77,470 research outputs found
Developing teaching identities : An evaluation of the UAL postgraduate certificate - teaching in HE
This report has two aims. Firstly, it is an evaluation report of the first run of a new
course run by the Centre for Learning and Teaching in Art and Design (cltad). The
second aim is to begin to report on a longitudinal study of a small sample of individuals
entering into a career in teaching in Higher Arts Education. This strand of the study is
not concluded in this report, but preliminary findings from the cohort regarding their
professional identities at this point in time are included
Students And Service Staff Learning And Researching Together On A College Campus
Describes the preliminary study of a service learning program at Swarthmore College that paired students and college service staff in learning partnerships and as researchers of the program. Three primary questions were answered: How does service within a college campus count as service learning? How was the program community-shaping as well as personally enriching for students and staff? What place does participatory research have in service learning projects
Smart hospital emergency system via mobile-based requesting services
In recent years, the UK’s emergency call and response has shown elements of great strain as of today. The strain on emergency call systems estimated by a 9 million calls (including both landline and mobile) made in 2014 alone. Coupled with an increasing population and cuts in government funding, this has resulted in lower percentages of emergency response vehicles at hand and longer response times. In this paper, we highlight the main challenges of emergency services and overview of previous solutions. In addition, we propose a new system call Smart Hospital Emergency System (SHES). The main aim of SHES is to save lives through improving communications between patient and emergency services. Utilising the latest of technologies and algorithms within SHES is aiming to increase emergency communication throughput, while reducing emergency call systems issues and making the process of emergency response more efficient. Utilising health data held within a personal smartphone, and internal tracked data (GPU, Accelerometer, Gyroscope etc.), SHES aims to process the mentioned data efficiently, and securely, through automatic communications with emergency services, ultimately reducing communication bottlenecks. Live video-streaming through real-time video communication protocols is also a focus of SHES to improve initial communications between emergency services and patients. A prototype of this system has been developed. The system has been evaluated by a preliminary usability, reliability, and communication performance study
Public Opinions of Unmanned Aerial Technologies in 2014 to 2019: A Technical and Descriptive Report
The primary purpose of this report is to provide a descriptive and technical summary of the results from similar surveys administered in fall 2014 (n = 576), 2015 (n = 301), 2016 (ns = 1946 and 2089), and 2018 (n = 1050) and summer 2019 (n = 1300). In order to explore a variety of factors that may impact public perceptions of unmanned aerial technologies (UATs), we conducted survey experiments over time. These experiments randomly varied the terminology (drone, aerial robot, unmanned aerial vehicle (UAV), unmanned aerial system (UAS)) used to describe the technology, the purposes of the technology (for economic, environmental, or security goals), the actors (public or private) using the technology, the technology’s autonomy (fully autonomous, partially autonomous, no autonomy), and the framing (promotion or prevention) used to describe the technology’s purpose. Initially, samples were recruited through Amazon’s Mechanical Turk, required to be Americans, and paid a small amount for participation. In 2016 we also examined a nationally representative samples recruited from Qualtrics panels. After 2016 we only used nationally representative samples from Qualtrics. Major findings are reported along with details regarding the research methods and analyses
The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities
In spite of the growing importance of software security and the industry
demand for more cyber security expertise in the workforce, the effect of
security education and experience on the ability to assess complex software
security problems has only been recently investigated. As proxy for the full
range of software security skills, we considered the problem of assessing the
severity of software vulnerabilities by means of a structured analysis
methodology widely used in industry (i.e. the Common Vulnerability Scoring
System (\CVSS) v3), and designed a study to compare how accurately individuals
with background in information technology but different professional experience
and education in cyber security are able to assess the severity of software
vulnerabilities. Our results provide some structural insights into the complex
relationship between education or experience of assessors and the quality of
their assessments. In particular we find that individual characteristics matter
more than professional experience or formal education; apparently it is the
\emph{combination} of skills that one owns (including the actual knowledge of
the system under study), rather than the specialization or the years of
experience, to influence more the assessment quality. Similarly, we find that
the overall advantage given by professional expertise significantly depends on
the composition of the individual security skills as well as on the available
information.Comment: Presented at the Workshop on the Economics of Information Security
(WEIS 2018), Innsbruck, Austria, June 201
Recommended from our members
Recording Victim Video Statements as Evidence to Advance Legal Outcomes in Family Violence Cases (ReVEAL)
This Implementation Guide provides an overview of the video-recording practices currently in place across several Texas jurisdictions. It provides guidance and considerations for jurisdictions in the collection and use of video evidence in family violence cases. This guide is divided into seven sections, including this Background and Overview. The second section includes information for law enforcement on the purpose of video statements, how to develop and implement a video program, and considerations for sustaining a program. The third section focuses on prosecutorial practices for the use of video statements including legal considerations, coordination with partners, and victim engagement around the video statement. The fourth section provides specific information for victim advocates and includes considerations for victim privacy and confidentiality. The fifth section focuses on technology and equipment, with information on type of equipment, technology infrastructure, and efficient transfer of evidence between agencies. The sixth section is the Summary Report of the ReVEAL project. The Summary Report is a technical overview of the evaluation that includes major findings and links to the ReVEAL reports that were previously released. The seventh and final section is comprised of the appendices and provides sample protocols, site overviews, equipment charts, and additional resources that may be helpful to users of this guide. Throughout this guide, there are several examples of cases and practices that illustrate the specific issues that may present themselves when launching a video-recording program. These
examples highlight the complexities of the practice while using real world examples of how video impacts family violence cases,
victim safety, and privacy.IC2 Institut
Summary care record early adopter programme: an independent evaluation by University College London.
Benefits The main potential benefit of the SCR is considered to be in emergency and unscheduled care settings, especially for people who are unconscious, confused, unsure of their medical details, or unable to communicate effectively in English. Other benefits may include improved efficiency of care and avoidance of hospital admission, but it is too early for potential benefits to be verified or quantified. Progress As of end April 2008, the SCR of 153,188 patients in the first two Early Adopter sites (Bolton and Bury) had been created. A total of 614,052 patients in four Early Adopter sites had been sent a letter informing them of the programme and their choices for opting out of having a SCR. Staff attitudes and usage The evaluation found that many NHS staff in Early Adopter sites (which had been selected partly for their keenness to innovate in ICT) were enthusiastic about the SCR and keen to see it up and running, but a significant minority of GPs had chosen not to participate in the programme and others had deferred participation until data quality improvement work was completed. Whilst 80 per cent of patients interviewed were either positive about the idea of having a SCR or ?did not mind?, others were strongly opposed ?on principle?. Staff who had attempted to use the SCR when caring for patients felt that the current version was technically immature (describing it as ?clunky? and ?complicated?), and were looking forward to a more definitive version of the technology. A comparable technology (the Emergency Care Summary) introduced in Scotland two years ago is now working well, and over a million records have been accessed in emergency and out-of-hours care. Patient attitudes and awareness Having a SCR is optional (people may opt out if they wish, though fewer than one per cent of people in Early Adopter sites have done so) and technical security is said to be high via a system of password protection and strict access controls. Nevertheless, the evaluation showed that recent stories about data loss by government and NHS organisations had raised concerns amongst both staff and patients that human fallibility could potentially jeopardise the operational security of the system. Despite an extensive information programme to inform the public in Early Adopter sites about the SCR, many patients interviewed by the UCL team were not aware of the programme at all. This raises important questions about the ethics of an ?implied consent? model for creating the SCR. The evaluation recommended that the developers of the SCR should consider a model in which the patient is asked for ?consent to view? whenever a member of staff wishes to access their record. Not a single patient interviewed in the evaluation was confident that the SCR would be 100 per cent secure, but they were philosophical about the risks of security breaches. Typically, people said that the potential benefit of a doctor having access to key medical details in an emergency outweighed the small but real risk of data loss due to human or technical error. Even patients whose medical record contained potentially sensitive data such as mental health problems, HIV or drug use were often (though not always) keen to have a SCR and generally trusted NHS staff to treat sensitive data appropriately. However, they and many other NHS patients wanted to be able to control which staff members were allowed to access their record at the point of care. Some doctors, nurses and receptionists, it seems, are trusted to view a person?s SCR, whereas others are not, and this is a decision which patients would like to make in real time
- …