Establishing Requirements for a Mobile Learning System
Helen Sharp, Josie Taylor, Diane Evans and Debra Haley
The Open University
Walton Hall
Milton Keynes MK7 6AA, UK
1. Background
MOBIlearn was a large, multinational European-funded research and development
project that explored new ways to use mobile environments to meet the needs of
learners, working by themselves and with others. The aim of the project was to
develop a new m-learning architecture for a pedagogically-sound mobile learning
environment, and to evaluate an instantiation of that architecture using existing
technologies. A user-centred approach was taken to the project, based on socio-
cognitive engineering (Sharples et al, 2002) and embedded in ISO 13407. The project
team consisted of representatives from more than 15 organisations from seven
European countries plus one Middle Eastern country. Establishing the requirements
for such a project was a complex task, involving many methods and notations. The
project produced several documents and results; some of these are available at
http://www.mobilearn.org. Publications specifically related to mobile learning are
available at http://iet.open.ac.uk/pp/j.taylor/.
This case study draws only on work from the user requirements and evaluation
workpackage to explore the use of scenarios throughout the project and the use of the
Volere shell and template (Robertson and Robertson, 2006) to document the
requirements.
The next section introduces the three strands used as learning domains throughout the
project. Section 3 describes the use of scenarios throughout the project and Section 4
discusses the use of Volere shells and the technology to support them. In Section 5 we
conclude by making some observations about our experiences.
2. The three strands
The project chose three learning domains to drive the research, each of which
represents a distinct learning situation. These are: the Museum strand, the MBA
strand and the Health strand. Data gathering for establishing requirements was
conducted by a different project partner, each strand used different data gathering
techniques, and each produced its own set of requirements which needed to be
rationalised. The three strands and their respective data gathering techniques are
outlined below.
http://www.mobilearn.org/
https://oufe.open.ac.uk/exchweb/bin/redir.asp?URL=http://iet.open.ac.uk/pp/j.taylor/
Museum strand
This strand typifies informal learning and concerns visitors to a museum. Museums
are the mechanism through which we research, interpret and present our insights into
the natural and cultural worlds. They represent our belief systems concerning cultural
inter-relationships, our relationship with the environment and of our place in the
Universe.
Wireless technology is becoming a part of the museum experience. In an effort to
bring art and science to life for a new generation of technically sophisticated patrons,
an increas ...
The presentation will be structured as follow. The talk will first provide an introduction to the theory behind the Socio-Cultural Ecology (Pachler, Bachmair and Cook, 2010) and the notion of User-generated contexts (Cook, Pachler and Bachmair, accepted), which Cook (2009) has refined into an analytical tool called a ‘typology-grid’ (see below). The talk will then demonstrate how the typology-grid has been successfully been used to analyse and learn from the ALPS and conclude by inviting a critique of the typology-grid.
A Survey on E-Learning System with Data MiningIIRindia
E-learning process has been widely used in university campus and educational institutions are playing vital role to enhance the skill set of students. Modern E-learning done by many electronic devices, such as smartphones, Tabs, and so on, on existing E-learning tools is insufficient to achieve the purpose of online training of education. This paper presents a survey of online e-Learning authoring tools for creating and integrating reusable e-learning tool for generation and enhancing existing learning resources with them. The work concentrates on evaluation of the existing e-learning tools a, and authoring tools that have shown good performance in the past for online learners. This survey work takes more than 20 online tools that deal with the educational sector mechanism, for the purpose of observations, and the outcome were analyzed. The findings of this paper are the main reason for developing a new tool, and it shows that educators can enhance existing learning resources by adding assessment resources, if suitable authoring tools are provided. Finally, the different factors that assure the reusability of the created new e-learning tool has been analysed in this paper.E-learning environment is a guide for both students and tutorial management system. The useful on the e-learning system for apart from students and distance learning students. The purpose of using e-learning environment for online education system, developed in data mining for more number of clustering servers and resource chain has been good.
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...ijmnct
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good communication infrastructure is a provider of e-learning services, so that usually does not have require to physical location as a traditional university and students are able in any place and at any time be willing to use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to identify and detect fraud in the online environment that use of these methods can be identified took place fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this research, we aimed are to investigate a new approach to detect and track fraud in virtual learning
environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is 84.54% which is indicative of high performance and high precision in predicting fraud from the teachers, students and hackers.
Investigation of new approach to detect and track fraud in virtual learningijmnct
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good communication infrastructure is a provider of e-learning services, so that usually does not have require to physical location as a traditional university and students are able in any place and at any time be willing to use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to identify and detect fraud in the online environment that use of these methods can be identified took place fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this research, we aimed are to investigate a new approach to detect and track fraud in virtual learning environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is 84.54% which is indicative of high performance and high precision in predicting fraud from the teachers, students and hackers.
Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...ijmnct
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good
communication infrastructure is a provider of e-learning services, so that usually does not have require to
physical location as a traditional university and students are able in any place and at any time be willing to
use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to
identify and detect fraud in the online environment that use of these methods can be identified took place
fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this
research, we aimed are to investigate a new approach to detect and track fraud in virtual learning
environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is
84.54% which is indicative of high performance and high precision in predicting fraud from the teachers,
students and hackers.
The Future of Learning Technology in UK Higher Education
At Microsoft it’s essential that we understand how we can support
innovative individuals, businesses and organisations to shape the future – and there is no more important area for innovation than Higher Education.
Introduction
Learning delivery in Higher Education Institutions (HEIs) is
being reshaped before our eyes, thanks in part to advances
in technology and the new pedagogical theories facilitated by
that technology.
In order to understand more about the ever-evolving
relationship between technology and learning, we spent time
speaking with six of the UK’s leading learning technologists
working within HEIs.
In a series of interviews exploring current practice, changing
needs and key trends, we were able to establish how digital
devices are being used in universities and how cutting-edge
technology can continue to compliment a sector experiencing
fresh emphasis on collaboration, creation and innovation.
The presentation will be structured as follow. The talk will first provide an introduction to the theory behind the Socio-Cultural Ecology (Pachler, Bachmair and Cook, 2010) and the notion of User-generated contexts (Cook, Pachler and Bachmair, accepted), which Cook (2009) has refined into an analytical tool called a ‘typology-grid’ (see below). The talk will then demonstrate how the typology-grid has been successfully been used to analyse and learn from the ALPS and conclude by inviting a critique of the typology-grid.
A Survey on E-Learning System with Data MiningIIRindia
E-learning process has been widely used in university campus and educational institutions are playing vital role to enhance the skill set of students. Modern E-learning done by many electronic devices, such as smartphones, Tabs, and so on, on existing E-learning tools is insufficient to achieve the purpose of online training of education. This paper presents a survey of online e-Learning authoring tools for creating and integrating reusable e-learning tool for generation and enhancing existing learning resources with them. The work concentrates on evaluation of the existing e-learning tools a, and authoring tools that have shown good performance in the past for online learners. This survey work takes more than 20 online tools that deal with the educational sector mechanism, for the purpose of observations, and the outcome were analyzed. The findings of this paper are the main reason for developing a new tool, and it shows that educators can enhance existing learning resources by adding assessment resources, if suitable authoring tools are provided. Finally, the different factors that assure the reusability of the created new e-learning tool has been analysed in this paper.E-learning environment is a guide for both students and tutorial management system. The useful on the e-learning system for apart from students and distance learning students. The purpose of using e-learning environment for online education system, developed in data mining for more number of clustering servers and resource chain has been good.
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...ijmnct
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good communication infrastructure is a provider of e-learning services, so that usually does not have require to physical location as a traditional university and students are able in any place and at any time be willing to use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to identify and detect fraud in the online environment that use of these methods can be identified took place fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this research, we aimed are to investigate a new approach to detect and track fraud in virtual learning
environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is 84.54% which is indicative of high performance and high precision in predicting fraud from the teachers, students and hackers.
Investigation of new approach to detect and track fraud in virtual learningijmnct
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good communication infrastructure is a provider of e-learning services, so that usually does not have require to physical location as a traditional university and students are able in any place and at any time be willing to use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to identify and detect fraud in the online environment that use of these methods can be identified took place fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this research, we aimed are to investigate a new approach to detect and track fraud in virtual learning environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is 84.54% which is indicative of high performance and high precision in predicting fraud from the teachers, students and hackers.
Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...ijmnct
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good
communication infrastructure is a provider of e-learning services, so that usually does not have require to
physical location as a traditional university and students are able in any place and at any time be willing to
use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to
identify and detect fraud in the online environment that use of these methods can be identified took place
fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this
research, we aimed are to investigate a new approach to detect and track fraud in virtual learning
environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is
84.54% which is indicative of high performance and high precision in predicting fraud from the teachers,
students and hackers.
The Future of Learning Technology in UK Higher Education
At Microsoft it’s essential that we understand how we can support
innovative individuals, businesses and organisations to shape the future – and there is no more important area for innovation than Higher Education.
Introduction
Learning delivery in Higher Education Institutions (HEIs) is
being reshaped before our eyes, thanks in part to advances
in technology and the new pedagogical theories facilitated by
that technology.
In order to understand more about the ever-evolving
relationship between technology and learning, we spent time
speaking with six of the UK’s leading learning technologists
working within HEIs.
In a series of interviews exploring current practice, changing
needs and key trends, we were able to establish how digital
devices are being used in universities and how cutting-edge
technology can continue to compliment a sector experiencing
fresh emphasis on collaboration, creation and innovation.
Enhancing emergency care in low-income countries using mobile technology-base...Chris Paton
In this paper, we discuss the role of mobile technology in developing training tools for health workers, with particular reference to low-income countries (LICs). The global and technological context is outlined, followed by a summary of approaches to using and evaluating mobile technology for learning in healthcare. Finally, recommendations are made for those developing and using such tools, based on current literature and the authors' involvement in the field.
The way adults pursue their education through life is changing as the technology around us
relentlessly continues to enhance our quality of life and further enhances every aspect of the
different tasks we set out to perform. This exploratory paper looks into how every adult can
embody a comprehensive set of academic services, platforms and systems to assist every
individual in the educational goals that one sets. A combination of three distinct technologies
are presented together with how they not only come together but complement each other around
a person in what is usually referred to as a personal area network. The network in this case
incorporates an intelligent personal learning environment providing personalised content,
intelligent wearables closer to the user to provide additional contextual customisation, and a
surrounding ambient intelligent environment to close a trio of technologies around every
individual. Each of the three research domains will be presented to uncover how each
contributes to the personal network that embodies what one usually expects from an educational
institution. Three distinct prototype systems have been developed, tested and deployed within a
functional system that will be presented in this paper.
To determine student\'s attitude towards student service department and feasibility of implementing social network services into student service department\'s system. note that the report have different demographics therefore not suitable for every school.
Literature Review 1
How iPods can be optimally used to meet the needs of learners
Student’s Name
Institutional Affiliation
Date
Contents:
Introduction
Problem Statement
Review of the Research
Conclusion
Reference
Introduction
Technology has completely acquired over the rapid pace of trends in our society as well as across the globe. It is very true that the advancement of science has developed several products as vital contributions in our community to make our life much easier while the decline in the hurdles of our path. If we look around the cell phone (mobile) it has been more of a necessity among us rather than a choice. According to the recent primary and secondary data the figures reflect that almost 92 percent of the people across the globe use cell phone for acquiring their basic needs of the life to have long conversations with their family and friends along with the important calls to stay in touch with all their known individuals. Where ever you go even the drivers and poor people’s you can find them using cell phones but still we can figure out a line of difference with the use of the phone. Now a day we can find various categories of phones comprises of GSM, CDMA, Multimedia, basic phones, etc. IN out present scenario we can find that the youth are more over being friendly with the latest trends of touch screen technologies of mobile phones as well as the several described products of tablets, iPhones, etc. Which has been launched from the past several years but a novel generation of educational tools has funded those for the creative use and instantaneous admissions of the students to contribute their wealth of online resources. Those products has been advertized as “revolutionary” devices in our generation that embrace the immense potential for the proper transformation of learning’s. One of the principle benefits or the major circumstances of the adoption of such device is the characteristics reflected by them to facilitate the concept of learning skills anywhere, anytime across the nations. This permits a shift which has driven the industry study era replica where the classroom is the inner place of learning driven by lecturers as well as restricted to the lessons taught within the school on a regular day.
Problem Statement
While structuring the mobile devices the firms has to process various steps to compute the devices together and activate a production of successful products, the present trends of students who are being organized by mobile devices, the teacher is no longer present at the center of the learning procedure where as the instructional time for the studies may vary and can exceed than those of the school days. The vital key center areas of this statement were -
• Relevant data are provided to the schools to permit the decisions of inform ...
INCORPORATING A WEB-BASED SYSTEM TO IMPLEMENT SERVICES AND RECOMMENDATION SYS...ijcseit
China has become a major study destination for many international students who come to study in many
higher institutions at different levels. NEU is one of these higher institutions and as a result seeks to make
life comfortable for the international students who come to study there. It is in this vein that this system has
been designed with the objective of enabling any new foreign student arriving NEU to acquaint themselves
with the new environment and integrate it in less than no time thereby overcoming the fear of the new
environment which grips every new comer. Key technologies, tools such as Spring MVC/Security, JSF
Prime Faces, etc. were carefully chosen for the development of the project. The system development
followed the system development life cycle, specifically using the agile methodology. Testing proved that
the proposed system is a very responsive and could run well on most browsers.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Developing a Computer-Assisted Instruction Model for Vocational High Schoolsinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
In this modern, age of society where everyone requires individual attention to his/her self in order to gain far more than publicly gather information. Internet becomes the part of life in these circumstances when technology is much more active than any other source of communication. People need to have all information regarding their field of interest at one place stop and this could only be possible because of internet. According to a research, students engage with a lot more new information's from various sources. Particularly, students are more independent in electronic based courses than traditional way of learning courses. Although the virtual source of teaching courses are not so effective because of student unable to pay attention being as in practical classrooms but students are still progressive.
This paper is depending on the effectiveness of e-learning system in the field of education. E-learning can be perceived as a computer-learning program in which students can be taught over computer. However, today the concept of e-learning has been totally changed, it is the collection of technological sources to provide the information you required within a very short period of time. What is good e-learning process? The components and the future perspective of the e-learning program will covered in this paper.
The report will covers case studies of mobile technology pilots over two sessions in 2012 in a learning and teaching context. It will discusses the results of the surveys undertaken as part of the Project, to highlight the successes and failures of these pilots. The report also outlines the work done, and the results so far, in the development of a mobile solution for CSU Subject Outlines and learning resources.
Marginalization threatens basic issues of fairness and equal opportunity for a significant portion of children around the world. In this extended abstract, we frame the problem of marginalization in light of new economic forces and the increasingly ubiquitous role of digital technologies. We then summarize the contributions to the IDC 2010 workshop on Digital Technologies and Marginalized Youth. We conclude by discussing research trends and identifying challenges for future research.
9/17/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=5bb8832d-bffd-40d3-80df-010d02a4d74… 1/5
%25
%16
%3
SafeAssign Originality Report
Fall 2020 - Organ Leader & Decision Making (ITS-630-A08) - First Bi-T… • Week 2 Written Assignment
%44Total Score: High riskPraneeth Pentela
Submission UUID: 7567c97b-2f11-db04-8404-2b438ba2278e
Total Number of Reports
1
Highest Match
44 %
Week 02_Technology Acceptance Model.…
Average Match
44 %
Submitted on
09/06/20
10:42 PM CDT
Average Word Count
1,434
Highest: Week 02_Technology Acceptanc…
%44Attachment 1
Institutional database (6)
Student paper Student paper Student paper
Student paper Student paper Student paper
Internet (6)
foi centar-fm springer
marlenemourreau springer boisestate
Global database (1)
Student paper
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 1,434
Week 02_Technology Acceptance Model.docx
6 1 8
4 3 7
5 9 11
2 12 13
10
6 Student paper 5 foi 9 centar-fm
Running head: TECHNOLOGY ACCEPTANCE MODEL 1
TECHNOLOGY ACCEPTANCE MODEL 7
Technology Acceptance Model Praneeth Pentela
ITS 630-A08 Organ Leader & Decision Making
Dr. Joanna Patterson
TECHNOLOGY ACCEPTANCE MODEL
Introduction
IT acceptance has over the last few years received considerable attention. Various theoretical models have been proposed to explain the end-users’ acceptance
behavior (Al-Emran, Mezhuyev, & Kamaludin, 2018). Among the various theoretical models, TAM that was proposed by Davis is typically applied and empirically
tested. Technology acceptance model (TAM) The technology acceptance model is an information system theory that is used in modeling how users normally accept
technology use. This is a model that is considered to be one of the most influential and commonly used theories. It is therefore very critical in describing the
importance of technological innovations in e-commerce. The practical system use is the ultimate conclusion that users want people to be willing to do something
regarding technology, and also need to establish behavioral intention which may e a factor that would encourage people to use the innovation. The behavioral
intention is said to be affected by the attitude (A) of the general understanding of the technology (Nugroho, Bakar, & Ali, 2017). Many studies have been conducted
globally to investigate TAM’s relevance in understanding e-learning acceptance among the students. In many regions, e-learning is adopted for its assumed potential
1
2
3
2
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=5bb8832d-bffd-40d3-80df-010d02a4d749&course_id=_135115_1&download=true&includeDeleted=true&print=true&force=true
9/17/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=5bb8832d-bffd-40d3-80df-010d02a4d74… 2/5
of facilitati.
This second report updates proposes ten innovations that are already in currency but have not yet had a profound influence on education. You can see a summary of each innovation at the menu on the right. Please contribute with comments on the report and the innovations. OPEN uNIVERSITY
MANAGEGIAL ECONOMICS AND ORGANIZATIONAL ARCHITECTURE 5Th Edition .docxBetseyCalderon89
MANAGEGIAL ECONOMICS AND ORGANIZATIONAL ARCHITECTURE 5Th Edition
"AUTHORS BRICKLEY ZIMMERMAN & SMITH"
QUESTION 1
1.The text makes it clear that the management innovations of the 1980s and 1990s:
were almost all instant successes.
waxed and waned in use and popularity.
were instantly mostly failures.
were creations of the press and were never implemented in business.
QUESTION 2
2. If transactions costs can be reduced in a market place, then total producer and consumer surplus will:
increase.
stay the same.
decrease.
None of the above.
QUESTION 3
3. If a manager complies with all laws and regulations, then he can be confident that:
he is completely ethical.
he is fairly unethical.
he has begun to deal with ethical issues.
he will never run into ethical problems at work.
QUESTION 4
4. As a firm's market power in pricing decreases, the price elasticity of its demand:
stays the same.
decreases.
is equal to one.
increases.
QUESTION 5
5. If a management innovation is going to be successful, it needs to address:
decisioin making assignment should rest with the CEO.
incentive and reward systems.
shareholders' concerns.
the rights of the Board of Directors
QUESTION 6
6. Ethics is about making good decisions. Sometimes it is hard to see what economics has to do with ethics until you remember that economics is often defined as the:
science of choice.
key branch of theology.
disciple with high moral standards.
area that understand nothing about ethics.
QUESTION 7
7. Martha Steward seems to have made a bad decisison concerning the use of insider information in selling ImClone stock. The resulting negative publicity on the issue caused value of her corporation, Martha Steward Living, to fall by almost half. This example is suposed to show.
insider trading can pay off in certtain circunstances.
ethics and wealth creation are not linked in any way.
Stock markets are fickle stewards of wealth.
Ethics and wealth creation are closaely linked.
QUESTION 8
8. Strategy refers to the general policies that managers adopt to:
costs.
the number of customers at the same price.
the rate of technological change.
the generation of profits.
QUESTION 9
9. Competitive markets ususally promote the efficient use of resources. This is because:
resource owners bear the wealth effects of their decision.
managers always have proper incentives to make decisisons.
consumers usually provide the lists of corporate mistakes.
markets usually make equitable choices first.
QUESTION 10
10. Finding a way to create and capture value is part of:
business strategy
cost control systems.
management control, but not general management.
allowing the market to run a company's future plans.
QUESTION 11
11. One of the problems with making all the decisions at the top of a business orgnization is costliness of:
specific information.
gener.
Manage Resourcesfor Practicum Change ProjectYou are now half-w.docxBetseyCalderon89
Manage Resources
for Practicum Change Project
You are now half-way through the course. Thanks for all of your hard work on your project thus far!
Now, let's begin work on week 4 of the Practicum Change Project!
This week your instructor has assigned you to evaluate resources and develop a budget to fund the Practicum Change Project. Determine if the resources are available for the project (i.e., salaries, supplies, equipment, technology, and education)and develop and present the budget in the practicum discussion area.
Support your response with references from the professional nursing literature.
.
More Related Content
Similar to Establishing Requirements for a Mobile Learning System H
Enhancing emergency care in low-income countries using mobile technology-base...Chris Paton
In this paper, we discuss the role of mobile technology in developing training tools for health workers, with particular reference to low-income countries (LICs). The global and technological context is outlined, followed by a summary of approaches to using and evaluating mobile technology for learning in healthcare. Finally, recommendations are made for those developing and using such tools, based on current literature and the authors' involvement in the field.
The way adults pursue their education through life is changing as the technology around us
relentlessly continues to enhance our quality of life and further enhances every aspect of the
different tasks we set out to perform. This exploratory paper looks into how every adult can
embody a comprehensive set of academic services, platforms and systems to assist every
individual in the educational goals that one sets. A combination of three distinct technologies
are presented together with how they not only come together but complement each other around
a person in what is usually referred to as a personal area network. The network in this case
incorporates an intelligent personal learning environment providing personalised content,
intelligent wearables closer to the user to provide additional contextual customisation, and a
surrounding ambient intelligent environment to close a trio of technologies around every
individual. Each of the three research domains will be presented to uncover how each
contributes to the personal network that embodies what one usually expects from an educational
institution. Three distinct prototype systems have been developed, tested and deployed within a
functional system that will be presented in this paper.
To determine student\'s attitude towards student service department and feasibility of implementing social network services into student service department\'s system. note that the report have different demographics therefore not suitable for every school.
Literature Review 1
How iPods can be optimally used to meet the needs of learners
Student’s Name
Institutional Affiliation
Date
Contents:
Introduction
Problem Statement
Review of the Research
Conclusion
Reference
Introduction
Technology has completely acquired over the rapid pace of trends in our society as well as across the globe. It is very true that the advancement of science has developed several products as vital contributions in our community to make our life much easier while the decline in the hurdles of our path. If we look around the cell phone (mobile) it has been more of a necessity among us rather than a choice. According to the recent primary and secondary data the figures reflect that almost 92 percent of the people across the globe use cell phone for acquiring their basic needs of the life to have long conversations with their family and friends along with the important calls to stay in touch with all their known individuals. Where ever you go even the drivers and poor people’s you can find them using cell phones but still we can figure out a line of difference with the use of the phone. Now a day we can find various categories of phones comprises of GSM, CDMA, Multimedia, basic phones, etc. IN out present scenario we can find that the youth are more over being friendly with the latest trends of touch screen technologies of mobile phones as well as the several described products of tablets, iPhones, etc. Which has been launched from the past several years but a novel generation of educational tools has funded those for the creative use and instantaneous admissions of the students to contribute their wealth of online resources. Those products has been advertized as “revolutionary” devices in our generation that embrace the immense potential for the proper transformation of learning’s. One of the principle benefits or the major circumstances of the adoption of such device is the characteristics reflected by them to facilitate the concept of learning skills anywhere, anytime across the nations. This permits a shift which has driven the industry study era replica where the classroom is the inner place of learning driven by lecturers as well as restricted to the lessons taught within the school on a regular day.
Problem Statement
While structuring the mobile devices the firms has to process various steps to compute the devices together and activate a production of successful products, the present trends of students who are being organized by mobile devices, the teacher is no longer present at the center of the learning procedure where as the instructional time for the studies may vary and can exceed than those of the school days. The vital key center areas of this statement were -
• Relevant data are provided to the schools to permit the decisions of inform ...
INCORPORATING A WEB-BASED SYSTEM TO IMPLEMENT SERVICES AND RECOMMENDATION SYS...ijcseit
China has become a major study destination for many international students who come to study in many
higher institutions at different levels. NEU is one of these higher institutions and as a result seeks to make
life comfortable for the international students who come to study there. It is in this vein that this system has
been designed with the objective of enabling any new foreign student arriving NEU to acquaint themselves
with the new environment and integrate it in less than no time thereby overcoming the fear of the new
environment which grips every new comer. Key technologies, tools such as Spring MVC/Security, JSF
Prime Faces, etc. were carefully chosen for the development of the project. The system development
followed the system development life cycle, specifically using the agile methodology. Testing proved that
the proposed system is a very responsive and could run well on most browsers.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Developing a Computer-Assisted Instruction Model for Vocational High Schoolsinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
In this modern, age of society where everyone requires individual attention to his/her self in order to gain far more than publicly gather information. Internet becomes the part of life in these circumstances when technology is much more active than any other source of communication. People need to have all information regarding their field of interest at one place stop and this could only be possible because of internet. According to a research, students engage with a lot more new information's from various sources. Particularly, students are more independent in electronic based courses than traditional way of learning courses. Although the virtual source of teaching courses are not so effective because of student unable to pay attention being as in practical classrooms but students are still progressive.
This paper is depending on the effectiveness of e-learning system in the field of education. E-learning can be perceived as a computer-learning program in which students can be taught over computer. However, today the concept of e-learning has been totally changed, it is the collection of technological sources to provide the information you required within a very short period of time. What is good e-learning process? The components and the future perspective of the e-learning program will covered in this paper.
The report will covers case studies of mobile technology pilots over two sessions in 2012 in a learning and teaching context. It will discusses the results of the surveys undertaken as part of the Project, to highlight the successes and failures of these pilots. The report also outlines the work done, and the results so far, in the development of a mobile solution for CSU Subject Outlines and learning resources.
Marginalization threatens basic issues of fairness and equal opportunity for a significant portion of children around the world. In this extended abstract, we frame the problem of marginalization in light of new economic forces and the increasingly ubiquitous role of digital technologies. We then summarize the contributions to the IDC 2010 workshop on Digital Technologies and Marginalized Youth. We conclude by discussing research trends and identifying challenges for future research.
9/17/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=5bb8832d-bffd-40d3-80df-010d02a4d74… 1/5
%25
%16
%3
SafeAssign Originality Report
Fall 2020 - Organ Leader & Decision Making (ITS-630-A08) - First Bi-T… • Week 2 Written Assignment
%44Total Score: High riskPraneeth Pentela
Submission UUID: 7567c97b-2f11-db04-8404-2b438ba2278e
Total Number of Reports
1
Highest Match
44 %
Week 02_Technology Acceptance Model.…
Average Match
44 %
Submitted on
09/06/20
10:42 PM CDT
Average Word Count
1,434
Highest: Week 02_Technology Acceptanc…
%44Attachment 1
Institutional database (6)
Student paper Student paper Student paper
Student paper Student paper Student paper
Internet (6)
foi centar-fm springer
marlenemourreau springer boisestate
Global database (1)
Student paper
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 1,434
Week 02_Technology Acceptance Model.docx
6 1 8
4 3 7
5 9 11
2 12 13
10
6 Student paper 5 foi 9 centar-fm
Running head: TECHNOLOGY ACCEPTANCE MODEL 1
TECHNOLOGY ACCEPTANCE MODEL 7
Technology Acceptance Model Praneeth Pentela
ITS 630-A08 Organ Leader & Decision Making
Dr. Joanna Patterson
TECHNOLOGY ACCEPTANCE MODEL
Introduction
IT acceptance has over the last few years received considerable attention. Various theoretical models have been proposed to explain the end-users’ acceptance
behavior (Al-Emran, Mezhuyev, & Kamaludin, 2018). Among the various theoretical models, TAM that was proposed by Davis is typically applied and empirically
tested. Technology acceptance model (TAM) The technology acceptance model is an information system theory that is used in modeling how users normally accept
technology use. This is a model that is considered to be one of the most influential and commonly used theories. It is therefore very critical in describing the
importance of technological innovations in e-commerce. The practical system use is the ultimate conclusion that users want people to be willing to do something
regarding technology, and also need to establish behavioral intention which may e a factor that would encourage people to use the innovation. The behavioral
intention is said to be affected by the attitude (A) of the general understanding of the technology (Nugroho, Bakar, & Ali, 2017). Many studies have been conducted
globally to investigate TAM’s relevance in understanding e-learning acceptance among the students. In many regions, e-learning is adopted for its assumed potential
1
2
3
2
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=5bb8832d-bffd-40d3-80df-010d02a4d749&course_id=_135115_1&download=true&includeDeleted=true&print=true&force=true
9/17/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=5bb8832d-bffd-40d3-80df-010d02a4d74… 2/5
of facilitati.
This second report updates proposes ten innovations that are already in currency but have not yet had a profound influence on education. You can see a summary of each innovation at the menu on the right. Please contribute with comments on the report and the innovations. OPEN uNIVERSITY
Similar to Establishing Requirements for a Mobile Learning System H (20)
MANAGEGIAL ECONOMICS AND ORGANIZATIONAL ARCHITECTURE 5Th Edition .docxBetseyCalderon89
MANAGEGIAL ECONOMICS AND ORGANIZATIONAL ARCHITECTURE 5Th Edition
"AUTHORS BRICKLEY ZIMMERMAN & SMITH"
QUESTION 1
1.The text makes it clear that the management innovations of the 1980s and 1990s:
were almost all instant successes.
waxed and waned in use and popularity.
were instantly mostly failures.
were creations of the press and were never implemented in business.
QUESTION 2
2. If transactions costs can be reduced in a market place, then total producer and consumer surplus will:
increase.
stay the same.
decrease.
None of the above.
QUESTION 3
3. If a manager complies with all laws and regulations, then he can be confident that:
he is completely ethical.
he is fairly unethical.
he has begun to deal with ethical issues.
he will never run into ethical problems at work.
QUESTION 4
4. As a firm's market power in pricing decreases, the price elasticity of its demand:
stays the same.
decreases.
is equal to one.
increases.
QUESTION 5
5. If a management innovation is going to be successful, it needs to address:
decisioin making assignment should rest with the CEO.
incentive and reward systems.
shareholders' concerns.
the rights of the Board of Directors
QUESTION 6
6. Ethics is about making good decisions. Sometimes it is hard to see what economics has to do with ethics until you remember that economics is often defined as the:
science of choice.
key branch of theology.
disciple with high moral standards.
area that understand nothing about ethics.
QUESTION 7
7. Martha Steward seems to have made a bad decisison concerning the use of insider information in selling ImClone stock. The resulting negative publicity on the issue caused value of her corporation, Martha Steward Living, to fall by almost half. This example is suposed to show.
insider trading can pay off in certtain circunstances.
ethics and wealth creation are not linked in any way.
Stock markets are fickle stewards of wealth.
Ethics and wealth creation are closaely linked.
QUESTION 8
8. Strategy refers to the general policies that managers adopt to:
costs.
the number of customers at the same price.
the rate of technological change.
the generation of profits.
QUESTION 9
9. Competitive markets ususally promote the efficient use of resources. This is because:
resource owners bear the wealth effects of their decision.
managers always have proper incentives to make decisisons.
consumers usually provide the lists of corporate mistakes.
markets usually make equitable choices first.
QUESTION 10
10. Finding a way to create and capture value is part of:
business strategy
cost control systems.
management control, but not general management.
allowing the market to run a company's future plans.
QUESTION 11
11. One of the problems with making all the decisions at the top of a business orgnization is costliness of:
specific information.
gener.
Manage Resourcesfor Practicum Change ProjectYou are now half-w.docxBetseyCalderon89
Manage Resources
for Practicum Change Project
You are now half-way through the course. Thanks for all of your hard work on your project thus far!
Now, let's begin work on week 4 of the Practicum Change Project!
This week your instructor has assigned you to evaluate resources and develop a budget to fund the Practicum Change Project. Determine if the resources are available for the project (i.e., salaries, supplies, equipment, technology, and education)and develop and present the budget in the practicum discussion area.
Support your response with references from the professional nursing literature.
.
Make sure you put it in your own words and references for each pleas.docxBetseyCalderon89
Make sure you put it in your own words and references for each please.
Benefit of Photosynthesis
1).
§
Describe two (2) ways that YOU benefit from the process of photosynthesis.
§
What happens when plants receive too much sun? Why?
§
How does the mapping of photosynthesis by NASA in space relate to climate change?
Respond in sentence/paragraph format with a MINIMUM of 5 sentences. Provide a reference!
Fermentation
2).
·
Fermentation and cellular respiration are BOTH used for energy-production in cells. As cellular beings, humans have the ability to perform both processes. Since energy production is markedly lower during fermentation, do you think it is a good idea for human cells to perform both processes? Why/why? EXPLAIN your response.
Respond in sentence/paragraph format with a MINIMUM of 5 sentences. Provide a reference!
3).
o
AUTOTROPHS & HETEROTROPHS
Autotrophs make their own food using energy they get directly from the environment, and carbon from inorganic sources such as CO
2
. By metabolic pathways of photosynthesis, plants and other autotrophs capture the energy of light and use it to build sugars from water and carbon dioxide. Heterotrophs get energy and carbon molecules from molecules that other organisms have already assembled.
Earth's early atmosphere held very little free oxygen, and chemoautotrophs were common. When the noncyclic pathway of photosynthesis evolved, oxygen released by photoautotrophs permanently changed the atmosphere, and it was a selective force that favored evolution of aerobic respiration. Photoautotrophs remove CO
2
from the atmosphere; the metabolic activity of most organisms puts it back. Human activities disrupt this cycle by adding extra CO
2
to the atmosphere. The resulting imbalance is contributing to global warming.
Can you do some additional research and find at least one specific heterotroph?
o
4).
THE EVOLUTION OF PHOTOSYNTHESIS
Life theoretically originated on Earth 3.4 to 4 billion years ago. The atmosphere was thin: composed of methane, carbon dioxide, and water vapor. Any gaseous oxygen had been used up in the combustion (or oxidation) of materials when the Earth was very hot.
The cooling water collected in pools, assimilating nutrients from the rocks. As water evaporated, the nutrients concentrated, forming a rich soup. The first organisms would have lived well off this food source, breaking down the complex molecules into water and carbon dioxide through respiration. Eventually, as life grew, the need arose to somehow re-synthesize complex compounds, both to eat and to use for structure and function. Some organisms learned how to use the Sun's energy to synthesize large molecules from small molecules. Other organisms learned to use other sources of reductive power. These organisms that have learned how to build the building blocks of life are called autotrophs, or self-feeders. Autotrophs are found in the bacterial and plant
Can you do some ad.
Make sure you take your time and provide complete answers. Two or th.docxBetseyCalderon89
Make sure you take your time and provide complete answers. Two or three sentence answers to any of these questions will not be adequate! Your logic, thought processes and quality of your responses are what will determine your grade.
1)
ABC’s capital-asset procurement policy requires the Board of CAEs (BOD) approve any single acquisition over $150,000. If the board approves a project, then the treasurer will transfer the funds to the respective plant. Within one year, the internal auditing function is charged with reviewing each acquisition to check the propriety of the purchase and disbursal of funds.
ABC’s Plant Controller prepared the first proposal for a DEK cutting machine. Other plants were told to wait until internal auditing could inspect the documentation associated with the acquisition, and evaluate the project’s operating effectiveness and efficiency. The plant’s proposal was the second largest proposal ever submitted in the company’s history and it totaled $1.3 million dollars. The cost of the new machine by itself was listed in the proposal at $1.1 million. Labor and other costs necessary to remove the old machine and install the new machine totaled $200,000.
The internal auditor assigned to the investigation was Phil Ramone. Phil had been with ABC four years performing mostly production operational audits (on existing processes) and internal control payroll audits. Phil’s considerable experience in these areas led him to believe that the procedures associated with this capital-asset audit would be as simple and routine. This was not Phil’s first visit to the plant. In fact Phil had performed an audit on the plant’s payroll system only a year ago. Phil’s recollection of the experience was not a pleasant one. He had several confrontations with the plant controller, mostly as a result of personality clashes. While all the payroll issues were easily resolved, Phil felt there was still an adversarial relationship between him and the controller and was on guard for any preemptive strikes this time around by the controller.
It was a long drive to the plant so when Phil arrived a little late the day of his audit he was greeted by the controller with a perceived air of indifference and promptly led to a secluded office. The controller calmly explained that he was extremely busy and would answer any questions at the end of the day. Phil merely nodded his head and sat down in front of several tall piles of invoices, which the controller stated was the documentation supporting the purchase, set up, and testing of the new machine. Phil was somewhat surprised, fully expecting to see only a handful of invoices, but did not ask for any explanations. As Phil began looking through the myriad of statements and canceled checks he soon found one particular invoice near the top of the first pile that indicated the actual price paid for the machine itself was only $850,000.
Phil’s first reaction was to call the CAE of auditing. When he found .
make sure is 100 original not copythis first questionDiscuss .docxBetseyCalderon89
make sure is 100% original not copy
this first question
Discuss the configuration and activation of auditing for files, users or other system objects to help technical personnel recognize, diagnose, deter and/or work to prevent attempts to compromise or break into a computer network.
this second question
Complete the main portion of this assignment as outlined below.
Briefly describe how the following tools are used:
Event viewer
Authority delegation
Update services
Describe 1 scenario in which each tool would be used.
.
make two paragraphs on diffences and similiarties religous belifs .docxBetseyCalderon89
make two paragraphs on diffences and similiarties : religous belifs on egypt and the mayans
Paragraph(s) should include a topic sentence, explanation of similarities, explanations of any differences, and a concluding sentence. • Give specific points to support any generalizations that you make. For example, a statement such as, “Both civilizations relied on oral tradition,” needs elaboration with supporting details. To strengthen your paragraph, give specific examples and elaborations for each culture. If you were discussing the culture of ancient Greece, you might elaborate on how Homer’s Iliad and Odyssey represents the oral traditions of ancient Greece.
100% original work
.
Make a list of your own personality traits and then address the foll.docxBetseyCalderon89
Make a list of your own personality traits and then address the following questions:
How much, if at all, has your personality changed from the time you were in elementary school?
What specific people and/or events most shaped your personality over the last fifteen years of your life?
In terms of personality, which parent are you most like—your mother or your father—and in what ways?
After you consider these questions, discuss how, if at all, your answers may help to shed light on the “nature” versus “nurture”
Please also respond to my classmate's responses for 3-4 sentences. Here are my classmate's responses:
1. Since my elementary school career, I have drastically changed as a result of being exposed to more anxiety-provoking tasks. My personality has thereby been affected in a number of ways due to the aforementioned prospect. I have since become more organized and artistic due to my increasing creativity--since I have efficacy in visual arts. I have also become more mature, since I am always paying attention to my surroundings and what other people are thinking of me. However many benefits have come around, there are as many negative factors that have affected my personality. As described above, I am always affected by my social anxiety as well as always wanting to be in isolation as a result.
The people who have shaped my personality the most over the span of fifteen years are my parents. I have never acquainted myself with others during my schooling career, in which I would always join friend groups since I would be able to blend within the mix. My mother has allowed me to become more diligent over the span of a few years thereby allowing me to become more vulnerable as well as being independent. My mother also got me in the habit of practicing mindfulness and meditation--since she is a Zen psychologist. This in effect has also improved my mental health. As for my father, he would always follow up with my mother on such activities since he had also experienced loneliness in his working environment. While both myself and my father were going through such rigorous training, we were able to improve upon ourselves as well as monitoring each other during the process.
While I have many similarities to that of my father, my personality type closely resembles that of my mother. This is so since we both have similar mindsets and ideologies, her art also closely resembles that of my own. All the more, she developed in a similar form and fashion to that of my upbringing in which she also had anxiety in abundance while eventually being able to overcome such factors--a process that I have endured myself.
I believe that my anxiety is deeply rooted in the essence of who I am as a human being which has been given to me by both my mother and father. Both experienced separate levels of trepidation, one had social anxiety while the other was agoraphobic for a time. Another factor rela.
Make a list of your own personality traits and then address the .docxBetseyCalderon89
Make a list of your own personality traits and then address the following questions:
How much, if at all, has your personality changed from the time you were in elementary school?
What specific people and/or events most shaped your personality over the last fifteen years of your life?
In terms of personality, which parent are you most like—your mother or your father—and in what ways?
After you consider these questions, discuss how, if at all, your answers may help to shed light on the “nature” versus “nurture”
repond. no1
Since my elementary school career, I have drastically changed as a result of being exposed to more anxiety-provoking tasks. My personality has thereby been affected in a number of ways due to the aforementioned prospect. I have since become more organized and artistic due to my increasing creativity--since I have efficacy in visual arts. I have also become more mature, since I am always paying attention to my surroundings and what other people are thinking of me. However many benefits have come around, there are as many negative factors that have affected my personality. As described above, I am always affected by my social anxiety as well as always wanting to be in isolation as a result.
The people who have shaped my personality the most over the span of fifteen years are my parents. I have never acquainted myself with others during my schooling career, in which I would always join friend groups since I would be able to blend within the mix. My mother has allowed me to become more diligent over the span of a few years thereby allowing me to become more vulnerable as well as being independent. My mother also got me in the habit of practicing mindfulness and meditation--since she is a Zen psychologist. This in effect has also improved my mental health. As for my father, he would always follow up with my mother on such activities since he had also experienced loneliness in his working environment. While both myself and my father were going through such rigorous training, we were able to improve upon ourselves as well as monitoring each other during the process.
While I have many similarities to that of my father, my personality type closely resembles that of my mother. This is so since we both have similar mindsets and ideologies, her art also closely resembles that of my own. All the more, she developed in a similar form and fashion to that of my upbringing in which she also had anxiety in abundance while eventually being able to overcome such factors--a process that I have endured myself.
I believe that my anxiety is deeply rooted in the essence of who I am as a human being which has been given to me by both my mother and father. Both experienced separate levels of trepidation, one had social anxiety while the other was agoraphobic for a time. Another factor relates to my emotional intelligence, which was inherently given to me by my mo.
Make a list of people you consider to be your close friend. For each.docxBetseyCalderon89
Make a list of people you consider to be your close friend. For each, identify ways that they are culturally similar to and different from you. Then form groups of four to six students and answer the following questions. Select a recorder for your discussion so you can share your answers with the rest of the class.
- Do people generally have more friends who are culturally similar or different from themselves?
- What are some of the benefits of forming intercultural friendship?
- In what ways are intercultural friendships different or similar to friendship with people from the same cultures?
- What are some reasons people might have for not forming intercultural friendship?
.
Make sure questions and references are included! Determine how s.docxBetseyCalderon89
Make sure questions and references are included!
Determine how scareware has become a serious threat and why you believe end users often fall victim to this form of hoax.
From the e-Activity, discuss the different famous malware threats, the specifics of each threat, how they worked, why they were or weren’t successful, and how they were eventually defeated. Compare and contrast the two selected malware threats and explain which you believe was the stronger threat and why.
Consider the need for education in protecting against all types of malware. Determine whether or not you believe security departments are properly educating employees on common threats.
Determine whether or not you believe bit torrent sharing networks are a breeding ground for Trojan proliferation and if so, suggest what can be done to mitigate the risks. Justify your response.
Describe the technical and security considerations that should be taken in account when migrating a Web-based e-Commerce application from development to the production environment. Explain the significance and type of testing that would be performed in this scenario.
From the e-Activity, select one of the retail payment systems laws and describe their application into Web-based security. Determine the challenges this presents to U.S. companies in an international context.
.
Major Paper #2--The Personal Narrative EssayA narrative is simpl.docxBetseyCalderon89
Major Paper #2--The Personal Narrative Essay
A narrative is simply a story. A personal narrative is a true story, focusing largely on the writer’s own life.
For Essay #2, the Personal Narrative, you will be writing a short essay (at least 3-4 pages in length) about a significant event in your own life. This event need not --and probably should not--be inherently, overly dramatic. Sometimes the most influential moments in our lives are smaller moments, events that we may not recognize as influential until years after the experience. In the personal narrative essay, you will want to tell the story as accurately as you can—search your deep memory—and tell the story from your own perspective. You will also want to exercise your selectivity as a writer, choosing to summarize background information/exposition, and really dramatize important scenes for the reader.
During the course of this unit, you will want to read the examples of the Personal Narrative in Chapter 2. You will want to start brainstorming ideas for your own personal narrative, and--by the end of Unit 5--you will want to have selected a significant event that you wish to focus on in this essay.
INSTRUCTIONS:
Elements of Story: Plot, Character, Setting, Dialogue The following four terms (plot, character, setting, and dialogue) are the four major elements of story. In other words, these are all essentials for your personal narrative.
1.) PLOT: A plot is a pattern of events or actions that lead to a change in a character or situation. In the case of this assignment, the plot of your essay should be limited to a key event or series of events that actually occurred in your real life, and resulted in some sort of change in your character, your relationships with others, your worldview, or your situation. Plot also always includes some kind of tension or conflict. This conflict may be external, between two people (for instance, a fist-fight with your brother, or a disagreement with your mother). In contrast, the conflict may be purely internal (for instance, a conflict between what you desire and your sense of morality). By the end of your essay, we should have some sense that the conflict has been dealt with somehow, if not entirely resolved.
2.) CHARACTER: A character is any person depicted on the page. We often think of characters in terms of fiction, characters “made-up” or “invented” by the author to further the story or illustrate a point. Even in fiction, however, characters are often based on real-life people. In your narrative essay, you yourself will become a character—even though you must remain true to the facts of your life, personality, etc.—just because you will be reproducing yourself on the page. As a readers, we’ll want to get a sense of who you are as a character on the page in the course of your essay. By the end of the essay, we will also want to know why/how your experience was significant. How did it change you?
To take it even further, beyond the scope of .
Major earthquakes and volcano eruptions occurred long before there w.docxBetseyCalderon89
Major earthquakes and volcano eruptions occurred long before there were humans on Earth. However, there have been many in recorded history that significantly impacted human civilization. Choose one significant, important earthquake or volcano and report on it. Be sure to cover how it affected the Earth, the damages and death tolls, the economic impact, and any permanent consequences.
Your paper should meet the following requirements:
Be 3-4 pages in length NOT INCLUDING REF OR TITLE PAGE
Cite 1-2 outside sources
APA FORMAT.
.
Major Paper #1-The Point of View Essay Deadline October 29, 2.docxBetseyCalderon89
Major Paper #1-The Point of View Essay
Deadline: October 29, 2015 at 11:59 pm
Purpose:
This paper assignment has several purposes. As the first major paper for this class, the Point of View Essay is designed to re-engage you with the fundamentals of all good writing, including using lush sensory details to show the reader a particular place (rather than tell them about it), basic organization, clear focus, etc. However, this unit does not function as a mere review. The Point of View Essay will also introduce you to the concept of "thinking and seeing rhetorically, and analyzing writing rhetorically"--using the Writer's Toolbox described in this unit to improve your writing and critical reading skills. Finally, the Point of View Essay allows you to reflect on this process.
The Assignment:
1. Pleasant/Unpleasant Description of the Place:
Choose a place you can observe for an extended period of time (at least 20-30 minutes). Use all of your senses (sight, hearing, touch, smell, even taste if possible) to experience the place, and record all of the sensations that you experience. As you record your data, you may wish to note which details naturally seem more positive, negative, or neutral, in terms of tone. (For instance, a stinky and overflowing trash barrel swarming with flies in a nearby alley might seem more inherently negative than a little white bunny rabbit hopping playfully across the lawn.) Then, you will use this information to help your write descriptions of the place: one positive, one negative. Both descriptions should be factually true (same real time and real place), but you will want one description to be positive in terms of tone and the other to be negative. In addition to including the information and sensory details you've collected as the basis for these descriptions, you will also use the Writer's Toolbox to create your two contrasting impressions for this assignment. (The Writer's Toolbox is explained in the Lecture Notes section of this unit.) As you revise and refine your descriptions, please be sure you are "showing" your readers your place (really putting the readers "there" in the moment and in this scene), rather than simply "telling" them about it. You will also want to try to eliminate unnecessary linking verbs as much as you can, incorporating verbs that show "action" whenever possible.
2. Rhetorical Analysis:
Looking back at your descriptions, analyze how you created these two very different impressions of the place (one positive, one negative) without changing any of the facts. How did you make your place seem so positive in one paragraph and yet so negative in the other paragraph, without changing the facts? Discuss how you incorporated each of the tools from the Writer's Toolbox, and cite examples of this from each of your descriptions. (This analysis should be at least 400-500 words in length.)
3. Reflection:
In one to two paragraphs, cnsider at least one of the following questions.
Maintenance and TroubleshootingDescribe the maintenance procedures.docxBetseyCalderon89
Maintenance and Troubleshooting
Describe the maintenance procedures planned for the proposed network, including a schedule of maintenance activities and the steps required for each activity.
Identify the network operations that will be monitored, the information that will be gathered, and the meaning of the information as it relates to potential system problems.
List at least 3 potential network problem scenarios, and identify the troubleshooting procedure that will be used if this scenario occurs.
.
Maintaining the Loyalty of StakeholdersTo maintain political, gove.docxBetseyCalderon89
Maintaining the Loyalty of Stakeholders
To maintain political, governmental, staff, and patient loyalty, the healthcare organization must provide a sense of organizational stability and view of the legislative landscape. In Chapters 14 and 15 we have researched and investigated the need to align both public opinion with staff trust. The political landscape is the basis for healthcare policy, guidance, state, local, and community support (both fiscal and legal) engaging in political trade-offs to stabilize the healthcare industry (such as in the cost, pharmaceuticals, insurance premiums, and organizational ROI in the healthcare industry). Healthcare organizations must provide the necessary guidance and advocacy for stakeholders in the setting of both state and federal legislature as a voice of reason, authority, and integrity. Provide information on the following:
Research a policy associated with the Affordable Care Act in your home state or another state that may affect healthcare reform and/or the way health care is provided in the chosen state.
Describe the policy and who wrote and/or promoted the policy legislature (provide statistical data).
What are the trade-offs offered to bring balance to the healthcare stakeholders?
What role have public perception and disinterestedness played in the valuation of healthcare performance?
Describe how process innovation, risk taking, health policy analysis, and governance “sense-making” provide balance for stakeholders.
Your paper
Must be 4 double-spaced pages in length (not including title and reference pages) and formatted according to APA style as outlined in the Ashford Writing Center.
Must include a separate title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must use at least four scholarly sources in addition to the course text.
Must document all sources in APA style as outlined in the Ashford Writing Center.
Must include a separate reference page that is formatted according to APA style as outlined in the Ashford Writing Center.
Carefully review the
Grading Rubric
for the criteria that will be used to evaluate your assignment.
.
Macro Paper Assignment - The Eurozone Crisis - DueOct 22, 2015.docxBetseyCalderon89
Macro Paper Assignment - The Eurozone Crisis - Due
Oct 22, 2015 1:00 PM
Principles of Macroeconomics Section 602 Fall Semester 2015
Macro Paper Assignment - The Eurozone Crisis
Due Oct 22, 2015 1:00 PM
Starts Aug 19, 2015 12:59 PMEnds Oct 22, 2015 1:00 PM
The EURO (€), was introduced as the official currency of the European
Union (EU) on January 1, 1999 and launched as ‘legal’ tender January 1, 2002.
To date, it is the official currency of 18 member states (aka EUROZONE)
and pegged to other currencies used by over 210 million people worldwide.
Title:
●
What is the Eurozone Crisis?
●
What measures have been used/suggested to resolve the crisis?
●
What are the effects of the measures implemented?
Paper Requirements:
ü
Minimum of
Four
pages (top to bottom), double spaced, neatly typed.
ü
Attach an additional page for bibliography/work cited.
ü
Bibliography references should be
four or more
.
ü
Include introduction and conclusion;
NO Wikipedia
please!
ü
Submit via the
Dropbox
functionality on icollege.
ü
Submit a
hardcopy
in class on designated date.
.
Macromolecules are constructed as a result of covalent forced; howev.docxBetseyCalderon89
Macromolecules are constructed as a result of covalent forced; however, they cannot contribute to the functions of a living cell...!!!
Macromolecules are constructed as a result of covalent forced; however, they cannot contribute to the functions of a living cell without non-covalent forces.
Using a macromolecule such as a protein as an example, explain the statement above.
.
M7A1 Resolving ConflictIf viewing this through the Assignment too.docxBetseyCalderon89
M7A1: Resolving Conflict
If viewing this through the Assignment tool, click the title above to go to the Submissions area.
Resolving Conflict
The Orbe and Harris (2015) textbook identifies the Ten Commandments for Racial and Ethnic Harmony of the Baha’i faith (
p
. 265). The Martin and Nakayama (2014) textbook provides tips on building intercultural skills (
p
. 251-252). Based on the reading, Module 7 web links, or other resources, develop your own list of recommendations for preventing or resolving conflict between people of different cultures, races, ethnicities, sexual orientations,
etc
. Once you have made your recommendations, discuss how one might apply your recommendations.
Your essay is to be written using Microsoft Word or Open Office (freeware found at
Apache OpenOffice
).
Submit your paper using the assignment dropbox.
Paper requirements:
250—300 words
Double-spaced
APA
writing conventions
Your research should be documented by citing one or more credible sources such as a newspaper, a biographic article, book, or website.
.
Madison is interested in how many of the children in.docxBetseyCalderon89
Mad
i
son
i
s i
nt
erested in how many of the ch
i
ldren in her schoo
l
come
from sing
l
e-parent, intact
,
and blended families. What method of
resea
r
c
h
would she use?
correlationa
l
quasi-exper
i
mental
experimenta
l
desc
r
i
ptive
.
Main content areaBased on the readings this week with special at.docxBetseyCalderon89
Main content area
Based on the readings this week with special attention to Tobin’s (2013) article, define what is meant by organizational culture and how it is created, influenced, and changed based on globalization. Provide an example of an organization with which you are familiar (e.g., your gym, church, workplace, or a well-known organization) and describe how that organization has changed, or not changed, its organizational culture due to globalization.
.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Establishing Requirements for a Mobile Learning System H
1. Establishing Requirements for a Mobile Learning System
Helen Sharp, Josie Taylor, Diane Evans and Debra Haley
The Open University
Walton Hall
Milton Keynes MK7 6AA, UK
1. Background
MOBIlearn was a large, multinational European-funded research
and development
project that explored new ways to use mobile environments to
meet the needs of
learners, working by themselves and with others. The aim of the
project was to
develop a new m-learning architecture for a pedagogically-
sound mobile learning
environment, and to evaluate an instantiation of that
architecture using existing
technologies. A user-centred approach was taken to the project,
based on socio-
cognitive engineering (Sharples et al, 2002) and embedded in
ISO 13407. The project
team consisted of representatives from more than 15
organisations from seven
European countries plus one Middle Eastern country.
Establishing the requirements
for such a project was a complex task, involving many methods
and notations. The
2. project produced several documents and results; some of these
are available at
http://www.mobilearn.org. Publications specifically related to
mobile learning are
available at http://iet.open.ac.uk/pp/j.taylor/.
This case study draws only on work from the user requirements
and evaluation
workpackage to explore the use of scenarios throughout the
project and the use of the
Volere shell and template (Robertson and Robertson, 2006) to
document the
requirements.
The next section introduces the three strands used as learning
domains throughout the
project. Section 3 describes the use of scenarios throughout the
project and Section 4
discusses the use of Volere shells and the technology to support
them. In Section 5 we
conclude by making some observations about our experiences.
2. The three strands
The project chose three learning domains to drive the research,
each of which
represents a distinct learning situation. These are: the Museum
strand, the MBA
strand and the Health strand. Data gathering for establishing
requirements was
conducted by a different project partner, each strand used
different data gathering
techniques, and each produced its own set of requirements
which needed to be
rationalised. The three strands and their respective data
gathering techniques are
3. outlined below.
http://www.mobilearn.org/
https://oufe.open.ac.uk/exchweb/bin/redir.asp?URL=http://iet.o
pen.ac.uk/pp/j.taylor/
Museum strand
This strand typifies informal learning and concerns visitors to a
museum. Museums
are the mechanism through which we research, interpret and
present our insights into
the natural and cultural worlds. They represent our belief
systems concerning cultural
inter-relationships, our relationship with the environment and of
our place in the
Universe.
Wireless technology is becoming a part of the museum
experience. In an effort to
bring art and science to life for a new generation of technically
sophisticated patrons,
an increasing number of museums are experimenting with
advanced mobile
technologies to make museum going more interactive, more
educational — and more
fun.
Newly emerging portable device and wireless network
technologies have the potential
to significantly enhance the experience of a visit to a museum.
On the exhibit floor,
visitors carrying wirelessly connected devices can be given
opportunities for
exploration, sharing, explanations, context, background,
4. analytical tools, and
suggestions for related experiences. In addition, conventional
desktop and Internet
technologies can help extend the visit: in advance, through
activities that orient
visitors, and afterward, through opportunities to reflect and
explore related ideas.
Figure 1 Potential users trying an early prototype at the Uffizi
Gallery
These visitors are varied, ranging from children on school
outings to adults with a
passion for art. These learners may have been forced to go by a
teacher or spouse, or
they may be eager to experience as much as possible
themselves. Their motivations
might range from learning just enough to pass the test, to
seeking enrichment and
enlightenment.
The Museum strand gathered data initially through
questionnaires with visitors and
museum staff, then ran field trials with prototypes once they
were available.
Business strand
The second strand represents formal learning and serves
business students, both
novice first year students and MBA (Master of Business
Administration) students.
The MBA students are usually highly motivated, extremely
busy, and want value for
their time and money. Novices may be less demanding and need
5. more support
initially, including help in getting around the campus and
meeting other students.
MOBIlearn addressed both of these student types by providing
an Orientation Game
for the novices and a collaborative support system for the MBA
students.
The Orientation Game involves inducting undergraduate
students on their entry into
the university and supports ad hoc, situation based,
serendipitous learning. The
advantage of a game context is that the learning is condensed in
a comparatively short
and intensive period of time. This allows us to observe
requirements and effects more
clearly than if it is embedded in normal student life.
Furthermore, it is assumed that
playing games is an interesting learning approach with its own
value - after all,
gaming is such a fundamental learning style that it is embedded
in the human (and
animal) genes. The game could be undertaken by executive
MBAs; however because
of limited field access we chose to use Bachelor students new to
the University. This
scenario shows the power of ambient learning intelligence in
location-based services.
The second case study, the Case Study Scenario, was tested wi th
“real” executive
MBAs of the University of Zurich. The Case Study Scenario
involves executive MBA
6. students following their studies as they work professionally at
the same time and
covers a teacher-oriented perspective on modern learning. We
chose the form of a
case study because it is the typical learning form of an MBA.
Furthermore it allows us
to link the student’s business experiences with the material of
the case study. The
students have to collaborate with other students and members of
their own company.
This scenario shows the power of ambient learning intelligence
in different learning
locations
The MBA strand observed and interviewed students and
educators to discover
requirements. The requirements ranged from making and
sharing annotations of
PowerPoint slides to remote control of a classroom projector.
Health strand
The health strand is an example of learning on the job. Initially,
we considered several
different themes for the Health strand, e.g. general well -being,
telematics in support of
specialist care, and cancer support. It was not practical to
address all of these areas
and so the health strand looked at the need for periodic training
and updating of skills
for first aid workers. First aiders need occasional reinforce ment
because some time
may elapse between their initial training and an event requiring
a specific piece of
knowledge.
7. There are various information sources targeted at first aid (e.g.
http://www.muslimtents.com/zakihassan/md.htm) which could
be accessed by users
in a real emergency. Whilst such sites are not envisaged in the
MOBIlearn project as
a substitute for proper training or advice from a qualified
medical practitioner, it
would clearly be useful for users to browse such information so
that they would be
prepared if there were no other options available to them. For
example, mountain
bikers might like to have acquainted themselves with how to
react to a possible
broken limb (e.g. don’t try to move the victim) which may occur
in an isolated
location before they leave.
Interactive multimedia medical courseware products have been
developed by others
for first aid training. User-friendliness, consistency and
monitoring of information
update are believed to be key issues for market uptake. Using a
Web/CD product,
citizens will be able to train themselves at a basic level in
emergency medicine, in
addition to more traditional approaches.
The Health strand employed Future Technology Workshops
(FTWs) (Vavoula et al,
2002) with first aiders in a University setting.
3. Establishing Requirements
MOBIlearn used a variety of techniques to gather data during
the requirements
activity. This information fed the generation and refinement of
8. scenarios that were
http://www.muslimtents.com/zakihassan/md.htm
used to inform envisionment, design and evaluation. The
process was very iterative
and these scenarios were, in turn, mined for requirements.
Figure 2 below illustrates the overall process, with the experts
creating the first set of
scenarios which in turn generated the first early requirements
for the system. The
data gathering exercises with users validated these
requirements, produced new ones,
and helped to define acceptance criteria.
Figure 2 The relationship between scenarios and requirements
As requirements were identified, they were captured using
Volere shells (Robertson
and Robertson, 2006) and through a requirements management
database they were
made available for all partners to view and comment upon.
Each of the strands produced a set of requirements, and many of
these overlapped.
Furthermore, each of the techniques was deployed by different
researchers from
various backgrounds, none of whom had used the Volere shell
before. They had
differing views of what requirements should look like. So
requirements sometimes
sounded like goals, e.g., “support the learner in everyday
situations” but did not
9. specify what the mobile system should do to fulfil this
requirement.
So one of the challenges the team faced was to rationalise the
requirements and
identify generic requirements. To do this, use case diagrams
were developed from the
scenarios and were used to compare the requirements emerging
from the different
data gathering activities. We don’t explore the role of use case
diagrams in this case
study, but the generic use case model that was developed in this
way is shown in
Figure 3.
Once a reconciled specification could be developed this was
handed to the technical
partners to implement the relevant services.
Figure 3 Generic Use Case Model
nregistered TRIAL Version
EA 3.51 - Unregistered TRIAL Version
EA 3
nregistered TRIAL Version
EA 3.51 - Unregistered TRIAL Version
EA 3
10. nregistered TRIAL Version
EA 3.51 - Unregistered TRIAL Version
EA 3
nregistered TRIAL Version
EA 3.51 - Unregistered TRIAL Version
EA 3
nregistered TRIAL Version
EA 3.51 - Unregistered TRIAL Version
EA 3
nregistered TRIAL Version
EA 3.51 - Unregistered TRIAL Version
EA 3
nregistered TRIAL Version
EA 3.51 - Unregistered TRIAL Version
EA 3
nregistered TRIAL V
EA 3.51 - Unregistered TRIAL V
EA 3
11. nregistered
EA 3.51 - Unregistere
0.1 Setup
3.1 Data gathering
Maiden and Rugg (1996) recommend the use of a range of
Requirements Engineering
(RE) elicitation techniques. They claim scenario analysis,
prototyping, and RAD are
the best techniques for new systems. MOBIlearn used the first
two of these techniques
in addition to questionnaires, observation, interviews, and
FTWs. However, due to
variations in the user populations, in the environments in which
the research took
place, and time constraints, it was not possible to run all
techniques for each scenario
strand.
3.1.1 The Museum Strand
The museum strand used questionnaires to gather data from
prospective visitors to the
Uffizi Gallery in Florence. One interesting result from the
questionnaires, although
not specific to learning, indicates a desire to be able to make
and pay for reservations
from a mobile device rather than the current system of waiting
in line for hours.
Considering that we were going to create a mobile system in a
museum, we started
with the following information:
12. 1. Users. The system users are a diverse group, covering a large
range of ages,
levels of scientific sophistication and familiarity with
computers and handheld
devices. We wanted to provide personalization and user control
of the
information and services through customization at the levels of
an individual
d
EA 3
n
EA 3.51 - Un
EA 3
EA
3
EA
3
Learner
Learner
group
Educator
0.3 Get Plan
0.4 Moderate
13. Discussion
0.6 Manage
Material
0.5 Post
Comments
0.2 Participate in
organised activ ity
0.7 Produce
Material
0.8 Communicate
Interpersonal
Generic Top level
0.9 Search for
content
0.11 Add Notes 0.10 Get Tool
or a group. The system also needed to support communication
between
visitors.
2. Content delivery. The system needed to support both
synchronous delivery of
content to handheld device at the exhibit and asynchronous
delivery for users
who may not want to absorb a large amount of information on
the spot but
14. prefer to ‘bookmark’ interesting artifacts and browse the web
pages later.
3. Practical considerations. There are issues as to how users can
carry and use
any handheld devices, and how well the devices will survive in
a somewhat
hostile environment. The physical environment is noisy and
bustling. Many of
the exhibits involve whole-body physical action (e.g. spinning
around on
turntables or chasing balls across the exhibit area) and/or
manipulation using
both hands.
4. Initial Requirements. Initial requirements to create an
appropriate mobile-
learning system for museum experiences were:
a. Personal profile,
b. Virtual contextualized maps,
c. Useful information,
d. Simple and complex queries search,
e. Customized information according to users’ preferences in
terms of
interaction modalities, delivery media, and personal interests in
specific topics;
f. Allow groups visiting the museum to stay in contact with
each other
remotely while maximizing each member's museum experience;
g. Control traffic flow for the museum administrator;
h. Display or exchange content;
i. Linguistic and contextualized supporting services;
15. j. Possibility to make notes and comments at every moment of
the
museum visit and on each painting seen.
Two types of questionnaire were created to capture user
requirements; firstly from the
point of view of the tourists and secondly from the point of
view of the museum’s
director.
The questionnaire developed for visitors is available online at
http://www.mobilearn.org/results/questionnaire/questionnaire.ht
m.
Six hundred people were interviewed directly at the Florence
Museums and around
the Castles of the Duchy of Parma and Piacenza, and some filled
in the questionnaire
on-line. A summary of the results is in Appendix 1.
These results were used to develop further scenarios, and
requirements identified in
this process were documented in Volere shells.
3.1.2 The MBA Strand
We identified two main user profiles for the MBA strand: firstly
executive MBAs as
the main target group and secondarily undergraduates. Teachers
are also important
http://www.mobilearn.org/results/questionnaire/questionnaire.ht
m
16. stakeholders, as are administrators, policy makers and
employers. The following
tables illustrate the user characteristics of the main two groups:
Main user group: executive MBAs
Profile: Mature students, professionals or managers, who are
computer literate
Educational
background:
Higher education (at least matura)
Orientation to
learning:
Professional improvement is a goal. MBAs will have paid for
the course,
either themselves or through their company. Their learning will
be
effortful, and they will require value for money.
Motivation: MBAs are highly skilled to self-paced learning, but
very selective in
interest and an entertaining presentation of subject matters is
required.
Conceptions
of learning:
MBAs prefer case studies – learning needs to be active on the
17. job and
instrumental. They want to learn from others.
Assessment: Rarely talked about because disagreement can arise
between teachers and
learners on assessment focus. It is an ongoing source of
conflict. The
question of assessment is particularly important with
groupwork, where
assessment focus can inhibit learning. Companies may also play
equivocal role if requiring access to assessment data.
Secondary user group: undergraduates
Profile: Study beginners, 19 years old
Educational
background:
Coming from school and generally computer literate
Orientation to
learning:
Undergrads want to increase their learning potential. They enjoy
student
life, so they have a variety of mixed goals (some competing).
They may
still have rather passive orientation to learning derived from
school. This
group needs to be motivated.
Motivation: Study beginners are compliant learners, but are
18. lacking intrinsic
motivation, so learning assistance is needed.
Conceptions of
learning:
Learning by content consuming. They are used to a scheduled
learning
Assessment: Study beginners are obsessed with assessment,
because they are very
used to it from school – Their learning strategies are
superficial.
In preparatory interviews for this study, both representatives of
the Zurich Executive
MBA and from industry showed an interest in including support
for alumni into the
MBA strand. Such support would include mobile access to
knowledge sources after
an e-MBA student has finished his or her formal course of
study. The access has to be
provided as a service specifically tailored to the current
situation of the alumni and to
the capability of the mobile device. The alumni's situation
includes context variables
such as his or her knowledge background and his or her
organization's training
objectives. Knowledge sources include learning content and
access to knowledgeable
persons.
19. For the first sub-strand scenario, the Orientation Game,
prototype devices were
developed and used in order to observe the users’ behaviour
with such a system. For
the second sub-strand scenario, observational studies of
students in class, and their use
of technology were conducted.
3.1.3 The Health Strand
On closer inspection, the Health strand posed unexpected
problems. A major issue of
concern to MOBIlearn in the health strand is that in these
scenarios, participants may
be emotionally involved in the topic in a way which may not
apply to the same extent
in other application domains. Learners in the health strand will
have the additional
burden of having to discern appropriate advice, authoritative
information and reliable
sources in situations where they may be worried, possibly
distressed, and possibly
seeking reassurance rather than hard information – or even
seeking to avoid
confronting the reality of the situation they are in, leading them
to accept advice
which is sub-optimal but which they may find more
comfortable. Conversely, there is
also the problem of normally healthy patients believing
themselves to be at death’s
door because they believe they exhibit every symptom in the
medical dictionary!
Drawing on external information sources for first aid, the
following initial
requirements were identified.
20. 1. Users. As with the Museum scenario strand, the system users
are a diverse
group, covering a large range of ages, levels of scientific
sophistication and
familiarity with computers and handheld devices. It will be
important that
users can annotate content, and create their own ‘patient record’
associated
with the aspects of health that interest them, and perhaps create
records for
others (e.g. parents for their children). Users must also be able
to communicate
with other groups or individuals who share the interest.
2. Content delivery. The system will need both synchronous and
asynchronous
delivery of content to the user depending on the kinds of queries
the user
inputs. For example, much medical information needs to be read
carefully and
absorbed over a period of time. Thus, users would need to be
able to download
material for later perusal. However, checking out the calorie
count of a meal,
or obtaining information whilst running (e.g. heart-rate) would
need
synchronous delivery.
3. Practical considerations. The devices will need to be easily
carried, or
clipped to clothing if the user is engaged in a sporting activity
using other
monitors. The screen displays for this kind of use would also
need to be
simple enough to access whilst engaged in activity.
21. 4. Initial Requirements. Initial requirements to create an
appropriate mobile
learning system for health were:
a. Personal profiles
b. Useful information and support for interpreting certain kinds
of
information
c. Possibilities for communication with an expert
d. Access to emergency services
e. Customized information according to users’ preferences in
terms of
interaction modalities, delivery media, and personal interests in
specific topics;
f. Simple and complex queries search,
g. Allow groups and individuals to stay in contact with each
other
remotely in real time
h. Display or exchange content with members of the group
i. Possibilities to make note and comments on content or
communications
j. Access to monitoring methods either through such systems as
the Body
Area Network, or linking through other means using mobile
devices
22. k. Access to scientific data regarding food science, sport
science, health
levels of exercise, optimal heart rate etc.
l. Lightweight devices
m. Long battery life
n. Some form of global positioning in cases where users may be
isolated
(e.g. in the case of sports and fitness training).
The main data gathering technique used in the Health Strand
was Future Technology
Workshops (FTWs), which were run with first aiders in a
University environment.
The Future Technology Workshops (FTWs) approach focuses on
analysing current
user activities and tools whilst at the same time envisioning the
future integration of
technology and activities. In practice, the FTW method
involves the organisation of
practical workshops in which targeted users or representative
user groups are
encouraged to explore and explicate both current and future
activities and tools
involved in their operational context.
Two FTW workshops involving first-aiders in a University
setting were organised
during which users were encouraged to interact with various
types of “low-tech” and
“hi-tech” artefacts to produce models of an envisioned future
system for use in first-
aid activities. Following this modelling, participants gave
23. presentations of produced
models so as to commentate on the operational functions and
interface features of
produced models.
During the two FTW workshops data was recorded using the
following:-
• Video recording of practical modelling activities using video
camera
This included the audio capture of pre-modelling discussions,
thereafter audio
presentations of produced models involving role-play.
• Audio recording of group discussions whilst modelling
Audio recording machines and tapes were used to capture verbal
discussions of
participants whilst they produced models and gave
presentations.
• Handwritten notes
Observations were made by assistants monitoring user
interactions during
workshop activities. Assistants prepared handwritten notes on
various aspects of
their observation and interpretation of user behaviour and
comments whilst
producing models.
• A minidisk audio recording
A minidisk captured computer compatible audio recording of
verbal discussions of
participants whilst producing models and when giving
24. presentations.
After each workshop, the recordings were transcribed for
analysis. A colour coding
mechanisms was used to identify operational functions and
interface features of
envisioned tools and future activities. The definition and use of
the term ‘tool’ in this
analytical process was informed and grounded in MOBIlearn
about human activities
and pedagogy i.e. activity theory. In this respect, the activity
theoretical notion of
‘tools’ embodies both physical tools used to perform human
activities, for example a
pencil for writing, a fork for eating or a bandage for stopping
bleeding on an injury.
In addition to this, activity theory recognises the conceptual
aspects of tools through
their mental mediating capacities, therefore a tool can also be
defined as a plan, a
formula or operational steps e.g. the first-aid ABC routine for
assessing an injured
person and context of the incident.
An extract from the requirements identified as a result of the
FTWs is in Appendix 2.
3.2 Using Scenarios
MOBIlearn partners generated and drew upon scenarios for each
of the strands
described above throughout their activities. Scenarios were
initially used to simply
envision the future system in order to inform design, but as the
project progressed, the
role of the scenarios grew to encompass
25. (i) relating system design and implementation to pedagogy by
providing a
common frame of reference for developers and pedagogic
experts;
(ii) through a process of refinement, defining the evaluation
strategy for the
user trials; and
(iii) allowing us to keep the user at the heart of the development
project.
Thus, scenarios provided a coherent focus for technical,
pedagogic and user-centred
partners and helped to resolve the difficulty identified by Taylor
(2004) of how to
bring together the relatively high level issues of pedagogic
evaluation and the more
technical user-centred system evaluation.
We began to use scenarios in the project to fulfill a dual
function. The first was to
assist in the process of ‘envisionment’ (Carroll, 1995) of the
mobile learning
environment. An example of these initial scenarios is shown in
Figure 4. The second
was to begin considering basic requirements to enable us to
progress towards data
gathering with users that will provide us with user requirements
in the user-centred
context (see the initial requirements lists in Section 3.1 above).
The first phase of our activity was to invite all members of the
consortium to
contribute scenarios, primarily for the purposes of
envisionment, but we also wanted
26. to scrutinise the scenarios to see which might be suitable for
development towards the
evaluation user trials. Twenty-seven scenarios were submitted,
3 within the Health
strand, 9 within the MBA strand, 11 within the Museum strand
and 4 outside of these
categories.
We next examined these scenarios to identify the basic
requirements for mobile
learning, and to pull out the common elements across all three
strands. For example,
from the list of initial requirements in 3.1.1 and 3.1.3 above,
common requirements
for the Museum strand and the Health strand were the need for
personal profile,
communication, and simple and complex queries (among
others). This gave us a
general top-down view of the essential elements of a future
mobile learning
environment, as identified by informed experts.
First aid for burns in isolated location
A group of summer visitors are located in a small island. During
cooking, some boiled water spills on
the hand of one of the holidaymakers (Helen). The group has
some medical supplies with them, but
nobody knows how to use them, or how to treat burns. Moreover
they have no idea of how to get
access to medical help immediately if the situation becomes
critical. However, at the moment, Helen
seems OK and the pain is not too much.
27. John, a member of the group, uses his personal assistant (PA)*
to chat with 166 (the authority for
emergency health care). 166 just upgraded the call centre to
allow enhanced chat operations with
people needing help and for emergency situations. There are
also several specialized doctors located at
various hospitals that could be involved.
John communicates with 166 and exchanges some textual
messages with an agent of the call centre to
explain the situation. The agent identifies a doctor specialized
on burns available on line and involves
him in the chat session. The doctor needs more visual
information. Fortunately John has a PA equipped
with a camera and immediately takes a snapshot of Helen’s
hand. Then he transmits the picture to the
enhanced chat session. The doctor suggests that it is not a
critical situation and provides some
directions of how to use the available medical supplies to take
care of Helen’s hand.
Finally the doctor suggests that the next day a doctor should
have a look at Helen’s hand, and
disconnects from the session.
*The personal assistant is a small handheld device that allows
retrieval, viewing and information
processing and also communications with other people.
Figure 4 An ‘envisionment’ Health scenario
Unfortunately, all of the Health scenarios generated at this time
had several
disadvantages, and Figure 4 illustrates this well. Firstly, it
raises important social
issues – for example, the ethical question as to whether
28. diagnosis should be made at a
distance like this on an unknown patient. Ascertaining the level
of shock, for instance,
might be hard, or establishing whether there are any possible
confounding factors for
the diagnosis which wouldn’t be evident from a transmitted
picture of a hand.
Secondly, it deals with an emergency situation (which is not
easily replicable) and
involves a range of services which do not currently exist.
Thirdly, no learning takes
place within the scenario, and since we were building a
pedagogically sound mobile
learning environment, this was a drawback.
Another suggestion was a scenario in which first aid advice is
provided on a personal
digital assistant (PDA), which raised worrying visions of a first-
aider trying to
perform CPR whilst fiddling with the PDA to access the next
screen of information.
To overcome this, in the Health strand, we focused on training
scenarios such as the
one in Figure 5.
A training programme for first-aid workers
At the Open University, Gill is a member of the first-aid team.
She, and others in her group, have
recently complained to their team leader that although they have
regular skills updating classes and
assessments, in between times, they have little or no
opportunity to practise their skills if no first-aid
emergencies arise. They therefore often forget what they know
due to lack of opportunity to embed
29. their skills. The team leader decides to run a ‘First Aid Skills
Week’. During this week, Gill is asked at
all times to carry her mobile device (phone or PDA) which
connects via the wireless local area network
to the leader’s office, which can receive and transmit text,
photos, video and audio.
Throughout the week, the team leader runs a competitive quiz –
first aiders are sent quick questions
related to their first-aid manual. Who can reply most accurately
in the shortest time? This is just a bit of
fun, but gets everyone into the mood for other more substantial
activities.
One day, Gill receives a picture of a first aid event (e.g. a
person is lying on the ground, face down, in a
kitchen area, with some split fluids on the floor around the body
– the person appears to be
unconscious). The picture is accompanied by a text message
asking her to scrutinise the picture, and
file an initial assessment with the leader as to what needs to be
attended to in the environment, using
her mobile device. Gill looks carefully at the picture – she notes
that (apart from the obvious body on
the floor) there is a gas cooker in the room – is it switched on
but not lit, she wonders? is the person
holding any electrical equipment? what are the fluids on the
floor – water? blood? chemicals? vomit?
Gill notes that there are no electrical cables or equipment near
the body, so she make the preliminary
assessment that it is not a case of electric shock. The kettle, the
toaster and the microwave are on the
worktop, are plugged in and are upright. There is an upturned
30. mug on the floor beside the body, so Gill
decides that the split fluid is coffee or tea. However, she is not
sure about the cooker. She texts for
further information from the leader – is the gas switched on but
not lit? Yes, it is, replies the leader. So
Gill files her assessment with the leader, adding that the gas
should be switched off, no electrical
equipment must be switched on (not even lights); she must open
windows wide, and then she can
proceed to attend to the person on the floor who has inhaled too
much gas. She would follow standard
ABC procedures with that person.
The leader is pleased with Gill’s initial assessment, but notes
that it differs from Peter’s, another first
aider participating in the exercise. She suggests that Peter and
Gill communicate with one another
about their interpretations of the scene. They need to agree on a
procedure. Peter had noted that the
coffee or tea may have been hot when spilt, so was expecting
some scalding, which he surmised had
caused the casualty to faint. He had not noticed the gas cooker.
He and Gill communicate with each other about the scenario,
and reach an agreement that incorporates
Gill’s observation about the gas, but also that they must take
care in moving the patient because there
may be scalding.
The team leader decides to open the scenario and Gill and
Peter’s assessment to the wider team. All
members of the team are requested to join a group discussion
where they comment on the assessment
and offer further advice.
The team leader notes that neither Gill nor Peter had indicated
31. that they needed to liaise with anyone
else in dealing with the scenario emergency. The group signs
off.
Shortly afterwards, Gill receives a message asking her to
continue with the scenario – a first aid
dummy is to be found in Room GC 220 - but to activate the
relevant support that would be needed. Gill
starts running to the ‘emergency’ using her mobile device’s
context awareness system as she goes to
see who else is around in the building near to GC220 to give her
a hand – Ann is on the next floor, so
she communicates with her using an emergency protocol. Ann’s
mobile device bleeps, and provides
her with information as to where Gill is. She runs to the room
too, and observes Gill undertaking CPR
on the dummy. She quickly ascertains from Gill what the
situation is, and, staying outside the room,
activates the emergency services number on her mobile device
which connects her to the team leader
who is acting as the emergency service. The team leader
behaves as the real emergency services would,
asking Ann for the necessary information an ambulance service
would need to arrive quickly at the
scene with the correct equipment.
The exercise is complete, and the team leader congratulates
Gill, Ann and Peter on their assessment
and actions, and invites the whole team to sign back on to the
group discussion to debrief themselves
on the handling of the scenario. Gill makes notes of her
experiences with the scenario, noting that she
wasn’t really very quick at using the context awareness system
– she needs more practice at that – she
notes that its difficult to use your mobile device when running.
She also finds information about the
32. treatment of scalds which she shares with the group. Peter
realises he needs to be more careful in
scrutinising scenes before acting, as he could have suffered ill
effects from the escaping gas, or turned
the light on, which might have caused an explosion. Several
other first-aiders confess that they hadn’t
noticed this aspect of the scene either. Gill, Peter and Ann are
requested to submit a report of their
experience to the group as the final part of the exercise.
Figure 5 An example scenario from the Health strand
Whilst this scenario was satisfactory from the point of view of
the pedagogic experts,
it was still not sufficiently detailed for either the technical team
or the evaluation team
– it was too high level, and there was a great deal of room for
conjecture as to what
the actual system might be to support the activities described.
This produced a slight
impasse in the design process because the pedagogic experts
and evaluation experts
felt they couldn’t be much more specific, whilst the technical
teams felt that they
didn’t have enough information to proceed. The piece of the
jigsaw that was missing,
however, was the relationship between activities of the
participants and the expected
activity of the system.
It was important, therefore, that the links between services and
requirements, and
between requirements and testing / evaluation were identified
by the decomposition
33. activities carried out as part of the final test instantiation, and
in this process, further
documentation was required which mapped from scenario
activity, through sub-
activities to system services and the expected system response
(see Figure 6).
Scenario Activity Sub-activities System Service Expected
system
response
…
Notification of quiz
TL sends message to all
the TPs informing of the
imminent quiz and the
procedure they should
follow.
…
1.Log on to system
2.Select group of
users
3.Enter text
message
34. 4.“send” message
...
MD_PDA-25
MD_PDA-26
MD_PDA-16
…
Login page displayed.
Correct login displays
main menu
List of users / groups of
users is displayed
Allows selection of target
group
Place to enter text is
displayed Option to send
text
Figure 6 Extract from scenario description matching participant
activities with
system services
The method of successive refinement we used for these
scenarios has much in
35. common with the approach to scenario development described
by Cugini et al (1999).
We would, in effect, move from the high-level descriptions
through to fully specified
scenarios, and eventually arrive at a level of description close
to a scripted scenario.
As the level of detail became more specified, the technical team
would be able to
comment on the technical feasibility. We defined our own
terminology as follows:
• Agreed scenarios are a set of scenarios which project members
agree to work
with intensively. These capture the expertise of partners with
experience of
teaching and learning. Because the scenarios provide a context,
pedagogic
considerations can be developed, and are embedded into the
envisaged user
activities of the scenarios from an early stage.
• Test scenarios developed from the agreed scenarios go into
more detail,
specifying even more details of context, content and tasks.
• Instantiated scenarios locate the activities in a real place (e.g.
the Uffizi
Museum in Florence, Italy). These scenarios provide the
structure of the user
trials.
Figure 5 represents an example ‘agreed’ scenario, in that the
partners all agreed to
work with it. It also represents a ‘test’ scenario in that it was
36. feasible to refine it for
use within the user trials context. Not all ‘agreed’ scenarios
were also ‘test’ scenarios
as some of them could not be instantiated. Figure 6 represents
an extract of an
example ‘test’ scenario.
The scenario development process took place collaboratively
between the relevant
teams. In this case, between system developers; pedagogic and
domain experts; and
requirements and evaluation leaders (see Figure 7).
Figure 7 The scenario development process
This allowed work to progress in parallel – whilst the pedagogic
and evaluation teams
could discuss what tasks the learners would be engaged in, the
system developers
were able to identify some system requirements, and begin
organising their approach
to implementation of the system. This breaks the deadlock of
no-one being able to
move because they are waiting for output from other teams.
4. Documenting requirements using Volere
The project used Volere shells to document the requirements it
identified (see Figure
8). The team developed a database to capture the evolving
requirements, and to allow
all project partners around the world to view and edit them.
Using the Volere shell
had a number of advantages (Sharp et al, 2003):
1. As all requirements were documented using this format we
37. had consistent
information for each requirement together with traceability
information to
track where the requirement originated, and where it appears in
later
documentation such as UML diagrams.
2. Having requirements documented in a consistent manner
facilitated the
identification of common requirements across scenario strands.
3. The format is clear and simple to follow.
4. The format encourages the originator of a requirement to
study the detail of
the requirement (description), to justify it (rationale) and to
consider how it
relates to other requirements (dependencies/conflicts).
5. Completing the 'Fit Criterion' field requires the originator to
think about how
the requirement can be tested or evaluated. This fed directly
into our
evaluation activities and supported the work there.
6. Volere shells were stored in a database for easy search and
retrieval. As the
number of requirements grew, the database was updated.
Figure 8 The Volere shell used to document requirements
4.1 Adapting the shell
38. Although the shells appear to be straightforward, the time
commitment required to
complete the shell is not negligible, and our researchers
frequently found it difficult
and time consuming. If we were to convince them to persist
with the requirements
activities, we needed to adapt the shell to suit the purposes of
the project, and to
encourage people to use it. In response to user feedback, we
added two extra fields to
the database template for the shell: status and title. The status
field allows researchers
to look at requirements in various states of completion, e.g., all
requirements in the
process of being refined. The title gives a short description that
is useful for quick
review of all the requirements. These simple additions helped
enormously to locate
particular requirements.
The database, with this front end, enabled our partners across
Europe to inspect the
requirements so far, and to create or modify entries as and when
they were able to
work on them. In principle, the idea was that this would prevent
a bottleneck, as all
partners who asked for access could have it, and it supported
the idea of distributing
responsibility for requirements across all members of the
project. Furthermore, the
requirements contributed became a common resource that all
could inspect, so
discussions could take place around specific requirements and
39. their development. It
was hoped that this would make the task of refining initial
attempts easier.
4.2 Adapting the template
The initial version of the database was based on the Volere
template’s 27 types of
requirements (see Figure 9). We found that it was
straightforward to store a
requirement and assign one of the 27 Volere categories. In
addition, we found that
some categories fitted our needs well. For example some first-
aiders wanted a feature
that would immobilise an injured person. Inventing such a
technology is not part of
the mandate of the project, but we did not want to lose track of
any requirement and
so used the ‘waiting room’ category for this kind of
requirement.
However the stakeholders did not find this categorisation
system helpful for retrieval.
About 66% of our requirements were in one category –
functional and data
requirements - and the 27 categories did not provide useful
search keys. We therefore
split functional and data requirements into separate sub-
categories, but this change did
not make enough of a difference because there were still about
64% of the
requirements in the single category of functional requirements.
This led us to attempt
to sub-categorise functional requirements as a means to improve
the organisational
structure of the requirements database. However this attempt
40. revealed how difficult
categorisation is.
Figure 9 Volere’s 27 categories of requirements
Although we tried several categorisation approaches, we found
that the most
appropriate solution for our users was to allow flexible, non-
static, and ad-hoc
categorisations (Haley et al, 2004). Users with appropriate
permission were given
permission to add a new categorisation criterion at any time.
Thus, the database could
be modified easily to reflect new perspectives, decisions,
information, and experience.
For example, at the beginning of the process we set up
categories using the criteria of
Strands (health, MBA, and museum) and of Work Packages
(e.g., learning content,
mobile media delivery, context awareness). After more
experience, we discovered a
need to find all requirements pertaining to a particular service.
Later, partners found
that looking at requirements based on Work Package did not suit
their needs because a
particular Work Package had members from different countries
as well as different
organisations. Partners could then add a new criterion, location,
to the database.
The disadvantage to this method is the need to add an additional
piece of data to every
requirement when a new categorisation scheme is adopted.
41. Mitigating this
disadvantage is that, with a well designed database, the process
of adding data is
straightforward even if time consuming.
This simple idea of providing the ability to modify the
categorisation criteria of the
requirements database enabled it to meet the needs of the many
different project
members throughout the life of the project. It also illustrates
how such a flexible
resource can support the dialectic between requirements and
implementation, each
influencing the other as time progresses.
5. Some example requirements
A project of this size generates a large number of requirements.
Many of them are
implemented on widely available PDAs, i.e. they are not
specific to the goal of
learning, and are commonly available, e.g. requirements
concerned with connectivity,
context-awareness, physical properties and context of use. The
requirements
workpackage attempted to identify requirements more specific
to mobile learning.
The following examples illustrate requirements from each of the
strands, and the
modifications to the Volere shell and the categorisation system
(called classification
below) discussed above. Note that some of these examples
include use case numbers.
We have not focused on the role of use cases in this case study,
but these were
42. generated to help rationalise requirements and to bridge the gap
between scenarios
and implemented services. Note also that, particularly in
Figures 12 and 13, the
number of different classification categories assigned to each
requirement.
Requirement Number 5
Use Case Number(s) 2.12.2
Title Emergency alert function
Requirement Type 1 - Communication
Version 1 Show version history
Identifier R1.04
Description To be able to automatically call for help from
emergency services e.g. ambulance or security
staff
Rationale First-aiders tend to go through several procedures
when attending to an incident e.g. checking
the safety of the area of incident, making sure that the victim is
conscious and breathing safely,
assessing and diagnosing the injury etc. Finally, calling fo
Source FTWs (workshops) held at The Open University
Fit Criterion This requirement will be fulfilled once the system
is able to automatically notify relevant
emergency services when a first-aider is attending to an
44. Requirement
Number
216
Use Case Number(s)
Title Variable privacy
Requirement Type 2 - Administration
Version 1
Identifier
Description Different privacy modes are possible. It can be
anonymous, half-open (nicknames) or open.
Rationale Sometimes learners might only dare to contribute if
they can stay anonymously, in other
situations it might an incentive for learners that they are named.
Source Uni Zurich
Fit Criterion Different modes of privacy are possible
Customer
Satisfaction
0
Dependencies 411
45. Customer
Dissatisfaction
0
Conflicts none detected yet
Supporting
Materials
Initial requirements from Zurich (document on bscw)
History Dirk, 08.07.03 DF: Change of title from "Privacy" to
"Varable privacy"
Miscellaneous
Status
Classifications
Strand (application area the requirement applies to):
• MBA-orientation Game (orientation game for new students)
• MBA-learning (helping MBA students learn)
Figure 11 Example requirement from the MBA Strand expressed
in our
modified Volere shell (as displayed from the database)
Requirement
Number
46. 250
Use Case Number(s) 1.2, 0.1
Title universal login details
Requirement Type 8 - Functionality
Version 1
Identifier FSM
Description The system provides a way to enter and store
universal login details.
Rationale Needed for automatic login.
Source Teija Vainio
Fit Criterion The user can enter and maintain universal login
details.
Customer
Satisfaction
0
Dependencies
Customer
Dissatisfaction
0
Conflicts
47. Supporting
Materials
Final Scenario - Museum Strand p 1
History DTH 31/7/03; added classifications 10/10/03
LAP:Description modified. Irrelevant question
deleted.18/06/04
Miscellaneous
Status draft
Classifications Hardware Platform (hardware to which the
requirement applies):
• Laptop, PDA, smart phone (reqt applicable to all three
platforms)
Media (types relevant to this requirement):
• text (characters)
Service (software service that implements requirement):
• PO_LIS (Login Service)
Strand (application area the requirement applies to):
• Museum (Visiting a museum)
View Point (who cares about this requirement):
• User (reqt stated from the point of view of a user)
WP - involved (involved work package w'out primary
responsibility):
• WP10 (System design and integration)
WP - primary (work package with primary responsibility for
req):
48. • WP7 (Learning content management subsystem)
Figure 12 Example requirement from the Museum Strand
expressed in our
modified Volere shell (as displayed from the database)
Requirement
Number
240
Use Case Number(s) 0.8
Title Audio communication
Requirement Type 1 - Communication
Version 1
Identifier FSH
Description The system must provide a voice channel for users.
Rationale First aiders need to confer with each other for
immediate support during a first aid incident.
Source FTW - Future Technology Workshops at Open Univ
Fit Criterion Users can speak to and hear other users.
Customer
Satisfaction
49. 4
Dependencies
Customer
Dissatisfaction
4
Conflicts
Supporting
Materials
Final Scenario - Health Strand; GBs H06
History DTH 31/7/03; added classifications 10/10/03
Miscellaneous
Status draft
Classifications Media (types relevant to this requirement):
• Audio (sound)
Service (software service that implements requirement):
• CC_ACS (P2P Audio Conferencing Service)
Strand (application area the requirement applies to):
• Health (first aiders)
• MBA-orientation Game (orientation game for new students)
50. • MBA-learning (helping MBA students learn)
View Point (who cares about this requirement):
• User (reqt stated from the point of view of a user)
WP - primary (work package with primary responsibility for
req):
• WP9 (Collaborative learning subsystem)
Figure 13 Example requirement common to two Strands
expressed in our
modified Volere shell (as displayed from the database)
Concluding remarks
This case study has explained
• How scenarios may be used throughout the project to bridge
the gap between
user-centred and pedagogical concerns expressed by domain
experts,
requirements as gathered from user-centred data gathering
sessions, and
technical design issues.
• That it is important to keep the focus of the scenarios on
relevant aspects of
the domain so that the requirements will be appropriate (e.g. in
the first aid
scenarios it was decided to target training rather than
emergency events).
51. • That the Volere shell and template may be modified to suit
project-specific
circumstances, and should not be regarded as a rigid structure
• Some issues faced by members of a large multi-stakeholder
project aiming to
develop technology of the future. For example, that different
stakeholders
have different expectations and needs from a set of
requirements; that different
stakeholders have different views of what a requirement should
look like; that
it is easy for futuristic scenarios to become unrealistic and
unhelpful.
Acknowledgements
We would like to thank all members of WorkPackage 2 of
MOBILearn for allowing
us to produce this case study. In particular, Paul Crowther, Dirk
Frohberg, Elena
Murelli, Daisy Mwanza, Luis Palacios and Giasemi Vavoula.
References
Carroll J.M. (Ed), 1995, Scenario-Based Design, John Wiley
and Sons
Cugini, J., Damianos, L., Hirschman, L., Kozierok, R., Kurtz,
J., Laskowski, S., and
Scholtz, Jean (1999) ‘Methodology for Evaluation of
Collaborative Systems’ The
Evaluation Working Group, The DARPA Intelligent
Collaboration and Vizualisation
Program.
52. Haley, D., Nuseibeh, B., Sharp, H., Taylor, J. (2004) 'The
Conundrum of Categorising
Requirements: Managing Requirements for Learning on the
Move' proceedings of
RE'04, pp.309-314, Kyoto, Japan, 6-10 September 2004, IEEE
Computer Society
Press, ISBN 0-7695-2174-6.
Maiden, N. and Rugg, G. (1996) ‘ACRE: A Framework for
Acquisition of
Requirements’, IEE Software Engineering Journal, 183-192,
May.
Robertson, S. and Robertson, J. (2006) Mastering the
Requirements Process, 2nd edn.
Addison-Wesley, Boston.
Sharp, H., Josie Taylor, Andreas Löber, Dirk Frohberg, Daisy
Mwanza, and Elena
Murelli (2003) 'Establishing user requirements for a mobile
learning environment', in
Proceedings of Eurescom Summit 2003, Heidelberg, 29 Sept to
1 Oct.
Taylor, J (2004). ‘A task-centred approach to evaluating a
mobile learning
environment for pedagogic soundness’, in Attewell J and
Savill-Smith C (eds)
Learning with mobile devices. Learning and Skills
Development Agency ,167 -171
Vavoula, G., Sharples, M., & Rudman, P. D. "Developing the
'Future Technology
53. Workshop' Method," In M. Bekker, P. Markopoulos, & M.
Kersten-Tsikalkina (eds.),
Proceedings of Interaction Design and Children. Eindhoven,
The Netherlands, 2002
Appendix 1: Results from the Museum strand questionnaire
The results are in three sections: personal data, services before
entering the museum,
and services once inside the museum.
1. Personal Data
Of the people interviewed, 54% were male and 46% were
female. From these first
results it is possible to state that:
• The interviewed tourists are part of a relatively young public
(31% between 18
and 25 years old -23% between 25 and 30);
• They visit museums and castles 2 or 3 times a year in their
spare time or
during holidays;
• Almost of all of them (91%) have a mobile phone and 55% of
those have a
Nokia;
• Few people (15%) have a palmtop.
2. Services Accessible before entering the museum
Interviewees were asked to indicate, according to their personal
opinion, the degree of
importance from 1 (not important) to 5 (very important) of the
function and services
offered through the use of mobile technology (mobile
54. phones/palm held computers) in
visiting museums.
The results of this first part of the questionnaire are satisfying:
the tourists find the
services proposed that are accessible BEFORE entering the
museum very interesting
and useful. In particular, 58% rated "booking the tickets in
advance" as 4 or 5, 55%
rated "receiving information about the museum opening times
and any related
changes" as 4 or 5 and 55% rated "viewing the shortest route to
reach the destination"
as 4 or 5.
The services proposed are appreciated by tourists because they
see the possibility to
find their way around an unknown town and they would like to
avoid any type of
inconvenience (changes in the timetables) especially during
their holidays or a week-
end.
3. Services Accessible during the visit at the museum
For this second part, the results analysis highlighted the
following issues:
• The services: "Viewing museum plan", "Planning the visit
according to
personal interest and requirements" and "Reaching the area of
interest as
quickly as possible" made a good impression on tourists. 49%
rated the
museum plan as 4 or 5 in importance, 53% rated planning the
visit as 4 or 5 in
55. importance, and 48% rated reaching the area as 4 or 5 in
importance. Note the
fact that several people expressed doubts about the
transferability onto PDA or
mobile phones of a plan of the museum as mobile devices
screens are small
and maps are usually large.
• Opinions are positive about "viewing a catalogue of works by
a particular
artist" (47% rated 4 or 5) and "understanding the artist‘s
techniques" (53%
rated 4 or 5). Few people want or have time to make notes or
comments during
their visit except for those that visit museums for work or for
study purposes;
• Opinions are very positive on the use of an audio guide (32%
of the persons
interviewed gave a mark of 4 and 32% gave 5) as it is
considered a good
alternative to the traditional guide especially for those that
usually make the
visit alone.
• From a general point of view, it is possible to say that the
tourists interviewed
expressed positive opinions and interests on the use of mobile
technologies
and their applications inside museums.
Appendix 2: Results from the Health strand FTWs
R1: Support Communication
56. Communication for First Aiders is important in a number of
contexts:
• To pass information to others (notify health and safety about
safety hazards,
orally describe location/features, ambulance and emergency
services)
• To consult with/get information from others (emergency
services provide
diagnostic information, OHP staff)
• To (asynchronously or synchronously) contact fellow First
Aiders to exchange
experiences
• To call for help (security for ambulance, First Aider or
emergency staff)
• To trace colleagues (trace paramedics or nearest emergency
centre)
To aid communication, the system should support:
• Automatic transmitting of information (e.g. transmit location
to paramedics)
• Automatic locating and contacting (ambulance services)
• Audio and video communication – enable exchange of audio
and visual
information (e.g. First Aider describes injury and transmits
image)
In terms of technical requirements for the communication
system, the following were
mentioned:
• Microphone and speakers
57. • Video
• Wireless audio communication
• Synchronous and asynchronous means of communication
• Location awareness
R2: Provide Diagnostic Tools
A toolkit that would assist the First Aider in assessing the
situation and making a
diagnosis should be part of the system. Such a kit should
include tools/sensors for:
• Assessing safety of the area around the incident
• Providing First Aider with step-by-step instructions in
producing a
diagnosis/administering First Aid
• Testing vital signs during an emergency
• Monitoring blood pressure
• Checking airways for blockages
• X-ray injuries/photographs of injuries
• Monitoring heart function
• Stabilizing/immobilizing patient
• Checking oxygen levels
• Sensing body temperature
• Detecting fluid
• Providing First Aider with step-by-step instructions in
following ABC
procedure in conjunction with diagnostic functioning
• Checking pupil dilution
The diagnostic toolkit needs to be
58. • Portable, and therefore lightweight
• Applicable on victim’s body to take readings
• Automatically activated (e.g. when lifted up)
• Taking continuous readings to assess patient as situation
progresses
• Location aware
R3: Provide On-line First Aid Manual
The system needs to provide an on-line First Aid Manual that is
easily accessible and
searchable
R4: Provide means for capturing and sharing experiences among
First
Aiders
The system needs to provide the user (First Aider) with a diary-
like facility to capture
their First Aid experiences for future personal use as well as for
future exchange with
fellow First Aiders. The system should incorporate a central
database of personal
experiences that all First Aiders can access as needed. The
information in the diary
could also be used in producing reports.
R5: Provide means for maintaining First Aid kit
The system should be monitoring the First Aid supplies and aid
the user (First Aider)
in replenishing the First Aid kit.
R6: Assist the user/First Aider to maintain practical skills
The system should provide the user with practice exercises and
59. tools like ‘Tip of the
Day’ that aid in revising and maintaining their practical skills.
R7: Non-functional and technical requirements
The following non-functional and technical requirements can be
extrapolated:
• Need for wearable and flexible (hardware) technology
• Central database
• Immobiliser (?)
• Abide by First Aid standards and procedures
• Lightweight, mobile system
• Incorporate sensors/scanners
• Incorporate video/image capturing and transmitting
• Operate on identification/password
• Incorporate alarm
Establishing Requirements for a Mobile Learning System 1.
Background 2. The three strands Museum strand Business strand
Health strand 3. Establishing Requirements 3.1 Data gathering
3.1.1 The Museum Strand 3.1.2 The MBA Strand 3.1.3 The
Health Strand 3.2 Using Scenarios 4. Documenting requirements
using Volere 4.1 Adapting the shell 4.2 Adapting the template
5. Some example requirements Concluding remarks
Acknowledgements References Appendix 1: Results from the
Museum strand questionnaire 1. Personal Data 2. Services
Accessible before entering the museum 3. Services Accessible
during the visit at the museum Appendix 2: Results from the
Health strand FTWs R1: Support Communication R2: Provide
Diagnostic Tools R3: Provide On-line First Aid Manual R4:
Provide means for capturing and sharing experiences among
First Aiders R5: Provide means for maintaining First Aid kit
R6: Assist the user/First Aider to maintain practical skills R7:
Non-functional and technical requirements