171 resultados para collaboration scenario


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key strategy in facilitating learning in Open Disclosure training is the use of hypothetical, interactive scenarios called ‘simulations’. According to Clapper (2010), the ‘advantages of using simulation are numerous and include the ability to help learners make meaning of complex tasks, while also developing critical thinking and cultural skills’. Simulation, in turn, functions largely through improvisation and role-play, in which participants ‘act out’ particular roles and characters according to a given scenario, without recourse to a script. To maximise efficacy in the Open Disclosure training context, role-play requires the specialist skills of professionally trained actors. Core capacities that professional actors bring to the training process include (among others) believability, an observable and teachable skill which underpins the western traditions of actor training; and flexibility, which pertains to the actor’s ability to vary performance strategies according to the changing dynamics of the learning situation. The Patient Safety and Quality Improvement Service of Queensland Health utilises professional actors as a key component of their Open Disclosure Training Program. In engaging actors in this work, it is essential that Facilitators of Open Disclosure training have a solid understanding of the acting process: what acting is; how actors work to a brief; how they improvise; and how they sustainably manage a wide range of emotional states. In the simulation context, the highly skilled actor can optimise learning outcomes by adopting or enacting – in collaboration with the Facilitator - a pedagogical function.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Accepting the fact that culture and language are interrelated in second language learning (SLL), the web sites should be designed to integrate with the cultural aspects. Yet many SLL web sites fail to integrate with the cultural aspects and/or focus on language acquisition only. This study identified three issues: (1) anthropologists’ cultural models mostly adopted in cross-cultural web user interface have been superficially used; (2) web designers deal with culture as a fixed one which needs to be modeled into interface design elements, so (3) there is a need for a communication framework between educators and design practitioners, which can be utilized in web design processes. This paper discusses what anthropology can contribute to language learning, mediated through web design processes and suggests a cultural user experience framework for web-based SLL by presenting an exemplary matrix. To evaluate the effectiveness of the framework, the key stakeholders (learners, teachers, and designers) participated in a case scenario-based evaluation. The result shows a high possibility that the framework can enhance the effective communication and collaboration for the cultural integration.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Implementing educational reform requires partnerships, and university-school collaborations in the form of investigative and experimental projects can aim to determine the practicalities of reform. However, there are funded projects that do not achieve intended outcomes. In the context of a new reform initiative in education, namely, science, technology, engineering and mathematics (STEM) education, this article explores the management of a government-funded project. In a university school partnership for STEM education, how can leadership be distributed for achieving project outcomes? Participants included university personnel from different STEM areas, school teachers and school executives. Data collected included observations, interviews, resource materials, and video and photographic images. Findings indicated that leadership roles were distributed and selfactivated by project partners according to their areas of expertise and proximal activeness to the project phases, that is: (1) establishing partnerships; (2) planning and collaboration; (3) project implementation; and (4) project evaluation and further initiatives. Leadership can be intentional and unintentional within project phases, and understanding how leadership can be distributed and selfactivated more purposefully may aid in generating more expedient project outcomes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years there has been a large emphasis placed on the need to use Learning Management Systems (LMS) in the field of higher education, with many universities mandating their use. An important aspect of these systems is their ability to offer collaboration tools to build a community of learners. This paper reports on a study of the effectiveness of an LMS (Blackboard©) in a higher education setting and whether both lecturers and students voluntarily use collaborative tools for teaching and learning. Interviews were conducted with participants (N=67) from the faculties of Science and Technology, Business, Health and Law. Results from this study indicated that participants often use Blackboard© as an online repository of learning materials and that the collaboration tools of Blackboard© are often not utilised. The study also found that several factors have inhibited the use and uptake of the collaboration tools within Blackboard©. These have included structure and user experience, pedagogical practice, response time and a preference for other tools.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The convergence of locative and social media with collaborative interfaces and data visualisation has expanded the potential of online information provision. Offering new ways for communities to share contextually specific information, it presents the opportunity to expand social media’s current focus on micro self-publishing with applications that support communities to actively address areas of local need. This paper details the design and development of a prototype application that illustrates this potential. Entitled PetSearch, it was designed in collaboration with the Animal Welfare League of Queensland to support communities to map and locate lost, found and injured pets, and to build community engagement in animal welfare issues. We argue that, while established approaches to social and locative media provide a useful foundation for designing applications to harness social capital, they must be re-envisaged if they are to effectively facilitate community collaboration. We conclude by arguing that the principles of user engagement and co-operation employed in this project can be extrapolated to other online approaches that aim to facilitate co-operative problem solving for social benefit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Much has been written about varieties of collaboration and the interplay between conflict and collaboration in industrial relations. This paper explores the preconditions, processes and outcomes associated with the collaborative strategies of an Australian retail trade union: the Shop, Distributive and Allied Employees' Association. The data were collected from an extensive series of interviews with officials and organisers within the union across all Australian states. We find that despite taking a servicing approach, and indeed never aggressively organising members, the union has managed to achieve a range of outcomes that exceed retail employment conditions in other countries. We argue that this is partly a result of the Australian legislative framework, which is inherently pluralist and supportive of collective bargaining. This environment, whereby unions are not forced to fight to represent members, can be conducive to collaborative employment relations, particularly in industries where the parties do not adopt an adversarialist stance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Historically, perceptions about mathematics and how it is taught and learned in schools have been mixed and as a consequence have an influence on self efficacy. There are those of us who see mathematics as logical and an enjoyable subject to learn, whilst others see mathematics as irrelevant, difficult and contributing to their school failure. Research has shown that over-represented in the latter are Aboriginal and Torres Strait Islander, low SES and ESL students. These students are the focus of YuMi Deadly Centre (YDC) professional learning and research work at the Queensland University of Technology in Brisbane.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The knowledge economy of the 21st century requires skills such as creativity, critical thinking, problem solving, communication and collaboration (Partnership for 21st century skills, 2011) – skills that cannot easily be learnt from books, but rather through learning-by-doing and social interaction. Big ideas and disruptive innovation often result from collaboration between individuals from diverse backgrounds and areas of expertise. Public libraries, as facilitators of education and knowledge, have been actively seeking responses to such changing needs of the general public...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the advent of digital media and online information resources, public libraries as physical destinations for information access are being increasingly challenged. As a response, many libraries follow the trend of removing bookshelves in order to provide more floorspace for social interaction and collaboration. Such spaces follow a Commons 2.0 model: they are designed to support collaborative work and social learning. The acquisition of skills and knowledge is facilitated as a result of being surrounded by and interacting with a community of likeminded others. Based on the results of a case study on a Commons 2.0 library space, this paper describes several issues of collaboration and social learning in public library settings. Acknowledging the significance of the architectural characteristics of the physical space, we discuss opportunities for ambient media to better reflect the social attributes of the library as a place; i.e. amplify the sense of other co-present library visitors and provide opportunities for shared encounters and conversations, which would remain invisible otherwise. We present the design of a user check-in system for improving the library as a physical destination for social learning, sharing, and inspiration for and by the community.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The future emergence of many types of airborne vehicles and unpiloted aircraft in the national airspace means collision avoidance is of primary concern in an uncooperative airspace environment. The ability to replicate a pilot’s see and avoid capability using cameras coupled with vision based avoidance control is an important part of an overall collision avoidance strategy. But unfortunately without range collision avoidance has no direct way to guarantee a level of safety. Collision scenario flight tests with two aircraft and a monocular camera threat detection and tracking system were used to study the accuracy of image-derived angle measurements. The effect of image-derived angle errors on reactive vision-based avoidance performance was then studied by simulation. The results show that whilst large angle measurement errors can significantly affect minimum ranging characteristics across a variety of initial conditions and closing speeds, the minimum range is always bounded and a collision never occurs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Threats against computer networks evolve very fast and require more and more complex measures. We argue that teams respectively groups with a common purpose for intrusion detection and prevention improve the measures against rapid propagating attacks similar to the concept of teams solving complex tasks known from field of work sociology. Collaboration in this sense is not easy task especially for heterarchical environments. We propose CIMD (collaborative intrusion and malware detection) as a security overlay framework to enable cooperative intrusion detection approaches. Objectives and associated interests are used to create detection groups for exchange of security-related data. In this work, we contribute a tree-oriented data model for device representation in the scope of security. We introduce an algorithm for the formation of detection groups, show realization strategies for the system and conduct vulnerability analysis. We evaluate the benefit of CIMD by simulation and probabilistic analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Enterprise Systems (ES) provide standardized, off-theshelf support for operations and management within organizations. With the advent of ES based on a serviceoriented architecture (SOA) and an increasing demand of IT-supported interorganizational collaboration, implementation projects face paradigmatically new challenges. The configuration of ES is costly and error-prone. Dependencies between business processes and business documents are hardly explicit and foster component proliferation instead of reuse. Configurative modeling can support the problem in two ways: First, conceptual modeling abstracts from technical details and provides more intuitive access and overview. Second, configuration allows the projection of variants from master models providing manageable variants with controlled flexibility. We aim at tackling the problem by proposing an integrated model-based framework for configuring both, processes and business documents, on an equal basis; as together, they constitute the core business components of an ES.