16,987 research outputs found

    Aplicación de la clase invertida en la educación superior: introducción a las nuevas tecnologías

    Get PDF
    Las autoras de este trabajo llevamos varios años trabajando con videos docentes para la enseñanza de las matemáticas dentro de la Economía a nivel universitario. Esto ha sido motivado por el auge de las nuevas tecnologías y las posibilidades docentes que nos proporcionan. La experiencia que teníamos en asignaturas virtuales nos ha permitido dar un paso más y utilizar los videos docentes en las clases presenciales. Si bien empezamos utilizándolos a modo de complemento, cuando conocimos la metodología de la flipped classroom (o clase invertida) nos planteamos una nueva forma de enseñanza. Decidimos invertir los papeles, de forma que el alumno, en vez de escuchar en clase y estudiar en casa, toma el papel protagonista, estudiando en casa con ayuda de videos y material proporcionado por el profesor y aprovecha el tiempo de clase para resolver ejercicios, plantear dudas y trabajar en equipo. Si bien esta metodología ha sido llevada a cabo con éxito en diversos niveles educativos, en el caso universitario no se conocen muchas experiencias. En nuestro caso hemos tenido que adaptarla, incorporando elementos adicionales, como el uso del programa Socrative para conseguir una mayor retroalimentación del aprendizaje del alumno. En el presente trabajo mostramos la experiencia que hemos llevado a cabo en el curso académico actual y recogemos la opinión de ambas partes, alumnos y profesores.Universidad de Málag

    Formal security analysis of registration protocols for interactive systems: a methodology and a case of study

    Full text link
    In this work we present and formally analyze CHAT-SRP (CHAos based Tickets-Secure Registration Protocol), a protocol to provide interactive and collaborative platforms with a cryptographically robust solution to classical security issues. Namely, we focus on the secrecy and authenticity properties while keeping a high usability. In this sense, users are forced to blindly trust the system administrators and developers. Moreover, as far as we know, the use of formal methodologies for the verification of security properties of communication protocols isn't yet a common practice. We propose here a methodology to fill this gap, i.e., to analyse both the security of the proposed protocol and the pertinence of the underlying premises. In this concern, we propose the definition and formal evaluation of a protocol for the distribution of digital identities. Once distributed, these identities can be used to verify integrity and source of information. We base our security analysis on tools for automatic verification of security protocols widely accepted by the scientific community, and on the principles they are based upon. In addition, it is assumed perfect cryptographic primitives in order to focus the analysis on the exchange of protocol messages. The main property of our protocol is the incorporation of tickets, created using digests of chaos based nonces (numbers used only once) and users' personal data. Combined with a multichannel authentication scheme with some previous knowledge, these tickets provide security during the whole protocol by univocally linking each registering user with a single request. [..]Comment: 32 pages, 7 figures, 8 listings, 1 tabl

    Analysis of tourism competitiveness and the key influencers

    Get PDF
    The aim of this research is measure and analyse the tourism competitiveness, which has become one of the great challenges of tourism researchers in recent years. We analyze the relationship between tourism competitiveness and major tourist magnitudes, relations with most tourist destinations, and some pillars that measure competitiveness such as sustainability. A methodology for calculating an indicator of tourism competitiveness based on a double reference point is proposed, taking into account a level of aspiration and reserve level for each pillar of competitiveness. They are considered different degrees of offset between the pillars so that a series of synthetic indices are calculated. Later the rankings obtained for each country are analyzed and conducted a series of analyses. This tool provides managers with a useful and accurate tool, an interactive flexible and easy to use multi-criteria decision on their part. Allows simulation of situations, monitoring and control of various indicators. Later statistical tools for analyzing and comparing tourism competitiveness and other quantities are used.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech

    Four keys to Chilean culture : authoritarianism, legalism, fatalism and compadrazgo

    Get PDF
    Chilean culture is said to be part of a wider Hispanic American culture that shares many traits (see Godoy et al. 1986; Subercaseaux 1999; Valdivieso and which could be identified as an identity with a Latin American sense (see Rodríguez et al. 2001). In this sense, though it may seem as if any attempt to describe or analyse particular operating elements, processes, systems and structures were a useless task, the nature of identity makes it a multiple and symbolically contradictory phenomenon, with relevant contextual 'consequences' and particularities that help identify a collective imaginary that can be associated with what means to be Chilean. As such, the importance of meaning lies not on its production but rather on its reception; therefore, we aim to address some elements of the reception that we have identified as 'critical' or 'diagnostic'. By 'critical', we mean those elements, which absence would substantively modify what is collectively associated with Chilean culture and by 'diagnostic', we suggest the possibility they offer of exploring meaningful contextual traits. In order to contextualise our analysis, we will focus on three discursive levels, namely organisational/structural, cultural/ideological and identity. At the organisational/structural level, we will make reference to structure and aesthetics in the broader sense of social context as well as in public and private organisations; at cultural/ideological level, we will make reference to practices, rituals, values and behaviours; and at the identity level we will make reference to strategies individuals use to manage their social identities

    Elección de una ruta turística óptima: su utilidad en el turismo enológico

    Get PDF
    En los últimos tiempos se ha producido un cambio en el comportamiento del turista, ahora requiere un trato más personalizado, dejando a un lado los paquetes turísticos estandarizados. Las motivaciones del turista también han ido evolucionando, actualmente el turista se desplaza buscando diversos atractivos turísticos, debiendo repartir por tanto el tiempo de sus vacaciones. Gracias a las tecnologías de la información, cada turista podría planificar su viaje según sus necesidades, sin embargo, sería muy complejo elegir la mejor alternativa. Por tanto es de gran utilidad una herramienta que ayude a tomar una decisión, considerando sus objetivos, restricciones y preferencias. El enoturismo recoge una amplia tipología de turistas, desde los más expertos hasta los nuevos aficionados, y cada uno de ellos, por tanto, deseará recibir un trato diferente y realizar unas actividades de distinto tipo, lo cual hace muy conveniente un sistema de ayuda al turista. En este sentido se ha desarrollado SAT, un sistema de ayuda al turista aplicado al turismo cultural y de ocio, planteando en esta comunicación la aplicación de este sistema a turismos más específicos, como puede ser el turismo enológico.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech
    corecore