16 resultados para Educational Ontology
em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland
Resumo:
Researching research is not a common theme in educational drama. Nor is the educational drama process from a participant perspective a typical focus of research, at least not if the participants are disabled. Yet this is the theme of this thesis, a drama in three acts. The aim of this thesis is to describe, analyse, and discuss both the ways in which research within educational drama can be carried out and represented, and the experiences of the participants of the educational drama process. The theoretical framework that steers the research process is built up of two pairs of frames, each of them, like Russian nesting dolls, containing further frames. The first frame, relating to the outcomes of conducting research in educational drama, comprises philosophical, representational, and personal theories. As the second question asks what educational drama is, the subject related frame is built up of pedagogical, drama educational, and aesthetic theories. The study in its entirety follows the structure of the researcher’s hermeneutical learning process and takes the form of a journey starting from what is familiar, stretching towards what is new and different, and finally returning back to the beginning with a new view on what was there at the start. The thesis consists of two separate but related studies. The first, a familiar study conducted earlier, Alpha in Act I, was carried out among upper secondary school pupils. In the second, the new and therefore unfamiliar study, Omega in Act III, the participants are adult individuals who are physically and communicatively disabled. In between these two Acts an element of “Verfremdung” where the Alpha study is systematically scrutinized as the purpose is to teach and to manage the reader to think. Meta-discussions on the philosophical issues of the study are conducted throughout the text, parallel to the empirical parts. The outcomes of the first research question show that philosophical, methodical, and representational consistency is crucial for research. While this may sound like stating the obvious, this has nevertheless not always been considered fact, especially not within qualitative research. The outcomes further stress that representational issues are also to be recognized when presenting non-rational aspects of educational drama. By wording the world, through the use of visualising language, the surplus of meanings of educational drama can be, as they are within this study, made visible, sensible, and almost tangible, not only cognitively understandable. The outcomes of the second question point to the different foci of the studies, with Alpha focusing on the rationally retold experiences and Omega focusing on nonrational experiences. The outcomes expose educational drama as a learning process comprising doing, reflecting, and being. The doing aspect communicates the concrete efforts in creating a piece of theatre, while the being aspect relates experiences of being as situated, embodied and sensuous, reciprocal, empowering, aesthetic and artistic, and existential. Reflection is the twine that runs throughout the process and connects both doing and being. In summary, the outcomes could be formulated as “learning from learning how to make theatre”.
Resumo:
This study was conducted in order to learn how companies’ revenue models will be transformed due to the digitalisation of its products and processes. Because there is still only a limited number of researches focusing solely on revenue models, and particularly on the revenue model change caused by the changes at the business environment, the topic was initially approached through the business model concept, which organises the different value creating operations and resources at a company in order to create profitable revenue streams. This was used as the base for constructing the theoretical framework for this study, used to collect and analyse the information. The empirical section is based on a qualitative study approach and multiple-case analysis of companies operating in learning materials publishing industry. Their operations are compared with companies operating in other industries, which have undergone comparable transformation, in order to recognise either similarities or contrasts between the cases. The sources of evidence are a literature review to find the essential dimensions researched earlier, and interviews 29 of managers and executives at 17 organisations representing six industries. Based onto the earlier literature and the empirical findings of this study, the change of the revenue model is linked with the change of the other dimen-sions of the business model. When one dimension will be altered, as well the other should be adjusted accordingly. At the case companies the transformation is observed as the utilisation of several revenue models simultaneously and the revenue creation processes becoming more complex.
Resumo:
In my doctoral thesis I evaluate strategies designed to cope with the multicultural nature of four European nations: Great Britain, The Netherlands, Sweden, and Denmark. I also analyse and clarify the question of the place of religion in present-day Europe. The empirical material analysed in the study consists of politicians’ statements and policy documents dealing with immigration policy and religious and values education in the four countries. In addition, I analyse statements issued by the Council of Europe regarding religious education, along with all cases relevant to religious education brought before the United Nations Human Rights Committee or the European Court of Human Rights. The theoretical framework is formed by the scholarly debate – among philosophers, sociologists and scholars of religion in education – concerning the question of a just society. Special emphasis is given to philosophical theories that are in favour of granting special group rights to religious minorities in the name of equal treatment. With regard to the question of the appropriate place of religion, I apply Kim Knott’s methodological model for locating religion in secular contexts, and Émile Durkheim’s theory as to the significance of religion and collective sentiments in uniting adherents or members of a group into a single moral community. The study shows that even when the positive side of immigration, as a potential force for the enrichment of the public culture, is acknowledged, there is anxiety as to the successful integration of immigrants. The premises and goals of immigration policies have also been questioned. One central problem is the incommensurability between the values upheld by Western liberal democracies and certain religious traditions, above all those of Islam. Great Britain, The Netherlands, Sweden, and Denmark have tightened control over their citizens’ ethical attitudes and want to regulate these as well. In coping with cultural diversity, the significance of education, especially religious education, plays a significant role; as future citizens, pupils are expected to internalise the society’s core values as well as gaining an understanding of different cultures and ways of life. It is also worth noting that both the Council of Europe and the European Court of Human Rights have recently expressed the view that one important goal of religious education is to enable pupils to be critical and autonomous with regard to different religions and moral positions. The study shows that religion is not seen as purely a personal matter. Religion is closely linked to individual and national identity, and religious traditions thus have a place in the public domain. It should be noted, however, that a religious tradition – more precisely, an interpretation of religious tradition – qualifies as a legitimate partner in the democratic decision-making process only if it shares similar values with Western European nations.
Resumo:
This three-phase study was conducted to examine the effect of the Breast Cancer Patient’s Pathway program (BCPP) on breast cancer patients’ empowering process from the viewpoint of the difference between knowledge expectations and perceptions of received knowledge, knowledge level, quality of life, anxiety and treatment-related side effects during the breast cancer treatment process. The BCPP is an Internet-based patient education tool describing a flow chart of the patient pathway during the breast treatment process, from breast cancer diagnostic tests to the follow-up after treatments. The ultimate goal of this study was to evaluate the effect of the BCPP to the breast cancer patient’s empowerment by using the patient pathway as a patient education tool. In phase I, a systematic literature review was carried out to chart the solutions and outcomes of Internet-based educational programs for breast cancer patients. In phase II, a Delphi study was conducted to evaluate the usability of web pages and adequacy of their content. In phase III, the BCPP program was piloted with 10 patients and patients were randomised to an intervention group (n=50) and control group (n=48). According to the results of this study, the Internet is an effective patient education tool for increasing knowledge, and BCPP can be used as a patient education method supporting other education methods. However, breast cancer patients’ perceptions of received knowledge were not fulfilled; their knowledge expectations exceed the perceived amount of received knowledge. Although control group patients’ knowledge expectations were met better with the knowledge they received in hospital compared to the patients in the intervention group, no statistical differences were found between the groups in terms of quality of life, anxiety and treatment-related side effects. However, anxiety decreased faster in the intervention group when looking at internal differences between the groups at different measurement times. In the intervention group the relationship between the difference between knowledge expectations and perceptions of received knowledge correlated significantly with quality of life and anxiety. Their knowledge level was also significant higher than in the control group. These results support the theory that the empowering process requires patient’s awareness of knowledge expectations and perceptions of received knowledge. There is a need to develop patient education to meet patients’ perceptions of received knowledge, including oral and written education and BCPP, to fulfil patient’s knowledge expectations and facilitate the empowering process. Further research is needed on the process of cognitive empowerment with breast cancer patients. There is a need for new patient education methods to increase breast cancer patients’ awareness of knowing.
Resumo:
The objective of this research was to identify the skills and competences required by Chief Information Officers in their professional life and whether these skills can be developed by means of postgraduate education pro-grams. Although the changing role of the CIO has been studied for years by the academia, the ways of necessary skills development have not been paid significant attention. In order to obtain understanding of the topic and its main issues qualitative method was implemented and questionnaires and interviews were conducted with CIOs and other C-level executives to-gether with analysis of the curricula of postgraduate educational programs in the field of business designed for executives. Business skills and knowledge along with developed communication and leadership skills are among the most discussed and required from CIOs. According to the collected data and its further analysis, although the most important competences of an IT executive are technological, the im-portance of business related skills is emphasized by the majority of re-spondents and supported by the existing theory. Postgraduate educational programs have curricula that can develop the required competences, alt-hough not equally.
Resumo:
Software plays an important role in our society and economy. Software development is an intricate process, and it comprises many different tasks: gathering requirements, designing new solutions that fulfill these requirements, as well as implementing these designs using a programming language into a working system. As a consequence, the development of high quality software is a core problem in software engineering. This thesis focuses on the validation of software designs. The issue of the analysis of designs is of great importance, since errors originating from designs may appear in the final system. It is considered economical to rectify the problems as early in the software development process as possible. Practitioners often create and visualize designs using modeling languages, one of the more popular being the Uni ed Modeling Language (UML). The analysis of the designs can be done manually, but in case of large systems, the need of mechanisms that automatically analyze these designs arises. In this thesis, we propose an automatic approach to analyze UML based designs using logic reasoners. This approach firstly proposes the translations of the UML based designs into a language understandable by reasoners in the form of logic facts, and secondly shows how to use the logic reasoners to infer the logical consequences of these logic facts. We have implemented the proposed translations in the form of a tool that can be used with any standard compliant UML modeling tool. Moreover, we authenticate the proposed approach by automatically validating hundreds of UML based designs that consist of thousands of model elements available in an online model repository. The proposed approach is limited in scope, but is fully automatic and does not require any expertise of logic languages from the user. We exemplify the proposed approach with two applications, which include the validation of domain specific languages and the validation of web service interfaces.
Resumo:
A growing concern for organisations is how they should deal with increasing amounts of collected data. With fierce competition and smaller margins, organisations that are able to fully realize the potential in the data they collect can gain an advantage over the competitors. It is almost impossible to avoid imprecision when processing large amounts of data. Still, many of the available information systems are not capable of handling imprecise data, even though it can offer various advantages. Expert knowledge stored as linguistic expressions is a good example of imprecise but valuable data, i.e. data that is hard to exactly pinpoint to a definitive value. There is an obvious concern among organisations on how this problem should be handled; finding new methods for processing and storing imprecise data are therefore a key issue. Additionally, it is equally important to show that tacit knowledge and imprecise data can be used with success, which encourages organisations to analyse their imprecise data. The objective of the research conducted was therefore to explore how fuzzy ontologies could facilitate the exploitation and mobilisation of tacit knowledge and imprecise data in organisational and operational decision making processes. The thesis introduces both practical and theoretical advances on how fuzzy logic, ontologies (fuzzy ontologies) and OWA operators can be utilized for different decision making problems. It is demonstrated how a fuzzy ontology can model tacit knowledge which was collected from wine connoisseurs. The approach can be generalised and applied also to other practically important problems, such as intrusion detection. Additionally, a fuzzy ontology is applied in a novel consensus model for group decision making. By combining the fuzzy ontology with Semantic Web affiliated techniques novel applications have been designed. These applications show how the mobilisation of knowledge can successfully utilize also imprecise data. An important part of decision making processes is undeniably aggregation, which in combination with a fuzzy ontology provides a promising basis for demonstrating the benefits that one can retrieve from handling imprecise data. The new aggregation operators defined in the thesis often provide new possibilities to handle imprecision and expert opinions. This is demonstrated through both theoretical examples and practical implementations. This thesis shows the benefits of utilizing all the available data one possess, including imprecise data. By combining the concept of fuzzy ontology with the Semantic Web movement, it aspires to show the corporate world and industry the benefits of embracing fuzzy ontologies and imprecision.
Resumo:
Poster at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014
Resumo:
This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.
Resumo:
Ontology matching is an important task when data from multiple data sources is integrated. Problems of ontology matching have been studied widely in the researchliterature and many different solutions and approaches have been proposed alsoin commercial software tools. In this survey, well-known approaches of ontologymatching, and its subtype schema matching, are reviewed and compared. The aimof this report is to summarize the knowledge about the state-of-the-art solutionsfrom the research literature, discuss how the methods work on different application domains, and analyze pros and cons of different open source and academic tools inthe commercial world.
Resumo:
The Finnish legislation requires for a safe and secure learning environment. However, the comprehensive, risk based safety and security management (SSM) and the management commitment in the implementation and development of the SSM are not mentioned in the legislation. Multiple institutions, operators and researchers have studied and developed safety and security in educational institutions over the past decade. Typically the approach has been fragmented and without bringing up the importance of the comprehensive SSM. The development needs of the safety and security operations in universities have been studied. However, in universities of applied sciences (UASs) and in elementary schools (ESs), the performance level, strengths and weaknesses of the comprehensive SSM have not been studied. The objective of this study was to develop the comprehensive, risk based SSM of educational institutions by developing the new Asteri consultative auditing process and study its effects on auditees. Furthermore, the performance level in the comprehensive SSM in UASs and ESs were studied using Asteri and the TUTOR model developed by the Keski-Uusimaa Department for Rescue Services. In addition, strengths, development needs and differences were identified. In total, 76 educational institutions were audited between the years 2011 and 2014. The study is based on logical empiricism, and an observational applied research design was used. Auditing, observation and an electronic survey were used for data collection. Statistical analysis was used to analyze the collected information. In addition, thematic analysis was used to analyze the development areas of the organizations mentioned by the respondents in the survey. As one of the main contributions, this research presents the new Asteri consultative auditing process. Organizations with low performance levels on the audited subject benefit the most from the Asteri consultative auditing process. Asteri may be usable in many different types of audits, not only in SSM audits. As a new result, this study provides new knowledge on attitudes related to auditing. According to the research findings, auditing may generate negative attitudes and the auditor should take them into account when planning and preparing for audits. Negative attitudes can be compensated by producing added value, objectivity and positivity for the audit and, thus, improve the positive effects of auditing on knowledge and skills. Moreover, as the results of this study shows, auditing safety and security issues do not increase feelings of insecurity, but rather increase feelings of safety and security when using the new Asteri consultative auditing process with the TUTOR model. The results showed that the SSM in the audited UASs was statistically significantly more advanced than that in the audited ESs. However, there is still room for improvement in the ESs and the UASs as the approach to the SSM was fragmented. It can be assumed that the majority of Finnish UASs and ESs do not likely meet the basic level of the comprehensive, risk based the SSM.
Resumo:
For the past decades, educational large-scale reforms have been elaborated and implemented in many countries and often resulted in partial or complete failure. These results brought researchers to study policy processes in order to address this particular challenge. Studies on implementation processes brought to light an existing causal relationship between the implementation process and the effectiveness of a reform. This study aims to describe the implementation process of educational change in Finland, who produced efficient educational reforms over the last 50 years. The case study used for the purpose of this study is the national reform of undivided basic education (yhtenäinen peruskoulu) implemented in the end of the 1990s. Therefore, this research aims to describe how the Finnish undivided basic education reform was implemented. This research was carried out using a pluralist and structuralist approach of policy process and was analyzed according to the hybrid model of implementation process. The data were collected using a triangulation of methods, i.e. documentary research, interviews and questionnaires. The data were qualitative and were analyzed using content analysis methods. This study concludes that the undivided basic education reform was applied in a very decentralized manner, which is a reflection of the decentralized system present in Finland. Central authorities provided a clear vision of the purpose of the reform, but did not control the implementation process. They rather provided extensive support in the form of transmission of information and development of collaborative networks. Local authorities had complete autonomy in terms of decision-making and implementation process. Discussions, debates and decisions regarding implementation processes took place at the local level and included the participation of all actors present on the field. Implementation methods differ from a region to another, with is the consequence of the variation of the level of commitment of local actors but also the diversity of local realities. The reform was implemented according to existing structures and values, which means that it was in cohesion with the context in which it was implemented. These results cannot be generalized to all implementation processes of educational change in Finland but give a great insight of what could be the model used in Finland. Future studies could intent to confirm the model described here by studying other reforms that took place in Finland.
Resumo:
For the past decades, educational large-scale reforms have been elaborated and implemented in many countries and often resulted in partial or complete failure. These results brought researchers to study policy processes in order to address this particular challenge. Studies on implementation processes brought to light an existing causal relationship between the implementation process and the effectiveness of a reform. This study aims to describe the implementation process of educational change in Finland, who produced efficient educational reforms over the last 50 years. The case study used for the purpose of this study is the national reform of undivided basic education (yhtenäinen peruskoulu) implemented in the end of the 1990s. Therefore, this research aims to describe how the Finnish undivided basic education reform was implemented. This research was carried out using a pluralist and structuralist approach of policy process and was analyzed according to the hybrid model of implementation process. The data were collected using a triangulation of methods, i.e. documentary research, interviews and questionnaires. The data were qualitative and were analyzed using content analysis methods. This study concludes that the undivided basic education reform was applied in a very decentralized manner, which is a reflection of the decentralized system present in Finland. Central authorities provided a clear vision of the purpose of the reform, but did not control the implementation process. They rather provided extensive support in the form of transmission of information and development of collaborative networks. Local authorities had complete autonomy in terms of decision-making and implementation process. Discussions, debates and decisions regarding implementation processes took place at the local level and included the participation of all actors present on the field. Implementation methods differ from a region to another, with is the consequence of the variation of the level of commitment of local actors but also the diversity of local realities. The reform was implemented according to existing structures and values, which means that it was in cohesion with the context in which it was implemented. These results cannot be generalized to all implementation processes of educational change in Finland but give a great insight of what could be the model used in Finland. Future studies could intent to confirm the model described here by studying other reforms that took place in Finland.