ara

El brexit para los traductores jurados: ¿Qué consecuencias tiene?

La posible y cada vez más anunciada salida de Reino Unido de la Unión Europea, el llamado brexit, tiene consecuencias en todos los ámbitos. Para algunos es una catástrofe. Para otros, la liberación. Independientemente...

The post El brexit para los traductores jurados: ¿Qué consecuencias tiene? appeared first on El Blog del Traductor Jurado.




ara

Real Decreto 2020 para regular Traductor Jurado e Intérprete Jurado

Tras varios meses de actividad bajo mínimos a causa de la pandemia del COVID19, en los que quedó claro que no es fácil ser traductor jurado en tiempos de coronavirus, la Oficina de Interpretación...

The post Real Decreto 2020 para regular Traductor Jurado e Intérprete Jurado appeared first on El Blog del Traductor Jurado.




ara

Normas para la escritura científica


La ciencia en español no se escribe como en inglés

El lenguaje científico se distingue porque trata un campo concreto del saber y porque se suele dirigir a especialistas o profesionales de ese campo del saber, por lo que usa una terminología específica. Además de que los vocablos utilizados resulten extraños a un hablante lego en la materia, el significado de esos vocablos es preciso y objetivo, y puede ser distinto al que se conoce en el lenguaje común.

Hace ya años que el inglés se ha erigido como idioma de comunicación en las ciencias experimentales. Como consecuencia, cualquier investigador científico que quiera estar al día y divulgar sus conocimientos se verá obligado a leer, escribir y publicar básicamente en ese idioma, con lo que el hábito de comunicarse en inglés acaba corrompiendo su idioma materno con expresiones y usos anglicistas innecesarios, que se transmiten luego al resto de la población igualmente entendida con la que se interrelaciona—profesores, periodistas, científicos—, con lo cual entran fácilmente en circulación. El descuido con el que se trata el tema de la escritura científica en español es, por tanto, enorme a pesar de que también existen organismos y colecciones de reglas que orientan en el correcto empleo del español a la hora de traducir o crear un documento científico.

En las páginas de este pequeño manual interactivo se pretende ofrecer, tanto a profesores como a estudiantes, un marco conceptual y descriptivo en torno al lenguaje científico, de acuerdo con los parámetros de la ciencia. Nada nos gustaría más que servir de referencia para el estudio, producción y corrección de cualquier tipo de texto científico. Autor: Gonzalo Claros.

[Al pie se encuentran enlaces con más recursos, aunque no todos funcionan, y el archivo en PDF para imprimir].





ara

Para qué escribir un libro

Uno de mis alumnos está escribiendo ahora las memorias de su infancia. Es un libro hermoso, sincero, único, en el que rescata los recuerdos luminosos […]

Origen





ara

Fusion of Complementary Online and Offline Strategies for Recognition of Handwritten Kannada Characters

This work describes an online handwritten character recognition system working in combination with an offline recognition system. The online input data is also converted into an offline image, and in parallel recognized by both online and offline strategies. Features are proposed for offline recognition and a disambiguation step is employed in the offline system for the samples for which the confidence level of the classier is low. The outputs are then combined probabilistically resulting in a classier out-performing both individual systems. Experiments are performed for Kannada, a South Indian Language, over a database of 295 classes. The accuracy of the online recognizer improves by 11% when the combination with offline system is used.




ara

Choice of Classifiers in Hierarchical Recognition of Online Handwritten Kannada and Tamil Aksharas

In this paper, we propose a novel dexterous technique for fast and accurate recognition of online handwritten Kannada and Tamil characters. Based on the primary classifier output and prior knowledge, the best classifier is chosen from set of three classifiers for second stage classification. Prior knowledge is obtained through analysis of the confusion matrix of primary classifier which helped in identifying the multiple sets of confused characters. Further, studies were carried out to check the performance of secondary classifiers in disambiguating among the confusion sets. Using this technique we have achieved an average accuracy of 92.6% for Kannada characters on the MILE lab dataset and 90.2% for Tamil characters on the HP Labs dataset.




ara

Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection

E-mail spam is no more garbage but risk since it recently includes virus attachments and spyware agents which make the recipients' system ruined, therefore, there is an emerging need for spam detection. Many spam detection techniques based on machine learning techniques have been proposed. As the amount of spam has been increased tremendously using bulk mailing tools, spam detection techniques should counteract with it. To cope with this, parameters optimization and feature selection have been used to reduce processing overheads while guaranteeing high detection rates. However, previous approaches have not taken into account feature variable importance and optimal number of features. Moreover, to the best of our knowledge, there is no approach which uses both parameters optimization and feature selection together for spam detection. In this paper, we propose a spam detection model enabling both parameters optimization and optimal feature selection; we optimize two parameters of detection models using Random Forests (RF) so as to maximize the detection rates. We provide the variable importance of each feature so that it is easy to eliminate the irrelevant features. Furthermore, we decide an optimal number of selected features using two methods; (i) only one parameters optimization during overall feature selection and (ii) parameters optimization in every feature elimination phase. Finally, we evaluate our spam detection model with cost-sensitive measures to avoid misclassification of legitimate messages, since the cost of classifying a legitimate message as a spam far outweighs the cost of classifying a spam as a legitimate message. We perform experiments on Spambase dataset and show the feasibility of our approaches.





ara

Niagara Health offering free parking after delays reported - News Talk 610 CKTB

  1. Niagara Health offering free parking after delays reported  News Talk 610 CKTB
  2. Implementation of new Niagara Health patient info system resulting in long wait times  St. Catharines Standard
  3. Temporary delays impacting registration at emergency departments  Thorold News
  4. Niagara Health Working Through Delays  101.1 More FM
  5. Niagara Health experiencing temporary delays impacting registration and EDs  Niagara Health




ara

Attention-based gating units separate channels in neural radiance fields

We introduce a unique inductive bias to improve the reconstruction quality of Neural Radiance Fields (NeRF), NeRF employs the Fourier transform to map 3D coordinates to a high-dimensional space, enhancing the representation of high-frequency information in scenes. However, this transformation often introduces significant noise, affecting NeRF's robustness. Our approach allocates attention effectively by segregating channels within NeRF using attention-based gating units. We conducted experiments on an open-source data set to demonstrate the effectiveness of our method, which leads to significant improvements in the quality of synthesised new-view images compared to state-of-the-art methods. Notably, we achieve an average PSNR increase of 0.17 compared to the original NeRF. Furthermore, our method is implemented through a carefully designed special Multi-Layer Perceptron (MLP) architecture, ensuring compatibility with most existing NeRF-based methods.




ara

Constructed Response or Multiple-Choice Questions for Assessing Declarative Programming Knowledge? That is the Question!

Aim/Purpose: This paper presents a data mining approach for analyzing responses to advanced declarative programming questions. The goal of this research is to find a model that can explain the results obtained by students when they perform exams with Constructed Response questions and with equivalent Multiple-Choice Questions. Background: The assessment of acquired knowledge is a fundamental role in the teaching-learning process. It helps to identify the factors that can contribute to the teacher in the developing of pedagogical methods and evaluation tools and it also contributes to the self-regulation process of learning. However, better format of questions to assess declarative programming knowledge is still a subject of ongoing debate. While some research advocates the use of constructed responses, others emphasize the potential of multiple-choice questions. Methodology: A sensitivity analysis was applied to extract useful knowledge from the relevance of the characteristics (i.e., the input variables) used for the data mining process to compute the score. Contribution: Such knowledge helps the teachers to decide which format they must consider with respect to the objectives and expected students results. Findings: The results shown a set of factors that influence the discrepancy between answers in both formats. Recommendations for Practitioners: Teachers can make an informed decision about whether to choose multiple-choice questions or constructed-response taking into account the results of this study. Recommendation for Researchers: In this study a block of exams with CR questions is verified to complement the area of learning, returning greater performance in the evaluation of students and improving the teaching-learning process. Impact on Society: The results of this research confirm the findings of several other researchers that the use of ICT and the application of MCQ is an added value in the evaluation process. In most cases the student is more likely to succeed with MCQ, however if the teacher prefers to evaluate with CR other research approaches are needed. Future Research: Future research must include other question formats.




ara

Key Factors for a Creative Environment in Saudi Arabian Higher Education Institutions

Aim/Purpose: This research explores the influence of organizational-level and individual-level creativity and innovation and the technology acceptance model toward the higher education creative environment that consists of research creativity and teaching creativity. Background: Creativity and innovation are essential pillars for higher education institutions (HEIs). The two terms are interconnected, where creativity is referring to finding better ideas to do the work, while innovation is referring to how to do and implement these creative ideas. Choosing the optimal creative process and the organizational support needed to develop it is an important goal in achieving a creative and inventive environment. For the success of the creative environment to ensure the improvement of higher education institutions, information technology as social networking sites plays a crucial part in the creative process within universities. However, assessing the creativity and innovation of Saudi higher education institutions has not been well recognized. Universities today serve as knowledge-based institutions because they are at the forefront of cutting-edge R&D and scientific innovations. Creating such a productive research environment in universities, however, necessitates a work culture that encourages employees to be more creative while also encouraging the creation of new ideas and innovations. Methodology: A survey instrument was utilized as a quantitative method for this research to gather data from the study sample on the influencing variables employed in the research framework. Respondent data were analyzed using a disjoint two-stage method using PLS-SEM path modelling. Contribution: The results of this research contribute to the theoretical and scientific literature by offering a model of creativity and innovation in higher education institutions. The model proposes an optimal blend of organizational, individual, and technology variables that contribute to the development of the Higher Education Creative Environment in HEIs via creativity in teaching and research and a culture of innovation. In another way, the proposed framework especially helps to comprehend the challenges regulating establishing teaching and research creativity in HEIs via the adoption of organizational, individual, and technology enablers identified as part of this study. Findings: According to the results, organizational factors such as organizational encouragement, freedom, and challenging work have a positive relationship with the higher education creative environment. However, realistic work pressure, a lack of organizational impediments, managerial encouragement, and work group support is insufficient to affect the creative environment in higher education in Saudi Arabia. Individual variables (creative thinking skills and expertise, for example) also have a positive impact on the higher education creative environment. In the higher education creative environment, however, the influence of intrinsic motivation is insignificant. Finally, technology factors such as social networking site adoption intention, perceived usefulness, and perceived ease of use have the potential to influence the higher education creative environment. Recommendations for Practitioners: On the practical front, the obvious recommendation of this research is that it enables top leadership in Saudi HEIs to rethink the norms of creativity and innovation in their institutions, thereby instilling a mindset guided by a flourishing culture of creativity in the HEI environment with a specific focus on creativity practices in research and teaching domains. Furthermore, to promote the environment’s creativity within Saudi Arabian HEIs, university leaders must consider the suggested Organizational, Individual, and Technology factors as key enablers of creativity and innovation, which will guide them in revisiting their strategic actions in terms of further augmenting the creative performance of their academic’s staff, thereby sustaining a culture of Higher Education Creative Environment (HECE). Recommendation for Researchers: This study addressed many organizational, individual, and technology variables that facilitate Saudi Arabian HECE accomplishment in the form of research and teaching creativity. Furthermore, fresh insights for Saudi public HEIs are revealed when the success aspects of the creative environment are considered. If academic leadership at Saudi HEIs is to encourage the creative environment in general and creativity in teaching and research, it would be suitable for them to highlight individual, organizational, and technology success elements. As a result, their HEIs will be able to produce more innovative research, products, and services that can support and meaningfully achieve national transformation initiatives, opening the path for a transition into a knowledge-based economy. Impact on Society: In fact, this research is based on a quantitative research method, and the findings were also significant especially considering the current global crises. It is clearly understood by this process that includes organizational, individual, and technology factors as key enablers of the creative performance of academic staff, thereby sustaining a culture of HECE. Future Research: While providing the research model, it is probable that this study overlooked any other crucial aspects influencing creativity and innovation. As a result, future research should look at additional variables that may impact HECE in Saudi Arabian HEIs. Furthermore, while this study focused on deriving HECE with a particular emphasis on research and teaching creativity as results, future research might look at deriving other creativity outcomes (e.g., entrepreneurial creativity) within the investigated HECE dimension.




ara

The authenticity of digital evidence in criminal courts: a comparative study

Scientific progress has a significant impact on both reality and the law that applies to it. As the ICT system has positive points that are considered an added value to it, it made it easier for people to perform their tasks and facilitate interpersonal communication for individuals, saved effort and money, and reduced the time needed to accomplish part of the duties. However, at the same time, it has become a means of committing offences and a fertile space for the existence of offence, to the extent that offence in our current era has become the result of intermarriage between human intelligence and artificial intelligence. Thus, the issue of proving cybercrimes requires a deep exploration in the notion of the authenticity of audio evidence obtained from electronic searches, as well as the process of eavesdropping and recording phone calls, and the use of expert and inspection procedures in criminal lawsuits and its impact on proof before the criminal courts.




ara

Unsupervised VAD method based on short-time energy and spectral centroid in Arabic speech case

Voice Activity Detection (VAD) distinguishes speech segments from noise or silence areas. An efficient and noise-robust VAD system can be widely used for emerging speech technologies such as wireless communication and speech recognition. In this paper, we propose two versions of an unsupervised Arabic VAD method based on the combination of the Short-Time Energy (STE) and the Spectral Centroid (SC) features for formulating a typical threshold to detect speech areas. The first version compares only the STE feature to the threshold (STE-VAD). In contrast, the second compares the SC vector and the threshold (SC-VAD). The two versions of our VAD method were tested on 770 sentences of the Arabphone corpus, which were recorded in clean and noisy environments and evaluated under different values of Signal-to-Noise-Ratio. The experiments demonstrated the robustness of the STE-VAD in terms of accuracy and Mean Square Error.




ara

Organisational Paradigms and Network Centric Organisations




ara

ICT Education and Training in Sub-Saharan Africa: Multimode versus Traditional Distance Learning




ara

Factors Influencing the Decision to Choose Information Technology Preparatory Studies in Secondary Schools: An Exploratory Study in Regional/Rural Australia




ara

Online Handwritten Character Recognition Using an Optical Backpropagation Neural Network




ara

Remote Method Invocation and Mobil Agent: A Comparative Analysis




ara

The Interface between Technological Protection Measures and the Exemptions to Copyright under Article 6 Paragraph 4 of the Infosoc Directive and Section 1201 of the Digital Millennium Copyright Act




ara

A Comparative Analysis of Common E-Portfolio Features and Available Platforms




ara

Is There a Value Paradox of E-learning in MBA Programs?




ara

Prisoner’s Attitudes Toward Using Distance Education Whilst in Prisons in Saudi Arabia




ara

Threat Modeling Using Fuzzy Logic Paradigm




ara

Socio-Technical Theory and Knowledge Construction: Towards New Pedagogical Paradigms?




ara

Is Usage Predictable Using Belief-Attitude-Intention Paradigm?




ara

ICT Attitudinal Characteristics and Use Level of Nigerian Teachers




ara

Open Innovation in SMEs: From Closed Boundaries to Networked Paradigm




ara

So Different Though So Similar? – Or Vice Versa? Exploration of the Logic Programming and the Object-Oriented Programming Paradigms




ara

Informing via Websites: Comparative Assessment of University Websites




ara

Web-based Tutorials and Traditional Face-to-Face Lectures: A Comparative Analysis of Student Performance




ara

Unraveling the Digital Literacy Paradox: How Higher Education Fails at the Fourth Literacy




ara

Characterizing Big Data Management

Big data management is a reality for an increasing number of organizations in many areas and represents a set of challenges involving big data modeling, storage and retrieval, analysis and visualization. However, technological resources, people and processes are crucial to facilitate the management of big data in any kind of organization, allowing information and knowledge from a large volume of data to support decision-making. Big data management can be supported by these three dimensions: technology, people and processes. Hence, this article discusses these dimensions: the technological dimension that is related to storage, analytics and visualization of big data; the human aspects of big data; and, in addition, the process management dimension that involves in a technological and business approach the aspects of big data management.




ara

An Analytical Investigation of the Characteristics of the Dropout Students in Higher Education

Aim/Purpose: Student dropout in higher education institutions is a universal problem. This study identifies the characteristics of dropout. In addition, it develops a mathematical model to predict students who may dropout. Methodology: The paper develops a mathematical model to predict students who may dropout. The sample includes 555 freshmen in a non-profit private university. The study uses both descriptive statistics, such as cross tabulation, and a binary regression model to predict student dropout. Contribution: There are two major contributions for the paper. First, it identifies the dropout rates of each group, a finding that may be used to better allocate resources at higher education institutions. Second, it develops a predictive model that may be used in order to predict the probability of a student dropping out and take preventive actions. Findings: This study compared dropout rates of one and a half year of enrollment among Traditional Undergraduate Students. Two major findings are the following: (1) Some of the resources designed to assist student are misallocated, and (2) Predictive models can be used to calculate the probability of a student dropping out. Recommendations for Practitioners: The study recommends that institutions must create initiatives to assist freshmen students and have annual assessment to measure the success of the initiatives. Recommendation for Researchers: Two, mathematical models may be used to predict dropout rates, the paper includes a model that predicted with 66.6% accuracy students who will dropout.




ara

Changing Paradigms of Technical Skills for Data Engineers

Aim/Purpose: This paper investigates the changing paradigms for technical skills that are needed by Data Engineers in 2018. Background: A decade ago, data engineers needed technical skills for Relational Database Management Systems (RDBMS), such as Oracle and Microsoft SQL Server. With the advent of Hadoop and NoSQL Databases in recent years, Data Engineers require new skills to support the large distributed datastores (Big Data) that currently exist. Job demand for Data Scientists and Data Engineers has increased over the last five years. Methodology: This research methodology leveraged the Pig programming language that used MapReduce software located on the Amazon Web Services (AWS) Cloud. Data was collected from 100 Indeed.com job advertisements during July of 2017 and then was uploaded to the AWS Cloud. Using MapReduce, phrases/words were counted and then sorted. The sorted phrase / word counts were then leveraged to create the list of the 20 top skills needed by a Data Engineer based on the job advertisements. This list was compared to the 20 top skills for a Data Engineer presented by Stitch that surveyed 6,500 Data Engineers in 2016. Contribution: This paper presents a list of the 20 top technical skills required by a Data Engineer.




ara

Socio-Technical Knowledge Management and Epistemological Paradigms: Theoretical Connections at the Individual and Organisational Level




ara

An Empirical Examination of Customers’ Mobile Phone Experience and Awareness of Mobile Banking Services in Mobile Banking in Saudi Arabia

Aim/Purpose: This work aims to understand why a disparity between the popularity of smart phones and the limited adoption of m-banking exists. Accordingly, this study investigates factors that affect a person’s decision to adopt m-banking services. Such an investigation seeks to determine if and to what extent customers’ mobile phone experience as well as their awareness of m-banking services influence their intention to use such services? Background: This study developed a conceptual model to determine the influence that users’ mobile phone experience as well as users’ awareness of m-banking services had on users’ behavioral intention to use m-banking in Saudi Arabia. Methodology: The quantitative method used to collect data was a survey questionnaire tech-nique. A questionnaire with non-structured (close-ended) questions was formulated. A random sample, targeting banking customers in Saudi Arabia, was selected. This study collected data using a cross-sectional survey. Of those surveyed, 389 provided valid responses eligible for data analysis. SPSS v.22 was used to analyze the data. Contribution: This study produced helpful results and a new m-banking conceptual model. The developed conceptual model focused integrally on users’ awareness and experience as antecedents of m-banking adoption and highlighted the im-portance of differentiating between measuring the users’ characteristics in adopting e-banking in general and m-banking services in particular. In addition, this type of model has the ability to synthesize new control variables as well as to study technology acceptance in developing countries. This study, based on an extended UTAUT model, set out to discover what factors might affect customers’ intentions to use m-banking in Saudi Arabia. Findings: The results show that service awareness has a direct effect on performance and effort expectancy, but not on perceived risk. Moreover, mobile phone experience fails to impact the relationships in the same hypothesized direction. As anticipated, performance expectancy, effort expectancy, and perceived risk have direct and significant effects on behavioral intentions to use m-banking. However, customer awareness fails to impact the relationships of performance expectancy, effort expectancy, and perceived risk on behavioral intentions to use m-banking. Recommendations for Practitioners: Banks should target customers by distributing useful information and applying measures to increase acceptance. Banks need to introduce something imaginative to convince bank customers to abandon existing service channels and adopt m-banking services. Banks should make m-banking services the easiest service for conducting bank transactions and/or help customers conduct transactions that they cannot do any other way. Recommendation for Researchers: Other factors, such as trust, culture, and/or credibility should be investigated along with user’s awareness and experience factors in m-banking services. There is a need to focus on a specific type of m-banking. Thus, it may be fruitful to study the adoption of different systems of m-banking services. Impact on Society: This study suggests that m-banking services should be designed and built based on a deep understanding of customers’ needs using extensive testing to assure that applications and sites function well in a mobile setting. Future Research: Future researchers should apply the conceptual model developed in this study in different settings, different countries, and to different technologies.




ara

Understanding Internal Information Systems Security Policy Violations as Paradoxes

Aim/Purpose: Violations of Information Systems (IS) security policies continue to generate great anxiety amongst many organizations that use information systems, partly because these violations are carried out by internal employees. This article addresses IS security policy violations in organizational settings, and conceptualizes and problematizes IS security violations by employees of organizations from a paradox perspective. Background: The paradox is that internal employees are increasingly being perceived as more of a threat to the security of organizational systems than outsiders. The notion of paradox is exemplified in four organizational contexts of belonging paradox, learning paradox, organizing paradox and performing paradox. Methodology : A qualitative conceptual framework exemplifying how IS security violations occur as paradoxes in context to these four areas is presented at the end of this article. Contribution: The article contributes to IS security management practice and suggests how IS security managers should be positioned to understand violations in light of this paradox perspective. Findings: The employee generally in the process of carrying out ordinary activities using computing technology exemplifies unique tensions (or paradoxes in belonging, learning, organizing and performing) and these tensions would generally tend to lead to policy violations when an imbalance occurs. Recommendations for Practitioners: IS security managers must be sensitive to employees tensions. Future Research: A quantitative study, where statistical analysis could be applied to generalize findings, could be useful.




ara

Understanding the Determinants of Wearable Payment Adoption: An Empirical Study

Aim/Purpose: The aim of this study is to determine the variables which affect the intention to use Near Field Communication (NFC)-enabled smart wearables (e.g., smartwatches, rings, wristbands) payments. Background: Despite the enormous potential of wearable payments, studies investigating the adoption of this technology are scarce. Methodology: This study extends the Technology Acceptance Model (TAM) with four additional variables (Perceived Security, Trust, Perceived Cost, and Attractiveness of Alternatives) to investigate behavioral intentions to adopt wearable payments. The moderating role of gender was also examined. Data collected from 311 Kuwaiti respondents were analyzed using Structural Equation Modeling (SEM) and multi-group analysis (MGA). Contribution: The research model provided in this study may be useful for academics and scholars conducting further research into m-payments adoption, specifically in the case of wearable payments where studies are scarce and still in the nascent stage; hence, addressing the gap in existing literature. Further, this study is the first to have specifically investigated wearable payments in the State of Kuwait; therefore, enriching Kuwaiti context literature. Findings: This study empirically demonstrated that behavioral intention to adopt wearable payments is mainly predicted by attractiveness of alternatives, perceived usefulness, perceived ease of use, perceived security and trust, while the role of perceived cost was found to be insignificant. Recommendations for Practitioners: This study draws attention to the importance of cognitive factors, such as perceived usefulness and ease of use, in inducing users’ behavioral intention to adopt wearable payments. As such, in the case of perceived usefulness, smart wearable devices manufacturers and banks enhance the functionalities and features of these devices, expand on the financial services provided through them, and maintain the availability, performance, effectiveness, and efficiency of these tools. In relation to ease of use, smart wearable devices should be designed with an easy to use, high quality and customizable user interface. The findings of this study demonstrated the influence of trust and perceived security in motivating users to adopt wearable payments, Hence, banks are advised to focus on a relationship based on trust, especially during the early stages of acceptance and adoption of wearable payments. Recommendation for Researchers: The current study validated the role of attractiveness of alternatives, which was never examined in the context of wearable payments. This, in turn, provides a new dimension about a determinant factor considered by customers in predicting their behavioral intention to adopt wearable payments. Impact on Society: This study could be used in other countries to compare and verify the results. Additionally, the research model of this study could also be used to investigate other m-payments methods, such as m-wallets and P2P payments. Future Research: Future studies should investigate the proposed model in a cross-country and cross-cultural perspective with additional economic, environmental, and technological factors. Also, future research may conduct a longitudinal study to explain how temporal changes and usage experience affect users’ behavioral intentions to adopt wearable payments. Finally, while this study included both influencing factors and inhibiting factors, other factors such as social influence, perceived compatibility, personal innovativeness, mobility, and customization could be considered in future research.




ara

Characteristics of industrial service ecosystem practices for industrial renewal

The emergence of service ecosystems can accelerate the industrial renewal required because of urgent global challenges. However, existing research has not sufficiently grasped the social dynamics of coevolution in ecosystems that enhance industrial renewal. This study aimed to advance ecosystem research through a practice lens and to present the key characteristics of industrial service ecosystem practice involved in industrial renewal. Consequently, its three characteristics - <i>accomplishment</i>, <i>attractiveness</i> and <i>actionability</i> - were configured based on an abductive study derived from the ecosystem literature, three practice-oriented approaches to learning, and two case ecosystem examinations. These features created the logic for resource integration and enhanced ecosystems to evolve as units, thus exceeding the actors' independent avenues of renewal. The findings of this study provided a deeper understanding of the coevolution in ecosystems needed to accelerate industrial renewal as well as a novel conceptualisation of an <i>ecosystem-as-practice</i> for further studies.




ara

Viability of the "Technology Acceptance Model" in Multimedia Learning Environments: A Comparative Study




ara

Learning Pod: A New Paradigm for Reusability of Learning Objects




ara

A Longitudinal Comparative Study of Student Perceptions in Online Education




ara

Characteristics of an Equitable Instructional Methodology for Courses in Interactive Media




ara

An Approach toward a Software Factory for the Development of Educational Materials under the Paradigm of WBE




ara

The Usage Characteristics of Twitter in the Learning Process




ara

The Characteristics of Successful MOOCs in the Fields of Software, Science, and Management, According to Students’ Perception

The characteristics of successful MOOCs were explored in this study. Thousands of student reviews regarding five xMOOCs (Massive Open Online Course) in the fields of software, science, and management were extracted from the Coursetalk website and analyzed by quantitative and qualitative methods using the Garrison, Anderson, and Archer (2000) Community of Inquiry (CoI) model. The 14 characteristics found to contribute to the success of MOOCs (e.g., teacher, atmosphere, exercise) were partitioned into the teaching, social, and cognitive presence elements. In addition, cluster analysis revealed five types of learners, based on the characteristics they mentioned for course success: atmosphere, exercise, teacher, exam, and unspecified. This divides learners into groups that may prefer social, cognitive, or teaching presence. The findings of this study negate the perception that xMOOCs mostly contain teaching presence elements. This research contributes to the understanding of characteristics that contribute to successful MOOCs and sheds light on the students, too. Listening to the voices of the students and the types of characteristics that they chose to mention, enables further exploration of their preferences and expectations regarding MOOCs and, accordingly, to future adaptation between students’ preferences and MOOC characteristics.




ara

New Technologies and New Paradigms in Historical Research