198 resultados para Other Social and Behavioral Sciences


Relevância:

100.00% 100.00%

Publicador:

Resumo:

SCOOT is a hybrid event combining the web, mobile devices, public displays and cultural artifacts across multiple public parks and museums in an effort to increase the perceived and actual access to cultural participation by everyday people. The research field is locative game design and the context was the re-invigoration of public sites as a means for exposing the underlying histories of sites and events. The key question was how to use game play technologies and processes within everyday places in ways that best promote playful and culturally meaningful experiences whilst shifting the loci of control away from commercial and governmental powers. The research methodology was primarily practice led underpinned by ethnographic and action research methods. In 2004 SCOOT established itself as a national leader in the field by demonstrating innovative methods for stimulating rich interactions across diverse urban places using technically-augmented game play. Despite creating a sophisticated range of software and communication tools SCOOT most dramatically highlighted the role of the ubiquitous mobile phone in facilitating socially beneficial experiences. Through working closely with the SCOOT team, collaborating organisations developed important new knowledge around the potential of new technologies and processes for motivating, sustaining and reinvigorating public engagement. Since 2004, SCOOT has been awarded $600,00 in competitive and community funding as well as countless in kind support from partner organisations such as Arts Victoria, National Gallery of Victoria, Melbourne Museum, Australian Centre for the Moving Image, Federation Square, Art Centre of Victoria, The State Library of Victoria, Brisbane River Festival, State Library of Queensland, Brisbane Maritime Museum, Queensland University of Technology, and Victoria University.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper explores how game authoring tools can teach processes that transform everyday places into engaging learning spaces. It discusses the motivation inherent in playing games and creating games for others, and how this stimulates an iterative process of creation and reflection and evokes a natural desire to engage in learning. The use of MiLK at the Adelaide Botanic Gardens is offered as a case in point. MiLK is an authoring tool that allows students and teachers to create and share SMS games for mobile phones. A group of South Australian high school students used MiLK to play a game, create their own games and play each other’s games during a day at the gardens. This paper details the learning processes involved in these activities and how the students, without prompting, reflected on their learning, conducted peer assessment, and engaged in a two-way discussion with their teacher about new technologies and their implications for learning. The paper concludes with a discussion of the needs and requirements of 21st century learners and how MiLK can support constructivist and connectivist teaching methods that engage learners and will produce an appropriately skilled future workforce.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper suggests ways for educators and designers to understand and merge priorities in order to inform the development of mobile learning (m-learning) applications that maximise user experiences and hence learning opportunities. It outlines a User Experience Design (UXD) theory and development process that requires designers to conduct a thorough initial contextual inquiry into a particular domain in order to set project priorities and development guidelines. A matrix that identifies the key contextual considerations namely the social, cultural, spatial, technical and temporal constructs of any domain is presented as a vital tool for achieving successful UXD. The frame of reference provided by this matrix ensures that decisions made throughout the design process are attributable to a desired user experience. To illustrate how the proposed UXD theory and development process supports the creation of effective m-learning applications, this paper documents the development process of MILK (Mobile Informal Learning Kit). MILK is a support tool that allows teachers and students to develop event paths that consist of a series SMS question and answer messages that lead players through a series of checkpoints between point A and point B. These event paths can be designed to suit desired learning scenarios and can be used to explore a particular place or subject. They can also be designed to facilitate formal or informal learning experiences.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

‘Adolescence’ has become increasingly recognised as a nebulous concept. Previous conceptualisations of adolescence have adopted a ‘deficit’ view, regarding teenagers as ‘unfinished’ adults. The deficit view of adolescence is highly problematic in an era where adulthood itself is difficult to define. The terms ‘kidult’ or ‘adultescent’ have emerged to describe adult-age people whose interests and priorities match those of their teenage counterparts. Rather than relying on ‘lock-step’ models of physical, cognitive and social growth put forward by developmental psychology, adolescence can be more usefully defined by looking at the common experiences of people in their teenage years. Common experiences arise at an institutional level; for example, all adolescents are treated as the same by legal and education systems. The transition from primary to secondary schooling is a milestone for all children, exposing them to a new type of educational environment. Shared experiences also arise from generational factors. Today’s adolescents belong to the millennial generation, characterised by technological competence, global perspectives, high susceptibility to media influence, individualisation and rapid interactions. This generation focuses on teamwork, achievement, modesty and good conduct, and has great potential for significant collective accomplishments. These generational factors challenge educators to provide relevant learning experiences for today’s students. Many classrooms still utilise textbook-based pedagogy more suited to previous generations, resulting in disengagement among millennial students. Curriculum content must also be tailored to generational needs. The rapid pace of change, as well as the fluidity of identity created by dissolving geographical and vocational boundaries, mean that the millennial generation will need more than a fixed set of skills and knowledge to enter adulthood. Teachers must enable their students to think like ‘expert novices’, adept at assimilating new concepts in depth and prepared to engage in lifelong learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

'The Millennial Adolescent' offers contemporary, stimulating insights for those currently teaching as well as those preparing to teach. This book investigates the characteristics of Generation Y, using students own voices, generational theory and case studies. The text is structured around the principle that effective teachers need to know who they are teaching as well as what to teach, how to teach it, and how to assess the outcome. Using generational theory, 'The Millennial Adolescent' investigates the characteristics of Generation Y, or the Millennial Generation, and points out what all teachers need to know about working with this current generation of students who are described in a number of ways digital natives, team oriented, confident, multi-taskers, high achievers, and a generation unlike any other. The book contains well-known frameworks for developing understandings about adolescents, blended and contrasted with a contemporary socio-cultural construction of adolescence, set in our particular time, era and society. This book reflects the uniqueness of Australian contexts, while connecting with international trends and global patterns. Engaging and full of insights, this book is essential reading for all professionals dealing with adolescents.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper proposes adolescence as a useful concept rather than definitive. It explores the notion of adolescence and its relevance to contemporary society and schooling. We reflect on the purposes for the emergence of research into adolescence during the early 20th century, particularly the particular scientific and societal pressures that served to bring this field to prominence. Recent debate has started to problematise many of the early parameters used to define and provide bounds for understanding adolescents and adolescent experience and for the rationale for some notionally tailored educational contexts. This paper provides an overview of this debate and argues for a reconsideration of some of the basic tenets for definition. In particular we discuss the cultural construction of adolescence in the light of our new globalised society. A possibility for thinking about contemporary adolescents is by considering them in terms of generational characteristics. What makes a new generation? Typically, members of a generation share age, a set of experiences during formative years, and a set of social and economic conditions. The adolescents of today fall into the group known collectively as the ‘Y Generation’, the ‘D (digital) Generation’, Generation C (consumer) and the ‘Millennial’s’. Born after mid-1980, they are characterised as computer and internet competent, multi-taskers, with a global perspective. They respond best to visual language, and are heavily influenced by the media. We consider the generational traits and how this impacts on the teaching and learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Chapter summary • The adolescent and work — Advantages of part-time work — Disadvantages of part-time work — Theory/literature re vocational issues — Influences on vocational choice — How do we prepare young people for thinking about work? • The Education and Training Reforms for the Future (ETRF) in Australia: Learning or earning — What these changes mean for young people — VET (Vocational Education and Training) • Summary • Key points • Further thinking • References Who we are, our self-concept and self-esteem, for many people is tied closely to what we do. Our profession, our employment and our ambitions define us in many ways. In our society we have not yet separated completely the notion of personal worth from social contribution and status. At Australian BBQs, a pretty staple question to ask is ‘So, what do you do?’ when meeting someone new. We are pretty tolerant with a range of responses to that question, but the bottom line is the notion that there ought to be a coherent answer. Adolescents know this, and as they try to define their identity/identities and launch into adulthood they are confronted with the great unknown, the world of work...

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Although internet chat is a significant aspect of many internet users’ lives, the manner in which participants in quasi-synchronous chat situations orient to issues of social and moral order remains to be studied in depth. The research presented here is therefore at the forefront of a continually developing area of study. This work contributes new insights into how members construct and make accountable the social and moral orders of an adult-oriented Internet Relay Chat (IRC) channel by addressing three questions: (1) What conversational resources do participants use in addressing matters of social and moral order? (2) How are these conversational resources deployed within IRC interaction? and (3) What interactional work is locally accomplished through use of these resources? A survey of the literature reveals considerable research in the field of computer-mediated communication, exploring both asynchronous and quasi-synchronous discussion forums. The research discussed represents a range of communication interests including group and collaborative interaction, the linguistic construction of social identity, and the linguistic features of online interaction. It is suggested that the present research differs from previous studies in three ways: (1) it focuses on the interaction itself, rather than the ways in which the medium affects the interaction; (2) it offers turn-by-turn analysis of interaction in situ; and (3) it discusses membership categories only insofar as they are shown to be relevant by participants through their talk. Through consideration of the literature, the present study is firmly situated within the broader computer-mediated communication field. Ethnomethodology, conversation analysis and membership categorization analysis were adopted as appropriate methodological approaches to explore the research focus on interaction in situ, and in particular to investigate the ways in which participants negotiate and co-construct social and moral orders in the course of their interaction. IRC logs collected from one chat room were analysed using a two-pass method, based on a modification of the approaches proposed by Pomerantz and Fehr (1997) and ten Have (1999). From this detailed examination of the data corpus three interaction topics are identified by means of which participants clearly orient to issues of social and moral order: challenges to rule violations, ‘trolling’ for cybersex, and experiences regarding the 9/11 attacks. Instances of these interactional topics are subjected to fine-grained analysis, to demonstrate the ways in which participants draw upon various interactional resources in their negotiation and construction of channel social and moral orders. While these analytical topics stand alone in individual focus, together they illustrate different instances in which participants’ talk serves to negotiate social and moral orders or collaboratively construct new orders. Building on the work of Vallis (2001), Chapter 5 illustrates three ways that rule violation is initiated as a channel discussion topic: (1) through a visible violation in open channel, (2) through an official warning or sanction by a channel operator regarding the violation, and (3) through a complaint or announcement of a rule violation by a non-channel operator participant. Once the topic has been initiated, it is shown to become available as a topic for others, including the perceived violator. The fine-grained analysis of challenges to rule violations ultimately demonstrates that channel participants orient to the rules as a resource in developing categorizations of both the rule violation and violator. These categorizations are contextual in that they are locally based and understood within specific contexts and practices. Thus, it is shown that compliance with rules and an orientation to rule violations as inappropriate within the social and moral orders of the channel serves two purposes: (1) to orient the speaker as a group member, and (2) to reinforce the social and moral orders of the group. Chapter 6 explores a particular type of rule violation, solicitations for ‘cybersex’ known in IRC parlance as ‘trolling’. In responding to trolling violations participants are demonstrated to use affiliative and aggressive humour, in particular irony, sarcasm and insults. These conversational resources perform solidarity building within the group, positioning non-Troll respondents as compliant group members. This solidarity work is shown to have three outcomes: (1) consensus building, (2) collaborative construction of group membership, and (3) the continued construction and negotiation of existing social and moral orders. Chapter 7, the final data analysis chapter, offers insight into how participants, in discussing the events of 9/11 on the actual day, collaboratively constructed new social and moral orders, while orienting to issues of appropriate and reasonable emotional responses. This analysis demonstrates how participants go about ‘doing being ordinary’ (Sacks, 1992b) in formulating their ‘first thoughts’ (Jefferson, 2004). Through sharing their initial impressions of the event, participants perform support work within the interaction, in essence working to normalize both the event and their initial misinterpretation of it. Normalising as a support work mechanism is also shown in relation to participants constructing the ‘quiet’ following the event as unusual. Normalising is accomplished by reference to the indexical ‘it’ and location formulations, which participants use both to negotiate who can claim to experience the ‘unnatural quiet’ and to identify the extent of the quiet. Through their talk participants upgrade the quiet from something legitimately experienced by one person in a particular place to something that could be experienced ‘anywhere’, moving the phenomenon from local to global provenance. With its methodological design and detailed analysis and findings, this research contributes to existing knowledge in four ways. First, it shows how rules are used by participants as a resource in negotiating and constructing social and moral orders. Second, it demonstrates that irony, sarcasm and insults are three devices of humour which can be used to perform solidarity work and reinforce existing social and moral orders. Third, it demonstrates how new social and moral orders are collaboratively constructed in relation to extraordinary events, which serve to frame the event and evoke reasonable responses for participants. And last, the detailed analysis and findings further support the use of conversation analysis and membership categorization as valuable methods for approaching quasi-synchronous computer-mediated communication.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information and Communication Technologies (ICTs) provide great promise for the future of education. In the Asia-Pacific region, many nations have started working towards the comprehensive development of infrastructure to enable the development of strong networked educational systems. In Queensland there have been significant initiatives in the past decade to support the integration of technology in classrooms and to set the conditions for the enhancement of teaching and learning with technology. One of the great challenges is to develop our classrooms to make the most of these technologies for the benefit of student learning. Recent research and theory into cognitive load, suggests that complex information environments may well impose a barrier on student learning. Further, it suggests that teachers have the capacity to mitigate against cognitive load through the way they prepare and support students engaging with complex information environments. This chapter compares student learning at different levels of cognitive load to show that learning is enhanced when integrating pedagogies are employed to mitigate against high-load information environments. This suggests that a mature policy framework for ICTs in education needs to consider carefully the development of professional capacities to effectively design and integrate technologies for learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Human embryonic stem cell research promises to deliver in the future a whole range of therapeutic treatments, but currently governments in different jurisdictions must try to regulate this burgeoning area. Part of the problem has been, and continues to be, polarised community opinion on the use of human embryonic stem cells for research. This article compares the approaches of the Australian, United Kingdom and United States governments in regulating human embryonic stem cell research. To date, these governments have approached the issue through implementing legislation or policy to control research. Similarly, the three jurisdictions have viewed the patentability of human embryonic stem cell technologies in their own ways with different policies being adopted by the three patent offices. This article examines these different approaches and discusses the inevitable concerns that have been raised due to the lack of a universal approach in relation to the regulation of research; the patenting of stem cell technologies; and the effects patents granted are having on further human embryonic stem cell research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

How adequate are current theoretical standpoints, tools and categories for explaining the flows of international students to Anglo/American/European universities? This essay takes a different analytic tact and historical standpoint to the study of them and us, insiders and outsiders (cf. Foley, Levinson & Hurtig, 2001), in the internationalisation of education.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.