28,558 research outputs found
Systematic development of courseware systems
Various difficulties have been reported in relation to the development of courseware systems. A central problem is to address the needs of not only the learner, but also instructor, developer, and other stakeholders, and to integrate these different needs. Another problem area is courseware architectures, to which much work has been dedicated recently. We present a systematic approach to courseware development – a methodology for courseware engineering – that addresses these problems. This methodology is rooted in the educational domain and is based on methods for software development in this context. We illustrate how this methodology can improve the quality of courseware systems and the development process
Collective awareness platforms and digital social innovation mediating consensus seeking in problem situations
In this paper we show the results of our studies carried out in the framework of the European Project SciCafe2.0 in the area of Participatory Engagement models. We present a methodological approach built on participative engagements models and holistic framework for problem situation clarification and solution impacts assessment. Several online platforms for social engagement have been analysed to extract the main patterns of participative engagement. We present our own experiments through the SciCafe2.0 Platform and our insights from requirements elicitation
Adaptive development and maintenance of user-centric software systems
A software system cannot be developed without considering the various facets of its environment. Stakeholders – including the users that play a central role – have their needs, expectations, and perceptions of a system. Organisational and technical aspects of the environment are constantly changing. The ability to adapt a software system and its requirements to its environment throughout its
full lifecycle is of paramount importance in a constantly changing environment. The continuous involvement of users is as important as the constant evaluation of the system and the observation of evolving environments. We present a methodology for adaptive software systems development and
maintenance. We draw upon a diverse range of accepted methods including participatory design, software architecture, and evolutionary design. Our focus is on user-centred software systems
Recommended from our members
JuxtaLearn D3.2 Performance Framework
This deliverable, D3.2, for Work Package 3 incorporating the pedagogy from WP2 and orchestration factors mapped in D3.1 reviews aspects of performance in the context of participative video making. It reviews literature on curiosity and engagement characteristics of interaction mechanisms for public displays and anticipates requirements for social network analysis of relevant public videos from WP6 task 6.3. Thus, to support JuxtaLearn performance it proposes a reflective performance framework that encompasses the material environment and objects required, the participants, and the knowledge needed
Recommended from our members
Lessons learned in developing a Second Life educational environment
Virtual worlds are rapidly spreading beyond gaming and entertainment into education and the corporate world. Should this trend continue, as forecast by the industry, then immersive applications will become more prominent, with bespoke software developed in the metaverse affording both opportunities and challenges. This paper reflects on the experience of developing a learning virtual space based on Second Life as part of an innovation project at The Open University, UK. The paper focuses on the lessons learnt from the viewpoint of managing the development of the learning environment, and could be of benefit to educators and educational technologists who are thinking to engage in this sort of development
Initiating e-learning by stealth, participation and consultation in a late majority institution
The extent to which opportunities afforded by e-learning are embraced by an institution can depend in large measure on whether it is perceived as enabling and transformative or as a major and disruptive distraction. Most case studies focus on the former. This paper describes how e-learning was introduced into the latter environment. The sensitivity of competing pressures in a research intensive university substantially influenced the manner in which e-learning was promoted. This paper tells that story, from initial stealth to eventual university acknowledgement of the relevance of e-learning specifically to its own context
Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science
e-Science projects face a difficult challenge in providing access to valuable computational resources, data and software to large communities of distributed users. Oil the one hand, the raison d'etre of the projects is to encourage members of their research communities to use the resources provided. Oil the other hand, the threats to these resources from online attacks require robust and effective Security to mitigate the risks faced. This raises two issues: ensuring that (I) the security mechanisms put in place are usable by the different users of the system, and (2) the security of the overall system satisfies the security needs of all its different stakeholders. A failure to address either of these issues call seriously jeopardise the success of e-Science projects.The aim of this paper is to firstly provide a detailed understanding of how these challenges call present themselves in practice in the development of e-Science applications. Secondly, this paper examines the steps that projects can undertake to ensure that security requirements are correctly identified, and security measures are usable by the intended research community. The research presented in this paper is based Oil four case studies of c-Science projects. Security design traditionally uses expert analysis of risks to the technology and deploys appropriate countermeasures to deal with them. However, these case studies highlight the importance of involving all stakeholders in the process of identifying security needs and designing secure and usable systems.For each case study, transcripts of the security analysis and design sessions were analysed to gain insight into the issues and factors that surround the design of usable security. The analysis concludes with a model explaining the relationships between the most important factors identified. This includes a detailed examination of the roles of responsibility, motivation and communication of stakeholders in the ongoing process of designing usable secure socio-technical systems such as e-Science. (C) 2007 Elsevier Ltd. All rights reserved
The Operation of Autonomous Mobile Robot Assistants in the Environment of Care Facilities Adopting a User-Centered Development Design
The successful development of autonomous mobile robot assistants depends significantly on the well-balanced reconcilements of the technically possible and the socially desirable. Based on empirical research 2 substantiated conclusions can be established for the suitability of "scenario-based design" (Rosson/Carroll 2003) for the successful development of mobile robot assistants and automated guided vehicles to be applied for service functions in stationary care facilities for seniors.User-Centered Technology Development, Knowledge-Transfer, Participative Assessment Methods, Robotics
Recommended from our members
Ethics and Design in the Brazilian Context
Often driven by practical and immediate requirements, more and more people are incorporating technology into a variety of aspects of their lives, often without reflecting on the consequences of using them. On the other hand, studies on interactive system development that lead to behavioral change have been gaining ground on the agenda of large HCI conferences. This movement brings to the forefront the fundamental issues of ethics in design and technology use. A designer’s intentions, when directing certain actions or behaviors, are not always explicit or desired by the stakeholders affected by the use of the technology. Systems that induce an undesired purchase, or even those that use conditioning strategies to cause a behavioral change are examples of such intentions. The challenge proposed is therefore about the relationship between design and personal freedom in a way that these technology users do not become victims, either passively or submissively, of the effects of its use. This advance allows for the redefinition of the relationship between man and technology, and the application of new forms of designing and developing interactive systems that take into account the ethical aspects of this relationship
- …