289,974 research outputs found

    Some philosophical enquiries on E-learning: preparing the tomorrow business school

    Get PDF
    Emerging digital technologies and increasing interest in the computerized delivery of higher education have led to e-learning through electronic mail, the Internet, the World Wide Web (WWW), and multimedia. The major objective of this research outlet is to examine the e-learning evolution in business schools. Our research intentions are to investigate: 1. if universities understand the market dynamics (regarding to segmentation and crossing the chasm); 2. mapping the s-curve to student needs and 3. how business schools will change the value map. From the analysis of existing empirical evidence and our research results from 140 business students of the University of Ioannina (Greece) and 50 business students of the University of Winchester (UK), we can summarize that: a. value is created when new technology is matched to student need; b. but student needs change: as the technology evolves existing students develop new needs and in addition the technology may appeal to new kinds of students, with new kinds of needs and c. understanding the structure of student needs may be particularly important at times of potential discontinuity, when existing students may reject new technologies (for excellent reasons!).  The authors suggest that business schools interested in being productive should invest in implementing performance tools for all educational methods in order to accomplish the educational objectives. Further research in this crucial field of the evolution of e-learning in business schools is the examination of anticipated benefits and the experiences by early e-learning adopters, return on investment and expectations for the future

    Binary Particle Swarm Optimization based Biclustering of Web usage Data

    Full text link
    Web mining is the nontrivial process to discover valid, novel, potentially useful knowledge from web data using the data mining techniques or methods. It may give information that is useful for improving the services offered by web portals and information access and retrieval tools. With the rapid development of biclustering, more researchers have applied the biclustering technique to different fields in recent years. When biclustering approach is applied to the web usage data it automatically captures the hidden browsing patterns from it in the form of biclusters. In this work, swarm intelligent technique is combined with biclustering approach to propose an algorithm called Binary Particle Swarm Optimization (BPSO) based Biclustering for Web Usage Data. The main objective of this algorithm is to retrieve the global optimal bicluster from the web usage data. These biclusters contain relationships between web users and web pages which are useful for the E-Commerce applications like web advertising and marketing. Experiments are conducted on real dataset to prove the efficiency of the proposed algorithms

    Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues

    Full text link
    Improved interoperability between public and private organizations is of key significance to make digital government newest triumphant. Digital Government interoperability, information sharing protocol and security are measured the key issue for achieving a refined stage of digital government. Flawless interoperability is essential to share the information between diverse and merely dispersed organisations in several network environments by using computer based tools. Digital government must ensure security for its information systems, including computers and networks for providing better service to the citizens. Governments around the world are increasingly revolving to information sharing and integration for solving problems in programs and policy areas. Evils of global worry such as syndrome discovery and manage, terror campaign, immigration and border control, prohibited drug trafficking, and more demand information sharing, harmonization and cooperation amid government agencies within a country and across national borders. A number of daunting challenges survive to the progress of an efficient information sharing protocol. A secure and trusted information-sharing protocol is required to enable users to interact and share information easily and perfectly across many diverse networks and databases globally.Comment: 20 page

    Guess the score, fostering collective intelligence in the class

    Get PDF
    This paper proposes the use of serious games as a tool to enhance collective intelligence of undergraduate and graduate students. The development of social skills of individuals in a group is related to the performance of the collective intelligence of the group manifested through the shared and collaborative development of intellectual tasks [1]. Guess the Score GS, is a serious game implemented by means of an online tool, created to foster the development, collaboration and engagement of students. It's has been designed with the intention of facilitating the development of individual’s social skills in a group in order to promote education of collective intelligence. This paper concludes that the design of learning activities using serious games as a support tool in education, generate awareness about of utilities of gaming in the collective learning environment and the fostering of collective intelligence education.Postprint (published version

    Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts

    Get PDF
    The Internet and the World Wide Web have become integral parts of the lives of many modern individuals, enabling almost instantaneous communication, sharing and broadcasting of thoughts, feelings and opinions. Much of this information is publicly facing, and as such, it can be utilised in a multitude of online investigations, ranging from employee vetting and credit checking to counter-terrorism and fraud prevention/detection. However, the search needs and behaviours of these investigators are not well documented in the literature. In order to address this gap, an in-depth qualitative study was carried out in cooperation with a leading investigation company. The research contribution is an initial identification of Open-Source Intelligence investigator search behaviours, the procedures and practices that they undertake, along with an overview of the difficulties and challenges that they encounter as part of their domain. This lays the foundation for future research in to the varied domain of Open-Source Intelligence gathering

    Fostering collective intelligence education

    Get PDF
    New educational models are necessary to update learning environments to the digitally shared communication and information. Collective intelligence is an emerging field that already has a significant impact in many areas and will have great implications in education, not only from the side of new methodologies but also as a challenge for education. This paper proposes an approach to a collective intelligence model of teaching using Internet to combine two strategies: idea management and real time assessment in the class. A digital tool named Fabricius has been created supporting these two elements to foster the collaboration and engagement of students in the learning process. As a result of the research we propose a list of KPI trying to measure individual and collective performance. We are conscious that this is just a first approach to define which aspects of a class following a course can be qualified and quantified.Postprint (published version

    Natural language processing

    Get PDF
    Beginning with the basic issues of NLP, this chapter aims to chart the major research activities in this area since the last ARIST Chapter in 1996 (Haas, 1996), including: (i) natural language text processing systems - text summarization, information extraction, information retrieval, etc., including domain-specific applications; (ii) natural language interfaces; (iii) NLP in the context of www and digital libraries ; and (iv) evaluation of NLP systems

    Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports

    Full text link
    Open-Source Projects and Libraries are being used in software development while also bearing multiple security vulnerabilities. This use of third party ecosystem creates a new kind of attack surface for a product in development. An intelligent attacker can attack a product by exploiting one of the vulnerabilities present in linked projects and libraries. In this paper, we mine threat intelligence about open source projects and libraries from bugs and issues reported on public code repositories. We also track library and project dependencies for installed software on a client machine. We represent and store this threat intelligence, along with the software dependencies in a security knowledge graph. Security analysts and developers can then query and receive alerts from the knowledge graph if any threat intelligence is found about linked libraries and projects, utilized in their products
    • …
    corecore