289,974 research outputs found
Some philosophical enquiries on E-learning: preparing the tomorrow business school
Emerging digital technologies and increasing interest in the computerized delivery of higher education have led to e-learning through electronic mail, the Internet, the World Wide Web (WWW), and multimedia. The major objective of this research outlet is to examine the e-learning evolution in business schools. Our research intentions are to investigate: 1. if universities understand the market dynamics (regarding to segmentation and crossing the chasm); 2. mapping the s-curve to student needs and 3. how business schools will change the value map. From the analysis of existing empirical evidence and our research results from 140 business students of the University of Ioannina (Greece) and 50 business students of the University of Winchester (UK), we can summarize that: a. value is created when new technology is matched to student need; b. but student needs change: as the technology evolves existing students develop new needs and in addition the technology may appeal to new kinds of students, with new kinds of needs and c. understanding the structure of student needs may be particularly important at times of potential discontinuity, when existing students may reject new technologies (for excellent reasons!). Â The authors suggest that business schools interested in being productive should invest in implementing performance tools for all educational methods in order to accomplish the educational objectives. Further research in this crucial field of the evolution of e-learning in business schools is the examination of anticipated benefits and the experiences by early e-learning adopters, return on investment and expectations for the future
Binary Particle Swarm Optimization based Biclustering of Web usage Data
Web mining is the nontrivial process to discover valid, novel, potentially
useful knowledge from web data using the data mining techniques or methods. It
may give information that is useful for improving the services offered by web
portals and information access and retrieval tools. With the rapid development
of biclustering, more researchers have applied the biclustering technique to
different fields in recent years. When biclustering approach is applied to the
web usage data it automatically captures the hidden browsing patterns from it
in the form of biclusters. In this work, swarm intelligent technique is
combined with biclustering approach to propose an algorithm called Binary
Particle Swarm Optimization (BPSO) based Biclustering for Web Usage Data. The
main objective of this algorithm is to retrieve the global optimal bicluster
from the web usage data. These biclusters contain relationships between web
users and web pages which are useful for the E-Commerce applications like web
advertising and marketing. Experiments are conducted on real dataset to prove
the efficiency of the proposed algorithms
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues
Improved interoperability between public and private organizations is of key
significance to make digital government newest triumphant. Digital Government
interoperability, information sharing protocol and security are measured the
key issue for achieving a refined stage of digital government. Flawless
interoperability is essential to share the information between diverse and
merely dispersed organisations in several network environments by using
computer based tools. Digital government must ensure security for its
information systems, including computers and networks for providing better
service to the citizens. Governments around the world are increasingly
revolving to information sharing and integration for solving problems in
programs and policy areas. Evils of global worry such as syndrome discovery and
manage, terror campaign, immigration and border control, prohibited drug
trafficking, and more demand information sharing, harmonization and cooperation
amid government agencies within a country and across national borders. A number
of daunting challenges survive to the progress of an efficient information
sharing protocol. A secure and trusted information-sharing protocol is required
to enable users to interact and share information easily and perfectly across
many diverse networks and databases globally.Comment: 20 page
Guess the score, fostering collective intelligence in the class
This paper proposes the use of serious games as a tool to enhance collective intelligence of undergraduate and graduate students. The development of social skills of individuals in a group is related to the performance of the collective intelligence of the group manifested through the shared and collaborative development of intellectual tasks [1]. Guess the Score GS, is a serious game implemented by means of an online tool, created to foster the development, collaboration and engagement of students. It's has been designed with the intention of facilitating the development of individual’s social skills in a group in order to promote education of collective intelligence. This paper concludes that the design of learning activities using serious games as a support tool in education, generate awareness about of utilities of gaming in the collective learning environment and the fostering of collective intelligence education.Postprint (published version
Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts
The Internet and the World Wide Web have become integral parts of the lives of many modern individuals, enabling almost instantaneous communication, sharing and broadcasting of thoughts, feelings and opinions. Much of this information is publicly facing, and as such, it can be utilised in a multitude of online investigations, ranging from employee vetting and credit checking to counter-terrorism and fraud prevention/detection. However, the search needs and behaviours of these investigators are not well documented in the literature. In order to address this gap, an in-depth qualitative study was carried out in cooperation with a leading investigation company. The research contribution is an initial identification of Open-Source Intelligence investigator search behaviours, the procedures and practices that they undertake, along with an overview of the difficulties and challenges that they encounter as part of their domain. This lays the foundation for future research in to the varied domain of Open-Source Intelligence gathering
Fostering collective intelligence education
New educational models are necessary to update learning environments to the digitally shared communication and information. Collective intelligence is an emerging field that already has a significant impact in many areas and will have great implications in education, not only from the side of new methodologies but also as a challenge for education. This paper proposes an approach to a collective intelligence model of teaching using Internet to combine two strategies: idea management and real time assessment in the class. A digital tool named Fabricius has been created supporting these two elements to foster the collaboration and engagement of students in the learning process. As a result of the research we propose a list of KPI trying to measure individual and collective performance. We are conscious that this is just a first approach to define which aspects of a class following a course can be qualified and quantified.Postprint (published version
Natural language processing
Beginning with the basic issues of NLP, this chapter aims to chart the major research activities in this area since the last ARIST Chapter in 1996 (Haas, 1996), including: (i) natural language text processing systems - text summarization, information extraction, information retrieval, etc., including domain-specific applications; (ii) natural language interfaces; (iii) NLP in the context of www and digital libraries ; and (iv) evaluation of NLP systems
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports
Open-Source Projects and Libraries are being used in software development
while also bearing multiple security vulnerabilities. This use of third party
ecosystem creates a new kind of attack surface for a product in development. An
intelligent attacker can attack a product by exploiting one of the
vulnerabilities present in linked projects and libraries.
In this paper, we mine threat intelligence about open source projects and
libraries from bugs and issues reported on public code repositories. We also
track library and project dependencies for installed software on a client
machine. We represent and store this threat intelligence, along with the
software dependencies in a security knowledge graph. Security analysts and
developers can then query and receive alerts from the knowledge graph if any
threat intelligence is found about linked libraries and projects, utilized in
their products
- …