996 resultados para Cyber learning


Relevância:

60.00% 60.00%

Publicador:

Resumo:

The objective sought with the present paper consists in analyzing the literature about Facebook in order to know the conclusions of the different works with regard to its influence on those results. The examination of 37 papers devoted to this thematic area allows us to know which journals publish more about the impacts that Facebook has on academic performance, which data collection methods are more often used, which topics emerge in parallel to the use of Facebook in the academic context, and which countries are more prolific in this field. The conclusions suggest that, despite the divergence of results, the overall outcome is positive when it comes to the use of Facebook in academic environments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

It can be argued that technological advances and increasing familiarity with technology in the general population has created a huge potential for expansion of online learning (OL) across the educational spectrum. The growth of OL at the university level over the last few years has brought with it an increasing need to understand the learning processes and social processes involved in the ‘cyber’ or ‘virtual’ lecture hall and seminar room by asking questions such as: What are ‘virtual universities’? How – or more critically whether – virtual learning environments are different from face-to-face (F2F) ones? In other words, there is a critical need to explore how students relate to each other and their lecturer(s) in a literal ‘school without walls’? This paper explores the development of a virtual community within a wholly online MA in Applied Linguistics program within the framework of online community development proposed by Haythornthwaite et al (2000).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Bullying and victimisation among school age children is recognised as a major public health problem. The Australian Covert Bullying Prevalence Study (ACBPS) reports that just over one quarter (27%) of school students aged 8 to 14 years were bullied and 9% bullied others on a frequent basis (every few weeks or more often) (Cross et al., 2009). Bullying is associated with a host of detrimental effects, including loneliness (Nansel, Overpeck, Pilla, & Ruan, 2001), low self‐esteem (Jankauskiene, Kardelis, Sukys, & Kardeliene, 2008; Salmivalli, Kaukiainen, Kaistaniemi, & Lagerspetz, 1999), anxiety, depression (Kaltiala‐Heino, Rimpela, Rantanen, & Rimpela, 2000), suicide ideation (Kaltiala‐Heino, Rimpela, Marttunen, Rimpela, & Rantanen, 1999), impaired academic achievement (Nansel et al., 2001), and poorer physical health (Wolke, Woods, Bloomfield, & Karstadt, 2001).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study explored the reasons underlying adolescents’ perceptions of why their peers engage in bullying in the real and the cyber world. While there has been much research on why bullies engage in such behaviour, ranging from personality characteristics to social or familial reasons, the perceptions of young people on the motives of cyberbullies has not been researched. A new instrument, based on interviews and a literature review was piloted to measure young people’s perceptions of why their peers engage in both traditional and cyberbullying behaviour, according to their role in bullying. Four hundred students were surveyed in three co-educational independent secondary schools. A comparison between perceptions of bullies’ motives in traditional and cyberbullying was made. Implications for interventions with bullies are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Research has consistently found that school students who do not identify as self-declared completely heterosexual are at increased risk of victimization by bullying from peers. This study examined heterosexual and nonheterosexual university students’ involvement in both traditional and cyber forms of bullying, as either bullies or victims. Five hundred twenty-eight first-year university students (M= 19.52 years old) were surveyed about their sexual orientation and their bullying experiences over the previous 12 months. The results showed that nonheterosexual young people reported higher levels of involvement in traditional bullying, both as victims and perpetrators, in comparison to heterosexual students. In contrast, cyberbullying trends were generally found to be similar for heterosexual and nonheterosexual young people. Gender differences were also found. The implications of these results are discussed in terms of intervention and prevention of the victimization of nonheterosexual university students.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

For decades Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) have used computers to monitor and control physical processes in many critical industries, including electricity generation, gas pipelines, water distribution, waste treatment, communications and transportation. Increasingly these systems are interconnected with corporate networks via the Internet, making them vulnerable and exposed to the same risks as those experiencing cyber-attacks on a conventional network. Very often SCADA networks services are viewed as a specialty subject, more relevant to engineers than standard IT personnel. Educators from two Australian universities have recognised these cultural issues and highlighted the gap between specialists with SCADA systems engineering skills and the specialists in network security with IT background. This paper describes a learning approach designed to help students to bridge this gap, gain theoretical knowledge of SCADA systems' vulnerabilities to cyber-attacks via experiential learning and acquire practical skills through actively participating in hands-on exercises.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper provides an overview of ‘lessons learned’ from the author’s decade long involvement in online teaching and learning, including eight years in the development, implementation, teaching and administration of a wholly online Master of Arts in Applied Linguistics coursework degree program, which attracted several hundred students annually from around the world, and has won awards for innovation, including being identified as a ‘flagship’ program during an external review of the university.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aim Our pedagogical research addressed the following research questions: 1) Can shared ‘cyber spaces’, such as a ‘wiki’, be occupied by undergraduate women’s health students to improve their critical thinking skills? 2) What are the learning processes via which this occurs? 3) What are the implications of this assessment trial for achieving learning objectives and outcomes in future public health undergraduate courses? Methods The students contributed written, critical reflections (approximately 250 words) to the Wiki each week following the lecture. Students reflected on a range of topics including the portrayal of women in the media, femininity, gender inequality, child bearing and rearing, domestic violence, mental health, Indigenous women, older women, and LGBTIQ communities. Their entries were anonymous, but visible to their peers. Each wiki entry contained a ‘discussion tab’ wherein online conversations were initiated. We used a social constructivist approach to grounded theory to analyse the 480 entries posted over the semester. (http://pub336womenshealth.wikispaces.com/) Results The social constructivist approach initiated by Vygotsky (1978) and further developed by Jonasson (1994) was used to analyse the students’ contributions in relation to four key thematic outcomes including: 1) Complexities in representations across contexts; 2) Critical evaluation in real world scenarios; 3) Reflective practice based on experience, and; 4) Collaborative co-construction of knowledge. Both text and image/visual contributions are provided as examples within each of these learning processes. A theoretical model depicting the interactive learning processes that occurred via discussion of the textual and visual stimulus is presented.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND Experimental learning, traditionally conducted in on-campus laboratory venues, is the cornerstone of science and engineering education. In order to ensure that engineering graduates are exposed to ‘real-world’ situations and attain the necessary professional skill-sets, as mandated by course accreditation bodies such as Engineers Australia, face-to-face laboratory experimentation with real equipment has been an integral component of traditional engineering education. The online delivery of engineering coursework endeavours to mimic this with remote and simulated laboratory experimentation. To satisfy student and accreditation requirements, the common practice has been to offer equivalent remote and/or simulated laboratory experiments in lieu of the ones delivered, face-to face, on campus. The current implementations of both remote and simulated laboratories tend to be specified with a focus on technical characteristics, instead of pedagogical requirements. This work attempts to redress this situation by developing a framework for the investigation of the suitability of different experimental educational environments to deliver quality teaching and learning. PURPOSE For the tertiary education sector involved with technical or scientific training, a research framework capable of assessing the affordances of laboratory venues is an important aid during the planning, designing and evaluating stages of face-to-face and online (or cyber) environments that facilitate student experimentation. Providing quality experimental learning venues has been identified as one of the distance-education providers’ greatest challenges. DESIGN/METHOD The investigation draws on the expertise of staff at three Australian universities: Swinburne University of Technology (SUT), Curtin University (Curtin) and Queensland University of Technology (QUT). The aim was to analyse video recorded data, in order to identify the occurrences of kikan-shido (a Japanese term meaning ‘between desks instruction’ and over-the-shoulder learning and teaching (OTST/L) events, thereby ascertaining the pedagogical affordances in face-to-face laboratories. RESULTS These will be disseminated at a Master Class presentation at this conference. DISCUSSION Kikan-shido occurrences did reflect on the affordances of the venue. Unlike with other data collection methods, video recorded data and its analysis is repeatable. Participant bias is minimised or even eradicated and researcher bias tempered by enabling re-coding by others. CONCLUSIONS Framework facilitates the identification of experiential face-to-face learning venue affordances. Investigation will continue with on-line venues.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cyber-security research in the field of smart grids is often performed with a focus on either the power and control domain or the Information and Communications Technology (ICT) domain. The characteristics of the power equipment or ICT domain are commonly not collectively considered. This work provides an analysis of the physical effects of cyber-attacks on microgrids – a smart grid construct that allows continued power supply when disconnected from a main grid. Different types of microgrid operations are explained (connected, islanded and synchronous-islanding) and potential cyber-attacks and their physical effects are analyzed. A testbed that is based on physical power and ICT equipment is presented to validate the results in both the physical and ICT domain.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Die zunehmende Vernetzung der Informations- und Kommunikationssysteme führt zu einer weiteren Erhöhung der Komplexität und damit auch zu einer weiteren Zunahme von Sicherheitslücken. Klassische Schutzmechanismen wie Firewall-Systeme und Anti-Malware-Lösungen bieten schon lange keinen Schutz mehr vor Eindringversuchen in IT-Infrastrukturen. Als ein sehr wirkungsvolles Instrument zum Schutz gegenüber Cyber-Attacken haben sich hierbei die Intrusion Detection Systeme (IDS) etabliert. Solche Systeme sammeln und analysieren Informationen von Netzwerkkomponenten und Rechnern, um ungewöhnliches Verhalten und Sicherheitsverletzungen automatisiert festzustellen. Während signatur-basierte Ansätze nur bereits bekannte Angriffsmuster detektieren können, sind anomalie-basierte IDS auch in der Lage, neue bisher unbekannte Angriffe (Zero-Day-Attacks) frühzeitig zu erkennen. Das Kernproblem von Intrusion Detection Systeme besteht jedoch in der optimalen Verarbeitung der gewaltigen Netzdaten und der Entwicklung eines in Echtzeit arbeitenden adaptiven Erkennungsmodells. Um diese Herausforderungen lösen zu können, stellt diese Dissertation ein Framework bereit, das aus zwei Hauptteilen besteht. Der erste Teil, OptiFilter genannt, verwendet ein dynamisches "Queuing Concept", um die zahlreich anfallenden Netzdaten weiter zu verarbeiten, baut fortlaufend Netzverbindungen auf, und exportiert strukturierte Input-Daten für das IDS. Den zweiten Teil stellt ein adaptiver Klassifikator dar, der ein Klassifikator-Modell basierend auf "Enhanced Growing Hierarchical Self Organizing Map" (EGHSOM), ein Modell für Netzwerk Normalzustand (NNB) und ein "Update Model" umfasst. In dem OptiFilter werden Tcpdump und SNMP traps benutzt, um die Netzwerkpakete und Hostereignisse fortlaufend zu aggregieren. Diese aggregierten Netzwerkpackete und Hostereignisse werden weiter analysiert und in Verbindungsvektoren umgewandelt. Zur Verbesserung der Erkennungsrate des adaptiven Klassifikators wird das künstliche neuronale Netz GHSOM intensiv untersucht und wesentlich weiterentwickelt. In dieser Dissertation werden unterschiedliche Ansätze vorgeschlagen und diskutiert. So wird eine classification-confidence margin threshold definiert, um die unbekannten bösartigen Verbindungen aufzudecken, die Stabilität der Wachstumstopologie durch neuartige Ansätze für die Initialisierung der Gewichtvektoren und durch die Stärkung der Winner Neuronen erhöht, und ein selbst-adaptives Verfahren eingeführt, um das Modell ständig aktualisieren zu können. Darüber hinaus besteht die Hauptaufgabe des NNB-Modells in der weiteren Untersuchung der erkannten unbekannten Verbindungen von der EGHSOM und der Überprüfung, ob sie normal sind. Jedoch, ändern sich die Netzverkehrsdaten wegen des Concept drif Phänomens ständig, was in Echtzeit zur Erzeugung nicht stationärer Netzdaten führt. Dieses Phänomen wird von dem Update-Modell besser kontrolliert. Das EGHSOM-Modell kann die neuen Anomalien effektiv erkennen und das NNB-Model passt die Änderungen in Netzdaten optimal an. Bei den experimentellen Untersuchungen hat das Framework erfolgversprechende Ergebnisse gezeigt. Im ersten Experiment wurde das Framework in Offline-Betriebsmodus evaluiert. Der OptiFilter wurde mit offline-, synthetischen- und realistischen Daten ausgewertet. Der adaptive Klassifikator wurde mit dem 10-Fold Cross Validation Verfahren evaluiert, um dessen Genauigkeit abzuschätzen. Im zweiten Experiment wurde das Framework auf einer 1 bis 10 GB Netzwerkstrecke installiert und im Online-Betriebsmodus in Echtzeit ausgewertet. Der OptiFilter hat erfolgreich die gewaltige Menge von Netzdaten in die strukturierten Verbindungsvektoren umgewandelt und der adaptive Klassifikator hat sie präzise klassifiziert. Die Vergleichsstudie zwischen dem entwickelten Framework und anderen bekannten IDS-Ansätzen zeigt, dass der vorgeschlagene IDSFramework alle anderen Ansätze übertrifft. Dies lässt sich auf folgende Kernpunkte zurückführen: Bearbeitung der gesammelten Netzdaten, Erreichung der besten Performanz (wie die Gesamtgenauigkeit), Detektieren unbekannter Verbindungen und Entwicklung des in Echtzeit arbeitenden Erkennungsmodells von Eindringversuchen.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Robotics is a key theme in many of the degrees offered in Systems Engineering. The topic has proved useful in attracting students to the University, and it also provides the basis of much practical and project work throughout the degrees. This paper focuses on one aspect, a Part 2 project in which students doing various degrees work together to develop a mobile robot which is controlled remotely to navigate an environment and perform specific tasks. In addition to providing practical experience of relevant academic topics, this project helps to contribute to key teaching and learning priorities including problem based learning, motivation and important employability skills.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Although social networking sites (SNSs) present a great deal of opportunities to support learning, the privacy risk is perceived by learners as a friction point that affects their full use for learning. Privacy risks in SNSs can be divided into risks that are posed by the SNS provider itself and risks that result from user’s social interactions. Using an online survey questionnaire, this study explored the students’ perception of the benefits in using social networking sites for learning purposes and their perceived privacy risks. A sample of 214 students from Uganda Christian University in Africa was studied. The results show that although 88 % of participants indicated the usefulness of SNSs for learning, they are also aware of the risks associated with these sites. Most of the participants are concerned with privacy risks such as identity theft, cyber bullying, and impersonation that might influence their online learning participation in SNSs.