3 resultados para Successful Strategies

em WestminsterResearch - UK


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article reports on a study that examined the personal employment paths of six international academics at a British university. To complement previous accounts of difficult migration, it focuses on the successful experiences of such academics, in particular how proficiency in English facilitated their move into employment in higher education (HE), and the linguistic competences and communication strategies they deploy in their daily activities. The article identifies key factors that have facilitated to their academic achievements and contributes to the understanding of the benefits and consequences of skilled migration. In conclusion, it suggests workplace pedagogy and policy responses that could facilitate other international academics' successful experiences in the UK HE sector.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The broad capabilities of current mobile devices have paved the way for Mobile Crowd Sensing (MCS) applications. The success of this emerging paradigm strongly depends on the quality of received data which, in turn, is contingent to mass user participation; the broader the participation, the more useful these systems become. However, there is an ongoing trend that tries to integrate MCS applications with emerging computing paradigms such as cloud computing. The intuition is that such a transition can significantly improve the overall efficiency while at the same time it offers stronger security and privacy-preserving mechanisms for the end-user. In this position paper, we dwell on the underpinnings of incorporating cloud computing techniques to facilitate the vast amount of data collected in MCS applications. That is, we present a list of core system, security and privacy requirements that must be met if such a transition is to be successful. To this end, we first address several competing challenges not previously considered in the literature such as the scarce energy resources of battery-powered mobile devices as well as their limited computational resources that they often prevent the use of computationally heavy cryptographic operations and thus offering limited security services to the end-user. Finally, we present a use case scenario as a comprehensive example. Based on our findings, we posit open issues and challenges, and discuss possible ways to address them, so that security and privacy do not hinder the migration of MCS systems to the cloud.