1,003 research outputs found

    Designed and user-generated activity in the mobile age

    Get PDF
    The paper addresses the question of how to design for learning taking place on mobile and wireless devices. The authors argue that learning activity designers need to consider the characteristics of mobile learning; at the same time, it is vital to realise that learners are already creating mobile learning experiences for themselves. Profound changes in computer usage brought about by social networking and user-generated content are challenging the idea that educators are in charge of designing learning. The authors make a distinction between designed activity, carefully crafted in advance, and user-generated activity arising from learners’ own spontaneous requirements. The paper illustrates what each approach has to offer and it draws out what they have in common, the opportunities and constraints they represent. The paper concludes that user-generated mobile activity will not replace designed activity but it will influence the ways in which designed activity develops

    ‘Partly self-made niches’? Student-only spaces in an LMS

    Get PDF
    Eighty-nine students were provided with a student-only live-voice space in a Learning Management System (LMS). Would they use it and, if so, would they feel sufficient ownership to create what Havnes (2008) described as “partly self-made niches”? In this study, a substantial proportion of respondents reported that they used the space not only for social support but also for key aspects of peer-learning. They reported that these student-only sessions gave them freedom to explore module-topics in new ways, and to share professional practice. Some disliked the lack of structure, but many valued the freedom to vary the focus and pace of their sessions. Several interviewees reported setting up sessions at short notice – for example, via Twitter – to meet their immediate concerns and requirements. A number of respondents valued these sessions as distinctive from, and complementary to, their tutorials in the same live-voice environment. The paper links these findings to debates about whether peer-learning should be explicitly organised, and about how education can disrupt itself as advocated by Bass (2012)

    Technology that enhances without inhibiting learning

    No full text
    Technology supported information sharing could be argued to both enhance and inhibit learning. However, social and affective issues that motivate learners' technology interactions are often overlooked. Are learners avoiding valuable learning applications because of privacy fears and trust issues? Will inaccurate technology assumptions and awareness inhibit information sharing? Do learners need control over technology enhanced safe creative spaces or can they be motivated to overcome badly designed systems because sharing is 'valuable' or 'fun'. This presentation details a model of privacy and trust issues that can be used to enhance elearning. Several OU case-studies of multimedia, mobile and elearning applications (conducted within IET, KMI and the Open CETL) are evaluated using this model. The model helps to identify trade-offs that learners make for technology enhanced or inhibited learning. Theories of control, identity, information sensitivity and re-use are discussed within the context of these elearning examples

    Clients: their role in the procurement of infrastructure projects

    Get PDF
    This thesis reports on research undertaken into the effectiveness of the procurement activities undertaken by clients within projects for the construction of infrastructure. Current theory and practice is reviewed by means of a study of the available published literature, documentation and personal views of personnel within various companies. An analysis of the problems encountered by using current methods has suggested that project success is contingent upon a range of factors which are not normally considered and, furthermore, are under the control of the client. This has given rise to a wider view of construction procurement and a variety of new concepts have been identified. This has resulted in the postulation of a unifying theory of procurement and the proposal of better methods of procuring construction projects. Data has been collected from 24 projects; 12 discrete project programmes within one client and the overall project programmes of 9 client organisations. The data was collected using interviews with a wide range of personnel, interrogation of corporate financial and project management information systems and document analysis. 24 Case Studies of projects are also presented. A model has been developed that enables the comparison of the procurement activities of a wide range of companies. The model integrates the effects of client programme activities and considers income, costs and risks. This particularly enables the value added by the procurement and other functions to be determined. This has been used to analyse and test the procurement undertaken by several organisations and can be used as a tool for continuing improvement within a client's infrastructure construction programme
    • 

    corecore