTMS can be scaled by introducing optional functions, i.e., routing and smart logging (utilizing Apriori algorithms). The research also tackles one of the limitations identified by SUTMS through the introduction of a second artifact called Secure Centralized Management System (SCMS). SCMS is a lightweight asset management platform with built-in security intelligence that can seamlessly integrate with a cloud for real-time updates
Understanding digital inequality: a theoretical kaleidoscope
The pandemic affected more than 1.5 billion students and youth, and the most vulnerable learners were hit hardest, making digital inequality in educational settings impossible to overlook. Given this reality, we, all educators, came together to find ways to understand and address some of these inequalities. As a product of this collaboration, we propose a methodological toolkit: a theoretical kaleidoscope to examine and critique the constitutive elements and dimensions of digital inequalities. We argue that such a tool is helpful when a critical attitude to examine âthe ideology of digitalismâ, its concomitant inequalities, and the huge losses it entails for human flourishing seems urgent. In the paper, we describe different theoretical approaches that can be used for the kaleidoscope. We give relevant examples of each theory. We argue that the postdigital does not mean that the digital is over, rather that it has mutated into new power structures that are less evident but no less insidious as they continue to govern socio-technical infrastructures, geopolitics, and markets. In this sense, it is vital to find tools that allow us to shed light on such invisible and pervasive power structures and the consequences in the daily lives of so many
Forensic investigation of small-scale digital devices: a futuristic view
Small-scale digital devices like smartphones, smart toys, drones, gaming consoles, tablets, and other personal data assistants have now become ingrained constituents in our daily lives. These devices store massive amounts of data related to individual traits of users, their routine operations, medical histories, and financial information. At the same time, with continuously evolving technology, the diversity in operating systems, client storage localities, remote/cloud storages and backups, and encryption practices renders the forensic analysis task multi-faceted. This makes forensic investigators having to deal with an array of novel challenges. This study reviews the forensic frameworks and procedures used in investigating small-scale digital devices. While highlighting the challenges faced by digital forensics, we explore how cutting-edge technologies like Blockchain, Artificial Intelligence, Machine Learning, and Data Science may play a role in remedying concerns. The review aims to accumulate state-of-the-art and identify a futuristic approach for investigating SSDDs
- âŚ