190 resultados para Learning management systems
Resumo:
Property management requires an understanding of infrastructure management, service life planning and quality management. Today, people are beginning to realize that effective property management in high-rise residential property can sustain the property value and maintaining high returns on their investment. The continuous growth of high-rise residential properties indicates that there is a need for an effective property management system to provide a sustainable high-rise residential property development. As intensive as these studies are, they do not attempt to investigate the correlation between property management systems with the trends of Malaysia high-rise residential property development. By examining the trends and scenario of Malaysia high-rise residential property development, this paper aims to gain an understanding of impacts from the effectiveness of property management in this scope area. Findings from this scoping paper will assist in providing a greater understanding and possible solutions for the current Malaysian property management systems for the expanding high-rise residential unit market. With current high rise units in excess of 1.3 million and increasing, the need for more cost effective management systems are of highly important to the Malaysian Property Industry.
Resumo:
Abstract: As online learning environments now have an established presence in higher education we need to ask the question: How effective are these environments for student learning? Online environments can provide a different type of learning experience than traditional face-to-face contexts (for on-campus students) or print-based materials (for distance learners). This article identifies teacher education student and staff perceptions of teaching and learning using the online learning management system, Blackboard. Perceptions of staff and students are compared and implications for teacher education staff interested in providing high quality learning environments within an online space are discussed.
Resumo:
In 2007 I introduced short-format educational podcast resources that reinforced conceptual teaching and learning in an interdisciplinary tertiary science study area (biochemistry). This study aims to determine student attitudes to the perceived usefulness and benefit of short-format educational podcasts, and presents the findings (qualitative and quantitative) from surveys obtained from three offerings of the science teaching unit (2007, 2008 and 2009). Podcasts were recorded (MP3 audio files) separately from the instructive lecture sessions, and subsequent to the weekly lecture, short-format podcasts summarising the key learning objectives were integrated within the resources presented through the students learning management system (Blackboard). The vast majority (>88%) of students utilised the podcast resources, indicating a high level of acceptance and uptake for this portable educational technology. The respondents reported that podcasts focused their attention to core learning concepts and supported their understanding and learning of the lecture material. Furthermore, the data showed that respondents agreed strongly that podcasts assisted with study and revision for examinations and, somewhat surprisingly, there was a perception that podcasts positively impacted on examination performance. Overall, student users perceived that podcasting is as an effective and valuable educational tool that offers convenience and flexibility for their learning and understanding of a tertiary science study area, such as biochemistry.
Resumo:
There have been notable advances in learning to control complex robotic systems using methods such as Locally Weighted Regression (LWR). In this paper we explore some potential limits of LWR for robotic applications, particularly investigating its application to systems with a long horizon of temporal dependence. We define the horizon of temporal dependence as the delay from a control input to a desired change in output. LWR alone cannot be used in a temporally dependent system to find meaningful control values from only the current state variables and output, as the relationship between the input and the current state is under-constrained. By introducing a receding horizon of the future output states of the system, we show that sufficient constraint is applied to learn good solutions through LWR. The new method, Receding Horizon Locally Weighted Regression (RH-LWR), is demonstrated through one-shot learning on a real Series Elastic Actuator controlling a pendulum.
Resumo:
Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site is designed. Identity management systems need to provide adequate usability and should have a simple and intuitive interface. The system should not only be designed to satisfy service provider requirements but it has to consider user requirements, otherwise it will lead to inconvenience and poor usability for users when managing their identities. With poor usability and a poor user interface with regard to security, it is highly likely that the system will have poor security. The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on generating one-time passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this thesis, the security and usability aspects of contemporary methods for authentication based on one-time passwords (OTP) are examined and analyzed. In addition, more scalable solutions that provide a good user experience while at the same time preserving strong security are proposed.
Resumo:
Open-source software systems have become a viable alternative to proprietary systems. We collected data on the usage of an open-source workflow management system developed by a university research group, and examined this data with a focus on how three different user cohorts – students, academics and industry professionals – develop behavioral intentions to use the system. Building upon a framework of motivational components, we examined the group differences in extrinsic versus intrinsic motivations on continued usage intentions. Our study provides a detailed understanding of the use of open-source workflow management systems in different user communities. Moreover, it discusses implications for the provision of workflow management systems, the user-specific management of open-source systems and the development of services in the wider user community.
Resumo:
Office building retrofit projects face many challenges for on-site waste management. While the projects themselves have the potential for a significant level of reuse and recycling from decon-struction and demolition, their unique characteristics often prohibit direct application of existing waste management systems, which are typically based on managing waste generated through new material application in new build projects. Moreover, current waste management plans include no stimuli to involve Small and Medium Enterprises (SMEs) for on-site waste management. As SMEs carry out the majority of on-site work as subcontractors, their active involvements will result in more proactive approaches to waste management and enhance project delivery. This paper discusses the interim results of a continuing research aimed at engaging SMEs in the planning processes of waste management through the collaboration between subcontractors and main contractors of retrofitting projects. It introduces a conceptual model for SMEs to proactively plan and manage on-site waste generation for both deconstruction and construction stages, before traditional waste management plans by the main contractor come into place. The model also suggests a collaboration process between SMEs as subcontractors and large companies as the main contractor to improve the involvement and performance of SMEs in waste management of office building retrofit projects.
Resumo:
This paper discusses the level of effectiveness of quality principles and quality management system implementation and the relationship with performance of ISO9000 certified Indonesian contractors. It also discusses the statistical relationship between quality management systems (QMSs) and key performance indicators (KPIs) amongst a large sample of Indonesian construction companies. Data collected is from questionnaire surveys involving Quality Managers, Managers, and Project and Site Engineers representing 77 different companies. Results indicate that even though some contractors have not yet effectively implemented an effective QMS, most of the KPIs of respondent companies are still at the level of high performance. The statistical results show that the relationship between variables of ISO9000 QMS principles and contractors’ KPIs is significant. These results suggest that an increment in the implementation level of QMS principles can increase KPIs, however that much effort is still required for Indonesian contractors to fully effectively implement QMS principles and thus substantially improve performance against KPIs.
Resumo:
We read the excellent review of telemonitoring in chronic heart failure (CHF)1 with interest and commend the authors on the proposed classification of telemedical remote management systems according to the type of data transfer, decision ability and level of integration. However, several points require clarification in relation to our Cochrane review of telemonitoring and structured telephone support2. We included a study by Kielblock3. We corresponded directly with this study team specifically to find out whether or not this was a randomised study and were informed that it was a randomised trial, albeit by date of birth. We note in our review2 that this randomisation method carries a high risk of bias. Post-hoc metaanalyses without these data demonstrate no substantial change to the effect estimates for all cause mortality (original risk ratio (RR) 0·66 [95% CI 0·54, 0·81], p<0·0001; revised RR 0·72 [95% CI 0·57, 0·92], p=0·008), all-cause hospitalisation (original RR 0·91 [95% CI 0·84, 0·99] p=0·02; revised RR 0.92 [95% CI 0·84, 1·02], p=0·10 ) or CHF-related hospitalisation (original RR 0·79 [95% CI 0·67, 0·94] p=0·008; revised RR 0·75 [95% CI 0·60, 0·94] p=0·01). Secondly, we would classify the Tele-HF study4, 5 as structured telephone support, rather than telemonitoring. Again, inclusion of these data alters the point-estimate but not the overall result of the meta-analyses4. Finally, our review2 does not include invasive telemonitoring as the search strategy was not designed to capture these studies. Therefore direct comparison of our review findings with recent studies of these interventions is not recommended.
Resumo:
Identity is unique, multiple and dynamic. This paper explores common attributes of organisational identities, and examines the role of performance management systems (PMSs) on revealing identity attributes. One of the influential PMSs, the balanced scorecard, is used to illustrate the arguments. A case study of a public-sector organisation suggests that PMSs now place a value on the intangible aspects of organisational life as well as the financial, periodically revealing distinctiveness, relativity, visibility, fluidity and manageability of public-sector identities that sustain their viability. This paper contributes to a multi-disciplinary approach and its practical application, demonstrating an alternative pathway to identity-making using PMSs.
Resumo:
Is it possible to control identities using performance management systems (PMSs)? This paper explores the theoretical fusion of management accounting and identity studies, providing a synthesised view of control, PMSs and identification processes. It argues that the effective use of PMSs generates a range of obtrusive mechanistic and unobtrusive organic controls that mediate identification processes to achieve a high level of identity congruency between individuals and collectives—groups and organisations. This paper contends that mechanistic control of PMSs provides sensebreaking effects and also creates structural conditions for sensegiving in top-down identification processes. These processes encourage individuals to continue the bottom-up processes of sensemaking, enacting identity and constructing identity narratives. Over time, PMS activities and conversations periodically mediate several episode(s) of identification to connect past, current and future identities. To explore this relationship, the dual locus of control—collectives and individuals—is emphasised to explicate their interplay. This multidisciplinary approach contributes to explaining the multidirectional effects of PMSs in obtrusive as well as unobtrusive ways, in order to control the nature of collectives and individuals in organisations.
Resumo:
In keeping with the proliferation of free software development initiatives and the increased interest in the business process management domain, many open source workflow and business process management systems have appeared during the last few years and are now under active development. This upsurge gives rise to two important questions: What are the capabilities of these systems? and How do they compare to each other and to their closed source counterparts? In other words: What is the state-of-the-art in the area?. To gain an insight into these questions, we have conducted an in-depth analysis of three of the major open source workflow management systems – jBPM, OpenWFE, and Enhydra Shark, the results of which are reported here. This analysis is based on the workflow patterns framework and provides a continuation of the series of evaluations performed using the same framework on closed source systems, business process modelling languages, and web-service composition standards. The results from evaluations of the three open source systems are compared with each other and also with the results from evaluations of three representative closed source systems: Staffware, WebSphere MQ, and Oracle BPEL PM. The overall conclusion is that open source systems are targeted more toward developers rather than business analysts. They generally provide less support for the patterns than closed source systems, particularly with respect to the resource perspective, i.e. the various ways in which work is distributed amongst business users and managed through to completion.
Resumo:
Aspect orientation is an important approach to address complexity of cross-cutting concerns in Information Systems. This approach encapsulates these concerns separately and compose them to the main module when needed. Although there a different works which shows how this separation should be performed in process models, the composition of them is an open area. In this paper, we demonstrate the semantics of a service which enables this composition. The result can also be used as a blueprint to implement the service to support aspect orientation in Business Process Management area.
Resumo:
Organizations invest heavily in Supply Chain Management Systems expecting the benefits promised by the software vendors and the implementation partners. However, both academic and industry reports suggest that there is growing dissatisfaction among client organizations due to an increasing gap in benefits purported by the software vendors and benefits realised by the client. In order to better manage expectations of the client organization, this study proposes a Benefit Expectation Management Framework for Supply Chain Management Systems, based on Expectation-Confirmation Theory. This study derives 60 expected benefits of Supply Chain Management Systems through 41 vendor-reported customer stories and academic papers. Through comparing those benefits with the received benefits by a case organization that has implemented SAP Supply Chain Management Systems for seven years, two salient factors – long timetable and multiple stakeholders – have been identified as the controlling factors affecting the confirmation level of Supply Chain Management System expectations and further impacting the satisfaction of a client organization. The case study also highlights the likely causes for realized benefits and enduring issues in relation to the Supply Chain Management Systems.
Resumo:
Information security policies play an important role in achieving information security. Confidentiality, Integrity, and Availability are classic information security goals attained by enforcing appropriate security policies. Workflow Management Systems (WfMSs) also benefit from inclusion of these policies to maintain the security of business-critical data. However, in typical WfMSs these policies are designed to enforce the organisation’s security requirements but do not consider those of other stakeholders. Privacy is an important security requirement that concerns the subject of data held by an organisation. WfMSs often process sensitive data about individuals and institutions who demand that their data is properly protected, but WfMSs fail to recognise and enforce privacy policies. In this paper, we illustrate existing WfMS privacy weaknesses and introduce WfMS extensions required to enforce data privacy. We have implemented these extensions in the YAWL system and present a case scenario to demonstrate how it can enforce a subject’s privacy policy.