96,230 research outputs found
Initiating and Sustaining Female Networks in Computer Science and IT
Over the last decade, several networks and communities for women in IT have been initiated. It has been known that specific needs for support exist where members of a minority have difficulties in finding like-minded people in their everyday environment. This paper investigates different forms of female networks in Computer Science and IT. In particular, it analyses forms of network initiation, which often involve face-to-face meetings at regular events like conferences or, increasingly, at summer universities for female students. We conducted three studies to identify the attendees' expectations and needs for support using questionnaires, interviews, and a wiki analysis. This paper aims at identifying effective strategies for initiating female networks
Recommended from our members
Learning from Digital Natives: Bridging Formal and Informal Learning. Final Report
Overview
This report suggests that students are increasingly making use of a variety of etools (such as mobile phones, email, MSN, digital cameras, games consoles and social networking sites) to support their informal learning within formalised educational settings, and that they use the tools that they have available if none are provided for them. Therefore, higher education institutions should encourage the use of these tools.
Aims and background
This study aimed to explore how e-tools (such as mobile phones, email, MSN, digital cameras, games consoles and social networking sites) and the processes that underpin their use can support learning within educational institutions and help improve the quality of studentsâ experiences of learning in higher education (pgs 9-11).
Methodology
The study entailed: (i) desk research to identify related international research and practice and examples of integration of e-tools and learning processes in formal educational settings; (ii) a survey of 160 engineering and social work students across two contrasting Scottish universities (pre- and post-1992) â the University of Strathclyde and Glasgow Caledonian University â and follow-up interviews with eight students across the two subject areas to explore which technologies students were using for both learning and leisure activities within and outside the formal educational settings and how they would like to use such technologies to support their learning in both formal and informal settings; and (iii) interviews with eight members of staff from across the institutions and two subject areas to identify their perceptions of the educational value of the e-tools. (pgs 24-27).
Key findings
⢠Students reported making extensive use of a variety of both e-tools (such as mobile phones, email, MSN, digital cameras) and social networking tools (such as Bebo, MySpace, Wikipedia and YouTube) for informal socialisation, communication, information gathering, content creation and sharing, alongside using the institutionally provided technologies and learning environments.
⢠Most of the students owned their own computer or had access to a sibling or parentâs computer. Many students owned a laptop but preferred not to bring it onto campus due to security concerns and because they found it too heavy to carry about.
⢠Ownership of mobile phones was ubiquitous.
⢠Whilst the studentsâ information searching literacy seemed adequate, the ability of these students to harness the power of social networking tools and informal processes for their learning was low.
Staff reported using a few Web 2.0 and social software tools but they were generally less familiar with how these could be used to support learning and teaching. There were misconceptions surrounding the affordances of the tools and fears expressed about security and invasion of personal space. Considerations of the costs and the time it would take staff to develop their skills meant that there was a reluctance to take up new technologies at an institutional level.
⢠Subject differences emerged in both staff and student perceptions as to which type of tools they would find most useful. Attitudes to Web 2.0 tools were different. Engineers were concerned with reliability, using institutional systems and inter-operability. Social workers were more flexible because they were focused on communication and professional needs.
⢠The study concluded that digital tools, personal devices, social networking software and many of the other tools explored all have a large educational potential to support learning processing and teaching practices. Therefore, use of these tools and processes within institutions, amongst staff and students should be encouraged.
⢠The report goes on to suggest ways in which the use of such technologies can help strengthen the links between informal and formal learning in higher education. The recommendations are grouped under four areas â pedagogical, socio-cultural, organisational and technological
The effect of using facebook markup language (fbml) for designing an e-learning model in higher education
This study examines the use of Facebook Markup Language (FBML) to design an
e-learning model to facilitate teaching and learning in an academic setting.
The qualitative research study presents a case study on how, Facebook is used
to support collaborative activities in higher education. We used FBML to design
an e-learning model called processes for e-learning resources in the Specialist
Learning Resources Diploma (SLRD) program. Two groups drawn from the SLRD
program were used; First were the participants in the treatment group and
second in the control group. Statistical analysis in the form of a t-test was
used to compare the dependent variables between the two groups. The findings
show a difference in the mean score between the pre-test and the post-test for
the treatment group (achievement, the skill, trends). Our findings suggest that
the use of FBML can support collaborative knowledge creation and improved the
academic achievement of participatns. The findings are expected to provide
insights into promoting the use of Facebook in a learning management system
(LMS).Comment: Mohammed Amasha, Salem Alkhalaf, "The Effect of using Facebook Markup
Language (FBML) for Designing an E-Learning Model in Higher Education".
International Journal of Research in Computer Science, 4 (5): pp. 1-9,
January 201
Learning in Social Networks: Rationale and Ideas for Its Implementation in Higher Education
The internet has fast become a prevalent medium for collaboration between people and social networks, in particular, have gained vast popularity and relevance over the past few years. Within this framework, our paper will analyse the role played by social networks in current teaching practices. Specifically, we focus on the principles guiding the design of study activities which use social networks and we relate concrete experiences that show how they contribute to improving teaching and learning within a university environment
Cybersecurity in the Classroom: Bridging the Gap Between Computer Access and Online Safety
According to ISACA, there will be a global shortage of 2 million cybersecurity professionals worldwide by 2019. Additionally, according to Experian Data Breach Resolution, as much as 80% of all network breaches can be traced to employee negligence. These problems will not solve themselves, and they likewise wonât improve without drastic action. An effort needs to be made to help direct interested and qualified individuals to the field of cybersecurity to move toward closing this gap. Moreover, steps need to be made to better inform the public of general safety measures while online, including the safeguarding of sensitive information.
A large issue with solving the problems at hand is that there seems to be no comprehensive curriculum for cybersecurity education to teach these basic principles. In my paper, I review and compare several after- and in-school programs that attempt to address this problem. Iâve also interviewed teachers from Montgomery County Public Schools, a relatively ethnically diverse school district outside of Washington, D.C.
These issues need to be addressed, and while private organizations and local schools are attempting to tackle the problem, wider action may need to be taken at a national level to come to a resolution
IEEE Access special section editorial: Artificial intelligence enabled networking
With todayâs computer networks becoming increasingly dynamic, heterogeneous, and complex, there is great interest in deploying artificial intelligence (AI) based techniques for optimization and management of computer networks. AI techniquesâthat subsume multidisciplinary techniques from machine learning, optimization theory, game theory, control theory, and meta-heuristicsâhave long been applied to optimize computer networks in many diverse settings. Such an approach is gaining increased traction with the emergence of novel networking paradigms that promise to simplify network management (e.g., cloud computing, network functions virtualization, and software-defined networking) and provide intelligent services (e.g., future 5G mobile networks). Looking ahead, greater integration of AI into networking architectures can help develop a future vision of cognitive networks that will show network-wide intelligent behavior to solve problems of network heterogeneity, performance, and quality of service (QoS)
Cybersecurity in the Classroom: Bridging the Gap Between Computer Access and Online Safety
According to ISACA, there will be a global shortage of 2 million cybersecurity professionals worldwide by 2019. Additionally, according to Experian Data Breach Resolution, as much as 80% of all network breaches can be traced to employee negligence. These problems will not solve themselves, and they likewise wonât improve without drastic action. An effort needs to be made to help direct interested and qualified individuals to the field of cybersecurity to move toward closing this gap. Moreover, steps need to be made to better inform the public of general safety measures while online, including the safeguarding of sensitive information.
A large issue with solving the problems at hand is that there seems to be no comprehensive curriculum for cybersecurity education to teach these basic principles. In my paper, I review and compare several after- and in-school programs that attempt to address this problem. Iâve also interviewed teachers from Montgomery County Public Schools, a relatively ethnically diverse school district outside of Washington, D.C.
These issues need to be addressed, and while private organizations and local schools are attempting to tackle the problem, wider action may need to be taken at a national level to come to a resolution
- âŚ