181 research outputs found

    Creative analysis of NSS data and collaborative research to inform good practice in assessment feedback

    Get PDF
    Funded by the Subject Centre for Social Policy and Social Work (SWAP), this research project sought to identify student and academic staff perspectives as to what constitutes effective assessment feedback practice. It was, in part, a subject level exploration in response to the fact that assessment feedback has consistently emerged as an area of concern to students completing National Student Satisfaction Surveys. Using mixed research methods, including drawing on data from the 2009 National Student Survey, the research was undertaken across SWAP constituency subject-areas in three universities. Whilst supportive of previous research reports (for example, Nicol & Macfarlane-Dick 2004, McDowell 2008, McDowell and Sambell 1999, Crook et al 2006), findings from this project particularly highlight the central significance to students of the quality of their relationships with staff. Indeed, other generic factors that are often argued to impact on assessment feedback such as timeliness and consistency appear to be contingent on the quality of staff-student relationships within specific departmental context

    Fast Computation of Smith Forms of Sparse Matrices Over Local Rings

    Full text link
    We present algorithms to compute the Smith Normal Form of matrices over two families of local rings. The algorithms use the \emph{black-box} model which is suitable for sparse and structured matrices. The algorithms depend on a number of tools, such as matrix rank computation over finite fields, for which the best-known time- and memory-efficient algorithms are probabilistic. For an \nxn matrix AA over the ring \Fzfe, where fef^e is a power of an irreducible polynomial f \in \Fz of degree dd, our algorithm requires \bigO(\eta de^2n) operations in \F, where our black-box is assumed to require \bigO(\eta) operations in \F to compute a matrix-vector product by a vector over \Fzfe (and η\eta is assumed greater than \Pden). The algorithm only requires additional storage for \bigO(\Pden) elements of \F. In particular, if \eta=\softO(\Pden), then our algorithm requires only \softO(n^2d^2e^3) operations in \F, which is an improvement on known dense methods for small dd and ee. For the ring \ZZ/p^e\ZZ, where pp is a prime, we give an algorithm which is time- and memory-efficient when the number of nontrivial invariant factors is small. We describe a method for dimension reduction while preserving the invariant factors. The time complexity is essentially linear in μnrelogp,\mu n r e \log p, where μ\mu is the number of operations in \ZZ/p\ZZ to evaluate the black-box (assumed greater than nn) and rr is the total number of non-zero invariant factors. To avoid the practical cost of conditioning, we give a Monte Carlo certificate, which at low cost, provides either a high probability of success or a proof of failure. The quest for a time- and memory-efficient solution without restrictions on the number of nontrivial invariant factors remains open. We offer a conjecture which may contribute toward that end.Comment: Preliminary version to appear at ISSAC 201

    The IS Core - VI: Further Along the Road to the IT Artifact

    Get PDF
    In one of the recent additions to the IS identity and diversity discussion, Alter questions the definition and relevance of IT artifact as defined by Benbasat and Zmud. In terms of definition, we believe that there is no substantial difference between Alter\u27s work system construct and IT artifact. However, when it comes to enhancing the relevance of and guiding the diversity in IT research, Alter\u27s boundary based approach may be less powerful than a core, IT-artifact based approach. Alter\u27s focus on systems, nonetheless, has it merits and therefore we suggest a possible convergence of Alter and Benbasat and Zmud\u27s constructs

    Decision Making, IT Governance, and Information Systems Security

    Get PDF
    The complex issue of IS security involves organizational factors. Decision making, an important area of organizations, however, has only been studied to a limited extent in relation to IS security. In this paper we explore the relationship between organizational distribution of decision rights and IS security. We review the security literature and identify three aspects of an organization as what we term the pillars bolstering the success of IS security – people, processes/structures, and technology. We top our IS Security Architecture with the integrative truss of IS security strategy. Employing Weill and Ross’ (2004) IT governance archetypes, we link this IS Security Architecture to IT governance, and propose that IT governance patterns can enhance security when the governance archetype in place matches the decision profile required by a security practice

    Student as producer: research-engaged teaching, an institutional strategy

    Get PDF
    Student as Producer is a curriculum development project that has been ongoing at the University of Lincoln since 2007. The aim of the project has been to promote research-engaged teaching as the organising principle for teaching and learning across all subjects and all levels of taught provision at Lincoln. While there are many examples of research-engaged teaching in higher education what makes the curriculum distinctive at Lincoln is that research-engaged teaching is the default position for all teaching and learning at the University. While Student as Producer has been under development at Lincoln since 2007 this report focuses on the period 2010-2013, when the University of Lincoln received funding, £200,000, from the Higher Education Academy to develop the programme. The main focus of this report is the embedding and implementation of Student as Producer at Lincoln, but as Student as Producer extends beyond Lincoln to involve other higher education providers the report will also pay attention to the external national and international impact of Student as Producer across the higher education sector. Student as Producer was conceived during momentous times in the history of higher education in this country, including a massive increase in student fees and the withdrawal of public funding for teaching the Arts, Humanities and Social Science. For a brief moment in time English students were at the forefront of protests across Europe against the financialisation of higher education and the politics of austerity (Bailey and Freedman 2011). Throughout this period academics involved with Student as Producer have written publications that have provided a consistent and clear position against the notion of student as consumer (Boden and Epstein2006) and the pedagogy of debt (Williams 2006)

    Interplay of scripts and resistance in a participatory workshop.

    Get PDF
    The article reports on a participatory workshop in which we were faced with two different types of resistance. We employ the notion of scripts to describe how this resistance emerged. On the one hand, we explain how a weak script caused distrust of the workshop rationale, while on the other, we explain how a strong script rendered the technological materials of the workshop useless and led to termination of the activity. We suggest that structuring workshops according to the notion of scripts may prove a useful way of exercising and learning from resistance and expanding our territory of exploration

    Pattern languages in HCI: A critical review

    Get PDF
    This article presents a critical review of patterns and pattern languages in human-computer interaction (HCI). In recent years, patterns and pattern languages have received considerable attention in HCI for their potential as a means for developing and communicating information and knowledge to support good design. This review examines the background to patterns and pattern languages in HCI, and seeks to locate pattern languages in relation to other approaches to interaction design. The review explores four key issues: What is a pattern? What is a pattern language? How are patterns and pattern languages used? and How are values reflected in the pattern-based approach to design? Following on from the review, a future research agenda is proposed for patterns and pattern languages in HCI
    corecore