Panagiotis Zervas and Demetrios G. Sampson, Supporting the assessment of problem solving competences through inquiry-based teaching in school science education: The Inspiring Science Education tools, Webinar Slides, eTwinning Creative Classroom Group, 28 April 2015
Smart Educational Decision Support Systems for School Complexity Leadership: ...Demetrios G. Sampson
[Keynote Speech] “Smart Educational Decision Support Systems for School Complexity Leadership: A Research Agenda for School Analytics”, EDEN Open Classroom Conference, Ellinogermaniki Agogi, Athens, Greece, 18 September 2015
Panagiotis Zervas and Demetrios G. Sampson, Supporting the assessment of problem solving competences through inquiry-based teaching in school science education: The Inspiring Science Education tools, Webinar Slides, eTwinning Creative Classroom Group, 28 April 2015
Smart Educational Decision Support Systems for School Complexity Leadership: ...Demetrios G. Sampson
[Keynote Speech] “Smart Educational Decision Support Systems for School Complexity Leadership: A Research Agenda for School Analytics”, EDEN Open Classroom Conference, Ellinogermaniki Agogi, Athens, Greece, 18 September 2015
What organisational variables support a positive student digital experience?Tabetha Newman
Talk for ALTC 2018 using Jisc student insight survey data, including factor analysis to identify most important factors in explaining the student digital experience.
Demetrios G Sampson, “Systemic Technology-Supported Educational Development: School Digital Competence Profiling”, in the 7th International Workshop on Educational Design "Systemic Educational Development: Technological and Pedagogical Interweaving", Department of Pre-School Education Science and Educational Design, School of Humanities, University of Aegean, Rhodes, Greece, 22-23 May 2015. [Invited Speech]
Seminario eMadrid/SHEILA sobre "Analítica del Aprendizaje". Iniciativas y pol...eMadrid network
Seminario eMadrid/SHEILA sobre "Analítica del Aprendizaje". Iniciativas y políticas de Analítica de Aprendizaje en Estonia. Universidad de Tallinn. 21/10/2016.
VLN-C AGM 2012 - Primary and Secondary E-Learning: Examining the Process of A...Michael Barbour
Barbour, M. K. (2012, April). Primary and secondary e-learning: Examining the process of achieving maturity. An invited paper presented at the annual general meeting of the Virtual Learning Network-Community, Wellington, New Zealand.
Humanities Center Brown Bag - Examining the Development of Primary and Second...Michael Barbour
Barbour, M. K. (2012, May). Examining the development of primary and secondary online learning clusters in New Zealand. A brown bag presentation to the Humanities Center at Wayne State University, Detroit, MI.
What organisational variables support a positive student digital experience?Tabetha Newman
Talk for ALTC 2018 using Jisc student insight survey data, including factor analysis to identify most important factors in explaining the student digital experience.
Demetrios G Sampson, “Systemic Technology-Supported Educational Development: School Digital Competence Profiling”, in the 7th International Workshop on Educational Design "Systemic Educational Development: Technological and Pedagogical Interweaving", Department of Pre-School Education Science and Educational Design, School of Humanities, University of Aegean, Rhodes, Greece, 22-23 May 2015. [Invited Speech]
Seminario eMadrid/SHEILA sobre "Analítica del Aprendizaje". Iniciativas y pol...eMadrid network
Seminario eMadrid/SHEILA sobre "Analítica del Aprendizaje". Iniciativas y políticas de Analítica de Aprendizaje en Estonia. Universidad de Tallinn. 21/10/2016.
VLN-C AGM 2012 - Primary and Secondary E-Learning: Examining the Process of A...Michael Barbour
Barbour, M. K. (2012, April). Primary and secondary e-learning: Examining the process of achieving maturity. An invited paper presented at the annual general meeting of the Virtual Learning Network-Community, Wellington, New Zealand.
Humanities Center Brown Bag - Examining the Development of Primary and Second...Michael Barbour
Barbour, M. K. (2012, May). Examining the development of primary and secondary online learning clusters in New Zealand. A brown bag presentation to the Humanities Center at Wayne State University, Detroit, MI.
European Perspectives on Learning Analytics: LAK15 LACE panelLACE Project
Panel presentation at Learning Analytics and Knowledge 2015 (LAK15) in Poughkeepsie, NY, USA by a team of speakers from the LACE project.
Since the emergence of learning analytics in North America, researchers and practitioners have worked to develop an international community. The organization of events such as SoLAR Flares and LASI Locals, as well as the move of LAK in 2013 from North America to Europe, has supported this aim. There are now thriving learning analytics groups in North American, Europe and Australia, with smaller pockets of activity emerging on other continents. Nevertheless, much of the work carried out outside these forums, or published in languages other than English, is still inaccessible to most people in the community. This panel, organized by Europe’s Learning Analytics Community Exchange (LACE) project, brings together researchers from five European countries to examine the field from European perspectives. In doing so, it will identify the benefits and challenges associated with sharing and developing practice across national boundaries.
Bett 2016 - Implementing learning analytics in your schoolWietse van Bruggen
Presented at Bett 2016, members of the learning analytics community exchange (LACE) project presented insights into aspects schools should think about when using digital learning materials and tools that have LA capabilities.
Instructional Technology and Local Institutional Cultures (VLC March 2015)UOInTRO
Sharing with our regional Virtual Learning Community--trends in comparator research as well as the results of a group survey about attitudes and perceptions at local institutions.
IFLA ARL Satellite conference 2023: Shadow Information Technology in the adve...IFLAAcademicandResea
IFLA ARL Satellite conference 2023: Inclusiveness through Openness
Presentation on Regional Impact Studies: “Shadow Information Technology in the advent of Open Educational Resources” by Siphamandla Mncube (SA), University of South Africa. Session chair – Theodore Westervelt, Library of Congress.
Satellite conference held at Erasmus University, Rotterdam, The Netherlands, 18 - 19 August 2023.
Five short presentations from a panel session at the Learning Analytics and Knowledge Conference 2015, on the topic of "Learning Analytics - European Perspectives", held at Marist College, Poughkeepsie on March 18th 2015. The speakers are: Rebecca Ferguson, Alejandra Martinz Mones, Kairit Tammets, Alan Berg, Anne Boyer, and Adam Cooper.
The aim of our study is to extract the profiles of students activities, performed during the training sessions of a course of logic networks, and to relate such activities with the students’ performance at intermediate verification tests. In this course, undergraduate students learn and practice the concepts of logic networks with Deeds Simulator.
The Deeds is a set of educational tools for digital electronics, which stands for "Digital Electronics Education and Design Suite". It is used in courses of Electronic Engineering at DITEN, UNIGE.
By applying learning analytics methods to the data captured from activity logs and questionnaires, we aim to understand the learning behavior of students.
This project was presented at Learning Analytics Data Sharing – LADS14 Workshop at EC-TEL.
Strijker & Fisser (2019 06-27) A future-proof curriculum with digital literacySaxion
In November 2014, the State Secretary for Education, Culture and Science of the Netherlands officially launched an online country-wide consultation about the future of Dutch education. Based on the outcomes and the ongoing debate, the Netherlands started the development of a new curriculum framework for primary and secondary education in 2018. One of the new themes in this curriculum is Digital Literacy, which is defined as a combination of ICT skills, media literacy, information literacy and computational thinking. Together with the other subjects (Dutch, Arithmetic/mathematics, English/modern foreign languages, Citizenship, Exercise & Sport, Art & Culture, Human & Nature, Human & Society) Digital Literacy will be part of the design of the new curriculum. A teacher design team for Digital Literacy developed a vision and elaborated this in eight so-called big ideas. Based on the big ideas learning trajectories were designed. These learning trajectories describe what students should learn in primary and secondary education.
Similar to Elin Wihlborg, Mariana S. Gustafsson: Organizing safe on-line interaction and trust in governmental services (20)
The aim of the workshop was to discuss the state-of-art of the Smart City concept and how to translate existing approaches to the reality of the local governments, as well as the institutional capacity for making smarter decisions.
Robert Scholz presented the importance to investigate concepts, which enable the unification and the common understanding and the replication of ICT architectures. He pointed out how to achieve an unified approach which aims to fulfill complex and integrative ICT solutions for Smart Cities. The presented approach aims to base on the idea of openness with 1) respect to interfaces 2)software components and 3) data. It was shown that those are seen as the main ingredient of an ICT eco-system for Smart Cities.
[X]CHANGING PERSPECTIVES:
ENRICHING MULTISTAKEHOLDER DELIBERATION WITH EMBODIMENT IN
PARTICIPATORY SOCIETY presented at the CeDEM17 Conference in Krems, Austria
War Co-Creation vor 10 Jahren noch stark auf den Bereich Wirtschaft beschränkt, so findet sich das Konzept nun auch immer mehr im Bereich der Verwaltung und der Öffentlichkeit.
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen spielen
5 Fragen an Thomas Jost
Lehrender “Geprüfte/r Datenschutzbeauftragte/r”
Department für E-Governance in Wirtschaft und Verwaltung
More from Danube University Krems, Centre for E-Governance (20)
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Elin Wihlborg, Mariana S. Gustafsson: Organizing safe on-line interaction and trust in governmental services
1. Electronic identification in
practice
– a case study of use and organization
of eID in public e-services in schools
Elin Wihlborg & Mariana S. Gustafsson
IEI, Departement of Management and Engineering
Linköping University
2. • To analyse from different perspectives the development of e-
identification (eID) systems at policy level and in practice
• From a social, organizational and technical perspective follow and
critically analyse development processes, implementation and use of
secure eID systems.
• Analyse development processes from early solutions for eID though
currently used eID-systems towards complex federation solutions.
• By analysing e-ID policy-making and practice to develop knowledge
about the meaning of eID for factual and preceived information
security in the private and public e-services.
FUSe:
22.05.13
Our study
3. Based on the presentation and the paper:
Q1 Methodological
a) What assumptions do you perceive I have had in this empirical study?
b) What assumptions are common when studying information security
matters
Q2 Conceptual
a) Discuss what implies the construction of the concept of ’security’ among
the people (citizens) in an organisational set-up (schools), using technical
artefacts (e-ID, ICT, e-services):
o Matter of TRUST (Wihlborg 2011, Melin & Wihlborg 2011, Rothstein 2009 )
o Private/public relation
o Perceived/factual security (Oscarson 2007)
o Matter of IDENTITY (Castells 1997, Wihlborg 2012)
4. eID in Sweden
• Introduced in 2002, 10 years of practice
• Used by the citizens in e-services provided by the
The Swedish Tax Authority, Försäkringskassan,
Landstinget, the local municipality, the banks.
• Security software + BankID or ID card and a device,
based on personal security number, issued by the
BankID, Telia, SEB, Posten, Nordea
• Swedish e-Identification, requirements and symbolic
meaning
5. e aim for the study:
Ø … to present a case study of use of electronic identification to
access ICT platforms in schools in order to analyze security
aspects, organization and potential development of the
platforms.
Ø e user/actor groups:
Ø e Management (school principals)
Ø e Teachers
Ø e Administrators
Ø e Pupils
Ø e Parents
Ø LK Officials
Ø LK IT-coordinators
Ø Other stakeholders (ex. eID agency, other authorities)
22.05.13
6. e Research Questions
Ø What are the experiences of use of secure log in to the ICT
plattfroms and e-services in the schools today?
Ø How is secure log in implemented in the schools today?
Ø How is secure log in to the e-services and the plattforms
perceived by the different users?
Ø What development potential do the users perceive
connected to the secure identification systems in general
and security in particular?
22.05.13
7. Background
• Why study schools
– A large ammount of information, including sensitive information,
passes through, is processed and exchanged among actors in schools.
– ere is a long history of use of ICT plattforms in schools.
– e New Education Act (Skollagen 2011) requires continous follow
up of the student performance and imposes written reporting and
digital Individual Development Plans (skriftliga omdömen, SO och
digital IUP)
– Increasing administration in schools.
• e municipality authonomy
– e municipality administration/organisation vs the schools
administration/organization
22.05.13
8. About 145 000 inhabitants
4th largest city region in Sweden
Base for high technology industries in Aviation, IT and environment
84 schools: 66 primary and 18 secondary schools
Linköpings eVision (2006)
eServices shall faciliatate for everybody to live and work in Linköping
municipality
Digital Agenda (2012)
9. ICT and e-services in schools
FRONTER
DEXTER
SKOLA
24
Schoolso5
Heroma
Extens
LINSAM
X,
Y,
Z
TRIO
• Learning
pla/orm
• SO,
IUP
• E-‐service:
applica<on
for
healthcare,
repor<ng
of
income,
Presence/absence
registra<on,
Skolvalet
• E-‐service
• SO,
IUP
• Presence/abs.
registra<on,
• Personnel
administra<on
• Learning
pla/rom
• SO,
IUP
Pedagogics,
administraFon
&
communicaFon
The
Municipality
core
database
X,
Y,
Z
X,
Y,
Z
• Intranet
10. The Sample
• Based on a preliminary mapping of schools using ICT plattfroms in
the municipality (A total of 84 undergraduate schools: 55 public + 11
private, ’free schools’)
5
schools
(undergraduate
+
secondary)
from
different
geografical
school
areas,
out
of
which:
• 4
public
+
1
free
school
• 3
large
(˃
300
p.)
+
2
small
(˂
300
p.)
Linköpings
municipality
• Educa<on
Adminsitra<on
unit
• IT-‐sub-‐unit
12. Data collection: interviews and focus groups
Ak<vity
Place
Role
Date
Interview
School
1
Principal
2012.11.27
Focus
group
School
1
Teacher
(4)
2012.11.27
Focus
group
School
1
Pupil
(9)
2012.11.27
Interview
School
2
Principal
2012.11.14
Focus
group
School
2
Teacher
(4)
2012.11.14
Interview
School3
Principal
2012.10.30
Focus
group
School3
Teacher
(5)
2012.10.30
Interview
School
4
Principal
2012.12.05
Focus
group
School
4
Teacher
(3)
2012.12.04
Focus
group
School
4
Pupil
(3)
2012.12.04
Interview
School
4
Teacher
(6)
2012.11.06
Interview
School
4
Fronter
administrator
2012.12.04
Interview
School
5
Fronter
administrator
2012.12.05
Interview
The
Municipality
IT-‐coordinator
(2)
2012.10.22
Interview
The
Municipality
System
administrator
(2)
2012.11.07
Focus
group
The
Municipality
Officials
(4)
2012.10.23
13. Data collection: documents
Documents
• Municipal official documents: policy documents,
anual reports, activity reports, school boards
meeting protocols (a selection).
• Public records published on the municiaplity’s
website.
• Brochures on Dexter and Fronter
16. Statistics on the use of Fronter
•
55
776
–
total
log
ins,
7
821
ac<ve
user
/oct,
2012
Källa:
Linköpings
kommun
17. Experiences of use/ a selection
• e schools differ in how long they have come using
Fronter, depending on:
• the principal attitude towards Fronter,
• e school’s internal organization,
• work methods for IUP,
• leadership
• IT competence among teachers.
• eID is tested for some e-services. Technical problems
are discovered at the moment. An important question
– eID - a hinder?
18. The organizational set up for implementation of secure
log in to ICT plattforms and e-services in schools
Ø Unclear ogranisation of implementation. Unclear picture on
usability of Fronter for some principals and teachers.
Ø e id & password log in system is perceived as easy, but not
secure enough. eID is perceived as complicated by certain groups
of users.
Ø e complicated picture of eID agency, with different actors
involved (BankID, Telia etc) raises questions of user support
responsibility and efficiency.
Ø eID is perceived as a private attribute by some teachers that
should not be used in their regular log in at work.
19. Users perceptions of ICT plattforms’- and e-services’ security
• Security is perceived differently by the users:
– Most users rely on the municipality responsibility to deal with security issues,
– e Municipality perceives the Plattforms and the e-services as secure.
– Fronter shall fullfill more security requirements if SO and IUP are to be processed
and stored on the plattfrom, according to the users.
• eID is perceived as a possible but still ’unripe’ solution by the IT-
coordinators, officials and Fronter-administrators in schools.
• eID is perceived as a private attribute, not to be used at work, according to
the teachers.
• Unclear strategies:
– Sensitive infromation is stored on paper, on shelves.
– Sensitive work material is processed unsecurily, but saving it in Fronter is not an
obvious solution.
• e schools raise demands for a flexible plattform that would match the
schools work models and not vice versa.
20. Analytical findings 1(3)
• e value of information/sensitivity stored
– Different actors perceived the information as
having different value for themselves (ex, logbook,
IUP, work material)
– Heterogenous information (’we don’t have sensitive
information in school’)
(technical-, organisational, security challenges)
21. Analytical findings 2(3)
• ere is an element of TRUST involved
– Trust in LM to deal with security
– Trust in eID as an artefact (social?/technical)
– Trust in own competence to manage eID and ICT
22. Analytical findings 3(3)
• Security is PRIVATE
– eID is private (ex. teachers use of eID at work, public realm)
– Control of the individual by the organisation, by the state
(ex. logg of the activities)
– Private matters, thoughts and other information included in
work material at school (SO and IUP, loggbooks)
– Security is subjective
23. Analytical findings and further questions:
• Two important aspects: safety of operation and och data
security – differences in perceptions between the users and
the administrators´.
• The need for secure ICT systems increases due to
inccreasing amount of sensitive data flows in the schools and
the rquirements of the Education Act.
• Security – an issue of trust (Wihlborg 2012)
• Private vs public: eID as a private attribute to be used in the
public sphere?
• eID - legitimizing identity, legitimacy (Castells, 2007, Wihlborg
2012, Melin & Wihlborg 2011)
• eID – perceived and actual security (Oscarson 2007)
24. Empirical findings:
• Unclear organisational set-up for inplementation of
Fronter and Dexter.
• There is a need to integrate the current plattforms
and e-services that are used in school.
• There is a need to clarify roles and responsibilities
for user-support of Fronter
• Fonter – not an obvious solution for SO and IUP
25. Potential Development
• A technical challenge: the need for an integrated, flexible,
simple, intuitive AND secure system – is it possible?
• Organisations challenge: the need for a clear
organiziational set-up
• Competence development and trust for the system
• Security challenge: current solutions do not match schools’
work methods.