2,621 research outputs found

    Automated counter-terrorism

    Get PDF
    We present a holistic systems view of automated intelligence analysis for counter-terrorism with focus on the behavioural attributes of terrorist groups

    Online learning and fun with databases

    Get PDF
    In this paper, we explore how online learning can support face-to-face teaching in fundamental database theory and the contributions it can make towards motivating and enhancing the student learning experience. We show how we have used WebCT for a third level database module and present student feedback to our approach. While online participation is high overall, motivation for self-learning is increased by the use of self-assessment exercises and summative assessment was also considered to be more fun online than using paper based equivalents. Evidence exists to link greater online participation of course materials to improved performance. We complement our feedback by presenting and discussing a number of software tools which help students practice important methods in database systems, including SQL. After evaluating these against known methods for improving student motivation, we suggest ideas for further development of more game-like learning tools

    Contemporary database topics:learning by teaching

    Get PDF
    Passive learning is generally believed to be ineffectual in that it leads to a generally impoverished student experience manifested by poor attendance, engagement and motivation alike. A shift towards a more pro-active learning experience was therefore the main motivator for the proposed method outlined in this paper. The method adopted was applied to a single module for a cohort of postgraduate, mainly international students. In our method, each student is charged with delivering a specialist database topic as part of an allocated group. They self-organise their group into two sub-groups for lecture and tutorial delivery respectively. Staff support the process by delivering the teaching in the first half of the module. The second, student-led phase is staff-supported using preparatory meetings to discuss content and presentation issues prior to delivery. Feedback overall indicates that the method is effective, particularly in confidence building. We believe that the latter more than compensates for the one or two concerns raised about the quality of information being received. We conclude by discussing a number of changes based on two years’ experience and student feedback

    The Cattleman and Dystocia

    Get PDF
    There are many factors which contribute to dystocia (calving difficulty). The cattleman should be aware of these factors so he can make sound management decisi0ns and reduce loss. In fact, losses from dystocia extend far beyond death loss in cows and calves. There are significant hidden losses of a more subtle nature. In cows with dystocia at the San Juan Basin Experiment Station, calving interval was increased 13 days, calves were 32 pounds lighter at weaning and 14% more were open than cows with normal calving histories. Data from the Meat Experiment Station at Clay Center indicates the same type of lowered reproductive performance (Table I). It is likely that much of this loss is generated by lack of sanitary calving facilities and handling techniques and is preventable

    Emotive computing may have a role in telecare

    Get PDF
    This brief paper sets out arguments for the introduction of new technologies into telecare and lifestyle monitoring that can detect and monitor the emotive state of patients. The significantly increased use of computers by older people will enable the elements of emotive computing to be integrated with features such as keyboards and webcams, to provide additional information on emotional state. When this is combined with other data, there will be significant opportunities for system enhancement and the identification of changes in user status, and hence of need. The ubiquity of home computing makes the keyboard a very attractive, economic and non-intrusive means of data collection and analysis

    Introduction to the Special Issue on the AMCIS 2002 Panels and Workshops

    Get PDF
    This special issue of CAIS marks the second year in which the journal presents papers based on AMCIS workshops and panels. Information technology is evolving at a pace that exceeds any other academic discipline. Consequently, it is critical that conferences, such as AMCIS, provide opportunities for academics to learn about teaching methodologies and emerging technologies from their colleagues and from industry experts. This articles provides an overview of the workshops and panel papers published

    Linking recorded data with emotive and adaptive computing in an eHealth environment

    Get PDF
    Telecare, and particularly lifestyle monitoring, currently relies on the ability to detect and respond to changes in individual behaviour using data derived from sensors around the home. This means that a significant aspect of behaviour, that of an individuals emotional state, is not accounted for in reaching a conclusion as to the form of response required. The linked concepts of emotive and adaptive computing offer an opportunity to include information about emotional state and the paper considers how current developments in this area have the potential to be integrated within telecare and other areas of eHealth. In doing so, it looks at the development of and current state of the art of both emotive and adaptive computing, including its conceptual background, and places them into an overall eHealth context for application and development

    Towards the improvement of self-service systems via emotional virtual agents

    Get PDF
    Affective computing and emotional agents have been found to have a positive effect on human-computer interactions. In order to develop an acceptable emotional agent for use in a self-service interaction, two stages of research were identified and carried out; the first to determine which facial expressions are present in such an interaction and the second to determine which emotional agent behaviours are perceived as appropriate during a problematic self-service shopping task. In the first stage, facial expressions associated with negative affect were found to occur during self-service shopping interactions, indicating that facial expression detection is suitable for detecting negative affective states during self-service interactions. In the second stage, user perceptions of the emotional facial expressions displayed by an emotional agent during a problematic self-service interaction were gathered. Overall, the expression of disgust was found to be perceived as inappropriate while emotionally neutral behaviour was perceived as appropriate, however gender differences suggested that females perceived surprise as inappropriate. Results suggest that agents should change their behaviour and appearance based on user characteristics such as gender

    Undermining:social engineering using open source intelligence gathering

    Get PDF
    Digital deposits are undergoing exponential growth. These may in turn be exploited to support cyber security initiatives through open source intelligence gathering. Open source intelligence itself is a doubleedged sword as the data may be harnessed not only by intelligence services to counter cyber-crime and terrorist activity but also by the perpetrator of criminal activity who use them to socially engineer online activity and undermine their victims. Our preliminary case study shows how the security of any company can be surreptitiously compromised by covertly gathering the open source personal data of the company’s employees and exploiting these in a cyber attack. Our method uses tools that can search, drill down and visualise open source intelligence structurally. It then exploits these data to organise creative spear phishing attacks on the unsuspecting victims who unknowingly activate the malware necessary to compromise the company’s computer systems. The entire process is the covert and virtual equivalent of overtly stealing someone’s password ‘over the shoulder’. A more sophisticated development of this case study will provide a seamless sequence of interoperable computing processes from the initial gathering of employee names to the successful penetration of security measures
    • …
    corecore