155,190 research outputs found
Changing Tools Changing Attitudes: Effects of introducing a computer system to promote learning at work
The use of computer-supported collaborative learning (CSCL) tools to manage and support learning at
work offers a lot of advantages, such as the increase in the availability and access to knowledge.
However, computer systems also introduce new ways of doing things, which may impact on their
acceptability and usage in an organisation. The study considers the issue of re-mediating human
activity through the introduction of a CSCL system to support collaborative organisational learning
(COL) activities as a way of promoting learning at work. A comparative study into the effects of remediating
work practices in an organisation was conducted 'before' and 'after' the introduction of a
CSCL system using three selected constitutive elements of COL namely: collaboration, knowledge
sharing and interactivity. The study used activity theory as a framework for examining the support
mechanisms for the selected elements of COL from a social and cultural perspective in terms of how
they occur, and how they are supported in context. Findings highlighted the importance of accounting
for social and cultural issues relating to the tool user, prior to the introduction of a CSCL system to
support learning at work, as these could impact on the usage and acceptability of such a tool
The unseen and unacceptable face of digital libraries
The social and organisational aspects of digital libraries (DLs) are often overlooked, but this paper reviews how they can affect users' awareness and acceptance of DLs. An analysis of research conducted within two contrasting domains (clinical and academic) is presented which highlights issues of user interactions, work practices and organisational social structures. The combined study comprises an analysis of 98 in-depth interviews and focus groups with lecturers, librarians and hospital clinicians. The importance of current and past roles of the library, and how users interacted with it, are revealed. Web-based DLs, while alleviating most library resource and interaction problems, require a change in librarians' and DL designers' roles and interaction patterns if they are to be implemented acceptably and effectively. Without this role change, users will at best be unaware of these digital resources and at worst feel threatened by them. The findings of this paper highlight the importance of DL design and implementation of the social context and supporting user communication (i.e., collaboration and consultation) in information searching and usage activities. © Springer-Verlag 2004
Technical support for Life Sciences communities on a production grid infrastructure
Production operation of large distributed computing infrastructures (DCI)
still requires a lot of human intervention to reach acceptable quality of
service. This may be achievable for scientific communities with solid IT
support, but it remains a show-stopper for others. Some application execution
environments are used to hide runtime technical issues from end users. But they
mostly aim at fault-tolerance rather than incident resolution, and their
operation still requires substantial manpower. A longer-term support activity
is thus needed to ensure sustained quality of service for Virtual Organisations
(VO). This paper describes how the biomed VO has addressed this challenge by
setting up a technical support team. Its organisation, tooling, daily tasks,
and procedures are described. Results are shown in terms of resource usage by
end users, amount of reported incidents, and developed software tools. Based on
our experience, we suggest ways to measure the impact of the technical support,
perspectives to decrease its human cost and make it more community-specific.Comment: HealthGrid'12, Amsterdam : Netherlands (2012
Idea-caution before exploitation:the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities
The transfer of cybersecurity domain knowledge from security experts (‘Ethical Hackers’) to software engineers is discussed in terms of desirability and feasibility. Possible mechanisms for the transfer are critically examined. Software engineering methodologies do not make use of security domain knowledge in its form of vulnerability databases (e.g. CWE, CVE, Exploit DB), which are therefore not appropriate for this purpose. An approach based upon the improved use of pattern languages that encompasses security domain knowledge is proposed
Recommended from our members
Police Knowledge Exchange: Full Report 2018
[Executive Summary]
This report was commissioned to explore the enablers and barriers to sharing within and between police forces and between police forces and partners, including the public. This was completed from an interdisciplinary review of international literature covering sharing, knowledge exchange, learning and organisational learning. The literature broke down into four main factors; who, why, what and how. An introduction to the literature is presented with ‘Who’ is sharing which considers both personal identity and different institutional issues. The ‘Why’ literature covers issues of cultural and community motivators and barriers. The ‘What’ segment reviews concepts of data, information and knowledge and related legislative issues. Finally, the ‘how’ section spans face to face sharing approaches to technologies that produce both enablers and barriers. A series of 42 in-depth interviews and focus groups were completed and combined with 47 survey responses . The aim of the interviews, focus groups and survey was to show perceptions and beliefs around knowledge sharing from a small sample across policing in order to complement the findings from the literature review.
The survey was adapted from a standardised questionnaire (Biggs, 1987). The Biggs questionnaire focused on what motivated students to learn and how they approached their learning. Our adapted survey looked at what motivated police to share, and how they approached sharing. The responses showed a trend, across the police, towards a motivation for sharing to develop a deeper understanding of issues. However, the approaches and the strategies they used to share with others, which were primarily driven by achieving and surface approaches (to get promoted and get the job done). According to Biggs (1987) this could leave them discontented as they never progress to a deeper understanding of issues. Scaffolding sharing within the police through processes that are clearly defined, effective and valued could help to overcome these issues.
Within the interviews and focus group findings a similar structured approach to sharing was adopted. Within the ‘who’ section some key aspects around personal relationships, reciprocity and reputation were identified. The ‘why’ the police share was one of the largest discussion points. Not only was there a deep motivation to solve key policing issues there was an approach of reciprocity. Police sharing was deeply motivated to support ‘good practice’ in the prevention and detection of crime. However, a sharing barrier was identified in the parity of value given to different types of knowledge for example between professional judgement and research evidence knowledge. Sharing was achieved when there were reciprocal benefits, in particular with personal networks or face to face sharing which was noted as ‘safe’. Again, this was inhibited by misunderstandings around the ‘risks’ of sharing, frequently attributed to data protection legislation; producing cautious reactions and as an avoidance tactic to save time and effort sharing. However, a divide was noted between technical users and those who avoided any online systems for sharing; often due to poorly designed systems and a lack of confidence in how to use systems. The police culture was identified as being risk-adverse, and competitive due to multiple factors, a lack of supported time to share, Her Majesty’s Inspectorate of Constabulary (HMIC) reviews and promotion criteria. The result was perceived to be a poor cultural ability to learn from mistakes and a likelihood to repeat errors.
A set of strategic recommendations are given and include the use of a sharing authorised professional practice for HMIC reviews, sharing networks and training. A further set of operational recommendations are given such as; sharing impact cases for evidence based practice, data sharing officers and evaluating mechanisms for sharing.
This full report is supported by the Police Knowledge Exchange Summary Report 2018 which gives an overview of the findings and recommendations
The INCF Digital Atlasing Program: Report on Digital Atlasing Standards in the Rodent Brain
The goal of the INCF Digital Atlasing Program is to provide the vision and direction necessary to make the rapidly growing collection of multidimensional data of the rodent brain (images, gene expression, etc.) widely accessible and usable to the international research community. This Digital Brain Atlasing Standards Task Force was formed in May 2008 to investigate the state of rodent brain digital atlasing, and formulate standards, guidelines, and policy recommendations.

Our first objective has been the preparation of a detailed document that includes the vision and specific description of an infrastructure, systems and methods capable of serving the scientific goals of the community, as well as practical issues for achieving
the goals. This report builds on the 1st INCF Workshop on Mouse and Rat Brain Digital Atlasing Systems (Boline et al., 2007, _Nature Preceedings_, doi:10.1038/npre.2007.1046.1) and includes a more detailed analysis of both the current state and desired state of digital atlasing along with specific recommendations for achieving these goals
Development of a pilot data management infrastructure for biomedical researchers at University of Manchester – approach, findings, challenges and outlook of the MaDAM Project
Management and curation of digital data has been becoming ever more important in a higher education and research environment characterised by large and complex data, demand for more interdisciplinary and collaborative work, extended funder requirements and use of e-infrastructures to facilitate new research methods and paradigms. This paper presents the approach, technical infrastructure, findings, challenges and outlook (including future development within the successor project, MiSS) of the ‘MaDAM: Pilot data management infrastructure for biomedical researchers at University of Manchester’ project funded under the infrastructure strand of the JISC Managing Research Data (JISCMRD) programme. MaDAM developed a pilot research data management solution at the University of Manchester based on biomedical researchers’ requirements, which includes technical and governance components with the flexibility to meet future needs across multiple research groups and disciplines
TERMS: Techniques for electronic resources management
Librarians and information specialists have been finding ways to manage electronic resources for over a decade now. However, much of this work has been an ad hoc and learn-as-you-go process. The literature on electronic resource management shows this work as being segmented into many different areas of traditional librarian roles within the library. In addition, the literature show how management of these resources has driven the development of various management tools in the market as well as serve as the greatest need in the development of next generation library systems. TERMS is an attempt to create a series of on-going and continually developing set of management best practices for electronic resource management in libraries
Sentara Healthcare: A Case Study Series on Disruptive Innovation Within Integrated Health Systems
Examines how integration and ties with health plans, physicians, and hospitals helped protect against revenue volatility and enabled experimentation; factors that facilitate integration; innovative practices; lessons learned; and policy implications
- …