118 research outputs found

    Modelado conceptual de aplicaciones adaptivas y proactivas en OO-H

    Get PDF
    Comunicación presentada en las VII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2002), dentro del II Taller sobre Ingeniería del Software Orientada al Web (Web Engineering) WebE'2002, El Escorial, Madrid, 19 noviembre 2002.La personalización de entornos ha suscitado un gran interés desde el punto de vista de los métodos de modelado conceptual de aplicaciones web. Ello es debido al efecto que tienen las políticas de personalización sobre todo el ciclo de desarrollo de la aplicación, desde la recogida de requisitos a la propia arquitectura de ejecución. La inclusión de estrategias de personalización dinámica es una cuestión no resuelta a nivel de modelado conceptual. Desde OO-H (Object Oriented Hypermedia) creemos que el tratamiento de las propiedades relevantes que guían la construcción de un modelo conceptual con soporte de personalización es el camino más adecuado para diseñar este tipo de característica en aplicaciones web. Actualmente, la mayoría de los esfuerzos en este sentido se plantean a nivel de implementación proporcionando soluciones ad-hoc. Este artículo propone ciertas extensiones a nivel de modelado conceptual que, embebidas en los modelos de navegación y presentación de OO-H, permiten capturar una especificación XML en base a la cual se definen las reglas de personalización dinámica de una aplicación web. A partir de esta especificación, una arquitectura de ejecución dinámica basada en un motor de reglas es capaz de interpretar la parte variable de la aplicación

    Editorial: Exploring the Technological Needs of Older Adults: Advances in Design, Functionality, User Experience, and Age-Related Cognitive and Sensory Aids to Facilitate Adoption

    Get PDF
    The rapid advancements in artificial intelligence, robotics, communication, and automation have been the catalyst for the development of a host of new technologies that allow older users to monitor their own health (via wearables), maintain their independence (semi-autonomous driving), social connections (smart home devices), and compensate for a range of age-related sensory changes (hearing aids, smart glasses, augmented displays, etc.). Less well understood is how older users get acquainted with these innovations, how their design and functionality need to be adapted to improve older users’ performance and experience, and which factors and interventions help or hinder technology adoption and use by older users. This Research Topic aims at providing some further insights into these issues

    Editorial: Exploring the technological needs of older adults: Advances in design, functionality, user experience, and age-related cognitive and sensory aids to facilitate adoption

    Get PDF
    Editorial on the Research Topic Exploring the technological needs of older adults: Advances in design, functionality, user experience, and age-related cognitive and sensory aids to facilitate adoptio

    Influence of personality and modality on peer assessment evaluation perceptions using Machine Learning techniques

    Get PDF
    The successful instructional design of self and peer assessment in higher education poses several challenges that instructors need to be aware of. One of these is the influence of students’ personalities on their intention to adopt peer assessment. This paper presents a quasi-experiment in which 85 participants, enrolled in the first-year of a Computer Engineering programme, were assessed regarding their personality and their acceptance of three modalities of peer assessment (individual, pairs, in threes). Following a within-subjects design, the students applied the three modalities, in a different order, with three different activities. An analysis of the resulting 1195 observations using ML techniques shows how the Random Forest algorithm yields significantly better predictions for three out of the four adoption variables included in the study. Additionally, the application of a set of eXplainable Artificial Intelligence (XAI) techniques shows that Agreeableness is the best predictor of Usefulness and Ease of Use, while Extraversion is the best predictor of Compatibility, and Neuroticism has the greatest impact on global Intention to Use. The discussion highlights how, as it happens with other innovations in educational processes, low levels of Consciousness is the most consistent predictor of resistance to the introduction of peer assessment processes in the classroom. Also, it stresses the value of peer assessment to augment the positive feelings of students scoring high on Neuroticism, which could lead to better performance. Finally, the low impact of the peer assessment modality on student perceptions compared to personality variables is debated.This work has been partially funded by the University of Alicante’s Redes-I3CE de investigación en docencia universitaria del Instituto de Ciencias de la Educación (REDES-I3CE-2020-5069), by the EU Erasmus+ Programme (EduTech (609785-EPP-1-2019-1-ES-EPPKA2-CBHE-JP) and SkoPS (2020-1-DE01-KA226HE-005772) projects), by the Spanish Ministry of Science and Innovation (Access@IoT (PID2019-111196RB-I00) project), by the GVA (AICO/2020/143) project, and by the UCLM group cofinanced with ERDF funds (research grant 2021-GRIN-30993)

    MoSIoT: Modeling and Simulating IoT Healthcare-Monitoring Systems for People with Disabilities

    Get PDF
    The need to remotely monitor people with disabilities has increased due to growth in their number in recent years. The democratization of Internet of Things (IoT) devices facilitates the implementation of healthcare-monitoring systems (HMSs) that are capable of supporting disabilities and diseases. However, to achieve their full potential, these devices must efficiently address the customization demanded by different IoT HMS scenarios. This work introduces a new approach, called Modeling Scenarios of Internet of Things (MoSIoT), which allows healthcare experts to model and simulate IoT HMS scenarios defined for different disabilities and diseases. MoSIoT comprises a set of models based on the model-driven engineering (MDE) paradigm, which first allows simulation of a complete IoT HMS scenario, followed by generation of a final IoT system. In the current study, we used a real scenario defined by a recognized medical publication for a patient with Alzheimer’s disease to validate this proposal. Furthermore, we present an implementation based on an enterprise cloud architecture that provides the simulation data to a commercial IoT hub, such as Azure IoT Central.This work was supported by the Spanish Ministry of Science and Innovation under contract PID2019-111196RB-I00, called “Development of IoT Systems for People with Disabilities” (Access@IoT), and also was partially funded by the GVA through the AICO/2020/143 project

    Impact of Programming Exposure on the Development of Computational Thinking Capabilities: An Empirical Study

    Get PDF
    Today’s digital society has turned the development of students’ computational thinking capabilities into a critical factor for their future success. As higher education institutions, we need to take responsibility for this development in every degree course we offer, and provide students with the kind of subjects and activities that best contribute to this aim. In this paper, we study the impact of following an introductory programming course on the development of the computational thinking capabilities of university students. In order to achieve this aim, a concurrent cohort observational study was carried out in which we measured both the subjective and objective computational thinking capabilities of 104 participants (50 first year students enrolled on a Bachelor’s degree course in Psychology at the Catholic University of Murcia (UCAM), and 54 first year students enrolled on a Bachelor’s degree course in Health Information Systems at the University of Alicante (UA)). The statistical procedures applied to test our hypotheses were a two-way mixed ANOVA, a paired-sample T-test and an independent-sample T-test. The data shows that the group at UA had an initial higher subjective perception of their computational capabilities than the group at UCAM. This perception was supported by their objective scores, which were also significantly higher. However, the subjective assessment of computational capability of the UA group diminished after exposure to the programming course, contrasting with the fact that their objective computational capabilities improved significantly. In the UCAM group, both subjective and objective capabilities remained constant over time. Based on these results, we can conclude that computational thinking capabilities are not developed naturally, but need to be trained. Providing such training to all our students, and not only to those enrolled on undergraduate degrees in engineering, is of paramount importance to allow them to face the challenges of their future professions. This paper empirically demonstrates the extent to which exposing subjects to a programming course may contribute to this aim.This work was supported in part by the Spanish Ministry of Economy, Industry, and Competitiveness (Access@City) under Contract TIN2016-78103-C2-2-R, in part by the Spanish Ministry of Science, Innovation, and Universities under Contract RTI2018-098156-B-C54, in part by the Co-Financed by FEDER funds (MINECO/ FEDER/UE), and in part by the EduTech Project co-funded by the Erasmus+ Programme of the European Union under Grant 609785-EPP-1-2019-1-ES-EPPKA2-CBHE-JP

    MASISCo—Methodological Approach for the Selection of Information Security Controls

    Get PDF
    As cyber-attacks grow worldwide, companies have begun to realize the importance of being protected against malicious actions that seek to violate their systems and access their information assets. Faced with this scenario, organizations must carry out correct and efficient management of their information security, which implies that they must adopt a proactive attitude, implementing standards that allow them to reduce the risk of computer attacks. Unfortunately, the problem is not only implementing a standard but also determining the best way to do it, defining an implementation path that considers the particular objectives and conditions of the organization and its availability of resources. This paper proposes a methodological approach for selecting and planning security controls, standardizing and systematizing the process by modeling the situation (objectives and constraints), and applying optimization techniques. The work presents an evaluation of the proposal through a methodology adoption study. This study showed a tendency of the study subjects to adopt the proposal, perceiving it as a helpful element that adapts to their way of working. The main weakness of the proposal was centered on ease of use since the modeling and resolution of the problem require advanced knowledge of optimization techniques.This research was funded by Universidad de La Frontera, research direction, research project DIUFRO DI22-0043

    AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity

    Get PDF
    In today’s world, private and government organizations are legally obligated to prioritize their information security. They need to provide proof that they are continually improving their cybersecurity compliance. One approach that can help organizations achieve this goal is implementing information security maturity models. These models provide a structured framework for measuring performance and implementing best practices. However, choosing a suitable model can be challenging, requiring cultural, process, and work practice changes. Implementing multiple models can be overwhelming, if possible. This article proposes a prioritization strategy for public institutions that want to improve their information security maturity. We thoroughly analyzed various sources through systematic mapping to identify critical similarities in information security maturity models. Our research led us to create the AIM (Awareness, Infrastructure, and Management) Triad. This triad is a practical guide for organizations to achieve maturity in information security practices.This work received partial support from Proyecto DIUFRO DI21-0079 and Proyecto DIUFRO DI22-0043, Universidad de La Frontera, Temuco. Chile

    Pensamiento computacional y género: un estudio observacional

    Get PDF
    El propósito de este estudio ha sido medir el efecto del género en la percepción y desarrollo del pensamiento computacional en alumnos de primer curso de grados universitarios. Para ello se ha realizado un estudio observacional en el que, para una muestra de 79 estudiantes de primer curso del grado de Psicología de la UCAM, se midió tanto su nivel de pensamiento computacional objetivo como su auto-percepción acerca de sus habilidades computacionales. Durante la fase de análisis de datos se aplicaron sendos t-tests para muestras independientes. Los resultados muestran que existen diferencias estadísticamente significativas en cuanto a la percepción de auto-eficacia computacional entre hombres y mujeres, diferencias que no se corresponden con los niveles objetivos, que no presentan diferencias estadísticamente significativas. Se hace por tanto necesario concienciar a las estudiantes de lo erróneo de esta auto-percepción con el fin de motivarlas a la asunción de retos computacionales que entrenen esta habilidad durante su formación.The purpose of the study was to study the effect of gender on the perception and development of the computational thinking capabilities of first year university students. An observational study was conducted in which 79 students of Psychology at the UCAM were measured with respect to both their computational thinking objective capabilities and their subjective perception regarding those same capabilities. During the data analysis, two t-tests for independent samples were applied. The results show that there are statistically significant differences between males and females regarding their auto-perception of computational efficacy. Such differences are not supported by statistically significant differences in objective performance. These results suggest the necessity to increase awareness among female students of this fact in order to increase their engagement in computational challenges that further train their ability during their education
    corecore