896 resultados para usage of personal information


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Product Data Management (PDM) systems have been utilized within companies since the 1980s. Mainly the PDM systems have been used by large companies. This thesis presents the premise that small and medium-sized companies can also benefit from utilizing the Product Data Management systems. Furthermore, the starting point for the thesis is that the existing PDM systems are either too expensive or do not properly respond to the requirements SMEs have. The aim of this study is to investigate what kinds of requirements and special features SMEs, operating in Finnish manufacturing industry, have towards Product Data Management. Additionally, the target is to create a conceptual model that could fulfill the specified requirements. The research has been carried out as a qualitative case study, in which the research data was collected from ten Finnish companies operating in manufacturing industry. The research data is formed by interviewing key personnel from the case companies. After this, the data formed from the interviews has been processed to comprise a generic set of information system requirements and the information system concept supporting it. The commercialization of the concept is studied in the thesis from the perspective of system development. The aim was to create a conceptual model, which would be economically feasible for both, a company utilizing the system and for a company developing it. For this reason, the thesis has sought ways to scale the system development effort for multiple simultaneous cases. The main methods found were to utilize platform-based thinking and a way to generalize the system requirements, or in other words abstracting the requirements of an information system. The results of the research highlight the special features Finnish manufacturing SMEs have towards PDM. The most significant of the special features is the usage of project model to manage the order-to-delivery –process. This differs significantly from the traditional concepts of Product Data Management presented in the literature. Furthermore, as a research result, this thesis presents a conceptual model of a PDM system, which would be viable for the case companies interviewed during the research. As a by-product, this research presents a synthesized model, found from the literature, to abstract information system requirements. In addition to this, the strategic importance and categorization of information systems within companies has been discussed from the perspective of information system customizations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Enterprise resource planning (ERP) software is used to combine all the functions happening inside the organization with the help of one software. All the data is centralized which makes it easy to manage information for all participants. The literature on ERP is studied thoroughly the whole process of adoption till the implementation and final evaluations. But studies that focus on small and medium sized enterprises are limited in number when compared to the large scale enterprises. In case of Pakistan, research is very limited. In this thesis, the author tries to analyze the current status of SMEs usage of ERP system. The benefits obtained and challenges faced by SMEs of Pakistan are studied. Framework presented by Shang and Seddon (2000) is used to understand the benefits obtained by the SMEs in Pakistan. This is a comprehensive framework that classifies the benefits obtained by the ERP adoption, into five categories: operational benefits, managerial benefits, Strategic benefits, IT benefits, and Organizational benefits. The results show that SMEs of Pakistan are also getting many benefits after adoption of ERP. Most of the firms had implemented SAP software. Operational benefits were mentioned by all the firms. The most important benefits were report generation, quick access to critical information, better product and cost planning. Respondents also mentioned that they had reduced corruption as a result of ERP implementation. It is also an important benefit considering high corruption rate in Pakistan. Along with benefits, challenges faced by Pakistani SMEs included infrastructure problems like electricity, difficulties with integration of one module with other module, costs of adoption and lack of skilled ERP consultants. Further studies in this regard can be conducted on cloud based ERP which is fast growing all around the world.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of the study is to define the characteristics of strong personal brands on social media in Finland. Personal branding as a phenomenon is no longer limited to celebrities and political leaders. The digital revolution and the change in online behavior have created the need for a deeper investigation of the characteristics of strong personal brands on social media. The work of different academics on personal branding are examined to gain a comprehensive understanding on this research topic that has gone through a revolution during the last decade. Early impression management theory is refined to include elements from more modern literature related to personal branding, brand identity management and social media to create a theoretical framework that simplifies the process of personal brand building on social media. The framework consisting of three phases clarifies the process of modern personal branding. The results of the study are presented in line with three research themes derived from the theoretical framework: the background of the brand, the brand identity management and the social media behavior and activities. Mixed methods are used in the research as means to broaden perception on the subject. The quantitative part of the study defines general characteristics concerning the most follower personal brands in Finland in three social media channels – Facebook, Instagram and Twitter. The other part of the research was conducted by single case study including two Finnish personal brands cases to provide a deeper understanding of personal branding practices of strong social media personal brands. The results of the study show that the most used social media channels differ in terms of the personal brand characteristics and personal branding activities. Due to the characteristics of the channels also the post activities of the personal brands differ quite significantly. It can be also inferred that there is a difference between brands with an existing offline awareness and the brands with no awareness before joining the social media. In order to reduce the gap between the ideal brand image and the current image, the brand should have a clear vision as well as a good understanding of the target group and the value it creates for its target audience. The brand identity needs to be managed by communicating with the target audience authentically in the right channels, with relevant content. The dedication, the target group’s behavior and the ability to create valuable and relevant content determines the right tactics for social media personal branding.  

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Experiential Learning Instruments (ELls) are employed to modify the leamer's apprehension and / or comprehension in experiential learning situations, thereby improving the efficiency and effectiveness of those modalities in the learning process. They involve the learner in reciprocally interactive and determining transactions with his/her environment. Experiential Learning Instruments are used to keep experiential learning a process rather than an object. Their use is aimed at the continual refinement of the learner's knowledge and skill. Learning happens as the leamer's awareness, directed by the use of Ells, comes to experience, monitor and then use experiential feedback from living situations in a way that facilitates knmvledge/skill acquisition, self-correction and refinement. The thesis examined the literature relevant to the establishing of a theoretical experiential learning framework within which ELls can be understood. This framework included the concept that some learnings have intrinsic value-knowledge of necessary information-while others have instrumental value-knowledge of how to learn. The Kolb Learning Cycle and Kolb's six characteristics of experiential learning were used in analyzing three ELls from different fields of learning-saxophone tone production, body building and interpersonal communications. The ELls were examined to determine their learning objectives and how they work using experiential learning situations. It was noted that ELls do not transmit information but assist the learner in attending to and comprehending aspects of personal experience. Their function is to telescope the experiential learning process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The nucleotide sequence of a genomic DNA fragment thought previously to contain the dihydrofolate reductase gene (DFR1) of Saccharomyces cerevisiae by genetic criteria was determined. This DNA fragment of 1784' basepairs contains a large open reading frame from position 800 to 1432, which encodes a enzyme with a predicted molecular weight of 24,229.8 Daltons. Analysis of the amino acid sequence of this protein revealed that the yeast polypep·tide contained 211 amino acids, compared to the 186 residues commonly found in the polypeptides of other eukaryotes. The difference in size of the gene product can be attributed mainly to an insert in the yeast gene. Within this region, several consensus sequences required for processing of yeast nuclear and class II mitochondrial introns were identified, but appear not sufficient for the RNA splicing. The primary structure of the yeast DHFR protein has considerable sequence homology with analogous polypeptides from other organisms, especially in the consensus residues involved in cofactor and/or inhibitor binding. Analysis of the nucleotide sequence also revealed the presence of a number of canonical sequences identified in yeast as having some function in the regulation of gene expression. These include UAS elements (TGACTC) required for tIle amino acid general control response, and "TATA H boxes as well as several consensus sequences thought to be required for transcriptional termination and polyadenylation. Analysis of the codon usage of the yeast DFRl coding region revealed a codon bias index of 0.0083. this valve very close to zero suggestes 3 that the gene is expressed at a relatively low level under normal physiological conditions. The information concerning the organization of the DFRl were used to construct a variety of fusions of its 5' regulatory region with the coding region of the lacZ gene of E. coli. Some of such fused genes encoded a fusion product that expressed in E.coli and/or in yeast under the control of the 5' regulatory elements of the DFR1. Further studies with these fusion constructions revealed that the beta-galactosidase activity encoded on multicopy plasmids was stimulated transiently by prior exposure of yeast host cells to UV light. This suggests that the yeast PFRl gene is indu.ced by UV light and nlay in1ply a novel function of DHFR protein in the cellular responses to DNA damage. Another novel f~ature of yeast DHFR was revealed during preliminary studies of a diploid strain containing a heterozygous DFRl null allele. The strain was constructed by insertion of a URA3 gene within the coding region of DFR1. Sporulation of this diploid revealed that meiotic products segregated 2:0 for uracil prototrophy when spore clones were germinated on medium supplemented with 5-formyltetrahydrofolate (folinic acid). This finding suggests that, in addition to its catalytic activity, the DFRl gene product nlay play some role in the anabolisln of folinic acid. Alternatively, this result may indicate that Ura+ haploid segregants were inviable and suggest that the enzyme has an essential cellular function in this species.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The following phenomenologically oriented study examines and describes the relevance and effectiveness of professional development and continuing education programs for real-world situations of personal trainers. The participants were personal trainers, facility managers, and persons involved in the accreditation process. Data collection took place in 3 phases. The first phase consisted of the participants completing the PUMP Questionnaire, followed by focus groups with personal trainers and interviews with managers. The study's 3 data sets required reduction via a content analysis by question, content analysis by existential categories, and further thematic analysis using the lived relation existential dimension. The discussion contains the salient sites and issues of disconnect between clients, personal trainers, and facility managers and how they might affect the personal training experience. The intergenerational disconnect emphasized between Boomers as clients and Millennials as personal trainers requires further exploration and dialogue and underscores the need for different approaches to content and delivery of professional development and continuing education experiences for personal trainers and managers of fitness facilities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Underlying intergroup perceptions include processes of social projection (perceiving personal traitslbeliefs in others, see Krueger 1998) and meta-stereotyping (thinking about other groups' perceptions of one's own group, see Vorauer et aI., 1998). Two studies were conducted to investigate social projection and meta-stereotypes in the domain of White-Black racial relations. Study 1, a correlational study, examined the social projection of prejudice and 'prejudiced' meta-stereotypes among Whites. Results revealed that (a) Whites socially projected their intergroup attitudes onto other Whites (and Blacks) [i.e., Whites higher in prejudice against Blacks believed a large percentage of Whites (Blacks) are prejudiced against Blacks (Whites), whereas Whites low in prejudice believed a smaller percentage of Whites (Blacks) are prejudiced]; (b) Whites held the meta:..stereotype that their group (Whites) is viewed by Blacks to be prejudiced; and (c) prejudiced meta-stereotypes may be formed through the social projection of intergroup attitudes (result of path-model tests). Further, several correlates of social projection and meta-stereotypes were identified, including the finding that feeling negatively stereotyped by an outgroup predicted outgroup avoidance through heightened intergroup anxiety. Study 2 replicated and extended these findings, investigating the social projection of ingroup favouritism and meta- and other-stereotypes about ingroup favouritism. These processes were examined experimentally using an anticipated intergroup contact paradigm. The goal was to understand the experimental conditions under which people would display the strongest social projection of intergroup attitudes, and when experimentally induced meta-stereotypes (vs. other-stereotypes; beliefs about the group 11 preferences of one's outgroup) would be most damaging to intergroup contact. White participants were randomly assigned to one of six conditions and received (alleged) feedback from a previously completed computer-based test. Depending on condition, this information suggested that: (a) the participant favoured Whites over Blacks; (b) previous White participants favoured Whites over Blacks; (c) the participant's Black partner favoured Blacks over Whites; (d) previous Black participants favoured Blacks over Whites; (e) the participant's Black partner viewed the participant to favour Whites over Blacks; or (£) Black participants previously participating viewed Whites to favour Whites over Blacks. In a defensive reaction, Whites exhibited enhanced social projection of personal intergroup attitudes onto their ingroup under experimental manipulations characterized by self-concept threat (i.e., when the computer revealed that the participant favoured the ingroup or was viewed to favour the ingroup). Manipulated meta- and otherstereotype information that introduced intergroup contact threat, on the other hand, each exerted a strong negative impact on intergroup contact expectations (e.g., anxiety). Personal meta-stereotype manipulations (i.e., when the participant was informed that her/ his partner thinks s/he favours the ingroup) exerted an especially negative impact on intergroup behaviour, evidenced by increased avoidance of the upcoming interracial interaction. In contrast, personal self-stereotype manipulations (i.e., computer revealed that one favoured the ingroup) ironically improved upcoming intergroup contact expectations and intentions, likely due to an attempt to reduce the discomfort of holding negative intergroup attitudes. Implications and directions for future research are considered.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

One way of exploring the power of sound in the experience and constitution of space is through the phenomenon of personal listening devices (PLDs) in public environments. In this thesis, I draw from in-depth interviews with eleven Brock University students in S1. Catharines, Ontario, to show how PLDs (such as MP3 players like the iPod) are used to create personalized soundscapes and mediate their public transit journeys. I discuss how my interview participants experience the space-time of public transit, and show how PLDs are used to mediate these experiences in acoustic and non-acoustic ways. PLD use demonstrates that acoustic and environmental experiences are co-constitutive, which highlights a kinaesthetic quality of the transit-space. My empirical findings show that PLDs transform space, particularly by overlapping public and private appropriations of the bus. I use these empirical findings to discuss the PLD phenomenon in the theoretical context of spatiality, and more specifically, acoustic space. J develop the ontological notion of acoustic space, stating that space shares many of the properties of sound, and argue that sound is a rich epistemological tool for understanding and explaining our everyday experiences.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Scant research has explored how professors in Canadian universities use Twitter as a teaching tool or to augment knowledge about their subject disciplines. This case study employed a mixed-method approach to examine how professors in an Ontario university use Twitter. Using a variation of the technology acceptance model, the survey (n = 17) found that professor participants—41.2% of whom use Twitter—perceive Twitter as somewhat useful as a teaching tool, not useful for finding and sharing information, and not useful for personal use. Participants’ gender and number of years teaching are not indicators of Twitter use. Furthermore, the level of support from peers and the university may be reasons why some do not use Twitter or have stopped using Twitter. Face-to-face interviews (n = 3) revealed that Twitter is not used in classrooms or lecture halls, but predominantly as a means of sharing information with students and colleagues. Another deterrent to using Twitter is not knowing who to follow. Findings indicate that some professors at this university embrace Twitter, but not necessarily as an in-class teaching tool. The challenge and the advantage of using Twitter is to discover and follow people who tweet material and to select relevant material to pass along to students and colleagues. Professor participants in the study found a use for the social network as a means to increase student engagement, create virtual information-exchange communities, and enrich their own learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The increasing use of genetic information has emerged as an important concern worldwide as scientific and technological advances continue to advance at lightening speed and as governments struggle to develop appropriate policy frameworks. While most countries clearly recognize that genetic information warrants some form of privacy protection, the underlying rationale for providing that protection and the approach which is ultimately adopted vary significantly across the board. As a result, a medley of laws, policy statements and guidelines currently exist to protect genetic information, each with its inherent assumptions, concepts and terminology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tout employeur qui fournit l'accès Internet au sein de son entreprise a intérêt à surveiller l'usage qui en est fait par ses employés, que ce soit pour maximiser les avantages ou pour réduire les risques liés à l'utilisation d'Internet au travail. Tout employeur a d'ailleurs le droit d'exercer une telle surveillance, sous réserve toutefois des droits des personnes surveillées. La mise en place d'une surveillance de l'utilisation d'Internet au travail peut porter atteinte à la vie privée des employés ou à leur droit à des conditions de travail justes et raisonnables, et peut également porter atteinte au droit à la vie privée des tiers indirectement visés par la surveillance. Dans ce contexte, afin de s'assurer que la surveillance est exercée dans les limites de ses droits, l'employeur doit franchir deux étapes de réflexion essentielles. L'employeur doit en premier lieu déterminer le niveau d'expectative raisonnable de vie privée des personnes surveillées, lequel niveau s'apprécie à la lumière d'une série de facteurs. L'employeur doit par ailleurs respecter les critères de rationalité et de proportionnalité. Ces critères requièrent notamment que l'employeur identifie les motifs sous-jacents à la surveillance ainsi que la manière dont la surveillance sera exercée. Une fois ces deux étapes franchies, l'employeur sera en mesure d'identifier les obligations auxquelles il est soumis dans le cadre de la mise en place de la surveillance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cette thèse porte sur l’appropriation d’Internet par les visiteurs des centres d’accès public à cette technologie installés par le gouvernement et les ONG au Chili au début des années 2000. L’implantation de ces centres s’insère dans une politique officielle d’accès à une technologie qui est considérée comme un outil de développement. Les autorités s’appuient sur un discours plus large qui fait référence à la Société de l’information et au besoin de la population de participer adéquatement à celle-ci; l’accès et la maîtrise des technologies de l’information et communication, et en particulier l’Internet, permettrait aux personnes de bénéficier des avantages de cette nouvelle société. Conscients que ce n’est pas toute la population qui peut s’abonner à un service d’Internet à domicile, les télécentres aideraient les personnes à faible revenu à le faire. Au niveau théorique, nous avons mobilisé certaines notions liées aux études sur les usages des technologies. Plus spécifiquement, nous nous sommes servis du modèle de l’appropriation qui se penche sur la construction des significations que font les personnes de l’usage d’une technologie. Ce modèle montre la complexité du processus et les facteurs d’ordre personnel et social qui entrent en jeu. Selon ce modèle, le contexte social est clé pour comprendre la construction de la signification sur l’usage. Nous faisons aussi référence à d’autres études qui se penchent sur les différents moments de l’appropriation : la domestication, les propos de Michel de Certeau et la sociopolitique des usages. Finalement, nous proposons de considérer certains facteurs qui peuvent avoir une influence dans le processus d’appropriation, tels que les représentations des usagers, le contexte socio-économique, le réseau d’appui et le genre. D’un point de vue méthodologique, étant donné que nous voulions explorer un phénomène sans pour autant faire de généralisations, nous avons utilisé une démarche qualitative et comme stratégie de recherche, l’ethnographie. Nous avons visité 5 télécentres dans 4 villes ou villages de différentes régions du Chili. Nous avons fait des observations et des entrevues semi-ouvertes avec des usagers, des responsables des télécentres et les responsables des réseaux de télécentres. La thèse montre la complexité du processus d’appropriation et la spécificité de l’appropriation d’Internet dans les centres d’accès public. Nous avons constaté comment les relations interpersonnelles – le réseau d’appui- jouent un des rôles les plus importants dans le processus de rapprochement au centre et à la technologie, ainsi que dans le processus d’apprentissage et d’usage même. Nous avons constaté également que la construction de la signification de l’usage est étroitement liée au contexte et aux expériences de vie des personnes. Un même usage n’a pas la même signification pour tous nos interviewés : pour certains, le clavardage peut être seulement une activité de loisir et pour quelqu’un d’autre, un outil de développement personnel et émotionnel. Les projections sur les usages futurs ne sont pas les mêmes non plus chez les adultes et chez les plus jeunes, ces derniers étant davantage conscients de l’Internet comme un outil de travail. L’interprétation de l’usage diffère aussi entre les hommes et les femmes (plus que les usages mêmes): certaines femmes voient dans l’usage d’Internet et dans la participation au télécentre une activité qui les fait sortir de leur rôle typique de femme au foyer. Finalement, nous avons observé que la signification de l’usage n’est pas seulement construite à partir de l’expérience personnelle immédiate; les usages des autres sont toujours évalués par les visiteurs des télécentres.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Le but du présent projet de thèse est d’étudier le lien entre les habitudes à l’endroit des technologies de l’information et de la communication (TIC) et la motivation à apprendre. Bien que l’utilisation de l’ordinateur en contexte scolaire ait été étudiée en profondeur au cours des dernières années, la majorité des études présentent la même perspective : elles examinent l’effet de l’utilisation des technologies à l’école sur le rendement et la motivation scolaire des élèves. Cependant, on connaît mal l’effet de l’utilisation des technologies à des fins personnelles sur le vécu scolaire. Il apparait que les élèves n’ont pas tous les mêmes opportunités en ce qui a trait à l’utilisation des TIC et n’acquièrent donc pas tous les mêmes compétences dans ce domaine. Quelques recherches se sont intéressées aux effets de l’ordinateur (sa présence et son utilisation à la maison) sur le rendement à l’école. Bien qu’en majorité, les auteurs s’entendent sur les bénéfices que pourrait générer l’ordinateur, ils restent prudents sur les rapports de cause à effet (Beltran, Das et Fairlie, 2008; OCDE, 2006). Nous avons voulu aborder la question différemment : déterminer les possibles liens entre les habitudes d’utilisation de l’ordinateur à des fins personnelles et la motivation à apprendre à l’école. À cet égard, la motivation pour les sciences a été retenue puisque cette matière scolaire fait souvent appel à des compétences associées à l’utilisation des TIC. Pour répondre à nos objectifs, 331 élèves du cours ordinaire de sciences et technologie au premier cycle du secondaire ont remplis un questionnaire autorapporté, composé de sept échelles motivationnelles et d’un questionnaire lié à l’utilisation des TIC. Nous avons d’abord dégagé des profils d’utilisateurs à partir des différentes utilisations de l’ordinateur. Ensuite, nous avons examiné ces profils en lien avec leurs caractéristiques motivationnelles (le sentiment de compétence, l’anxiété, l’intérêt et les buts d’accomplissement) et l’engagement pour le cours de sciences. Finalement, nous avons déterminé la valeur prédictive de l’utilisation de l’ordinateur sur les variables motivationnelles retenues. Nos résultats montrent que l’utilisation personnelle des TIC ne se fait pas nécessairement au détriment de l’école. Nous avons trouvé que les élèves qui utilisent davantage les TIC dans leurs temps libres, et ce, avec des utilisations diversifiées, ont des caractéristiques motivationnelles plus positives. Toutefois, nous constatons que le type d’usage est lié à un effet médiateur positif ou négatif sur la motivation à apprendre. Les élèves qui limitent leurs utilisations de l’ordinateur à la communication et aux jeux ont des caractéristiques motivationnelles plus négatives que ceux avec des utilisations variées. Les usages centrés sur la communication semblent être ceux qui sont le plus susceptibles d’être liés négativement à la motivation à apprendre alors que ceux orientés vers les usages à caractère intellectuel s’avèrent plus positifs. Les résultats suggèrent que la clé ne réside pas dans le temps d'utilisation mais plutôt dans l'utilisation judicieuse de ce temps. En favorisant des usages à caractère intellectuel, tout en laissant des temps libres aux jeunes, nous augmentons leurs chances de développer de bonnes habitudes technologiques qui seront essentielles dans la société de demain.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Au Québec, la compétence professionnelle à intégrer les technologies de l’information et de la communication (TIC) est une compétence professionnelle à acquérir par les étudiants en enseignement. Cependant, son acquisition est problématique à plusieurs niveaux. Afin d’évaluer et mieux comprendre la compétence, cette thèse présente trois objectifs : 1) décrire le degré de maitrise des TIC et leurs usages dans les salles de classe 2) identifier les facteurs qui influencent l’intégration des TIC en fonction de la compétence professionnelle, et finalement 3) décrire le niveau d’atteinte des composantes de la compétence. Pour atteindre les objectifs de l’étude, une méthodologie mixte fut employée. Ce sont 2065 futurs enseignants du Québec provenant de neuf universités québécoises qui ont complété le questionnaire en plus de 34 participants à des groupes de discussion (n = 5). Cette thèse rédigée sous forme d’articles, répondra à chacun des objectifs visés. Dans le but de mieux comprendre l’utilisation actuelle des TIC par les futurs maitres, le premier article fournira un aperçu de la maitrise d’outils technologiques susceptibles d’être utilisés lors des stages. Le deuxième article visera à identifier les variables externes ainsi que les différentes composantes de la compétence qui ont une influence sur l’intégration des TIC lors des stages. Dans le troisième article, afin de comprendre où se situent les forces et les faiblesses des futurs maitres quant à la compétence professionnelle à intégrer les TIC, une description du niveau d’atteinte de chacune des composantes sera réalisée afin d’en dégager une appréciation globale. Les principaux résultats montrent que pour la moitié des répondants, seuls cinq outils sur 12 sont intégrés en stage et ce sont principalement les outils peu complexes qui sont bien maitrisés. Le logiciel de présentation Power Point, est le plus fréquemment utilisé. Les données considérées dans le premier article suggèrent aussi l’importance d’augmenter, de façon générale, la maitrise technique des futurs enseignants. Les résultats du second article ont permis de constater que la « prévision d’activités faisant appel aux TIC » est une variable prédictive majeure pour l’intégration des TIC. L’analyse des résultats suggèrent le besoin d’enseigner aux futurs maitres comment développer le réflexe d’inclure les TIC dans leurs plans de leçons. De plus, l’appropriation de la sixième composante de la compétence joue un rôle important sur la probabilité d’intégrer les TIC. Les résultats du troisième article indiquent que les composantes 2, 4, 5 et 6 de la compétence sont partiellement maitrisées. La mieux maitrisée est la première composante. Finalement, la troisième composante de la compétence s’est avérée être encore non atteinte et reste à être développer par les futurs enseignants. Cette thèse nous apprend que des efforts considérables restent encore à accomplir quant à la maitrise de la compétence professionnelle à intégrer les TIC. Ces efforts doivent être accomplis à la fois par les futurs enseignants ainsi que par les universités au niveau de la structure des cours de TIC en formation initiale des maitres.