900 resultados para Student exchange programs.
Resumo:
A major element in the architectural work experience program at Queensland University of Technology is the assessment reports provided by students and employers. This paper gives an analysis of assessments submitted during the period 2000 to 2007 as viewed from a practice-base perspective. By comparing the 398 student assessments with 403 employer assessments in five specific categories over an eight year period one is able to obtain a clear understanding of the performance of the program and the relevance of its various sections for its participants that is not always obvious in a yearly analysis. In the major work experience areas there is close agreement between the student and employer assessments. However, the analysis did highlight a misunderstanding of the program’s aims by some participants. Overall the students were very positive about the program and appreciated the opportunity to work on real projects and be given a degree of responsibility for these projects. For Work Integrated Learning (WIL) practitioners this study clearly demonstrates the value of obtaining assessments from students and employers in order to establish the acceptance of a WIL program.
Resumo:
Many current chemistry programs privilege de-contextualised conceptual learning, often limited by a narrow selection of pedagogies that too often ignore the realities of studentse own lives and interests (e.g., Tytler, 2007). One new approach that offers hope for improving studentse engagement in learning chemistry and perceived relevance of chemistry is the context-based approach. This study investigated how teaching and learning occurred in one year 11 context-based chemistry classroom. Through an interpretive methodology using a case study design, the teaching and learning that occurred during one term (ten weeks) of a unit on Water Quality are described. The researcher was a participant observer in the study who co-designed the unit of work with the teacher. The research questions explored the structure and implementation of the context-based approach, the circumstances by which students connected concepts and context in the context-based classroom and the outcome of the approach for the students and the teacher. A dialectical sociocultural theoretical framework using the dialectics of structure | agency and agency | passivity was used as a lens to explore the interactions between learners in different fields, such as the field of the classroom and the field of the local community. The findings of this study highlight the difficulties teachers face when implementing a new pedagogical approach. Time constraints and opportunities for students to demonstrate a level of conceptual understanding that satisfied the teacher, hindered a full implementation of the approach. The study found that for high (above average) and sound (average) achieving students, connections between sanctioned science content of school curriculum and the studentse out-of-school worlds were realised when students actively engaged in fields that contextualised inquiry and gave them purpose for learning. Fluid transitions or the toing and froing between concepts and contexts occurred when structures in the classroom afforded students the agency to connect concepts and contexts. The implications for teaching by a context-based approach suggest that keeping the context central, by teaching content on a "need-to-know" basis, contextualises the chemistry for students. Also, if teachers provide opportunities for student-student interactions and written work student learning can improve.
Resumo:
Problem-based learning (PBL) is a pedagogical methodology that presents the learner with a problem to be solved to stimulate and situate learning. This paper presents key characteristics of a problem-based learning environment that determines its suitability as a data source for workrelated research studies. To date, little has been written about the availability and validity of PBL environments as a data source and its suitability for work-related research. We describe problembased learning and use a research project case study to illustrate the challenges associated with industry work samples. We then describe the PBL course used in our research case study and use this example to illustrate the key attributes of problem-based learning environments and show how the chosen PBL environment met the work-related research requirements of the research case study. We propose that the more realistic the PBL work context and work group composition, the better the PBL environment as a data source for a work-related research. The work context is more realistic when relevant and complex project-based problems are tackled in industry-like work conditions over longer time frames. Work group composition is more realistic when participants with industry-level education and experience enact specialized roles in different disciplines within a professional community.
Resumo:
Traditional media are under assault from digital technologies. Online advertising is eroding the financial basis of newspapers and television, demarcations between different forms of media are fading, and audiences are fragmenting. We can podcast our favourite radio show, data accompanies television programs, and we catch up with newspaper stories on our laptops. Yet mainstream media remain enormously powerful. The Media and Communications in Australia offers a systematic introduction to this dynamic field. Fully updated and revised to take account of recent developments, this third edition outlines the key media industries and explains how communications technologies are impacting on them. It provides a thorough overview of the main approaches taken in studying the media, and includes new chapters on social media, gaming, telecommunications, sport and cultural diversity. With contributions from some of Australia's best researchers and teachers in the field, The Media and Communications in Australia is the most comprehensive and reliable introduction to media and communications available. It is an ideal student text, and a reference for teachers of media and anyone interested in this influential industry.
Resumo:
Most online assessment systems now incorporate social networking features, and recent developments in social media spaces include protocols that allow the synchronisation and aggregation of data across multiple user profiles. In light of these advances and the concomitant fear of data sharing in secondary school education this papers provides important research findings about generic features of online social networking, which educators can use to make sound and efficient assessments in collaboration with their students and colleagues. This paper reports on a design experiment in flexible educational settings that challenges the dichotomous legacy of success and failure evident in many assessment activities for at-risk youth. Combining social networking practices with the sociology of education the paper proposes that assessment activities are best understood as a negotiable field of exchange. In this design experiment students, peers and educators engage in explicit, "front-end" assessment (Wyatt-Smith, 2008) to translate digital artefacts into institutional, and potentiality economic capital without continually referring to paper based pre-set criteria. This approach invites students and educators to use social networking functions to assess “work in progress” and final submissions in collaboration, and in doing so assessors refine their evaluative expertise and negotiate the value of student’s work from which new criteria can emerge. The mobile advantages of web-based technologies aggregate, externalise and democratise this transparent assessment model for most, if not all, student work that can be digitally represented.
Resumo:
This paper describes the development of an innovative online website for international graduate students studying at universities in Australia. In 2008, the Queensland University of Technology (QUT) in Australia identified as a key goal the development of its profile as a research intensive university. One of the performance indicators in realising this goal was to increase the proportion of international graduate students from 20% to 50% over a five-year period. To support these students, the University Research Students Centre (RSC) decided to develop an innovative interactive website called the ‘Doorway to Research’ to help prepare students for their arrival in Australia, by providing access to information and support between the period of their acceptance to their graduate programs and their arrival into the country.
Resumo:
With the emergence of multi-cores into the mainstream, there is a growing need for systems to allow programmers and automated systems to reason about data dependencies and inherent parallelismin imperative object-oriented languages. In this paper we exploit the structure of object-oriented programs to abstract computational side-effects. We capture and validate these effects using a static type system. We use these as the basis of sufficient conditions for several different data and task parallelism patterns. We compliment our static type system with a lightweight runtime system to allow for parallelization in the presence of complex data flows. We have a functioning compiler and worked examples to demonstrate the practicality of our solution.
Resumo:
The critical impact of innovation on national and the global economies has been discussed at length in the literature. Economic development requires the diffusion of innovations into markets. It has long been recognised that economic growth and development depends upon a constant stream of innovations. Governments have been keenly aware of the need to ensure this flow does not dry to a trickle and have introduced many and varied industry policies and interventions to assist in seeding, supporting and diffusing innovations. In Australia, as in many countries, Government support for the transfer of knowledge especially from publicly funded research has resulted in the creation of knowledge exchange intermediaries. These intermediaries are themselves service organisations, seeking innovative service offerings for their markets. The choice for most intermediaries is generally a dichotomous one, between market-pull and technology-push knowledge exchange programmes. In this article, we undertake a case analysis of one such innovative intermediary and its flagship programme. We then compare this case with other successful intermediaries in Europe. We put forward a research proposition that the design of intermediary programmes must match the service type they offer. That is, market-pull programmes require market-pull design, in close collaboration with industry, whereas technology programmes can be problem-solving innovations where demand is latent. The discussion reflects the need for an evolution in knowledge transfer policies and programmes beyond the first generation ushered in with the US Bayh-Dole Act (1980) and Stevenson-Wydler Act (1984). The data analysed is a case study comparison of market-pull and technology-push programmes, focusing on primary and secondary socio-economic benefits (using both Australian and international comparisons).
Resumo:
Over the past decade there have been a large number of significant innovations in manufacturing which have resulted in more flexible and cost efficient methods and higher quality products, as manufacturers have set about upgrading their processes, systems and performance. This study compares the use of technologies and improvement programs between OECD and Non-OECD countries, and also between small and large firms, and examines differences in the use and outcomes across the economies and different sized firms. The empirical analysis provides an opportunity to test whether the ‘capabilities’ or strengths of a firm can be linked to these activities and examines if developing economies are using technology or management programs such as quality management and business process re-engineering to catch up to manufacturers in developed economies. The analysis utilises data from the second International Manufacturing Strategy Survey (IMSS), which encompasses 703 firms in 23 countries.
Resumo:
The current study examined the influence of psychosocial constructs, from a theory of planned behavior (TPB) perspective, to predict university students’ (N = 159) use of a newly offered on-line learning tool, enhanced podcasts. Pre-semester, students completed questionnaires assessing the TPB predictors (attitude, subjective norm, perceived behavioral control) related to intended enhanced podcast use until the middle of semester. Mid-semester, students completed similar items relating to podcast use until the end of semester. Self-report measures of podcast use were obtained at the middle and end of semester. At both time points, students’ attitudes predicted their intentions and, at the initial time point, subjective norm also predicted intended podcast use. An examination of the beliefs underlying attitudes, the only construct to predict intentions at both time points, revealed differences between those students higher, rather than lower on intentions to use the podcasts, especially for the perceived educational benefits of podcast use later in the semester. Intentions to use enhanced podcasting only predicted self-reported use in the second half of the semester. Overall, this study identified some of the determinants which should be considered by those aiming to encourage student use of novel on-line educational tools.
Resumo:
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.
Resumo:
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy the given predicate. Our model also encompasses attribute-based key exchange since it is a special case of predicate-based key exchange.---------- We demonstrate how to realize a secure predicate-based key exchange protocol by combining any secure predicate-based signature scheme with the basic Diffie-Hellman key exchange protocol, providing an efficient and simple solution.