19,537 research outputs found
Aplicación de la clase invertida en la educación superior: introducción a las nuevas tecnologías
Las autoras de este trabajo llevamos varios años trabajando con videos docentes
para la enseñanza de las matemáticas dentro de la Economía a nivel universitario. Esto
ha sido motivado por el auge de las nuevas tecnologías y las posibilidades docentes que
nos proporcionan.
La experiencia que teníamos en asignaturas virtuales nos ha permitido dar un paso
más y utilizar los videos docentes en las clases presenciales. Si bien empezamos
utilizándolos a modo de complemento, cuando conocimos la metodología de la flipped
classroom (o clase invertida) nos planteamos una nueva forma de enseñanza. Decidimos
invertir los papeles, de forma que el alumno, en vez de escuchar en clase y estudiar en
casa, toma el papel protagonista, estudiando en casa con ayuda de videos y material
proporcionado por el profesor y aprovecha el tiempo de clase para resolver ejercicios,
plantear dudas y trabajar en equipo.
Si bien esta metodología ha sido llevada a cabo con éxito en diversos niveles
educativos, en el caso universitario no se conocen muchas experiencias. En nuestro caso
hemos tenido que adaptarla, incorporando elementos adicionales, como el uso del
programa Socrative para conseguir una mayor retroalimentación del aprendizaje del
alumno.
En el presente trabajo mostramos la experiencia que hemos llevado a cabo en el
curso académico actual y recogemos la opinión de ambas partes, alumnos y profesores.Universidad de Málag
Formal security analysis of registration protocols for interactive systems: a methodology and a case of study
In this work we present and formally analyze CHAT-SRP (CHAos based
Tickets-Secure Registration Protocol), a protocol to provide interactive and
collaborative platforms with a cryptographically robust solution to classical
security issues. Namely, we focus on the secrecy and authenticity properties
while keeping a high usability. In this sense, users are forced to blindly
trust the system administrators and developers. Moreover, as far as we know,
the use of formal methodologies for the verification of security properties of
communication protocols isn't yet a common practice. We propose here a
methodology to fill this gap, i.e., to analyse both the security of the
proposed protocol and the pertinence of the underlying premises. In this
concern, we propose the definition and formal evaluation of a protocol for the
distribution of digital identities. Once distributed, these identities can be
used to verify integrity and source of information. We base our security
analysis on tools for automatic verification of security protocols widely
accepted by the scientific community, and on the principles they are based
upon. In addition, it is assumed perfect cryptographic primitives in order to
focus the analysis on the exchange of protocol messages. The main property of
our protocol is the incorporation of tickets, created using digests of chaos
based nonces (numbers used only once) and users' personal data. Combined with a
multichannel authentication scheme with some previous knowledge, these tickets
provide security during the whole protocol by univocally linking each
registering user with a single request. [..]Comment: 32 pages, 7 figures, 8 listings, 1 tabl
Analysis of tourism competitiveness and the key influencers
The aim of this research is measure and analyse the tourism competitiveness, which has become one of the great challenges of tourism researchers in recent years. We analyze the relationship between tourism competitiveness and major tourist magnitudes, relations with most tourist destinations, and some pillars that measure competitiveness such as sustainability.
A methodology for calculating an indicator of tourism competitiveness based on a double reference point is proposed, taking into account a level of aspiration and reserve level for each pillar of competitiveness. They are considered different degrees of offset between the pillars so that a series of synthetic indices are calculated. Later the rankings obtained for each country are analyzed and conducted a series of analyses.
This tool provides managers with a useful and accurate tool, an interactive flexible and easy to use multi-criteria decision on their part. Allows simulation of situations, monitoring and control of various indicators.
Later statistical tools for analyzing and comparing tourism competitiveness and other quantities are used.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech
Four keys to Chilean culture : authoritarianism, legalism, fatalism and compadrazgo
Chilean culture is said to be part of a wider Hispanic American culture that shares many traits (see Godoy et al. 1986; Subercaseaux 1999; Valdivieso and which could be identified as an identity with a Latin American sense (see Rodríguez et al. 2001). In this sense, though it may seem as if any attempt to describe or analyse particular operating elements, processes, systems and structures were a useless task, the nature of identity makes it a multiple and symbolically contradictory phenomenon, with relevant contextual 'consequences' and particularities that help identify a collective imaginary that can be associated with what means to be Chilean. As such, the importance of meaning lies not on its production but rather on its reception; therefore, we aim to address some elements of the reception that we have identified as 'critical' or 'diagnostic'. By 'critical', we mean those elements, which absence would substantively modify what is collectively associated with Chilean culture and by 'diagnostic', we suggest the possibility they offer of exploring meaningful contextual traits. In order to contextualise our analysis, we will focus on three discursive levels, namely organisational/structural, cultural/ideological and identity. At the organisational/structural level, we will make reference to structure and aesthetics in the broader sense of social context as well as in public and private organisations; at cultural/ideological level, we will make reference to practices, rituals, values and behaviours; and at the identity level we will make reference to strategies individuals use to manage their social identities
- …