3,094 research outputs found

    Alignment Between Technology Acceptance And Instructional Design via Self-Efficacy

    Get PDF
    As organizations continue to implement new technology solutions, the need for both technology training and examining technology acceptance of new implementations are necessary to determine the success or failure of a project. Unfortunately, instructional design considerations generally do not address technology acceptance, and leading technology acceptance models only classify training as an external variable or facilitating condition, with limited consideration in prior research. In this paper, we examine potential integration points between instructional design theory and technology acceptance. Specifically, we examine prior research on self-efficacy, Kirkpatrick’s Model for Evaluating Training, Merrill’s Component Display Theory, and Merrill’s First Principles of Instruction

    Links between soil microbial communities and plant traits in a species-rich grassland under long-term climate change

    Get PDF
    Climate change can influence soil microorganisms directly by altering their growth and activity but also indirectly via effects on the vegetation, which modifies the availability of resources. Direct impacts of climate change on soil microorganisms can occur rapidly, whereas indirect effects mediated by shifts in plant community composition are not immediately apparent and likely to increase over time. We used molecular fingerprinting of bacterial and fungal communities in the soil to investigate the effects of 17 years of temperature and rainfall manipulations in a species‐rich grassland near Buxton, UK. We compared shifts in microbial community structure to changes in plant species composition and key plant traits across 78 microsites within plots subjected to winter heating, rainfall supplementation, or summer drought. We observed marked shifts in soil fungal and bacterial community structure in response to chronic summer drought. Importantly, although dominant microbial taxa were largely unaffected by drought, there were substantial changes in the abundances of subordinate fungal and bacterial taxa. In contrast to short‐term studies that report high resistance of soil fungi to drought, we observed substantial losses of fungal taxa in the summer drought treatments. There was moderate concordance between soil microbial communities and plant species composition within microsites. Vector fitting of community‐weighted mean plant traits to ordinations of soil bacterial and fungal communities showed that shifts in soil microbial community structure were related to plant traits representing the quality of resources available to soil microorganisms: the construction cost of leaf material, foliar carbon‐to‐nitrogen ratios, and leaf dry matter content. Thus, our study provides evidence that climate change could affect soil microbial communities indirectly via changes in plant inputs and highlights the importance of considering long‐term climate change effects, especially in nutrient‐poor systems with slow‐growing vegetation

    Teaching versus Research: An Imbalance of Importance?

    Get PDF
    This article features two essays presenting the major argumentative positions advanced by teams Robert E. Pruett and James E. Sayer and Norbert H. Mills and David E. Tucker, regarding the topic: Resolved: that teaching and research are mutually-exclusive activities. Pruett and Sayer upheld the affirmative position on the resolution, while Mills and Tucker upheld the negative. In the traditional sense, it is easy to claim that the function of a professor is twofold: to be an effective and creative teacher and, at the same time, be able to accumulate and disseminate knowledge through research. Regardless of what is said, teaching has become subservient to research and, while the responsibility of faculty members is to remain current in their fields, research is a separate activity that does not necessarily make one a better teacher and certainly is exclusive from the teaching function. N. Mills and D. Tucker contend that there is no constituency because teaching has been devalued and separated from research

    Two swimming modes in Trachymedusae; bell kinematics and the role of giant axons

    Get PDF
    Although members of the Rhopalonematidae family (Cnidaria, Hydrozoa, Trachymedusae) are known to exhibit unusually powerful jet swimming in addition to their more normal slow swimming behaviour, for the most part, reports are rare and anecdotal. Many species are found globally at depths of 600–2000 m, and so observation and collection depend on using remotely operated submersible vehicles. With a combination of in situ video footage and laboratory measurements, we have quantified kinematic aspects of this dual swimming motion and its electrophysiology. The species included are from two Rhopalonematidae clades; they are Colobonema sericeum, Pantachogon haeckeli, Crossota millsae and two species of Benthocodon. Comparison is made with Aglantha digitale, a species from a third Rhopalonematidae clade brought to the surface by natural water movement. We find that although all Rhopalonematidae appear to have two swimming modes, there are marked differences in their neural anatomy, kinematics and physiology. Giant motor axons, known to conduct impulses during fast swimming in A. digitale, are absent from C. sericeum and P. haeckeli. Slow swimming is also different; in C. sericeum and its relatives it is driven by contractions restricted to the base of the bell, whereas in A. digitale it is driven by contractions in the mid-bell region. These behavioural differences are related to the position of the different clades on a ribosomal DNA-based phylogenetic tree. This finding allows us to pinpoint the phylogenetic branch point leading to the appearance of giant motor axons and escape swimming. They place the remarkable dual swimming behaviour of members of the Rhopalonematidae family into an evolutionary context

    Cybergriping: Violating the Law while E-Complaining

    Get PDF
    The emergence of Web communications has given rise to complaint sites which serve as central forums for both consumers and employees to share their bad experiences. These complaint sites provide for cybergriping in various forms. This paper explores the concept of cybergriping and its relevance to the hospitality and tourism industry from employee and customer perspectives. Court cases in which cybergriping played a key role are reviewed, and recommendations are offered on how hospitality and tourism businesses can address the problem of cybergriping

    A Method for Revealing and Addressing Security Vulnerabilities in Cyber-physical Systems by Modeling Malicious Agent Interactions with Formal Verification

    Get PDF
    Several cyber-attacks on the cyber-physical systems (CPS) that monitor and control critical infrastructure were publically announced over the last few years. Almost without exception, the proposed security solutions focus on preventing unauthorized access to the industrial control systems (ICS) at various levels – the defense in depth approach. While useful, it does not address the problem of making the systems more capable of responding to the malicious actions of an attacker once they have gained access to the system. The first step in making an ICS more resilient to an attacker is identifying the cyber security vulnerabilities the attacker can use during system design. This paper presents a method that reveals cyber security vulnerabilities in ICS through the formal modeling of the system and malicious agents. The inclusion of the malicious agent in the analysis of an existing systems identifies security vulnerabilities that are missed in traditional functional model checking

    An FPGA-Based System for Tracking Digital Information Transmitted Via Peer-to-Peer Protocols

    Get PDF
    This paper presents a Field Programmable Gate Array (FPGA)-based tool designed to process file transfers using the BitTorrent Peer-to-Peer (P2P) protocol and VoIP phone calls made using the Session Initiation Protocol (SIP). The tool searches selected control messages in real time and compares the unique identifier of the shared file or phone number against a list of known contraband files or phone numbers. Results show the FPGA tool processes P2P packets of interest 92% faster than a software-only configuration and is 97.6% accurate at capturing and processing messages at a traffic load of 89.6 Mbps
    • 

    corecore