COPYRIGHT
Copyright and Reprint Permission: Abstracting is permitted with credit to
the source. Libraries are permitted to photocopy for private use.
Instructors are permitted to photocopy, for private use, isolated articles
for non-commercial classroom use without fee. For other copies, reprint,
or republication permission, write to IIIS Copyright Manager, 13750
West Colonial Dr Suite 350 – 408, Winter Garden, Florida 34787, U.S.A.
All rights reserved. Copyright 2013. © by the International Institute of
Informatics and Systemics.
The papers of this book comprise the proceedings of the conference
mentioned on the title and the cover page. They reflect the authors’
opinions and, with the purpose of timely disseminations, are published as
presented and without change. Their inclusion in these proceedings does
no necessarily constitute endorsement by the editors.
ISBN: 978-1-936338-93-1 (Post-Conference Edition)
The 7th International Multi-Conference on Society, Cybernetics and Informatics: IMSCI 2013
PROGRAM COMMITTEE
Chairs: Freddy Malpica (Venezuela)
Friedrich Welsch (Venezuela)
Acerete, Basilio
Cost, Richard
Domoshnitsky, Alexander
Florescu, Gabriela C.
Gore, David
Hallagan, Jean E.
Hendel, Russell Jay
Hopper, Kimberly
Jonson, Mark
Lappas, Georgios
Lee, Marie D.
Ong, Soh-Khim
Petit, Frédéric
Rauch, Allen G.
Royo, Sonia
Schiering, Marjorie S.
Sulema, Yevgeniya S.
Suresh, Lal B.
Yavich, Roman
Yetano, Ana
Zaretsky, Esther
University of Zaragoza
Johns Hopkins University
Ariel University Center
National Institute for R&D in Informatics
Eastern Michigan University
SUNY Oswego
Towson University
Eastern Michigan University
Army Research
TEI
Henry Ford Health System
National University of Singapore
Polytechnic Montreal
Molloy College
University of Zaragoza
Molloy College
National Technical University of Ukraine
Kakatiya University
Ariel University
University of Zaragoza
Academic College for Education Givat Washington
Spain
USA
Israel
Romania
USA
USA
USA
USA
USA
Greece
USA
Singapore
Canada
USA
Spain
USA
Ukraine
India
Israel
Spain
Israel
The 7th International Multi-Conference on Society, Cybernetics and Informatics: IMSCI 2013
ADDITIONAL REVIEWERS
Abdel Hafez, Hoda
Abdel Razek, Mohammed
Abdel-Qader, Ikhlas
And One, Ioan
Andreopoulou, Zacharoula
Aranda, Daniel
Beer, Martin
Beligiannis, Grigorios
Bordogna, Roberto
Bouza-Herrera, Carlos Narciso
Caldararu, Florin
Chau, Kwok-Wing
Cho, Eunsoon
Cisneros-Cohernour, Edith
Cubukcu, Feryal
Diallo, Anthony
Dvorakova, Zuzana
Elías Hardy, Lidia Lauren
Encabo, Eduardo
Ercole, Enrico
Eze, Uchenna
Fillion, Gerard
Florescu, Gabriela
Fonseca, David
Frosch-Wilke, Dirk
Fúster-Sabater, Amparo
Gorge, Najah
Guo, Gongde
Hou, Jianjun
Huang, Hsiu-Mei
Ibrahim, Hamidah
Iovan, Stefan
Ismail, Mohd Nasir
Jonson, Mark
Joubert, Pieter
Kalwinsky, Bob
Khechine, Hager
Suez Canal University
University of Montreal
Western Michigan University
University of Iasi
Aristotle University of Thessaloniki
Open University of Catalonia
Sheffield Hallam University
University of Patras-Western Greece
Istituto Superiore di Studi Avanzati
University of Havana
ECOSEN
Hong Kong Polytechnic University
Mokwon University
Autonomous University of Yucatan
Dokuz Eylul University
Sahara Media Group Ltd
University of Economics Prague
Institute of Technology and Applied Sciences
University of Murcia
University of Eastern Piedmont
Nanyang Technological University
University of Moncton
National Institute for R&D in Informatics
Ramon Llull University
University of Applied Sciences Kiel
Spanish Council for Scientific Research
Precitec Inc.
Fujian Normal University
Peking University
National Taichung Institute of Technology
Universiti Putra
Romanian Railway IT Company
MARA University of Technology
RDECOM
University of Pretoria
Middle Tennessee State University
Laval University
Egypt
Canada
USA
Romania
Greece
Spain
UK
Greece
Italy
Cuba
Romania
Hong Kong
South Korea
Mexico
Turkey
Tanzania
Czech Republic
Cuba
Spain
Italy
Singapore
Canada
Romania
Spain
Germany
Spain
USA
China
China
Taiwan
Malaysia
Romania
Malaysia
USA
South Africa
USA
Canada
Kim, E-Jae
Kropid, Wendy
Kuang, Yu
Kumaran, Thangavelu
Lai, Cristian
Lasmanis, Aivars
Law, Rob
Lee, Keon-Hyung
Lenaghan, Michael J.
Lind, Nancy
Litvin, Vladimir
Loeb, Gene
Mahanti, Prabhat
Majid, Shaheen
Mihaita, Niculae
Mitchell, Charles
Mohamed, Jedra
Mondéjar Jiménez, Juan A.
Monney Paiva, Joao
Montaña, Mireia
Nedic, Zorica
Nousala, Susu
Objelean, Nicolae
Ong, Soh-Khim
Opfer, Neil
Orsitto, Fulvio
Pester, Andreas
Prodan, Augustin
Rajamony, Bhuvenesh
Romagni, Susana
Sala, Nicoletta
Sánchez-Navarro, Jordi
Sanz-González, José L.
Sathyamoorthy, Dinesh
Scholl, Margit
Snow, Richard
Soner, Yildirim
Stomp, Frank
Sulema, Yevgeniya
Sureerattanan, Nidapan
Tenqchen, Shing
Thammakoranonta, Nithinant
Toledo, Cheri
Usmanov, Zafar
Wang, Ching-Huang
Wang, Yi-Hsien
Wolfinger, Bernd
Xia, Shunren
Yaras, Eyyup
Yeniçeri, Tülay
Zwaneveld, Bert
LG Electronics Institute of Technology
University of Wisconsin
Stanford University
University of Madras
CRS4
University of Latvia
The Hong Kong Polytechnic University
Florida State University
Miami Dade College
Illinois State University
California Institute of Technology
Center for Technology and Health
University of New Brunswick
Nanyang Technological University
Academy of Economic Studies, Bucharest
Grambling State University
University in Rabat
University of Castilla-La Mancha
Polytechnic of Viseu
Open University of Catalonia
University of South Australia
University of Melbourne
State University of Moldova
National University of Singapore
University of Nevada
University of Connecticut
Carinthia Tech Institute
Iuliu Hatieganu University
University Malaysia Perlis
Metropolitan University
Università della Svizzera italiana
Open University of Catalonia
Polytechnic University of Madrid
STRIDE
University of Applied Sciences Wildau
Embry-Riddle Aeronautical University
Middle East Technical University
Wayne State University
National Technical University of Ukraine
Thai-Nichi Institute of Technology
ChungHwa Telecom Labs
National Institute of Development Administration
Illinios State University
Tajik Academy of Sciences
National Formosa University
Chinese Culture University
University of Hamburg
Zhejiang University
Aksaray University
Aksaray University
Open University
South Korea
USA
USA
India
Italy
Latvia
Hong Kong
USA
USA
USA
USA
USA
Canada
Singapore
Romania
USA
Morocco
Spain
Portugal
Spain
Australia
Australia
Moldova
Singapore
USA
USA
Austria
Romania
Malaysia
Venezuela
Italy
Spain
Spain
Malaysia
Germany
USA
Turkey
USA
Ukraine
Thailand
Taiwan
Thailand
USA
Tajikistan
Taiwan
Taiwan
Germany
China
Turkey
Turkey
Netherlands
The 7th International Multi-Conference on Society, Cybernetics and Informatics: IMSCI 2013
ADDITIONAL REVIEWERS FOR THE
NON-BLIND REVIEWING
Acevedo-M., María-Elena
Alvarez, Omar
Barbosa, Catia
Bonometti, Virginia
Broten, Regina
Dieringer, Eve
Foko, Thato
Gentile, Douglas
Hulshof, Ana
Johnson, Luna
Kaczmarek, Tomasz
Kanthawongs, Penjira
Kikis Papadakis, Kathy
Koshy, Swapna
Kotze, Danelle
Larios Osorio, Víctor
López-Sánchez, Máximo
Misbahuddin, Syed
Murphy, Tom
Musial, Jedrzej
Najjar, Lotfi
Opfer, Neil
Pavarala, Vinod
Pellegrin-Romeggio, Frederic
Rosas Téllez, Lorna Verónica
Saglietto, Laurence
Sahin Basfirinci, Cigdem
Sample, Travis
Sanchez, Carol
Sarker, Muahmad Jahangir
Sathyamoorthy, Dinesh
Silva, Cristiano
Srinivasan, Satish
Todesco, José Leomar
IPN
Universidad de Colima
Universidade Federal de Minas Gerais
MGB Enterprises LLC
Molloy College
Molloy College
CSIR
Iowa State University
UX Consultant
University of North Carolina
Poznan University of Economics
Bangkok University
Institute of Applied and Computational Mathematics
University of Wollongong in Dubai
University of the Western Cape
Autonomous University of Queretaro
CENIDET
Umm Al-Qura University
Contra Costa College
Poznan University of Technology
University of Nebraska
University of Nevada
University of Hyderabad
Reims Management School
UPAEP
L'IAE de Nice
Karadeniz Technical University
Shenandoah University Professor Emeritus
Grand Valley State University
Umm Al-Qura University
STRIDE
Federal University of São João del Rei
University of Nebraska
Stela Institute
Mexico
Mexico
Brazil
USA
USA
USA
South Africa
USA
Canada
USA
Poland
Thailand
Greece
UAE
South Africa
Mexico
Mexico
Saudi Arabia
USA
Poland
USA
USA
India
France
Mexico
France
Turkey
USA
USA
Saudi Arabia
Malaysia
Brazil
USA
Brazil
Usmanov, Zafar
Vargas Sánchez, Nelson A.
Vitkute, Daiva
Yeniceri, Tulay
Zanella Palacios, Vittorio
Tajik Academy of Sciences
Universidad Distrital
Vytautas Magnus University
Aksaray University
UPAEP
Tajikistan
Colombia
Lithuania
Turkey
Mexico
The 7th International Multi-Conference on Society, Cybernetics and Informatics: IMSCI 2013
Honorary President
William Lesso
Program Committee Chairs
Freddy Malpica
Friedrich Welsch
General Chairs
Nagib Callaos
Andrés Tremante
Organizing Committee Chairs
Angel Oropeza
José Vicente Carrasquero
Conferences Program Manager
Maria Sánchez
Hardcopy Proceedings Production Chair
Maria Sánchez
Technical Consultant on Computing Systems / CD Proceedings Production Chair
Juan Manuel Pineda
Submissions Quality Control Support
Leonardo Contreras
Meta-Reviewers Support
Dalia Sánchez
Systems Development, Maintenance and Deployment
Dalia Sánchez
Keyla Guedez
Bebzabeth García
Operational Assistants
Marcela Briceño
Help Desk
Louis Barnes
The 11th International Conference on Education and Information Systems, Technologies and Applications: EISTA 2013
in the context of
The 7th International Multi-Conference on Society, Cybernetics and Informatics: IMSCI 2013
PROGRAM COMMITTEE
Chairs: Angel Oropeza (Venezuela)
Friedrich Welsch (Venezuela)
José Vicente Carrasquero (Venezuela)
Amoia, Marilisa
Antonucci, Paul
Ayuga, Francisco
Beauboeuf, Theresa
Bidarra, José
Chang, Maiga
Doerfler, R. L.
Dosi, Vasiliki
Dotter, Franz
Fradkin, Larissa
Fuentes, José-María
Gaeta, Matteo
García, Ana-Isabel
Guntuku, Dileepkumar
Harriehausen-M., Bettina
Hartpence, Bruce H.
Hendel, Russell Jay
Hilzensauer, Marlene
Holpp, M.
Holz-Clause, Mary
Jarméus, Pierre
Jones, Paul
Kalay, Yehuda
Karamat, Parwaiz
Krakowska, Monika
Lang, R. Raymond
Marshall, Laurel A.
Martin, Susan
Masog, Simone
Mertens, K. C.
Métioui, Abdeljalil
Michon, Daniel
Miller-Friedmann, Jaimie L.
Miranda, Sergio
O’Sullivan, Jill
Orciuoli, Francesco
Paolozzi, Stefano
Pfeifer, Michael
Poce, Antonella
Ramírez, Álvaro
Rastogi, Rahul
Ripley, M. Louise
Sanger, Patrick
INRIA Lorraine
Harvard-Smithsonian Center for Astrophysics
Technical University of Madrid
Southeastern Louisiana University
University of Aberta
Athabasca University
Federal Agency for Agriculture and Food
University of Ioannina
University of Klagenfurt
Sound Mathematics Ltd.
Technical University of Madrid
Università degli Studi di Salerno
Technical University of Madrid
Iowa State University
Darmstadt University of Applied Sciences
Rochester Institute of Technology
Towson University
University of Klagenfurt
Agroscope
Iowa State University
Stockholm School of Economics
University of Cincinnati
Israel Institute of Technology
The Open Polytechnic of New Zealand
Jagiellonian University
Xavier University of Louisiana
Kingsborough Community College
Indiana University of Pennsylvania
Stockholm School of Economics
Institute for Agricultural and Fisheries Research
Université du Québec à Montréal
Claremont McKenna College
Harvard University
Università degli studi di Salerno
Farmingdale State College
Università degli studi di Salerno
Università Roma Tre
Technical University of Dortmund
Università Roma Tre
Technical University of Madrid
Nelson Mandela Metropolitan University
York University
Alvin Community College
France
USA
Spain
USA
Portugal
Canada
Germany
Greece
Austria
UK
Spain
Italy
Spain
USA
Germany
USA
USA
Austria
Switzerland
USA
Sweden
USA
Israel
New Zealand
Poland
USA
USA
USA
Sweden
Belgium
Canada
USA
USA
Italy
USA
Italy
Italy
Germany
Italy
Spain
South Africa
Canada
USA
Schiering, Marjorie S.
Sienkiewicz, Frank
Soeiro, Alfredo
Styron, Jennifer
Styron, Jr., Ronald A.
Sundberg, Carl
Swart, William
Takahashi, Kaoru
Thysen, I.
Trudel, Louis
Vaida, Mircea-Florin
Vangeyte, J.
Von Haselberg, C.
Von Solms, Rossouw
Ward, R. Bruce
Wieckert, Sarah
Williams van Rooij, Shahron
Zaretsky, Esther
Zaritsky, Arieh
Molloy college
Smithsonian Center for Astrophysics
University of Porto
University of South Alabama
The University of Southern Mississippi
Stockholm School of Economics
East Carolina University
Toyota National College of Technology
Aarhus University
Ottawa University
Technical University of Cluj-Napoca
Institute for Agricultural and Fisheries Research
Leibniz-Institut für Agrartechnik Potsdam-Bornim e.V.
Nelson Mandela Metropolitan University
Smithsonian Center for Astrophysics
Technical University of Dortmund
George Mason University
Academic College for Education Givat Washington
Ben-Gurion University of the Negev
USA
USA
Portugal
USA
USA
Sweden
USA
Japan
Denmark
Canada
Romania
Belgium
Germany
South Africa
USA
Germany
USA
Israel
Israel
The 11th International Conference on Education and Information Systems, Technologies and Applications: EISTA 2013
in the context of
The 7th International Multi-Conference on Society, Cybernetics and Informatics: IMSCI 2013
ADDITIONAL REVIEWERS
Abar, Celina
Abrukov, Victor
Abubakar, Ahmed
Abureesh, Ali
Acma, Bulent
Ali, Ahmed
Alshanableh, Tayseer
Andreopoulou, Zacharoula
Ariton, Viorel
Arsov, Silyan
Azman, Hazita
Baker, John
Bamidis, Panagiotis
Batovski, Dobri Atanassov
Baumeister, Alexander
Baysal, Ugur
Beierschmitt, Penny
Belderrain, Carmen
Berge, Zane
Bhuvaneswaran, R. S.
Bjering, Heidi
Breczko, Teodor
Canalda, Philippe
Castaneda, Sandra
Chan, Chiu-Shui
Chau, K. W.
Chaudhry, Abdus
Chen, Chau-Kuang
Cheng, Tsung-Chi
Chopra, Nidhi
Chu, Louis
Coppola, Jean
Costa, Mónica
Cotet, Costel Emil
Cubukcu, Feryal
de Vries, Marc
DeBaillie, Catherine
Delgado, Alberto
Demmon, Terri
Diaz Negrillo, Ana
Dukic, Darko
Dukic, Gordana
Dumdum, Uldarico Rex
Pontifical Catholic University of Sao Paulo
Chuvash State University
United Arab Emirates University
Umm al-Qura University
Anadolu University
University of Wisconsin La Crosse
Near East University
Aristotle University of Thessaloniki
Danubius University
University of Ruse
National University of Malaysia
Johns Hopkins University
Aristotle University of Thessaloniki
Assumption University
Saarland University
Hacettepe University
Lockheed Martin Corporation
Aeronautical Institute of Technology
University of Maryland
Nagoya Institute of Technology
University of Western Sydney
University of Bilystok
l'
Université de Franche-Comté
Autonomous University of Mexico
Iowa State University
Hong Kong Polytechnic University
Kuwait University
Meharry Medical College
National Chengchi University
Indira Gandhi National Open University
Hong Kong Polytechnic University
Pace University
Polytechnic Institute of Castelo Branco
Polytechnic University of Bucharest
Dokuz Eylul University
Delft University of Technology
Trinity College of Nursing and Health Sciences
National University of Colombia
Notre Dame University
University of Granada
Josip Juraj Strossmayer University of Osijek
Josip Juraj Strossmayer University of Osijek
Marywood University
Brazil
Russian Federation
UAE
Saudi Arabia
Turkey
USA
Turkey
Greece
Romania
Bulgaria
Malaysia
USA
Greece
Thailand
Germany
Turkey
USA
Brazil
USA
Japan
Australia
Poland
France
Mexico
USA
Hong Kong
Kuwait
USA
Taiwan
India
Hong Kong
USA
Portugal
Romania
Turkey
Netherlands
USA
Colombia
USA
Spain
Croatia
Croatia
USA
Edwards-Henry, Anna
Ekstrom, Joseph
Erbacher, Robert
Eze, Uchenna
Faggiano, Eleonora
Fillion, Gerard
Finch, Aikyna Delores
Finkbine, Ronald
Florescu, Gabriela
Fougeres, Alain-Jerome
Frosch-Wilke, Dirk
Fúster-Sabater, Amparo
Gavrilova, Tatiana
Gedviliene, Genute
Gelbukh, Alexander
Ghaddar, Nesreen
Gharsallah, Ali
Giurgiu, Mircea
Goldberg, Robert
Gujjar, Aijaz Ahmed
Güler, Ýnan
H.Abimbola, Soriyan
Hadjerrouit, Said
Harichandan, Dhaneswar
Hartley, Roger
Hassini, Abdelatif
Hellstern, Gerd-Michael
Herrera, Oriel
Hsu, Donald
Hsu, Li-Ling
Hussain, Aini
Ibrahim, Hamidah
Idowu, Adebayo Peter
Ikeguchi, Cecilia
Imbalzano, Giovanni
Ismail, Maizatul Akmar
Ismail, Zuraini
Jong, BinShyan
Kalwinsky, Bob
Kaur, Kiran
Kim, Dongsik
Klimo, Martin
Koshy, Swapna
Kropid, Wendy
Kroumov, Valeri
Kuang, Yu
Lasmanis, Aivars
Lee, KyungOh
Lefoe, Geraldine
Logan, Kerina
Lowes, Susan
Macianskiene, Nemira
Madsen, Leza
Mahanti, Prabhat
Malenovsky, Eduard
University of the West Indies
Brigham Young University
Utah State University
Nanyang Technological University
University of Bari
University of Moncton
Strayer University
Indiana University Southeast
Imperial Chemical Industries
University of Technology of Belfort-Montbéliard
University of Applied Sciences Kiel
Institute of Applied Physics
Saint Petersburg State university
Vytautas Magnus University
Instituto Politécnico Nacional
American University of Beirut
University of Tunis El Manar
Technical University of Cluj-Napoca
City University of New York
Federal College of Education
Gazi University
Obafemi Awolowo University
University of Agder
University of Mumbai
Leeds University
Laboratory of Application and Analysis of Radiations
University of Kassel
Temuco Catholic University
Dominican College of Blauvelt
NTUNHS
University Kebangsaan
Putra Malaysia University
Obafemi Awolowo University
Tsukuba Gakuin University
M.P.I. (Maker / Retired Professor)
University of Malaya
University Technology of Malaysia
Chung Yuan Christian University
Middle Tennessee State University
University of Malaya
Hanyang University
University of Zilina
University of Wollongong in Dubai
University of Wisconsin Superior
Okayama University of Science
Stanford University
University of Latvia
Sunmoon University
University of Wollongong
Massey University
Columbia University Teachers College
Vytautas Magnus University
Western Washington University
University of New Brunswick
Brno University of Technology
Trinidad and Tobago
USA
USA
Singapore
Italy
Canada
USA
USA
Romania
France
Germany
Spain
Russian Federation
Lithuania
Mexico
Lebanon
Tunisia
Romania
USA
Pakistan
Turkey
Nigeria
Norway
India
UK
Algeria
Germany
Chile
USA
Taiwan
Malaysia
Malaysia
Nigeria
Japan
Italy
Malaysia
Malaysia
Taiwan
USA
Malaysia
South Korea
Slovakia
UAE
USA
Japan
USA
Latvia
South Korea
Australia
New Zealand
USA
Lithuania
USA
Canada
Czech Republic
Marchisio, Susana
Martínez, Liliana Inés
Matyashenko, Grigory
McWright, Mac
Mendoza-Hannan, Juana
Metrolho, Jose
Mihir, Fnu
Milosz, Marek
Moch, Peggy
Molina, Silvia
Mondéjar-Jiménez, Juan-Antonio
Monney Paiva, Joao
Mueller, Julie
Mullins, Michael
Olivetti Belardinelli, Marta
Paraskevas, Michael
Pastor, Jorge
Patton, Barba
Pech-Campos, Silvia
Pereira, Claudia Teresa
Pessoa, Fernando
Pester, Andreas
Poobrasert, Onintra
Post, Paul
Potter, Marcia
Prata, Alcina
Quintanar, Daniel
Rabe, Vlasta
Rahman, Hakikur
Rajamony, Bhuvenesh
Rasmani, Khairul A.
Reyes, María Elena
Reyes-Méndez, Jorge Joel
Riihentaus, Juhani
Romagni, Susana
Rudd, Lauren
Rutkowski, Jerzy
Sami, Mariagiovanna
Saminpanya, Seriwat
Sanz González, José L.
Sasaki, Hitoshi
Schoenacher, Sheryl
Serwatka, Judy Ann
Sh Abdullah, Siti Aishah
Shiratuddin, Norshuhada
Silber, Kevin
Singhal, Divya
Skolud, Bozena
Smith, Stella
Snow, Mary
Soltes, Dusan
Soutsas, Konstantinos
Stein, Sarah
Su, Te-Jen
Sulema, Yevgeniya
National University of Rosario
National University of Central Buenos Aires
SBRAS
Nova Southeastern University
New Mexico State University
Polytechnic Institute of Castelo Branco
Broward College
Lublin Technical University
Valdosta State University
Universidad Politécnica de Madrid
University of Castilla-La Mancha
Institute Polytechnic of Viseu
Wilfrid Laurier University
University of Aalborg
Sapienza University of Rome
Computer Technology Institute
University of Zaragoza
University of Houston Victoria
Autonomous University of Yucatan
National University of Central Buenos Aires
Federal University of Rio de Janeiro
Carinthia Tech Institute
National Electronics and Computer Technology Center
The Ohio State University
Ministry of Education
Escola Superior de Ciências Empresariais
Tucson Water
University of Hradec Kralove
Sustainable Development Network Prog.
University Malaysia Perlis
Universiti Teknologi MARA
University of Texas Pan American
Metropolitan Autonomous University
University of Oulu
Universidad Metropolitana
Middle Tennessee State University
Silesian University of Technology
Polytechnic University of Milan
Srinakharinwirot University
Polytechnic University of Madrid
Takushoku University
Farmingdale State College
Purdue University North Central
University Technology Mara
Universiti Utara
University of Derby
Goa Institute of Management
Silesian University of Technology
Georgia Gwinnett College
Embry-Riddle Aeronautical University
Comenius University in Bratislava
Technological Educational Institution of Larissa
University of Otago
National Kaohsiung University of Applied Sciences
National Technical University of Ukraine
Argentina
Argentina
Russian Federation
USA
USA
Portugal
USA
Poland
USA
Spain
Spain
Portugal
Canada
Denmark
Italy
Greece
Spain
USA
Mexico
Argentina
Brazil
Austria
Thailand
USA
Virgin Islands (U.K.)
Portugal
USA
Czech Republic
Bangladesh
Malaysia
Malaysia
USA
Mexico
Finland
Venezuela
USA
Poland
Italy
Thailand
Spain
Japan
USA
USA
Malaysia
Malaysia
UK
India
Poland
USA
USA
Slovakia
Greece
New Zealand
Taiwan
Ukraine
Suranauwarat, Sukanya
Suviniitty, Jaana
Tan, Ying
Taylor, Stephen
Thijssen, Thomas
Thirunarayanan, M. O.
Thorsos, Nilsa
Tobos, Valentina
Torrisi-Steele, Geraldine
Tsaur, Woei-Jiunn
Tuzun, Hakan
Ulovec, Andreas
Valova, Irena
Varughese, Joe
Vintere, Anna
Wan Ali, Wan Zah
Wang, Ching-Huang
Wang, Jau-Shyong
Wang, Jianqi
Wang, Jing
Wang, Zhigang
Weeden, Elissa
Whitworth, Jerry
Wolfinger, Bernd
Wu, Chu-Chu
Wu, Tung-Xiung (Sean)
Yamacli, Rusen
Yin, Peng-Yeng
Yueh, Hsiu-Ping
Zainon Hamzah, Zaitul Azma
Zayan, Mohamed
Zhang, Yuanzhong
Zwaneveld, Bert
National Institute of Development Administration
Helsinki University of Technology
Peking University
University of Sussex
Saxion University
Florida International University
Azusa Pacific University
Lawrence Technological University
Griffith University
Dayeh University
Hacettepe University
University of Vienna
University of Rousse
Northern Alberta Institute of Technology
Latvia University of Agriculture
Putra Malaysia University
National Formosa University
Shu Te University
Ohio State University
Purdue University Indianapolis
Fort Valley State University
Rochester Institute of Technology
Texas Woman`s University
University of Hamburg
Georgia Southwestern State University
Shih Hsin University
Anadolu University
National Chi-Nan University
National Taiwan University
Putra Malaysia University
Nilesat Company
Miami Dade College
Open University
Thailand
Finland
China
Canada
Netherlands
USA
USA
USA
Australia
Taiwan
Turkey
Austria
Bulgaria
Canada
Latvia
Malaysia
Taiwan
Taiwan
USA
USA
USA
USA
USA
Germany
USA
Taiwan
Turkey
Taiwan
Taiwan
Malaysia
Egypt
USA
Netherlands
The 11th International Conference on Education and Information Systems, Technologies and Applications: EISTA 2013
In the context of
The 7th International Multi-Conference on Society, Cybernetics and Informatics: IMSCI 2013
ADDITIONAL REVIEWERS FOR THE
NON-BLIND REVIEWING
Abreu, Rosane
Abureesh, Ali
Ajidahun, Clement
Ali Ayari, Mohammed
Amos, Christopher
Ayari, Arslan
Barouh, Ieroham
Belkin, Markus
Biin, Dianne
Bogomolov, Alexander
Border, Charles
Case, Thomas
Cavkaytar, Atilla
Cavkaytar, Serap
Chei, Choy Lye
Chen, Li-We
Cole, Shadyah
Correa, Ana Grasielle
Costa, Aparecido Doniseti da
Costa, Manuel
Cuadrado, Georgina
Dakhil, Nazera
Demirkiran, Ilteris
Ekenberg, Love
Ferris, Maria
Foster, Harold
Fryer, Marilyn
Gavrilova, Tatiana
Gibertoni, Daniela
Gilbert, Benjamin
Góes, Luís Fabrício
González, Eugenio
González, Lourdes
Guntuku, Dileepkumar
Gyula, Horváth
Herbert, Katherine
Hochrainer, Stefan
Hofbauer, Vera
Hsieh, Hui-Lin
Jiang, Nianjuan
Johnson, Eric
Kaewwit, Raweewan
Krach, R. Michael
FIOCRUZ
Umm al-Qura University
Adekunle Ajasin University
Qatar university
University of West Florida
Qatar University
CINVESTV
Monash University
Camosun College
Volgograd State Architecture-Building University
Rochester Institute of Technology
Georgia State University
Anadolu University
Anadolu University
Duke-NUS
National Kaohsiung Norma
Umm Al-Qura university
Mackenzie Presbyterian University
FATEC Taquaritinga
University of Minho
Technical University of Madrid
University of Kufa
Embry-Riddle Aeronautical University
Stockholm University
University of North Carolina
The University of Akron
The Creativity Centre Education Trust
Saint Petersburg State university
FATEC Taquaritinga
FIOCRUZ
Pontifical Catholic University of Minas Gerais
Universidad Tecnica Federico Santa María
Miami Dade College
Iowa State University
University of Szeged
Montclair State University
International Institute for Applied Systems Analysis
Via donau
WuFeng University
Advanced Digital Sciences Center
Valparaiso University
Bangkok University
Towson University
Brazil
Saudi Arabia
Nigeria
Qatar
USA
Qatar
Mexico
Australia
Canada
Russian Federation
USA
USA
Turkey
Turkey
Singapore
Taiwan
Saudi Arabia
Brazil
Brazil
Portugal
Spain
Iraq
USA
Sweden
USA
USA
UK
Russian Federation
Brazil
Brazil
Brazil
Chile
USA
USA
Hungary
USA
Austria
Austria
Taiwan
Singapore
USA
Thailand
USA
Kurt, Adile Askim
Lin, Che-Chern
Liu, Peixiang
Markowsky, George
Marone, Dan
Masticola, Stephen
Matthews, Patricia
Maulding, Wanda
Meira, Dilmar
Mihir, Fnu
Mohammed S., Hind R.
Mohtashami, Mojgan
Molina, Silvia
Moyer, Todd
Munn, Alison
Noochniyom, Jiranooch
Obrien, Joanne
Palmer, Elisabeth
Pecore, John Lee
Pei, Tzusheng
Potorac, Alin Dan
Prandtstetter, Matthias
Prust, Russell
Satyamurthy, Kailasam
Sh Abdullah, Siti Aishah
Shore, Felice
Silvernail, Nathan
Simmons, Lakisha
Smith, Debbie
Svensson, Bo
Tansiri, Panida
Thomson, Simon
Unalan, Turgay
Vachharajani, Tushar
Wasserman, Egoza
Weston, Marla
Williams van Rooij, Shahron
Xu, Zhiguang
Yu, Jianxing
Zwaneveld, Bert
Anadolu University
National Kaohsiung Norma
Nova Southeastern University
University of Maine
Farmingdale State College
Siemens Corporate Research
University of Utah
University of South Alabama
Pontifical Catholic University of Minas Gerais
Broward College
University of Kufa
Advanced Infrastructure Design
Technical University of Madrid
Towson University
Leeds Metropolitan University
Kasem Bundit University
Molloy College
Aspen Associates
University of West Florida
Jackson State University
University of Suceava
AIT Austrian Institute of Technology
Northern Arizona University
Penn State University
University Technology Mara
Towson University
Embry-Riddle Aeronautical Univresity
Belmont Univesity
YSU
Linköping University
Bangkok University
Leeds Metropolitan University
Anadolu University
VA Medical Center
Lifshitz College of Education Jerusalem
Camosun College
George Mason University
Valdosta State University
Institute for Infocomm Research
Open University
Turkey
Taiwan
USA
USA
USA
USA
USA
USA
Brazil
USA
Iraq
USA
Spain
USA
UK
Thailand
USA
USA
USA
USA
Romania
Austria
USA
USA
Malaysia
USA
USA
USA
USA
Sweden
Thailand
UK
Turkey
USA
Israel
Canada
USA
USA
Singapore
Netherlands
The 11th International Conference on Education and Information Systems, Technologies and Applications: EISTA 2013
in the context of
The 7th International Multi-Conference on Society, Cybernetics and Informatics: IMSCI 2013
Honorary President
Freddy Malpica
Program Committee Chairs
Angel Oropeza
Friedrich Welsch
José Vicente Carrasquero
General Chair
Nagib Callaos
Organizing Committee Chairs
Andrés Tremante
Belkis Sánchez
Conferences Program Manager
Maria Sánchez
Hardcopy Proceedings Production Chair
Maria Sánchez
Technical Consultant on Computing Systems / CD Proceedings Production Chair
Juan Manuel Pineda
Submissions Quality Control Support
Leonardo Contreras
Meta-Reviewers Support
Dalia Sánchez
Systems Development, Maintenance and Deployment
Dalia Sánchez
Keyla Guedez
Bebzabeth García
Operational Assistants
Marcela Briceño
Help Desk
Louis Barnes
Number of Papers Included in these Proceedings per Country
(The country of the first author was the one taken into account for these statistics)
Country
TOTAL
United States
Brazil
Taiwan
Thailand
Japan
Mexico
United Kingdom
Austria
Canada
Czech Republic
France
Hungary
Israel
Lithuania
Russian Federation
Saudi Arabia
Singapore
South Africa
Spain
Sweden
Turkey
United Arab Emirates
# Papers
53
22
4
3
3
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
%
100.00
41.51
7.55
5.66
5.66
3.77
3.77
3.77
1.89
1.89
1.89
1.89
1.89
1.89
1.89
1.89
1.89
1.89
1.89
1.89
1.89
1.89
1.89
Foreword
Informatics and Cybernetics (communication and control) are having an increasing impact on
societies and in the globalization process that is integrating them. Societies are trying to regulate this
impact, and adapt it to their respective cultural infra-structures. Societies and cultures are in
reciprocal co-adaptations with Information and Communication Technologies. Synergic relationships
might emerge in this co-adaptation process by means of positive and negative feedback loops, as well
as feedforward ones. This would make the whole larger than the sum of its parts, generating emergent
properties in the parts involved as well as in the whole coming forth. The academic, private, and
public sectors are integrating their activities; multi-disciplinary groups and inter-disciplinary teams
are being formed, and collaborative research and development projects are being organized in order to
facilitate and adequately orient the design and implementation of the feedback and the feedforward
loops, and potentially generating synergic relationships. This phenomenon persuaded the Organizing
Committee to organize the 7th International Multi-Conference on Society, Cybernetics and Informatics
(IMSCI 2013) in a multi-disciplinary context along with other collocated events. Consequently,
participants may focus on one discipline, while allowing them the possibility of attending conferences
from other disciplines. This systemic approach stimulates cross-fertilization among different
disciplines, inspiring scholars, originating new hypothesis, supporting production of innovations and
generating analogical thinking.
IMSCI 2013 was organized and sponsored by the International Institute of Informatics and Systemics
(IIIS, www.iiis.org), member of the International Federation of Systems Research (IFSR). The IIIS is
a multi-disciplinary organization for inter-disciplinary communication and integration, which
includes about 4500 members. Consequently, a main purpose of the IIIS is to foster knowledge
integration processes, interdisciplinary communication, and integration of academic activities. Based
on 1) the transdisciplinarity of the systemic approach and its emphasis on relationships and
integrating processes, and 2) the multi-disciplinary support of cybernetics’ and informatics’ concepts,
notions, theories, technologies, and tools, the IIIS has been organizing multi-disciplinary conferences
as a platform for fostering inter-disciplinary communication and knowledge integration processes.
Multi-disciplinary conferences are organized by the IIIS as
support for both intra- and inter-disciplinary communication.
Processes of intra-disciplinary communication are mainly
achieved via traditional paper presentations in corresponding
disciplines, while conversational sessions, regarding trans- and
inter-disciplinary topics, are among the means used for interdisciplinary communication. Intra- and inter-disciplinary
communications might generate co-regulative cybernetic loops,
via negative feedback, and synergic relationships, via positive
feedback loops, in which both kinds of communications could
increase their respective effectiveness. Figure 1 shows at least
two cybernetic loops if intra- and inter-disciplinary are
adequately related. A necessary condition for the effectiveness of
Inter-disciplinary communication is an adequate level of variety
regarding the participating disciplines. Analogical thinking and
learning processes of disciplinarians depend on it; which in turn
are potential sources of the creative tension required for crossfertilization among disciplines and the generations of new
hypothesis. An extended presentation regarding this issue can be
found at www.iiis.org/MainPupose.
Figure 1
One of the main purposes of IMSCI 2013 is to bring together academics, professionals, and
managers from the private and the public sectors, in order to share ideas, results of research,
and innovative services or products, in a multi-disciplinary and multi-sector forum.
Educational technologies, socio-economic organizations, and socio-political processes are
essential domains among those involved in the evolving co-adaptation and co-transformation
between societies and cultures on the one hand, and between informatics and cybernetics
(communication and control) on the other hand. Consequently, the main conference in the
context of the IMSCI 2013 Multi-Conference is the 11th International Conference on
Education and Information Systems, Technologies and Applications: EISTA 2013
The relationship between education/training and Information and Communication
Technologies (ICT) is quickly intensifying and sometimes appears in unexpected forms and
in combination with original ideas, innovative tools, methodologies, and synergies.
Accordingly, the primary purpose of the 10th International Conference on Education and
Information Systems, Technologies and Applications (EISTA 2013) has been to bring
together researchers and practitioners from both areas together to support the emerging
bridge between education/training and the ICT communities.
In the context of EISTA 2013, practitioners and consultants were invited to present case
studies and innovative solutions. Corporations were invited to present education/training
information systems and software-based solutions. Teachers and professors were invited to
present case studies, specifically developed information systems, and innovative ideas and
designs. Educational scientists and technologists were invited to present research or position
papers on the impact and the future possibilities of ICT in educational systems, training
processes, and methodologies. Managers of educational organizations and training
consultants were invited to present problems that might be solved by ICT or solutions that
might be improved by different approaches and designs in ICT.
EISTA 2013 provides a forum for the presentation of solutions and problems in the
application of ICT in the fields of education/training. Authors of the papers included in the
proceedings provided diverse answers to the following questions:
•
•
•
•
What is the impact of ICT in education and training?
How are ICTs affecting and improving education and training? What networks and
models are emerging?
How are universities, schools, corporations and other educational/training
organizations making use of ICT?
What electronic tools are there to facilitate e-learning, distance education and cooperative training?
On behalf of the Organizing Committees, I extend our heartfelt thanks to:
1. the 112 members of the Program Committees (21 members of the IMSCI 2013’s PC
and 91 members of the PCs related to the conferences and special tracks in the
context of IMSCI 2013) from 27 countries;
2. the 314 additional reviewers, from 63 countries, for their double-blind peer reviews;
and
3. the 123 reviewers, from 37 countries, for their efforts in making the non-blind peer
reviews. (Some reviewers supported both: non-blind and double-blind reviewing for
different submissions)
A total of 886 reviews made by 437 reviewers (who made at least one review) contributed to
the quality achieved in IMSCI 2013. This means an average of 8.52 reviews per submission
(104 submissions were received). Each registered author had access, via the conference web site,
to the reviews that recommended the acceptance of their respective submissions. Each registered
author could also get information about: 1) the average of the reviewers evaluations according to 8
criteria, and the average of a global evaluation of his/her submission; and 2) the comments and the
constructive feedback made by the reviewers, who recommended the acceptance of his/her
submission, so the author would be able to improve the final version of the paper.
In the organizational process of IMSCI 2013, about 104 papers/abstracts were submitted.
These pre-conference proceedings include about 53 papers, from 22 countries that were
accepted for presentation (48 countries taking into account the presentations in collocated events). I
extend our thanks to the invited sessions and special tracks organizers for collecting,
reviewing, and selecting the papers that will be presented in their respective sessions. The
submissions were reviewed as carefully as time permitted; it is expected that most of them
will appear in a more polished and complete form in scientific journals.
This information about IMSCI 2013 is summarized in the following table, along with the
other collocated conferences:
Conference
# of
submissions
received
# of
reviewers
that made at
least one
review
# of reviews
made
WMSCI 2013
210
740
1330
IMSCI 2013
104
437
886
IMETI 2013
78
346
667
CISCI 2013
184
693
TOTAL
576
2216
Average of
reviews per
submission
# of papers
included in
the
proceedings
% of
submissions
included in
the
proceedings
1.80
6.33
116
55.24%
2.03
8.52
53
50.96%
1.93
8.55
32
41.03%
1771
2.56
9.63
93
50.54%
4654
2.10
8.08
294
51.04%
Average of
reviews per
reviewer
We also extend our gratitude to the co-editors of these proceedings for the hard work, energy
and eagerness they shown preparing their respective sessions. We express our intense
gratitude to Professor William Lesso for his wise and opportune tutoring, for his eternal
energy, integrity, and continuous support and advice, as the Program Committee Chair of
past conferences, and as Honorary President of WMSCI 2013, as well as for being a very
caring old friend and intellectual father to many of us. We also extend our gratitude to
Professor Belkis Sánchez, who brilliantly managed the organizing process.
We also express our immense gratitude to Professors Freddy Malpica, Friedrich Welsch,
Jorge Baralt, Angel Oropeza, José Ferrer, Andrés Tremante, and José Vicente Carrasquero
for chairing or co-chairing the respective Program Committees and/or Organizing
Committees.
We also extend our gratitude to the following scholars, researchers, and professionals who
accepted to deliver plenary workshops and/or to address the audience of the General Joint Plenary
Sessions with keynote conferences.
Workshops, more details (abstracts and short bios) were included in the Conference Program
booklet and at http://www.iiis.org/summer2013plenaryevents/
Professor Leonid Perlovsky, Harvard University and The Air Force Research Laboratory, USA,
two hours plenary workshop, “Mathematical Equivalence of Evolution and Design”
Professor Louis H. Kauffman, University of Illinois at Chicago, USA, two hours plenary
workshop, “Circularity, Topology and Cybernetics: Second Order Science”
Professor T. Grandon Gill, University of South Florida, USA, four hours plenary workshop,
“Interdisciplinary Research, Education, and Communication through Case Studies and
Methodologies”
Plenary Keynote Speakers, more details more details (abstracts and short bios) were included in
the Conference Program booklet and at http://www.iiis.org/summer2013plenaryevents/
Professor Leonid Perlovsky, Harvard University and The Air Force Research Laboratory, USA,
“Musical Emotions: Cognitive function and evolution: A mathematical-psychological theory and
experimental evidence.”
Professor Louis H. Kauffman, University of Illinois at Chicago, USA, “Circularity, Topology
and Cybernetics: Second Order Science”
Professor Stuart A. Umpleby, The George Washington University, USA, “Expansion of
Science.”
Professor Shigehiro Hashimoto, Kogakuin University, Japan, “An interdisciplinary area of
research offers the tool of cross-cultural understanding: cross-cultural student seminar for
communication training on biomedical engineering.”
Professor T. Grandon Gill, University of South Florida, USA, “Complexity, Cybernetics, and
Informing Science: Building a Better Mousetrap.”
Dr. Jeremy Horne, President-emeritus, Southwest Area Division, American Association for the
Advancement of Science (AAAS), USA, “Complexity, Cybernetics, and Informing Science:
Building a Better Mousetrap”
Dr. Karl Muller, University of Vienna, Austria and Head of The Wiener Institute for Social
Science Documentation: WISDOM, Austria, “Unfolding and Expanding Science with the Help of
the New Science of Cybernetics (NSC)”
Professor Andreas Ninck, Bern University of Applied Sciences, Switzerland, “Action Learning:
Doing in order to think - Thinking in order to do”
Professor Richard Segall, Arkansas State University, USA, “Dimensionalities of Computation:
from Global Supercomputing to Data, Text and Web Mining”
Dr. Mark Donald Rahmes, Harris Corporation, USA, "A Biometric for Neurobiology of
Influence with Social Informatics Using Game Theory"
Dr. Denise K. Comer, Duke University, USA, “Academic Writing for Inter-Disciplinary
Communication”
Professor Thomas Marlowe, Seton Hall University, USA, “Systemics and Requirements: A
Missing Dimension?”
Dr. Ronald Styron, University of South Alabama, USA, “Interdisciplinary Education: A
Reflection of the Real World.”
Dr. Robert Cherinka and Mr. Joseph Prezzama, MITRE Corporation, USA “Trending
Approaches in Innovation Utilizing Interdisciplinary Methods”
Dr. Marta White, Georgia State University, USA, “The Scholarship of Teaching: Inter-Cultural
and Inter-disciplinary Communication for Academic Globalization”
Dr. Kostas Demestichas, National Technical University of Athens, Greece, “Flexible next
generation communication networks”
We also wish to thank all the authors for the quality of their papers, and the Program Committee
members and the additional reviewers for their time and their contributions in the respective
reviewing processes.
We extend our gratitude as well to María Sánchez, Juan Manuel Pineda, Leonisol Callaos, Dalia
Sánchez, Keyla Guédez, Bebzabeth García, Marcela Briceño, Louis Barnes, Sean Barnes, and
Freddy Callaos for their knowledgeable effort in supporting the organizational process producing
the hard copy and CD versions of the proceedings, developing and maintaining the software
supporting the interactions of the authors with the reviewing process and the Organizing
Committee, as well as for their support in the help desk and in the promotional process.
Professor Andrés Tremante, and
Professor Nagib Callaos (www.iiis.org/Nagib-Callaos )
IMSCI 2013 General Co-Chairs
IMSCI 2013
The 7th International Multi-Conference on Society, Cybernetics and Informatics
The 11th International Conference on Education and Information Systems, Technologies and Applications: EISTA 2013
Post-Conference Edition
CONTENTS
Contents
i
Education and Information Systems, Technologies and Applications
Korman, Thomas; Johnston, Hal (USA): ''Moving an Academic Simulation Closer to a Heavy
Construction Industry Tool by Adding an Equipment Management Module''
Mashl, R. Jay; Acs, Bernie; Wiziecki, Edee Norman; Schmidt, J. R.; Polik, William F. (USA):
''Enhancing Chemistry Teaching and Learning through Computational Tools: A Computational
Chemistry Cloud Prototype Using WebMO''
Romero Rivera, Manuel; Aguilar Cisneros, Jorge (Mexico): ''Cubecraft Game: A Framework for
Mobile Game’s Development''
Schiering, Marjorie S. *; Cerruto, Audra *; Benton, Tara *; McGovern, Beth *; Heilmann, Heidi
*; McCarthy, Erin *; Hultman Jakobsson, Ann ** (* USA, ** Sweden): ''The Interactive Book
Report: Playing the Pages''
Serumaga-Zake, Philip A. E. *; Arnab, R. ** (* South Africa, ** Botswana): ''A Suggested
Statistical Procedure for Estimating the Minimum Sample Size Required for a Complex CrossSectional Study''
1
6
10
16
23
Society, Cybernetics and Informatics
Bonometti, Robert (USA): ''SuperReality: General Implications of “Big Data” Analytics and
Artificial Intelligence for Individuals and Households in Society''
29
Butrime, Edita; Zuzeviciute, Vaiva (Lithuania): ''e-Learning as a Socio-Cultural System
(Elements to be Influenced and Influencing Elements)''
38
Kurtulus, Sema; Kurtulus, Kemal; Ozturk, Selen (Turkey): ''Recent Trends and Prospects of
Marketing Publications in Turkey''
44
Laudares, Sandro; Abreu, João Francisco de (Brazil): ''Geotechnology: A New Approach
Supporting Social Inclusion in Betim-MG''
49
Leszczy ska, Dorota (France): ''Can We Put Forward a Mathematical Model of the Selection of
a New Location for a Multinational Company?''
54
Orantes-Jiménez, Sandra-Dinora; Vázquez-Álvarez, Graciela; Zavala-Galindo, Alejandro
(Mexico): ''Trends in Information Security for Mexican Companies, is the Cloud Computing the
Answer?''
i
59
Salm Junior, José Francisco; Koller, Karine; Schneider, Viviane; Pacheco, Roberto Carlos dos
Santos (Brazil): ''Knowledge Network for Quality of Life''
63
Tai, David W. S.; Hu, Yang-Chih; Wang, Ray; Zhang, Ren-Cheng; Chen, Jia-Ling (Taiwan):
''The Visual Presentation Model for Improving High School Students' Learning Outcomes''
68
Tarnittanakorn, Nittana (Thailand): ''The Impacts of Social Responsibility and Social Media on
the Success of International Ventures''
74
White, Marta Szabo (USA): ''Cultural Lens: A Critical Variable in the Microfoundations of
Strategic Problem Formulation''
79
Application of Education Technologies
Folley, Duncan; Wilkinson, Stephen; Barnes, Cathy; Scott, Philip Richard; Thorton, Quintan
(UK): ''Discreet Event Simulation Used within the Food and Drink Industry''
85
Hartpence, Bruce; Johnson, Daryl; Mason, Sharon; Stackpole, Bill (USA): ''Natural Selection in
Virtualization Environments: A Decade of Lessons from Academia''
91
Menyhárt, László; Pap, Gáborné (Hungary): ''How Can We Get Our Students to Think While
We Help their Work Too? Document Based Development''
97
Peterson, Patricia (USA): ''Providing Access to a Culturally Diverse Special Education Doctoral
Program through Educational Technologies''
103
Applications of Information and Communication Technologies in Education and
Training
Guo, Jiayan; Leong, David; Siang, Jonathan; Bahl, Vikram (Singapore): ''A User-Selectable
Obscuration Framework to Censor Digital Videos for Children and Adolescents''
Kanthawongs, Penjira; Kanthawongs, Penjuree (Thailand): ''Perceived Usefulness, Perceived
Ease of Use, and Attitude Related to e-Mail Usage toward Intention to Use e-Mail Systems of
University Students''
Kanthawongs, Penjuree; Kanthawongs, Penjira; Chitcharoena, Chaisak (Thailand): ''Applying
the Technology Acceptance Model in a Study of the Factors Affecting Intention to Use
Facebook in Education of the Thai University Students''
Long, Cynthia; Ristvey, John (USA): ''Using Virtual Classroom: Learning through Video
Analysis to Engage Educators in Meaningful Facilitated, Online Distance Learning''
Miyazaki, Yoshinori; Tanaka, Shosaku; Koyama, Yukie (Japan): ''A Tool Supporting Writing
Technical Documents in English Using Corpora: Retrieving Functions by Cosine Similarity and
Pattern Matching''
Souza-Concilio, Ilana A.; Anagusko, Claudio K.; Anacleto, Gracia M. C.; Pacheco, Beatriz A.
(Brazil): ''CalcPlusWeb: A Computer Game to Stimulate the Reasoning in Mathematics''
ii
107
113
118
124
129
135
Styron, Jennifer L.; Cumbie, Barry (USA): ''Perceptions of Electronic Health Records in
Mississippi''
140
Education and Training Systems and Technologies
Barb, Adrian S. (USA): ''Expertise Evaluation Using PathFinder Networks Scaling in Ranking
of Satellite Images''
147
Bialaszewski, Dennis (USA): ''Ebooks, Cost Savings, Creative Commons, and Enhancements to
Lectures''
153
Fernández, Trinidad *; García-Pérez, Grisel **; Santiago, Joaquin * (* Spain, ** Canada): ''A
Language Exchange Program: Sustainability Innovation in Language and Culture Engagement''
159
Hsieh, Ching-Jung (Taiwan): ''Strategies for Improving Creative Ability under the Context of
Globalization in Higher Education''
164
Johnson, Daryl; Stackpole, Bill; Mason, Sharon; Hartpence, Bruce (USA): ''Designing,
Constructing and Implementing a Low-Cost Virtualization Cluster for Education''
170
Trna, Josef (Czech Republic): ''How to Educate and Train Science Teachers in IBSE
Experimentation''
176
Villas-Bôas, Glauco; Monteiro, Maria da Conceição; Costa, Regina Coeli; Nunes, Sheila Torres
(Brazil): ''Distance Education in the Service of Health and Sustainability''
181
Zhu, Qi (USA): ''A Framework for Achieving Web Accessibility for University Web Sites''
187
Education in Science, Technology, Engineering and Mathematics
Budnik, Mark M. (USA): ''CreativEngineering for 2020''
Van de Vegte, Joyce (Canada): ''Digital Music Math: Technology as a STEM Teaching Tool for
Aboriginal Students''
192
195
Educational Research, Theories, Practice and Methodologies
Chebchoub, Zahida (United Arab Emirates): ''Writing is Dead! Long Live Writing! Twitter; An
Original Way to Engage ESL Learners''
Duellberg, Donna; Swendsen, Mary Ann; Hansen, Christine (USA): ''Multiple Perspectives Assessing Student Learning in Distance Based Education though Asynchronous Online
Discussions''
201
205
Hendel, Russell Jay (USA): ''Enriching Syllabi, Teaching and Testing Using Two-Step
Problems''
211
Lantz, Agneta; Brage, Christina (Sweden): ''A Re-Conceptualisation of Information Literacy in
Accordance with New Social Media Contexts''
217
iii
Putz, Lisa-Maria; Schauer, Oliver (Austria): ''Demands Concerning Educational Media:
Integration of Eco-Friendly Transport in Education and Training in Austria''
Styron, Jr., Ronald A. (USA): ''Enhancing Student Learning in STEM Disciplines''
Yeh, Dowming; Wu, Min-Kun (Taiwan): ''Influence of Interpersonal Relationship in Class on
the Motivation and Effect of Blended e-Learning''
223
229
233
E-Learning
Aloteawi, Saleh Mohammed (Saudi Arabia): ''Capability of Students (Candidates) to Apply eLearning Knowledge and Skills in Real World Based on Accreditation Requirements''
Comer, Denise (USA): ''MOOCs Offer Students Opportunity to Grow as Writers''
Haggis, Devena; Vasilache, Simona (Japan): ''Facilitating Public Archaeology through eLearning: Use of Information and Communication Technology and the Construction of Virtual
Worlds''
Mitrofanova, Ksenia A. (Russian Federation): ''e-Learning for Teaching Humanities in
Undergraduate Medical Education''
239
248
253
258
Innovative Curriculum and Teaching Techniques
Barchilon Ben-Av, Mercedes; Ben-Av, Radel (Israel): ''Mathematical Laboratory in Your
Smartphone''
262
Kim, Hyunju; Meghanathan, Natarajan; Moore, Loretta A. (USA): ''Enhancement of an
Undergraduate Software Engineering Course by Infusing Security Lecture Modules''
265
Marlowe, Thomas J. *; Benham, James W. *; Kirova, Vassilka *; Ku, Cyril S. *; Nousala, Susu
**; Jastroch, Norbert *** (* USA, ** Finland, *** Germany): ''Introducing Requirements
Acquisition and Analysis through a Very Incompletely Specified Problem''
270
Education and Training Systems and Technologies
Rodriguez-Yborra, Maria A. (UK): ''Challenging Academic Performance to Excel: the ‘BE’
Project (Performing Beyond Expectations)''
276
Education in Science, Technology, Engineering and Mathematics
Yukech, Christine M. (USA): ''Critical Reflection; Practicing Public Scholarly Inquiry while
Processing with Science, Technology & Society''
279
Educational Research, Theories, Practice and Methodologies
Amos Sr., Christopher N. (USA): ''Coaching and Sponsoring Extra-Curricular Activities: Does
it Make Future Principals Better School Leaders?''
285
Authors Index
291
iv
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Moving an Academic Simulation closer to a Heavy Construction Industry Tool by
adding an Equipment Management Module
Thomas KORMAN
Construction Management Department, California Polytechnic State University
San Luis Obispo, CA 93407, USA
Email: tkorman@calpoly.edu
Hal JOHNSTON
Construction Management Department, California Polytechnic State University
San Luis Obispo, CA 93407, USA
Email: hjohnsto@calpoly.edu
makes discoveries and experiments with knowledge firsthand,
instead of hearing or reading about others' experiences.
ABSTRACT
It is often difficult in a business setting to provide a "learn by
doing" atmosphere where finances are involved.
Most
businesses allow their employee leeway in making decisions,
but not enough so that balance sheets and future business
opportunities are affected. Simulations allow students in an
educational environment to experience tasks and the results of
their decisions, which they will be asked to perform upon
graduation. In the construction industry, many employees are
hired that do not have the training or coursework at the
university level that provides them access to such simulations.
New employees are often placed in a position, trained to do the
daily tasks, but not enough time is available to provide them
with the opportunity to experience the entire operation of the
business. The simulation, Construction Industry Simulation
(COINS), has many of the same decision and overview tools
but in the heavy civil construction sector, a major area key to
successful management is equipment management. Decisions
regarding renting, leasing, and buying equipment, where to
dispatch equipment, and what equipment to have in a
company’s fleet, all affect the profit of a project. This paper
describes the process for enhancing an academic simulation by
integrating an equipment management module.
Experiential learning requires no teacher and relates solely to
the process of the individual's direct experience. However,
though the gaining of knowledge is an inherent process that
occurs naturally, for a genuine learning experience to occur,
there must exist certain elements. According to David A. Kolb,
an American educational theorist, knowledge is continuously
gained through both personal and environmental experiences.
He states that in order to gain genuine knowledge from an
experience, certain abilities are required:
•
the learner must be willing to be actively involved in
the experience;
•
the learner must be able to reflect on the experience;
•
the learner must possess and use analytical skills to
conceptualize the experience; and
•
the learner must possess decision making and
problem solving skills in order to use the new ideas
gained from the experience.
Experiential Learning Business Simulations
Business simulations, for educational and training purposes,
have historically been scenario or numeric based. Most
business simulations are used for business acumen training and
development. Learning objectives include: strategic thinking,
financial analysis, market analysis, operations, teamwork and
leadership. The business gaming community seems lately to
have adopted the term business simulation game instead of just
gaming or just simulation. The word simulation is sometimes
considered too mechanistic for educational purposes.
Simulation also refers to activities where an optimum for some
problem is searched for, while this is not usually the aim of an
educational game. On the other hand, the word game can imply
time wasting, not taking things too seriously and engaging in an
exercise designed purely for fun. The concept of simulation
gaming seems to offer the right combination and balance
between the two. Simulation gaming is also the term that the
educational gaming community has adopted.
Keywords: Simulation, Gaming, Construction Education, Open
Source, Construction Industry Simulation, Building Industry
Game
1. INTRODUCTION AND BACKGROUND
Experiential learning is learning through reflection on doing,
which is often contrasted with didactic learning. Experiential
learning is related to, but not synonymous with, experiential
education, action learning, adventure learning, free choice
learning, cooperative learning, and service learning. While
there are relationships and connections between all these
theories of education, importantly they are also separate terms
with separate meanings.
Experiential learning focuses on the learning process for the
individual (unlike experiential education, which focuses on the
transactive process between teacher and learner). An example
of experiential learning is going to the zoo and learning through
observation and interaction with the zoo environment, as
opposed to reading about animals from a book. Thus, one
1
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
2. CONSTRUCTION INDUSTRY SIMULATION (COINS)
– AN EDUCATION GAMING SIMULATION FOR
CONSTRUCTION ENGINEERING AND
MANAGEMENT
Construction Industry Simulation (COINS) is a computer
simulation built to simulate the business environment for a
construction company. The players, participants, play the role
of contractors, competing in a market with variable demand for
construction work. The simulation immerses students into the
day-to-day operations of a construction company, requiring
them to manage specific aspects of the company with the goal
of procuring and managing construction work in terms of its
planning, scheduling, and resource allocation. Students have a
choice between commercial construction company, a heavy
construction company, or a company that does both. Players
are required to set up a complete business strategy including the
following tasks:
•
examine available information
•
determine the best portfolio of jobs to bid on
•
create strategies to improve bonding limits
•
set strategies to create negotiated work
•
develop bid prices for desired jobs
•
monitor their financial position as work progresses
•
monitor and create strategies to improve company's
appraisal metrics
•
choose and modify their construction methods to meet
due dates and reduce costs
•
interpret their competitors' strategies
•
respond to changing conditions and situations
proposed to the company and driven by the decisions
and actions of the company
For the commercial building construction sector, each project is
made up of nine activities, which are included in a projects
schedule. These are:
•
Excavation
•
Foundation
•
Basement
•
Framing
•
Closure
•
Roofing
•
Siding
•
Finishing
•
Mechanical, electrical, and plumbing
For the heavy civil construction sector, each project is made up
of nine activities, which are included in a projects schedule.
These are:
•
Clear and grubbing
•
Rough grading
•
Excavation
•
Underground utilities (water, sewer, storm drain)
•
Concrete placing and finishing
•
Backfilling and compaction
•
Aggregate base placement and compaction
•
Paving
•
Finish grade
Every activity has five (5) different construction methods that
vary in time and cost. The fifth method is generally use of a
subcontractor. All five methods of Activity No. 9 (Mechanical
and Electrical) are generally subcontracted. The Estimated
Time and Cost Report gives labor and material costs and the
amount of time required for every activity using each of the five
methods. Heavy construction bids are generally unit price bids
while commercial bids are lump sum.
Each company acts as a construction firm within a competitive
environment that has a fluctuating demand for construction
jobs. Firms that perform about average will be asked to
negotiate various work. The game may be played for as many
periods as time permits, each period representing two months.
There can be any number of participating companies in addition
to the internally simulated "unknown contractors”. Five
different types of jobs are potentially available for bidding on
both the heavy and commercial side.
Phase 1 - Project Planning and Design
Students begin the simulation in Phase 1 by being presented
with a list of potential projects to review. Considering market
conditions, student teams proceed by selecting a project to plan
and then designing a project control system for the project.
This is accomplished by selecting methods for each project
activity and balancing the schedule and cost considerations. In
Phase 1, students compete against their peers as well as the
simulation’s virtual companies for award of the project. Award
of projects is based on the team’s accuracy and proximity to the
simulation’s internal estimate. Teams that are not initially
awarded a project for their efforts must continue with the
simulation, refining their plans, until their plans are awarded a
project. Thus, the COINS simulation enables students to learn
from their mistakes.
The following types of commercial building construction
projects (public and private) are included in the simulation:
•
Multi-family housing
•
Educational facilities
•
Hospitals and medical office buildings
•
Commercial office buildings
•
Industrial manufacturing facilities
The following types of heavy civil construction projects (public
and private) are included in the simulation:
•
Highways projects
•
Bridges
•
Residential site development
•
Mass excavation
•
Underground utilities
Phase 2 – Construction Engineering and Management
When a student team is awarded a project, they enter Phase 2.
In Phase 2 student teams must manage their project by
monitoring and controlling the project activities, analyzing the
schedule and costs in reference to the methods to the activities
they selected for each activity. Throughout the duration of their
project, students are presented with real-life scenarios which
they must respond to, thus measuring, testing, and validating
the design of the project control system. Therefore, students are
able to utilize their knowledge and hone their skills at
controlling the process through modifying their project control
system. The simulation provides feedback to the students
Each period the simulation generates a list of jobs available for
bidding and creates an Estimated Time and Cost Report for
each job. Using the this information, each company must
decide which jobs to bid on, the bid price, and which of the five
methods to use for each of the activities. All jobs will have up
to nine activities (Both Heavy and Commercial).
2
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
which they then can use to continuously improve their model
throughout the duration of the simulation.
ratios are also logged along with changes to the company’s
appraisal metrics.
•
Financial Liquidity
•
Financial Success
•
Responsibility
•
Pace
•
Ethics
•
Name Recognition
Phase 3 – Project Closeout
Phase 3 begins after students have completed each activity for
their virtual project. They have the opportunity to evaluate their
performance using several predefined metrics, including
Schedule Variance, Cost Variance, Cost Performance Index,
and Schedule Performance Index.
At the end of a period, the firms examine their Progress Reports
and decide on the effectiveness of the methods chosen for the
various work activities. If they wish, they may change them and
specify different methods for the following periods. The choice
of methods allows companies to utilize slower but cheaper
methods if they fear budget overruns, or faster but more
expensive methods if meeting contractual deadlines is the main
concern. In addition, overtime may be used to speed up certain
activities, greatly increasing the labor costs. Firm must be
concerned with the amount of liquidated damages on each
project as they vary from project to project.
As mentioned above, one of the first activities for the students
is to determine what positions will make up their main office
overhead. This is reevaluated each period, and hire/fire activity
is performed by the team. A report is given to the company
telling them how they are handling their personnel and it's
requirements. Work scheduling is very important in the
selection of the methods so projects can be completed by the
contractual deadlines, and the costs reduced as much as
possible. Each bid price submitted should cover all the firm's
direct and indirect job expenses, its main office overhead costs,
and the desired profit. At the end of each period the simulation
will determine which company is awarded each available
project. The lowest bid will not necessarily win since the
computer takes into account several other factors:
•
Is the firm's cash-on-hand adequate to provide enough
liquidity with regard to the bid price?
•
Is the bid price below a minimum amount, computed
by the program? If so, then the bid will be disregarded
as irresponsible and be rejected.
•
Is the bid price higher than the unknown contractors,
the presence of this simulated company assures a
competitive, uncertain environment with realistic bid
prices.
•
Is the firm within its bond limits?
At the conclusion of the simulation, the program provides each
participating company with final reports, forecasting the
expected results of any on-going projects or their position at
that point in time. It also shows the final total worth of the
firm. Teams should consider maximization of profit as one of
their main objectives, and one of the primary criteria used to
evaluate each firm's performance.
As the simulation
progresses, evaluations of company ratio, and appraisal metrics
can be used to determine successful completion of the
simulation.
3. EQUIPMENT MANAGEMENT MODULE
The developers of COINS have recently completed integrating
a new module, the Equipment Management Module (EMM).
Prior to this addition, the simulation only allowed teams to
allocate personnel resources for each project. With the EMM,
each project and each activity of a project will have an
equipment requirement. Each method for that activity will have
a different number and size requirement. During the work
procurement phase, a company does not have to have the
equipment required in its fleet but if they get the project, the
activity cannot be started or accomplished without the right
equipment. If the project is bid with larger or additional
numbers of equipment and this is not congruent with the actual
fleet composition, the company can proceed but with a time and
cost penalty.
Companies must monitor their financial situations as the game
progresses, forecasting and completing progress payments, and
potential needs for loans. In any period, participants have the
option to ask for information on weather forecasts, material
prices, labor and material availability, and market projections.
These requests for consulting services have a cost and are
charged against the firm's financial account. Using the
information obtained from these reports, companies can
determine the best strategy to proceed for each individual job.
At the end of each period, teams receive a progress report for
the previous two-month period, giving a statement of the firm's
work progress on each of its jobs during that time. It shows the
amount of work completed as well as the expenses incurred for
each activity in every one of the company's projects. The
amount of work completed during a period depends not only on
the methods selected for the various activities, but also on
uncertainty factors during that time such as the weather
conditions, labor availability, and the fluctuating cost of
materials.
This statement above is the driver in front of the module. A
need arises from either computer feedback or the student's
(company's) decision. A company wants to build its fleet for
the future or needs a piece of equipment for a project they just
received. The decision is to Buy, Rent, or Lease (type &
capacity of equipment). This is where the module begins. A
Company will be given capital to accomplish this task at the
start of the game. It is the instructor's decision, i.e. $2,000,000,
alone with an additional $1 or $2 million to operate the
business.
They can immediately start buying/leasing
equipment, or renting. A company can buy, rent or lease
equipment to build their fleet which can also accelerate projects
or help them make bid-time decisions.
An end-of-period financial report is also provided to the
participants showing the expenses incurred during that period. It
lists amounts spent on direct construction services, bidding
costs, delay fines, taxes incurred, and interest on borrowed
money. It also shows payments to the contractor by the owner
according to the payment requests and gives total cash-on-hand
at the end of the period. Each firm may at any time apply for a
loan to improve its financial situation. Loans granted are
amortized over a one year time period. Changes in company
3
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Bidding
Projects are scheduled based on their network dependencies.
Each of these networks has nine activities with an equipment
requirement attached to every activity. Companies will know
how the project should be built and what equipment is needed
for the activity. The size and number of equipment will
determine the speed of project and the cost. Each method will
have specific equipment numbers and sizes. During the bidding
process, each activity has five (5) different methods that the
company team can select. Slower activities are less costly due
to the fact that these have smaller equipment and fewer
equipment units.
4. ASSESSMENT OF STUDENT LEARNING
The simulation has a built-in grading module that can be used to
obtain statistic on the various companies for comparison or to
use in the classroom for grading the simulation. Each faculty
can have their own method of grading. The following on
faculty used a criteria for assessing participation and student
learning:
•
Number of jobs bid
•
Minus the jobs rejected (i.e., not enough bonding
capacity, substantially low cost estimate, etc.)
•
Number of times the number jobs you are the lowest
cost
•
Number of times the company retained earnings
•
Company’s appraisal metrics
Project Management (Equipment Dispatching)
Dispatch (sending of equipment to a job site/scheduling
equipment to jobsite) is not in this module and instead is
connected to the company’s fleet data base.
•
In and off jobs
•
Cost of transportation
•
Availability
Using the seven principles of good practice as an evaluation
metric, the COINS system performs well. It encourages contact
between students and faculty by encouraging frequent studentfaculty contact in and out of classes, which is an important
factor in student motivation and involvement. Faculty concern
helps students get through rough times and keep on working.
Knowing a few faculty members well enhances students'
intellectual commitment and encourages them to think about
their own values and future plans. It develops reciprocity and
cooperation among students. When using the COINS systems,
learning is enhanced when it is more like a team effort than a
solo race. Good learning, like good work, is collaborative and
social, not competitive and isolated. Working with others often
increases involvement in learning. Sharing one's own ideas and
responding to others' reactions sharpens thinking and deepens
understanding. COINS encourages active learning. Learning is
not a spectator sport. Students do not learn much just by sitting
in classes listening to teachers, memorizing pre-packaged
assignments, and spitting out answers. They must talk about
what they are learning, write about it, relate it to past
experiences and apply it to their daily lives. They must make
what they learn part of themselves. COINS gives prompt
feedback. Knowing what you know and don't know focuses
learning. Students need appropriate feedback on performance to
benefit from courses. When getting started, students need help
in assessing existing knowledge and competence. In classes,
students need frequent opportunities to perform and receive
suggestions for improvement. At various points during college,
and at the end, students need chances to reflect on what they
have learned, what they still need to know, and how to assess
themselves. The use of COINS emphasizes time on task. The
time plus energy equals learning. There is no substitute for
time on task. Learning to use one's time well is critical for
students and professionals alike. Students need help in learning
effective time management. Allocating realistic amounts of
time means effective learning for students and effective
teaching for faculty.
How an institution defines time
expectations for students, faculty, administrators, and other
professional staff can establish the basis of high performance
for all. Use of COINS communicates high expectations.
Expect more and you will get more. High expectations are
important for everyone -- for the poorly prepared, for those
unwilling to exert themselves, and for the bright and well
motivated. Expecting students to perform well becomes a selffulfilling prophecy when teachers and institutions hold high
expectations for themselves and make extra efforts. COINS
respects diverse talents and ways of learning. There are many
roads to learning. People bring different talents and styles of
learning to college. Brilliant students in the seminar room may
Owning and Operating Costs
The equipment in the company's fleet will also need to have a
cost associated with the equipment that represents the owning
and operating costs for that piece of equipment.
Equipment Availability
Almost all new equipment is available. Used equipment is what
is on the available List. Rental equipment is generally just the
most used equipment. These three different areas of equipment
must be available to the companies' to buy and rent from.
Equipment will move from one of these locations to the
company's fleet. In the fleet equipment must be identified as
Rented, Owned, or Leased.
Two examples of used equipment websites to be used in this
simulation
are:
http://catused.cat.com/en/
and
http://www.machinerytrader.com/. Equipment has two major
heading, first the categories and second the brand.
Fleet Management
The major home for equipment will reside in the company's
fleet management table. The fleet will grow and shrink based
on the needs of the projects, or strategic purchasing of
equipment to be fit to a market place, or be more competitive in
that market place.
•
status
•
new equipment available for purchase or lease
•
used equipment available for purchase or lease
•
rental equipment available
The question of buy, rent, or lease should look similar to the
personnel section. First, a listing of all the equipment, a second
page with a description and a clickable buy, rent, or lease; and
finally a printable page of the specific piece of equipment.
•
Equipment Categories
•
Equipment Name
4
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
be all thumbs in the lab or art studio. Students rich in hands-on
experience may not do so well with theory. Students need the
opportunity to show their talents and learn in ways that work for
them. Then they can be pushed to learn in new ways that do not
come so easily.
2011 ASCE International Workshop on Computing in
Civil Engineering: June 19-22, 2011, Miami, FL, USA.
[9] Korman, Thomas M. and Johnston, Hal “Enhancing
Construction Management Education though the use of a
Virtual Construction Company Simulation System, ” The
2nd International Symposium on Engineering Education
and Educational Technologies: EEET 2010 in the context
of The 3rd International Multi-Conference on
Engineering and Technological Innovation: IMETI 2010,
Orlando, FL, July 2010
[10] Koster - A Theory of Fun for Game Design by Ralph
Koster
[11] Lacey Duckworth, Dr. Tulio Sulbaran, Dr. Andrew
Strelzoff, Professor Hal Johnston, "Application of a
Communication Protocol Methodology to Embed a
Collaborative Virtual Reality Environment in Building
Industry Game" The 2011 International Conference on
Software Engineering Research and Practice
[12] Lwein, 1951 - Field theory in social science. New York:
Harper Collins Kurt Lewin (1951).
[13] Pfeiffer, 2005 - Engaging Learning: Designing e-Learning
Simulation Games by Clark N. Quinn, forward by Marcia
Conner. (Pfeiffer, 2005)
[14] Prensky, 2004 - Digital Game-Based Learning by Marc
Prensky (McGraw-Hill, 2004)
[15] Senge, 1990 - Peter Senge (1990). John Dewey in
Experience and Education in a chapter entitled, "The
Means and Goals of Education."
[16] Schrage – “Serious Play” Michael Schrage's
[17] Shank - Lessons in Learning, e-Learning, and Training:
Perspectives and Guidance for the Enlightened Trainer by
Roger C. Schank
[18] Schank, 1994 - What we learn when we learn by doing.
Technical Report 60. Evanston, IL: Northwestern
University's Institute for the Learning Sciences. Roger C.
Schank (1994, October).
[19] Watkins - e-Learning Activities: Making Online Learning
Interactive by Ryan Watkins
[20] Whitney, 2004 - "Performance-Based Simulations:
Customizable Tool" by Kellye Whitney. Chief Learning
Officer Magazine, October 2004
5. SUMMARY
A "learn by doing" atmosphere where finances are involved
provides students an educational environment to experience
tasks and the results of their decisions. In the construction
industry, many employees are hired that do not have the
training or coursework at the university level that provides them
access to such simulations. New employees are often placed in
a position, trained to do the daily tasks, but not enough time is
available to provide them with the opportunity to experience the
entire operation of the business. The simulation, Construction
Industry Simulation (COINS), has many of the same decision
and overview tools but in the heavy civil construction sector, a
major area key to successful management is equipment
management. Decisions regarding renting, leasing, and buying
equipment, where to dispatch equipment, and what equipment
to have in a company’s fleet, all affect the profit of a project.
8. REFERENCES
[1] Aldrich, 2005 - Learning by Doing: A Comprehensive
Guide to Simulations, Computer Games, and Pedagogy in
e-Learning and Other Educational Experiences by Clark
Aldrich. (John Wiley & Sons, 2005)
[2] Beck - Got Game by John C. Beck, Mitchell Wade
[3] Johnston, Hal, Borland, Jim, and Craig, K., " Building
Industry Game (B.I.G.) A Computer Simulation for
Construction Management," ASC Proceedings of the 39th
Annual Conference, pp 79-90. [Online]. Available:
http://ascpro0.ascweb.org/archives/cd/2003/2003pro/200
3/Johnston03.htm
[3] Kaye, 2002 - Flash MX for Interactive Simulation: How to
Construct & Use Device Simulations by Jonathan Kaye,
PhD and David Castillo (Delmar Learning, 2002)
Companion CD-ROM with full source code.
[4] Kraft, 1994 – “The theory of experiential education, 2nd
ed.”. Boulder, CO: Association of Experiential
Education. Richard Kraft and Mitchell Sakofs (Eds.)
(1994
[5] Kolb 1984 - David Kolb (1984). Experiential learning:
Experience as the source of learning and development.
Englewood Cliffs, NJ: Prentice-Hall.
[6] Korman, Thomas M., and Johnston, Hal A., “Development
of Use of a Virtual Construction Company Simulation
System for Education”, FECS'12 The 2012 International
Conference on Frontiers in Education: Computer Science
and Computer Engineering, WORLDCOMP'12 The 2012
World Congress in Computer Science, Computer
Engineering, and Applied Computing, Las Vegas, NV.
July 2012.
[7] Korman, Thomas M., “Design and Implementation of
Experiential Learning Exercises for Commercial Building
Construction Education” Proceedings of the 2012 ASEE
PSW Section Conference, Cal Poly - San Luis Obispo,
CA, April 2012.
[8] Korman, Thomas, and Johnston, Hal, “Enhancing
Construction Engineering and Management Education
using a COnstruction INdustry Simulation (COINS)”,
5
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Enhancing Chemistry Teaching And Learning Through Computational Tools: A
Computational Chemistry Cloud Prototype Using WebMO
R. Jay Mashl, Bernie Acs, and Edee Norman Wiziecki
National Center for Supercomputing Applications
University of Illinois
Urbana, IL 61801, USA
J. R. Schmidt
Department of Chemistry
University of Wisconsin
Madison, WI 53706, USA
William F. Polik
Department of Chemistry
Hope College
Holland, MI 49422, USA
learning, a key component in today's science learning standards,
is generally readily possible with computational approaches.
Providing computational resources for STEM education under
such circumstances presents an important and challenging
problem.
NCSA has therefore developed a specialized server to
provide resources for one of the computational and visualization
tools featured in the ICLCS program: the web application
WebMO [5]. This application aims to make teacher and student
access to authentic, research-grade computational quantum
chemistry software more convenient by integrating within its
web-based interface a 3D molecular editor, a computational job
configuration tool, a job manager, and various visualization
tools for displaying molecular properties. The service thus
provided is used by ICLCS teachers and their students during
workshops and throughout the year and by chemistry
undergraduates.
ABSTRACT
The development of a prototype web service, aimed at
delivering computational resources to an educational
community, is described. As a proof of concept, the WebMO
computational web interface that facilitates the use of quantum
chemistry software has been enhanced to run as a “software as a
service” (SaaS) cloud-like computing environment. Promotion
of the service by The Institute for Chemistry Literacy Through
Computational Science (ICLCS)[1] program at the National
Center for Supercomputing Applications is part of its
multifaceted effort to infuse computational and visualization
tools into high-school chemistry classrooms. The development
details provided may be of benefit to others in formulating their
own software delivery model.
INTRODUCTION
STATEMENT OF PROBLEM
Strengthening teachers' and students' understanding of
chemistry is a broad goal of chemistry education. For over six
years, the Institute for Chemistry Literacy Through
Computational Science (ICLCS) at the National Center for
Supercomputing Applications (NCSA) at the University of
Illinois has focused on improving the chemistry content,
pedagogical skills, computational and visualization tool usage,
computational thinking, and technical knowledge of 124 rural
high-school chemistry teachers from 119 rural Illinois school
districts by conducting intensive, multiyear summer hands-on
workshops that are built upon existing, successful curricula and
methods, and by involving teachers in year-long content
coursework, virtual workshops, and continual online interaction
and support via a virtual professional learning environment.
Details about the educational research aspects of this program
are provided elsewhere[2–4].
With computational approaches having become an integral
part of modern science, teachers having experience in
computational thinking and tool usage may have an advantage
in being able to impart knowledge and experience to students
about the computers and the computational world. Even as
computer lab and laptop usage is increasing in K-12 education,
very few schools, especially rural schools, have the highperformance computational resources needed to run numerically
intensive software in the classroom. Moreover, inquiry-based
Providing a computational web service to the hundreds of
students of ICLCS teachers—and the prospect of expanding
service to include potentially thousands of students across many
more science classrooms—imposes a challenging set of criteria
on the server. We require the server to offer concurrent use and
a consistent view of the target application, to be able to
withstand short periods of intense activity (likely sign of handson classroom usage), to have a high availability with fault
tolerance, and to have scalability of service with nearinstantaneous execution of jobs in the face of an increasing
number of users.
Below we describe a prototype server design that employs
virtual machine technology and well-tested, open-source
software to provide a robust centralized web service (i.e.,
software-as-a-service (SaaS)) deployment of the WebMO
application. This configuration can be thought of as a cloud
environment without geographical distribution.
VIRTUAL MACHINES
While in-depth discussion of virtual machines (VMs) is beyond
our present scope, we observe that VM and cloud concepts date
6
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
back to the 1950's and 1960's, yet it is only in recent years that
these notions have attracted considerable attention. In the
commercial sector, there are now several companies that offer
services without cost or offer services or raw computing cycles
for a fee. In the non-commercial sector, for example, the use of
cloud-based environments has become very active within the
computer science education community to have students use
and manipulate virtual machine images to study operating
systems, system administration, networking, clustering, and
security [6–13]. Cloud computing technology has emerged as a
way provide services with reduced operating expenses and
improved reliability [14]. The reduction in cost is in part due to
the consolidation of physical assets and human resources
needed to provision and maintain those assets. The increase in
service reliability is in part due to a reduction in the amount of
end-user effort needed to set up computer hardware and to
configure software and in part due to increased redundancy on
the part of the service provider. It suffices to say that virtual
machines have become a proven technology.
FIGURE 1: Schematic of the virtual machine enhanced
WebMO prototype server. Client sessions (at left) contact the
gateway that provides for fault tolerance of services and load
balancing of users across a pool of “worker” nodes.
Connections may be active (dark) or idle (light). All gateway
and resource pool nodes were realized as virtual machines on a
large-memory physical machine.
PROTOTYPE SERVER SOLUTION
automatically transfers the resources attached to the active node
to one of the passive nodes, making that the new active node.
The capability of the A/P cluster to move resources from failed
nodes to fully functioning nodes gives it the “high availability”
(HA) cluster designation [16].
The resources that need to be kept running during a failover
event are listed in the HA configuration files. Common
resources include ldirectord, ipvsadm, drbddisk, mysql, and nfskernel-server. The role of ldirectord is to monitor the health of
worker nodes via periodic web requests and to allocate nodes
that send a correct response; otherwise, they are deallocated.
The virtual server support needed for scalability is provided by
ipvsadm. The drbddisk resource refers to the DRBD storage
solution, described in the next section.
An overview of the prototype's anatomy is shown in Fig 1.
Users access the service by navigating their web browsers to a
single web location that is the service gateway. The gateway in
turn transparently establishes a persistent web connection
between the incoming client session and one of the independent
“worker” nodes in the dynamically adjustable resource pool.
Each worker node in the pool is an instantiation of a virtual
machine (VM) image, configured with a single processor, 1 GB
RAM, and a minimal GNU/Linux operating system. (Our VMs
were constructed using VMware tools[15], but other viable
methods exist.) The following services are pre-configured on
the VM: a standard web server (Apache), network filesystem
(NFS) client, database client (MySQL), and any scripting
languages needed by the target application (here, Perl for CGI
scripting). The VM image also provides for, or links to, the
WebMO server software and underlying software dependencies.
In order for these multiple independent servers to see a
consistent view of the WebMO user data, we enhanced
WebMO to use SQL-like constructed statements for interacting
with an external, high-performance database that supports
concurrent connections.
In order to give our prototype some of the robustness as
seen in commercial systems, three types of redundancies are
built into the system as follows.
Fault-tolerance Storage
The HA cluster provide to the nodes in the resource pool a
shared, fault-tolerant storage resource in the form of a
distributed replicated block device (DRBD)[17]. As seen in Fig.
2, the DRBD consists of logical storage devices of equal
capacity that are attached one apiece to the redundant HA
nodes. Data written to the storage device attached to the active
HA node is mirrored over the network to the one attached to the
passive HA node. This disk configuration can be thought of as a
redundant array of independent disks (RAID level 1) over a
network. The DRBD acts as a single logical device that may be
exported via NFS to the worker nodes in the resource pool. The
DRBD contains the configuration files for the services running
on the HA server (here, NFS and MySQL). The WebMO
application files, the database, and user data files are treated as
exports of the HA cluster nodes. In our production
configuration, the chemistry software called upon by WebMO
has been placed directly into the VM image; however, there are
alternative possibilities (see Performance Tuning below).
High Availability
The gateway is based on an active/passive cluster, or A/P
cluster, that is comprised of two identically configured,
redundant nodes wherein the node designated as the active node
accepts and directs network requests for services while the
passive node waits to be called into service. A monitoring
daemon known as heartbeat, an open source cluster
management program, runs on each of the A/P nodes, and each
informs the others as to the presence or change in status of
nodes or services, such as may be indicated by, e.g., failures in
hardware or in the operating system, on the active node.
Although there is no limitation as to the number of redundant
nodes, two nodes are very common in practice. On receiving
indication of failure of any kind on the active node, i.e., a
failover event, the heartbeat daemon on the passive node
Load Balancing
Client sessions are distributed among the nodes in the resource
pool. An IP virtual server (IPVS)[18] running on the active
node of the gateway maps client sessions to one of the worker
nodes determined by ldirectord (see above) to be available.
Several kinds of scheduling algorithms are available under
7
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
pool. and by increasing the amount of memory available to the
running VM. It is conceivable to provide separate user data and
application data networks; such notions have arisen in compute
cluster design to separate slow NFS traffic from the much
faster, low-latency communications that are desirable for data
sharing and processing in distributed systems.
SUMMARY
We have developed a robust prototype web service that
leverages virtual machine technology to deliver a scalable,
fault-tolerant, load-balanced resource for on-demand, aroundthe-clock computing by a growing educational community. The
resulting computational service is seen to withstand the short
periods of intense activity created by student users submitting
many relatively short computing tasks in interactive classroom
settings. The prototype is versatile and can grow with the needs
of its users. For example, access to other computational
resources, such as high-performance (HPC) clusters, can be
incorporated in a straightforward manner. The principles we use
are more generally applicable and may benefit others in
formulating their own software delivery model.
FIGURE 2. Configuration of distributed replicated block device
(DRBD) on the service gateway.
IPVS. Our configuration performs software load balancing, and
hardware load balancing solutions are generally available.
PERFORMANCE TUNING
The configuration files for the Linux services were generally
used with their default packaged values with a few notable
exceptions. With regard to the web and MySQL servers, we
used a high-speed threaded version of the Apache server set to a
maximum of 150 clients and 75 threads and a MySQL server
set to a maximum of 600 simultaneous database connections.
At the initial calibration phase of the prototype server, we
monitored the network traffic, load balancer performance, and
job execution characteristics over several days while student
users from high-school classrooms submitted many shortduration jobs. We found the amount time that jobs spent waiting
in the internal WebMO job queues was minimal as the size of
the resource pool grew to ten (10) nodes. Noting that these
worker nodes were hosted on a time-shared, large-memory
machine on which many other projects were also running, we
placed an artificial constraint against automatic increases in the
pool size and designated the worker nodes to receive full
priority so that WebMO jobs are performed as quickly as
possible. This setup for providing near on-demand service is
highly desirable for hands-on learning in the classroom.
Subsequent access to the service by several hundreds of local
undergraduates in selected chemistry courses did not indicate a
need to increase the resource pool size. We attribute this finding
partly to the bimodal time-of-day distribution of WebMO usage
by high-school vs. undergraduate students. We expect,
however, that more nodes will eventually need to be recruited
into the resource pool as the number of active users increases or
as the volume of submitted jobs increases.
Trade-offs between available memory, network bandwidth,
and VM image size may exist, but we have not performed a
complete systematic study. For example, the underlying
quantum chemistry software on which WebMO depends may
be made available to the nodes in the resource pool in a number
of ways. Placing the software on the DRBD is convenient but
may subject user data traffic to bandwidth needs upon executing
new jobs. Similarly, providing this the chemistry software
through centralized application servers may also reduce the
effective user data transfer rate. Installing the software on the
VM image itself, as we have done, does not diminish the
network bandwidth available for user data transfers, but it does
reduce slightly the amount of memory available to
computations, an effect that can be alleviated by using a largememory server for instantiating the virtual nodes in the resource
ACKNOWLEDGMENTS
We thank Dr. Shawn Sendlinger for promoting our service at
computational chemistry workshops, Dr. Jeff Moore for testing
our server in conjunction with online undergraduate organic
chemistry courses, the ICLCS teacher participants who used our
service in classes throughout the school year, and all others who
have contributed to the testing of our service.
Portions of this work were supported by the National
Science Foundation under Award No. NSF EHR 06-34423. Any
opinions, findings, and conclusions or recommendations
expressed in this publication are those of one or more authors
and do not necessarily reflect the views of the National Science
Foundation or those of the authors' respective institutions.
REFERENCES
[1] ICLCS project (http:// iclcs.illinois.edu).
[2] Sendlinger, S. C., Decoste, D. J., Dunning, T. H., Dummitt,
D. A., Jakobsson, E., Mattson, and D. R., Wiziecki, E. N.
2008. Transforming chemistry education through
computational science. Computing in Science &
Engineering. 10: 34–39. doi: 10.1109/MCSE.2008.124
[3] Destefano, L., Dummitt, D. and Wiziecki, E.N. 2010.
Assessing Institutional Transformation and Sustainability:
Lessons Learned from the ICLCS Project. Paper presented
at the 2010 Math and Science Partnership Learning
Network Conference, Washington D.C.
[4] Zeng, Y., Wiziecki, E. N., and Mattson, D. 2011.
Facilitating teaching practice changes through science
teachers' vicarious experiences in an online learning
community. Paper presented at the 17th Annual Sloan
Consortium International Conference on Online Learning,
Lake Buena Vista, Florida.
8
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[5] WebMO project, 2013. WebMO, LLC.
http://www.webmo.net/demo/index.html
[11] Du, W., Teng, Z., and Wang, R. 2007. SEED: a suite of
instructional laboratories for computer SEcurity EDucation.
In Proceedings of the 38th SIGCSE technical symposium on
Computer science education (SIGCSE '07). ACM, New
York, NY, USA, 486–490. DOI=10.1145/1227310.1227474
http://doi.acm.org/10.1145/1227310.1227474
[6] Gephart, N., and Kuperman, B. A. 2010. Design of a virtual
computer lab environment for hands-on information
security exercises. J. Comput. Small Coll. 26, 1 (October
2010),
32–39.
http://dl.acm.org/citation.cfm?
id=1858449.1858457
[12] Krishna, K., Sun, W., Rana, P., Li, T., and Sekar, R. 2005.
V-NetLab: a cost-effective platform to support course
projects in computer security. In Proceedings of the 9th
Annual Colloquium for Information Systems Security
Education. CISSE 05. (Atlanta, GA, June 6–9, 2005).
[7] Wang, X., Hembroff, G. C., and Yedica, R. 2010. Using
VMware VCenter lab manager in undergraduate education
for system administration and network security. In
Proceedings of the 2010 ACM conference on Information
technology education (SIGITE '10). ACM, New York, NY,
USA,
43–52.
DOI=10.1145/1867651.1867665
http://doi.acm.org/10.1145/1867651.1867665
[13] Stockman, M., Nyland, J., and Weed, W. 2005. Centrallystored and delivered virtual machines in the
networking/system administration lab. SIGITE Newsl. 2, 2
(June 2005), 4‒6. DOI=10.1145/1072968.1072969
http://doi.acm.org/10.1145/1072968.1072969
[8] Anderson, B. R., Joines, A. K., and Daniels, T. E. 2009. Xen
worlds: leveraging virtualization in distance education. In
Proceedings of the 14th annual ACM SIGCSE conference
on Innovation and technology in computer science
education (ITiCSE '09). ACM, New York, NY, USA, 293–
297.
DOI=10.1145/1562877.1562967
http://doi.acm.org/10.1145/1562877.1562967
[14] Mell, P., and Grance, T. 2009. Effectively and securely
using the cloud computing paradigm. National Institute of
Standards and Technology, Information Technology
Laboratory.
[15] VMware virutal machines (http:// www . vmware . com).
[9] Stewart, K. E., Humphries, J. W., and Andel. T. R. 2009.
Developing a virtualization platform for courses in
networking, systems administration and cyber security
education. In Proceedings of the 2009 Spring Simulation
Multiconference (SpringSim '09). Society for Computer
Simulation International, San Diego, CA, USA, Article 65,
7
pages.
http://dl.acm.org/citation.cfm?
id=1639809.1639877
[16] Linux High Availability Cluster project (http:// linuxha.org).
[17] DRBD project (http:// www.drbd.org).
[18] IPVS project (http:// www . linuxvirtualserver . org /
software / ipvs.html).
[10] Gaspar, A., Langevin, S., Armitage, W.D., and Rideout, M.
2008. March of the (virtual) machines: past, present, and
future milestones in the adoption of virtualization in
computing education. J. Comput. Sci. Coll. 23, 5 (May
2008), 123–132.
9
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Cubecraft Game: A Framework for Mobile Game’s Development
Manuel Romero Rivera, Jorge Aguilar Cisneros
Universidad Popular Autónoma del Estado de Puebla
21 sur 1103 Col. Santiago Puebla, Pue., México. C.P. 72410
manuel.romero@upaep.edu.mx, jorge.aguilar@upaep.mx
show and share their games, in this way we
are going to encourage socialization and
collaboration among them..
ABSTRACT
A video game is a software system
destined to entertainment. It can be played
in different devices as computers, consoles,
mobile devices, and so on, integrating audio
and video that allows enjoy experiences that,
in many cases, would be difficult to do in the
reality. Although the video games now are
more than informatics products; it is also a
business, information and formation tool, an
object of investigation and even a social
phenomenon [1].
KEYWORDS
Framework, Video game
Mobile Devices, Android.
Development,
1. INTRODUCTION
Over the past 30 years, video games have
become an important part of contemporary
global entertainment. Today they are a huge
business worth billions of dollars [10].
Furthermore, video games have great
positive in addition to their entertainment
value and there has been considerable
success when games are designed to address
a specific problem or to teach a certain skill
[11]. We think is important to play video
games but is more important to build our
own video games.
There are some frameworks used to
make video games for different operating
systems (Android, iOS and so on) and for
different electrical devices (computers,
mobile, and so on), but all the time we need
new frameworks to help people to develop
by themselves their own video games even
though They do not know anything about
software code. This is the reason that we do
a proposal to build a new framework called
Cubecraf. It was oriented for kids in
elementary school, between 8 to 12 years
old. We hope our framework allow them to
develop video games for Android mobile
devices. They can build their own video
games and storage it into their cell phones
without write any line of code only dragging
and dropping cubes in our framework.
There are a big quantity of tool and
framework to allow developing video games,
for example, commercial: Abyssal Engine,
Alamo, Cafu Engine, and so on, free an open
source: 3D rad, Adventure Game Studio,
Blender, and so on, Freeware: Real Library,
BYOND, Defold, and so on. Anyhow, we want
to build a new framework with the paradigm
drag and drop because we want to build a
framework to our Mexican kids, we want to
hear their requirements about our
framework, in this sense we developed a
We also propose design and develop
a website where students will be allow to
10
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
survey where we asked about our framework
and our outcomes show us: Cubecraf is easy
to use and attractive, user do not have
problems to interact with it.
components to develop a software
application [3]. Usually it is formed by
support systems, compilers, code’s libraries
and a friendly user interface that help to use
the entire component in an easy and fast
way [4].
2. PROBLEMATIC
Nowadays, the video games are a
ludic phenomenon very important into the
childhood and adolescent culture. For
example, in a research made with teenager
in ages between 14 and 18 years, the
percent of persons who play video games
were 59%.
In other words, a framework could
be considered as a generic, incomplete and
customizable software application, that the
user can add the correct pieces to create the
application.
Nowadays, there are a lot of
frameworks for games development, but
they are focused to different purposes. In
this paper, we search information of the
most used frameworks, based in their
advantage and disadvantage. This analysis
are going to be used for establish the basis of
our framework.
Perhaps, these persons could have
been asked themselves, at least one time:
How a video game is made? , What I have to
know? or how do I start?. Perhaps an
important quantity of them have tried to
make a video game without a successful
result, however, others, perhaps, have
created their first game with hard working,
but there is always questions without
answers and a lot to learn [2].
The first framework analyzed was
Kodu. This is a visual software tool
specialized for Xbox and PC video games,
generates by a conceptual idea. This tool is
designed to be accessible to kids.
When we talk about video games
development, we used to think that just one
special person can creates it, but it is a big
mistake, because create a video game needs
a very different people like designers,
musicians, writers, etc.
Now, Kodu is used in countries as
Malaysia and Singapore as an educative tool,
because it teaches the way to develop
games. The last reports of these schools
show that it is a tool that helps to improve
the stories creation, helps the kids solving
difficult problems using the “one step at the
time” methodology, teach concepts as
“Cause-Effect” and shows that software
development is a way that kids can
demonstrate their creativity[5].
Once the team is complete, the
Software Engineering needs to have a
specific knowledge about develop and
manage an industrial project software
development, only in this way a game
software development could be successful.
3. STATE OF THE ART
Other framework investigated was
Scratch, it was developed in the
Massachusetts Institute of Technology, and
actually it have been translated about 50
A framework is a software structure,
made by customizable and interchangeable
11
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
languages and it has more than two millions
downloads. It success is contributed to the
ease for develop animations, games, online
news, books reports, greetings cards, and so
on [6].
platform for software distribution. The use of
PHP4, Ajax and MySQL are based in the
compatibility this technologies has with most
of website providers.
Looking for a framework, that could
be a direct competition of Scratch; we found
the Greenfoot frameworks. Greenfoot is
educational integrated software for software
development’s taught and learns to people
without previous knowledge. This framework
is designed for an audience of minimum age
of 14 years and is very common in university
introductory courses [7].
The technologies used are shown in
figure 1, Cubecraf was developed in C# then
it can use source code developed for Android
(Java+XML) or Symbian (J2ME).
Talking specifically about mobiles’
game development, the most used
framework is AndEngine. This framework
was launched to public at early 2010 by
Nicolas Gramlich, based in the availability of
power and engines for the 2D games
development supported by Android platform
[8].
Fig. 1. Technologies used to develop
Cubecraft
4. CUBECRAF DEVELOPMENT
4.2 User’s Interface
We create a framework that allows
developing video games for mobile devices
with Android or Symbian Operative Systems.
The objective of Cubecraft is that elementary
school’s students can create games just
joining cubes. This section shows our
framework proposal.
We used some practices established
in HCI (Human-Computer Interaction)
patterns. These patterns are “General
Graphic User Interfaces”, “2D Graphics User
Interfaces”, and “use of metaphor” [9].
From “General Graphic User
Interfaces”, we use a Shield practice; this
way the user cannot accidentally select a
function that has irreversible effects. This
practice is used for the error’s administration
and is usually implemented as a windows or
alert where the user is informed about the
execution of these processes. This practice
shows to user if a task has finished or it still
in execution.
4.1 System Architecture
The project is divided in two parts,
the framework developed in C# .NET and a
website developed with PHP4, Ajax and
MySQL. We choose a .NET platform because
is a set of new technologies that Microsoft
have been work in the last years with the
objective to make a simple and powerful
12
ion
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
We take from “2D Graphics User
Interfaces” two practices: Breadcrumbs and
Unidirectional
input
devices.
The
breadcrumbs practice offers in the user
interface, a navigation track from the start
window to the window the user wants, and
the Unidirectional Input Devices allows the
user use the mouse or the keyboard access
to the options and make it use easier.
The second area is the Work cubes,
in this section, we identified two areas:
Cubes and My Cubes. In the first area, is
shown as a list, here we show the system
cubes. In the second area are shown the
cubes the user could add to the framework.
The third area is the workspace. In
this area the user can connect cubes to make
the game’s functionality.
We took from “Use of Metaphor” the
combination of communicative codes as
visual and verbal, the objective was to get an
optimal redundancy in the process of
communication with the user.
The fourth and last area is the user’s
help console; this area is divided in two
sections: A User’s functionality help and
Error Console. The User’s functionality help
updates every time the user add a cube to
the workspace, showing the name of the
cube and the kind of cube used.
The Error Console, lets the user know
the errors o potential problem warnings that
do not allow the game to compile or do not
perform the actions. Every time an error
occurs, the user can identified if it is an error
or a warning with the icon showed in the left
of the error. For an error, we use a red icon
with a cross and for the warnings a yellow
icon with an admiration mark.
Fig. 2. Cubecraft Interface
Cubecraft creates its own workspace
in the “Documents” folder. Inside this folder
the system creates the files of every project
creating a specific folder for everyone.
Taking the good practices last
mentioned, we design the user interface. The
window on the left, allows the user interact
with Cubecraft and to develop their video
game (fig. 2). We can see four areas: The
Option Menu, the Work Cubes, the
Workspace and the User Help Console.
Inside every project’s folder, there
are another two folders and a file with .CUB
extension. The folders are “Entregables” and
“SRC”, the Entregables folder have the
application compiled and ready to be
download to a mobile device, the extension
of this file is defined by the Operative System
selected in the project’s creation.
In the Menu area, there are a menu
bars and quick access that allow the user
make some actions for example: create a
new project, open an existing project, save a
project, and so on.
The SRC folder contains all the
classes generated by the framework used to
13
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
compile the game. As the Entregables’ folder
the extensions of the files inside this folder
are defined by the Operative System
selected.
the parameter’s fields based in the type of
data received.
The file generated in the project’s
root folder contains all the configuration
information, this file is detected by the
framework when the user wants to open it.
For safety and integrity of the data, the user
must avoid modifying or deleting it, because
it may cause the project not run and loses
the job done.
The website is designed as a way
where users can upload their games and
discuss their experiences with others
developers. In the website, inexperienced
users can find important information as
user’s manual, API’s documentation, and so
on.
4.3 Website
As a safety measure, all the actions
the user can do in this website, including the
use of the Online Score System, must be
done as a register user. The user can create
their account using a registration form or
using a social network as Facebook, Twitter
or Google+.
Fig. 3.Functionality cubes
The functionality cubes represent an
action which can be executed in a game. We
chose Cubes because they are ease to
manipulate and generate depth effects using
two-dimensional images. The perspective
used in the cubes (isometric view), can
generate an effect of assembly between two
or more cubes (figure 3).
5. FUTURE WORK
As future work, we are going to test
the system with students in ages between 8
to 12 years in different schools of the city,
applying a survey that could give us a
feedback about the usability and acceptance.
Also, the survey is going to help us in search
of new requirements and functions the final
users want to have in their game’s
development. After this first survey we are
going to modify our framework and will be to
apply one more time our survey. This second
survey will give new feedback about the
viability of the system and if the
modifications we did based in the first survey
get better the system or we have to update
something.
They handle three colors, based on
traffic light colors. Those colors were chosen
because their use in the daily life of people is
very common.
Every cube needs the user sets some
parameters to work. Usually the root cubes
just needs an identification name, while
other cubes need more parameters for
complete their setting. The cubes have a
button in the front with the label
“Configurar”. When this button is pressed,
shows a window that read the parameters
specified in the function’s DLL and configures
Once the framework fulfill all the
requirements and modifications, We are
going to distribute Cubecraft game.
14
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Your First Android Game. Addison-Wesley
Professional.
6. CONCLUSIONS
Although there is an important
quantity of frameworks for the PC or Mobile
app development, we want to build one to
specific requirements or our Mexican kids.
This framework could have a high impact in
the way the professors taught the principles
of software development to their students.
[9] Fakhreddine, K. Alemzadeth, M. Saleh, J.
& Arab, M. Human-Computer Interaction:
Overview on State of the Art. Department of
Electrical and Computer Engineering.
[10] Martin Adolph, (2011) Trends in Video
Games and Gaming, ITU-T Technology Wath
Report.
Regarding the kids skills, this
framework could be an extra tool for their
parents, teachers and them to improve
unconsciously their skills that can be used in
the school or later in their jobs.
[11] Mark Griffiths, (2002), The educational
benefits of videogames, Education and
Health, Vol. 20, No. 3
REFERENCES
[1] García, F. (2005). Videojuegos: Un análisis
desde el punto de vista educativo.
[2] Bondon, P. A., & Felmer, L. R. (2008).
Usuarios habituales de videojuegos: Una
aproximación inicial. SciELO. [Eli]
[3] Gutiérrez, J. (2006). ¿Qué es un
framework web?
[4] Maxxes System (2010). What is a
Software Framework?
[5] Knowledge Bank: Next Generation
Research. (2010). The impact of Web 2.0
Technologies in the Classroom. Sydney,
Australia:
Research
and
Innovation
Department of Educational Early Childhood
Development
[6] Maloney, J. Resnick M. Rusk, B. &
Eastmond, E. (2010). The Scratch
Programming Language and Environment.
Massachusetts Institute of Technology.
[7] Kolling, M. (2010). The Greenfoot
Programming Environment. University of
Kent.
[8] Rogers, R. (2011). Learning Android Game
Programming: A hands-on Guide to Building
15
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
The Interactive Book Report: Playing the Pages
Dr. Marjorie S. Schiering
Division of Education, Molloy College
Rockville Centre, New York 11572, USA
Dr. Audra Cerruto and Tara Benton
Lexington School for the Deaf, NYC, USA
Beth McGovern and Heidi Heilmann
Our Lady of Victory School
Floral Park, L.I. NY. USA
Erin McCarthy at Thiells Elementary School in Rockland County, NY.USA
Ann Hultman Jakobsson: Edboskolan in Trangsund, Sweden
Key words: Interactive, educational games, reciprocal
thinking, project-performance-evidence based learning
York. It came attached to a philosophy of education that
became known as A Model for Academic and Social
Cognition (Schiering, [16] © 2003a; Schiering, Bogner,
Buli-Holmberg, © [19] 2011). This model connects
Common Social/Societal Realities, Belief and Value
Systems stemming from the Cognitive Collective/
Thinking and Feelings (Schiering, © [14] 1999; [15]
2002; [20] 2012) to address knowing one’s students.
Specifically, the methods of instruction related to form a
Sociology-of-the-World (SOW) interconnected with the
external factors that affect our lives on a daily basis from
the time we’re born are addressed. These external factors
include one’s religion, economic status, academic
standing, and the political situations that govern us. These
four factors move inwardly and outwardly to influence
person’s behaviours and life-goals through reflection on
experiences we’ve had. The IBR serves as such an
experience; one from which we learn that it shapes beliefs
and values one holds about the learning situation.
Abstract
The purpose of this qualitative attitudinal study was to
initially teach by involving student learners in “play,” as a
means to provide instruction. “The Interactive Book
Report (IBR)” (Schiering, © 2003) teaching and learning
method was used in the study. It is a new and
comprehensive, as well as interdisciplinary process for
teaching and learning, Three classrooms in the USA and
based in the greater New York area and one classroom in
mid-Sweden comprised the subjects of the study.
Ultimately, following the classes’ designing, creating,
identifying specific cognitive skills associated with the
playable pages of the IBR, students shared their work
with other classes and had an international exchange of
ideas, on the IBR topic of ecosystems and sustainability;
how to keep our planet’s varied environments safe. The
schools included in this study were at the first, third and
fifth grade levels. Respectively, these schools were a
special NYC needs one, a Rockland County elementary
one, and a Long Island K-9 parochial institution. The
study was initiated through the funding-of-IBR-supplies
from the Lego Children’s Fund and the IBR inventor
/professor from Molloy College. The New York State
Environmental Conservation Department sponsored a
Recycle Poster Contest and all “study” schools in the
New York area participated. For the making of the IBRs
the special needs school was tremendously involved in the
poster contest with submitted posters being highly
interactive. The subsequent attitudinal study was with 74students from the students in grades three, five and the
mid-Sweden school third-fourth grades. The responses on
the attitudinal study were in the 95% range for finding the
IBR method of Playing-to-learn” most likeable. Dr.
Schiering, acting as a participant, observer, and instructor
visited each school, almost weekly, from January to June
as the posters and IBRs were constructed.
Dunn and Dunn, in their Learning Style Model [4] (1992)
refer to it being important to realize the varied ways
students learn. One model aspect involves perceptual
preferences. The IBR addresses all modalities in the
creation and later manipulation of the interactive
instructional resources. Combining this portion of “style”
with knowing “who” one is as a learner, the idea of the
IBR method, a self corrective means of teaching any
discipline, joins learning styles with the aforementioned
academic and social cognition model, and the IBR
method; three-in-one.
Considering the rationale for this project, overall, it’s
what Molloy College technology professor Rickey
Moroney {9} (2013) said when discussing the IBR with
her teacher candidates. “The first way we learn as babies
and children is through play (gaming) which can be and
often is creative and imaginative. Let's play house, school,
shop, teacher and etceteras. These ‘play’ or ‘role-play’
activities are also preparing and equipping us for future
life experiences. When you create (produce, perform, or
present) you take ownership of what you have learned.
This makes the learning that takes place more authentic
and a learning experience that the learner takes with them
IBR History, Learning Styles, and Rationale
“The first experience with The Interactive Book Report
took place in the mid-1990s in a fifth-grade classroom at
Stony Point Elementary School in Rockland County, New
16
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
(remembers and incorporates into their existence) going
forward.”
“This IBR book is something that’s natural when
realizing we learn through play by addressing ‘style’
perceptual preferences of learners, regardless of their age
or grade levels. And, these ‘play’ and ‘style’ experiences
we have impact on us by causing formation of memories.
We retain what impressed us! Being involved and
engaged in something helps us to recall it. Consider the
IBR at the ‘cutting-edge’ of project and performance
based teaching and learning to promote thinking and
overall creative cognition. The IBR may also be used for
differentiation of instruction and alternative means of
assessment” (Schiering, {17} 2003b).
educational and interactive games/instructional resources.
This learning tool provides evidence-based and
experiential learning that is intended to facilitate the
learners’ ability to grasp and retain concepts in varied
disciplines being presented” (Schiering, {18} 2003c). Our
goal for this study was for the students to learn about the
ecosystem and sustainability topic and teach themselves
and others in an engaging, creative, and thoughtful
manner.
However, first it was important, we co-authors believed,
to examine the acquisition of memory. This was to better
understand why material is retained. The question of why
one remembers is given attention for comprehension of
the importance of recalling and reflecting on past
situations that may lead to decision making and problemsolving. What causes one to remember some things and
not others? Is this due to the style-of-delivery and the
listener’s or doer’s interest in the content material? Is it
because of the emotion that is associated with the
memory? Does one of these take precedence over the
other? First, it seems important to know about memory,
which is the ability of the brain to reflect on and recall
past
experiences.
Gazzaniga{5}(1998;10)
stated,
“Evolutionary theory has generated the notion that we are
a collection of adaptations – brain devices that allow us to
do specific things…Many systems throughout the brain
contribute to a single cognitive function.” Then,
understanding how the memory works imposes a major
dynamic when referencing the connections of hearing and
seeing a specific science discrepant event and thinking
about how this was possible and plausible when it
seemingly defies inductive or deductive reasoning. “The
most fundamental things scientists have learned about
memory is that we do not store memories whole and
therefore do not retrieve them that way either. When we
remember something, we actually reconstruct it by
combining the elements of the original experience”
Brandt {1} (1999:238). Neuroscientist Antonio Demasio
{3} (1994: 84), explains that a memory “...is recalled in
the form of images at many brain sites.”
Introduction
The Lego Children’s Fund provided funding for supplies
to have students create the Recycling topic posters and
IBRs on ecosystems and sustainability. Educator, Tara
Benton {2} (2013), a third-grade teacher at the
aforementioned special needs school, was the first to
begin this project with school psychologist, Dr. Audra
Cerruto {2} (2013). Working collaboratively with Molloy
College’s Dr. Schiering, many of Tara’s ideas served as
the impetus for the classes’ active engagement in
learning. Tara, working with her students, created
learning interactive instructional resources and Smart
Board activities to later share with the other projectparticipating classes. The activities in the IBR addressed
varied cognitive and meta-cognitive skills and the
Reciprocal Thinking Chart, (Schiering, {14} 1999) was
introduced to participating teachers to realize what
specific thinking skills were developed in students by
“playing” the IBR pages. (See Teaching and Learning: A
Model for Academic Cognition, 2011; Pp. 211-217:
Rowman and Littlefield)
The authors believe that the educational process crosses
an indiscriminate and interdisciplinary continuum that
forms connections while correlating diverse populations
and learning preferences. These are activated through
learning style perceptual preferences involving auditory,
visual,
tactual,
and
kinesthetic
modalities.
Conceptualizing the cogent attention to instructional
methods of the IBR that facilitate the student-learners
cognitive and meta-cognitive skills and processes; the
authors examine the influence of educational gaming on
the individual’s thinking processes. Some of these include
comparing and contrasting, prioritizing, decision-making,
problem solving, evaluating, reflecting, analyzing,
recalling, inventing, and self actualizing.
The use of one’s memory then applies to the ability to
comprehend in three formats which include: 1). attention;
one’s ability to focus on a specific stimulus without being
distracted; 2). Orientation; the ability to be aware of self
and certain realities and facts of the present, and 3).
Problem-solving: the ability to understand a problem,
generate solutions and evaluate the generated solutions
(HHH and Schiering, {8} 2004. Overall, memory is
created by playing the pages of the IBR, as students are
engaged in the learning process.
Explaining the IBR and Reciprocal Thinking
With Memory Acquisition
The Reciprocal Thinking chart (Schiering, {17} 2003)
provides a listing of the cognitive and meta-cognitive
skills developed by playing the IBR pages.
“The IBR is a compilation and consolidation of
interactive instructional resources developed by students.
The IBR synthesizes the material into a binder of
17
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
concept of recycling is everywhere, but what do the blue
and green containers actually mean? In order to teach the
concept and value of recycling and sustainability to these
young children, a dynamic approach that envelops their
senses, and captures their curiosity and enthusiasm for
learning was utilized. As a result, hands-on learning with
tactile and kinaesthetic instructional resources, known as
“educational games” was employed throughout this study;
‘style’ was evidenced.
Table 1: Reciprocal Thinking Phases: Cognition
and Meta-cognition Chart
RECIPROCAL THINKING PHASES
COGNITION and META-COGNITION
Regardless of one’s cultural mores, geographical location, grade level, gender, or age;
There are common social and societal realities that are influenced by the terms in
“Reciprocal Thinking” and affect our belief systems.
PHASE TWO: CRITICAL and CREATIVE
THINKING
PHASE ONE: BASIC AWARENESS and
ACKNOWLEDGING
1
Recognizing
Realizing
Classifying
Comparing
Contrasting
Our thoughts,
ideas, opinions,
judgments, and
feelings impact
‘who’ we are as
learners, and
‘how’ we learn.
Co-joined,
these form the
“Cognitive
Collective.”
2
Prioritizing
Communicating
Inferring
Predicting
Generalizing
Sequencing
Initial Deciding
Initial Problem-solving
Order of Activities
Initially, the programmed learning sequence book,
Ecosystems: Now, There’s a Niche for You (Schiering, ©
{13}1996), served as the introduction to the
aforementioned topic. Several IBRs were shown and
educational games, made by teacher candidates in EDU.
506A (Integrated ELA and Reading) at Molloy College
were there for these student learners to ‘play’. The first
topic to be introduced was ecosystems. Vocabulary words
were extensive and overwhelming to the second, third,
and fourth grade students who are hearing impaired. As a
result, the use of interactive puzzles/Task Cards relating
to varied “environments” were created with the students
with vibrant illustrations to portray the ecosystem. This
vocabulary was infused into the day-to-day discussions in
the classroom, creatively, by teacher Tara Benton {2}
(2013). “Words were posted on the ‘word wall’, practiced
and applied in a science journal, and ‘played’ with
through games. Mastery of the vocabulary words was not
the goal. Rather, the application of the concept of
sustainability and the importance of recycling for our
environment was the focus. This was reinforced through
the use of authentic literature.”
PHASE THREE: META-COGNITIVE
PROCESSES
3
What are
Evaluating, Organizing
Critiquing, Collaborating
Tolerating, Advanced Deciding
Risk-taking, Inventing, Analyzing
Synthesizing
Advanced Problem-solving
Recalling, Reflecting
you thinking?
?
Self-actualizing
(©Schiering, 1998; Buli-Holmberg, 2006; Bogner, 2007)
Schiering, © 1999
Methodology: School One
Dr, Cerruto {2} (2013) explains that from her perspective,
as the school’s psychologist, she found that in the midst
of this tenuous time for teaching and learning with an
increasing emphasis on testing, test preparation, and
implementing unproven academic standards, her
colleagues and she question the impact on our students.
Will our students be able to sustain their enthusiasm for
learning despite the hours spent confined to learning and
performing within the limitations of the testing
movement? As a school that services students with a
hearing loss that is severe enough to adversely impact the
development of language and the learning process, we are
challenged to make every learning experience
meaningful. By striving to make learning useful, it is our
hope that students will internalize and apply the
information to build a rewarding life. So, will state tests
capture the dynamic process of learning that is occurring
in our classrooms each day, month, and year? Are there
other tools available to demonstrate the complex teaching
and learning process that brings into the individual
application of what’s presented and retention of it?”
School One: The Challenge
The class listened to Something from Nothing, (Gilman,
{6} 1993). This picture book relates how a grandfather
makes his grandson a blanket and then, when it’s “tattered
and torn,” sequentially, makes seven small pieces of
clothing for the child to wear. When there was nothing
left of the original fabric, it was discovered that there was
enough “material,” content wise, to write a story about
this process of recycling and reusing the original blanket.
Each student used a paper-blanket to transform the items
in the book using scissors. This hands-on experiential task
provided the students with the opportunity to see the
dynamic and creative process of sustainability of the
paper blanket.
The first challenges were to build prior knowledge, to
develop vocabulary skills, to apply information to
personal experiences, and to act on student knowledge in
meaningful ways. But how does one do that with children
whose sensory limitations may have affected their
experiences and exposure to content that their “typically”
functioning peers may have learned vicariously through
their personal and educational experiences so easily? The
The next step in this study found the teachers placing
recyclable items around their respective classrooms. The
student learners, then dressed in teacher-provided white
shirts, which served as “lab-coats,” went on an
“Ecologist” scavenger-hunt. Finding the ‘hidden’ items
around the classroom, the children in each class made of
list of these objects and discussed how every one of them
might be reduced, recycled and/or renewed. Their ideas
18
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
were charted. The concept of the 3R’s was applied to real
objects in their world. This activity involved the students’
physical and mental participation.
page outside and inside the binder that represents the
topic or theme of the IBR, the next inside page has a
Table of Contents. Then, there’s a Welcome page that
invites the students to “play” the pages. This is followed
by the Reciprocal Thinking Chart and an Identification of
skills one, as well, Next, the interactive pages for a
thematic unit have a minimum of five self-corrective
educational games with a cover page explaining how each
activity is played. For a review-of-literature or Theme
IBR this same process is followed and: interactive
instructional resources relating to reading, English
Language Arts (reading writing, listening or speaking
activity), social studies, math, and science are provided
along with two “creative pages.” A closing page thanking
the students for playing-the-pages is oftentimes
accompanied by a congratulatory “certificate of
completion.”
Benton, the special need’s children’s teacher, created an
interactive Smart Board activity on the topic of what
materials could be recycled based on whether they were
biodegradable or non-biodegradable. After introducing
these terms, there was a slide with a pile of dirt where
there were scattered such items as an aluminium soda and
plastic bottle, piece of paper, plastic bag, metal thermos,
toothpick, glass pitcher, and other items. When the child
went up to the Board, he/she would say, before touching
the item, whether it was biodegradable or not. If the item
disappeared upon touching it the student knew it was
biodegradable and wouldn’t be recycled. But, if the item
went around in circles it was not biodegradable and would
be able to be reused in some fashion. Students made a list
of how these items may be used again. (Tara Benton
shared her Smart Board activity with the other schools
doing this project.)
Methodology: School Two:
Beth McGovern and Heidi Heilmann
Our Lady of Victory School on Long Island, New York
was the second school to become involved in the Lego
Children’s Fund grant “Ecosystem and Sustainability”
endeavour. The fifth-grade teachers Beth McGovern
(Science and Math) and Heidi Heilmann (ELA and Social
Studies) {12} (2013): are veteran teachers. Considering
the grade level, the students have had more experiences
than the third graders in the other three schools. However,
like the other students in this project they were extremely
enthusiastic about the creation of educational games.
They were all for discussion about how things should be
done and celebrating a sharing of ideas and became
engrossed in “creative cognition” (Schiering, {20} 2012).
Additionally, as all of the aforementioned activities took
place the students’ teacher created a student’s science
notebook. Students, in written format, maintained how
three items put in plastic tubs filled with dirt would
respond over time to the environment. One tub had paper
in it and the other two a piece of apple and hearing-aid
battery, respectively. The children drew pictures of the
objects when first put into the soil and then at weekly
intervals for the duration of the IBR project. The goal was
to realize how the first two items were biodegradable, but
the last one maintained its shape and size with all internal
components not affected.
Thoroughly understanding the basic concepts of the 3R’s,
interactive activities were developed by the students to
promote mastery. This class of six students created FlipChutes and Pic-a-Dot cards for each other. Task Cards
were also made. Interestingly, students “played”
interactively with the materials. Then, the students
designed their own posters based on the topic of the 3R’s
for the aforementioned Environmental Conservation
contest. They were encouraged to incorporate the
interactive activities into their posters. Once again, the
students created educational gaming materials, applying
their knowledge in different and creative ways, on a
poster board that took on new dimensions. The flat board
took on a three- dimensional aspect when the students
built educational games, complete with manipulative, into
the board. The importance of the message regarding the
3R’s took on a new dimension when the audience, usually
passive observers, played interactive games to learn about
sustainability. Following the making of posters, the
students began the process of creating an IBR on
Ecosystems and Sustainability.
Inside the IBR is a set of educational games placed in a
page protectors or pouches. Following a decorative cover
The student learners in these fifth-grade classes worked
primarily in small-group format. They were the first to do
creative writing by imagining themselves as a metal,
glass, plastic or paper recycle-able item. This creative
writing assignment included possibly giving the item a
personal name, like “Tom,” and then explaining how
he/she was used on an everyday basis. The writing
sequence that followed was to relate how this item was, at
some point, discarded, and what happened next, later,
then, and lastly. Story writers then role played this story
as it was read to the class by a narrator.
One student group wrote how the reused/recycle- item
was a “half-gallon milk container” in a refrigerator in a
store. Bought by a young girl’s mother, the milk container
in the story was named, Ruth. She was used on cereal
each morning for a few days. Then, the girl’s mother went
to “throw out the empty cardboard container” when the
girl stopped her by saying, “Wait, don’t throw that out,
my teacher said that if you clean this out, thoroughly, that
it can be used for a project we’re doing tomorrow. We’re
making Flip-chutes.” The mother responded, “What’s
19
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
that?” The girl answered, “Oh, it’s an educational game
and we make openings in the top and bottom and then
chutes for cards to be put in the top slot. The card has a
question on it like a math problem. And, when the card
comes out the bottom opening the answer appears. Wait
till we make it and I’ll bring it home to show you.
Actually, you don’t have to wait to see what it looks like,
because here’s a picture of a Flip-Chute. (The student
then produced a picture perfectly drawn of the recycled
milk container as a Flip Chute.) [See Teaching and
Learning: A Model for Academic Cognition, 2011; P.
211: Rowman and Littlefield)
working on with Dr. S have been beneficial for various
reasons. The use of these interactive instructional
resources has helped many of my struggling learners feel
successful. These games are a great way for students to
see curriculum material in a new or different way. It also
helps to make the facts or information more meaningful
and exciting to them. This in turn helps the students to
retain the information. In addition, many of the games
require the students to be creative by using their
imaginations. All of this gets the students exited about
learning.
The games that they have made are also tools that the
students will be able to carry over into other subjects and
curriculum areas. I can see many opportunities for the
students to create games to practice their math facts or a
game based around a story we have read in class. The
games can also be easily adapted for students to study and
quiz themselves about any of our various science or social
studies units.
Heilmann related that she thought the students’ writing,
overall, was amazing and both teachers complimented
everyone on their creative stories. One student wrote by
herself about the recycled item being a Christmas tree and
being used as a “holiday symbol” Then, the tree was
taken to a shredder to be used as mulch for plants. The
story’s end was especially loved with this thought of the
tree, “I may not be used now for the purpose I was
intended, but I’m helping our environment and that’s a
good thing.”
In addition to the education benefits, I have seen some
very strong social benefits as well. I feel that these games
have provided a way for my students to work
collaboratively with their classmates.... in ways I’ve not
observed so much this school year. I have seen many of
them share and work together to make decisions and solve
problems through the creation of these games. I have also
seen students work with classmates that they do not
usually get to work with while in the normal classroom
setting. It has been an experience that I feel has helped to
bond my students together as a classroom community,
realize their creativity and thinking skill development.”
In a discussion with teacher, Beth McGovern, she
commented about being truly impressed with the high
level of collaboration the students have had during the
times we’ve met. “They are really ‘getting along’ and
sharing ideas and acting on them so well. I am really
impressed with their creativity and use of imagination.
And, I think they are going to use these educational
games for a long time to come; beyond this year. And,
some of the children who have had difficulty sharing
ideas, well I’m looking at one right now who is really
producing work when previously there was little
involvement or effort. It’s really nice to see them
participating so much.”
Reading over Erin’s observations the Model for Academic
and Social Cognition mentioned at the start of this article
comes into focus most profoundly. The idea of “social
literacy” has been provided by sharing common social
and societal realities, which forms belief and value
systems that, in this case, bring a classroom full of eight
and nine-year-olds to unity of purpose. Furthermore,
“There is no competition,” explains Ms. McCarthy, “but
rather working together for learning. The result is that
within a year’s time the children will be actually teaching
other children in the school when they use the IBR.
Subsequently, school community is realized. Perhaps a
sense of pride ensues...one that has children saying things
like this, ‘I think the IBR was very fun and I learned a lot
of recycle stuff.” Or, “I felt happy when doing the
games,” and “I like doing this, because we shared.”
Methodology: School Three:
Erin McCarthy:
“At Thiells Elementary School in Rockland County, New
York, McCarthy relates {16} (2013) that her third-grade
class followed the same procedures as the second school
in this article. This was with respect to the introduction to
ecosystems, laminating the Task Cards they created,
doing creative writing as if a recyclable object from that
objects point of view, sharing the stories, going on an
Ecologist Scavenger Hunt, doing teacher Tara Benton’s
Smart Board activity, making posters and sharing ideas
about how sustainability and the 3Rs work for people in
their school and surrounding area.
Methodology: School Four:
Ann Hultman Jakobsson
The third-graders exhibited high interest each Friday
when Dr. Schiering came to visit the class and instruct on
ecosystems and educational games with “style” in the
mix. The educational games that my students have been
Ann Hultman Jakobsson {7} (2013) at Edbskolan in
Sweden writes, “When the students first got the package
from the United States with student-made educational
20
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
games, they were very excited. They wanted to start
making their own games right away. After reading the
book Something from Nothing, which the students also
really appreciated, we repeated what we had learned
during the year about sustainable development and
ecosystems. We talked about what activities we had done
to learn about these subjects and then we talked about
some English words for what we had learned.
easily made the second and third game. This is proof that
they learned the process by taking part of it and then
being imaginative and creating on their own.
I can also see that a couple of students were not benefited
by working with the instructional games. These are
students that mostly wanted to write answers in a book
and that have a hard time focusing on the subject. My
guess is that they will be helped by playing the games,
and that it is the making of the games that did not suite
them. Some groups are already done with their games and
they have started to make another game on a different
subject. They are making games about the historic times,
the years between Before the Common Era and 1000
years after it for review of what we have learned this year,
and these educational games, for an IBR, are definitely
something we will keep on doing.
Because the students started to read English as a school
subject this year, and because the vocabulary in this
subject area is quite difficult, even in their native
language, the students started to search for information
and write questions in Swedish. They choose in what area
they wanted to make a game and then they wrote their
own questions by reading about the area in books and/or
on the internet. Even to write questions with multiple
choice answers turned out to be a challenge and we had
some good learning experiences while doing this. The
students worked in groups and their next assignment was
to translate the Swedish questions and answers into
English. They used Google translate for this, as they sat in
groups and discussed the suggestions for translation they
got from this source. Follow-up was meeting with me for
right translation.
Conclusions:
Perhaps the best way to address the conclusion of this
project, other than showing the Attitudinal Chart at the
end of this article, would be to share the comments from
Beth McGovern and Heidi Heilmann {12} (2013): “This
IBR collaboration was a great learning experience for us
as teachers, but was especially wonderful for our classes.
They were thrilled to be involved in this unique
collaboration between a veteran college professor,
elementary
school
teachers,
and
themselves.
Collaboration is the operative!
The most popular games the students made were done in
small groups and were the Flip Chute, Pic-a-Dot and
Electro-board, all learning-“style” related activities. They
wrote the final version of the questions. I found I have a
very creative group of students and they were really
enthusiastic about making the educational games for the
IBR. I have templates the students followed for these
games on a CD that had been made by Lena Boström, the
principal of my school.
Creatively, one group made a board game, and they also
thought of making extra inventions on their game that
weren’t in the templates. They made it so that both the
rules and the question cards stayed on the board at all
times by an elastic band. Every day at least one or two
students came and asked if we were going to work on the
IBR method project. Even students that usually do not get
inspired by school work came up to me and asked if we
could “play.”
We spent time together, creating interactive educational
materials for a unit on Environmental/Ecology awareness.
The activities were exciting and fun! Our students were
very creative, truly enjoying their improvisational
performances. One particular activity involving Dr.
Schiering, was inviting students to 'act out' their creative
writing stories about the life of a recycled item. Most
importantly, aside from the cognitive development and
social interaction, we observed students who were quiet in
class, becoming 100% engaged! One child, in particular,
who is struggling with English as a second language,
really blossomed. We all learned that the interactive
educational games could certainly be integrated and
carried-over into all curriculum areas and meet our new
Common Core learning standards.”
There have been a lot of challenges, especially since they
had to read and write in a foreign language. Despite that,
the students have been working eagerly, they have been
very creative and they have had fun with looking forward
to exchanging their IBR with classes in the USA.
Everyone has participated and done something and they
are very proud about this, and how it broadened their
English vocabulary. The students have learned a lot about
sustainable development and ecosystems. What they
haven´t learned yet I´m sure they will learn while trying
out their friends games. Another thing that is very obvious
is that once the students had made their first game they
As the lead author, reviewing these pages of comments by
the IBR project participating teachers, it’s rather clear that
they, as well as myself, and the student learners, partook
most enthusiastically in the making of instructional
resources. In three classes, the interactive posters, and in a
different three, the IBRs were produced. Sharing these
within and between schools and nations, creating and
maintaining classroom community, and bonding were at
an all time high level. This occurred as children in these
third and fifth grades joined together with their teachers
creatively expressing Molloy College’s interest in
sustainability, because of the Lego Children’s Fund grant
21
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
provision of materials for the IBR, and came to fully
comprehend the importance of having ecosystems that are
sustainable and keeping them that way for future
generations. At some point each of us has said, “This has
truly been a worthwhile experience.”
6. Gilman, P. (1993). Something from Nothing. Scholastic Inc.
New York.
7. Hultman Jakobsson, A. (2013). International Exchange of IBR
Pejoratives. Trangsund, Sweden
The Chart that follows, Pizzo’s Semantic Differential
Scale {12} (1981), shows attitudes regarding learning
when using educational games such as those in the IBR.
8. HHH and Schiering, M. (2000). Memory: The Core of
Cognition: Rehabilitating Stroke Victims. In Helen Hayes
Rehabilitation Hospital Publication for Rehabilitation Practices
(Ed.). Haverstraw, NY. Jakobsson Hultman, A. (2013).
International Exchange of IBR Pejoratives.
Table 2: IBR with Pizzo’s Semantic
Differential Scale
9. Moroney, R. (2013). Conversations on “Learning through Play”
Molloy College, Rockville Centere, NY..
Helpful
46
24
3
1
0
Not Helpful
Clear-minded
40
17
12
2
3
Confused
10. McCarthy, E. (2013). Conversations on Using the IBR.
Thiells Elementary School. Thiells, NY.
Energetic
43
15
11
4
1
Tired
11. Pizzo, J. (1981). Semantic Differential Scale. Dissertation
Abstracts International. 42. 2475A.
Calm
46
12
11
2
3
Nervous
Strong
46
17
9
0
1
Weak
Relaxed
39
12
13
6
3
Tense
Wonderful
55
14
3
1
1
Terrible
Steady
42
21
5
1
3
Shaky
Confident
43
19
6
1
5
Uncertain
Good
58
13
1
2
0
Bad
Peaceful
33
26
6
2
17
Frustrating
Sharp/Exciting
45
20
6
2
1
Dull/Boring
Successful
59
11
3
0
1
Unsuccessful
12. McGovern, E. and Heilmann, H. Conversations on Using the
IBR in a fifth-grade interdisciplinary classroom. Our Lady of
victory School. Floral Park, NY.
Piz
13. Schiering, M. (1996). Ecosystems, Now There’s a Niche for
You. St. John’s University Press. Queens, NY.
14. Schiering, M. (1999). The Effects of Learning Style
Instructional Resources on Fifth-grade Suburban Students Metacognition, Achievement, Attitudes and Ability to Teach
Themselves. (St. John’s University, Dissertation). Queens, NY.
15. Schiering, M. (2002) Pedagogy: A Matter of Sharing One’s
Experiential Past for Today’s Learning. Academic Exchange
Quarterly, 6 (1), 27-31.
1
16. Schiering, M.. (2003a). The “How” and “Who” of Teaching
and Learning. In Raynor & Armstrong (Ed.) Bridging Theory &
Practice: Proceeding of The Eighth Annual Learning Styles
Conference. Hull, England: ELSIN.
17. Schiering, M. (2003b). Reciprocal Thinking Chart. In Molloy
College Course Syllabi (Ed.) Integrated Reading and Language
Arts for the Diverse Learner in the Inclusion Classroom. EDU.
506A Curriculum. Molloy College.
Rockville Centre, NY. Course
References
1. Brandt, R. (1999). ‘Educators need to know about the human
brain’, Phi Delta KAPPAN, 81, (3), 235-238.
18. Schiering, M., (2003c). The Interactive Book Report. EDU.
506A Syllabus: Integrated ELA and Reading for the diverse
Learner in the Inclusion Classroom. Molloy college. Rockville
Centre, NY
2. Cerruto, A., Benton, T. (2013). Conversations on Using the
IBR. Lexington School for the Deaf. Queens, NY.
3. Demasio, AR. (1994). Desartes’ Error. New York:
Groset/Putnam.
4. Dunn R., Dunn, K. (1992). Teaching Elementary Students
Through Their Individual Learning Styles. Boston: Allyn and
Bacon.
5. Gazzaniga, MS. (1998). The Mind’s Past. CA: University of
California Press.
19. Schiering, M., Bogner, D., Buli-Holmberg, J. (2011). Teaching
and Lerning: A Model for Academic and Social Cognition.
Lanham, MD. Rowman and Littlefield Publishers.
20. Schiering, M. (2012). Creative Cognition. IBREA: Brain
World: humanity’s New Frontier magazine. Vol. (3). Pp. 40-43.
NYC.
22
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
(Diamantopoulos & Schlegelmilch, 2000;
Cochran, 1965), size ofthe population, level of
significance, budget and practical constraints
(Terre Blanche, et. al., 2009). Various methods
and procedures of estimating the required
sample size for a complexcross-sectional study
(CCSS) have been suggested in literature (for
e.g., M iaoulis & M ichener, 1976; Kish, 1965;
Cochran, 1965; Anderson, et. al., 2010). There
is no single rule that can be applied to
determine the required sample size for all
surveys (Keppel, 1991; Kirk, 1995; Cohen,
1988; Kraemer & Thiemann, 1987; SerumagaZake & Arnab, 2008). Published sample size
tables and computer software programs such as
O’Brien & Muller (1993) and Power &
Precision (1997) exist but the sample sizes
reflect the number ofobtained responses, and
not necessarily the number of interviews
planned (Cohen, 1988; Gatsonis & Sampson,
1989).
A Suggested Statistical Procedure for
Estimating the Minimum Sample Size
Required for a
Complex Cross-Sectional Study
Philip AE Serumaga-Zake
UNISA, School of Business Leadership (SBL),
South Africa
R Arnab
University of Botswana, Botswana
ABSTRACT
Based on the relationships among the power of
a hypothesis test, effect size, standarddeviation,
level ofsignificance andsample size, this paper
suggests a suitable statistical procedure for
estimating the minimum sample size that is
requiredfor a complexcross sectional study.
Keywords: Sample size, effect size, level of
significance, standard deviation, power
analysis, LSD, Turkey and Bonferroni multiple
comparison procedures
In a CCSS, when more than two population
group means of an independent variable (IV)
are compared, the probability that some
comparisons may unnecessarily be found
statistically significant simply because too
manycomparisons were performedis high (i.e.,
inflation oftype Ierror) (Curren-Everett, 2000).
For example, ifthere are no differences among
the population groups but six comparisons are
performed, the chance that some mean
difference reaches the level of statistical
significance ( ) is much greater than , which
would call for adjustment of the sample size
(say, by using the Bonferroni adj
ustment)
(Dallal, 2004; Jaccard and W an, 1996; Holm,
1979; Holland and Copenhaver, 1988). Each of
the m individual comparisons should be
performed at the adjusted /
m level of
significance. Equivalently, you can multiplythe
unadjusted P values of the estimates by the
1. INTRODUCTION
Usually researchers in fields such as social
sciences ask statisticians about the right sample
sizes for their studies. Statisticians often suggest
taking as large a sample as possible - resources
permitting. The decision cannot always be made
satisfactorily for lack of the necessary
information. Sample size affects the sampling
error of a parameter estimate such that the
larger the sample, the smaller the sampling
error and the more precise the inferences made
from the sample will be. There are manyfactors
that affect sample size (see M iaoulis &
M ichener, 1976; Israel, 1992; Cooper &
Schindler, 2001; Stoker (in Schnetler, 1989);
M iaoulis & M ichener, 1976; Kish, 1965). These
include:purpose ofthe study, sampling design,
accuracy
of
estimation,
dispersion
23
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
were createdbyresampling the dataset with the
simple random sampling (SRS) without
replacement procedure. For a given sample size,
the underlying overall differences between
group means were tested for statistical
significance - using the LSD, Turkey and
Bonferroni multiple comparison procedures.
The powers ofthe pairwise t-test and ANOVA
F-test were then calculatedfor the group means
with the smallest significant difference (SSD),
using their corresponding group sizes, a
common standard deviation and the level of
significance of = 0.05. The assumptions of
normality, independent observations and
groups, and homogeneity of variances were
satisfied. The power ofthe t-test was calculated
as 1 - b = Pr ob[t £ tc | d ] , where tc is the
number oftests and compare the results to the
nominal level ofsignificance. Also, ifyou are
dealing with more than one IV, you should
reduce by dividing it by the number ofIVs.
For correlated IVs, the
reduction may
unfortunately be more than necessary
(depending on the level ofcorrelation). Power
analysis can overcome this challenge by
ensuring that the sample size is large enough
that the smallest effect (which say, is of
scientific or economic importance) will be
detected with a reasonable degree ofcertainty
(Nemec, 1991). A sample is too small if its
results are not precise enough to make
appreciable contribution to decisions and it is
too large if its results are more precise than
warranted by their likely uses or if the
nonsampling errors overwhelm precision, which
imply a waste of resources (Kish, 1965;
Cochran, 1965).
n1n2
, the
2(n1 + n2 )
noncentrality parameter (where d =m 2 - m1 );
and that ofthe ANOVA F-test was calculated
as 1 - b = Pr ob[ F ³ Fc | l ] , where Fc is the
SS H
critical F-value, l = 2 1 is the noncentrality
critical
Based on the relationships among the power of
a hypothesis test, effect size (i.e., the presumed
underlying difference between the two group
means to be detected (d) - should they be
unequal), the within group standard deviation
( ), level of statistical significance ( ) and
sample size, this paper suggests a suitable
statistical procedure that can be usedtoestimate
the minimum sample size required for a CCSS.
The remaining part ofthe paper is structuredas
follows. Section 2 provides the methodology,
section 3 discusses the results and section 4
presents the suggestedprocedure.
t-value
andd = d
s
parameter, SSH1 is the between sums ofsquares
ofthe observations replaced by their expected
values under H 1 , ands 2 is the error variance.
The GLM POW ER procedure of SAS was
employed(see Castelloe, 2004).
3. RESULTS1
Table 1 (Appendix) and figures 1 and 2 below
show the marital status and Turkey multiple
comparison procedure results. In the table, 1 =
married (civil), 2 = married (traditional), 3 =
living together, 4 = widower/widow, 5 =
divorced and 6 = never married. Significant
2. METHODOLOGY
T- and ANOVA F- tests were performed to
determine the effects of gender, race, marital
status andeducation on people’searnings using
secondary data extracted from the Stats SA’s
1999 OHS dataset computer files. Nine
independent random samples ofsizes:40, 80,
160, 320, 640, 1280, 2560, 5120 and 10240
1 The tables andgraphs for gender, race andeducation
are not shown for brevityofthe paper
24
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
differences are written in bold. As expected,
effect size generally decreases with increasing
sample sizes (figure 1). According to figure 2,
the Power ofthe F-test decreases at the sample
size of n=80 and then increases with sample
size, whereas that of the t-test fluctuates; it
decreases at the sample sizes of:160 (LSD),
1280 (Turkey and Bonferroni), 2560 and 10240
(Turkey andBonferroni) but it increases at other
sample sizes. For gender, the power values
stayed more or less the same because gender
hadonlytwosame population groups (i.e., male
and female) to be compared throughout. For
race, marital status and education, the values
fluctuated with increasing sample sizes because
these IVs had more than two population groups
to be compared. In these cases, the effect size
changed according to the population groups
being compared, that is, the groups with SSDs,
standard deviation and sample size. For
example, according to the table, at the sample
size of40, population groups:“married (civil)”
and “widower/
widow” have the SSD (1.94), so
this was the applicable effect size, whereas it is
.64 for population groups “married (civil)” and
“never married” in the case ofthe sample size
of80, which was applicable. The group means
that gave the SSDs changed for the different
procedures and sample sizes. For example, in
the table, at the sample size of160, the SSD is
.91 for “married (civil)” and “married
(traditional)”; whereas at the sample size of
320,the meansof“married (civil)” and “never
married” have t
he SSD (of.84). The power of
the hypothesis test was therefore calculated for
the means of “married (civil)” and “married
(traditional)” for the sample size of160 but for
the means of “married (civil)” and “never
married” for the sample size of320.
The results for gender demonstrated that
generally the larger the sample size the higher
the power as expected. For the other IVs, they
indicated that the power of a hypothesis test
fluctuates with increasing sample sizes, andthat
the shape andgradient ofthe power curve differ
among the IVs. This can be explained by the
fact that these IVs have more than one pair of
group means tobe comparedandthe variability
within groups differs from group to group. For
gender, the Power ofthe F-test of.80 (which
some authors normally recommend) was
reached at the sample size ofaround 320. For
the others, it was reached between the sample
sizes of80 and 160. The results also indicated
that, for IVs with more than one pair ofgroup
means to be compared, the larger the sample
size the more and the smaller the statistically
significant (mean) differences will be regardless ofthe multiple comparison procedure
used. For example, using the LSD procedure,
25
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
First, set the effect size (which say, is
scientificallyor economicallyimportant) for the
pair of group means with the smallest
difference, d and the power say, at .90 for a
particular IV. Second, for a given pooled
standard deviation, S, and adjusted level of
significance (i.e., a divided by the number of
comparisons to be made for that IV to cater for
the inflation of a ), calculate the subsample
size, n = n1 = n2 , using formula:
only two mean differences, namely, between
“married (civil)” and “never married”, and
between
“married
(civil)”
and
“widower/
widow” were significant with the
sample size of40 but they were eight with the
sample size of 10240; all except those between
“divorced/separate” and “married (t
raditional)”,
and between “married (traditional)” and “never
married” were significant. The power ofthe ttest did not necessarily increase with sample
size; rather it stayedmore or less the same until
such a time when almost all the mean
differences became statistically significant.
After this point, the power began to increase
almost steadilyto1.00. For example, for marital
status, the power did not rise to 1.00 until the
sample size of 2560 was reached (for all
procedures). This is the point when the last SSD
(i.e., between the group means of
“widower/widow” and “living t
ogether”)
became statistically significant, and with a
larger sample size (5120), it rose to1.00.
2(t1-a / 2 + t1- b )2
2
D
, where D =
m2 - m1
sp
=
d
with
sp
respectively ta / 2 and tb as the upper 100a / 2
percentage point and100b percentage point of
the t-distribution, and s p as the pooled sample
standard deviation. The calculated subsample
size will be allocated to the smaller ofthe two
population groups. Third, proportionally
calculate the relative subsample sizes for the
other population groups (or levels ofthe IV),
andaddup all the subsample sizes toobtain the
minimum sample size required for that IV. Do
this for all the main IVs. Then, the required
minimum sample size for the study will be the
largest (minimum) sample size ofall calculated
sample sizes. The population standarddeviation
can be estimatedfrom:
· A previous similar study. The estimate may
needadjustment for time changes.
· A pilot survey(Cochran, 1965).
· A rule-of-thumb (i.e., one-sixth ofthe range
based on six standard deviations within
99.73 percent confidence) (Green, 1991).
· Judgment or best guess: Use Range
(largest–smallest
value)
and
divide it by 4 to estimate it (Anderson, et.
al., 2010).
· Guesswork about the structure of the
population assisted by some mathematical
result (Cochran, 1965). For example, ifwe
assume a Poisson distribution, S 2 = Y .
In conclusion, based on the data used in this
study, it was found that any underlying
population mean difference, so longer as it is
not absolutely zero, can be found statistically
significant depending on the sample size used.
Simply put, in CCSSs, for a given standard
deviation and level ofsignificance, the larger
the sample size you use the higher the power of
the hypothesis test, the more significant mean
differences andthe smaller the significant mean
differences you will get. It was also
demonstrated that of the three multiple
comparison procedures, the Bonferroni and
Turkey procedures tend to be conservative and
the LSD procedure tends tobe liberal.
4. THE SUGGESTED PROCEDURE
Basedon the results ofthis study, the following
statistical procedure is suggestedtoestimate the
required minimum sample size for a CCSS.
26
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[13]G. Keppel, Design and analysis:A
researcher’s handbook (3rd ed.). Orlando,
FL:AcademicPress, 1991.
[14]R. Kirk, Experimental design procedures
for the behavioural sciences (3rd ed.),
PacificGrove, CA:Brooks/Cole, 1995.
[15]L. Kish, Survey sampling, New York:
John W ileyandSons, Inc., 1965.
[16]J.C. Kraemer & S. Thiemann, How many
subjects?BeverlyHills, CA, Sage, 1987.
[17]G. M iaoulis & R.D. M ichener, An
introduction to sampling. Dubuque,
Iowa:Kendall/Hunt Publishing Company,
1976.
[18]A.F.L. Nemec, Power analysis handbook
for the design and analysis of forestry
trials, Handbook No.2, October 1991,
editedbyBergerud, W ., Biometrics
Information Handbook Series, M inistryof
Forests, Victoria, British Columbia.
[19]R.G. O’brien & K.E. M uller, Unified
power analysis for t-tests through
multivariate Hypotheses. In Lynne K.
Edwards (Ed.) AppliedAnalysis of
variance in behavioural science. New
York:M arcel Dekker, 1993.
[20]J. Schnetler, Survey methods and practice,
Revisededition, Human Science Research
Council, Pretoria, 1989.
[21]P.A.E. Serumaga-Zake & R. Arnab, “The
role ofsample size in testing a hypothesis
in complexcross-sectional studies:A
M onte Carlosimulation study”,Journal of
Studies of Economics and
Econometrics, 32 (2), 2008, pp. 63-68.
[22]M . Terre Blanche, K. Durrheim & D.
Painter, Research in practice, UCT.
Press, 2009.
5. REFERENCES
[1] D.R. Anderson, D.J. Sweeney& T.A.
W illiams, Statistics for business and
economics (2nd ed.), South-W estern, U.K,
2010.
[2] J.M . Castelloe, Sample size computations
and power analysis with the SAS system,
2004.
[3]W .G. Cochran, Sampling techniques (2nd
ed.), John W iley& Sons, Inc., New York,
1965.
[4]J. Cohen, Statistical power analysis for the
behavioral sciences (2nd ed.). Hillsdale, NJ:
Lawrence Earlbaum Associates, 1988.
[5]D.R. Cooper & P.S. Schindler, Research
methods, Boston:M cGraw-Hill
International Edition, 2001.
[6]D. Curren-Everett, “M ultiple comparisons:
philosophies andillustrations”, Am J
Physiology,Regulatory Integrative and
Comparative Physiology 279, 2000.
[7]G.E. Dallal, The little handbook of
statistical practice, Tufts University,
Boston, 2004.
[8]A. Diamantopoulos & B.B. Schlegelmilch,
Taking the fear out of data analysis,
South-W estern, U.K., 2000.
[9]S.B. Green, “How manysubjects does it
take todoa regression analysis?”
Multivariate Behavioural Research, Vol.
26, 1991, pp. 499-510.
[10]B.S. Holland& M . Copenhaver,
“Improvedbonferroni-type multiple testing
procedures”, Psychological Bulletin, Vol.
104, 1988, pp. 145-149.
[11]S. Holm, “A simple sequentiallyrej
ective
multiple test procedure”,Scandanavian
Journal of Statistics, Vol. 6, 1979, pp. 6570.
[12]J. Jaccard& C.K. W an, LISREL
approaches to interaction effects in
multiple regression, ThousandOaks, CA:
Sage Publications, 1996.
27
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Appendix
Table 1:Mean difference for marital status (Turkey)
Means
1 -5
1 -2
1 -6
1 -3
1 -4
5 -2
5 -6
5 -3
5 -4
2 -6
2 -3
2 -4
6 -3
6 -4
3 -4
F-ratio
F-ratio
(marital)
R-Sq
80
.
80
.28
.
64
.
645
.26
-.52
-.16
-.15
-.54
.36
.37
-.01
.00
-.38
-.38
1.71
160
.82
.
91
.
96
.
97
.90
.09
.14
.16
.09
.04
.06
-.01
.02
-.05
-.07
12.11
320
.53
.
90
.
84
.
85
.
88
.37
.31
.32
.35
-.06
-.05
-.02
.01
.04
.03
12.30
.47
.91
4.37
6.83
10.31
8.83
0.25
.52
.34
.39
.28
0.62
640
.50
.
72
.
72
.
89
.
90
.22
.22
.39
.41
-.00
.17
.18
.17
.18
.01
30.62
Sample size
1280
2560
.
53
.
55
.
39
.
59
.
46
.
53
.
81
.
73
.
84
.
69
-.14
.04
-.07
-.02
.28
.18
.31
.13
.07
-.06
.14
.
42
.45
.10
.
35
.
20
.38
.16
.03
-.04
37.75
104.82
40
.84
.23
.62
1.
94
-.62
-.23
1.10
.39
1.71
1.32
4.11
28
5120
.
43
.
45
.
49
.
69
.
67
.02
.06
.
25
.23
.04
.
23
.21
.
20
.17
-.02
174.85
10240
.
45
.
51
.
54
.
74
.
70
.06
.10
.
30
.
25
.04
.
24
.
20
.
20
.
16
-.04
382.96
165.93
33.13
76.98
.35
.31
.33
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
SuperReality: General Implications of “Big Data” Analytics and Artificial
Intelligence for Individuals and Households in Society
Robert Bonometti
Byrd School of Business, Shenandoah University
Winchester, VA 22601, USA
Keywords: Big data, SuperReality, Artificial
Intelligence, Augmented reality, Internet of Things.
ABSTRACT
The main premise of this paper is that “Big Data”
and artificial intelligence (AI) technologies will
engender revolutionary, if not indeed disruptive,
technological transformations that will dramatically
affect the way individual people live and work in
our society. Much scholarly research and attention
has been paid over many years to studies of the
impact of “Big Data” and AI on businesses and
other organizations, such as vertical industry
segments like health care and banking as well as
specialized domains such as military operations.
The present work examines the potential
applications and ramifications of these emerging
technological changes on individuals and
households within society, and uses the term-of-art
“SuperReality” to describe the new ontological
paradigm. This term is intended to suggest an
environment in which individuals and households
achieve historically unprecedented capabilities for
capturing highly detailed data and information about
their activities, storing and processing these
resources, and obtaining timely notifications and
alerts regarding events and required actions. A
notional model is presented for this new
“SuperReality” paradigm which captures its
underlying integrated infrastructure and the layers of
applications and services that comprise it.
Opportunities
for
entrepreneurial
business
developments supporting commercialization of
these nascent technological capabilities is also
discussed. The present work is intended to help
initiate the academic discussion and exploration of
SuperReality, and is clearly an early stage treatment
of this topic as opposed to a more definitive and
finalized rendering which will require considerable
future
refinements
and
consensus-building
dialogues.
INTRODUCTION AND TERM-OF-ART
Computer systems have radically transformed
government agencies, businesses, and indeed the
lives of people throughout society over the past half
century. Rather than attaining an innovation plateau,
the rate and degree of change in fact is accelerating.
Personal computing (a la desktops) brought
powerful capabilities to vast numbers of people to
store, manipulate, manage, and analyze diverse
realms of data and information. Simultaneous
adoptions within businesses as well as in households
engendered a mutually reinforcing technological
revolution. The power and utility of the computing
platform was dramatically expanded by the
proliferation of networking. From local and wide
area networks supporting organizations, to homebased personal networks, to the explosive growth of
the public Internet, the historical role of computers
as “computational engines” was transformed into a
multi-purpose platform in which rich multimedia
based interactions among people became at least as
important, if not more so, than the original
computational basis. In recent years, continued
explosive growth and change has centered around
mobility, miniaturization from desktop form factors
to handheld devices, expansion of narrow-band
network connectivity into ubiquitous broadband
infrastructure, emergence of social media and
networking on a global level, and, most recently,
cloud-based architectures enabling both applications
and data to be hosted remotely and thereby achieve
the goal of always accessible information anywhere and at any time. The next great wave of
change is already welling-up, and will be centered
on the AI-powered third generation Semantic Web.
29
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Large scale generic organizational applications
based on emerging technological capabilities have
already appeared, such as real-time targeted
micromarketing capabilities and distributed sensor
networks for supply chain management. The
multitude of application prospects are truly diverse
and exciting, and much research and attention has
been duly focused on these developments.
LITERATURE REVIEW
The notion of SuperReality in large scale
applications is not new, and in fact the author
discussed similar ideas several decades ago in the
context of future military systems and capabilities –
a large, formal organizational perspective (see for
example Bonometti [1]). Notwithstanding extant
literature that discusses various aspects of
SuperReality for large formal organizations
(although that term-of-art itself is not used), there is
a dearth of literature addressing the implications for
individuals and households. A major purpose for
this paper is to help stimulate the academic
discussion and literature development for this
perspective.
It is the thesis of this paper that, akin to the
simultaneous advancements in information systems
affecting large organizations and individual
households over the past two decades, the next wave
that is already appearing in formal organizations
today will also have profound and far reaching
implications for individuals and households. High
power multi-core processors, massive data storage,
home-based servers, diverse sensor devices, speech
recognition, AI software applications, and
ubiquitous
networking
have
all
become
economically accessible to individuals and
households. On top of this foundational
infrastructure, an explosion of AI-powered
applications and services will usher in a new era of
unprecedented granularity and precision in how
people manage their personal affairs. We adopt the
term-of-art “SuperReality” to describe the novel
paradigm that will emerge. This term is intended to
suggest an ontological environment in which
individuals and households achieve historically
unprecedented capabilities for capturing highly
detailed data and information about their activities,
storing and processing these resources, and
obtaining timely notifications and alerts regarding
events and required actions.
Given the paucity of literature addressing
SuperReality for individuals and households, our
literature review will briefly highlight references to
related underlying topics such as “Big Data” and
analytics, augmented reality and AI technology
impacts for individuals.
The author provides a literature overview of “Big
Data”, business intelligence and analytics, and cloud
computing in a recent companion paper to the
present work (see Bonometti [3] and references
therein). Weathington [16] presents an excellent
discussion regarding how “Big Data” is defined, and
notes that various versions of this definition are
found among industry players. A Wall Street
Journal article (Skeldon [12]) provides a readable
introduction and overview of augmented reality,
noting emerging business opportunities in this
technology arena. Many introductory overviews to
AI (artificial intelligence) can be found in the
literature and popular press; for example, the author
presented a layman’s overview of AI in conjunction
with the 50th anniversary of the birth of that
discipline (Bonometti, [2]), and Bloomberg
BusinessWeek presented a set of articles on AI in
September 2010 including an excellent overview
article by Morgenthaler [9].
SuperReality encompasses the more widely
discussed arena known as augmented reality, but it
extends beyond that realm. The term-of-art
“augmented reality” typically is used to describe the
fusion of rich information elements onto the fabric
of real-world imagery. On the other hand,
SuperReality will involve the collection,
management and analysis of real-world data, often
sensor derived or input via spoken language, on
scales that have heretofore been impossible. Again,
our focus in this paper will not be on large formal
organization domains such as distributed networks
of weather or traffic sensors and the application and
services that they will support, but rather on how
individuals and households will participate in this
exciting future paradigm.
An informative and enlightening infographic (IBM
[7]) presents statistics regarding big data in large
formal organizational contexts, including that 2.7
zettabytes of data are estimated to exist today, with
structured and unstructured data growing at a rate of
60% annually, with unstructured data alone growing
80%. An excellent overview of cloud computing
30
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
model is intended to reflect that preferred approach,
with many vendors competing to provide
interoperable elements of the overall SuperReality
infrastructure. In particular, existing devices such as
smartphones and tablet computers should be
leveraged to avoid high initial costs for individuals
and households to implement a SuperReality
framework. Figure 1 presents an illustrative diagram
depicting the notional model for SuperReality based
on a basic app domain taxonomy and the underlying
technological infrastructure. We first address the
taxonomic considerations and then return to an
explanatory discussion of the notional model for
SuperReality.
and big data is presented in a recent McKinsey
Quarterly Report, emphasizing advantages to
businesses derived from these technologies (Bughin,
et. al. [4]). Rowe and Parasuraman [11] present and
discuss results of an extensive survey of 99
organizations emphasizing the integrative power of
big data and related analytical capabilities to
enhance customer interactions and to improve the
profitability of marketing efforts. Another excellent
current overview of big data technologies and their
implications is presented by Talend [14]. Cohen et.
al. [5] present a discussion of big data analytics and
consider non-traditional methodologies, and Hayes
[6] provides a general overview of cloud computing.
A March 2012 research report by Nucleus Research
[10] discusses analytics deployment in 60
companies and notes that the return on investment
can exceed 1200% provided that the deployment
aims to enhance organizational strategy. Stodder
[13] discusses the relationships between “Big Data”
and analytics for businesses.
Table 1 presents a simplified application domain
taxonomy. Note that this notional framework is
intended to be illustrative and not a complete,
finalized taxonomy for applications. This simplified
illustrative taxonomy uses four major application
domains: Household Management, Health Care and
Informatics,
Personal
Management,
and
Procurement Management. Each of these domains is
expanded into several layers of subset application
areas (again, a notional illustrative rendering not
intended as a definitive and finalized version).
A recent interview with Stephen Wolfram by
Tucker [15] discussed Wolfram’s personal daily life
computational log spanning about 20 years.
Wolfram has noted that such a data log serves as “an
adjunct to my personal memory, but also to be able
to do automatic computational history—explaining
how and why things happened—and then making
projections and predictions. … It got me thinking
about lots of different ways that I could improve my
life and times with data.” Tucker noted that “Only
very recently, a growing number of people are
routinely collecting data about themselves all the
time. The drivers for this trend seem to be better and
lighter computers that make personal record keeping
much easier.”
Table 1 arrays the application domains against a
framework of input, storage, processing and output
modalities. We next briefly describe these four
dimensions, beginning with data and information
capture. The dimension of input modes span speech,
sensor, and manual/other. The advent of
SuperReality functionality is critically dependent on
routine, nearly effortless information capture via
sensors and spoken language interfaces. Speech
input of data will be a highly significant modality
with critical impact on usability, convenience, and
large scale adoptability of SuperReality by people
and households. Until recently, the main humancomputer interface for data input into information
systems has been the keyboard and the mouse. The
more natural, efficient and productive input
modality is of course natural spoken language. With
advances in AI speech recognition and processing
technologies, the limitations of the keyboard/mouse
interface are beginning to give way to natural
spoken language interfaces. This trend is especially
evident in today’s latest generation of mobile
devices which, by virtue of their small-size form
factors, have been particularly limited by keyboard
and mouse/touch screen interfaces. Further,
increasingly
powerful
semantic
processing
A NOTIONAL MODEL
A taxonomy for SuperReality application domains
needs to be developed, and a proposed framework is
presented here in conjunction with a vertical
infrastructure description for the technologies,
systems and processes that will underlie the
application domains. While complete “stovepipe”
proprietary systems from a single vendor (or
consortium) are possible, perhaps the best
implementation modality would be a diverse set of
various products (hardware and software) that
conform to basic interface standards and
specifications developed by industry. The notional
31
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Figure 1
Notional Model for SuperReality
Intelligent Data/Web/Text Mining
Bots
Place‐Time Analysis
Expert Systems Predictive Analytics
Natural Language Processing
AI Tools
&
Services
Home Server
Infrastructure
C
L
O
U
D
Web/Cloud
Repositories
Operational DB’s
Data Warehouse
Web
Home LAN (Wired and Wireless)
Network Connectivity
UI
Location
Services Awareness
Platforms
iOS
SmartPhone
Security
Device/Platform Detection
& Optimization
OS X
WinPhone
Android
Tablet
PDAs (iPod etc)
Input/Output Modes
(Gesture, Audio, Visual, etc)
Windows
Laptops etc
Linux
Desktops
Sensors, Actuators, Alarms
MOBILITY
Devices
High
System Human‐Computer Interfaces
Figure 2
Interactions and Interdependencies in the Application Domains
Household
Management
Personal
Management
Time
Management
Expendable
Supplies
Food
Procurement
Management
Health Care
Management
32
Unix
(HD)‐TVs
Low
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Table 1
Notional Application Domain Taxonomy
Data Collection Methodology
Data Storage
Processing
Manually Spoken
Speech Sensor Manual/Other Home Server Cloud RealTime Bot Initiated Announcements
Application Domain
Household Management
‐ Time and Events
‐‐ Calenders: Personal and Integrated
‐‐‐ Schedule Optimization and Conflict
Resolution
‐‐ Event Documentation
‐ Services and Vendors
‐‐ Recurring: Water, electric, cable, etc.
‐‐ Infrequent: Roofer, landscaper, etc.
‐ Financial
‐‐ Budget
‐‐ Revenues and Expenditures
‐‐ Investments
‐‐‐ Capital Investments/Procurements
(Cars, major appliances, etc.)
‐‐‐ Financial Investments (College,
retirement, etc.)
‐ Foodstuffs, Staples, Supplies and
Inventory
‐‐ Item Locations and QoH
‐ Systems Maintenance
‐‐ HVAC System
‐‐ Security
‐‐ Fire Prevention, Detection,
Suppression
‐ Vehicles
‐‐ Fuel
‐‐ Maintenance
‐‐‐ Owner
‐‐‐ Shop
‐‐ Critical Care (Recalls, etc.)
‐‐ Inspections
Health Care and Informatics
‐ Routine data collection
‐‐ Consumables (foods, etc.)
‐‐ Medications
‐ Indicators and Observables (Conditions,
mood, etc.)
‐ Critical Care
‐‐ RealTime Monitors (Blood pressure,
etc.)
Personal Management
‐ Fitness and Exercise
‐ To‐Do Lists
‐‐ Scheduling and Sequencing
Optimization
‐ Creativity
‐ Relationships Management (Family,
friends, coworkers, etc.)
‐‐ Events (Birthdays, anniversaries, etc.)
‐‐ Facts (Peferences, addresses, etc.)
‐ Reputation and Identity Management
Procurement Management
‐ Expendibles (Major such as heating oil
and minor such as cleaning spplies)
‐‐ Sourcing (identify low cost vendor,
etc.)
‐‐ Order quantity
‐ Capital Expenses
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Outputs
Electronic
Messaging
Alarms Documentation (eMail, tweet, etc.)
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Table 2
SuperReality Benefits Matrix
Efficiencies
Money Time Resource Utilization
Application Domain
Household Management
Health Care and Informatics
Personal Management
Procurement Management
X
X
X
X
X
X
X
X
X
X
33
Attention to Detail Safety Security
Routine Critical
X
X
X
X
X
X
X
X
X
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
track revenues and expenditures today by manually
entering data, but this chore is tedious, error prone,
and suffers from almost always being less than
100% inclusive (i.e., capturing small purchase data
is problematic). With a spoken language interface
on one’s mobile device, together with other software
on that device that captures even small transaction
data (purchases paid for and recorded automatically
by that device), the prospect of achieving allinclusive capture of expenditure data can be
effortlessly achieved. Another example is seen in
the management of household inventory, and again,
while software exists for one to manually enter
major items and possessions, systems to capture and
process low cost expendables and supplies is not
user-friendly today. The combination of natural
spoken language data inputs and sensor generated
inputs (such as “smart refrigerators” that maintain
state information about their contents) will provide
transparent and nearly effortless information capture
that lies at the heart of a SuperReality capability.
capabilities are producing devices that can interact
with humans who communicate verbally in naturally
spoken phrases (as opposed to restrictive stylized
commands and key words). Perhaps the best current
example of this interface is the Siri system on
iPhones. Whereas that system is used today
primarily to perform search and information
retrieval functions as well as limited “data entry”
(calendar entries, reminder notes, etc.), the advent of
SuperReality capabilities can be expected to
dramatically expand the use of natural spoken
language to perform “data entry” related to a
comprehensive and integrated set of personal and
household activities. Despite recent poor reviews
regarding the quality and accuracy of Siri and other
voice recognition technologies (see for example
Manjoo [8]), these systems have significantly
improved in recent years and can be expected to
progressively
achieve
higher
and
higher
performance levels.
A natural spoken language data/information entry
interface is critically important as an enabling
technology for SuperReality. Small mobile devices
will be used to capture data and information in
unstructured formats while individuals are going
about their normal activities and performing
household tasks. The burden of manually recording
such information in notes that must be transcribed
and parsed for entry into an information processing
system will be effectively eliminated. A user would
simply engage (“one click interface”) the
information capturing function on their mobile
device of choice, and the system will perform
appropriate semantic and syntactic processing to
ensure that the information is properly categorized,
structured
as
necessary,
and
processed.
Synchronization of data entries with the home
server could take place either synchronously via a
suitable local area wireless system, or
asynchronously by temporary storage in the mobile
device and subsequent transfer by Bluetooth or
other means to the server.
The storage dimension in Table 1 simply spans two
modalities: storage of all data and information for
household and personal management activities on
one’s home-based server, and cloud based storage
for ubiquitous access and data back-up. There are
many issues involved with this dimension, such as
security of sensitive personal data on cloud-based
resources, but these issues are beyond the scope of
the present paper and are suitable for future work.
The processing dimension in Table 1 reflects the
three modes that SuperReality data will be
processed: automatically in realtime, automatically
by event triggered software such as bots, and by
manual user initiation. The latter mode would be
appropriate for aperiodic activities, such as
conducting an audit of household inventory.
The fourth dimension shown in Table 1 represents
the output modalities of a SuperReality system.
These modes span routine archiving via electronic
documentation, user interaction and feedback via
spoken interfaces (speech generation on a mobile
device, for example) and other messaging systems
including instant messaging and eMail, and multimode alarm alert capabilities for critical events such
as a carbon monoxide leak detected by a household
sensor or a medical condition alert (blood pressure,
glucose level, etc.) via health care sensors for a
home-bound patient.
The importance of the natural spoken language
interface for capturing inputs to the system should
not be understated. Whereas some household
management software applications exist today, they
generally require manual data inputs and are
typically narrowly focused applications as opposed
to broadly integrated modules spanning all aspects
of personal and household management. For
example, one can prepare a household budget and
34
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Whereas most all households today have Web
access and many have cloud based services of one
sort or another, the home based server and high
capacity storage infrastructure suggested by this
model is today not present. To fully implement a
SuperReality
environment,
an
always-on,
sufficiently powerful home server would be
required. This engine would host the applications,
tools and services that together constitute the
SuperReality data storage and processing
environment.
Table 2 presents a benefits matrix showing the
advantages achieved at the level of the four
illustrative application domains. The interactions
and interdependencies inherent in the application
domains is suggested by Figure 2. This figure again
represents a greatly simplified notional illustration
of these interdependencies as opposed to a complete
and definitive mapping which of course would
depend on the detailed and finalized application
taxonomy itself. As one simple example, managing
food would involve interactions among the
Household Management, Health Care, and
Procurement domains.
The final tier encompasses the specialized
applications, tools and services that are the heart of
a SuperReality implementation. As previously
discussed, a natural language processing engine is
an essential part of the infrastructure. Tools and
services supporting SuperReality capabilities
include AI expert systems, predictive and place-time
analytics, data mining capabilities including
coverage of unstructured data such as text,
messages, Web pages, etc. Autonomous bots
(software robots) would also be present to provide
event-driven actions; for example, a bot might
constantly monitor data flows from critical care
health sensors for a home-bound patient and take
action as needed in the event of mild or severe
departure from acceptable readings, by sounding an
alarm within the home and/or contacting a physician
or 911 emergency services.
Having outlined the concepts underlying the
notional model for SuperReality, we now return to
discuss the model itself as presented in Figure 1.
The model is vertically segmented into four major
tiers: System human-computer interfaces, Network
connectivity, Home-based servers and home/cloud
data storage, and AI services and tools that
implement the SuperReality framework. We next
briefly describe these tiers.
The lowest tier in the vertical stack is the system
human-computer interface. This tier is further
segmented into devices (smartphones, laptops,
desktops, etc. as well as sensors, actuators and
alarms). On top of this hardware layer are various
operating system environments (iOS, Android,
Windows, etc.). The top sub-layer represents the
user interface (UI) services that are important to
SuperReality capabilities. These include input and
output modalities (audio including speech, visual,
gesture inputs, etc.) as well as services such as
location awareness, security, and device detection
and optimization.
Having examined a notional model for
SuperReality, we next briefly address some of the
implementation challenges and opportunities that it
will create.
IMPLEMENTATION CHALLENGES AND
OPPORTUNITIES
The next major layer is network connectivity,
including home based wired and wireless local area
networks and Internet/Web connectivity. Other
connectivity modes not shown in the illustration
would include Bluetooth and cabled interfaces.
As noted above, the preferred architectural
implementation for SuperReality would be based on
components and modules supplied by many
competing vendors that all adhere to requisite
interface specifications and standards. Perhaps the
biggest challenge to be faced would be development
of industry consensus on these standards and
specifications.
Many (perhaps most) individuals and households
already have these lower two layers extant in the
homes. The upper two layers of the model however
will undoubtedly require additional hardware and
software infrastructure to enable a rich SupreReality
framework in most households.
With the exception of some needed hardware
developments (mostly sensors and actuators), most
of the development effort for SuperReality
capabilities will center on software products. The
The third tier is the home based server and storage
tier and a parallel cloud/Web based component.
35
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
good news is that many independent software
developers and vendors will be able to participate in
this nascent sub-industry, but the challenge to them
will be the highly sophisticated nature of the AI
software that must be created and tested. Quality
assurance will be very important especially for those
elements of a SuperReality framework that provide
critical functionality to households and individuals
such as security system integration, safety systems
such as fire and explosive gas detection, and critical
health monitoring systems.
REFERENCES
[1] Bonometti, R. “Future MILSATCOM Systems:
A Far-Term Vision of Capabilities and
Characteristics.” Proceedings of the 1991 IEEE
Military
Communications
Conference
(MILCOM '91 Classified Volume), November
1991.
[2] Bonometti, R. “‘Artificial Intelligence’ Isn’t
Science Fiction. » The SUN Newspaper.
[3] Bonometti, R. “Technology Considerations for
Competing in the ‘Big Data’-Social-Mobile-Cloud
Marketing Space.” Competition Forum. Vol. 10,
No. 2, 2012, pp. 209 – 214.
[4] Bughin, J., Chui, M. and Manyika, J. Clouds,
big data, and smart assets: Ten tech-enabled
business trends to watch. McKinsey Quarterly
Report.
Retrieved
July
2012
from
http://www.itglobalservices.de/files/100810/McK_Clouds_big_data_an
d_smart assets.pdf.
[5] Cohen, J., Dolan, B., Dunlap, M., Hellerstein, J.,
and Welton, C. “MAD skills: New analysis
practices for big data.” Proceedings of the VLDB
Endowment. 2 (2), 1481 – 1492.
[6] Hayes,
B.
“Cloud
computing.”
Communications of the ACM. 51 (7), 9 - 11.
[7] IBM. Infographic: Driving marketing
effectiveness by managing the flood of big data.
Retrieved
July
2012
from
http://analyzingmedia.com/2012/infographic-bigflood-of-big-data-in-digital-marketing/.
[8] Manjoo,F. “Siri, Step Aside, Google Voice Has
Arrived.” The Washington Post, November 25,
2012, p. G2.
[9] Morgenthaler, G. “AI’s Time Has Arrived.”
Bloomberg BusinessWeek. September 21, 2010.
Retrieved
January
2012
from
http://www.businessweek.com/stories/2010-0921/ais-time-has-arrivedbusinessweek-businessnews-stock-market-and-financial-advice.
[10] Nucleus Research. The Stages of an Analytic
Enterprise.
Retrieved
Sept
2012
from
http://nucleusresearch.com/research/notes-andreports/the-stages-of-an-analytic-enterprise/.
[11] Rowe, N. and Parasuraman, K. Extracting big
value from big data in digital media. On-Demand
Aberdeen Group Webinar. Retrieved July 2012
from
http://aberdeen.reg.meetingstream.com/big_data_digital_media/.
[12] Skeldon, P. “Even Better Than The Real
Thing.” The Wall Street Journal. February 14,
2011.
Retrieved
May
2011
from
Modular design of the various products and services
by multiple vendors has the additional benefit of
enabling phased system implementations. Few
households would have the resources to procure and
implement a comprehensive SuperReality system at
one time. Interoperable products and services
present the preferred implementation scheme where
households can procure and set-up basic elements of
an overall system, and add to that baseline over
time. For example, integration of safety and security
systems into the SuperReality framework might be a
starting point for many households, which then can
add hardware and software resources over time to
grow the capabilities of their implementations.
SUMMARY AND FUTURE RESEARCH
DIRECTIONS
This paper has presented initial considerations
regarding the development and implementation of
SuperReality systems. As stressed multiple times in
this paper, the present effort is admittedly an early
stage attempt to stimulate further scholarly and
industry research into the promising aspects of
SuperReality. Considerable further research and
developmental efforts are clearly needed, including
refinement of the apps domain taxonomy and the
notional model. Most importantly, development of
standards and specifications are essential to attain an
interoperable framework of modular products and
services from many competing vendors that will
enable households to create affordable initial
SuperReality systems and then grow and expand the
capabilities
and
functionality
of
their
implementations.
36
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
http://online.wsj.com/article/SB1000142405274870
4739504576067780550250202.html.
[13] Stodder, D. Big Data and Business
Intelligence: How They Come Together. Webinar
presentation downloaded Sept 2012 from
http://tdwi.org/webcasts/2012/07/big-data-andbusiness-intelligence-how-they-come-together.aspx.
[14] Talend Corporation. Big data for the masses.
Retrieved July 2012 from http://www.talend.com.
[15] Tucker, P. “Science and a New Kind of
Prediction: An Interview with Stephen Wolfram.”
The Futurist. Vol. 47, No. 1, January-February
2013.
Retrieved
February
2013
from
http://www.wfs.org/futurist/january-february-2013vol-47-no-1/science-and-new-kind-predictioninterview-stephen-wolfram.
[16] Weathington, J. Big Data Defined. Blog
September 4, 2012 downloaded Sept 2012 from
http://www.techrepublic.com/blog/big-dataanalytics/big-data-defined/101.
37
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
E-learning as a socio-cultural system (elements to be influenced and influencing
elements)
Edita BUTRIME
Lithuanian University of Health Sciences
A. Mickeviciaus str. 58, LT 44307, Kaunas, Lithuania
Vaiva ZUZEVICIUTE
Vytautas Magnus university
K. Donelaicio str. 58, LT-44248, Kaunas, Lithuania
2008; Mickus, Vidziunas, 2009; Rutkauskiene, Gudoniene,
2010; Davidson, Waddington, 2010). Different authors make
similar conclusions, that ICT is capable of forming that latest
cultural and technological environment, where learning turns to
be different; respectively, lecturers’ and students’ behavior
norms change as well. Nowadays, ICT can be considered as ‘an
engine’ of lecturers’ didactical source of working ideas as well
as ‘an engine’ for the implementation of such ideas.
ABSTRACT
This paper is based on theoretical and empirical researchthat
was aimed at presenting e-learning as a socio-cultural system
phenomenon in university studies with the emphasis on
elements to be influenced and, also, on influencing elements.
Methods of critical literature analysis and empirical qualitative
and quantitative studies were employed for this extensive study
(covering 2006-2013), however, in this paper just few aspects
are analyzed, and just two of the methods applied (and data they
resulted in) are presented. The core objective is to help
participants to become active members in the process, to
overcome fears and evolve: from a recipient, user, into an active
agent of the process. Both teachers and students should be
encouraged and supported in order to become active, creative
and creating participants of contemporary e-learning. Study
revealed, that just a small fraction of opportunities available
today is being used by university community members
(teachers, and, surprisingly, students)).
Keywords: e-learning,
educational perspective.
1.
socio-cultural
system,
Rapid development of modern ICT creates presumptions for
lecturers and students to change roles in particular situations.
Students are sometimes better at the application of ICT.
Consequently, they can aid lecturers in the development of
corresponding skills.
In modern university, there co-exists both traditional and
qualitatively new e-learning culture that is enriched with
versatile ICT. This paper is analyzing e-learning as a study
process, where ICT is applied for efficient development and
quality. The very concept of e-learning is multidimensional due
to a continuous change of its contents and development, and due
to emerging new generation ICT. E-learning concept is a rather
general one, including all learning forms and methods, taken
that the study process is based on ICT and encompasses also
blended learning.
elements
INTRODUCTION
Rapid and continuous development of ICT results in changes in
social and modern learning process. Knowledge also develops
and turns to be more and more meaningful in a modern
developing society. ‘In such a social world, the top-range good
is the latest information, knowledge and skills’ (Long-life
learning memorandum, 2001, 6p.). Consequently, nowadays a
human is a significant person, and his/her ability is not only to
generate new knowledge, but to apply already acquired
knowledge in a new context innovatively and effectively. The
application of ICT in modern study processis valuable in terms
of the following approach.
Grounding of the research problem. Business world is rapidly
implementing and applying constantly developing ICT;
however, according to A.L.Davidson and D.Waddington
(2010), universities are technology „resistant institutions“ that
are forced to accept new paradigms by the society. Innovation
acceptance policy of universities plays a significant role, i.e. it
may slow down or speed-up the process. One of the key
obstacles related to successful implementation of ICT in many
European universities is the fact that the administration does not
support or set relevant priorities to ICT. It may be assumed, that
such a situation is due to the fact that, historically, sometimes
university administration did not take care of ICT and elearning issues, as this was not considered to be an important
field of activities (Rutkauskiene et al, 2006).
‘Information technologies have made a radical impact on the
nature of economics – there has arisen a global ‘knowledgebased economics’, focusinges on ideas and not on the physical
power, as well as on modern technologies and not on the
exploitation of cheap workforce. Lithuania is also gradually
migrating towards knowledge-based economy. In order to have
competitive knowledge-based economics, long-life learning
turns to be a necessity’ (Security strategy for long-life learning,
2004, 4 p.).
Analyzing the failure of the first e-learning institutions, that
operated in the EU and USA) since the tenth decade of the last
century, J.Bang (2006), makes a conclusion that many of these
initiatives could not survive without governmental support. The
author states, that the future belongs to blended learning, as
during the study process student and lecturer need to
communicate and share the responsibility. J.Bang (2006)
foresees the following perspectives that could secure the
success of blend learning as a form of e-learning:
In the world aiming to become a knowledge society the latest
information is the most valued commodity, knowledge and
skills. Different scientists analyze the application of ICT in the
study process in terms of various aspects, and, also, they
emphasize ICT meaning and topicality (Kemmis, Atkin,
Wright, 1977; Gage, Berliner, 1998; Chye, Tan, Goh, 2004;
Baltrusaitis, 2007; Jasutiene, Dagiene, 2007; Aceto, Dondi,
1.
38
Learning activities have to be integrated with learning
sources as well as with lecturers’ consultations, and
there has to be a possibility to adapt the also activities
for cultural needs. The success of the Open University
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
2.
3.
in the UK is related to the implementation of a socialconstructive approach towards learning. This
Lecturers get back to a position of being responsible
for the organization of learning process. They should
select relevant learning sources and organize
educational activities that are necessary for the
achievement of the defined study aims.
university transformed the learning concept from
obtaining knowledge to the creation of knowledge.
This paper approaches the problem based on three main
theoretical approaches: connectivism, theory of systems, and
approaches to culture. It is our belief that a phenomenon as
complex as learning, especially, involving ICT, should be
analysed in the intersection of these three major theoretical
perspectives, though we will readily agree that also other
perspectives may prove to be very useful in highlighting the
issue.
Technologies, used forturning learning into elearning, should supplement the learning process with
the following issues – interaction, communication,
cooperation and creation. Only in such case they will
be successful and comply with the expectations of the
knowledge society.
Further on, the above mentioned three theoretical perspectives
are shortly described together with arguments why these
perspectives are useful for better understanding of e-learning
process. Here it is important to note, that in this paper e-learning
is conceptualized as the most general concept. This concept, as
we present it, covers all forms of teaching and learning
(together), provided that learning is based on ICT at least to
some extent.
One of the drawbacks of e-learning is the fact that there is no
social interaction (Heinze, Procter, 2004). Humans value direct
immediate (traditional) communication more in almost all life
situations (and, certainly, in the learning process). According to
J.R.Edvards (1992), the individuals provide each other with
emotional, systematic and informative support during
immediate traditional communication. Essentially, virtual
communication is different, and, as a result, it may satisfy
individuals’ needs only partially (Martins et al., 2004; Barker et
al., 2006; Duoba, 2009). Consequently, traditional and real
communication remains very significant for the participants of a
study process.
Connectivism. Analysis of the modern study paradigms
(teaching and learning at universities, including research) and
the paradigm-based teaching and learning theories led to the
conclusion that the context of learning is based on modern
collective intelligence philosophy is best described by the sociocultural cognitivism, and the process itself is described by
connectivism (Vygotsky, 1978; Hung, Der-Thang, 2001;
Siemens 2004).
Therefre, the object of this study is e-learning as a socio-cultural
system phenomenon in university studies with the emphasis on
elements to be influenced and, also, on influencing elements.
The aim of the study presented is to reveal e-learning as a
phenomenon of a socio-cultural (emphasis on elements to be
influenced and influencing elements) system in university
studies.
As many authors note (Wentling et al. 2000; Downes, 2007; De
Praetere, 2008; Targamadze, Petrauskiene, 2008; American
Society for Training & Development, 2010), the study process,
when ICT is applied to increase efficiency and quality, can be
named as e-learning. The term e-learning is multidimensional,
because its content is constantly changing with the
improvement and development of the next generation of ICT.
Methods of critical literature analysis and empirical qualitative
and quantitative studies were employed for this extensive study
(covering 2006-2013), however, in this paper just few aspects
are analyzed, and just two of the methods applied (and data they
resulted in) are presented. Contents analysis was employed in
order to analyze quantitative data, and suitable procedures of
statistical analysis were applied for the analysis of qualitative
data.
Theory of systems says, that system can be comprised of at least
two (or many more) elements, provided there is an
interconnection between them, and the changes of one of the
elements inevitably changes other elements, and, therefore, the
system itself. Moreover, a system may be open and act as an
agent in the environment, having an impact there and an
enduring impact from the environment (Scedrovitskij, 1995;
Kvedaravicius, 2006).
2.
E-LEARNING AS A SOCIO-CULTURAL
SYSTEM (ELEMENTS TO BE INFLUENCED
AND INFLUENCING ELEMENTS)
Approaches to culture. Analysis of e-learning as a socio-cultural
system is based on an approach to culture which highlights the
meaning of the created artifact or the activity of its creation to
any person) (Kavolis, 1995). Nowadays, for the first time in
history, information and scientific knowledge is becoming the
main product of economic activity, i.e. the artefact (Ausra,
2005). Culture is such a complex phenomenon, that each model
must be regarded only as a starting point, a guideline helping to
understanding how people act. The cultural model, suggested by
Schein (1992), where the role of ICT as a technology
component, is clearly visible in the structure of culture as a
system; and Parsons’ (1998) dynamic function of culture that
explains change were chosen as a starting point for the analysis.
The analysis of contemporary context in which universities
operate revealed, that, today, the society status changes. The socalled "knowledge society" is only a symbol, which denotes the
fact, that the structure of the society that we used to know is
changing under our very eye. Society becomes a multi-social
society, in which different society models are functional at the
same time, starting from the agrarian, industrial, informational,
and, going to knowledge society and other models. The
traditional education system (primary, secondary, higher
education, vocational training and informal education) remains
essentially unchanged in its structure, management and the
concept despite the changing conditions of life and is basically
not adjusted to new social needs (Augustinaitis, 2004). The
change of ICT philosophy towards collective intelligence,
crowdsource philosophy, typical to the second Internnet
generation is emphasized. The breakthrough of this collectiveintelligence related philosophy brings confusion to the already
well-established life of university (and other organizations), to
its activities, communication, information processing.
According to various authors (Mamardasvili, 1958;
Scedrovitskij, 1995; Castells, 2005; Kvedaravicius, 2006), it
may be stated that the socio-cultural system of e-learning is a
system in which ICT is created artificially by humans, and the
influencing on the development and structure of the system is
used to increase the efficiency of e-learning. According to L.
Vygotsky (1978), a human and the environment cannot interact
directly. People interact with the environment by means of
intermediary artifacts - meanings, tools, or symbols formed by
39
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Moderate influence can be
applied to this element from an
educational perspective.
Based on the above analysis, we hereby conclude that elearning as a sociocultural system is comprised of a set of
elements. These elements, however, according to the theory of
systems, belong to different levels in terms of their influence
from an educational point of view. Some of these elements are
influenced to a great extent by technological changes, however,
some of them can be influenced only if certain educational
measures are applied.
On one hand, amount of
information increases rapidly
in all spheres, but on the other
hand, taking into account
interaction without geographic
boundaries, the ideas and new
knowledge are being ranked
very quickly into a group of
productive and meaningful, and
a group of incorrect or
unproductive
concepts.
Productive and meaningful
ideas
are
being further
developed with ever increasing
advancements in science and
technologies.
Contents (information)
culture. When analyzing the interaction of teachers and students
with information and knowledge societies, ICT applications act
as intermediary artifacts.
Participants (teachers, students,
ICT professionals)
The core thesis of this paper is the following: e-learning as a
sociocultural system can be developed in a balanced way,
provided that all the elements are developed in a balanced way.
Extreme development of one of the elements (in our case ICT),
may rather harm and not benefit the whole system.
Overemphasis on technologies may disregard other elements:
students, and, especially, university teachers are lagging behind
and not using the e-learning system to its potential, or using just
a very small fraction (Zuzeviciute, Butrime, 2010; Butrime,
2011).
The table below presents the arguments on the elements that can
be influenced, if educational measures are applied for the
benefit of a balanced and sustainable development of the whole
system.
Table 1
Elements of e-learning as a socio-cultural system to be
influenced and influencing elements from the educational
perspective
Technologies (ICT)
Elements
Influence from the educational
perspective
Relative
strength of
the
influence
from
educational
perspective
As this study revealed, the
decision to get involved into elearning is based on cultural
considerations and personal
conscious
decision
to
undertake a certain role (user;
active creative participant) in
further
development
of
learning environments
According to the theoretical analysis, relative strength can be
rated as follows (Table 1): first (strongest) - participants (from
educational point of view, influence is possible because
participants – teacher and students – are the members of
university community. It is possible to install ICT infrastructure
that meets the needs of a certain community. But, however, the
core objective is to help participants to become active members
in the process, to overcome fears and evolve: from a recipient,
user, into an active agent of the process. Both teachers and
students should be encouraged and supported in order to
become active, creative and creating participants of
contemporary e-learning. Study revealed that just a small
fraction of opportunities available today is being used by
university community members (teachers, and, surprisingly,
students)). Second element that can be influenced from an
educational perspective: interaction processes (processing,
optimizing, dosage of information delivery, and its duplication
if needed). From educational point of view, it is important to
facilitate collaboration between teachers and students and ICT
professionals in order to develop meaningful learning
environments and curriculum). Third element - contents
(information) (influence from the educational point of view is
possible: teachers, students, researchers, can upload their ideas,
discoveries, critical remarks, formulate questions, ask for help,
offer their own materials that may serve as open educational
recourse). Fourth identified element- technologies (ICT)
(cooperation with educators in order to develop learningfriendly environments).
Only relatively weak influence
can be applied to this element
from educational perspective.
ICT (infrastructure, software,
hardware) is being developed
and produced by the whole
research-economic sector and
global alliances
Moderate influence can be
applied to this element from
educational perspective.
Processes, interactions
Strong influence can be applied
to
this
element
from
educational perspective.
Interaction in any case
summons feedback, but if a
specific message is being sent
to a number of recipients, there
is no guarantee that all
recipients will actually receive
it. There is always a certain
degree of risk that interaction
will not happen.
As it was analyzed earlier, the change of one of the elements of
the system or special investment in one of the elements may
have an impact on the whole system (in our case, on e-learning
as a sociocultural system). Though the study analyses attitudes
40
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
on e-learning held by both teachers and students, this paper
concentrates on presenting the teacher perspective. Special
educational measures, enabling teachers to use ICT applications
more effectively in higher education studies is of crucial
importance, because with huge investments for other elements
of the system (e.g., ICT applications), the system is at risk of
imbalance. Too many opportunities may prevent some
university teachers of using them, because in many cases
support and facilitation is needed to generate meaning for
applying technologies in teaching and learning processes.
3.
D9
Biomedical
sciences,
appllies
collective
intelligence
technologies
Question “What would help you to use ITC in your work more
frequently and more efficiently? (in cases) Possible answers
were "1-would help most", 2 – would help a lot"," 3 – would
help ". Answers in the Figure 1 are sorted starting with the
answer "1 – would help most" in decreasing order. According to
results, it is evident, that university teachers need educational
support in mastering contemporary ICT applications, and, also,
PROCEDURE AND PROFILE OF
RESPONDENTS
Both quantitative and qualitative studies were organized to
reveal the role of a university teacher in implementing ICT in
the process of university education, as we have a belief, based
on arguments above, that university teacher is a key element in
ensuring balanced and sustainable development of e-learning
system as a socio-cultural system in higher education.
Questionnaire. In 2010, 157 university teachers were asked to
share their ideas on various e-learning aspects. They represented
different fields, except information sciences (purposefully so).
Interviews. University teachers from different fields (but,
purposefully so, not from computer sciences) were asked to
share their ideas in interviews in 2009-2010. Interviews were
recorded after informants’ consent, and, later, the texts were
transcribed and content analysis was applied in order to identify
categories and sub-categories of ideas.
Profile of teachers involved in interviews with a pupose to
identify what educational measures are needed in order to
participate in e-learning to a greater extent
Gen
der
Scientific
Degree
D1
W
Dr.
D2
D3
M
M
Habil.dr.
Dr.
Pedago
gical
status
Assoc
prof.
Prof.
Assoc
prof.
Age
Comments
49
Social sciences,
appllies
collective
intelligence
technologies
Biomedical
sciences,
applies some
elements of ICT
for 23 years
Biomedical
sciences.
appllies
collective
intelligence
Biomedical
sciences
Biomedical
sciences
Biomedical
sciences,
applies some
elements of ICT
for 12 years
Biomedical
sciences.
Biomedical
sciences
53
41
D4
M
Habil.dr.
Prof.
48
D5
M
Habil.dr.
Prof.
46
D6
M
Habil.dr.
Prof.
65
D7
M
Habil.dr.
Prof.
47
D8
M
Dr.
Assoc
prof.
55
Phd
student
Lecture
r
The teacher training courses in the field of e-teaching
development
Table 2
Cod
e
M
33
46
Comfortable portable PDA with useful software f.ex.
iPhone/iPad with ( a dictaphone, messages, a telephone,
Internet access, bar code reader)
38
Possibility to work with free (open source) software
meant for teaching (learning)
36
55
50
49
58
68
43
Bigger administrative support
27
40
77
Accessibility of specialized literature on the topic of ICT
at University
24
49
68
Information about the innovations of ITC distributed via
e-mail
21
58
67
Expansion of the structure of distance learning at
University
20
More general information on the topic of ITC
19
69
55
53
73
Encouragement of the innovators of positive experience 10
45
85
The discussion and dissemination of the examples of
10
positive experience
44
84
A Blog offering discussions on e-teaching (learning) 9
37
90
Virtual discussion forum for University lecturers 9
41
92
0
0
0
1
1
1
1- would help most 2- would help a lot 3- would help
Fig.1. Answers to the question “What would help you to use
ITC in your work more frequently and more efficiently?
they need support of the university administration. Teachers
state that the means which would help most to use ICT in their
work more frequently and more efficiently are the following:
teacher training courses in the field of e-teaching development
(46 respondents), new modern computer technology (38
respondents), open source software (36 respondents), bigger
administrative support (27 respondents) and wider variety of
specialized literature on the topic of ICT (27 respondents). Even
if rather many answers, showing the need for PDA with
appropriate software, were given (38 respondents), however, the
graph clearly illustrates that university teachers in most cases
are in need of educational, administrative and peer support,
rather than in need for more sophisticated tools, applicable for
e-learning.
41
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Majority of the university teachers are aware of collective
inteligence ICT tools, but these tools are regularly used by
much smaller numbers. Kruscal-Walis criterion was calculated
in the analysis of the use of the ICT tools based on collective
intelligence by different age groups of the teachers. The
difference in the use of ICT tools based on collective
intelligence in various age groups of teachers was statistically
significant (p <0.05) for the following tools: e-mail (p = 0.001),
Flickr (P = 0.001), YahooGroups (p = 0.002), Tags (P = 0.002),
blogs (p = 0.006), Wikis (P = 0.006), Gmail (p = 0.028),
Googlegroups (p = 0.028), RSS (P = 0.034), Netlog (p = 0.035).
For such tools as Hotmail, Windows Life and SlideShare p =
.000. This means that the use of these tools in different teacher
age groups differs substantially.
Participants (students and teachers);
Technologies (ICT);
Processes, interactions;
Contents (information).
The knowledge society is the overarching system.
Quantitative study (answers to a questionnaire) revealed that
university teachers in most cases are in need of educational,
administrative and peer support, rather than merely in need of
more sophisticated tools, applicable for e-learning.
Qualitative study allowed to identify the factors that the
university teachers consider to be of most importance in
developing e-learning system in a balanced way:
- Initiative, according to university teachers, mostly
comes from teachers themselves (enthusiasts),
- Positive motivation from more experienced
colleagues was mentioned as a crucial factor,
- Reciprocal e-communication “students – teachers”
was identified as a crucial factor.
These results were strengthened also by data from interviews.
Results from interviews. Interviews revealed that university
teachers tend to learn and search for information independently,
although they state that professional development courses in the
field of e-learning development would help them use ICT at
work more often and effectively. There is a small number of
teachers who seek to implement ICT based on innovative ideas
in the process of studies, i.e. enthusiasts. Regarding the
development aspects of subculture based on the collective
intelligence ICT technologies in e-learning as a socio-cultural
system, the following activities of teachers were identified:
1.
2.
3.
The study seems to indicate that elements of e-learning as a
sociocultural system are influenced by different agents. Some of
the (ICT provisions) are developed by global research and
development and economy alliances, and however, other
elements: in our case, university teachers, need additional
educational and administrative support in order to participate in
the developments on equal terms. If university teachers are not
supported in the process, the whole system of e-learning might
be distorted: with ample ICT provisions on the one hand, and
with unqualified and discouraged teachers (some) on the other,
e-learning may not be serving for the best benefit of university
community members, contribute to quality of studies, and, as a
consequence, foster sustainable advancement of knowledge
society, because, as Várnagy, 2011, emphasises, in the end we
want sustainable, democratic ssociety that is worthliving for and
is rewarding to live in. University teacher is an element of elearning system that needs educational, administrative,
institutional support in the process.
Initiative, according to university teachers, mostly
comes from teachers themselves (enthusiasts),
Positive motivation from more experienced
colleagues was mentioned as a crucial factor,
Reciprocal e-communication „students – teachers“
was identified as a crucial factor.
Positive and negative aspects of activities related to the
application of ICT in the study process by teachers were
identified. Traditional auditorium (face-to-face) learning is very
important for teachers and it is not possible to replace it with
completely virtual learning (social relationship with a student
and possibility to respond to students’ needs in a fast way and
change methods during the process are particularly meaningful).
All the teachers, who participated in the research, were in
favour of blended learning.
4.
5.
[1]
CONCLUSIONS
[2]
ICT achievements enable to introduce e-learning as an integral
part of university studies. The main topic (e-learning as a sociocultural system) in this paper is analysed based on three main
theoretical approaches: connectivism, theory of systems, and
approaches to culture. A phenomenon as complex as learning,
especially, involving ICT, should be analyzed in the intersection
of at least these three major theoretical perspectives, though
there are also other perspectives which may prove to be very
useful in highlighting the complex issue.
[3]
[4]
E-learning is conceptualized as the most general concept. This
concept, as we define it, covers all forms of teaching and
learning (together), provided that learning incorporates ICT to
some extent.
Traditional forms of studies (lecture preparation and delivery,
students’ participation, discussion, feedback and evaluation)
and methods may be easily be transformed into an e-learning
socio-cultural system enriched with ICT. In other words, there
is a possibility to conceptualize and analyze e-learning as a
socio-cultural system comprised of a lot of objects. the key
elements being:
[5]
42
REFERENCES
A Memorandum on Lifelong Learning. EC, Brussels.
2001.
Kemmis, S., Atkin, R. & Wright, E. How do students
learn? : Working papers on computer assisted learning : a
report by the UNCAL (Understanding Computer
Assisted Learning) independent educational evaluation
of the National Development Programme in Computer
Assisted Learning. Norwich, Centre for Applied
Research in Education, University of East Anglia. 1977,
427 p.
Gage, N. L., Berliner, D. C. Educational psychology
(6th ed.). Boston, MA: Houghton Mifflin. 1998.
Wentling, T., Waight, C., Gallager, J., La Fleur, J.,
Wang, C., Kanfer, A. E-learning: A review of
literature. Urbana-Champaign, IL: University of
Illinois.
2000.
Retrieved
from:
http://learning.ncsa.uiuc.edu/papers/elearnlit.pdf.
(January 15th 2007)
Siemens, G. “Connectivism: A Learning Theory for the
Digital Age”. Elearnspace everithing elearning. 2004.
Retrieved
from:
http://www.elearnspace.org/Articles/connectivism.htm
(March, 30th 2010).
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
Chye S.L., Tan, D.T.H., & Goh, W.S. “The next
generation of e-learning: Strategies for media rich online
teaching and engaged learning”. International Journal
of Distance Education Technologies, 2 (4), 2004, pp. 117.
Baltrusaitis, P. “E-mokymosi veiklos modelio teorines
prielaidos”. Profesinis rengimas: tyrimai ir realijos.
2007 Nr. 13. VDU. Kaunas. 2007.
Bang, J. “E-Learning reconsidered. Have e-learning and
virtual
universities
met
the
expectations?”
Elearningeuropa.info.
2006.
Retrieved
from:
http://www.elearningeuropa.info/directory/index.php?pa
ge=doc&doc_id=7778&doclng=6 (July 30th 2010)
Downes S. “Learning networks in practice”. Emerging
Technologies for Learning. Volume 2 2007. National
Research Council of Canada. ISBN 1853794678. 2007.
Retrieved
from:
http://partners.becta.org.uk/page_documents/research/em
erging_technologies07_chapter2.pdf (March 20th 2010
m.)
Jasutiene E. Dagiene V. “Skaitmeniniai aplankai ir
tinklarasciai vertinant IKT kompetenciją”. Informacijos
mokslai. Nr. 42-43. 2007. 37-42 p.
De Praetere T. “E-learning. Learning through the use of
electronic devices”. Knolbeta. Aunit of Knowledge.
2008. Retrieved from: http://knol.google.com/k/elearning# (October 5th 2009).
Targamadze, A., Petrauskiene, R. “The Quality of
Distance Learning in the Situation of Technological
Change”. Aukstojo mokslo kokybe Nr. 5, VDU.
Kaunas. 2008, pp. 74-93.
Aceto, S., Dondi, C. “Innovation, e-Learning and
Lifelong Learning”. Frameworks for Supporting
Lifelong Learning: proceedings. Asia - Europe
Conference on Lifelong Learning: Beijing, 25 November
2008: 2008. pp. 22-30.
Mickus A., Vidziunas A. “Informaciniu komunikaciniu
technologiju ir nuotoliniu studiju metodu diegimas
tradicinese studijose”. Acta Paedagogica Vilnencia
2009 23, 2009, pp. 21-28.
Rutkauskiene, D., Gudoniene, D. “Socialine tinklaveika:
tendencijos ir issukiai”. Mokymosi bendruomenė ir
antrosios kartos saityno (Web2.0) technologijos.
Tarptautines konferencijos pranesimai. Vilnius: MII.
2010, pp. 67-74.
Davidson A., L., Waddington, D. “E-Learning in the
university: When will it really happen?” eLearning
Papers. Nº 21 September 2010. Retrieved from:
http://www.elearningeuropa.info/files/media/media2371
0.pdf (September 30th 2010)
Rutkauskiene D., Pociūte E., Targamadze A., ir Strička
M. 2006. Lietuvos virtualus universitetas. Kaunas,
Retrieved from: http://distance.ktu.lt/livun/ (March 2th.
2008).
Heinze A.; Procter C. Reflections on the Use of
Blended Learning. Education in a Changing
Environment. University of Salford, Salford, Education
Development Unit. 2004.
Edvards J., R. “A Cybernetic Theory of Stress, Coping,
and Well- Being in Organizations”. Academy of
Management Review. Vol. 17(2). 1992, pp 238-274.
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
43
Martins L.L., Gilson L.L., Maynard, M.T. “Virtual
teams: What do we know and where do we go from
here?” Journal of Management, Vol. 30(6), 2004, pp.
805-835.
Barker, P., M., A., Moon, N., W., Ward, A., C., “Virtual
exclusion and Telework: Barriers and opportunities of
technocentric workplace accomodation policy”. Work.
Vol. 27, 2006, pp. 421-430.
Duoba K. “Virtualiuju organizaciju atsiradimą
sąlygojusios priezastys”. Ekonomika ir vadyba: Nº 14,
2009, pp. 560- 566.
Augustinaitis A. “Ziniu visuomenes rastingumas”.
Informacijos mokslai. Nº (31), 2004, pp. 18-27.
Vygotsky, L., S. Mind in Society: The Development of
Higher Psychological Processes. (Edited by Cole, M.,
John-Steiner, V., Scribner, S., Sourberman). Harvard
University Press, Cambridge, MS. 1978.
Hung D.W.L., Der-Thang, C. “Situated Cognition,
Vygotskian thought and Learning from the Communities
of Practice Perspective: Implications for the Design of
Web-Based
E-Learning”.
Educational
Media
International, 38(1), 2001, pp. 2-12.
Scedrovitskij, G., P. Izbrannye trudy. Moskva: Skola
kulturnoj politiki. 1995.
Kvedaravicius. J. Organizaciju vystymosi vadyba.
Kaunas, VDU. 2006. 395 p.
E-Learning Glossary. American Society for Training &
Development.
2010.
Retrieved
from:
http://www.astd.org/LC/glossary.htm (July 15th 2010)
Kavolis, V. Civilization analysis as a sociology of
culture. - Lewiston : Mellen Press, 1995. - IV, 223 p.
Ausra A. Atviruju resursu reiksme vystant ziniu
visuomenę. Moksline elektronine biblioteka. 2005.
Retrieved
from:
http://www.ebiblioteka.lt/resursai/Science%20online/05_
2/eLibrary_lt_Egypt_text_2005_lt.pdf (May 5th 2010)
Schein, E.H. (1992). Organisational Culture and
Leadership. London, UK: Jossey-Bass Publishers.
Parsons T. 1998. Sistema sovremennyh obshesv. Моskow: Аspект Преss, - 270 p.
Mamardasvili M., K. “Procesy analiza i sinteza”.
Voprosy filosofii, No 2. Moskva. 1958.
Castells M. Informacijos amzius: ekonomika,
visuomene ir kultūra / Manuel Castells. (T.) 1
Tinklaveikos visuomenes raida, – Kaunas, 2005. 535 p.
ISBN 9986-850-52-5.
Zuzeviciute, V., Butrime, E. “E-learning as a sociocultural system”. Technologies and Practices for
Constructing Knowledge in Online Environments:
Advancements in Learning. Hershey - New York :
Information science reference (IGI Global), 2010, pp.
202-218.
Butrime E., The Phenomenon of E- Learning as a
Socio-Cultural System in University Studies. Doctoral
Dissertation. Vytautas Magnus University. Kaunas.
2011, 178 p.
Várnagy
P.,
“Democracy
and
scouting”.
Internulturelles
Lernen
in
Osmitteleuropa:
Geschichte-Theorie-Methoden-Praxis.Wien
Verein
zur Förderung der Europäischen Akademie für
Lebensforschung, Integration und Zivilgesellschaft –
EALIZ, 2011, pp. 61-64.
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Recent Trends and Prospects of Marketing Publications in Turkey
Sema KURTULUS (PhD)
Faculty of Business Administration, Istanbul University
Marketing Department Istanbul, Turkey
Kemal KURTULUS (PhD)
Faculty of Economics and Administrative Sciences, Zirve University
Business Department Gaziantep, Turkey
Selen OZTURK
Faculty of Business Administration, Istanbul University
Marketing Department Istanbul, Turkey
methodological issues by underlying critical aspects in each step
of a basic research process and how it’s changed year by year.
ABSTRACT
The objective of this study is to examine methodological issues
and recent developments in marketing publications. Content
analysis method is used to evaluate marketing publications in
terms of methodological frame namely research type, research
modeling, hypotheses development, sampling, measurement and
data analyses. This study aims to provide directions and
recommendations for the future of marketing discipline. Turkish
National Marketing Congresses’ Proceedings between 2007 and
2012 are the basis for this study. Major problems are
determined to be the lack of diversity in research methods,
research modeling, hypotheses development, problems related
to sampling process, the choice of data analyses techniques and
interpretation of results.
2. CONTENT CATEGORIES
To investigate recent trends in research methodology in
marketing publications, 213 papers published in National
Marketing Congresses’s Proceedings between 2008 and 2012
are examined. In former studies [10] [11] [12] content
categories were broadly classified as consumer behavior,
retailing, marketing management, tourism management, product
and brand management, marketing strategies, international
marketing, logistics management, marketing ethics, marketing
communication, social marketing, services marketing, sales
management and marketing research.
Keywords: Research Methodology, Marketing Trends,
Marketing Publications, Turkish National Marketing
Congresses, Content Analysis.
100%
90%
80%
Percentage of studies
1. INTRODUCTION
The purpose of this study is to investigate recent trends in
research subjects and methodology in marketing publications in
Turkey and to discuss on prospects and further contributions. In
this study, content analysis is used to evaluate 213 marketing
papers published in proceedings of 13th [1], 14th [2], 15th [3],
16th [4] and 17th Turkish National Marketing Congresses [5]
based on their methodological framework in an aim for
understanding, determining and analyzing the development of
the marketing discipline through discussing on ongoing
problems and prospects.
70%
60%
50%
40%
30%
20%
10%
0%
2008
The review and discussion of research methodology used in
marketing publications has been going on for last years [6] [7]
[8]. The results of reviews and evaluations led to different
critical points during this time of period. Kurtulus and Dundar
[6] evaluated 41 papers, Kurtulus and Kurtulus [8] evaluated
236 marketing publications by using similar methodological
criteria, that is a basic research process in marketing area [9]
such as content categories, research type, research modeling,
research hypotheses, sampling, measurement, data collection
and data analyses.
2009
2010
2011
2012
Consumer Behavior
Marketing Mix (4p)
Marketing Strategies
International Marketing
Retailing
Figure 1: Trends in research topics by year
In this study, for the classification of 213 papers, content
categories are combined and summarized into five areas
according to their interrelations.
In this study, marketing publications in Turkey are evaluated in
terms of research type, modeling, hypotheses, sampling,
measurement, data collection and analyses to examine
Figure 1 shows that consumer behavior is the most popular
research topic in ongoing years (40.4% in total). Marketing mix
44
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
(4p) with 21.1% (including marketing communication, product
and brand management, services marketing, logistics
management and sales management) and marketing strategies
with 20.7% (including categories such as marketing
management, marketing research, social marketing and
marketing ethics) are more studied by the academia in Turkey in
total of five years.
increasing reliance on two methods, experiments and modeling.
Also they found that 85% of empirical studies investigated
heavily rely on a limited set of quantitative methods which are
basically experiments, modeling and surveys.
Percentage
of studies
100%
International marketing and retailing categories which constitute
11.3% and 6.6% respectively had experienced a decline as in
the number of studies performed in the last year. There are no
certain directions of trends as seen in Figure 1.
80%
60%
40%
20%
0%
2008
2009
2010
2011
2012
3. RESEARCH METHOD
Quantitative Research
For methods diversification, marketing papers are first coded
according to their research type, whether the paper is theoretical
or involves research. Besides research based studies are
classified as quantitative research or qualitative research.
Figure 3: Trends in research types by year
4. RESEARCH MODELING AND HYPOTHESES
The trend in research methods is shown in Figure 2. There
seems to be an excessive domination by research based papers
(192 out of 213 publications, 90.1% in total) especially seen in
the last two years.
Research models usage in publications between 2007 and 2012
are presented in Figure 4. In total of 192 research based
publications, 36.5% of those used descriptive-predictive model,
35.9% used causal model and only 27.6% used exploratory
model. There seems to be a certain decrease in researches based
on descriptive model after the year 2009 and increase in the
number of studies investigating causal models.
Besides the main subject of marketing congresses changes
according to recent trends, new concepts and technologies used
in marketing; there is still need for further contributions to
existing literature in theory.
One explanation is that ongoing situation may result from
researchers who may be discouraged in theory generation in
favor of increasingly marginal knowledge gains due to a
narrower focus on methods appropriate for theory testing [13].
100%
Percentage of studies
90%
100%
Percentage
of studies
Qualitative Research
80%
60%
40%
80%
70%
60%
50%
40%
30%
20%
20%
10%
0%
2008
2009
2010
2011
2012
0%
2008
Research based
2009
2010
2011
2012
Theory based
Exploratory Model
Descriptive - Predictive Model
Figure 2: Trend in research methods
Causal Model
Research based papers which are based on quantitative or
qualitative research is shown in Figure 3. There is obviously a
higher reliance on quantitative research techniques (82.8% in
total).
Figure 4: Trends in research models
Besides, whatever research model preferred in those
publications, research design and model development seems to
be a critical issue.
Also, in nearly none of the studies, researchers used both
qualitative and quantitative techniques for a single research
purpose in an adequate way.
In total, 39.1% of marketing publications has appropriate
research designs whether sufficient or not. Figure 5 shows that
number of studies which have used research design seems to be
stable in years.
Although the gap between research types seems to be
decreasing compared to previous years [6] [8] and even last year
[12], some researchers argue about the lack of diversity.
On the other hand, 30.7% of marketing publications did not use
research designs almost the same as the ones with 30.2% which
have no design usage indeed must be. Accordingly it is
observed that in predictive and causal researches, there is lack
of design usage especially in 2009 and 2010.
Davis et al. [13] performed an extensive content analysis of
articles published in five leading marketing journals (Journal of
the Academy of Marketing Science, Journal of Consumer
Research, Journal of Marketing, Journal of Marketing Research,
and Marketing Science) between 1990 and 2009. Results reveal
an obvious downward trend in methods diversity resulting from
45
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
size determination throughout the whole data gathering process
[14]. Because it is one of the indicators of the quality of
inferences made by the researcher that stem from underlying
findings [15]. For sampling process in research methodology,
the publications are classified according to sampling method
(probability vs. nonprobability techniques) and sample size.
100%
90%
Percentage of studies
80%
70%
60%
Because there is not a significant change in two broader
classifications between years as seen in Figure 7, sampling
methods are evaluated in terms of nonprobability sampling with
97.8% in total (including convenience, snowball and judgmental
sampling used in total of 182 papers) and probability sampling
with 2.2% (including simple random, systematic and cluster
sampling) in this study.
50%
40%
30%
20%
10%
0%
2008
2009
2010
2011
2012
100%
80%
Percentage
of studies
Design used
No design used
No design used although must be used
60%
40%
20%
Figure 5: Trends in research design usage
0%
2008
In almost half of the studies (94 papers out of 192, nearly 49%)
in total of five years, researchers have developed research
hypotheses and tested these hypotheses. In 32.8% of the papers
there are no hypotheses developed. Although researchers have
preferred to use descriptive-predictive and causal models
according to their specific research objectives, not in all studies
hypotheses may be formulated.
2010
Nonprobability Sampling
2011
2012
Probability Sampling
Figure 7: Trend in sampling methods diversity
In each year, convenience sampling is the most widely used
method in marketing publications (nearly 90% in total).
Besides, census is used in seven studies instead of sampling. In
the study of Kolbe and Burnett [16] which was a content
analysis research, it was found that the majority of samples used
are also classified as convenience samples. On the other hand,
systematic sampling are found more frequently among other
probability samples such as proportionate, simple random and
stratified sampling in their study.
In Figure 5, trends in hypotheses usage show that researchers
that used a research design also developed hypotheses, which
may be the same as in some studies suffer from both lack of
design usage and lack of hypotheses development. From Figure
5 and Figure 6 there can be seen a resembling trend to a certain
degree except the last two years.
In most of the studies sample size is determined by researchers
arbitrarily. Figure 8 shows trends in sample sizes with an
obvious increase in sample sizes that are less than 200
respondents in years (38.6% in total of 189 papers). Also
samples size of 201 - 400 (32.3%) and 401 - 600 respondents
(16.4%) dominates others in which larger samples are used.
100%
90%
Percentage of studies
2009
80%
70%
60%
50%
100%
40%
90%
30%
80%
Percentage of studies
20%
10%
0%
2008
2009
2010
2011
2012
Hypotheses developed
No hypotheses developed
No hypotheses developed but must be
70%
60%
50%
40%
30%
20%
10%
Figure 6: Trends in hypotheses usage
0%
2008
5. SAMPLING AND MEASUREMENT
Researchers must carefully manage sampling process along
with each critical step such as population definition, sampling
frame determination, sampling technique selection and sample
2009
2010
2011
200 or less
201 - 400
401 - 600
601 or more
Figure 8: Trends in sample size
46
2012
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Measurement is also important in accurately representing the
concept of interest and is instrumental in the selection of the
appropriate method of analysis. There are two types of scales
that are non-metric measurement scales and metric
measurement scales. Nonmetric measurements can be made by
nominal and ordinal scale whereas metric measurements can be
made by interval and ratio scales [17]. Whereas nominal scales
are simplest to use and the ratio scales are the most complex
[18]. The choice of particular scaling techniques in a given
situation should be based on theoretical and practical
considerations of a researcher. As a general rule, the scaling
technique used should be the one that yield the highest level of
information available, considering multiple measures to be
obtained [14]. According to our investigation, the most widely
used scale is the Likert Scale. Semantic differential is the other
alternative attitude scale that is used in most of the marketing
papers.
ANOVA, Correlation, Analytic Hierarchy Process, Metaanalysis and Content analysis) and analyses using nonmetric
data (Chi-Square, Kolmogorov-Smirnov, Kruskal-Wallis, Mann
Whitney U and Wilcoxon tests).
As seen in Figure 9, multivariate analyses using
interdependence techniques such as factor analysis contribute to
39.3% in total. Other quantitative methods (30.2%) and
analyses using dependence techniques (23.0%) follow these
analyses. Nonparametric analysis contributes to nearly 7.5% in
total.
Structural equation modeling (SEM) is an advanced technique
which is classified under analyses using dependence techniques.
In this study, SEM equals to 6.6% with 24 in total of 361 data
analyses techniques. Between 2008 and 2012, the trend for
SEM is seen as follows; 4.5% (3 in 67), 6.3% (4 in 63), 12.3%
(9 in 73), 7.4% (4 in 54), 3.8% (4 in 104). There is a certain
downward trend beginning with the year 2010 which is the
highest in this period with 12.3%, although it turns upward
again in 2012 relatively.
6. DATA COLLECTION AND ANALYSES
According to research results, in terms of data collection,
questionnaires are mostly used in quantitative researches
whereas focus groups, in-depth interviews and case studies are
mostly used in qualitative researches. Mail surveys and internet
surveys are also frequently used as recent data collection
instruments. The purpose of data analyses refers to obtaining
feasible and meaningful information from the collected data
[19]. The critical issue in data analyses is the determination of
appropriate statistical procedure. Scale of measurement, the
research design and the assumptions underlying the test statistic
all determine the type of a statistical method to be used.
There seems to be heavier reliance on quantitative data analyses
techniques such as factor, regression, variance analyses and ttest with respect to nonparametric techniques. That result seems
to be similar to other studies [13] in which the findings referred
to ongoing trend for quantitative analyses varying in amount
and diversity rather than qualitative techniques.
In Figure 9, there can be seen a somewhat regular trend for all
techniques except the ones classified as "other quantitative
methods". Especially in 2011 and 2012, there is an increased
diversity among research techniques that related to content
analysis method, such as bibliometrics, semiotics and discourse
analysis, netnographics etc. in some degree. This can mean a
positive trend related to increased diversity in qualitative
techniques.
100%
90%
Percentage of studies
80%
70%
7. CONCLUSION
60%
This study is done in an aim for providing a basis for further
improvements in terms of marketing research methodology. It is
important to note that the results are limited to the marketing
publications investigated based on recent subjects and trends in
marketing research in Turkey and further discuss on problems
and prospects.
50%
40%
30%
20%
10%
The findings demonstrate that there are substantial amount of
problems related to sampling method selection and choices of
data analyses techniques. As a general outcome, there seem to
be a higher reliance on quantitative research techniques. Also,
only in a few studies, researchers have preferred to use both
qualitative and quantitative methods accordingly.
0%
2008
2009
2010
2011
2012
Analyses Using Dependence Techniques
Analyses Using Interdependence Techniques
Other Quantitative Methods
For broader purpose as breadth and depth of understanding
research objectives and hypotheses, sometimes both qualitative
and quantitative techniques could be used jointly. This refers to
the term "mixed methods research" in which a researcher
combines elements of qualitative and quantitative research
methods such as using qualitative and quantitative viewpoints,
data collection, analyses or inference techniques [20].
Analyses Using Nonmetric Data
Figure 9: Trend in data analyses techniques
The trend for data analyses methods used in marketing
publications can be seen in Figure 9. The results are based on
total of 361 data analyses techniques. According to this
interpretation, methods are classified into four categories which
are analyses using dependence techniques (Structural equation
modeling and path analyses, Regression, Discriminant, Conjoint
analysis, Logistic regression and MANOVA), analyses using
interdependence techniques (Factor and Cluster analysis,
Multidimensional scaling), other quantitative methods (t-test,
The findings of this study are substantially similar with previous
researches in research type diversity. Harrison [21] examined
the uses of mixed research designs in 2072 articles published in
the Journal of Business Research between 1990 and 2010 with
content analysis method. According to research findings,
47
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[11] K. Kurtulus, S. Kurtulus, “Recent Trends in Marketing
Research in Turkey”, 6th International Conference on
Social
and
Organizational
Informatics
and
Cybernetics, Orlando, Florida, 29 June-2 July 2010, Vol.
2, pp. 92-96.
researchers recognize benefits of mixing qualitative and
quantitative research, however usage rate seems insufficient.
Technological developments give direction to inevitable
changes in marketing research. Traditional consumer research
through structured and unstructured personal communication,
mail and telephone surveys are undergoing transformation by
increased mobility. Consumer research is shifting towards
Internet surveys and mobile phone inquiries [22]. The findings
of this research also demonstrate that the use of Internet surveys
have begun to be used more frequently among current studies.
[12] S. Kurtulus, K. Kurtulus, S. Ozturk, “Research
Methodology in Marketing Publications in Turkey:
Review and Evaluation”, 6th International MultiConference on Society, Cybernetics and Informatics,
Orlando, Florida, 17-20 June 2012, pp. 212-216.
All periods had some popular patterns in data analysis.
However, it is suggested that data analyses must be selected
accordance with research purposes, research design, scales of
measurement and the assumptions underlying the test statistics.
[13] D.F. Davis, S.L. Golicic, C.N. Boerstler, S. Choi, H. Oh,
"Does marketing research suffer from methods myopia?",
Journal of Business Research (2012), doi:10.1016/j.
jbusres.2012.02.020
8. REFERENCES
[14] N.K. Malhotra, Marketing Research, An Applied
Orientation, Pearson Education Inc., 6th Edition, 2010.
[1]
13th Turkish National Marketing Congress Proceedings
Book Pazarlamada Yeni Yaklaşımlar- New Approaches in
Marketing, 25th- 29th September 2008, Nevşehir Turkey,
pp. 1-713.
[15] A.J. Onwuegbuzie, K.M.T. Collins, “A Typology of
Mixed Sampling Designs in Social Science Research”,
The Qualitative Report, Vol. 12, No. 2, June 2007, pp.
281-316.
[2]
14th Turkish National Marketing Congress Proceedings
Book: Küreselden Yerele...Glokal Pazarlama- From
Global to Local...Glocal Marketing, 14th- 17th October
2009, Yozgat Turkey, pp. 1-553.
[3]
15th Turkish National Marketing Congress Proceedings
Book: Bilgi ve İletişim Çağında Pazarlama ve TüketiciMarketing and Consumer in the Age of Information and
Communication, 26th- 29th October 2010, Izmir Turkey,
pp. 1-694.
[16] R.H. Kolbe, M.S. Burnett, “Content Analysis Research:
An Examination of Applications with Directives for
Improving Research Reliability and Objectivity”, Journal
of Consumer Research, Vol.18, September 1991, pp.
243-250.
[4]
[5]
[17] J.F. Hair, W.C. Black, B.J. Babin, R.E. Anderson,
Multivariate Data Analysis - A Global Perspective,
Pearson Education Inc., USA, 7th Edition, 2010.
[18] N.K. Malhotra, M. Peterson, “Marketing Research in the
New Millennium: Emerging Issues and Trends”,
Marketing Intelligence and Planning, Vol.19/4, 2001,
pp. 216-235.
16th Turkish National Marketing Congress Proceedings
Book:
Pazarlamada Geleceğe Yolculuk: “Mobil
Pazarlama”- A journey into the Future of Marketing:
"Mobile Marketing", 22th- 25th November 2011, Istanbul
Turkey, pp. 1-451
[19] G.A. Churchill, Marketing Research Method
Foundations, 7th edition, Harcourt Brace College
Publishers, Dryden Press, 1999.
17th Turkish National Marketing Congress Proceedings
Book: Pazarlamada Kültür ve Eğitim ParadigmasıCulture and Education Paradigm in Marketing, 18th - 21th
October 2012, Balıkesir Turkey, pp. 1-830.
[20] R.B. Johnson, A.J. Onwuegbuzie, L.A. Turner, "Toward a
Definition of Mixed Methods Research", Journal of
Mixed Methods Research, 1(2), 2007, pp. 112-133.
[6]
K. Kurtulus, S. Dundar, “Türkiye’de Pazarlama
Araştırmalarında Kalite Nasıl Arttırılabilir?”, 1st Turkish
National Marketing Congress, 27-29 October 1995,
İstanbul.
[21] R.L. Harrison, "Using Mixed Methods Designs in the
Journal of Business Research, 1990–2010", Journal of
Business Research (2012), doi:10.1016/j.jbusres.2012.
01.006
[7]
K. Kurtulus, S. Kurtulus, E. Yaras, “Bilimsel
Araştırmaların Değerlendirilmesi Konusunda Bir Öneri”,
Pazarlama Dünyası, August 2000, pp. 4-6.
[22] S. Salai, R.K. Žnideršić, "Marketing Research in the
Contemporary Consumer Environment", Management
Information Systems, Vol. 6, No: 4, 2011, pp. 15-22.
[8]
S. Kurtulus, K. Kurtulus, “Prospects, Problems of
Marketing Research and Data Mining in Turkey”,
Enformatika, Vol.11, January 2006.
[9]
A. Parasuraman, D. Grewal, R. Krishan, Marketing
Research, South-Western College Publication, 2nd
edition, 2006.
[10] K. Kurtulus, S. Kurtulus, Z. Bozbay, “Research
Methodology in Marketing Publications: Review and
Evaluation”, 5th International Conference on Social
and Organizational Informatics and Cybernetics,
Orlando, Florida, 10-13 July, 2009.
48
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Geotechnology: A New Approach Supporting Social Inclusion in BetimMG
Sandro LAUDARES
Computation Department,Pontifical Catholic University ofM inas Gerais
Belo Horizonte,M G,Cep: 30.
535-901,Brasil
and
João Francisco de ABREU
Geography Department,Pontifical Catholic University ofM inas Gerais
Belo Horizonte,M G,Cep: 30.
535-901,Brasil
neighborhoods where they live and allows the visual
presentation of these points integrated into digital maps
of the city using information retrieval in large databases
. The project "Meu lugar éaqui", implemented by the
municipality of Betim – MG seeks to contextualize
nature and cultural features of the studied areas of the
city to write the history of the region using technology
elements, such as GIS, to map important points and
provide such information on the W eb.
ABSTRACT
Internet influence on geotechnology keeps growing and
accelerating
the
development
of innovative
products.The possibilities of geotechnology in public
administration are huge but in Brasil there are very few
social inclusion projects aware of this technology and
advantages. Normally the adoption of new technologies
demands training and more dedication of the staff and
these leads to unavoidable delays. This paper presents a
practical experience tried in fundamental education
schools of the city of Betim-MG where were offered to
the students - from nine to twelve years old - small
courses using smartphones to collect data and make
digital maps so that the students can map their own
neighborhood and perceive how to locate themselves
and deal with new technology to find places and events.
They also learned digital cartography basics and GPS –
Geographic Positioning System – general concepts.
The name of the projectis“M yplaceishere”and t
he
main goal of this project was to stimulate the students
to access, produce, and propagate knowledge about the
neighborhood where they live. The comprehension of
geographic features of the place they live and their role
in the city. The use of smartphones helped to keep the
students interested and participative.
2. M OTIVATION
In Brasil, the poorest have difficulty in using
information and communication technologies in
working situations and in their social life, thus creating
a space for social exclusion and precarious citizenship.
GIS applications available through the Internet became
viable and low-cost to public institutions, providing the
public administrator a logical representation and
graphical geographically referenced information.
Additionally, one can use the facilities of these
applications to educate and include the students in their
place of residence and know the difficulties in their
neighborhood, so that these students will be responsible
for recording and georeferencing information of their
region. Geovisualization systems through the Internet
can be used as management tools, planning and urban
education, enabling to direct the efforts of public
administrators from the content registered by schoolś
children.
Keywords: geotechnology;digital inclusion;
geovisualization;GIS– Geographic Information
Systems; education.
3. M ETHODOLOGY
The Municipality of Betim-MG develops many
programs that seek to provide assistance to youth
development. And through these programs we could
glimpse methods of support for the implementation of
this project. At the municipal level, in 2009 it was
planned with local community and made partnership
with other school projects. The project was called "My
place is here" and in 2009three schools were selected
for a pilot project. The proposed objectives were:
1. INTRODUCTION
This paper presents an experience of using
geotechnology as a means of facilitating digital
inclusion of adolescents in the city of Betim – MG,
Brasil. The results show the feasibility of actions
related to the use of new technologies related to GIS –
Geographic Information Systems in public education,
making it possible to spread the use of instruments
and techniques such as georeferencing and
geovisualization through the internet. The use of GPS –
Global Positioning Systems - devices enables students
of municipal schools to identify landmarks in the
•Encourage students to access,produce and reframe
the knowledge about their neighborhood and their city;
49
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
• To collect and dissemi
nate t
he history of t
he
neighborhood: spaces, places, people and events;
• Know and understand t
he organizat
ion of t
he
geographic area of the neighborhood and its insertion in
the city;
• Create a technological environment for digital
recording and interaction of all project participants.
From these objectives a sequence of steps were
implemented in order to systematize and disseminate
the knowledge produced in graphical and digital media
to contribute to strengthening the feeling of belonging
to the city and valuation of the district of those
children.
To this end, we organized workshops on Environmental
Perception;Video and Photography;Digital Maps and
GPS. For all workshops are conducted field activities in
the neighborhoods of the participating schools.
After the workshops, a technical team is responsible for
keeping track of the activities recording and indexing
them in a database which will be used in the future to
show students from other schools.
A website was developed and all the workshops and
knowledge acquired during the project will be shared
through the internet.
4. THEORETICAL BACKGROUND
Digital Inclusion
The Information and Communication Technologies
(ICTs)are part of everyday life in modern society. In
all areas ICTs are gaining ground. Since the use of a
mobile device to a news report on a newscast, as a
means of traffic information or as tools that streamlines
access to them. Every moment one sees releases of
computers, technology, software, Internet applications
and various technologies ranging involving anyone in
everywhere of the world.
The so-called "digital age" becomes relevant factor and
becomes point of debate between society, schools,
state, businesses, churches, industries, community
leaders, etc. Terms such as digital inclusion and
exclusion become part of government programs as a
way to analyze and find ways to keep up with the rapid
growth of ICT.
Cazeloto (2008)[3]makes a critical analysis of digital
inclusion programs that attempt to minimize the digital
divide as a way of trying to avoid a "human tragedy".
The result of a widening gap between the rich and poor
caused by the threat of deprivation to computational
resources. Despite an apparent pessimistic view on the
subject, Cazeloto is not opposed to programs, but tries
to highlight the role and limit that the inclusion should
take.
It is undeniable the contribution that ICT and digital
inclusion programs have brought to society, but can
these not be seen as an answer to social inclusion. The
computer has been seen as a tool to support that
inclusion. If used well, ICTs can bring exponential
benefits to society. Kenski (2003) identifies the need to
broaden digital inclusion: Communication technologies
evolve constantly and very quickly. Every moment new
differentiated products and sophisticated - mobile
phones, fax, software, videos, multimedia computer,
internet, interactive TV, virtual reality, video games are created. [...] The democratization of access to these
technological products - and the consequent possibility
of using them to obtain information - is a major
challenge for today's society and demand efforts and
changes in economic and educational spheres broadly.
(Kenski, 2003, p. 26)[5].
Marco Silva on "Internet in school and inclusion" [10],
cites Pierre Lèvy [7]identifying cyberculture lifestyles
and behaviors assimilated and transmitted on historical
experience and everyday marked by computer
technology, mediating communication and information
via Internet. This culture of cyberspace can not be
ignored since the companies are moving towards
computerization and use of technologies in virtually all
areas of life.
In order to face the technological advances
increasingly, society will tend to use the technologies
and include up digitally. The Internet has provided the
quickest access to information in the last decade.
Producing pages, blogs, social networks and thousands
of W eb applications have raged the great W orld W ide
W eb. According to JoséArmando Valente [12], using
the Internet, and more specifically the W eb as source of
information is not very different from what happens
with the old tutorials. Valente certifies that the Internet
has become increasingly interesting and creative, thus
enabling a large and diverse subjects search. But
stresses that if the student does not have a goal to surf
the W eb, it can get lost in the midst of such information
and redirects to numerous web pages and without a
proper guidance given by a teacher can pass a long
period of time busy but without producing knowledge
of all topics visited.
According to a survey of the Brazilian Institute of
Geography and Statistics (IBGE) in 2006 [4] the
municipal public education was the most concentrated
network aimed at digital inclusion - 61.8% of the
municipalities were surveyed. In the Survey of Basic
Municipal Information of 2006, 5,564 municipalities
were investigated in the topic Education, which, in
addition to concern for the middle and high school,
there was also the education of Young Adults.
Regarding the Digital Inclusion, it was identified that
half of the municipalities have policies for digital
inclusion - totaling 52.9% and - such a policy includes
t
he creat
ion of “telecentros“ that offer access to
Internet and computing courses. The concern with
digital inclusion was present in 33 municipalities with
50
over 500thousand inhabitants (91.7%), higher than the
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
several other services were launched integrating a
package of immense possibilities for users and
developers. Google allows the visualization of
interactive digital maps through Google Maps service,
accessed www.google.com.br/
maps . This service
allows the inclusion of custom maps in to websites,
blogs and web applications. Thus, more and more
Brazilian sites include Google maps in their content
with many different purposes: from simple location of
commercial establishments to use on mobile devices
with different functions location and generating routes.
The project "My place is here," presented here uses
Google Maps as a tool for geovisualization of
information referenced by the students.
national average rate (52.9%). Among the major
regions, the highlight was the South (59.4%), followed
by the Southeast (57.9%)and Midwest (52.6%). The
North and Northeast were below the national average,
with 35.6% and 48.4%, respectively. Among the
municipalities with plan or policy of digital inclusion,
45.7% opted for the creation of telecenters, and 40.7%
have provided computers with internet access for use
by the general public [4].
Geotechnology and Digital Inclusion
Geotechnology can play an important role in digital
inclusion actions to the extent that the instruments
provided
stimulate people'
s curiosity. Learning
becomes much more interesting when the students can
view the computer known information such as "the roof
of their house" or the location of the school, the
supermarket, the health center and many other places.
5.
"M Y PLACE IS HERE": DIGITAL
INCLUSION
THROUGH
GEOTECHNOLOGY IN BETIM -M G
The geographical territory has variables that can be
decisive in the municipal government. W here to build a
new health center?W here to invest?W hich streets are
in need to fix?W here are the opportunities for a better
service to the citizen?These are questions asked daily
by entrepreneurs and public administrators. The
geotechnology thus appears as a concept to analysis
and applications build to be used in management and
planning, allowing a better distribution of resources and
targeting efforts. The visualization of the results can be
implemented in the form of thematic maps on the
Internet, using software components that implement
various clustering methods.
The main goal of this project was to include the
students and make them aware of their neighborhood
history and culture through geotechnology W orkshops
were held in themes such as Environmental Perception,
Video and Photography, Digital Maps and GPS. Below
are some pictures of the workshops held in the schools.
Environmental perception
Students draw how they perceive the environment
where they live and study. Are encouraged to draw
themes as the way from home to school, the facade of
the school and where they like to visit nearby school.
Geovisualization, according MacEachren & Kraak
(2001), involves visualization, cartography, image
analysis, information visualization, exploratory data
analysis and GIS to provide theories, methods and
techniques for visual exploration, analysis, synthesis
and presentation of spatial data. According toTobon
(2002, p. 3), visualization in the context of Information
Technology can be defined as follows:
"Visualization is a technique for data analysis that
relies on the human ability to recognize patterns in
flexible computing environments that support
interactive exploration of data on screen. Visualization
is particularly useful and appropriate when little is
known about the data set to learn about its features,
making discoveries and forming hypotheses about
relations between its attributes. "[11].
Figure 1: Drawing done by students
According to Ramos (2005), "Visualization is a
concept derived from scientific visualization, and can
also be defined as geographical visualization, or
geovisualization." [9]. The objective of exploratory
geovisualization would provide patterns and
relationships between data for the user to create the
maps you need, you can make use of location
addresses, generate routes, travel planning, location,
and so on.
Google has become a reference in recent years. After
the development and launch of its search engine,
51
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
REFERENCE
NEIGHBORHOOD?
OF
YOUR
Figure 2: Students of the school: Gino Joséde Souza
Video and Photography
Figure 4: Exercise performed by the students in the
workshop of Digital Maps
Students use mobile "smartphones" and digital cameras
and record places of interest such as landmarks, their
school and neighborhood streets.
Through this workshop is held automated
georeferencing of images and the students check the
results in real time using components of
geovisualization systems, mobile computing and
positioning and navigation systems.
6. CONCLUSIONS
Geovisualization systems via the Internet has become a
viable and cost-effective management alternative for
private and public administration. The results of this
study demonstrate that geotechnology can and should
be used to enable digital inclusion in public or private
schools. However, it is not enough the use of GPS
devices and geovisualization isolated. It is necessary to
integrate these instruments to a methodology that
enables an active and constant participation of students
in workshops. In addition, to master new technologies,
their texts and contexts is a need for the effective
exercise of full citizenship. It was observed that the
people involved in this project have developed
computer skills, reading, text production and that will
make them citizens integrated, participatory and
transformers of the societies where they live and
socialize. Therefore, one can conclude that it is highly
productive using geotechnology as instrument for
achieving digital inclusion. The spatial characterization
also demonstrated the importance of graphical
representations in dealing with the dynamics of the
city, reinforcing the role of geovisualization in the
representation and communication of urban spatial
information. From the results achieved, arise naturally
needs and projects for further development, in order to
update the methodology, incorporating new workshops
and new practices to work. The Municipality of BetimMG, through the Division of Planning and GIS
information continues to develop new practices to
improve and complement the project workshops.
Figure 3: Student in workshop on video and photography
Digital M aps and GPS
Initially students identify the boundaries of the school
district. Then navigate through all the streets of their
neighborhood through Google Maps. Finally, they
perform exercises including questions like:
·
FIND YOUR SCHOOL ON THE MAP.
·
W HAT ARE THE STREETS NEXT TO
YOUR SCHOOL?
·
W HICH
ARE
THE
POINTS OF
REFERENCE
OF
YOUR
NEIGHBORHOOD?
·
W HAT ARE THE GEOGRAPHICAL
COORDINATES
OF
POINTS
OF
52
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
7. REFERENCES
[1] Secretaria Nacional da Juventude. Programa
Nacional de Inclusão de Jovens: Educação,
Qualificação e Ação Comunitária (ProJovem).
BRASÍLIA, 2009.
[2] CASTELLS, Manuel. A galáxia Internet:
reflexões sobre Internet,negócios e sociedade.
Available
at:
<http://www.eprofe.net/
tecnologia/galaxia_internet.pdf>. Access
in: October, 2009.
[3]CAZELOTO, Edilson. Inclusão Digital: uma visão
crítica. São Paulo: Editora Senac São Paulo, 2008.
[4] INSTITUTO BRASILEIRO DE GEOGRAFIA E
ESTATÍSTICA. Perfis dos municípios brasileiros
2006.
Available
at
<http://www.ibge.gov.br/home/presidencia/
noticias/
noticia_visualiza.php?id_noticia=1006&id_pagina=1>
Access in November, 2009.
[5] KENSKI, Vani Moreira. Tecnologias e ensino
presencial e a distância. Campinas: Papirus, 2003.
[6] LÉVI, Pierre. A Inteligência Coletiva: por uma
antropologia do ciberespaço. 5.ed. São Paulo, 2007.
Cap. 2, p. 44.
[7]LÉVI, Pierre. Cibercultura. São Paulo: Editora 34,
1999, p.169.
[8]MACEACHREN, A. M.;KRAAK, M.J. Research
Challenges in Geovisualisation. Cartography and
Geographic Information Science,2001, vol. 28 (1),
pp. 1-11.
[9] RAMOS, Cristiane da Silva. Visualização
Cartográfica e cartografia multimídia: conceitos
e tecnologia. São Paulo: Editora UNESP, 2005.
[10]SILVA, Marco. Internet na escola e inclusão. In:
SEED. Integração das tecnologias na educação.
Brasília: Ministério da Educação, Seed, 2005, p. 63
[11] TOBÓN, C. Usability Testing for Improving
Interactive GeoVisualization Techniques. CASA
– Centre for Advanced Spatial Analysis. W orking
Paper Series, 2002.
[12] VALENTE,
José Armando.
Pesquisa,
comunicação
e
aprendizagem
com
o
computador: O papel do computador no
processo ensino-aprendizagem. In: SEED.
Integração das tecnologias na educação. Brasília:
Ministério da Educação, Seed, 2005.
53
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Can We Put Forward a Mathematical Model of the Selection of a New Location for
a Multinational Company?
Dorota Leszczyńska
IPAG Business School
4, bd Carabacel
F 06000 Nice, France
d.leszczynska@ipag.fr
company derives from the general concept of space and spatiality,
applied to this issue of localization by Colovic and Mayrhofer
(2008). Originating from this statement, the question which has
prompted our reflection can be expressed in the following words:
what is the influence of geographically embedded knowledge on
the location performance of a multinational company?
Abstract
Research works haven’t yet shed much light on the performance of
the location choice of multinational companies. The aim of this
publication is to highlight the link between geographically
embedded knowledge, the location of a multinational company and
its consequential performance. We put forward a conceptual
approach allowing to formulate the bases of a mathematical
modelisation. A case-study is carried out within the perfume
cluster in Grasse region, France. Our research has led us to
highlight some types of managerial behaviours which will ensure
the location performance within a cluster.
In this publication, based on Min and Melachrinoudis’s research
work (1996) regarding the optimization of a location choice made
by a multinational company for its production units, we shall first
put forward a conceptual approach of embedded knowledge impact
on the location performance of a multinational company. Then we
shall formulate the bases of a mathematical modelization, and put
our theoretical reflections to the test, confronting them with a casestudy carried out within a cluster. We shall examine the case of a
regional industrial cluster concerned with the expansion project of
multinational chemical companies. This research aims at showing
the influence of certain types of embedded knowledge, such as
sensorial or tacit knowledge, on the efficiency of the location
choice of a multinational company. The mathematical model
actually shows that, when the multinational company is not capable
of integrating such knowledge into its structure, the local business
relationship breaks off. We shall then be able to submit our views
to a discussion, and to underline the fact that there is indeed a link
between geographic knowledge and the success of the location of a
multinational company within a cluster.
Keywords : mathematical modelisation, tacit knowledge, French
perfume cluster, location,
Introduction
As the issue of international management has not been extensively
documented by French writers, the trend of research concerning
organizational approach based on knowledge (Eisenhardt and
Santos, 2002) has gradually emerged as the main perspective
aiming at explaining the movements of multinational companies.
For instance, Gupta and Govindarajan (1991) conceptualize
multinational firms as being networks for transactions, functioning
via knowledge flows. An implantation on a new site gives a
multinational company the opportunity to have access to external
resources. It may take place via a corporate alliance or an
acquisition.
Firstly, new implantations provide multinational companies with
an access to their partners’ knowledge, as they combine their own
amount of knowledge with that of their partners. (Inkpen and
Tsang, 2008). In this perspective, the geographical location of a
multinational company is a key-concern of research in international
management (Porter, 1994; Dunning, 1998).
Secondly, research work concerning organisational approach based
on knowledge has focused on the study of contexts in which
knowledge flows are highlighted. In this perspective, a good deal
of research work has been undertaken in order to elaborate the
theory of clusters, based on knowledge. (Maskell, 2001). A cluster
has therefore been conceptualized as a site in which the creation of
embedded knowledge is stimulated, as a consequence of the
geographic and organizational closeness of local companies.
(Rallet and Torre, 2005, p. 50). This research work has shown the
assets of clusters, which influence the choice of multinational
companies as far as their location is concerned. (Rugman, 2005).
As a matter of fact, the innovative capacities of clusters have a
direct influence on their competitive performance. (Porter, 2000).
1. Location of a multinational company and knowledge: an
ingenious link?
A widespread type of learning takes place through a transfer of
knowledge flows. For a long time, it has been generally assumed
that this was a one-way transfer, from multinational companies
towards local businesses. (Lin, 2005). Nowadays, as competition
between multinational companies has become harder and harder,
their location choice has become a major strategic issue (Gimeno
and al, 2005). Referring to Spicer’s new terminology (2006), we
shall therefore consider knowledge transfer of a convergent type,
that is to say, from local to international level.
1.1. Learning and location
As they look for new sources of external knowledge flows,
multinational companies select some specific geographical sites for
their implantation. Davenport and Prusak (1998) define a
knowledge flow as being a fluid combination of experiments, a
running exchange of essential values, of contextual information,
and of shrewd expert evaluations. A knowledge flow offers a
structure which allows the assessment and the incorporation of new
experiments and information. As the major part of an
organisation’s knowledge is deeply rooted in expertise and the
However, the significant indicators in order to predict the longterm efficiency of a new location contemplated by a multinational
company are still unknown (Goerzen and Asmussen, 2007). Our
conceptual representation of the localization of a multinational
54
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
individual experience of its members, the capacity of a
multinational company to search for and discover new knowledge
depends on its ability to effectively control, incorporate and absorb
its acquired knowledge within its existing knowledge databank.
(Hamel, 1991). The newly acquired databank provides a key-stone
for an effective development and for the renewal of the
organizational structure, and therefore represents a major
competitive asset. Within multinational companies, learning
implies the creation, transfer and integration of knowledge flows.
2. The efficiency resulting from the location choice made by a
multinational company
The validity of the location choice made by a multinational
company can be assessed in reference to its long-term
performance, that is to say, by its long-lasting ability to take
advantage of knowledge flows in correlation with its objectives,
while, at the same time, obtaining profitable results. We therefore
put forward a mathematical model determining the long-term
financial result of this location choice. We shall then present a
case-study as an illustration, in order to submit our point of view to
discussion and present possible fields for future research work.
Porter (1994, p. 37) underlines the fact that competitive advantage
is determined by an appropriately located innovation process, and
underscores the crucial importance of the location choice made by
the multinational company. Most costs and risks are consequently
linked to obstacles raised by distance. A recent research work,
which also takes into account the language barrier, shows the
distinct influence of each of these types of distances and their
immediate result on the effective transmission of explicit and tacit
knowledge (Ambos and Ambos, 2009).
2.1. Mathematical model
The aim of this mathematical modelization is to put forward a
mathematical tool to determine the long-term financial result of a
multinational business in search of a possible new location. We
shall refer to a model of progressive increase of complexity, which,
in the first place, implies to take into consideration the simplifying
hypothesis of linearity. The aim of the following suggested model
is to provide a key allowing the best possible selection of a new
implantation. The location of a multinational company within a
cluster is dependent on knowledge transfers between the
companies belonging to the cluster and this multinational company.
A knowledge transfer from the cluster to the multinational
company leads to interactions between the newly transferred
knowledge and the pre-existing knowledge within the multinational
company, and this fact generates profits in terms of productivity
and financial result. Indeed, the consequential performance
achieved by the multinational company is the difference between
the financial result and the expense caused by the knowledge
transfer. However, the gain in performance for the multinational
company may result in an increased competition between the
multinational company and the cluster, and the effect of this may
be a drop in the financial results and a loss of performance for the
companies of the cluster.
The knowledge to be transferred is selected so as to maximize the
global performance, that is to say the total amount of performance
achieved by both the multinational companies and the companies
in the cluster, deriving from all the transfers which were carried out
as the new implantation was under way. In order to ensure the
stability of the new location, the performance of the multinational
company and of each company in the cluster must be positive,
which means that the knowledge transfers should globally by
profitable to all partners. Obviously the necessity of stability
lessens the performance of the implantation under way, but it also
avoids a rupture of the partnership, and therefore, it ensures a longterm knowledge learning until the ultimate stage of tacit knowledge
is reached, generating more and more performance. However,
statements of account are regularly made to compare reality with
expectations, and to adjust orientations if necessary.
1.2. Organisational knowledge
Organisational knowledge not only exists in written documents, but
it is also present in the organization routines, tasks, processes,
practices, norms and values. The usual distinction between tacit
and explicit knowledge derives from the articulate or implicit
nature of the considered knowledge. Tacit knowledge is
inarticulate, it is essentially personal by nature; such a knowledge
is difficult to communicate to others (Polanyi, 1958) and to
negotiate at its true value on the external market. It is often
strongly implanted in the cognitive processes of individuals, or it is
deep-rooted in the routine, specific culture and values of the
organization. (Bell and al, 2009). On the contrary, explicit
knowledge can be codified and transmitted much more easily.
However, the distinction between tacit and explicit knowledge
should not be considered as a dichotomy but rather as a spectrum
with both types of knowledge – tacit and explicit – at the extremes.
(Inkpen and Dinur, 1998). While explicit knowledge provides the
guidelines, tacit knowledge makes the organization explicit
routines meaningful. (Dhanaraj and al, 2004). Therefore, when it is
learnt, tacit knowledge helps companies to acquire a certain degree
of explicit knowledge. The consideration of transfer speed in an
organization as far as knowledge flows are concerned (a notion
first mentioned by Davenport and Prusak, 1998) is undoubtedly
useful in order to evaluate how long these transfers will take, and
how much they will cost. In their research work, Inkpen and Wang
(2006) have observed that tacit knowledge is difficult to assess,
and, consequently, that a company in a phase of learning often
keeps on concentrating on its explicit knowledge which is easier to
transmit (and which is less valuable). Other elements may impact
the learning process, such as the industrial sector of the
multinational company, or such as the links between the
multinational company and a wider network of knowledge, etc.
The above-mentioned elements shed some light on the learning
capacity of a multinational company, but we have not listed them
exhaustively, and they may be debated. For our part, we think that
the deficiencies in research work about the learning capacity of a
multinational company mostly derive from the failure to
understand the knowledge flows circulating during the learning
period. In other words, the combination of the specific features, of
the implantation of a multinational company on the one hand, and
of knowledge sciences on the other hand, may very well lead to an
efficient conclusion, as far as location selection is concerned.
The evaluation of gains and drops of the financial results linked to
knowledge transfer can only be made from a thorough examination
of the structure of the companies in the cluster, and of the structure
of the multinational company. The cost of a knowledge transfer can
be calculated from the general structure of the knowledge (K)
involved which is partitioned into a “n” number of groups – Kj
with “j” ranging from 1 to n. This partitioning is established so that
K1 only contains explicit knowledge whereas Kn only contains
tacit knowledge. Each group of intermediate knowledge (Kj with j
ranging from 2 to n-1) contains both tacit and explicit knowledge
which are not independent, and the proportion of tacit knowledge
gradually increases with “j” (in reference to Inkpen and Dinur’s
55
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
knowledge spectrum, 1998). The transfer of the knowledge group
Kj from the cluster to the multinational company takes place in Tj
days and has a financial cost of Fj. As distance has a greater
influence on the transfer of tacit knowledge than on the transfer of
explicit knowledge, Tj and Fj are functions related to j. Therefore,
the complete knowledge transfer takes a time T=T1+…Tj+…Tn
for a total cost of F= F1+…Fj+…Fn.
Diagram 1.
cluster
Multinational companies implantations within the
- Creation of knowledge flows in
perfumery ,
- Knowledge embeddedness since
1795
La Maison
Lautier
(1695-1968)
Purchase by the RhônePoulenc multinational
On the one hand, this model may be used to establish an indicator
of choice for the implantation of a multinational company by
comparing projected performances of several possible
implantations, on a suitably long period so as to be able to evaluate
the effects of the knowledge transfer. On the other hand, clusters
which show a real capacity to create knowledge and innovations
fast will be given advantage by this indicator of choice.
Lautier
Aromatiques
(1968-1981)
2.2. Case study method
The method we use in our case study is appropriate to the object of
our research, for it emphasizes the understanding of the existing
dynamics inside one particular environment, and will focus on a
specific field of investigation. Our investigation will be focused at
the cluster level. Our purpose is to study the impact of
multinational companies on the cluster in reference to the typology
of interorganisational research put forward by Provan and al.
(2007, p. 483). We have identified ninety aromatic companies
which coexist, very close to each other, on a very limited area.
These highly concentrated companies, which have now become a
perfume cluster and a centre of competitiveness, developed in the
area of Grasse (in the county of the “Alpes Maritimes” in France)
between the 17th and 19th centuries without any participation of
multinational companies. When the most recent implantations of
multinational company within the cluster took place, the tacit
knowledge minimized the possibilities of the transfer of knowledge
flows. Indeed, the main feature of local knowledge is a very high
viscosity, and its transfer requires a long learning process, so that a
significant amount of tacit knowledge may be acquired.
In order to describe the evolutions of the implantations of
multinational companies within this cluster, we have resorted to
bibliographic sources, to a vast internal documentation from
company, and to thirty five semi-directive interviews. The perfume
industrial cluster in Grasse has attracted multinational chemical
companies. These multinational companies have attempted to
transfer the knowledge flows originating from the producers of
aromas and perfume compositions, and from perfume creators.
-First direct investment initiative
from a multinational company
towards the cluster
-Transfer of explicit and tacit
knowledge flows in perfumery
-Embedded knowledge preserved
within the cluster
Repurchase by the
Florasynth multinational
Florasynth
(1981-1995)
-Transfer of tacit knowledge flows
in food aromas and fine perfumery
-Transfer of a databank of explicit
knowledge (formulas of chemical
specific products, of aromas and
perfumes)
-Location of the “Florasynth”
within the cluster
-Embedded knowledge preserved
within the cluster
Repurchase by the
Bayer multinational
Bayer
(1995-1996)
Haarmann &
Reimer
subsidiary of
Bayer
(1996-2003)
2.2.1. The implantations of multinational companies and the
perfume cluster
In order to illustrate the impact of knowledge flows on the
performance of multinational companies after a new implantation,
we have studied the succession of purchases and repurchases the
“Maison Lautier”, has been subjected to in Grasse. The event of a
cluster being taken over by a multinational company cannot be
predicted by a mathematical model, because it results from often
unpredictable human decisions; however, it is important to have a
mathematical model available in order to establish a comparative
prevision concerning different possible localizations. We shall
therefore relate the impact of multinational companies such as
“Rhône-Poulenc”, “Florasynth”, “Haarman&Reimer” and “Bayer”
on the cluster businesses, as we shall contemplate the implantation
of these four chemical companies in Grasse.
-Transfer of tacit knowledge flows
in perfumery
-Relocation of the activity of
perfume creation in Switzerland
- Embedded knowledge non
preserved within the cluster
-Failure to respect the constraint of
stability and breaking off of local
relation
Repurchase by the
Symrise multinational
Symrise
(2003-2004)
-Redundancies
and
permanent
closure of the factory
-Multinational company’s renunciation
of its activity within the cluster
56
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Other investigations would certainly be welcome to ensure the
generalization of these results, particularly with more recent
clusters, and clusters adapted to a current access to external sources
of knowledge creation. However, this kind of extrapolation must be
contemplated with care, as the mathematical model shows that the
location performance highly depends on the structure of
multinational company.
Discussion
Nowadays the strategic importance of the implantation of
multinational companies within a regional industrial cluster is the
subject of an increasing number of theoretical documents.
Previous research works mostly provide economic and financial
explanations about corporate alliance and acquisitions. However,
research works must systematically go on exploring how tacit
knowledge within a cluster has an influence on the efficiency of the
location choice by a multinational company. Concerning the choice
of a regional location by a multinational company within a cluster,
geographic distance and cultural differences are challenges to be
taken up by managers. In this respect, Kale and Anand (2005) have
suggested that the companies of a cluster are conscious of the fact
that implantation attempts by multinational companies are intended
to exploit learning opportunities. Consequently, local businesses
may become very cautions towards the implantation of
multinational companies, and they will then do their best to
increase their own learning capacities.
Conclusion
The most recent publications (Yang and al, 2011) underscore that
the idea of bringing together learning on the one hand and the
cluster’s prospects on the other hand opens up a fruitful and
promising way of studying the competitiveness of multinational
companies. While the notion of tacit knowledge is an intuitive
major element when analyzing a cluster, it has however never been
taken into consideration at its true value in existing theoretical
models concerning the localization of a multinational company.
For several decades, theoretical models have mostly focused on
local companies’ accession to new knowledge. (Lin, 2005). Our
research work has demonstrated that tacit knowledge, whether
through senses or experience, is crucial to assess the efficiency of
the localization choice made by a multinational company. Keeping
this idea in mind, we have constructed our study with two
objectives. The first objective is to elaborate a model in order to
have a better understanding of the impact of tacit knowledge on the
efficiency of a localization choice made by a multinational
company. The second objective is to put forward an appropriate
illustration in order to highlight the influence of knowledge flows
on the performance of a multinational company carrying out an
implantation within an industrial cluster. The results of our
research work have led us to the following conclusions:
In this publication, we have tried to clarify the complex issues
brought up by the location of a multinational company within a
cluster, raising all along the following crucial question: what is the
efficiency of such a location? Indeed, the decision to enter a
regional industrial cluster is usually taken whereas performance
results are considered uncertain. Our whole reflection work has
demonstrated that it is significant to take geographic tacit
knowledge into consideration in order to answer this question. Our
approach meant to put forward two key-ideas. Firstly we have put
forward one of the first attempts aiming at providing some pieces
of theoretical advice, as we evaluated the influence of a cluster’s
tacit knowledge on the efficiency of the location choice that a
multinational company makes when integrating a cluster.
Secondly, our reference to the theory about clusters, based on
knowledge, has led us to consider management behaviours which
are appropriate to support the tacit knowledge influencing
innovation flows. The development of interorganisational routines,
as strategic corporate alliances are made, may improve the future
interactions between companies. (Zollo and Reuer, 2010). The
mathematical model shows that the multinational company chooses
its new implantation with a view to reach an optimal level of
performance.
While the importance of knowledge flows is a major issue in the
process of wealth creation, the purpose of multinational companies
is to take advantage of this asset when choosing a new localization.
Therefore, a cluster’s tacit knowledge is considered valuable only
as a complement to fundamental specific capacities of
multinational companies. We have shown that the influence of tacit
knowledge in the localization choice made by a multinational
company may be apprehended through a model allowing to take
some tacit knowledge specific features and indicators into
consideration.
In order to make this mathematical model operational, it is
necessary to evaluate all the issues and distances involved:
geographical, administrative (institutional), economic and
linguistic, and their subsequent costs as the transfer are being
actived. (Rallet and Torre, 2005). Research works (Porter, 2000, p.
32) highlight the fact that interactions between the companies of a
cluster result in a larger volume of innovations (and of their
subsequent competitive advantages) than the one which would
have been generated in the companies of the cluster had operated
separately. This dynamics develops even more as knowledge flows
are being transferred between the multinational company and the
whole cluster. Therefore, the localization will be effectively
optimized if the multinational company really participates in the
local processes of knowledge transfers within the cluster. The
question may actually be raised in the following words:
considering the volume of innovations generated separately by the
multinational company and the cluster, what volume of innovations
can be expected in the event of their collaboration? As far as our
case-study is concerned, in which no clear collaborative course of
action has taken place, the mathematical model predicts a failure of
the constraint of stability, which results in the breaking off the
local relation.
57
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Approach ». International Transactions in Operational
Research, 3, 1, p. 65-76.
Polanyi, M. (1958). Personal knowledge: Towards a postcritical
philosophy. Chicago: University of Chicago Press.
Porter, M,E. (1994). « The Role of Location in Competition ».
Journal of the Economics of Business, Vol. 1, n° 1, p. 35-39.
Porter, M,E. (2000). « Location, clusters and economic strategy ».
In G. L. Clark; M. Feldman; M. Gertler (Eds.). The Oxford
handbook of economic geography, p. 253-274. Oxford: Oxford
University Press.
Provan, K,G.; Fish, A.; Sydow, J. (2007). « Interorganizational
Networks at the Network Level: A Review of the Empirical
Literature on Whole Networks ». Journal of Management, vol.
33, n° 3, p. 479-516.
Rallet, A., et Torre, A. (2005). « Proximity and Location ».
Regional Studies, Volume 39, Issue 1, February 2005, p. 47-59.
Rugman, A,M. (2005). The Regional Multinationals. Cambridge
University Press, Cambridge.
Spicer, A. (2006). « Beyond the convergence-divergence debate:
The role of spatial scales in transforming organizational logic »,
Organization Studies, vol. 27, n°10, p. 1467-1483.
Uzzi, B. (1996). «The sources and consequences of embeddedness
for the economic performance of organizations: The network effect
», American Sociological Review, 61, p. 674-698.
Yang, H.; Lin, Z.; Peng, M,W. (2011). « Behind acquisitions of
alliance partners: exploratory learning and network embeddedness
». Academy of Management Journal, Vol. 54, No. 5, p. 10691080.
Zollo, M.,; Reuer, J,J. (2010). « Experience spillovers across
corporate development activities». Organization Science, 21, p.
1195-1212.
Bibliographie
Bell, S,J.; Tracey, P.; Heide, J,B. (2009). « The Organization of
Regional Clusters », Academy of Management Review, vol 34,
n° 4, p. 623-642.
Colovic, A.; Mayrhofer, U. (2008). « Les stratégies de localisation
des firmes multinationales Une analyse du secteur automobile ».
Revue Française de Gestion, Volume 184, Issue 4, p.151-165.
Davenport, T,H.; Prusak, L. (1998). Working knowledge. Boston:
Harvard Business School Press.
Dhanaraj, C.; Lyles, M,A.; Steensma, H,K.; Tihanyi, L. (2004). «
Managing tacit and explicit knowledge transfer in IJVs: The role of
relational embeddedness and the impact on performance», Journal
of International Business Studies, 35, p. 428-442.
Dunning, J,H. (1998). « Location and the multinational enterprise:
a neglected factor? ». Journal of International Business Studies,
vol. 29, n° 1, p. 45-66.
Eisenhardt, K,M.; Santos, F,M. (2002). « Knowledge-based view.
A new theory of strategy». In A. Pettigrew, H. Thomas, et R.
Whittington (Eds). Handbook of strategy and management, p.
139-164. Thousand Oaks, CA: Sage, p. 139-164.
Gimeno, J.; Hoskisson, R,E.; Beal, B,B.; Wan, W,P. (2005). «
Explaining the Clustering of International Expansion Moves: A
Critical Test in the U.S. Telecommunications Industry », Academy
of Management Journal, Vol. 48, N°. 2, p. 297-319.
Goerzen, A.; Asmussen, C,G. (2007). « The Geographic
Orientation of Multinational Enterprises and its Implications for
Performance », Vol. Research in Global Strategic Management,
Iss.: 13, p. 65-83.
Gupta, A,K.; Govidarajan, V. (1991). « Knowledge flows and the
structure of control within multinational corporations », Academy
of Management Review, 16, p. 768-792.
Hamel, G. (1991). « Competition for competence and interpartner
learning within international strategic alliances », Strategic
Management Journal, 12, p. 83-103.
Inkpen, A,C.; Dinur, A. (1998). « Knowledge management
processes and international joint ventures », Organization
Science, 9, p. 454-468.
Inkpen, A,C.; Tsang, E,W,K. (2008). « Learning in Strategic
Alliances », In Academy of Management Annals, Vol. 1. James
P. Walsh; Arthur p. Brief (Eds). Lawrence Erlbaum Associates,
New York, London, p. 479-511.
Inkpen, A,C.; Wang, P. (2006). « The China-Singapore Suzhou
Industrial Park: A knowledge transfer network », Journal of
Management Studies, 43, p. 779-811.
Kale, P.; Anand, J. (2006). « The decline of emerging economy
joint ventures: The case of India », California Management
Review, 48(3), p. 62-76.
Knickerbocker, F,T. (1973). Oligopolistic reaction and the
multinational enterprise. Cambridge, MA: Harvard University
Press.
Leszczyńska, D. (2010). « La trajectoire organisationnelle et
l’enracinement du savoir. L’étude de cas d’un cluster régional ».
Revue Management & Avenir, 2010/6, n° 36, p. 168-184.
Lin, X. (2005). « Local partner acquisition of managerial
knowledge in international joint ventures: Focusing on foreign
management control », Management International Review, 45, p.
219-237.
Maskell, P. (2001). « Towards a knowledge based theory of the
geographical cluster », Industrial and Corporate Change, 10, p.
921-943.
Min, H.; Melachrinoudis, E. (1996). « Dynamic Location and
Entry Mode Selection of Mutinational Manufacturing Facilities
under Uncertainty: A Chance-constrained Goal Programming
58
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Trends in information security for Mexican companies, is the cloud computing the answer?
Sandra-Dinora ORANTES-JIMÉNEZ
Instituto Politécnico Nacional, Centro de Investigación en Computación (CIC-IPN), Departamento de Investigación en Ciencias de la
Computación. Av. Juan de Dios Bátiz, esquina con Miguel Othón de Mendizábal, Mexico, D.F., 07738
and
Graciela VÁZQUEZ-ÁLVAREZ
Instituto Politécnico Nacional, SEPI-Escuela Superior de Ingeniería Mecánica y Eléctrica (SEPI-ESIME-IPN), Av. Luis Enrique Erro
S/N, Unidad Profesional Adolfo López Mateos, Zacatenco, Delegación Gustavo A. Madero, C.P. 07738, Mexico, Distrito Federal
and
Alejandro ZAVALA-GALINDO
Instituto Politécnico Nacional, SEPI-Escuela Superior de Ingeniería Mecánica y Eléctrica (SEPI-ESIME-IPN), Av. Luis Enrique Erro
S/N, Unidad Profesional Adolfo López Mateos, Zacatenco, Delegación Gustavo A. Madero, C.P. 07738, Mexico, Distrito Federal
The only thing that has not taken the full force of the
Cloud phenomenon, are the risks and fear of the unknown
by organizations in Mexico and elsewhere, not knowing
how secure your information is.
The objective of this work is focused on determining if
current trends of the Cloud for security of information
can influence the organization and, then, to investigate
variations which must comply with the organizational
structure of Mexican companies to embrace change and
obtain better results by taking advantage of the
implemented services features that make a business
organization "flexible".
The three levels the Cloud offers that enterprises should
pay more attention to are Platform as a Service (PaaS)
Infrastructure as a Service (IaaS). Since the first is
basically a development environment where companies
can create other applications, it makes use of the
characteristics of Cloud Computing and IaaS focuses on
the possibility of providing companies with all necessary
hardware resources for its operations in the Cloud, from
storage to computer processing power.
At a time like the present in which video conferencing
reduces problems, shift managers and associated costs, it
is important to note the role that information has assumed
over the past decades. Thus, during the 80s and based on
data processing systems, which help the company, there
has been a move towards the vision of the company as an
information system.
Any company can be seen as a knowledge network that
provides the necessary infrastructure to maintain the
exchange of information among its members. Cloud
Computing was born from the idea that the information,
data and programs to manipulate them, must reside in
Internet servers, that is to say, applications and data files
currently used in the office computer or corporate, would
be located on Internet.
RESUMEN
With advances in Information Technology and
Communications infrastructure, different forms and
modern programming models in use have called for
innovative forms of Internet and Cloud Computing has
come a long way since it was first tagged as a future
perspective by some researchers. Cloud Computing,
where computing resources and services are offered and
consumed over Internet without the users having
knowledge of the infrastructure.
This idea assumes creating an Internet in which programs
and data are stored at all times and is available for people
who wish to access to them. The truth is that it is not a
completely unknown structure for those who often use
services on the Net.
Cloud Computing is convenient for users and is profitable
for suppliers because, despite having some risks, working
with this new type of technology, allows a saving on both
licenses and administration of services and equipment
needed. Therefore, they may represent an importance for
businesses, particularly in Mexico. However, suppliers
trying to counter the insecurity that currently is presented
by the Cloud, have to abide by rules if they want to offer
their services.
Keywords: The Cloud, Cloud Computing, Internet,
Information Technology, SaaS, PaaS, IaaS, virtualization.
1. INTRODUCTION
This research focuses on "the Cloud", precisely
because, it is “the place” that can store virtually all files
needed at any time and place, as well as use the software
tools preferred, and also consider changes that companies
may need in their application. This is the impact of Cloud
Computing on the organizational structure of the
company, not to mention the impact of this technology on
the company performance.
59
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
- Scalability. The client (user or company) does not have
to worry about updating the computer equipment on
which they are running the application, nor by the
operating system upgrade or installation of security
patches. It is the responsibility and obligation of the
service provider to perform these updates. In addition,
they are transparent to the client, so that the application
must still be available to the user at all times even
when performing the process of updating the provider
side. Updates and new features are installed almost
immediately.
- Companies can concentrate on business processes. The
client (user or company) can focus more resources and
efforts towards a more important strategy, having a
direct impact on the business processes of the
organization, transferring responsibility to the provider
and the deployment, configuration and maintenance of
and infrastructure necessary to run the application.
2. ADVANTAGE SYSTEMS IN THE CLOUD
The goal of Cloud Computing is about the users
relying less on a physical location to work. Therefore as
time goes on, it is no longer necessary to use different
hardware elements, such as hard drives or processors,
thereby achieving common free users and of course also
for businesses using large sums of money in investments
needed to purchase hardware.
One of the most interesting approaches to the idea of
software as a service is the ability to work without
installing any hardware equipment or software, as well as
economically sustaining managing, maintaining and
modernizing. It is a company service provider responsible
for providing appropriate solutions to the availability
problems or otherwise that may arise.
In general, some of the advantages that the Cloud offers
to enterprises are:
- Costs. The user of these services only pays for the
resources they use, designing a payment plan usually
from the time when it is used (memory, processing,
storage). Hence, it can be considered the most attractive
advantage presented by the Cloud Computing and if not,
at least the most obvious of all this technology.
Responsibility for the implementation of the
infrastructure is for the provider and the client does not
have to worry about buying computer equipment, train
personnel for the setup and maintenance and in some
cases, for software development.
- Competitiveness. Thanks to the Cloud, any
organization can compete on equal terms in areas of
Information Technology with companies of all sizes,
and whereas, the competitive advantage is with the one
that has the better computing resources. The Cloud
gives the possibility of not having to buy expensive
equipment; small businesses can have access to the
latest technology at prices within reach, paying only for
consumption.
- Availability. The supplier is obliged to ensure that the
service is always available to the client.
- Abstraction of the technique. Cloud Computing allows
the customer the ability to forget about deployment,
configuration and maintenance; transferring this
responsibility to the service provider.
- Access from anywhere in the world with access to
Internet. Using applications designed on the paradigm
of Cloud Computing can be accessed from any
computer equipment in the world that is connected to
the Internet. Access is usually made from a web
browser, which enables the application to be used not
only from a desktop computer or a laptop, but goes
beyond, allowing the user to use the application from
any mobile device.
3. PROBLEMS IN CLOUD SERVICES
Cloud Computing is a paradigm that can provide
computing services via the Internet and in this context the
Cloud is a metaphor for the Internet [1]. Currently, there
are many important players in the Cloud and also many
services. However, between 2010 and 2011 many, either
by faults or vulnerabilities in their infrastructure, were not
100% reliable. Even now, companies have to resolve the
legality of the information circulating in these business
models. Richard Stallman [2] believes that Cloud
Computing endangers user liberties, because they allow
their private and personal data to be held by third parties.
Service providers for Cloud Computing should pay
attention to the following points, considered as
disadvantages for companies in their use of information
management:
- Perception of loss of privacy. Understandably the
perception of insecurity generated by a technology that
takes information (sensitive in many cases), from
servers outside the organization, leaves the data to the
provider. Therefore, for many (users or a company) it
is extremely difficult to trust their sensitive information
to others and considers that the proposals of Cloud
Computing threatens the vital information for business
processes.
- Availability. Availability was formerly listed as an
advantage, but because it remains a matter solely for
the responsibility of the service provider, the system
can fail to keep the service available to the user, and
not perform a corrective action to restore service. In
this case, the client should wait until the problem is
resolved by the provider. It is in this sense that it
becomes a disadvantage too.
- Lack of control over resources. By having all the
infrastructure and even the application running on
servers located in the Cloud, i.e. the supply side, the
client lacks complete control over resources and even
on the information once it is uploaded to the Cloud.
60
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
- Dependence. The client becomes dependent not only
on the service provider, but also the internet
connection, because the user must be permanently
connected to the system to achieve what is in the
Cloud.
- Integration. The user of the Cloud must follow certain
rules, otherwise, it is not at all easy or practical to
integrating available resources through infrastructure
Cloud Computing with systems developed in a
traditional manner. This is an aspect that should be
taken into account by the client to see how feasible it is
to implement a Cloud-based solution within the
organization.
The level of acceptance in organizations varies depending
on the size of small and medium enterprises in Mexico,
and implementing solutions based on Cloud Computing,
while larger organizations do so according to individual
needs.
However, more and more end users, to whom Cloud
Computing has changed the way they carry out their
activities, which are improved in most cases, allows them
to collaborate in a different way with others in different
locations, accessing applications that require the web
browser from virtually any computer, even from mobile
devices.
Cloud Computing is suitable for business and is
profitable for suppliers because, despite presenting some
risks to work with this new type of technology, it allows a
saving of both licenses as well as administration services
and equipment required for these.
Currently, any company that wants to offer Cloud
Services is free to do so and the situation will change
dramatically in a few years. It is important for security
that providers will have to abide by the rules if they want
to offer their services and businesses and change their
philosophy and abandon traditional means of building
information systems. They must work on turning
disadvantages into advantages and pave the way for
growing companies in the acceptance of this not so new
paradigm which is the Cloud.
It can be concluded, that the Cloud is the answer
regarding cost, availability, competition, location and
scalability for Mexican companies and that they can
devote themselves to pay more attention to changes in
their business processes facilitating their position in the
market.
4. VIRTUALIZATION AND CLOUD
COMPUTING
Virtualization is an emerging paradigm of
information technology that separates the functions of
computer technology and implementation of hardware.
[6]
Virtualization is essential for the optimal development of
Cloud Computing and refers primarily to the platform
issue. It can be said that virtualization is an abstraction of
the technological resources that allows servers to create
virtual devices which can be used to increase the
resources rather than as discrete systems. Cloud
Computing is an interesting topic of virtualization,
allowing a server to treat many users. Another issue that
goes hand in hand with virtualization is clustering, which
allows treating many servers as one, and this allows
quickly incorporating new resources to virtualized
servers, reducing space and power costs and simplifying
overall administration. This makes it easier to create test
environments that allow implementing new applications
without impacting production, streamlining the testing
process, and general system failures isolated from a
virtual machine without affecting the other virtual
machines, and finally bringing a direct benefit in reducing
the hardware needed, as well as their associated costs.
Virtualization can have a drastic change on how Business
pays for its technology and handles the associated risk.
First, by removing the hardware associated with IT
functions, capital costs are virtually eliminated. Secondly,
the remaining costs are strictly transferred into an
operating expense with on-demand or subscription based
on Cloud Computing applications.
6. REFERENCES
[1] [En
línea:
http://www.imaginar.org/iicd/fichas/05_Cloud_comp
uting.pdf] [Consultado: 01-12-2010]
[2] Stallman, Richard. “Cloud computing is a trap, warns
GNU founder Richard Stallman”
[En
línea:
http://www.guardian.co.uk/technology/2008/sep/29/
Cloud.computing.richard.stallman] [Consultado: 0311-2008]
[3] IEEE SPECTRUM (2010). “The Cloud is the
Computer”
G.
[En
línea:
http://spectrum.ieee.org/computing/hardware/theCloud-is-the-computer] [Consultado el 13/07/2010]
[4] Gutiérrez Grajeda, Alfredo Ernesto. “Computación
en la Nube (Cloud computing)”. Revista Electrónica
Ingeniería Primero – Nº 19. Págs.40-44. ISSN: 20763166. Facultad de Ingeniería. Universidad Rafael
Landívar.
[5] Claycomb, William R., PhD. “Tutorial: Cloud
Computing Security”. CERT Enterprise Threat and
Vulnerability
Management
Team.
Software
5. CONCLUSIONS
Cloud Computing is a natural evolution of the
widespread adoption of virtualization, service-oriented
architecture and utility computing.
This technology usually has a gradual growth. While it is
true that Cloud Computing is a technology that has been
used for some years, it has yet to be fully absorbed as a
central tendency in organizations, with the problems and
disadvantages presented in this investigation.
61
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Engineering Institute. Carnegie Mellow University.
2007-2012.
[6] Evans,
J.H.
[En
línea:
http://businesssoftware.suite101.com/article.cfm/computer_virtuali
zation_advantages] [Consultado: 19-01-2009]
62
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Knowledge Network for Quality of Life
José Francisco SALM JUNIOR; Karine KOLLER
University of Santa Catarina State
Florianópolis, Santa Catarina, Brazil
And
Viviane SCHNEIDER; Roberto Carlos dos Santos PACHECO
Institute Stela and Federal University of Santa Catarina,
Florianópolis, Santa Catarina, Brazil
from multiple electronic systems into a simplified, converged
and computer-mediated communication system to enable
individuals to interact, play, communicate, collaborate and
share information in many new and different ways. In Brazil,
Santa Catarina State has been historically recognized as
national prominence in the field of ITC.
Public investments in the state in Science and
Technology Network (STN) are an example of government
priority to this sector. STN has allowed the development of
research and some breakthroughs in the area of ITC, in several
institutions.
In the last two years, twelve research labs have
cooperated in this STN environment, in a project financed by
the Brazilian innovation agency FINEP3, in cooperation with
the state foundation in Santa Catarina (FAPESC4). This
project
is
called
“Information
Technology and
Communication Services for Large-Scale Multi-platform:
Ubiquitous Systems in Service Quality of Life (SCTIC)”.It
intends to attack some of the main computer research
challenges in Brazil: ubiquous systems, knowledge modeling
and complex applied systems. The main goal is to structure a
knowledge research network to develop technology and
innovation in Santa Catarina State.
This network was organized with six research
groups with a common development goal: to create a large
scale of ubiquitous applications using hypermedia object in a
network. In this article, we present the subproject called
Modeling (Portuguese Title: Subprojeto Modelagem),
developed by Researchers of Stela Institute5 and Knowledge
Engineering Lab at the Federal University of Santa Catarina UFSC6. In next section is explaining main characteristics and
outcomes from this research by Modeling Subproject.
ABSTRACT
This paper explains how a research design can be adopted for
a specific goal as to create a base for a knowledge network for
researchers, in order to build quality life technologies in
Brazil. This knowledge network is one of the results produced
by research projects which will help discovery and creation a
technology structure, in years to come. Thus, this work
explains how and which way these communication and
knowledge network elements was created, using several
approaches as General System Theory, Ontology and
Knowledge Engineering, and Ubiquitous Computation awarecontext. The main focus in this paper is described how we set
the context and our main outcomes obtained from it. Also we
explain the premises for a big change that is needed to in a
network that intends to help raise the quality of life.
Keywords: Knowledge Network, Ontology, Knowledge
Engineering, Quality of Life, Cybernetic.
1. INTRODUCTION
In 2006 there was a Seminar called “The Grand Challenges
for Computing Research in Brazil: 2006-2016”, held in São
Paulo. This event was organized by the Brazilian Computer
Society and supported by CAPES1 and FAPESP2. The
researchers identified five challenges for the next years, in the
Brazil’s computing: information management in large
volumes of distributed multimedia data;
· computational modeling of three kinds of systems: (i)
complex and artificial; (ii) natural and socio-cultural; and
(iii) human-nature interaction;
· impacts to computer science due to the transition from
silicon to new technologies;
· universal and participatory access to knowledge for
Brazilian citizens; and
· quality in technological development: available, accurate,
secure, scalable, persistent and ubiquitous systems.
Besides pointing out these challenges, the
researchers highlighted the importance of studies in
ubiquitous information systems, digital convergence, and
other developments in Information Technology and
Communication (ITC). Digital Convergence, defined by
Ifeanyi O. Asonye, in March of 2003, is the priming of
underlying digital technology components and features such
as voice, texts, video, pictures, broadcasts, presentation,
streaming media, global connectivity and personalized
services; the combination of all of these features and abilities
2. KNOW LEDGE MODELING FOR KNOW LEDGE
NETW ORK
In one of the subprojects, the focus was developing the
representation of knowledge and the adoption of modeling
technics and was, for that reason, called Project Modeling,
which would help to set standards and a framework for
3
1
Coordi
nat
ion ofImprovementofHi
gherEducat
ion Personnel(in
Portuguese: Coordenação de Aperfeiçoamento de Pessoal de
NívelSuperior).
2
Foundation forResearch Supportofthe St
ate ofSão Paul
o (in
Portuguese: Coordenação de Aperfeiçoamento de Pessoal de
NívelSuperior).
63
FINEP - Financi
adoradeEst
udoseProjetos(FinancierofStudies
andProjects). FINEPfinancesourresearches.
4
FAPESC – Fundação deamparo apesquisado Est
ado deSanta
Cat
ari
na (Foundation for support research of Santa Catari
na
State). FAPESC hasaresponsi
bil
ityfortomanagetheresources.
5
In Portuguese Instituto Stel
a (Stel
a Instit
ute) is a nonprofit
organization, whi
ch to make research, development and
innovation abouti
nformation and communicat
ion technol
ogies.
In this research, Stel
a Institute is one importantactor for to
supportknowledgemodel
ing, nexttoPPGEGC/UFSC.
6
PPGEGC/UFSC- Programa de Pós-Graduação em Engenharia e
Gestão do Conhecimento (PPGEGC)da Universidade de Santa
Cat
ari
na (UFSC). (After degree program of Engi
neering
Knowledge and management (PPGEGC) from Santa Catarina
StateUniversity(UFSC)).
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
network, in order to set the relations between researches. The
systemic view consists of the tasks below:
· to represent 5W 1H (W hat, W here, W hen, W ho, W hy and
How ) [1]- the concept 5W 1H was used for to represent a
narrative from hypothetical scenario, whose purpose is to
mobilize research (knowledge) network to develop
advanced technologies for Santa Catarina State (southern
Brazil).;
· CESM modeling [2,3,4]– a systemic model that represent
every system with four main elements: composition,
environment, structure, mechanism.
The narrative starts: “after a gentleman gets hit bya
car, some people come to rescue him and also call an
ambulance that soon arrives at the accident scene. The
paramedics described the emergency situation, on a mobile
device that captures some information and data as (i) voice
message, (ii) GPS coordinate, (iii) signal by wristlet
intelligent; (iv) patient electronic health record, (v) real time,
and, (vi) X-ray image by sensor. This device sends this
information for a centralized system that interprets it and
infers how medical protocols for emergency calls can benefit
the patient. After, the system finds a Hospital nearby for the
patient procedures and also forwards the information to the
ambulance staff. In the hospital, the doctor already knows
about patient situation (from information by hypermedia
content) and can prepare everything that patient need”.This
scenario was represented in Figure 3.
knowledge models for the SCTIC network. In order to
produce these results , the primary goal was the development
of a framework to be the applied in a knowledge intensive
ubiquitous system helping during the modeling phase so that it
could be persistent, reliable, secure, and highly available
(particularly for Quality of Life). This framework has four
phases: (1) Contextualization; (2) Knowledge representation,
(3) prototyping and (4) integration. First phase correspond
systemic view and context structure identification, as
illustrated Figure 1.
Fig.1. Relationship between knowledge areas and topics of
research [1-15].
In this article we will focus on explaining how we
conceptualize the first part of framework (Phase 1 –
Contextualization). In this phase we worked on four main
products: (i) the state of the art; (ii) systemic model; (iii)
contextual model; and (iv) Hypermedia content approaches, as
illustrated Figure 1.
In Figure 2 one can observe the outcomes from phase 1 in
green and the pending elements in gray as well as the
relationship between the products and the Modeling
Subproject.
Fig.3. Scenario described for prototyping technologies.
Details pointed out by the red circle in Figure 3, are
better illustrated in Figure 4.
Fig.2. Outcomes and goals of Modeling Subproject.
From state of the art we identified hypermedia
modeling approaches. The systemic model was based in
CESM model (Component, Environment, Structure and
Mechanism) [2,3,4]. In next section is explained how the
systemic development model is linked to the knowledge base
network.
Fig.4. Details by Scenario described for prototyping technologies.
In order to categorize this scenario we used CESM
model, as illustrated Figure 5. There are some elements whose
proposed is to represent outcomes from labs, by knowledge
network. For the subproject responsible for Knowledge
Modeling it is fundamentally important for modeling purposes
the Hypermedia Content.
3. SYSTEMIC BASE OF KNOW LEDGE NETW ORK
Knowledge network developed during this research contains
connections between human agents and non-human agents
(software or hardware). These connections include
information and knowledge exchange. This chosen scenario
was health care as means for helping quality of life. The first
step was discovery the systemic vision for knowledge
64
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
research refers specifically to analyses for identified how
complex can be to build scenario structure, specially political
and cultural aspect which involve data base integration from
several health institution, for example.
Based in CommonKADS methodology [6] and
KAMET II [7], that are studied in a work master [5],
developed in this research, we described:
· Problems and opportunities;
· Research Challenges;
· Proposed Solution;
· Necessary resources;
· Solution Feasibility; and
· Checking of consistency by context.
Principals points identified on Problems and
opportunities are: (i) Lack of an integrated data base
electronic medical record, nationally and internationally; (ii)
Lack of equipment Portable X-Ray (for ambulance) with GPS
and patient identification, connected to an ubiquitous secure
network; (iii) Lack of a service to find patient electronic
health records (which may be spread across multiple
repositories) and put in one package with Hypermedia in order
to send these information by the device Paramedic; (iv) Lack
of service able to infer the severity of the medical emergency,
based on the X-ray image / signal sent by the patient'
s
electronic bracelet /paramedic description /at least one of
these elements to more severe prioritize calls; (v) Lack of
integration of health facilities for the discovery of the most
appropriate place to regulate, in a timely manner, the
allocation of a patient in a nearest health care facility.
Based in these problems we had the following
research challenges: (i) How to integrate all databases
containing the electronic medical records of patients,
nationally and internationally? (ii) There are some X-ray
device with portability and connectivity enough to capture and
send images, GPS coordinates and patient identification via
ubiquitous network? (iii) How to integrate controls of
emergencies, health unit for regulation of patients, according
to the severity of the medical emergency? (iv) How to infer
the severity of an emergency event based on data and
information available? (v) There is any part of proposed
scenario which can be prototyped?
To test it we proposed a solution: Intelligent
Regulation System of emergency patients that:
· PROVIDE electronic patient record (distributed on
network).
· INFER emergency severity of the event, based on
available data and information;
· CHECK availability of the nearest health unit (hospital).
· PRIORITIZE emergency care more severe.
In order to make this system is necessary some
resources as a (i) political according between statewide,
national and international health system, for to exchange
electronic health record (with security); (ii) existing
technology clustering and posterior deploy in health Sector;
(iii) financial resources to staff training and development of
mobile emergency service; (iv) infrastructure for ubiquitous
network, secure and scalable, that can access distributed
content hypermedia (patient electronic health record, patient
signal, X-ray image, description status emergency event).For
prototyping this solution, some parts will need to be emulated
in computer and some parts can be tested with real devices (as
intelligent wristlet, for example).
After we explicated this information about scenario,
we verified if developers, knowledge and ontology engineers,
managers, and another people understood this proposed
solution, risks and challenges that we need to win in
development of this research. In the next section is presented
this verification, checking of consistency by context, with
Modeling Subproject research group.
Fig. 5. CESM model applied on proposed scenario.
The Hypermedia concentrated every element that
will be interchanged inside the Cybernetic Network. In Figure
4 we showed how this process will operate. Basically, CESM
model work like follow:
· Components:agents by system. In this case the agents
are human (people) and non-human (technology);
· Environment:the context that interfere in one or in more
than one component by system. In this case is a
knowledge network whose goal is to make the
technologies to operate the proposed scenario;
· Structure:“bones” what support the system.In this case
this structure is a cybernetic network, whose goal is
communication and control of health emergency process;
· Mechanism:the process what make system work how it
work. In this case, the process is emergency health care.
This process include: (i) knowledge about status patient,
(ii) knowledge about availability health system for assist
the patient.
In next section we explain research context and how
another subprojects interacting to set a knowledge network.
4. KNOW LEDGE NETW ORK CONTEXT
This is hypothetical situation that will permit the labs
(knowledge network) develop some technology what will
make this situation (or similar) being possible (illustrated in
Figure 3). The knowledge network was distributed as
illustrated the Figure 6.
Fig.6. Knowledge Network that represent SCTIC project.
This knowledge network will provide technology
structure necessary for a hypothetical scenario like this
(illustrated in Figure 3) happen. The main goal from this
network is to make Santa Catarina State have knowledge
enough to create latest technology. An important part of this
65
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
5. CONSISTENCE VERIFICATION OF CONTEXT –
OUTCOMES
Model Systemic and Model Context were presented for a
group of research by Institute Stela. Some of they have no
familiarity with this research, but they have familiarity with
ontology and knowledge engineering techniques.
Based on State of the art [5,6,7,8,9,10,11,12,13], we
proposed the follow questionnaire, in Table 1, in order to
make a verification about consistence of the context.
Fig.7. Outcomes from context consistency verification.
Question
1
2
3
4
5
6
7
8
9
10
Description
Based on models described, it was clear
which system knowledge will be
developed.
It was clear what and how process of
knowledge generation in scenario is.
It was clear what and how acquisition of
knowledge is.
It was clear what we define as problem
situation
All external entities that system needs to
interact according to their responsibilities
were identified.
There is an understanding of the nature
of connection (type of relationship) with
each external entity.
The diagram that represents context,
illustrates connections of system with its
environment.
There are definitions of concepts
sufficient to support the diagram.
W as explored a number of realistic
scenarios for external interactions
between the system and external actors,
according to the project context.
It was understandable the key knowledge
for the knowledge system.
Consistence
of context
Value in %
Thus, these results demonstrate the first part of
Methodological Framework obtained consistent outcomes,
indicating that there was considerable understanding of
principal items of complex context from knowledge system
and network.
10
10
10
6. CONCLUSION
10
This research started some years ago, in order to promote
innovation and latest technology for Santa Catarina State,
Brazil. Around twelve labs acting through six subprojects
made research and advanced for Santa Catarina Technology.
In order to promoted communication and knowledge
fostering for innovation, FINEP and FAPESC financiered this
project whose principal characteristic is high complexity. This
complexity happens because two factors: (i) inter organization
development of (ii) latest technology.
In this context, Subproject Modeling going
developed and testing, for years this methodology, described
in this article. W ith a support by Institute Stela and
researchers from Federal University of Santa Catarina and
University of Santa Catarina State, we connected several
approaches (by ontology and knowledge engineering, general
system theory, artificial intelligence) for to set a specifically
approach, according with our needed, how communication
between mobile devices & human & smart web services.
However, we considered a context concept in order
to set and organized a cyber space that contains human and
non-human agents, who exchanging data, information and
“pieces of knowledge”.
Thus we explained it in a
methodological framework, whose aim is modeling several
aspects (technical, political and cultural) in a contextual
scenario, from a systemic approach for high complexity
problem. This methodological framework also expects
became possible work as a knowledge network in order to
create technologies and approaches for quality of life.
In this research, specifically, we tested first phase
(there are four phases) from Framework. This part is
especially important for to set consensual knowledge base for
knowledge network. W e used a health scenario for to test this
part of framework. The outcomes reveled a consistence of
83,98 %. It represents that human agents of knowledge
network could understood the context of application, created
from our methodology (framework).
Next step is formalization this knowledge produced
in first phase by framework, in computation ontology. This
ontology will create communication between human and nonhuman agents, in a context by knowledge network for quality
of life.
Thus, next work is (i) conclude second phase from
framework – Knowledge Representation – that include
engineering ontology; (ii) conclude third phase from
framework – Prototyping – that include prototyping of
application based in approaches from artificial intelligence
and techniques from ubiquitous computation (contextawareness); and (iii) conclude phase four from framework –
Integration – that include modification solicited from
researchers by knowledge network. The last phase is
important for evolve knowledge model, and also evolve
2
5
18
5
7
23
Table. 1. Questionnaire and corresponding consistence of context
value.
This consistence to refer in to check how
understandable the risks and challenges of research are.
Furthermore, it also intend to establishes a consensual
understanding about systemic and contextual models. The
questions had five (5) options for respond, as is described in
Table 2.
Option
1
2
3
4
5
Description
Assertion is unfounded.
I agree somewhat with assertion.
I agree with affirmation reasonably.
I agree with assertion in almost all
aspects described.
I fully agree with assertion.
Agreement
percentage
0-20%
20-40%
40-60%
60-80%
80-100%
Table. 2. Value of answer option.
W e expected an agreement percentage around 7585% from first part of Methodological Framework. W e
obtained a 83,98% as illustrated Figure 7, in total
outcomes.According to the graph, how closer are the lines
(green and blue), more consistent is the context, according
perception of interviewees.
66
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
framework and this research. In summary, we conclude that
desired results of this first phase of our research have been
achieved.
[14]M adkour, M .;M aach, A.;Elghanami
, D. Context-aware
middleware for services retrieval and adapt
ati
on.
International Review on Computers and Software, v. 7, n.
1, p. 166-176, 2012.
[15]Bernardes, J. G.; Gasparin, F. M.; Cunha Malafaia, G..
The Value Chain of a Philanthropic Hospital: A Case Study,
XXX MEETING OF NATIONAL PRODUCTION
ENGINEERING. Maturity and challenges of Production
Engineering: competitiveness of enterprises, working
conditions, environment, São Carlos, SP, Brazil, 12 a15 de
outubro
de
2010.
Avaiable
in
<http://
www.abepro.org.br/
biblioteca/enegep2010_TN_STO_
119_779_14867.pdf>. Acess in 08/
05/2013 (in Portuguese).
7. ACKNOW LEDGEMENTS
Our acknowledgements to researchers who contributed with
this research: Denilson Sell, Fabiano Beppler, Flávio Ceci,
Felipe Duarte Silveira, Fernando Borges Montenegro, Heron
Jader Trierveiler, João Gabriel Lucchese Zanatta, JoséLeomar
Todesco, Marcio Napoli, Rafael Bianco, Rudger Nowasky do
Nascimento, Vinícius Medina Kern.
8. REFERENCES
[1] M orse, D. R.;Armstrong, S.;Dey, A. K. (2000). The
What, Who, Where, When and How of ContextAwareness.
In:
<http:
//wwwstatic.cc.gatech.edu/fce/contexttoolkit/
pubs/CHI2000workshop.pdf.> Accessdate:10out.2012.
[2]Bunge, M .. M echani
sm and expl
anation. Philosophy of
the Social Sciences, v. 27, n. 4, p. 410-465, dez. 1997.
[3] Bunge, M .. How Does It W ork? The search for
explanatory mechanisms. Philosophy of the Social Sciences,
v. 34, n. 2, p. 182-210, j
un. 2004.
[4] Bunge, M .. Systemism:t
he alternative to individualism
and holism. Jornal of Socio-Economics, v. 29, n. 6, p. 147157, nov. 2006.
[5]Schneider, V. Method for modeling strategic context for
knowledge-based systems. Dissertation ofM aster’s Degree
in Engineeri
ng and Knowledge M anagement. Federal
UniversityofSantaCatarina, 2013 (inPortuguese).
[6] Schreiber, G. et al
. Knowledge Engineering and
Management:
the
CommonKADS
Methodology.
Cambridge:M IT Press, 2002.
[7] Cairó, O.;Guardati, S.. The KAM ET II met
hodol
ogy:
Knowledge acquisition, knowledge modeling and knowl
edge
generation. DepartmentofComputerScience, ITAM , M exico
DF, M exico. Expert Systems with Applications 39 (2012)
8108–8114.
[8] Levashova, T. et al. Product design network selfcontextualization:enterprise knowledge-based approach and
agent-based
technol
ogical
framework.
In:
INTERNATIONAL CONFERENCE ON INDUSTRIAL
APPLICATIONS OF HOLONIC AND MULTI-AGENT
SYSTEMS, 4., 2009,Li
nz.Proceedings… Berlin:Springer,
2008. p. 61-71.
[9]Brézillon, P. Contextin artificialintelligence:I. A survey
ofthe literature. Computers and Artificial Intelligence, v.
18, n. 4, p. 321-340, 1999a. ISSN:02320274.
[10] Brézill
on, P. Contextin artificialintel
ligence:II. Key
elementsofcontexts. Computers and Artificial Intelligence,
v. 18, n. 5, p. 425-446, 1999b. ISSN:02320274.
[11]Brézillon, P. Contextin problem solving:asurvey. The
Knowledge Engineering Review, v. 14, n. 1, p. 1-34, maio
1999c.
[12]Zhdanova, A. V. etal
. Contextacqui
sition, represent
ati
on
and employment in mobile service platforms. In:
WORKSHOP ON CAPTURING CONTEXT AND
CONTEXT AWARE SYSTEMS AND PLATFORMS,
2006, M ykonos.Proceedi
ngs… [S.
l.
]:
[s.
n.
],2006.
[13]Bazire, M ., Brézillon, P. (2005). Understanding Cont
ext
Before Using It. In: INTERNATIONAL AND
INTERDISCIPLINARY ACADEMIC CONFERENCE, 5.,
2013,Buenos Aires.Proceedi
ngs… Paris:Spri
nger-Verlag,
2013. p. 29-40.
67
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
The Visual Presentation Model for Improving High School
Students’ Learning Outcomes
David W.S. TAI, Yang-Chih HU
Dept. of Computer Science and Information Management, Hungkuang University
Taichung, 43302, Taiwan
Ray WANG
Dept. of Department of Hospitality Management, Hungkuang University
Taichung, 43302, Taiwan
Ren-Cheng ZHANG and Jia-Ling CHEN
Dept. of Industrial Education and Technology, National Changhua University of Education
Changhua, 500, Taiwan
ABSTRACT
1. INTRODUCTION
Engineering drawing is not only the essential skill of engineering
staff and the blueprint of manufacturing but also recognized as the
non-verbal intelligence. Most especially, it communicates all
needed information from the engineers who designed a part to the
workers who will make it. The scope of vocational education is to
cultivate students the related skills accurately and systematically to
make them employable, while also developing abilities and habits
of lifelong learning. Although e-learning has become the best way
to accomplish lifelong learning, and e-learning has been widely
used in this society according to the rapidly growth of technology,
researches of vocational mechanical high school settings have
been mostly focused on systems of evaluation while learning
outcomes, learning attitude, learning difficulties, problem solving
abilities, and material development have been widely overlooked.
Moreover, students’ prior knowledge have not been well
considered wither, not to mention about integrating e-learning and
visual presentation to construct the visual presentation models.
Therefore, the integration of the above theories are collectively
constructed and studied by experimental design in order to
construct a visual presentation learning model, furthermore, to
improve vocational mechanical high school students’ learning
outcomes.
Engineering drawing is the most commonly applied graphic
language, and as time advances, different concepts, knowledge,
symbols or culture can be generated. Because of the coming of the
information era, engineering drawing ability required by industries
has
gradually been
shaped
to
computerized
and
technology-oriented. Such change on industrial drawing ability, a
basic machine language, due to industrial transformation can
substantially affect students’ employment opportunity
Engineering drawing is a basic technological course not only
training students’ various skills for making and reading
engineering drawings but also cultivating students’ 3D creativity
and imagination. Engineering drawing is required by many
industries, such as machinery, industrial design, electronic
engineering, information technology, automatic control,
automobiles, and molding. Engineering drawing is used as
medium by design engineers and manufacturing and production
personnel for communication and exchanging ideas. It also makes
designer concepts, designs and plans more explicit through the use
of graphics. Engineering drawing is based on the principle of
projection using computer software according to national
standards. Engineering drawing enables user to use engineering
language to design, give instruction on construction, exchange
technologies and more. One can say that engineering technicians
used the drawing language to express their design ideas [1]. As a
result, when cultivating new engineering technical personnel, it is
important to ensure the quality of drawing courses in order to
achieve better drawing quality [1]. Since 1980, the introducing of
computers has added significant changes in the engineering
domain, and the increasing number of software for facilitating
drawing, manufacturing, simulation and analysis as well as the fast
software renewal has elevated productivity of the manufacturing
industry [2]. Nevertheless, such fast evolvement in technology is
accompanied by a greater demand for technical personnel.
Unfortunately, the teaching model of vocational education for
conventional course subjects has failed to satisfy such social
demand on technical personnel. As a result, how to enhance
practice-oriented teaching activities, elevate practice-based
teaching system, implement practice-oriented teaching methods
and self-learning procedure are critical for reforming vocational
high school education [3].
Through literature review, expert panel discussion and
experimental design, we developed learning materials based on
e-learning theory and visual presentation theory for vocational
high school mechanical students. Then, we conducted the learning
materials, the scripts of the related scales (including prior
knowledge learning, learning outcomes, learning attitude, learning
problems and problem solving ability scales), and the e-learning
material developing strategy and process. Finally, the content of
the e-learning materials has been modified and confirmed by
experimental design. The quasi-experimental teaching was
conducted within 8-week (3 hours per week) period. After the
quasi-experimental teaching, data were analyzed (e.g., using
MANCOVA to test the learning outcome differences and to
analyze the visual presentation learning model). The findings
could help high school students to improve their learning
outcomes.
Keywords: Engineering Drawing, Prior Knowledge, Visual
Presentation Learning Model, Learning Outcomes, Learning
Attitude, Learning Problems, Problem Solving
68
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Reforming engineering drawing courses is a global activity, and
the teaching of engineering drawing techniques has greatly
evolved in recent years [4]. In a multimedia learning environment,
information can be presented in different formats, such as texts,
figures or animation, and be perceived by different senses [5].
With continuous innovation in animation technology, animation
has now become an important element of e-Learning [6]. For
engineering drawing courses, however, the effect of dynamic
visual presentation on learning outcomes remains unclear. The
objective of this study, therefore, is to explore the effect of
different types of visual presentation on learning outcomes of
engineering drawing. The investigators also examine influences
from various types of visual presentation learning on the learning
attitudes for engineering drawing.
sense of anxiety [18]. Although academic difficulties can be
resolved by learning activities, it is still important for the student to
be diagnosed and guided in order for them to progress more
positively and actively [19]. Aside from suggesting diagnosis and
guidance, researchers have indicated that if the learning environment
remains the same, students’ learning problems cannot be resolved
and failure would reoccur [20].
Engineering drawing studies have shown the most commonly
encountered learning difficulty is related to transforming a 2D
perspective to a 3D image [21]. To cultivate this 3D spatial
capability effectively in engineering drawing, new teaching methods
are required for intervention [22]. Studies have pointed out that
using multimedia in the drawing course can help students extend
their comprehension, reasoning, problem-solving skills, and ability
of solving more complicated 3D objects [23].
2. LITERATURE REVIEW
Engineering Drawing
Engineering drawing is a fundamental course for nearly all
engineering technologies. Although conventional teaching methods
enable students to acquire knowledge, these methods are not effective
in teaching students’ higher-level practical skills because of a lack of
interaction with practice [7]. In mechanical engineering, due to a
weaker practical capability and imagination, many students experience
difficulties in learning mechanical drawing or geometric applications
[8]. Nonetheless, because the basic thinking method of learning
engineering drawing is a complete different type of image thinking
compared to other engineering subjects, engineering drawing plays an
indispensable role in cultivating creative thinking in future engineers
[9]. Engineering drawing can train students’ innovation awareness and
ability as well as cultivate their independent thinking capability. All of
these are important for helping students achieve the goal of life-long
learning [10].
Problem Solving Process
Having students solving problems manually and using sketching can
help them learn about structure of orthographic, which is important
for engineering major students [24]. Other studies have shown that
the conventional sketching method is beneficial for learning
problem-solving graphically or presenting a draft with possible
information limitation [25]. Nevertheless, in Taiwan, because of a
reduced lecture time for mechanical drawing and for the
convenience of teachers and students, CAD is the preferred tool
instead of sketching manually. As a result, the important function of
manual sketching for problem-solving in engineering drawing is
often overlooked [26].
Visual Presentation
In a multimedia-based learning environment, information is received
via numerous channels, such as vision and hearing, and presented in
many forms, such as graphics, on-screen text description, and
animation. Learners in turn search for relevant information from
graphic display and link the information to the visual or audio
stimulation they have perceived [27]. This type of perception based
on visual information is referred to as visual presentation [28].
Students still find it hard to visualize the 3D object given the 2D
representations of the same object [21]. To effectively cultivate 3D
spatial ability for engineering drawing, it is necessary to diagnose
using new teaching approaches [22]. The use of multimedia in
drawing courses is helpful for students to expand their
understanding, reasoning, problem-solving skills, and the ability for
more complicated 3D applications [23]. From the viewpoint of
teaching, visual presentation is beneficial for learning because it
offers an information space and allows learners to reason and to
perceive through a simple and direct method [28].
Engineering drawing is a very practical course, and practice
accounts for a relative large proportion. In order to train students’
spatial imagination, surveying and measuring practice cannot be
over-standardized, but that can be problematic [7]. For example,
conventional teaching of engineering drawing is focused on
orthographic projection, and the introducing of computer-aided
drawing does not alter this situation. With the use of software, the
speed and accuracy of drawing can be significantly improved [9].
Nonetheless, there is a limited amount of time for lecture, which is
hard for instructors to clearly explain the association between 3D
and 2D images [11]。
Learning Attitudes
Many studies on vocational high school student have pointed out
that different learning attitudes can certainly lead to different
learning outcomes, and good learning habits are associated with
better learning outcomes [12]. In the mechanic drawing course, the
learning interest of students determines their learning attitudes and
enthusiasm [13]. It has been shown that in mechanic drawing
courses, students with good learning attitudes and specific goals
usually possess better mechanic drawing skills [14]. No matter
how advance or potent a technique is, the effectiveness of a
technique is depending on whether the user has an active attitude.
If e-Learning can promote such active attitude, students will be
more willing to practice what they have learned, and that can
improve their learning [15].
Visual presentation can be classified into two types: static and
dynamic. Comparing to verbal only presentation, these two types of
presentation are better at helping learners to comprehend the
information [29]. Animation has been shown to be beneficial in
aiding the delivery of contents of science education, and therefore,
there is an increasing trend of using animation-based presentation in
a multimedia teaching environment [30]. Dynamic presentation has
been much more applied on various types of education resources,
while animation seems to be very suitable for helping students learn
phenomenal changes because it can provide explicit descriptions for
the dynamics of a target condition instead of asking students to
reconstruct the dynamics of static graphs mentally [31]. Dynamic
presentations are usually expressed in multiple forms and can help
students generate comprehensive understanding via various ways
[32]. For the effect of dynamic visual presentations, disputes exist
between the static and dynamic parts. As a result, many researchers
suggest to use simple animation and to eliminate unrelated messages
from the visual presentations in order for the important message to
stand out [5]. In this case, choosing a format of presentation based
Learning Difficulty Diagnosis
Learning difficulty is a serious problem. It can make students feel
exhausted academically and emotionally and eventually cause
depression [16] or deviate behavior [17]. What is even worse is that
this issue is not well recognized. Because students when entering the
school do not possess equal capacity in terms of learning, skills or
knowledge, some of them may encounter learning difficulties such
as poor time management, bad adaptation to learning materials, or a
69
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
on the type of students may be beneficial. Moreover, dynamic and
static presentations may have their own strength and weakness for
learning. If dynamic and static presentations can be integrated, then
a maximum effect may be achieved [5]. In fact, static and dynamic
presentations are complementary to each other. While dynamic
presentation resembling the actual situation much closer, static
presentation supports in-depth understanding of basic principles and
procedure [5].
the teaching units, the interface and messages of dynamic visual
presentation e-Learning materials. The investigators also worked on
modifying and verifying the appropriateness of these teaching
materials. The major objective of the above-mentioned scales/tests
was to collect data and information required by the study, while the
dynamic and static visual presentation e-Learning materials for
engineering drawing were given to the learners to use.
Research Experimentation
Preparation: After determining the research theme, the
investigators started collecting domestic and foreign studies of
relevant topics, and these studies were organized to become the base
for the theoretic ground, research design, and research framework of
the study. The research tools are the Prior Knowledge Test,
Learning Attitude Scale, Learning Difficulty Diagnostic Scale,
Problem-solving Ability Scale, and Learning Outcome Scale and
dynamic/static visual presentation e-Learning materials for
engineering drawing. Samples were selected for the pilot test, and
the results from the pilot test were analyzed for the reliability and
validity of the scale/test. The scales/tests were further modified
accordingly to ensure a good internal and external validity of the
scales/tests.
3. METHODS
Research Design
The objective of the study is to explore effects of e-Learning and
visual presentation these two major learning theories on mechanic
science major vocational high school students' learning outcomes of
engineering drawing course. To achieve the above-mentioned
objective, the investigators first conducted a literature review on
domestic as well as foreign studies. Next, the investigators selected
mechanical engineering major students from a national vocational
high school who are currently taking the engineering drawing course.
Because subjects of the study cannot be randomly sampled
completely, the investigators adopted a nonequivalent control group
design of quasi experimental design to carry out the empirical
teaching experiment. During the teaching process, a pre-test was
given to all subjects to obtain their prior knowledge and attitude
related to engineering drawing prior to the experiment.
Pre-Test: Before conducting the experimental teaching, both
the control and the experimental groups were given a prior
knowledge test, a learning attitude pre-test, learning difficulty
diagnostic pre-test and problem-solving ability pre-test to evaluate
students’ prior knowledge, learning attitudes, learning difficulties,
and problem-solving ability related to engineering drawing before
the experiment.
Subjects
The research subjects are the 10th grade mechanic group major
students from two classes of a national vocational high school
(N=90). Because engineering drawing is a required course for
mechanic group major vocational high school students, this
population’s learning outcomes for this course should be highly
representing. Because the school divided its students into several
classes, the subjects were sampled using purposive sampling. The
subjects of this study are vocational high school students who are
taking the engineering drawing course for vocational high school
students. In the experiment, one class of students was randomly
selected to be the control group, while another class the
experimental group. After assigning the group, the subjects were
given a prior knowledge test, a learning attitude pre-test, a
learning-difficulty diagnostic pre-test, and a problem-solving ability
pre-test. After eight weeks (three hours per week) of treatment, the
control and the experimental group students were given a post-test.
Tests in the post-test were identical to those in the pre-test except the
learning outcome scale (equivalent alternate-form), The obtained
results were used, together with the e-Learning theory and the visual
presentation theory, to discuss the effect of engineering drawing
learning materials for vocational high school students.
Experimental Teaching: The investigators randomly selected
a class to be the control group and another class as the
experimental group. For the control group, the static visual
presentation e-Learning material for engineering drawing was
used, while for the experimental group, the dynamic visual
presentation e-Learning material for engineering drawing was
used. Except the use of different presentation types of teaching
materials, the course content and the instructor were the same for
both groups.
Post-Test: After the experimental teaching, a post-test was
given to the subjects using the Learning Attitude Scale, Learning
Difficulty Diagnostic Scale, Problem-solving Ability Scale, and
Learning Outcome Scale in order to assess differences in learning
outcomes and learning attitudes among students after the
experimental teaching.
Data Analysis
The obtained data were first computer coded, and then those
subjects without completing the test, giving consistent and apparent
missing answers, or refusing to answer were eliminated. The rest
was statistically analyzed using software SPSS 18.0. To consider
type 1 and type 2 errors, α level was set to 0.05 to be significant. In
the study, the investigators examined the data using descriptive
statistics, independent t-test, and dependent t-test, analysis of
covariance and hierarchical regression analysis.
Learning Materials and Instruments
The research tools used in this study include the Prior Knowledge
Test, Learning Attitude Scale, Learning Difficulty Diagnostic Scale,
Problem-solving Ability Test, Learning Outcome Scale, and
dynamic and static visual presentation e-Learning material for
engineering drawing. Each of the above-mentioned scale/test was
first tested in a pilot test, and results from the pilot tests were
analyzed by items analysis, factor analysis, and expert panel to
explore the reliability, conceptual validity and content validity for
understanding the appropriateness, feasibility, content validity, and
reliability. In addition, e-Learning materials used in the experiment
for mechanic group major vocational high school students were
developed according to the ADDIE cycle (ADDIE stands for
analysis, design, development, implementation, and evaluation these
five stages). According to results from the interview regarding basic
knowledge and skills for engineering drawing of vocational high
school mechanic group major students, the investigators designed
4. RESEARCH FINDINGS
Results obtained from the experiment were applied to statistical
analysis and hypothesis testing.
Descriptive Statistics
After removing subjects who did not complete the whole
experiment procedure, the number of valid subjects of the control
group was 43 (47.8%), while the number of valid subjects of the
experimental group was 47 (52.2%), making a total of 90 valid
70
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
subjects. In the control group, there were 25 males (58.1%) and 18
females (41%), while all subjects in the experimental group were
males (N=47, 100%).
see if they are significantly different.
In this section, the investigators used MANCOVA to test whether
there are significant differences between pre-experiment factors,
including students’ prior learning attitudes and learning outcomes,
and post-experiment factors, including learning attitudes and
learning outcomes (as shown in Figure 1). The hypothesis testing
procedure of MANCOVA is described in sequence.
Paired-Samples T-Test
To understand the treatment effect (pre-treatment vs. post-treatment)
in the control and the experimental groups, the investigators used the
dependent t-test to test differences in learning outcomes, learning
attitudes, problem-solving ability and learning difficulties between
before and after the experiment in each group (control and
experimental groups). The experimental group and the control group
only showed significant better post-test score than pre-test score in
learning outcomes (t=8.365, p=.000<.05), as shown in Table 1. In
other words, students’ learning outcomes have improved
significantly after the experimental teaching.
Covariance
1. Pre-learning outcomes
2. Pre-learning attitudes
Figure 1: The research model
Table 1: The result of paired-samples t-test analysis
Scale
Learning
outcomes
Learning
difficulty
Problem solving
ability
Learning
attitude
Treatment
pre-test
post-test
pre-test
post-test
pre-test
post-test
pre-test
post-test
n
90
90
90
90
90
90
90
90
Mean
11.269
17.340
3.044
2.955
3.007
2.988
3.271
3.289
SD
3.747
5.725
.662
.557
.123
.115
.485
.371
t
p
8.365***
.000
-1.049
.297
-1.087
.280
.325
.746
Table 3: The result of MANCOVA analysis
Source
df
Constant
1
Between
1
1
Covariance
*** p<.001
1
Independent-Samples T-Test
Within
Pre-test
Post-test
Scale
Learning
attitudes
Problem-solving
ability
Learning
difficulty
Learning
outcomes
Learning
attitudes
Problem-solving
ability
Learning
difficulty
Learning
outcomes
Group
Mean
SD
control
experimental
control
experimental
control
experimental
control
experimental
control
experimental
control
experimental
control
experimental
control
experimental
3.168
3.365
3.002
3.013
2.961
3.120
10.993
11.520
3.259
3.316
2.980
2.995
2.897
3.008
20.207
14.718
.488
.468
.115
.132
.671
.652
4.060
3.461
.328
.409
.155
.060
.696
.389
4.846
5.221
86
SSCP matrix
Post
Post
learning
learning
attitudes
outcomes
.773
-1.187
-1.187
1.823
.007
.077
.077
.903
.006
-1.945
-1.945
632.536
11.450
-39.509
-39.509
2237.857
F
Wilk’s Λ
.772
(p=.000)
.936
(p=.059)
.999
(p=.946)
Post
learning
attitudes
.045
(p=.833)
5.808
(p=.018)
.050
(p=.824)
Post
learning
outcomes
24.308***
(p=.000)
.070
(p=.792)
.035
(p=.853)
*** p<.001
Table 2: The result of independent-samples t-test analysis
Test
Dependent Variables
1. Post-learning outcomes
2. Post-learning attitudes
IndependentVariables
1. Control group
2. Experimental group
t
Wilk's Λ of multivariate for testing the parallel of regression lines
of groups is 0.955 (p=.436 > .05). This finding indicates that the
two groups have same regression line slope, and the control and
the experimental groups are equally affected by the covariance.
p
-1.957
.053
-.410
.683
-1.140
.257
-.664
.508
-.723
.471
-.626
.533
-.939
.350
***
.000
5.155
When testing whether the common slope is equal to zero, the
Wilk's Λ values of whether the common slope of pre-test learning
attitudes and post-test learning attitudes are zero are 0.936 (p=.059)
and 0.999 (p=.946), respectively, and therefore, none of them are
statistically significant. In other words, the common slope is
significantly equals to zero. That is, the association between the
control variable and the dependent variable is weak (See Table 3),
and the effect of covariance on dependent variables in the
statistical analysis can be neglected (low covariate effect on
dependent variables). This indicates that there is no need to
exclude the covariance when comparing the group means of
dependent variables. If one would prefer to discuss differences of
the group variable in multiple dependent variables, MANCOVA
could still be used to test whether the group main effects are
significantly different [33].
*** p<.001; Numbers of samples in control group is 43, Numbers of samples in experimental group is 47.
Independent sample t-test results are summarized in Table 2, one
can find statistical results for various scales/tests of the control
group and the experimental group before and after the treatment. For
the pre-test part, there are no any significant difference between the
control group and the experimental group.
For the post-test, the mean of the control group (M=20.207) is
significant higher than that of the experimental group (M=14.718) in
the learning outcome(t=5.155,p=.000). In other words, the control
group has better learning outcomes than the experimental group.
One can say therefore that compare to students using dynamic visual
presentation learning material for engineering drawing, students
using the static version can have better learning outcomes.
The Wilk's Λ value for whether the group main effects are equal is
0.772 (p=.000<.05), indicating it is statistically significant. That is,
the means of each independent variable would be significantly
different after adjusting at least one dependent variable. It can be
found from the F value (24.308, p=.000<.05) that the main source
of difference comes from the post-test learning outcomes. That is,
the means of the control and the experimental groups are
significantly different after adjusting the dependent variable.
MANCOVA Analysis
The multivariate analysis of covariance (MANCOVA) was used to
eliminate influences from covariance in order to examine whether
the treatment effect on dependent variables is significant [33]. The
hypothesis testing in MANCOVA has three steps [34]. The first one
is testing the parallel lines assumption. It is about testing whether the
within-group regression lines are parallel with each other. The
second step is testing if the common slope is equal to zero. The goal
is to test the degree of association between the covariance and the
dependent variables. The third step is testing if the group main
effects are equal, which is the conventional covariance analysis.
That is, after eliminating the covariance, group means are tested to
Hierarchical Multiple Regression Analysis
The learning model of the study for the learning outcomes is
shown in Figure 2. The result of the 4-step hierarchical multiple
regressions is shown in Table 4. In this study, gender is entered at
Model 1, visual presentation type (VP) is added at Model 2,
pre-test of learning attitude (PLA) and prior knowledge (PK) are
added at Model 3, and the interaction between the pre-test of
learning attitude and prior knowledge scores is added at Model 4.
71
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Prior Knowledge
(X)
Static Visual Presentation e-Learning is More Effective than the
Dynamic One on Students’ Learning Outcomes: The study shows
that both static and dynamic visual presentation e-Learning
materials can significantly improve students’ learning outcomes for
engineering drawing. Nonetheless, the use of different visual
presentation e-Learning material can lead to significant different
learning outcomes in students. Specifically, the use of static visual
presentation e-Learning material can lead to significant better than
in those using the dynamic one.
Learning Outcomes
(Y)
b2
bXZ
b1
a1
Visual Presentation
Type (Z)
Figure 2: The learning model for the learning outcomes
Although Chao and Fang demonstrated that animation not only
facilitates teaching but also acts as a supplementary material for
after class learning [35], Höffler and Leutner showed that the effect
of animation for learning is not better than the effect of static figures
[36]. That is, there is no guarantee that the use of simulating
animation for information on changes can help students understand
the critical information [37-38]. In addition, dynamic presentation
may lead to passive information processing; preventing students
from actively working on more in-depth comprehension and
cognitive process [39].
Table 4: The result of hierarchical multiple regression analysis
Variable
Female
Static VP
PLA
PK
PLA*PK
Model 1
B
SE B
4.921***
1.424
Constant 16.357 .637
F
11.946***
R2
.120
△F
11.946***
△R2
.120
β
.346
Model 2
B
SE B
1.841
4.719***
1.556
1.246
14.718 .734
14.047***
.244
14.337***
.125
β
.129
.414
B
1.859
4.721*
-.031
.160
14.713
Model 3
SE B
β
1.603
1.266
.563
.546
.131
.414
-.005
.028
.752
6.893***
.245
.047
.001
B
2.300
4.542*
-.033
-.010
-.759
14.646
Model 4
SE B
1.634
1.269
.561
.560
.596
β
.162
.398
-.006
-.002
-.126
.751
5.879***
.259
1.620
.014
*** p<.001; * p<.05
Furthermore, the dynamic display of dynamic visual presentation
changes constantly, but there is only one message and that has to be
remembered in a limited period of time. As a consequence, before
students verifying the message, the message may be gone already.
The message displayed in such a short period of time may suppress
the cognitive function of students. Even though dynamic visual
presentation can impress learners, it can also cause learners to
receive message passively, suppressing their effort during the
cognitive function for deeper understanding [39-40]. There are other
studies that have pointed out that when students are watching
animation with embedded questions, they would also experience
more mental disturbance and often pay attention to trivial details
[41]. Therefore, dynamic visual presentation learning may interfere
with learning by requiring the learner to carry out some processing
tasks. Therefore, the study showed that static visual presentation
learning can lead to better learning outcomes than dynamic visual
presentation learning, and this difference may be related to students’
message processing capacity and emotional factors.
According to the hierarchical multiple regression analysis, the
regression revealed that female contributed significantly to the
regression model 1 (F=11.946, p=.001), and accounted for 12% of
the variation in learning outcomes. Introducing the visual
presentation type in model 2: static variable explained an
additional 12.4% of variation in learning outcomes and this change
in R² was significant (F= 14.337, p < .001). However, adding the
pre-test of learning attitude and prior knowledge to the regression
model 3 explained only an additional 0.1% of the variation in
learning outcomes and this change in R² was not significant. In
Model 4, adding the interaction between the pre-test of learning
attitude and prior knowledge scores to the regression model
explained an additional 1.4% of the variation in learning outcomes
and this change in R² was not significant, either. When all
independent variables were included in stage 4 of the regression
model, only static visual presentation was a significant predictor of
learning outcomes.
5. CONCLUSIONS AND DISCUSSION
In addition, the study cannot carry out a complete random sampling,
and therefore, it is the nonequivalent control group design of quasi
experimental design that is used. The male and female ratio between
the control and the experimental groups is not equal. In the control
group, there are 25 males (58.1%) and 18 females (41.9%), but in
the experimental group, there are males only. Cagiltay, Yildirim and
Aksu pointed out that gender is a critical student control factor and
moreover, gender can also affect the experiment results [42].
The objective of the study is to explore effects of e-Learning and
visual presentation these two major learning theories on mechanic
group major vocational high school students’ engineering drawing
learning. The investigators tested the effect of using different
visual presentation e-Learning materials for engineering drawing
on students’ learning outcomes and learning attitudes.
Significant Improvement from Using Different Visual
Presentation e-Learning for Engineering Drawing: The study has
found that before and after the experimental teaching, students from
the control and the experimental groups showed no significant
difference in learning attitudes, problem-solving ability, and
diagnosed learning difficulties. Moreover, there is no significant
difference in the prior knowledge between the control and the
experimental groups, indicating that the two groups of students at
starting are at a similar level. Nonetheless, after implementing
different visual presentation e-Learning materials, these students
showed significant improvement in engineering drawing. Therefore,
the use of different visual presentation e-Learning materials can
significantly improve subjects’ learning outcomes for engineering
drawing. Compared to verbal-only presentation, visual presentation
is better at helping learner comprehend information [29]. In addition,
dynamic and static presentation each has its own strength and
weakness for learning. Maximum learning effect can be obtained if
these two can be integrated [5].
6. ACKNOWLEDGMENTS
The authors would like to thank the National Science Council,
Taiwan, R.O.C. for financially supporting this research under
Contract NSC 99-2511-S-241-005-MY3.
7. REFERENCES
[01] M. X. Luo, "Engineering Graphics Implementation and
Reflection on Teaching Quality Assurance", in: Engineering
Education and Management, Springer Berlin Heidelberg,
2012, pp. 371-376.
[02] M. Jou, J. Shiau, & H. Zhang, "Application of Web
Technologies in Automation Technology Education",
International Journal of Computers & Applications, Vol. 31,
No. 4, 2009, pp. 215.
[03] S. Zheng, W. Jin, C. M. Lu, X. Rong, & X. L. Du, "Design of
Mechanical Engineering Project Courses Based on Complex
Project Carrier Engineering Education and Management",
in: Engineering Education and Management, Springer
Berlin Heidelberg, Vol. 111, 2012, pp. 407-411.
72
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[04] P. Pando Cerra, P. Alvarez Peñin, M. Perez Morales, & A.
Higuera Garrido, "Research Regarding the Implementation of
an Interactive Application for Educational Improvement of
Engineering Drawing", Computer Applications in
Engineering Education, Vol. 19, No. 1, 2011, pp. 183-192.
[05] K. Scheiter, P. Gerjets, T. Huk, B. Imhof, & Y. Kammerer, "
The Effects of Realism in Learning with Dynamic
Visualizations", Learning and Instruction, Vol. 19, No. 6,
2009, pp. 481-494.
[06] D. Lewalter, "Cognitive Strategies for Learning from Static and
Dynamic Visuals", Learning and Instruction, Vol. 13, No. 2,
2003, pp.177-189.
[07] W. J. Ding, "Intelligent Assessment System of Mechanical
Drawing Job Based on Entity Comparison", in: Advanced
Technology in Teaching-Proceedings of the 3rd
International Conference on Teaching and Computational
Science (WTCS 2009), Springer Berlin Heidelberg, Vol. 116,
2012, pp. 37-44.
[08] L. Yuan & L, Wang, "Teaching Method Reform of the Drawing
Course by Integrating CDIO Mode, in: Computer Science &
Education (ICCSE), 2011 6th International Conference on.
IEEE, 2011, pp. 1301-1302.
[09] B. Wang, "An Approach for Engineering Graphics Education
Reform in Modern Information Technology", In: Advances in
Computer Science, Environment, Ecoinformatics, and
Education, Springer Berlin Heidelberg, Vol. 217, 2011, pp.
42-46.
[10] W. H. Su & J. C. Li, "Multiple Teaching in Mechanical
Drawing Course", in:Optics Photonics and Energy
Engineering (OPEE), 2010 International Conference on.
IEEE, 2010, pp. 52-56.
[11] C. Heen, F. Kaiping, M. Chunliu, C. Siyuan, G. Zhongning, &
H. Yizhu, "Application of Augmented Reality in Engineering
Graphics Education", in: IT in Medicine and Education
(ITME), 2011 International Symposium on. IEEE, 2011, pp.
362-365.
[12] S. C. Lin & Y. M. Lin, "Inventory of Learning Attitudes of
Vocational High School Students", Journal of Statistics &
Management Systems, Vol. 14, No. 3, 2011, pp. 685-699.
[13] Y. Zeng, J. Huang, & S. Yin, "In Manner of Competition and
Textual Research to Promote Mechanical Drawing Teaching",
Mechanical Management and Development, Vol. 5, 2009.
[14] C. Y. Chao & C. S. Huang, "Traits Analysis and Influences on
High Performing students in Mechanical Education", Global J.
of Engng. Educ, Vol. 5, No. 2, 2001, pp. 163-173.
[15] S. S. Liaw, H. M. Huang, , & G. D. Chen, "Surveying
Instructor and Learner Attitudes toward e-Learning",
Computers & Education, Vol. 49, No. 4, 2007, pp.
1066-1080.
[16] N. Kiuru, E.Leskinen, J. E. Nurmi, & K. Salmela-Aro,
"Depressive Symptoms during Adolescence: Do Learning
Difficulties Matter? ", International Journal of Behavioral
Development, Vol. 35, No. 4, 2011, pp. 298-306.
[17] L. A. Serbin, C. E. Temcheff, J. M.Cooperman, D. M. Stack, J.
Ledingham, & A. E Schwartzman, "Predicting Family Poverty
and other Disadvantaged Conditions for Child Rearing from
Childhood Aggression and Social Withdrawal: A 30-year
Longitudinal Study", International Journal of Behavioral
Development, Vol. 35, No. 2, 2011, pp. 97-106.
[18] G. Paul, G. Hinman, S. Dottl, & J. Passon, "Academic
Development: a Survey of Academic Difficulties Experienced
by Medical Students and Support Services Provided",
Teaching and Learning in Medicine, Vol. 21, No. 3, 2009, pp.
254-260.
[19] S. D. Miller & T. S. Atkinson "Cognitive and Motivational
Effects of Seeking Academic Assistance", The Journal of
Educational Research, Vol. 94, No. 6, 2001, pp. 323-334.
[20] M. Sayer, M. Chaput De Saintonge, D. Evans, & D. Wood,
"Support for Students with Academic Difficulties", Medical
education, Vol. 36, No. 7, 2002, pp. 643-650.
[21] Z. Akasah, M. Alias, & U. T. H. O. Malaysia, "Bridging the
Spatial Visualisation Skills Gap through Engineering Drawing
Using the Whole-to-Parts Approach", Australasian Journal of
Engineering Education, Vol.16, No. 1, 2010, pp. 81-86.
[22] C. Potter, E.Van Der Merwe, W. Kaufman, & J. Delacour, "A
Longitudinal Evaluative Study of Student Difficulties with
Engineering Graphics", European journal of engineering
education, Vol. 31, No. 02, 2006, pp. 201-214.
[23] F. T. Lee & B. H. Yeap, " The Use of Educational Technologies
in University Teaching & Learning m-ICTE 2005",
in: Proceeding of International Conference on Multimedia
and ICT in Education, 2009, pp. 22-24.
[24] J. L. MOHLER & Craig L. MILLER, "Improving Spatial
Ability with Mentored Sketching", Engineering Design
Graphics Journal, Vol. 72, No.1, 2009, pp.19-27.
[25] A. C. Clark & B. Matthews, "Scientific and Technical
Visualization: A New Course Offering that Integrates
Mathematics, Science, and Technology", Journal of
Geometry and Graphics, Vol. 4, No. 1, 2000, pp. 89-98.
[26] S. Tsai, T. Yeh, C. Lee, & N. Wang, "Teaching Strategies for
Design Realization in Engineering Design Education", in:
International conference on Electrical Engineering (ICEE
2008), PE'CS-BUDAPEST, HUNGARY, 2008, pp. 27-31 .
[27] L. Lin & R.K. Atkinson, "Using Animations and Visual Cueing
to Support Learning of Scientific Concepts and Processes",
Computers & Education, Vol. 56, No. 3, 2011, pp. 650-658.
[28] K. Scheiter, & P. Gerjets, "Cognitive and Socio-Motivational
Aspects in Learning with Animations: there is more to it than
‘do they aid learning or not’ ", Instructional Science, Vol. 38,
No. 5, 2010, pp. 435-440.
[29] H. Yarden, & A. Yarden, "Learning Using Dynamic andStatic
Visualizations: Students’ Comprehension, Prior Knowledge
and Conceptual Status of a Biotechnological Method",
Research in Science Education, Vol. 40, No. 3, 2010, pp.
375-402.
[30] D. Bodemer, R. Ploetzner, K. Bruchmüller, & S. Häcker,
"Supporting Learning with Interactive Multimedia through
Active Integration of Representations", Instructional Science,
Vol. 33, No. 1, 2005, pp. 73-95.
[31] S. Fischer, R.K. Lowe, & S. Schwan, "Effects of Presentation
Speed of a Dynamic Visualization on the Understanding of a
Mechanical System", Applied Cognitive Psychology, Vol. 22,
Vol. 8, 2008, pp. 1126-1141.
[32] Z. H. Zhang & M. C. Linn, "Can Generating Representations
Enhance Learning with Dynamic Visualizations? ", Journal of
Research in Science Teaching, Vol. 48, No.10, 2011, pp.
1177-1198.
[33] M. L. Wu, SPSS Operation and Application - Practice &
Analysis of Variance (2nd edition), Taipei: Wu-Nan Book Inc.
Pub., 2013.
[34] C.-S. Lin, Multivariate Analysis Statistics (5th edition),
Taipei: Tung-Hua Book Inc. Pub., 2003.
[35] S.-F. Chao & R.-J. Fang, "The Application of 3D Computer
Animation Technique Construct Drawing Lesson Teaching
Web in Vocational High School", Kaohsiung Normal
University Journal, Vol. 15, 2003, pp. 55-83.
[36] T. N. Höffler, & D. Leutner, "Instructional Animation Versus
static Pictures: A Meta-Analysis", Learning and
instruction, Vol. 17, No. 6, 2007, pp. 722-738.
[37] R.K. Lowe, "Animation and Learning: Selective Processing of
Information in Dynamic Graphics", Learning and Instruction,
Vol. 13, No. 2, 2003, pp. 157-176.
[38] R.K. Lowe, " Interrogation of a Dynamic Visualization during
Learning", Learning and Instruction, Vol. 14, No. 3, 2004, pp.
257-274.
[39] M. Hegarty, S. Kriz, & C. Cate, "The Roles of Mental
Animations and External Animations in Understanding
Mechanical Systems", Cognition and Instruction, Vol. 21,
No.4, 2003, pp. 209-249.
[40] W. Schnotz, J. Böckheler, & H. Grzondziel, "Individual and
Co-Operative Learning with Interactive Animated Pictures",
European Journal of Psychology of Education, Vol. 14, No.
2, 1999, pp. 245-265.
[41] R. K. Lowe, "Extracting Information from an Animation during
Complex Visual Learning", European Journal of Psychology
of Education, Vol. 14, No. 2, 1999, pp. 225-244.
[42] N. E. Cagiltay, S. Yildirim, & M. Aksu, "Students' Preferences
on Web-Based Instruction: Linear or Non-Linear", Journal of
Educational Technology & Society, Vol. 9, No. 3, 2006, pp.
122-136.
73
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
The Impacts of Social Responsibility and Social Media on the Success of
International Ventures
Nittana TARNITTANAKORN
School of Business Administration, Bangkok University
Klong Luang, Pathum Thani, 12120 Thailand
distribution networks and brand recognition country
by country, a process that many times favored large
firms over small ones. A well-developed website
also can draw the consumers throughout the world
without the need to establish a physical presence in
each country, making it easier for small businesses
to cut their costs, allowing them to better compete
internationally against their larger rivals (Griffin and
Pustay, 2005). Thus, business in the international
context needs to pay close attention to the specific
of the cross-border operations such as sales,
services, finances and payments, and investments
with other countries. In international business
venturing, consider ethic and social responsibility as
a corporate initiatives to assess and take
responsibility for the company‟s effects on the
environment and impact on social welfare (Koseska
and Arnaudov, 2012).
ABTRACT
Social responsibility refers to a form of corporate
self-regulation. The company becomes interested in
the international environment when it engages in
operations with other countries. The purpose of this
paper is to explore a link between the role of the
social responsibility and the success of international
venture based in Thailand. This study applies a
cross-sectional survey for data collection from 280
international ventures. The findings of this study
illustrate that online social media and social
responsibility factors including fair labor practices,
and product safety significantly affect the success of
international venture in Thailand.
Keywords: Social Media, Social Responsibility,
International Business, International Venture
1. INTRODUCTION
Many leaders of the international business have
come to realize the consequences of globalization
for their companies, therefore defending a
consensus regarding the fact that companies are
liable towards the communities they serve and rely
on (Revathy, 2012). In order to be able to respond
to ethic and social responsibility challenges
encountered in international business, managers or
business owners must understand the increasing
complexity of the global business environment and
its ethic issues and to develop strategies for decision
making and for forming and implementing corporate
social responsibility policies (Holtbrugge and Dogl,
2012). Thus, the growing relevance of
environmental and social issues in international
business is motivation of the study for analyzing the
impacts of social responsibility practices on the
success of international ventures. In addition, the
use of social media in business becomes a low cost
and effective tool for company‟s communication
strategy (Woodcock, N., Green, A., and Starkey, M.,
2011). It highlights how companies communicate
their social responsibility programs through their
websites and other online social media. Companies
reach their customers through several media efforts
In recent years, the central role of business has
extended from the traditional economic actor to
being a political and social actor. Concerns about
corporate responsibilities have consequently become
an increasingly high profile issue in many countries
and globalizing industries (Tulder and Kolk, 2010).
Recent studies have also stressed that, in addition to
economic assessments, the environmental and social
impact from international operations should also be
integrated more closely in to corporate strategic
decision-making (Toppinen, 2011). The rising
awareness of social consciousness and actions
leading to commercial success has also inspired
many researchers to study the linkage between
social responsibility and financial performance of
international firms (Koseska and Arnaudov, 2012).
Today‟s small businesses are becoming more
involved in international business as the growth of
Internet communication technology such as ecommerce has opened up new opportunities for
small business ventures. Previously, to enter foreign
market, firms often needed to painstakingly build
74
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
like Facebook, LinkedIn, and Twitter. Personal
interactions and real off-line relationships can be
developed through several types of social media for
companies in developing customer relationship and
positive business image (Castillo, S.M., Illia, L., and
Rodriguez, B., 2012). However, the focus of the
present study is on international ventures in
Thailand. The social responsibility dimensions used
in the study such as environment, community
development, labor practices, and product safety has
drawn from the corporate social responsibility
research conducted by Loureiro, Sardinha and
Reijnders (2012). Furthermore, the use of social
media can deliver financial benefits to companies no
matter what sector is studied. The benefits are
centered on increasing customer insight and
engagement and are fundamental to driving business
performance (Jeong, H.J. Paek, H., Lee, M. and
Morrison, M., 2012).
business globalization include power abuse within
nations where institutions exert a reduced control,
bribe and corruption, loss of work places,
disrespecting the human rights, involvement in
political affairs and influence abuse, pollution and
negative effects upon the environment (Ciliberti,
Pontrandolfo and Scozzi, 2008).
International ventures are defined as entrepreneurs
whose business activities involving cross border
transactions of goods, services, and resources
between two or more nations (Joshi, 2009).
Transaction of economic resources include capital,
skills, people etc. for international production of
physical goods and services such as finance,
banking, insurance, and construction (Griffin and
Pustay, 2009). However, differences among national
contexts create specific types of entrepreneurial
opportunities. Entrepreneurial ventures across the
world, thus, can evaluate and analyze international
opportunities in their capacity as founders,
investors, or partners of international ventures or
established companies that are looking to grow
internationally. In addition, international ventures
must be knowledgeable about cultural, legal,
political, and social differences among countries.
They must coordinate the activities of their foreign
subsidiaries, while dealing with the taxing and
regulatory authorities of their home country and all
the other countries in which they do business
(Griffin and Pustay, 2005).
2. LITERATURE REVIEW
Businesses are an integral part of the communities
in which they operates (Qi, Feng and Jin, 2012).
Long-term success is based on continued good
relations with a wide range of individuals, group,
and institutions (Ciliberti, Pontrandolfo and Scozzi,
2008). Moreover, customers expect goods and
services to reflect socially and environmentally
responsible business behavior at competitive prices.
Shareholders are searching for enhanced financial
performance
that
integrates
social
and
environmental consideration (Revathy, 2012). In
addition, people want to work for companies that
are socially responsible and that create directions for
them to be as well. Companies also realize that a
healthy community is a great place to operate a
business, to hire people, to locate a store, a great
place for people to come and shop. The health of the
community represents a platform for economic
success (Loureiro, Sardinha, and Reijnders, 2012).
The term „corporate social responsibility‟ originates
with Bowen (1953).
It is used to describe
businesses‟ integration of social and environmental
issues into decisions, goals, and operations. Other
terms for social responsibility are corporate
responsibility, sustainability, corporate citizenship,
ethical business practices, social/environmental
responsibility, triple bottom line, and environmental
and social stewardship (Revathy, 2012). Corporate
responsibility is actualized in the last decades of the
20th century with the internationalization and
globalization.
Big companies, spreading its
business in many countries, fighting the
competition, started to introduce „innovations‟ in the
work, as follows: protection of the human
environment, employees‟ health and safety,
customers and community care etc (Ciliberti,
Pontrando and Scozzi, 2008). Social responsibility
can be defined as success in the business activities
that is gained not only by adhering the laws and
regulations, but by approach that accomplishes
However, global companies exert a strong influence
on society, with both benefits and negative effects
(Griffin and Pustay, 2009). Social contributions of
global corporations are connected to creation of new
workplaces, the improvement of life standards in the
host areas, the ease of access to modern technology
offered by business or management expertise, the
introduction of ethic practices within the
competition and the creation of relations within the
community based on social responsibility (Qi, Feng
and Jin, 2012). The disadvantages induced by
75
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
balance between economic, ecological and social
goals, on a way that is useful for the citizens,
community and society (Koseska and Arnaudov,
2012).
of previous research. Then, the pilot work was
conducted through the use of self-administrative
questionnaires in order to verify the meanings of the
concept as well as to validate whether or not
potential respondents would be able to understand
and complete the questionnaires.
It is clear that customer contact through informal
social media networking and more formal companysponsored platforms, such as discussion forums, is
an increasingly integral element in building brand
communities and financial benefits. The previous
study shows that corporate social responsibility
leads to the intention to join the business brand page
among consumers (Noble, C.H., Noble, S.M., and
Adjei, M.T., 2012). Harnessed with social
responsibility
and
customer
relationship
management, social media can create key drivers of
online brand community success that encourage
loyalty, purchases, and positive word of mouth
(Noble, C.H., Noble, S.M., Adjei, M.T., 2012).
The survey design employed in this study is a crosssectional survey in which data was collected at one
point in time from the designated sample. The
target population for the research was the founders
or the owners of international ventures in Thailand.
The sample selection was based on the criterion that
the international ventures in this study were defined
as international firms established for at least two
years because it was not possible to gather enough
data to consider the success of firms operation in a
shorter period of time (Jeffcoate et al., 2012).
4. RESULTS
Several academic studies have attempted to analyze
the relationship between corporate social
responsibility and profitability (Cochran, 2007). A
recent meta-analysis suggests the cost of having a
high level of corporate social responsibility is
minimal and that firms may actually benefit from
socially responsible actions (Wu, 2006). This
findings is similar to results of earlier studies. The
concept success is another factor that is considered
in the current study as the expected outcome of the
relationship between the social responsibility and
international business venture. Success can be
measured by hard or quantitative and by soft or
qualitative criteria such as sales growth, income,
employment trends, return on investment, and
satisfaction of customers or business owners (Kim
and Kim, 2009). While some research has used
financial performance such as key indicators, the
non-financial goals or indicators of the owners such
as relative growth rate, business stability, customer
satisfaction, returning rate of customer, and
customer acceptance are utilized in this study
because Thai entrepreneurs in general tend to keep
low profile and refrain from disclosing information
about their earnings (Tarnittanakorn, 2011).
A total of 300 survey questionnaires were
distributed to international entrepreneurs in
Thailand. 20 responses were eliminated because
they either were vague and lacked descriptive detail.
This resulted in a final sample of 280 giving an
overall response rate of 93 per cent. The response
rate was high due to the fact that the questionnaires
were collected right after the respondents completed
the form.
The demographic profiles of the
respondents were composed of slightly more men
(51%) than women (49%). The largest group of
respondents was between the age of 40 and 49 years
(54%). In terms of education, 54% of the sample
had a bachelor‟s degree. 47% of them owned an
import-export business.
Reliability and Validity Analysis
According to Table 1, the overall results of scale
reliability analysis achieving alpha coefficient
ranged from .757 to .888 for high reliability, a
minimum alpha of 0.70 suffices for the study
(Nunnally, 1978) and indicates that the summed
scales have internal consistency and are reliable.
Additionally, factor analyses assessing the six
constructs in the study including environmental
concerns, community development, labor practices,
product safety, social media, and success were
conducted. Principal component analysis with
Varimax rotation was used in all cases. Table 1
also reports the results of factor analyses and a
factor loading value of 0.50 and higher is regarded
as good and significant and the eigenvalues greater
3. METHODOLOGY
Theoretical literature from various sources was
reviewed to design the research framework. In
order to develop the questionnaire, initially, a
survey questionnaire assessing the constructs in the
current study was developed from published scales
76
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
than one is considered practically significant for the
study (Hair et al., 1998). This indicated that the sets
of measures in each construct represented the
concepts well and, therefore, confirmed that the
measures in the study achieved construct validity.
Table 1: Summary Results of Reliability and Validity of Construct
Reliability
Validity
Construct
Mean
S.D.
Alpha’s
Factor
Eigen Value
Coefficient
Loading
1. Environmental concerns
3.68
.64
.821
2.61
.759-.841
2. Community development
3.59
.69
.832
2.66
.784-.850
3. Labor practices
3.41
.64
.757
2.31
.760-.802
4. Product safety
3.44
.63
.830
2.65
.767-.853
5. Social media
3.58
.68
.879
2.94
.839-.887
6. Success
3.57
.70
.888
2.99
.857-.876
highly collinear and will pose a problem in
regression analysis (Kleinbaum, Kupper, and
Muller, 1998). As shown in Table 2, all of the VIF
values are well below 10, ranging from 1.502-2.189.
Therefore, there is really no problem of
multicollinearity.
Hypothesis Testing
Collinearity
estimates
were
tested
for
multicollinearity before conducting multiple
regression analysis. As a rule of thumb, if the
variance inflation factor (VIF) for each independent
variable exceeds 10, that variable is said to be
Table 2: The Effect of Social Responsibility on Success
b
SE
Beta
t
Sig.
Tolerance
(Constant)
.202
.177
1.138
.256
1. Environmental concerns
.053
.058
.050
.923
.357
.457
2. Community development
-.016
.056
-.015
-.288
.773
.482
3. Labor practices
.200
.054
.201
1.843
.046
.519
4. Product safety
.551
.044
.564
12.534
.000
.666
5. Social media
.262
.054
.243
4.828
.000
.532
2
2
R = 0.794, R = 0.630, p<0.05
Variable
The correlations between the variables in the study
were studied statistically by means of multiple
regression analysis as depicted in Table 2. The
results of hypothesis testing show that the social
media and social responsibility dimensions of labor
practices, and product safety were significantly
related to the success of international venture in
Thailand. However, the environmental concerns
and community development did not have an impact
on the success of international venture. Analysis of
beta weights indicates that product safety (β=.564)
is the best predictor for the success of international
venture, followed by the use of social media
(β=.243) and the labor practices (β = 0.201)
respectively.
VIF
2.189
2.076
2.126
1.502
1.880
factors of labor practices and product safety affect
the success of international venture are supported
and these factors reveal positive relationships with
the success of international venture in Thailand.
However, the social responsibility on the aspects of
environmental
concerns
and
community
development was not supported.
5. CONCLUSIONS
The study reveals that the use of social media and
social responsibility dimensions including fair
labor practices and product safety affect the
success of international venture in Thailand. This
reiterates the important role of social media and
social responsibility in the context of international
business. Nonetheless, it is possible to find
mechanisms by which social media and social
responsibility might enhance profitability by
examine the impact of social media and social
responsibility on various stakeholders. It is
The overall results of social media and social
responsibility practices affecting to the success of
international venture are statistically significant with
a p-value less than 0.05. Therefore, the hypotheses
posit that the social media and social responsibility
77
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
important to understand this does not mean that
firms which engage in social media and socially
responsible activities will be more successful
(Cochran, 2007). It is rare when few factors can
explain any specific organization is successful or
unsuccessful. Then, future comparative studies of
the social media and social responsibility affecting
the success of international venture on
management practices and policies could be
conducted to enhance the understanding of their
impacts and also to increase the applicability of the
findings.
[10]
[11]
[12]
6. REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
B. Revathy, “Corporate Social Responsibility
– An Implementation Guide for Business”,
Far East Journal of Psychology and
Business, Vol.6, No.2, 2012, pp. 15-31.
C.H. Noble, S.M. Noble, M.T. Adjei, “Let
Them Talk! Managing Primary and Extended
Online Brand Communities for Success”,
Business Horizons, Vol. 55, No.5, 2012, pp.
475-483.
C. Nunnally, Psychometric Theory, New
York: McGraw-Hill, 1978.
D. Qi, C. Feng, M. Jin, “Research on the
Social Responsibility of Corporations in
China”, Asian Social Science, Vol.8, No.15,
2012, pp. 184-188.
D.G. Kleinbaum, L.L. Kupper, K.E. Muller,
Applied Regression Analysis and Other
Multivariate Methods, Boston: PWS, 1998.
D. Holtbrugge, C. Dogl, “How International
Is Corporate Environment Responsibility?”,
Journal of International Management,
Vol.18, 2012, pp.180-195.
E. Koseska, K. Arnaudov, “Business Ethics
and Social Responsibility in Tourist
Organizations in Terms of Changing
Environment”,
Procedia-Social
and
Behavioral Sciences, Vol. 44, 2012, pp. 387397.
F. Ciliberti, P. Pontrandolfo, B. Scozzi,
“Investigating
Corporate
Social
Responsibility in Supply Chains: A SME
perspective”,
Journal
of
Cleaner
Production, Vol.16, 2008, pp.1579-1588.
H.J. Jeong, H. Paek, M. Lee, M. Morrison,
“The
Effects
of
Corporate
Social
Responsibility
(CSR)
Campaigns
on
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
78
Consumer Responses to Brands in Social
Media. American Academy of Marketing
& Customer Strategy Management, Vol.
18, No.1, 2012, pp.50-64.
H.S. Kim, Y.G. Kim, “A CRM Performance
Measurement Framework: Its Development
Process and Application”, Industrial
Marketing Management, Vol.38, 2009, pp.
477-489.
J. Jeffcoate, C. Chappell, S. Feindt, “Best
Practice in SME Adoption of E-commerce”,
Benchmarking: An International Journal,
Vol. 9, No.2, 2012, pp.122-132.
N.L.A. Toppinen, “Corporate Responsibility
and Sustainable Competitive Advantage in
Forest-based Industry: Complementary or
Conflicting Goals?”, Forest Policy and
Economics, Vol.13, 2011, pp. 113-122.
N. Tarnittanakorn, “An Analysis of the
Relationship between CRM and the Success
of Micro E-commerce Enterprises in
Thailand”, Proceedings of the IABE-2011
Barcelona-Summer Conference, Barcelona,
Spain, Vol.9, No.1, 2011, pp. 74-79.
N. Woodcock, A Green, M. Starkey, “Social
CRM as a Business Strategy”, Journal of
Database
Advertising
Conference
Proceedings, 2011, pp.135-136.
P. L. Cochran, “The Evolution of Corporate
Social Responsibility”, Business Horizons,
Vol.7, 2007, pp. 449-454.
R.M. Joshi, International Business, London:
Oxford University Press, 2009.
R.V. Tulder, A. Kolk, “International Business,
Corporate
Social
Responsibility
and
Sustainable Development”, International
Business Review, Vol. 19, 2010, pp.119-125.
R.W. Griffin, M.W. Pustay, International
Business, 4th ed., New Jersey: Pearson
Education, 2005.
S.M. Castillo, L. Illia, B. Rodriguez, “When
CSR Clicks”, Communication World,
Sep/Oct 2012, pp.32-35.
S.M.C. Loureiro, I.M.D. Sardinha, L.
Reijnders, “The Effect of Corporate Social
Responsibility on Consumer Satisfaction and
Perceived Value: The Case of the Automobile
Industry Sector in Portugal”, Journal of
Cleaner Production, Vol.37, 2012, pp.172178.
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
CULTURAL LENS: A CRITICAL
VARIABLE IN THE
MICROFOUNDATIONS OF STRATEGIC
PROBLEM FORMULATION
Heterogeneity is a cornerstone of this
Strategic Management Journal (SMJ)
publication. From their literature review, the
authors underscore that competitive
advantage results when strategic value is
created from strategic challenges, and that
typically heterogeneous, cross-functional,
interdisciplinary teams grapple with such
complex,
ill-structured
and
dynamic
problems. Theoretically, heterogeneity and
group decision making trump homogeneity
and individual problem solving. Yet,
research has yielded mixed results.
Importantly, Baer, Dirks and Nickerson [3]
conclude that heterogeneity introduces only
the potential for superior decision making
and problem solving, not necessarily the
realization of it. This conclusion provides
the impetus for these authors to first
determine the microfoundations of problem
formulation, in anticipation of providing
further insight into the heterogeneity impact,
and second to develop a model which
appropriately
captures
Problem
Formulation: Inputs, Impediments, and
Outcomes.
Marta Szabo WHITE
Department of Managerial Sciences,
Georgia State University
Atlanta, Georgia 30303, USA
ABSTRACT
Cybernetics originally centered on the
study of control, communication, and
information (See Figure 1 in the appendix),
more recently morphing into a host of other
disciplines under the informatics label,
including robotics, artificial intelligence,
bionics, nanotechnology, genetics, artificial
life, cognitive science, neuroscience, to
mention a few (See Figure 2 in the
appendix). Cybernetics is particularly
concerned with informatic disciplines and
their implications for culture and humanity.
It is from this concern that the relationship
between culture and strategic problem
formulation is examined. Inspired by a
thought-provoking presentation on Critical
Thinking by Professor Jackson Nickerson,
one of the authors of the Strategic
Management Journal (SMJ) article entitled
Microfoundations of Strategic Problem
Formulation [3], this paper builds on the
innovative model presented in their article
and argues further that culture is a critical
component of heterogeneity, thus should
be incorporated into the Problem
Formulation Inputs.
Baer, Dirks and Nickerson [3] develop a
salient model anchored by heterogeneity,
which they then separate into information
sets, objectives and cognitive structures
(See Figure 3 in the appendix). Although
heterogeneity may implicitly include cultural
differences, this paper suggests that culture
should be explicitly included as an
independent variable.
First, Baer, Dirks and Nickerson [3]
describe Heterogeneous Information Sets
as advantageous in that collectively, teams
represent several sets of information, which
are able to capitalize on several pieces of
the strategic problem, providing the
opportunity
to
deliver
a
more
comprehensive formulation of the problem.
In reality, bounded rationality (assumptions
of limited resources, e.g. memory, attention
span, time, etc.) drives communication to
the lowest common denominator, i.e. at the
Keywords: Globalization, International
Business, Culture, Strategic Management,
Problem Formulation, Stakeholder Model,
Decision-making
LITERATURE REVIEW
79
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
lowest cost, therefore suboptimal decision
making results from shared information at
the expense of unshared information. This
impediment to problem formulation is
identified as a Narrow Sampling of
information in the model created by Baer,
Dirks and Nickerson [3].
stakeholders previously excluded from the
CSI process, who are then asked to then
consider any other symptoms and causes
not included in the framing and formulation
documents constructed by the first group.
This paper, titled Cultural Lens: A Critical
Variable in the Microfoundations of
Strategic Problem Formulation is a
cross-disciplinary work, bridging the
strategic management literature with
cybernetics. Considering the theme of this
paper to be the Impact of Informatics and
Cybernetics on Societies and Cultures,
the blend of cognitive sciences with
strategy formulation and culture is depicted
in Figure 4, the culmination of the previous
three figures (Please see appendix).
Second,
Heterogeneous
Objectives
represent the different goals that various
stakeholders bring to problem formulation.
While numerous interests may be
represented, the impediment here is that
problem formulation is dominated by those
who have the most at stake; resources are
distributed according to a political process,
and solutions result that are premature.
The authors identify these as Dominance
and Jumping to Solutions Strategic
Behavior in their model.
LMR PROVENANCE
Third, Heterogeneous Cognitive Structures
promote multifaceted perspectives in
addressing problem formulation. In reality,
however, Representational Gaps emerge,
which
represent
differences
in
understanding, knowledge capital and
context lens when formulating the problem.
The heterogeneity barriers to strategic
problem formulation resulting from this
category include unidentified assumptions,
varying
definitions
and
concepts;
miscommunications resulting in conflict and
distrust.
From his forty-plus years of cross-cultural
consulting, Richard Lewis authored When
Cultures Collide [15] and The Cultural
Imperative [16], in an effort to explain
national, international and transnational
business cultures.
The 1980s had propelled an acute demand
for cross-cultural instruction, and Richard
Lewis, had been approached repeatedly by
multi-national clients for a new and
practical classification system. For years,
cross-culturalists had grappled with the
problem of understanding and codifying
national characteristics. Richard Lewis
proposed that cultures could be classified
simply
and
more
comprehensively
according to the three categories,
comprising the LMR framework [15] & [16].
The major contribution of the Baer, Dirks
and Nickerson [3] seminal work is their
inclusion of the Collaborative Structure
Inquiry (CSI), a process which attempts to
mitigate the impediments to complex, illstructured problems as identified in their
model. According to these authors, CSI
involves two phases. The framing phase
identifies all possible symptoms associated
with the initial inquiry, and the formulation
phase focuses explicitly on the causes
(alternative formulations) of one or more of
the symptoms previously identified. The
final
stage
includes
all
relevant
Poignantly, he conceived of the LMR
[Linear-active, Multi-active, and Reactive]
framework [16], which gave birth to
Cultureactive, a cross-cultural assessment
tool. The strength of this model, as is its
successor’s, InterCultural Edge [ICE], is
that it transcends previous works by
focusing on the individual, rather than the
80
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
nation-state as the unit of analysis. As such,
the microfoundation of strategic problem
formulation
is
underscored.
The
provenance of Cultureactive and ICE are
chronicled in more detail in earlier papers.
Structure category, thereby blending
cognitive sciences with strategy formulation
through culture.
REFERENCES
CULTURAL LENS
[1] Adair, W. L., Buchan, N.R. & Chen, X.P.
[Forthcoming]. Communication and Social
Interaction Style across Cultures (CSIS):
Conceptualization,
Antecedents,
and
Organizational Consequences.
While the explosion of the Internet has
fueled learning in different time zones and
ignited cross-border business transactions,
culture itself remains the final barrier. The
contribution of this paper is the proposition
that the Heterogeneous Cognitive Structure
classification proposed by Baer, Dirks and
Nickerson [3], would benefit from including
a cultural context lens at the micro level,
such as the Linear-active, Multi-active, and
Reactive (LMR) framework. This critical
input variable would serve to mitigate the
Representational Gaps discussed by these
authors, or strategic myopia, and enrich
their model in robustness through diversity.
[2] Adair, W. L., Buchan, N.R. & Chen, X.P.
[In press]. Bringing views of culture as
communication and social interaction into
management and marketing research. In
C.Nakata (Ed.) Beyond Hofstede: Culture
Frameworks for Global Marketing and
Management. New York, NY: Macmillan
Palgrave.
[3] Baer, M., Dirks, K.T. & Nickerson, J.A.
[2013]. Microfoundations of Strategic
Problem
Formulation.
Strategic
Management Journal, 34, 197-214.
CONCLUSION
Few things are as heterogeneous as
cultural differences. Commensurate with
exploring the microfoundations of strategic
problem formulation, model robustness and
richness may be elevated with the inclusion
of cultural lens as an independent variable
under the Heterogeneous Cognitive
Structure component of the Baer, Dirks and
Nickerson [3] paradigm. Capitalizing on the
LMR framework would enable the
implementation of a cultural lens while
sustaining a micro-focus and corroborating
the relationship between culture and
strategic problem formulation.
[4] Bearden, W.O., Money, B.R. & Nevins,
J.I. [2003]. Development and validation of a
measure of long term orientation, In Money,
B.R. and Rose, R.L. [Eds.] Enhancing
Knowledge Development in Marketing,
14, Chicago, IL: American Marketing
Association.
[5] Bond, M.H. [2002]. Reclaiming the
Individual From Hofstede’s Ecological
Analysis- A 20-Year Odyssey: Comment on
Oyserman et al. [2002]. Psychological
Bulletin, 128 [1], 73-77.
[6] Brouthers, K.D. [2002]. Institutional,
Cultural and Transaction Cost Influences
on Entry Mode Choice and Performance.
Journal of International Business
Studies, 33(2), 203-221.
This paper serves two purposes. First is to
celebrate the work of Baer, Dirks and
Nickerson [3] and their new paradigm of
strategic problem formulation. Second is to
build on their innovative model to include
culture as an important component of
cognition, i.e. the Heterogeneous Cognitive
[7] Fulbright, W.J. [1989]. The Price of
Empire. Pantheon Books.
81
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Individualism and Collectivism: Evaluation
of Theoretical Assumptions and MetaAnalyses. Psychological Bulletin, 128(1),
3-72.
[8] Gómez-Mejía, L.R., Balkin, D.B. & Cardy,
R.L. [2004]. Managing Human Resources.
[4th Ed.]. Upper Saddle River, N.J.: Pearson
Prentice Hall.
[19] Ramsey, R.E. & Miller, D.J. [2003].
“Experiences between philosophy and
communication:
engaging
the
philosophical contributions of Calvin O.
Schrag”.
SUNY
Press.
p. 21.
ISBN 9780791458754.
http://books.google.com/books?id=Id7Norn
oMI8C.
Accessed March 2, 2012
[9] Gulliver. [2000]. Richard Lewis
Communications. PricewaterhouseCoopers.
[10]Hall, E.T. [1973]. The Silent Language.
Garden
City,
New
York:
Anchor
Press/Doubleday.
[11] Hill, C.W.L. [2003]. International
Business: Competing in the Global
Marketplace. [4th Ed.] Boston: McGrawHill/Irwin.
[20] Thomas, K.W. & Kilmann, R.H. [1974].
The Thomas-Kilmann Mode Instrument.
New York: NY: Xicom.
[12] Hofstede, G. [1980]. Culture's
Consequences: International Differences
in Work-related Values. Newbury Park,
CA: Sage.
[21] Tinsley, C. [1998]. Models of conflict
resolution in Japanese, German, and
American cultures. Journal of Applied
Psychology, 83(2), 316-323.
[13] Holtgraves, T. [1997]. Styles of
language use: Individual and cultural
variability in conversational indirectness.
Journal of Personality and Social
Psychology, 73(3), 624-637.
[22] Triandis, H. C. [1972]. The Analysis of
Subjective Culture. New York: Wiley.
[23] Trompenaars, F. & Hampden-Turner,
C. [1998]. Riding the Waves of Culture:
Understanding Cultural Diversity in
Global Business. [2nd Ed.] New York:
McGraw-Hill.
[14] Jackson, S.E. & Schuler, R.S. [2006].
Managing Human Resources Through
Strategic
Partnerships.
Australia:
Thomson/South-Western.
[24] White, M.S. [2009]. Academic
Globalization: Universality of Cross-cultural
and Cross-disciplinary LMR Perspectives.
Proceedings of the Second International
Symposium on Academic Globalization:
AG 2009, Orlando, Florida, 10-13 July,
2009. BEST PAPER AWARD
[15] Lewis, R.D. [2000]. When Cultures
Collide: Managing Successfully Across
Cultures. London: Nicholas Brealey.
[16] Lewis, R.D. [2003]. The Cultural
Imperative: Global Trends in the 21st
Century. Finland: Intercultural Press.
[25] Yamagishi & Yamagishi [1994]. Trust
and commitment in the United States and
Japan. Motivation and Emotion, 18(2),
129-66.
[17] Mello, J.A. [2006]. Strategic Human
Resource Management.
[2nd Ed.].
Australia: Thomson/South-Western.
[18] Oyserman, D., Coon, H.M. &
Kemmelmeier, M. [2002]. Rethinking
82
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
APPENDIX
FIGURE 1: ORIGIN OF CYBERNETICS
INFORMATION
CYBERNETICS
CONTROL
COMMUNICATION
FIGURE 2: EVOLUTION OF CYBERNETICS
ARTIFICIAL
INTELLIGENCE
ROBOTICS
NANOTECHNOLOGY
CYBERNETICS
COGNITIVE
SCIENCES
NEUROSCIENCES
GENETICS
BIONICS
83
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
FIGURE 3: STRATEGIC PROBLEM FORMULATION INPUTS
HETEROGENEOUS
INFORMATION
SETS
STRATEGIC
PROBLEM
FORMULATION
INPUTS
HETEROGENEOUS
COGNITIVE
STRUCTURES
HETEROGENEOUS
OBJECTIVES
Adapted from Baer, Dirks and Nickerson [3]
FIGURE 4: CULTURAL LENS AND STRATEGIC PROBLEM FORMULATION
LINEAR-ACTIVE
HETEROGENEOUS
COGNITIVE
STRUCTURES
MULTI-ACTIVE
REACTIVE
84
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Discreet Event Simulation Used within the Food and Drink Industry
Duncan Folley School of Computing, Creative Technology and Engineering, Leeds Metropolitan University,
Leeds, LS6 3GZ, UK
And
Dr Stephen Wilkinson, School of Computing, Creative Technology and Engineering, Leeds Metropolitan
University, Leeds, LS6 3GZ, UK
Professor Cathy Barnes, Faraday Centre for Retail Excellence, Leeds Metropolitan University, Leeds, LS6 3GZ,
UK
And
Philip Richard Scott, School of Computing, Creative Technology and Engineering, Leeds Metropolitan University,
Leeds, LS6 3GZ, UK
And
Quintan Thorton, School of Computing, Creative Technology and Engineering, Leeds Metropolitan University,
Leeds, LS6 3GZ, UK
ABSTRACT
This research paper investigates the challenges
facing the food and drinks industry in the UK and
how Higher Education (HE) can play its part. It will
explore two case studies carried out at Leeds
Metropolitan University by two part-time
postgraduate students who carried out their own
research whilst working at their food and drink
companies. Their research was to be used as
evidence against a discreet event simulation module
taught on the MSc Advanced Engineering
Management course using FlexSim as their primary
software tool. (In both case studies all references to
their companies have been deliberately removed).
2. THE FARADAY CENTRE FOR RETAIL
EXCELLENCE
The Faraday Centre for Retail Excellence at Leeds
Metropolitan University uses expertise from across
the University to help businesses improve the
consumer experience and to help them make a real
difference in the economy.
At its launch event (June 2012) the Director of the
Faraday Centre for Retail Excellence, Professor
Cathy Barnes [13], gave an inaugural lecture where
she explored how rigorous and robust consumer
research can be used as a platform to create and
identify opportunities for retail innovation, stating:
"Our Centre is unique in the way we look at the
whole retail supply chain and work with companies
to innovate the customer experience at both the
point of sale and during use. There are so many
exciting opportunities in the retail sector
currently"(p.1).
This paper will then look at the role of Higher
Education and how links with industry have a twoway benefit, evidencing this through two case
studies carried out at two food and drinks
companies.
Keywords: Discreet event simulation, Food and
drink, simulation, Higher Education, authentic
assignments.
The Faraday Centre was born 14 years ago, and has
been used by many global retail and consumer
goods companies to enhance innovation. The centre
now looks to extend a supporting arm to Yorkshire
businesses within the retail supply chain, offering
exclusive access to new ideas and technologies.
1. INTRODUCTION
According to the Food and Drink Federation (FDF)
[1] the UK’s food and non-alcoholic drink exports
broke through the £10 billion mark in 2010, with an
increase of 11.4% in 2011 to £12.1 billion and there
are no signs of this growth declining. Jennie
Formby [2] reports that the food and drink industry
employs 400,000 people, which in turn is approx.
17% of the total manufacturing workforce in the
UK.
With this in mind the engineering provision within
Leeds Metropolitan University has expended to
include
an
MSc
Advanced
Engineering
Management and will in 2014 introduce a BSc Food
Engineering course which is specifically aimed at
supporting the Food and Drinks Sector.
This year two MSc Advanced Engineering
Management students developed projects directly
related to the food and drink industry. Although all
references to their sponsoring company have been
removed what the reader should note is the scope
and opportunities HE can offer through highly
qualified undergraduates and post graduates.
Jim Moseley, FDF President in his video podcast
“Skills and Talent in the food and drink industry”
[3] voices his concern however that the food and
drinks industry has an aging work force and there is
not enough talented young work force coming
through, he believes the industry will require in the
next five years over 137,000 new recruits.
According to the National Skills Academy [4] 27%
of jobs in the future will require HE graduates and
these will mainly be in the engineering/technology
fields.
3. COMPUTER SIMULATION
Many industries use simulation as a pre-planning
tool, and many companies have reported the
benefits of computer simulation, Purdom [6].
85
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
It can be clearly seen that any technique
which can model such a system before it is built
would give the following advantages:
available. The selection of an entity from a queue
depends on its characteristics, such as the type of
machine, once the entity has been selected its state
is changed e.g. the machine is working. The
activities each entity undergoes are considered to
begin and end instantaneously and are known as
"events" (Simul8Corporation 2011 [12]). Generally
these types of simulation are controlled by a timing
mechanism known as the "three phase" method e.g.
! Correct layout of elements in relation to one
other
! Evaluation of different designs
! Comparing different operating policies
! Predicting performance
! Educating management & operatives
! Determining control strategy
1. Advance the clock to the soonest event.
2. Terminate any activities that are due to
finish at that moment.
3. Initiate any activities which the
conditions built into the model permit.
4. Repeat the process.
This shows the above features may be
explored without the need for building, disrupting
the operation of, or destroying the real system,
Carrie A S [7].
From this type of model a variety of
performance measures can be considered such
as machine utilization, WIP, throughput times,
buffer queue performance data etc.
Most systems are subject to random
influences, such as the vagaries of human beings,
Carrie [8], however since automated food
manufacture is computer controlled, many of the
random disturbances have been eliminated. This
means that there can be greater confidence in the
results of automated food production systems over
conventional manufacturing methods.
3.3 Petri Net Models
A Petri Net is a graphical system that uses
circles to represent places and bars to represent
transitions. Input and output relationships are
represented by directed arcs between places and
transitions. Diagrammatic tokens represent the state
of a net at a given moment.
Various
modelling
and
simulation
techniques are available for planning both layout
and control strategy, they are Graphical Simulation,
Discrete Event Simulation, Petri Net models and
Mathematical models.
Petri Nets are useful tools for modelling and
analysis of discrete event dynamic systems. They
are particularly valuable when state and control
information are distributed throughout the system as
is the case in FMS.
3.1 Graphical Simulation
This is where the physical design and
interaction between elements within a system can be
visualised. This has the advantage of giving the
system designer information to identify excesses
and deficiencies within the system and to some
extent predict how the system will perform, Dr
Ugur Guve [9]. Examples of 3D design packages
are Grasp and Workspace. They have all been
developed to model robots, conveyors, automated
guided vehicles (AGVS) etc. These features aid the
development of workplace layout by manipulation
of these entities. Other features include event
processors which can link events together such as
robots picking and placing objects on a conveyor
being sensed, food processing equipment starting
or stopping etc. These events can be saved along
with their associated parameters e.g: starting time,
duration of actions, delays, accelerations etc. In this
manner complex interactions between components
within automated food manufacture may be studied
and evaluated.
Grafcet is a Petri net based graphical tool
intended to apply to all software control systems for
industrial automation, it has proven a powerful tool
for expressing control flow, Prof. J.-D. Decotignie
[10]. Also it has helped towards modularisation of
code, communication between parallel processes,
and problems in control flow.
3.4 Mathematical Models
These are the classical models developed
from operational research linear methods. They
have been developed to include computer
applications, for example Hatano et al [11] have
developed a rule base technique for online
scheduling of an automated system which takes into
account uncertain events i.e. failure of machines,
repair time and processing time.
3.2 Discrete Event Simulation
4. CASE STUDIES
In a discrete model the states of each entity
within the system are modelled, for example
whether a machine is working or waiting, also Dr
Ugur Guve [9] whether a food product is waiting or
being worked on. There are combined activities
such as equipment-process-food product activities.
In other states entities can be in a queue waiting
for conditions to change, for example a food
product waits for a machine to become
According to the National Skills Academy [4]
research has shown that one of the main inhibitors
to improvement in productivity is the lack of
qualified engineering'
s that are industry specifically
trained. They go on to highlight the growth of
automation with the food and drink industry, noting
that 67% of companies who supply the large food
and drink industry plan to expand their use of
86
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
technology over the next two years.
Jim Moseley, FDF President [1] notes that 20% of
those employed in food manufacture are to degree
level. Currently Universities & Colleges
Admissions Service (UCAS) [5] shows 132 UK
courses which are food related from nutrition,
health, food science/technology, with just two
courses for food manufacture. This highlights the
need for more high quality HE provision to supply
the food and drink industry. The following two case
studies investigates two food and drink companies
who have allowed their staff to progress onto a post
graduate (PG) course at Leeds Metropolitan
University (the identities of the companies have
been deliberately removed). The case studies are
based around one single module, Simulation and
Modeling where they were required to investigate a
production line using discreet event simulation
techniques and software (FlexSim) within their own
company.
Figure 2
Data from FlexSim Modell for wrapping legwrapping cycle
The data which has been obtained shown in Figure
1 and 2 of the states of the each of the machines
shows that there is a lot of idle time on the
secondary wrapping assets (in red).
4.1 CASE STUDY 1
If we look at the secondary wrapping machines, we
can see that two are idle 39.8% of the time.
Although a very small amount of this can be
attributed to the starting up and part filling of the
store, this will only account for no more than 0.5%.
The rest of the idle time is due to the lack of
product. The third wrapping machine is only fed by
one primary wrapping machine, hence the idle time
for this asset is a phenominal 69.9%.
This case study looks at the package process of a
very popular chocolate bar. The company is in a
very fortunate position that it can sell as many of
these bars as it can make, therefore any small
reduction in production times effects company
profit.
The case study looks into a wrapping leg- wrapping
cycle. The case study used the commercially
available package FlexSim. The package is
primarily a discreet event simulation software
package capable of modeling complex processes
and allowing the users to optimize those processes
by running “what if scenarios” for real world
systems.
It is clear from this simulation that alternative setups
need to be investigated to reduce idle time and as
such increase production. After running several
simulations with different layouts the following was
deemed to offer the best results.
Using the simulation package FlexSim a simulation
was created to understand if it is possible to run the
wrapping with less secondary wrapping assets.
Figure 3
Proposed New Layout for wrapping leg- wrapping
cycle
Figure 1
FlexSim Modell for wrapping leg- wrapping cycle
87
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
4.2 CASE STUDY 2
This case study investigated the manufacture of a
household sauce production facility and more
specifically the production and distribution of sauce
within the plant. The plant consists of a specialist
mixing vessel, with a purpose made emulsion head
that under the correct conditions and with the
correct ingredients batched into it will produce the
sauce.
At the time of the study the plant was over stretched
and struggled at peak periods to produce sufficient
sauce to meet the demands of the factories mixing
department. The plant makes several different
sauces with variations on ingredients altering
variables such as thickness, ph and flavour.
Figure 4
Data from Proposed New Layout for wrapping legwrapping cycle
It has been assumed for some time by site managers
that the best way to increase the sauce production
on the site would be to invest in a second mixing
vessel to increase the throughput to double its
current output. This case study uses discreet event
simulation to investigate if this is correct or if a
better method could be found.
From the cost analysis and the analysis of the
simulations it is recommended that a second
primary wrapping machine is purchased, the
conveying system is altered so the primary
wrapping machines can be group into threes and
each group of three feed a secondary wrapping
machine as shown in the proposed layout in Figure
3. In addition to adding another primary wrapping
machine and removing one of the secondary
wrapping machines a cost has been allocated to
support the upgrade of the control and automation
system that controls the conveyors to allow the
addition of conveyors to feed the sixth primary
wrapping machine to integrate seamlessly into the
existing system.
When the sauce is produced, an operator must first
weigh out products that cannot be batched directly
in to the mixer, these are added to feed tanks close
by to the mixer, and is then added to the mix at the
appropriate time in the process.
Once these have been prepared, the operator follows
a sequence of batching in oil, vinegar and oil and
emulsifying with the pre-weighed ingredients from
the wet and dry hoppers.
To get a worst case scenario, using a software
package
known
as
MARA
(Machine
Analysis Reporting Application) it is possible to
generate a report for the period of this research to
see how efficient the primary wrapping machines
were over the month, this was found to be an
average of 62.47%.
Quantity
Additional 246524
Production
Cost
@ 5ppb
perday
£12326.2
The sequence is virtually the same for each of the
sauces produced with variations on the quantities of
each of the raw ingredients. On discharging the
sauce from the mixer the product is pumped into a
holding tank, from here it is pumped to a further
holding tank before being pumped to the storage
tank where it will be stored until required within the
mixing department.
Cost
@ 5ppb
peryear
£4227886.6
When building the simulation models it was felt that
there was no requirement to simulate each part of
the mixing process because these are not variable, it
always takes the same time to produce the sauce and
these times cannot be modified so it was considered
best to include the production of sauce in one stage
and concentrate on areas that can be altered. The
first simulation was of the original/current layout
this was to enable comparisons to be made with
further simulations to identify improvements.
£7700
£2641100
Additional 154003
Production
at 62.
47%
Table 1 – Projected Costing’s
Looking at the cost for adding a new primary
wrapping machine £387,090 it can be seen that it
would take nearly two months to start making a
profit from the alterations.
When comparing the plants performance to the
simulation the plant produced on the most efficient
day 26 batches, this is shown to coincide with the
model proving that the times used within the model
are realistic.
Clearly this discreet event simulation will benefit
both the company involved, but also the research
student who has gained an invaluable insight into
his company’s production process, identifying
bottlenecks and offering solutions.
88
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Graph showing the cost of labour per batch
Cost per batch
£6.00
Figure 5
FlexSim Simulation 1
£5.00
£4.00
£3.00
£2.00
£1.00
£0.00
Si
mul
ati
on Si
mul
ati
on Si
mul
ati
on Si
mul
ati
on Si
mul
ati
on Si
mul
ati
on
1
2
3
4
5
6
In total 6 different layouts where simulated the final
one has the holding tanks removed which removed
the bottleneck in production allowing both mixers to
operate without any idle time. As well as installing
discharge pumps that reduce the time to discharge
by half. This is the maximum production that could
be achieved with two mixers.
Sim ulation
Figure 7
Graph to show the cost of labor per batch
Simulation 6’s configuration shows the highest
possible throughput for the plant. It is possible to
produce 74 batches each shift. This also shows the
lowest cost in labor of simulations. Of the current
production requirements this model is not required
as there is not the demand for this amount of
product. With payback at over ten years there is
insufficient justification for the second mixer at this
time however as wages increase and production
requirements increase this maybe a more viable
option in the future.
This simulation could be run for the 11 hours that
are available due to there being no tanks to pump
out at the end of the shift.
Figure 6
Flexsim Simulation 6
5. CONCLUSIONS
According to comments by Jim Moseley, FDF
President [1] there is clearly going to be a shortage
of a skilled workforce unless UK HE develops
world class undergraduate and postgraduate courses.
However as discussed earlier, Universities &
Colleges Admissions Service (UCAS) [5] show
only two courses for food manufacture.
When running the simulations the following data
was recorded for analysis;Simulation
Throughput
pershift
Simulation 1
Production
hours
available
10
Simulation 2
11
31
Simulation 3
11
37
Simulation 4
10
48
Simulation 5
11
62
Simulation 6
11
74
27
The benefits for industry can be seen in the two case
studies, in fact Case Study One offers enormous
potential for expanding the study across the all
production, with potential massive savings.
Typically a PG full time one year course will cost
approximately £8,000, UCAS [5]. These two case
studies were carried out by two part-time students
who are sponsored by their employer. According to
the Prospects [17] getting an employer to sponsor a
student is a win-win situation. With the graduate
gaining a qualification that will benefit their ability
to carry out their job and the employer will benefit
by having a more qualified, productive and
motivated employee.
Table 2 Production hours available and throughput per shift
Alternative to PG studies are the Government lead
Knowledge Transfer Partnerships (KTP) [14]. “A
relationship formed between a company and an
academic institution ('
Knowledge Base' partner),
which facilitates the transfer of knowledge,
technology and skills to which the company partner
currently has no access.” (p1).
From the table above it can be seen that the
throughput per shift ranges from 27 for simulation 1
to 74 for simulation 6.
The production hours available are improved from
10 hours to 11 hours by removing the two holding
tanks.
The KTP is currently funded by fifteen UK
government organizations and led by the UK’s
Technology Strategy Board. According to the KTP
(2013) [14] web site the benefits for businesses can
be on average: -
89
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[7] Carrie A S. (1986). “The role of simulation in
FMS. Flexible manufacturing systems : methods
and studies”. Publisher : elsevier science (North
Holland).
! “An increase in annual profit of over £290k
! 8genuine new jobs created
! Investment in plant and machinery of over
£220k
! Commercial benefits from application of
IP~24%” (p1).
[8] Carrie A. (1988). “Simulation of Manufacturing
systems”. Publisher Wiley 1988.
The Browne report in 2010 [15] was a land mark for
HE in the UK. Lord Browne was asked in Nov 2009
to review the funding of UK HE and ensure that it is
sustainable for the future. According to the web site
“What’s so interesting about Lord Browne?” [16]
the report has developing proposals that would
make UK HE into a business. Therefore the UK HE
sector needs to develop and embrace closer links
with industry. Leeds Metropolitan University has
therefore developed the Faraday Centre for Retail
Excellence and its HUB where academics and
industry can collaborate.
[9] Dr Ugur Guve. (n.d.). “Modeling and Simulation
Engineering Solutions”. On-line.
http://www.academia.edu/1709194/Modelling_and_
Simulation_in_Engineering_Solutions. Accessed
11/3/2013.
[10] Prof. J.-D. Decotignie. (2007). “GRAFCET
and Petri Nets”. On-line.
http://lamspeople.epfl.ch/decotignie/G7RdPgb.pdf.
Accessed 11/3/2013.
[11] Hatano et al. (1991). “Modelling and on-line
scheduling of flexible manufacturing systems using
stochastic Petri nets”. IEEE Transactions on
Software Engineering IEEE Journal V17 n2.
As the paper has shown the food and drinks industry
is facing a short fall of highly qualified graduates.
Link this with the need for UK HE to develop
partnerships with industry, then the door is open for
UK HE to develop UG PG courses, KTP that meets
the needs of both industry and addresses the
challenges the Browne (2010) government paper
has set HE.
[12] Simul8Corporation (2011). “What is
Simulation Software?” On-line.
http://www.simul8.com/products/what_is_simulatio
n.htm. Accessed 11/3/2013
Clearly benefits for HE are that academics will
develop their knowledge within their subject area on
real world situations, thus developing up to date
teaching material, publish high quality research
papers, as well as bring in much needed external
funding to their University.
[13] Barnes, C. (2012). Faraday Centre for Retail
Excellence launched at Leeds Metropolitan
University. On-line.
http://www.leedsmet.ac.uk/news/faraday-centre-forretail-excellence-launched-at-leeds-metropolitanuniversity01062012.htm?type=external. Accessed
11/3/2013.
REFERENCES
[14] Knowledge Transfer Partnership. (2013).
FAQs. On-line.
http://www.ktponline.org.uk/faqs/#funds Accessed
8/3/2013.
[1] Food and Drink Federation (2011). “Delivering
sustainable growth through exports”. On-line
http://www.fdf.org.uk/corporate_pubs/Exports_broc
hure_2012.pdf. Accessed 8/3/2013
[15] Browne, J.(2010). An independent review of
higher education funding And student finance. Online.
http://www.educationengland.org.uk/documents/pdf
s/2010-browne-report.pdf. Accessed 8/3/2013.
[2] Jennie Formby (2012). “Food Drink and
Tobacco”. On-line
http://www.unitetheunion.org/how-we-help/list-ofsectors/food-drink-and-tobacco/. Accessed 8/3/2013
[16] “What’s so interesting about Lord Browne?”
(2010). On-line http://aboutlordbrowne.com/
Accessed 23/2/2012.
[3] Jim Moseley (2012), “Skills and Talent in the
food and drink industry” On-line
http://www.youtube.com/watch?v=qEaM9wUKlW4
&list=UUmmge8MoN-oQ0F3ZY7QCvtA.
Accessed 8/3/2013
[17] Prospects (2012). Funding postgraduate study:
Employer sponsorship. On-line.
http://www.prospects.ac.uk/funding_postgraduate_s
tudy_employer_sponsorship.htm. Accessed
23/2/2012.
[4] The National Skills Academy. On-line
http://foodanddrink.nsacademy.co.uk/. Accessed
11/3/2013
[5] UCAS. Search Results. On-line
http://www.ucas.ac.uk/students/coursesearch/2013s
earcheu/. Accessed 11/3/2013
[6] Purdom P (1983). “How Computer Simulation
helped Citroen setup a new FMS”. Publisher :
Production Engineer 1983, 62(5).
90
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Natural Selection in Virtualization Environments: A Decade of Lessons from Academia
Bruce Hartpence
Information Sciences & Technologies, RIT
Rochester, NY 14623 USA
Daryl Johnson
Computing Security, RIT
Rochester, NY 14623 USA
Sharon Mason
Information Sciences & Technologies, RIT
Rochester, NY 14623 USA
1. ABSTRACT
Bill Stackpole
Computing Security, RIT
Rochester, NY 14623 USA
A second alternative to provider-based cloud solutions is to
design, host and run a local virtualized environment on a
university campus for both local and remote access. Locally,
departments may leverage desktop virtualization, a private
cloud (large and small) or a combination of these two. Desktop
virtualization is an economic aid and effective instructional
tool. As such it is often the first step from traditional methods
such as imaging. In our own migration to virtualization and
cloud services, the first step was desktop virtual machines as
documented in [1]. In short, we elected to deploy VMWare
workstation on a majority of our desktops, along with a
collection of virtual machines or VMs. But this format often
does not go far enough toward meeting faculty and student
needs. In addition, the desktop footprint is still an issue as a
large number of physical machines may still be required. For
example, the cost of populating a lab filled with machines for
experimentation and the cost of filling a lab full of computers
running virtual machines are similar, unless the number of
desktops is actually reduced. The financial impact is that often
the number of machines in a lab can be reduced though the
RAM in the remaining machines is increased. This change,
combined with reduced space, HVAC and power costs, benefits
the academic unit. This concept comparing the physical and
virtual lab scenarios has also been explored by [8].
Virtualization technologies are commonly used in industry to
provide storage and server solutions. Several implementations
exist, from desktop to public and private cloud-based
virtualization. In light of the support and experience required,
the question arises as to the validity of virtualized systems for
educational purposes, in particular for networking, security and
systems administration students. The faculty members at
Rochester Institute of Technology (RIT) in the department of
Networking, Security and Systems Administration (NSSA)
have over 15 years experience in delivering the curriculum in a
hands-on environment. The NSSA faculty members have also
embraced the use of virtualization in delivering curricula. This
paper outlines their experiences with five distinct virtualization
systems by exploring the advantages and limitations of each as
well as the future work that lies ahead.
2. INTRODUCTION
Both virtualization and cloud computing continue to be adopted
by industry for enterprise level solutions and access to
applications and data. Educational institutions have turned to
these solutions as the pressure to reduce costs competes with
the expenses associated with maintaining competitive
computing facilities. Academic programs with a need to provide
departmental services to their students have also made use of
these architectures. For computing and information based
programs, the use of virtualization and provider cloud
computing services for student access to instructor materials as
well as storage of system images for research and analysis can
be critical. However, the use of provider cloud services (such as
Amazon EC2) requires customers to depend on remote services
and a one-size-fits-all architecture. In the case of academia,
faculty and students may not fit this mold as the faculty has
limited administrative control and the students are constrained
to the applications available.
Local private clouds can be promising because of the increased
virtual:physical ratio and the ability to access the system
remotely. With a standard lab setting, a student sitting at a
computer without virtual machines has a 1:1 ratio – one
operating system per physical machine. By running more than
one virtual machine on the same computer this ratio can
increase to a value only limited by the physical resources on the
machine. For example, labs in the department commonly run a
2-3:1 ratio as students run both server and client virtual
machines on the same physical computer. A private cloud
pushes beyond this, allowing many students to simultaneously
connect to the system and each student running several virtual
machines. Thus, data centers push this ratio to 10 or 20:1. Our
local solution, when appropriate for classwork, was to run either
ESXi nodes to facilitate this model or full clusters based on
ESXi that also included storage.
Two alternatives to using provider-based cloud services exist.
The first, and the historical solution, has been the use of nonvirtualized systems in a campus lab environment. The
traditional model of non-virtualized components includes
removable hard drives, machine imaging and policies to control
installation of software and changes to systems. This solution
has the advantages of local control, but also the challenges of
management, cost, and scalability. One goal of the NSSA labs
was to provide as much control and access to the students as
possible. While the traditional, non-virtualized model met the
goal of student access, the high number of students (several
hundred undergrads) made the collection and storage of
removable hard drives difficult at best. The replacement costs
of these hard drives and the modifications of the chassis were
also barriers. Interestingly, though this option was discarded,
five years later we returned to it on a small scale for forensics
and malware coursework.
But even with these benefits, a private cloud can be an
expensive proposition unless off-the-shelf components are to be
used. The first RIT private cloud was entitled the Remote
Laboratory Emulation System (RLES) is described in [2]. This
system predates the current use of ESXi. RLES implemented an
off-the-shelf modular approach, utilizing low cost components.
The original RLES was built using cast-off department
machines and volunteer faculty labor. No components were
purchased and faculty effort was included in the academic year
workload. RLES better addressed the challenges associated
with running a virtualized infrastructure for a smaller academic
unit as well as the limitations of working with an outside
solution beyond local control such as EC2. With the success of
91
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
RLES, RIT went to an institutional model at much greater cost
and outside local control. The second iteration of RLES was
built in collaboration with the university-level information
technology services organization at a cost of approximately
$140,000. These costs were shared between the two groups
with support from the university. This approach works
reasonably well but is dangerously close to following in the
steps on the public clouds as they move farther and farther from
the academic unit.
expansion and the corresponding increase in budget
requirements. Management and storage solutions have
transitioned from copying images via parallel ports, removable
hard drives, returning applications to their original state and full
system imaging to desktop virtualization and clusters. This
history is documented in a previous paper [1]. RIT’s computer
networking, security and information programs have grown
substantially over the years to the current state of approximately
300 students. For some period of time, capital was readily
available to make improvements and updates to the lab
infrastructure that directly supports the curriculum. However,
stabilizing growth along with increasing hardware costs
associated with the continuously required technology updates
and replacements have dictated a more efficient approach to
managing lab infrastructure. The advent of virtualization
technologies was timely in that the faculty had to develop this
more efficient approach.
The NSSA faculty have explored the use of both public and
private virtualization to support student research, course and lab
work. Labs at RIT currently support five implementations of
virtual computing:
This paper will review these approaches to providing an
academic virtualization environment and the solutions
implemented by the networking and security faculty at RIT.
The discussion will include lessons learned and solutions
currently deployed.
3. YET ANOTHER COMPUTING RESOURCE?
Universities continuously work to demonstrate a commitment to
providing outstanding computing resources for students.
Usually this discussion revolves around wireless coverage,
connectivity, email, printing and other such services.
Virtualization is another service, and although it is largely
transparent to the users, it requires significant effort and
resources from academic departments wishing to remain
current. For this reason, the decision to move into the
virtualized space should be thoroughly considered as the
expectations may far exceed the performance realities.
1.
2.
3.
4.
5.
virtualization on student-owned machines
virtualization in a commercial public cloud
desktop virtualization on lab machines
a low-cost private cloud named Remote Laboratory
Emulation System (RLES),
virtualization on a low-cost private ESXi cluster.
While the RLES cluster has migrated to the campus
infrastructure group due to staffing and support economies, the
remaining strategies are designed, developed and managed
within the department.
Another consideration revolving around the conversion to
virtualization is that it may become a service within a service.
Like other computing resources, the virtualized environment
requires processing, storage, rack space, etc. Unlike other
computing resources, virtualization leads to a massive increase
in required storage capacity. In the case of the local virtualized
solutions, the academic unit may be responsible for storing the
student work, virtual machines, and required software. The
question about handling all of this student data becomes an
important consideration. To be clear, the question of student
data is not regarding data about students but rather data from
students. Data from students includes data resulting from
laboratory experiments or configurations as well as research
experiments. This may be text files as small as ten kilobytes to
virtual machines exceeding a gigabyte. A reasonable question is
whether or not academic departments should be in the business
of managing and storing student work. This discussion extends
back to removable hard drives and writeable CDs. There are
positive and negative arguments to the overall discussion but
the NSSA department, determined that it was important to
provide this data storage service to students. There are many
aspects to the discussion regarding virtualization strategy
selections. Storage of student data should be an additional
discussion point within the department.
4.1 Virtualization on Student-Owned Machines
Virtualization
on
Student-Owned
Machines
Advantages: Faculty members are experimenting with allowing
students to conduct all studies using virtualization on their
personal, student-owned, operated and managed machines,
utilizing approved licensing models. The licensing issue is
significant because while a school may have a site license for a
Microsoft product, it may not have a site license permitting
uncontrolled proliferation of “free VMs” containing the
software. While testing of this solution has been limited, initial
results demonstrate that all of the benefits of a virtualized
system can be realized with little to no hardware costs to the
department. Students directly absorb all of the costs associated
with purchasing and maintaining and upgrading the equipment
and software. Students enjoy the flexibility of completing
coursework from any location.
Virtualization on Student-Owned Machines Limitations: While
storing student data on student-owned machines merits further
consideration, the lab experiments and associated electronic
files required for coursework sometimes proves unmanageable.
Between the size of virtual machines, software required for
experiments, the need to access/use data for ongoing lab
exercises, etc., the faculty determined that it would simply be
easier and more reliable to store resources on the local servers.
To be sure, this required increasing the skill and sophistication
of faculty members and lab staff to maintain the system, but the
4. SOLUTIONS
Initial Conditions: The Applied Networking and Systems
Administration (ANSA) degree program at RIT began
accepting students in 2002. Prior to that, the networking
coursework was part of the Information Technology program.
Since that time, significant growth has resulted in lab facility
92
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
faculty continues to believe that it is a valuable departmental
resource.
students must learn the intricacies of the system and work
within the provider’s available customer support.
4.2 Commercial Public Cloud
Several classes have experimented with using public cloud
services such as Amazon’s EC2. Initially a program that lacks
huge computing resources might find that low cost student
accounts in a public cloud are very attractive simply because
the system is managed by a reliable provider. A closer
examination might reveal that these benefits do not necessarily
outweigh the potential pitfalls. Several database classes from
RITs Information Technology program were moved to Amazon
to test the viability of running these classes in the cloud
environment with the eventual goal of expanding the
curriculum and maintaining currency. The details of that
experiment can be found here [3].
4.3 Lab Machine Desktop Virtualization
On lab computers, a virtual environment is deployed (such as
VMWare workstation) and students “stand up” a collection of
virtualized computers on a single lab machine. This empowers
the student by providing complete local control over the
configuration of both the virtual machines and the virtual
network.
Lab Machine Desktop Virtualization Advantages: Virtualization
on desktop machines was an important addition to the lab
infrastructure for several reasons. Perhaps the most significant
of all was the afore-mentioned ability to run several virtual
machines in a single physical department-owned desktop lab
machine. Each physical machine is capable of supporting a
virtual network of up to four virtual machines (VMs). Our
systems administration courses are able to configure and
manage multiple servers and workstations to do coursework,
research and analysis for the relatively low cost of additional
RAM. For example, students commonly deploy Linux and
Windows based DHCP and DNS servers along with a collection
of clients for experimentation and research.
Commercial Public Cloud Advantages: Currently cloud-based
virtual computing provides a baseline free platform for limited
experimentation and study. Additional services are available at
nominal charges, typically $12 per student. Several options
exist for supporting those nominal charges. First, the charges
may be at the direct expense of the student through their own
accounts at the service provider. Second, the department may
bear the entire expense for each students cloud provided
services. While these costs appear transparent to the students,
they are indirectly absorbed through tuition charges. A third
“hybrid” solution is to provide students with some cloud-based
services to a given threshold. When service requirements
exceed the threshold limitations, the students accept the
additional charges. Amazon also provides an Education Grant
Program to offset the costs. [7]
Student lab benches that previously housed four separate
physical desktop computers have been reduced to two or three
physical machines. This has resulted in an immediate cost
savings by reducing hardware purchases, daily support and
repairs as well as power consumption. The unused machines
were repurposed for other labs.
Lab Machine Desktop Virtualization Limitations:
Desktop virtualization is not without cost, both in terms of
faculty time and finances. Faculty must learn to effectively and
efficiently use the virtualized resources for their own research
as well as for student research, course and lab work. Moving
and copying virtual machines also requires additional domain
knowledge.
While the charges for utilizing the public cloud must be
absorbed at some point, savings can be found in a reduction of:
1.) hardware repair for lab-based machines, 2.) hardware
replacement costs, 3.) staffing requirements to support the
hardware maintenance, 4.) staffing requirements to support lab
facilities during class-time and during open student time, 5.)
general lab space and maintenance requirements, and 6.)
energy costs in the lab facilities. Additional benefits include
potential 24-hour access to resources. Given a stable cloudbased environment, students will also realize the benefit of
access from any location. This expands the possibilities for
remote or distance education.
On the fiscal side, virtualization requires more powerful
computers equipped with more RAM. Costs associated with
storage requirements also increase when deploying a virtualized
environment if saving content for individual students. For
example, when conducting experiments in a fully outfitted nonvirtualized lab environment, student work was deleted as the
machines were re-imaged between lab sections. With
virtualization, it became apparent that student work could be
saved for later use. But, questions about storage locations and
the associated costs arise. One solution is to hold students
responsible for the storage. Another is to provide storage on
departmental systems. The obvious costs associated include the
hardware along with the personnel for management and
maintenance. This leads to potential scalability issues as more
coursework is moved to a virtual platform and as student
enrollment increases. An unforeseen effect of our virtualization
topologies was that we began to collect VMs. Every faculty
member had a list of those that might be required for classes. In
addition, many of the VMs included the same software. For
example, at one point the department servers housed three
Windows XP VMs, all of which contained the complete MS
Commercial Public Cloud Limitations: If cloud usage costs
increase substantially, costs associated with course experiments
may once again become prohibitive. Service-levels of these free
or fee-based public cloud environments must also be
considered. If the cloud is not available, coursework and
curriculum will be negatively impacted. Additionally, changes
to the cloud-environment, initiated by the service provider, may
potentially change the system in ways that are not predictable,
rendering the system unusable to faculty and students. Either of
these scenarios will leave the faculty with no control of their
teaching environment. One of the most significant challenges to
academic programs is not the pricing or reliability of the
service, but the potential to update what and how things are
taught [3]. The cloud service may not provide the same
software leading to limitations to course content. In addition,
93
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Office suite. Thus the number of VMs and the storage
requirements became unmanageable. This increase in VM size
also impacted the images that were being pushed out to the lab
machines as part of regular setup and configuration.
would not solve the problem, as the old hardware would likely
be incompatible with any new hardware. The solution was
either a replacement of all CPUs or forgoing the use of the new
features until replacement of the older CPUs was feasible.
Because RIT already had a substantial financial investment, a
full-scale replacement was not possible.
Another limitation to desktop-based virtualization systems is
that students must physically be sitting in one of the campus
labs to access their stored images. More and more students are
looking to complete their coursework and research remotely.
Tying them to a physical lab on campus restricts flexibility.
Software licensing issues also arise as the distribution of
desktop-based images is difficult to manage. Vendors, when
informed that their software was to be used in a virtual
environment often had to develop deployment models on the
spot.
Another restriction in the private cloud RLES system is that the
users are limited to viewing only the machines under their
control. This “privilege limitation” extends to faculty only
having the capacity to view instances of virtual machines
initiated by students in classes under their control. As such,
neither students nor faculty can make informed decisions about
how or when it would be best to deploy machines that might tax
the system performance and, by extension, other users.
Configuration implementations and intense experimentation are
often causes of performance problems. These performance
issues are compounded by the popularity of the system and the
limitations of resources to scale up the local system to support
the increased load. Advanced systems administration classes
commonly see markedly reduced system response times as they
build virtual data centers or run Nessus scans for penetration
tests.
4.4 Low-Cost Private Cloud with Off-the-Shelf Components
- RLES
To mitigate some of the problems associated with the desktop
virtualization, a Remote Laboratory Emulation System (RLES)
was initiated in 2005 [2]. RLES was initially developed as a
pilot aimed at providing a graduate lab experience for distance
learning students. It evolved from remote access capability
enabled on single user machines to a cluster of systems built
specifically for this purpose. The initial system simply required
a collection of computers, a small network and a location.
Departmental machines were used along with faculty time
during the regular academic year. Moving the system to the
campus environment was a much more costly investment that
required the department not only to spend tens of thousands of
dollars for the campus upgrade, but also required the
relinquishing of control.
4.5 RLES Moves to a University-Wide Public Cloud
With the RLES pilot success, the next step was to address the
performance issues. Expansion of the local system became
prohibitive to our academic unit and a more robust production
version of RLES was constructed and housed within the RIT
data center, outside of the departmental management structure.
RLES currently runs on hardware housed in the campus colocation facility. It provides remote access to virtual lab
environments 24 hours a day, seven days per week. Accounts
are deployed using the concept of leases that the system
automatically releases resources should students forget to do so.
Like the first generation RLES, the environment is used to teach
both systems administration and security courses. As an
example, users can deploy and watch malicious traffic in
isolated virtual network spaces without fearing that traffic will
inadvertently leak onto the campus network. The concept of
providing virtual environments for security-related education is
one that warrants further discussion. Other universities are also
exploring this issue as outlined in [9].
Low-Cost Private ESX Cloud Advantages: Given all of the
potential deployment models, opportunities for additional
control and an incredible learning environment made the
evolution of a locally controlled cloud similar to RLES very
attractive, especially for advanced classes. The virtualization
cluster also provides a secure and isolated environment where
students can experiment with and experience security scenarios
without disrupting departmental or campus resources. This is a
tremendous advantage to a department that delivers security and
forensics curriculum to students who may not have the expertise
or maturity to distinguish between acceptable and unacceptable
network and system use. This environment mitigates student,
faculty and university risk while facilitating an open teaching,
learning and research environment. Alternate, but less attractive
solutions include isolating an entire lab to contain securityrelated experiments from “leaking” onto the campus network
[4].
RLES allows for machines and networks to be pre-configured
to include or exclude content to allow specific curricular needs
to be met. Authentication to the system has been integrated with
the campus course registration system. Students in courses
using RLES are automatically added to the appropriate facultymanaged group(s). To encourage student experimentation, ten
percent (10%) of the system’s computing capacity is made
available to students registered in the computing college,
regardless of whether or not they are in a class that uses the
system. The remaining ninety percent (90%) is reserved for
students registered for classes using the system.
Low-Cost Private Cloud Limitations: The RLES system was
implemented just before the public release of CPUs with
“Virtualization Technologies” (VT-support) and with the thencurrent VMWare virtualization software. “VT-enabled” denotes
a CPU with hardware extensions that specifically support
software virtualization by providing VMs with direct access to
hardware. As VMWare matured, configuration changes were
necessary in order to enable new features. Without VT-support
the systems could not utilize many new features such as live
migration of virtual machines. Simply adding more CPUs
University-Wide Public Cloud Advantages and Limitations:
Moving the system outside of the department created an
environment in which hundreds of VMs and several classes
could run simultaneously. However, faculty no longer
maintained local control of the system. Although the staff in the
94
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
data center made efforts to support individual customer needs,
moving from the department owned and managed RLES system
to the RIT university-wide private cloud resulted in the
department becoming one of many customers.
backbone routing and switching hardware. While this creates a
bottleneck, the primary limiting factor is the lack of spindles.
All the equipment as part of the cluster still proves to be
adequate even given the limitations outlined here. This is true
only because the cluster is solely utilized in a lab environment
rather than a production environment. However, long-term
usage and scalability of the cluster should be considered in
regards to the limitations.
4.6 A Return to the Low-Cost Private ESX Cloud
The limitations of the campus RLES and the faculty interest in
virtualization led to a desire for the locally controlled
virtualization environment. Thus, members of the faculty, along
with two honors students, built a low-cost virtualization cluster
based on ESX technology. VMWare products have been
primarily used due to the low costs and the existing market
share of the products. A recent poll at Vyatta indicates that, of
the more than 5,000 respondents, 50% of the deployments use
VMWare [6]. As educators, the faculty determined this to be an
appropriate environment for preparing students.
5. DISCUSSION: ACTUAL USE
Perhaps one of the more interesting details about these models
is how they are actually implemented in the classrooms and
labs. It is not uncommon for new technologies to enter the
learning environment with the expectation of great success and
innovation only to have them underutilized. The reasons are
many and varied, ranging from a lack of training to an
unwillingness to adopt new ideas. The same is true of the
solutions outlined in this paper. Virtualized environments may
provide cost savings, resources not previously available and
economies of scale but often they are not deployed for the same
reasons other technologies gather dust on the shelf.
With the advent of faster and less expensive components, a
cluster utilizing commercial-off-the- shelf (COTS) components
was designed with a hardware budget of $15,000. The cluster
was built with 12 nodes with hex core AMD processors, 16 GB
memory, dual Gigabit Ethernet interfaces, and 20-80 GB
system drives. A 13th node was configured as an iSCSI server
to provide storage for the individual cluster nodes. The cluster
allows for different environments to be studied. Students,
faculty and collaborators can experiment with hands-on
exercises in the varying environments. The cluster also supports
performance testing as well as feature and functionality
comparisons between the systems. This flexibility extends the
value of the cluster by providing the capability to incorporate
new virtualization technologies as they are released.
For example, one of the great benefits of virtual machines is the
ability to deploy servers (such as FTP) and recover from losses.
However, in a lab setting, taking the time to run the virtualized
environment and then the server can take longer or introduce
more technical challenges than simply installing the server
software for a short term set of experiments.
In the case of public clouds offering externally managed
resources, negative experiences may impact the adoption rate.
At RIT, the use of the Amazon cloud is generally considered
successful though there have been difficulties. In one instance,
the service failed during practical examinations and the
instructor was forced to fall back to desktop virtualization.
Doubtless, many instructors are unlikely to depend on the
service in exam situations. In fact, this indicates that a duplicate
infrastructure was in place and that full adoption of the public
cloud had not occurred.
The cluster was designed to provide secure remote access to
participating students from both on and off the RIT campus.
Remote users of the system are not provided with direct access
to the virtual system, but rather console access, therefore
limiting the risk to systems outside of the virtualized
environment, again providing a tremendous advantage to the
department, the faculty and the students. Different
environments can be studied, students can run experiments, and
hands-on exercises with each of these environments can be
performed. Such a system also allows for performance testing
as well as feature and functionality comparisons between the
systems. This flexibility allows straightforward incorporation of
new virtualization technologies as they are released.
Latency is another issue associated with the public cloud
services. The private cloud deployed on the RIT campus is also
plagued by latency. Over time it may be possible to predict
system usage but currently the number of classes (and therefore
the number of users) varies dramatically, even without
considering varying enrollment numbers for individual courses.
Thus the performance of the system is just as unreliable. While
resources are allocated to the system, the university is also
uncertain as to its efficacy and therefore the level of support
required. The result is that instructors may not use the local
cloud service depending on their perception of the usage for
that quarter. Students and faculty alike have discovered that
there is also a significant performance difference between
accessing the system remotely versus on-campus.
Low-Cost Private ESX Cloud Current Limitations: The cluster
currently houses no offline storage to provide backup or disaster
recovery. The only backup resides on a faculty-owned external
USB drive stored in a faculty office. This is an obvious cause
for concern should any of the nodes fail. Because the cluster
was built with desktop components that are not intended for
round-the-clock continuous uptime, the hardware is a
vulnerability point. The nodes contain no additional cooling
systems and no redundant power supplies. Considering power,
heating, cooling and longevity, the cluster nodes are not nearly
as robust as enterprise- class hardware. In the iSCSI file server,
only four 1TB spindles were allocated. Storage is adequate for
lab needs, but utilizing this minimum number of spindles
creates a performance problem in achieving adequate
throughput. The network is also limited by the 100 Mb
There is a barrier of faculty and staff expertise. While it is
difficult to argue with the benefits associated with
virtualization, it is also difficult to convince faculty who may
not be familiar with virtualization to convert their classes to the
95
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
new environment. Consider that a traditional lab setting with
well understood methodologies and idiosyncrasies is to be
replaced by an VMWare ESX cluster that must be remotely
managed and contains an internal virtual switch connecting the
VLANs housing the virtual machines. It is little wonder that a
faculty member may balk at taking on the extra challenge.
Systems administration staff members may also see an impact
as they are faced with the unexpected responsibility of running
the cluster.
possible. In addition to the fiscal advantages and disadvantages,
the faculty must seriously consider the educational experience
for the students. While virtualization may prove a cost-effective
means to delivering education and providing a research
platform, questions about the educational experience arise.
What curriculum is best experienced in a virtualized versus a
traditional hands-on environment? How do we prepare our
students for their post-academic careers that will be set in both a
hands-on and virtualized environments? How is it to be
supported? This paper’s scenarios provide guidance for these
discussions.
Department heads having a new line item added to the budget
may have to be convinced that virtualization, no doubt an
industry trend, is worthy of the expense. Thus, the deployment
and subsequent use of virtualized technologies may not live up
to the expectations or predictions of its proponents. However, if
the discussion is limited to desktop virtualization without
clusters or additional storage needs, it is our experience that
virtualization offers cost savings over deploying traditional
computer labs. At this point, the technological learning curve
has a modest slope that can be managed by most faculty.
8. REFERENCES
[1] Stackpole, B., “The Evolution of a Virtualized Laboratory
Environment,”
Proceedings of the 9th ACM SIGITE
conference on Information technology education Pages 243248, ACM Press 2008.
[2] Border, C., The Development and Deployment of a MultiUser, Remote Access Virtualization System for Networking,
Security, and System Administration Classes, Proceedings of
the 38th SIGCSE technical symposium on Computer Science
6. FUTURE WORK
education, p 576-580, 2007.
This paper considered the advantages and limitations of various
virtualized learning environments. Scalability beyond the issues
outlined in this paper will need to be considered. Other
universities are demonstrating success with this issue [10].
However, the advent of these virtualized environments leads to
additional opportunities to deliver curriculum to remote student
groups as well as opportunities to partner with remote students
on curricular and research experiences. In addition to scaling
access to university students, the private, low-cost ESX cluster
provides an opportunity to share resources with student groups
at universities around the world. Team-based experiences may
lend themselves particularly well this environment. Both local
and remote teams have an opportunity to configure, test and
analyze their own networks and systems in the virtualized
cluster and then engage for security defense and forensics
exercises.
[3] Holden, E., et al, Databases in the Cloud: a Work in
Progress, Proceedings of the 10th ACM conference on SIGinformation technology education, p 138-143, ACM Press
2009.
[4] Armitage, W., et al, Remotely Accessible Sandboxed
Environment with Application to a Laboratory Course in
Networking, Proceedings of the 8th ACM SIGITE conference
on Information technology education, 83-90, Destin, Florida,
October 2007.
[5] Hixon, E., Buckenmeyer, J., Revisiting Technology
Integration in Schools: Implications for Professional
Development, Computers in the Schools, Vol 26 Issue 2, pg.
130-146, 2009.
[6] Viatta.org. Avail: http://www.vyatta.org/poll/hypervisor
[Accessed 15 March 2013].
In addition, there is opportunity to use the virtualized
environment as a teaching tool itself. While there is ample work
being done in implementing systems and networks in
virtualized environments, little work is being done with
university students to learn about the architecture and
underpinnings of the virtualization systems themselves.
Students become high-level tool users and potentially suffer
from lack of understanding of the nuts-and-bolts of the
virtualized environment. Opportunities exist to work with
students to develop a deeper understanding of the systems and
therefore more effective and efficient use of those systems.
[7]
Amazon
Education
Grants.
Available:
https://aws.amazon.com/education/ [Accessed 15 March 2013].
[8] Stephen D. Burd, et al, Virtual Computing Laboratories: A
Case Study with Comparisons to Physical Computing
Laboratories, Journal of Information Technology
Education, volume 8 (2009), pp. 55-78.
[9] Kara Nance, Brian Hay, Ronald Dodge, Alex Seazzu, and
Steve Burd, Virtual Laboratory Environments: Methodologies
for Educating Cybersecurity Researchers, Methodological
Innovations Online, volume 4:3 (2009), pp. 3-14.
7. CONCLUSION
[10] Henry E. Schaffer, Samuel F. Averitt, Marc I. Hoit,
Aaron Peeler, Eric D. Sills,Mladen A. Vouk: NCSU's Virtual
Computing Lab: A Cloud Computing Solution. IEEE
Computer Society Jul 01, 2009
Many options exist for virtualization, from desktop VMs to
public or private-based clouds. The faculty must continue to
examine each of the virtualization scenarios based on research,
course and project needs. These requirements will dictate the
best solution and a one-size-fits-all solution may not be
96
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
How can we get our students to think while we help their work too?
Document based development
László MENYHÁRT
Department of Media & Educational Informatics, Eötvös Loránd University
Budapest, 1117, Hungary
and
Dr. Gáborné PAP
Department of Media & Educational Informatics, Eötvös Loránd University
Budapest, 1117, Hungary
high standard especially when creating specification, algorithms
and good testcases.
ABSTRACT
The education of programming for the informatics students on
the University must contain the whole process of the
development. According to our experience, though, the majority
of the students are only interested in creating an operative code
which is based on the wording of the task. In this article we
would like to present an intention that tries to solve this
problem. We highlight the preparation of specification and
algorithm as the main task from among the students’ tasks and
provide help to the other steps. The essence of the assistance is
an automatic code generation based on an algorithm; in
addition, if the student fixes the main items of the
documentation in a pre-prepared Excel workbook, the whole
documentation will be generated except the usage of the
program.
There were attempts earlier to make the students understand that
problem solving does not start with the coding but with thinking
the task over. The emphasis was on the specification and there
was a specification language defined with which the recognized
algorithm pattern can be briefly described. The program was
executed based on the specification with the help of an
interpreter. In this way the coding step (and sometimes also
creating the algorithm) was left out in this idea. [5]
Our focus is the algorithm from which the code will be created.
Of course the specification must be there because the data
definition (input and output) and the whole documentation is
based on this.
Keywords: Education, Algorithm, Code generation, Template,
Documents.
1.
2.
PROGFUNDCPPWIZARD
This is the new application kit which tries to help the students to
create their home assignments and maybe it can be the key to
their problem-solving.
INTRODUCTION
The aim of the introductory subject of teaching programming
for Software Development and Teaching Informatics BSc
programmes on the Eötvös Lorand Science University is not a
programming language but the teaching of the methodology of
the programming. This is meant as the whole process of the
software development. The aim is the preparation of a
functioning and well-documented program starting from the
composition of task, through creating specification and
algorithms, until coding and testing. [3], [4]
First view
The unpacked directory downloaded from [1] URL contains
four types of files. Note that this article was translated to
English but the application was created for our students in their
native Hungarian language! That is why it is available in
Hungarian only on the given URL.
ProgFundCppWizard_v1.0.20121017:
│ algorithm_HU_20121017.xls (2)
│ generate.bat (3)
│ template.doc (4)
│ XLS2CppConverter.jar (3)
│ _!_algorithm_of_problemsolving.txt (1)
│ _!_Read_me.pdf (1)
├─lib (3)
│
commons-beanutils-1.8.3.jar (3)
│commons-beanutils-bean-collections-1.8.3.jar(3)
│
commons-beanutils-core-1.8.3.jar (3)
│
commons-collections-3.2.1.jar (3)
│
commons-digester-2.1.jar (3)
│
commons-io-2.4.jar (3)
│
commons-jexl-2.1.1.jar (3)
│
commons-logging-1.1.1.jar (3)
│
dom4j-1.7-20060614.jar (3)
│
jxls-core-1.0.jar (3)
│
poi-3.8-20120326.jar (3)
Though in the home assignments complete documentation is
required and in this also the preparation of specification and
algorithm, but its creation is very interesting. First of all the
specifications are very deficient if they exists at all. It seems
that the algorithms are somehow trying to do some reverse
engineering from a functioning code. Sometimes the
documentation is only a shallow revision of the template
documentation and students leave in it some parts of the
samples.
This experience gave the idea of our article. The students take
tests in the programming fundamentals subject and create home
assignments about functioning programs and whole
documentation. We thought that if we help the students’ work
that they have to spend less time coding and the formatting, they
will have more remaining time for thinking and doing work of
97
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
│
poi-ooxml-3.8-20120326.jar (3)
│
poi-ooxml-schemas-3.8-20120326.jar (3)
│
xmlbeans-2.4.0.jar (3)
└───template (3)
generated.h (3)
main.cpp (3)
PROJECTNAME.cbp (3)
do not have to do extra work. The final step is the customization
of the documentation because we cannot write the running
information, screen shots and the final content update into the
documentation automatically.
The usage of this wizard is helped by a short introduction
(_!_Read_me.pdf) and a short “sentence-like algorithm”,
pseudo-code
in
a
text
file
The information of each topic has to be defined on eight
worksheets.
A more detailed introduction of the Excel workbook
The worksheet Basic contains the given information of the
task, the environment, the creator and the documentation.
(_!_algorithm_of_problemsolving.txt).
First
the
Excel
workbook
must
be
opened
which helps the analysis of
the problem to be solved and the algorithm of the solution can
be written into this, too.
(algorithm_HU_20121017.xls)
After this (when we finished the analysis and creating the
algorithm and finally we closed the Excel) we can generate a
C++ code from the algorithm. The generate.bat script must
be called for generation with two parameters where the first
parameter is the name of the Excel file, the second parameter is
a path to where the Code::Blocks project will be created. The
source codes in this folder can be modified on request, but it is
also necessary to define the input data as constants or to
implement the reading.
A new algorithm.xls is generated in the new directory
whose first sheet named Basic has a button with „Update
Document” title. After clicking on this the first version of the
documentation will be created based on the template.doc.
This new documentation must be customized. We must not
forget to allow the usage of the macros.
Figure 1: Information on the Basic worksheet
The title, a short identifier and the description of the task have
to be given. The filenames will be generated from the short
identifier so it is worth having it in lowercase and digits.
After one month development, at this stage of the study the
handling of the types and the expressions in the algorithm is
rather limited and requires further development. So we do not
regard these insufficiencies as mistakes but as necessary
development steps. Any lists of further needs are welcome so
that we can continue the development based on that. In this first
step we test the support and the practicability of the idea.
The environment is about the operating system and the
development environment.
The name, identifier and availability can be given about the
creator.
The identifier of the generated document can be stored for the
documentation where it is worth again to keep to being
lowercase and digits.
More detailed steps of the usage
The steps which must be done from the interpretation of the task
to
the
documentation
can
be
read
in
the
_!_algorithm_of_problemsolving.txt file.
The understanding of the task is helped by the following four
worksheets which contain the four parts of the specification.
The names of the input data and its types have to be defined on
the sheet Input. It is made to initialize the variables and to
define constants.
We continue the whole problem solving and repeat its steps
until we decide that its preparedness – the source code and the
documentation – is satisfactory enough.
The first step is the interpretation of the task, the specification.
The second step is creating the algorithm. To this we give an
Excel sheet to the students as help. Its detailed description is
available in chapter 2.3. After the students have filled in the
first six sheets out of the eight sheets, they must have a
comprehensive view about the problem and its solution.
Figure 2: Data on the worksheet Input
The restricting information of the input data can be defined in
the first column on the sheet PreCondition. It is not used by
the generator which must be paid attention to at the
customization of the code. However, this will get into the
documentation.
At this stage the student can decide whether he encodes the
algorithm or he uses the helping generator. Its description can
be read in chapter 2.4. After the coding or customization of the
generated code the remaining two Excel sheets can be filled
with the missing information.
As the next step, this prepared template documentation can help
to copy the information from the Excel sheet so that the students
98
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Figure 3: Sample on worksheet PreCondition
Figure 7: The worksheet Testing
Variables and types of the output data can be defined on the
sheet Output.
Finally the possible developments can be written into the cells
of the first column of the worksheet Improvement.
Figure 4: The worksheet Output
Figure 8: The worksheet Improvement
Some cells in the first column of the sheet PostCondition
store the statements about the output data which will be true
after the execution of the algorithm. These are not used by the
generator either so the algorithm must look after this
information. The documentation will also contain these rows.
Detailed information about the generator and the generated
code
Run the generate.bat to start the generator. It has two
parameters. The first one is the name of the Excel file. The
second one is the name of the basic folder where the
Code::Blocks project will be generated.
Figure 5: The worksheet PostCondition
The generator is implemented in Java and it uses function
libraries from Apache Group POI project [7]. These required
libraries can be found in the lib folder.
The name and the parameters of the generated function must be
defined on the next worksheet Algorithm. The first line in
Figure 6 shows how. One cell is for one parameter, its type and
direction (input or output) does not need to be defined because
the generator can decide this from the specification namely
from the sheets Input and Output. We can mark them to
ourselves which variables are inputs or outputs. For example
with the following background colors green ([gri:n]) will
be Input and blue ([blu:] will be oUtput. If needed,
extra parameters can be defined in the same way as on the
worksheet Input. The algorithm is the next. Tabulators i.e. the
empty cells must be used because of the better legibility and the
right generation. For example the usage of “end loop” is not
needed because it is obvious from the empty cell whether the
following command is on the loop or not. In this way closing
the loop is made by the generator.
The generator uses the filled Excel and pre-prepared
Code::Blocks project in the template folder as input. It
creates a new folder in the basic folder deriving from the second
parameter. Its name will be composed from the short identifier
from the second parameter and from a timestamp. So the
generated source codes will be under version control.
The short identifier will be the name of the project and the name
of the Code::Block project file (cbp) too. The source code
will also be generated.
Figure 9 part 1: Generated codes (main.cpp)
Figure 6: The worksheet Algorithm
The user can write the results of the tests on the worksheet
Testing. These rows will be part of the documentation also.
99
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Students can learn from this and they can find the right position
in the algorithm.
During the generation the algorithm and the source code will be
produced as a large text which can be written back to a hidden
worksheet in the Excel from where it will be copied into the
documentation. That is why the document generation must be
started from the Excel in the versioned folder.
The template of the documentation
The template of the documentation is based on the sample
documentation of the home assignments in the subject
Programming Fundamentals. We introduced the % (per cent)
mark to indicate the variables in the documentation. The
information from the Excel will be copied in these positions in
the documentation.
Figure 9 part 2: Generated codes (generated.cpp)
The declaration of variables and the function calls will be
generated into the main.cpp. In addition we warn the students
in comments not to forget to implement the reading input and
writing output in case of necessity. If there is no input
definition, the program will stop.
Figure 10: The template of developer documentation
We indicate to the students with red “Update it!” text what the
automatic generation cannot be filled in.
The generated.h file will contain the header of the function
which implements the algorithm. The implementation of the
algorithm will be generated into the generated.cpp file. It is
in a separate file in case it is needed to be regenerated from a
modified Excel. So copying generated.cpp file is enough and
customization is not required again in the main.cpp.
Comments in the generated source code will contain the
algorithm, so when debugging, the algorithm can be read.
The format is the same after copying so fortunately a wellreadable, formatted documentation is generated when we set the
tabs, font family and font size in the lines of %ALG%
(algorithm), %SOURCE% and %TEST%.
100
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
for defining the data because it makes the students’ work more
difficult and they will not use this help and they follow the same
low level method.
A structogram or a pseudo code?
We teach structogram to describe the algorithm in the
Programming Fundamentals subject. The reason for using this
tool during the education of programming mathematicians and
informatics students is its simplicity and obviousness. And now
we still ask for a pseudo code. But why? We use a pseudo code
in teachers training and in the informatics education in
secondary schools because it is closer to the native language, it
is more easily understandable for the students than the
structogram, but it is also obvious while keeping some rules.
We think that using both algorithm defining methods should be
known by the future experts. Here the most important thing is
that thinking should be the first and coding should be the next.
There should not be coding without designing. The tools of
designing should be irrelevant.
Figure 11: Formatting the algorithm and the source-code in the
template
It is also used at the test documentation.
Figure 12: Formatting test information in the generated
documentation
On the other hand if somebody would like to generate only a
source code from an algorithm, a structorizer application can be
used. [5] A structogram should be defined in this application
and we can choose which programming language and source
code (e.g C or Pascal) would be generated. The aim of
ProgFundCPPWizard is more than an automatic code
generation. It is a key and help for coding and documentation.
We must click on the „Update Document” button on the
worksheet Basic in the versioned Excel to get the filled up,
half-ready documentation from the template of the
documentation.
First – in case of unsuccessful generation – the configuration of
Macros might be needed. To reach Word documentation from
the Excel must be set in the VisualMacro also known as
Microsoft Visual Basic for Applications. It can be set in the
submenu References of Tools menu. Here the up-to-date
version of the function library must be chosen for handling
Word documents. We set Microsoft Word 12.0 Object Library
which is compatible with the next versions and it does not
require any other configuration.
Could the automatic code generation have the effect that the
students will not learn to write source codes?
Certainly coding should not be forgotten about in education
since the implemented algorithms can be tested and through this
students see their own code working. So they can get a sense of
achievement. That is why our assistance should not be offered
at the beginning of the semester, but only when they have
already made codes in several programs and home assignments.
It is necessary to have classes during which students can
practice coding, and midterm papers are also required not to
overshadow it.
Problems, limitations and development possibilities
It might happen that a problem has one specification and more
functions, for example Backtrack. Now it can be handled with
three tables, three specifications and three algorithms. Namely it
can be reduced to three other easier problems. But it is a
development facility that a project could be generated from
more Excel.
Later, when students are able to make codes, we can show them
the automatic code generation to enhance their recognition how
important it is to create a good algorithm. Of course a code can
be generated from an incorrect algorithm when they can see that
the program does not work and maybe they will modify it.
Since we lay emphasis on the harmony of the algorithm and the
code, students must correct the algorithm. In this way they have
a chance to check their algorithm as they can easily do it with
another automatic code-generation. Moreover, we tried to show
this bound by putting a line of algorithm into the comments of
the code.
Now the generator manages only simple types but not all of
them. So this development must be carried out anyway because
there are a lot of problems where we use resolving arrays.
3.
QUESTIONS AND ANSWERS
During our design and the implementation of this type of help a
lot of questions came up in our mind, as well. We answer some
of these here.
4.
Why should I write the initiation of the documentation in
Excel instead of Word?
EXPERIENCE OF USAGE
Before writing this paper we wanted to ask the students to
evaluate our work. First we were interested those students’
opinions who have already finished the Programming
Fundamentals subject. We created a list of queries via Google
form which was available and answered on the URL [2]. Then
we evaluated the answers. We did not expect the students to
give their names so that their answers would be more objective.
Practically, from the students’ point of view it does not matter,
to which application the most important parts of the
documentation will be written. But it is relevant to the
generator. The parts of the documentation are separated with
good structure on worksheets. There is a template that shows
what information should be placed in each cell. From this, Excel
can generate the source code and the documentation. Of course
it must be an aim that there should not be too many restrictions
101
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
The questionnaire
The questions were divided into two groups. First we asked
about the past that is how the home assignments were created
while completing the subject. Next we gave them the
ProgFundCppWizard with a user manual to test it and we asked
them about their impressions.
Questions about the home assignments
Programming Fundamentals subject
1.
2.
3.
of
3.
4.
the
How many hours did you spend making the home
assignment?
What percentage of the time was used for making an
algorithm A= , creating the code C= and writing
the documentation D= ? If its sum is not 100, what
did you do in the remaining time?
What was the order of making the following parts:
algorithm (A), coding (C) and documentation (D)?
5.
6.
7.
Questions about testing the ProgFundCppWizard
8.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
What do you think about this idea? ( It is useless / It is
good but the application is very labor-consuming / It
is good / It is very good)
Do you think that it helps improving the importance
of making an algorithm? (No / Partly / Yes)
Do you think that it helps making documentation?
(No / Partly / Yes)
Do you see a danger in it if this application is used by
the students? (Free text)
Is it confusing that the algorithm must be prepared
first? (Yes / No)
Would you have used this tool if you had had the
chance to use it during completing the subject? (Yes /
No)
How do you feel, would you have saved any time
with this tool when completing your home
assignments? (The home assignment would not have
been completed. / It would have caused delays./ No /
Little / Much)
What kind of mistakes did you find in the application?
(Free text)
What kind of improvements would you suggest? (Free
text)
Other observations: (Free text)
9.
10.
11.
12.
13.
We are glad that the few respondents found our work useful and
the message about the importance of the algorithm came
through. We are confident that the ProgFundCppWizard
application will be more interesting for the students who are
learning the subject than for those who have completed it.
5.
We sent our request to 2-300 students who have completed the
Programming Fundamentals subject and we asked them to test
and evaluate our education helper kit. Testing and filling the
survey would have taken only 20-30 minutes. We gave about
one and a half weeks for this. The reaction was typical of the
students. We got only 13 valuable answers.
2.
REFERENCES
[1] http://xml.inf.elte.hu/ProgAlapCppVarazslo_v1.0.2012
1017.zip, 2012.
[2] https://docs.google.com/spreadsheet/viewform?formke
y=dGxHdldudWZDUElTTXNhdDlFWXpfc0E6MQ, 2012.
[3] E.W. Dijkstra, A Discipline of Programming,
Prentice-Hall, Englewood Cli_s, 1973.
[4] P. Szlávi, L. Zsakó, Módszeres programozás:
Programozási bevezető, 18. Mikrológia, 2008.
[5] http://structorizer.fisch.lu/
[6] Sz. Csepregi, A. Dezső, T. Gregorics, S. Sike,
Automatic Implementation of Service Required by
Components, Workshop on Property Verification for
Software Components and Services ,PROVECS 2007,
http://lina.atlanstic.net/provecs/2007/provecs2007proceedi
ngs.pdf
[7] http://poi.apache.org/
The evaluation of the questionnaire
1.
time was spent on documentation (between 10 and
60%). They mentioned debugging, formatting
documentation, looking for information as actions in
the rest of the time.
25% of students confessed that they started the work
with coding. Everybody left the documentation to the
end.
15,4% of the responders did not see the sense of it,
whereas the same number of them think it is very
good. 30,8% think it is good, and according to 38,5%
it is good but very labor consuming.
Nobody said that importance of making algorithm is
improved by this tool, but according to 61,54% of
responders it is only partly.
According to 7,7% creating documentation is not
helped by this but the others are divided in 46,15%46,15% as it is help or partial help.
Students mentioned the following: it is changing for
better; harmless; they will think less; they will not
learn coding; Excel table is not good for everything.
Only 15,4% of responders said that creating the
algorithm first is a difficulty.
69% of the responders would have used this aid.
Regarding the question about saving time 15,4% of
the students would have saved much time but the
same number of them said they would have had
delays. Others would have saved little time but
everybody would have been ready.
Errors were not indicated.
As improvements a Graphical interface instead of
Excel, fewer steps and the integration of a
structogram were mentioned.
This new application would be useful. The rest of the
answers were about the subject in general. More
specifically, students indicated it would be better if
two separate subjects contained the education of
making algorithms and coding.
They completed the home assignment within 17,5
hours in average. There was somebody who spent 90
hours completing the task, but somebody spent only
half an hour.
26,41% of their time was spent on the algorithm
(between 5 and 60%), 40,56% of the time was spent
coding (between 28 and 85%), and 32,65% of the
102
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Providing Access to a Culturally Diverse Special Education Doctoral Program
through Educational Technologies
Patricia Peterson
Educational Specialties Department
Box 5774
Northern Arizona University
Flagstaff, AZ 86011
United States
928-523-4005 Phone
928-523-1929 Fax
patricia.peterson@nau.edu
Abstract: The LEAD doctoral program
funded by US Department of Education is a
blended program of online distance
education courses during the academic year
and on-site courses during the summer to
overcome traditional residence only
doctoral program access barriers. Using
technology of Web courses, video
conference, Google Hangouts, and BBLearn
Collaborate, the doctoral program is
accessible to students in many locations
rather than only in residence students. The
special education focus is in Culturally
Linguistically
Diverse
Exceptionaleducation (CLDE). Six LEAD doctoral
students graduated in December 2012 and
are now university faculty who teach and
conduct research in the CLDE area.
30% of the university faculty position vacancies in
special education go unfilled (Smith et al., 2001). In
addition, Smith et al. (2001) report that since 1992,
although the number of faculty vacancies has not
changed, the pool of applicants to fill these vacancies is
much smaller today. In special education, 255 doctorates
are conferred annually, but over 50% (130) of these
doctoral graduates do not become employed as faculty
members or are only in faculty positions for a short time
(Smith et al., 2001). Smith et al. (2001) found the severe
lack of special education faculty has a direct impact on
the ability of teachers to provide high quality services to
students with disabilities.
Culturally and Linguistically Diverse
(CLD) Faculty Need
By 2020, the number of culturally diverse
children ages 6 – 16 will have increased to 20% Hispanic,
17% African American, 5% Asian, and 2% Native
American (Futrell, Gomez, &
Bedden, 2003). In
contrast, Futrell et al. cite the percentage of culturally
diverse university faculty as only 5%. Focusing on the
need for more Hispanic and Native American faculty, the
National Center for Education Statistics (NCES) reports
in 2001 that there were only 3.3% Hispanic and .7%
Native American full-time instructional faculty and staff
at U.S. colleges and universities. The Digest of Education
Statistics (NCES, 2000) also reports a lack of doctorates
conferred for CLD persons with only 3.2% of all doctoral
degrees in 1998 for Hispanics and .5% for Native
Americans. Clearly more CLD doctoral students and
faculty are needed to increase the diversity in higher
education compared with the growing numbers of diverse
students in the school-age population. Related to the field
of special education, comparatively few Hispanic and
Native American students are receiving doctoral degrees.
For example, in Spring 1998 Smith and Tyler (1998)
Key Words: cultural diversity, special
education, educational technologies, rural,
doctoral program
Shortage of Special Education
Faculty
A shortage of special education faculty in U.S.
universities exists who are available to meet the demands
of preparing special education teachers, implementing
research which leads to improved practice, and
developing 21st century policymakers and administrators
(Dil, Geiger, Hoover, & Sindelar, 1993; Pierce, Smith, &
Clark, 1992; Sindelar, Buck, Carpenter, & Watanabe,
1993; Smith, Pion, Tyler, Sindelar, & Rosenberg, 2001;
Smith & Salzberg, 1994). The demand for faculty in
special education in the United States is greater than the
current supply of doctoral level persons available, and
103
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
report only 8 Hispanics received a doctorate in special
education. Out of 1,015 students enrolled in special
education doctoral programs, only 46 were of Hispanic
background (Smith & Tyler, 1998). As of 2003, less than
20 Native Americans hold doctorates in special education
(R. Gilmore, personal communication, January 20, 2003).
It is important to increase the numbers of Hispanic and
Native American faculty in special education so that they
can effectively address diversity issues as well as provide
mentorship to Hispanic and Native American future
teachers who will in turn teach students with disabilities
from Hispanic and Native American backgrounds
(Dieker, Voltz & Epanchin, 2002; McSwain, 2002;
Obiakor, 2001).
Many potential Culturally and Linguistically
Diverse (CLD) doctoral students in the Southwest live in
rural and remote areas where there is no university
doctoral program available. A barrier is the difficulty in
giving up jobs and relocating into a full-time doctoral
program at a reduced student stipend. Most students have
family responsibilities which preclude their participation
because of the relocation necessary to attend full-time
programs combined with their ongoing financial
obligations. The LEAD program provides a unique
combination of online distance education courses during
the academic year and on-site courses during the summer
to overcome these traditional doctoral program barriers.
Using technology in the form of Web courses, video
conference, Google Hangouts, and BBLearn Collaborate,
the doctoral program is now accessible to students in
many locations rather than only in residence students.
Rural Need
The national shortage of special education teachers
and general education teachers with training in special
education is especially critical in rural areas (Westling &
Whitten, 1996). Many individuals familiar with these
types of classrooms (individuals from the community)
lack the resources and accessibility to courses needed to
obtain their special education teaching certificate. Izzo
(1999) reported that 1/5 of all rural special education
teachers will leave their jobs annually to pursue
employment in larger districts and communities.
Few teacher education programs focus on the
preparation of teachers for rural and remote areas
(Eigenberger, Sealander, Peterson, Shellady, & Prater,
2001; Helge, 1984; Helge, 1991; Heimbecker, Medina,
Peterson, Redsteer, & Prater, 2002; Peterson, Medina,
Gilmer, Prater, & Stemmler, 2002). According to Solop
and Hagen (1999), while 42% of special education
administrators felt recruitment/retention of special
education teachers was a significant problem, rural school
district administrators were more likely to cite this as the
primary problem than were urban administrators. Over
60% of special education administrators indicated
universities were not producing enough certified teachers
to meet the demand for existing and new special
education teaching positions. With predictions of even
more serious teacher shortages in the next several years,
there is critical need for additional special education
teachers for CLDE students in rural areas (Medina,
Peterson, Showalter, & Gilmore, 2003; USDE, 2002). In
order to meet this need, more special education faculty
must be trained in doctoral programs, so that they in turn
can increase the supply of highly qualified rural special
education teachers who can serve CLDE students in rural
and remote areas.
Technology
and
Distance
Education :
Challenges and Solutions
Challenges: Many potential doctoral students
cannot afford to give up their full time jobs and relocate
to a university in a different area. In addition, many
students are not comfortable and proficient in taking
Web-based courses even if they were made available to
them.
Solutions: LEAD students can continue in their
full time jobs while taking Web-based courses during the
academic year. LEAD students take two Web-based
courses each academic year semester and then come to
the Flagstaff campus for four on-site courses in the
summer.
A WebCT tutorial was developed for the
students and delivered the first day of web classes during
the orientation meeting. During this orientation, all
students also had the opportunity to meet with the head of
distance learning for the Cline Library to discuss webbased research procedures, interlibrary loans, electronic
data, and other subjects pertinent to their coursework and
research topics. In addition, all students received the
Endnotes computer software program as well as training
on its use to facilitate their scholarship and research.
Eight doctoral level web-based CLDE courses
were developed, designed, and taught . All the students
received a Technology Handbook as well as the in person
tutorial training for the WebCT and BBLearn. In this
way, the students could ask any questions to be sure they
were comfortable working within the electronic medium
and also have a guidebook to refer to as other questions
came up. In addition, the Technology Facilitator is
available 24/7 to assist students with any distance
education and technology issues. During the summer, the
Technology Facilitator delivers in-person seminars on
topics such as Constructivism and Technology, Utilizing
Web-based Resources, and Teaching Web-based
Courses.
Other technology approaches focused on new
systems such as Elluminate, BBLearn Collaborate, and
Leaders in Exceptional-education
Addressing Diversity (LEAD)
Training Program Description
104
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Google Hangouts. These technologies provided ways to
have Hybrid or Blended courses with the face to face
component using a technology-assisted approach and the
Web component using online BBLearn. Through Google
Hangouts the courses could reach ten sites where the
doctoral students could see the classroom, view speakers
who were live or on video, and interact effectively with
the faculty member and other students. The Hybrid
courses became very popular, because they included the
best of both worlds. They provided the feeling of a face
to face class but the convenience of staying at the
students’ rural sites and providing interaction throughout
the course on the BBLearn Web portion also.
[4] Futrell, M. H., Gomez, J., & Bedden, D. (2003).
Teaching the children of a new America: The
challenge of diversity. Phi Delta Kappan, 84 (5),
381–385.
Outcomes
As a result of utilizing technology to recruit
students, deliver courses, communicate between research
mentors, dissertation committees, and the rural doctoral
students, all six LEAD doctoral students graduated in
December 2012. Four of the six dissertations were
qualitative and required more time and distance
technology communication with the doctoral committees.
All six of the graduates are employed in leadership
positions in special education in January 2013. Three
have full time positions as faculty at universities in
special education. The other three students are part-time
faculty in Spring 2013, but they are seeking full time
faculty positions for Fall 2013 when the academic year
begins. Utilizing a “technology assisted culturally
responsive” approach to this doctoral program was the
key to success of these doctoral students. They have a
unique combination of expertise in special education,
culturally linguistically diverse exceptional students,
research methods, effective use of technology in
education, and curriculum and instruction methods in
higher education. However, without the utilization of a
technology-assisted approach for their doctoral studies,
they would not have had access to the doctoral degree.
[7] Helge, D., (1991). Rural exceptional, at risk. Reston,
VA: Council for Exceptional Children.
[5] Heimbecker, C., Medina, C., Peterson, P., Redsteer,
D., & Prater, G. (2002). Reaching American Indian
special/elementary educators through a partnership
with a Navajo Nation School District. Phi Delta
Kappan, 23, 373-378.
[6] Helge, D., (1984). The state of the art of rural special
education. Exceptional Children, 4, 294-305.
[8] McSwain, A., (2002). The effects of multicultural
and bilingual training on preservice students’ selfreported level of competency. Multiple Voices, 5, (1)
54-65.
[9] Medina, C., Peterson. P., Showalter, S., & Gilmore,
R. (2003). Alternative pathways to teacher
education: Building successful rural multicultural
partnership programs. Journal of Innovations in
Higher Education. 17, 33-34.
[10] National Center for Educational Statistics (2000).
The Digest of Education Statistics. Washington,
D.C.: U.S. Department of Education, Institute of
Education Sciences.
[11] National Center for Educational Statistics (2001). A
Guide to Today’s Teacher Recruitment Challenges.
Washington, D.C.: RNT, Inc.
[12] Obiakor, F. E., (2001). Multicultural education:
Powerful tool for preparing future general and
special educators. Teacher Education and Special
Education, 3, 241-255.
References
[1] L. Dieker, L., Voltz, D., & B. Epanchin, B., (2002).
Report of the Wingspread Conference: Preparing
teachers to work with diverse learners. Teacher
Education and Special Education, 25 (1), 1-7.
[13] Peterson, P., Medina, C., Gilmer, J., Prater, G., &
Stemmler, K. (2002) Changing the face of teacher
preparation: Developing rural exceptional-educators
to address multicultural students. Journal of
Borderwalking, 5, 53-64.
[2] Dil, N., Geiger, W., Hoover, J.J., & Sindelar, P.T.
(1993). Available special education faculty positions
in higher education. Teacher Education and Special
Education. 16, 230-239.
[14] Pierce, T.B., Smith, D.D., & Clark, J. (1992).
Special education leadership: Supply and demand
revisited. Teacher Education and Special Education,
15, 175-182.
[3] Eigenberger, M., Sealander K., Peterson, P., Shellady,
S., & Prater, G. ( 2001) Challenges facing teacher
educators in rural, remote and isolated areas: Using
what we know and what we have learned. Rural
Special Education Quarterly 20 (1/2), 13-21.
[15] Sindelar, P.T., Buck, G.H., Carpenter, S., &
Watanabe, A.K. (1993). Supply and demand of
leadership personnel in Special Education: A
follow-up study with analysis of failed searches.
105
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Teacher Education and Special Education, 16, 240248.
[16] Smith, D.D., & Salzberg, C. (1994). The shortage of
special education faculty: Toward a better
understanding. Teacher Education and Special
Education, 17, 52-61.
[17] Smith, D.D., Pion, G., Tyler, N. C., Sindelar, P.T., &
Rosenberg, M.S. (2001). The shortage of special
education faculty: Why it is happening, why it
matters, and what we can do about it. Washington,
D.C.: U.S. Department of Education, Office of
Special Education Programs Division of Research to
Practice.
[18] Smith, D.D., & Tyler, N.C. (1998). The doctoral
pipeline: It’s ebb and flow. OSEP Leadership
Conference Monograph.
[19] Solop, F.I., & Hagen, K. (1999). Special education
personnel needs survey. Flagstaff, AZ: Northern
Arizona University.
[20] U.S. Department of Education (2002). Designated
Teacher Shortage Area. Available http:
http://www.ed.gov/offices/OPE/Students/repayment/
teachers/tsa.html [2002].
[21] Westling, D.L. & Whitten, T.M. (1996). Rural
special education teachers' plans to continue or leave
their teaching positions. Exceptional Children, 62 (4),
319-335.
106
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
A User-selectable Obscuration Framework to Censor Digital Videos for
Children and Adolescents
Jiayan GUO, David LEONG, Jonathan SIANG, and Vikram BAHL
School of Infocomm, Republic Polytechnic, Singapore
storyline of the film. Such harmful content is still
accessible to the viewers. The children thus are exposed to
a vast amount of inappropriate media content.
ABSTRACT
There is an increasing concern from parents, educators
and policy-makers about the negative influence that
digital media exerts on children and adolescents. Such
concerns have fueled a growing need to effectively filter
potentially harmful content. However, existing
technologies have limited ability in allowing users to
adjust the filtering levels, or generating seamless cutting
results. To tackle this limitation, we propose a framework
which empowers parents and teachers to censor movies
and TV shows according to their level of acumen and
discretion. Such framework helps parents and teachers
protect children and adolescents against obscene content.
In particular, our framework enables parents and teachers
to sanitize movies and TV shows by skipping over
specific objectionable scenes. Moreover, the framework
can blur out the unsavory objects in the scenes, so that the
integrity of the storyline can be preserved. Technically, it
utilizes the non-rigid object tracking and video masking
techniques to blur out the unwanted object. Instead of
physically altering the original videos or making
replicated copies, our framework keeps the original video
unscathed by applying the censorship to the video during
playback. We conducted evaluations on the challenging
real-world video sequences. The experimental results
demonstrated effectiveness of the proposed framework.
According to the Singapore Censorship Review
Committee 2010 report [2], parents are encouraged to take
responsibility to protect their children against the negative
aspects of media proliferation. In order to guide their
children on digital media consumption, parents have to be
empowered with effective tools to filter sex, violence and
profanity out of the digital media. However, existing tools
have limited capabilities to effectively block potentially
harmful content. Presently, ClearPlay and MovieMask are
the two forefront computer programs that cleanse movies
containing offensive scenes. Their technologies are built
onto stand-alone DVD players and other video devices.
While both can mask objectionable content, their technical
operations and capabilities are considerably different.
Specifically, for ClearPlay, users have to download two
components, including the software and a filter associated
with a particular DVD movie. The filter can guide the
DVD player to mute dialogues or skip scenes during
playback of the corresponding movie. Such filter is predefined, and users cannot customize it according to their
needs. In contrast, MovieMask allows users to personalize
the blocking of harmful content. Technically, it first lets
users select the edited scenes, and some
graphics/
animations. It then censors the movie by
overlaying the graphics/
animations onto the selected
scenes. However, this technology affects the integrity of
the original movie. The resultant censored movie would
be jagged, and the scene-to-scene cuts are noticeable.
Keywords: Video Censorship, Non-Rigid Object
Tracking, Mean Shift, Scale and Orientation Adaptive,
Video Masking.
1. INTRODUCTION
Motivated by above observations, we propose a novel
framework to facilitate parents and teachers to censor the
movies and TV shows. The framework enables parents
and teachers to select the obscuration according to their
level of acumen and discretion. With our framework,
parents and teachers can sanitize the movies and TV
shows by skipping over specific scenes that contain nudity,
sexual situations and excessive violence. Moreover, our
framework can also be used to blur out the unsavory
objects in the scenes, which is effective to preserve the
continuity of the storyline. Take the painting scene in
"Titanic"with Kate Winslet posing nude as an example,
our framework allows users to pause the video in the
current frame and select her body as the target area to be
blurred out. It then automatically tracks the target area
throughout the video based on the non-rigid object
tracking technique. After the target area is located, our
With the rapid development in information technology,
children and adolescents have unprecedented access to
digital media. Given the double-edged sword digital
media has become, parents, teachers and policymakers
have concerns about the negative impact that digital media
exerts on children and adolescents. Many parents believe
that digital media is a major contributor to young people’s
violent or sexual behaviors [1]. This leads to a growing
need for digital media content regulation and censorship.
However, current censorship is mild and insufficient. It is
only applied to a small number of films or TV shows that
have explicit sensitive or offensive content. Over the last
three years, out of 2,351 films classified, only nine films
(0.4%) were censored. Many violence and sexual scenes
are still allowed if they are relevant to the theme and
This work was supported by grant MOE2011-TIF-1-G-019from the
Ministry of Education, Singapore.
107
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
framework applies the video masking technique to blur
out the target area in every frame it appears. Finally, the
censored video is presented to user during playback.
Different from existing sanitizing tools, such as
CleanFlicks1 and Family Flix, our framework does not
physically alter the original videos or make alteration
copies. The censorship is only applied to the video during
the video playback. That is, the original video remains
untouched and thus does not violate any copyright issues.
ask them to seek the objectionable scenes. The users can
pause the video and select the unsavory object in the
current frame as a target area (also known as Region of
Interest). We then employ a non-rigid object tracking
algorithm to find the target area throughout the video.
Afterwards, a video masking technique is utilized to blur
out that target area throughout the frames covered. Finally,
we play back the censored video to the users.
In this paper, we present the following three contributions:
Firstly, our framework empowers parents and teachers to
filter harmful content out of movies or TV shows based on
their own standards and preferences. Secondly, the nonrigid object tracking and video masking techniques in our
framework facilitate users to blur out the unsavory
objects. In particular, the non-rigid object tracking
technique outperforms the current state-of-the-art
approaches. It has low computational complexity and is
easy to be implemented. In addition, it is capable of
handling large variety of objects with different
color/
texture patterns, being robust to partial occlusions,
significant clutter, target scale variations, rotation in depth,
and changes in camera position. The video masking
technique is employed to blur out the objectionable target
area. It is not only effective in blocking unwanted gore
and salacious content for young viewers, but it preserves
the veracity of the entire film, leaving its artistic vision
intact. Lastly, since our framework does not physically
alter the original videos or make modification copies, it
does not infringe on any copyright law.
The rest of the paper is organized as follows. Section II
provides a brief overview of our framework. The details
of the non-rigid object tracking algorithm used in our
framework is elaborated in Section III. In Section IV, the
video masking is described in detailed. Section V provides
a snapshot of our framework and reveals the experimental
results. In addition, our non-rigid object tracking
algorithm is compared against two popular tracking
algorithms. We evaluate the experimental results we have
obtained. Finally, we conclude this paper in Section VI.
Fig. 1. Procedure of blurring unsavory objects in the scenes.
In the next two sections, we will discuss the non-rigid
object tracking algorithm and video masking technique.
3. NON-RIGID OBJECT TRACKING ALGORITHM
Object tracking is a fundamental but challenging task in
the field of computer vision. There are sources of
uncertainty in tracking the real-world videos that render it
a highly non-trivial task, such as complex scene
clustering, partial/
full occlusions, non-rigid object
deformation, and illumination change. A number of
algorithms have been proposed to overcome these
difficulties. Among various tracking algorithms, the mean
shift algorithm is well-known due to its simplicity and
efficacy. The mean shift algorithm was firstly developed
by Fukunaga and Hostetler [3] for data analysis. It was
later introduced into the field of image processing by
Cheng [4]. Comaniciu et al. [5] had successfully applied
the mean shift algorithm to object tracking. However, in
the classical mean shift tracking algorithm [5], the
estimation of target scale and orientation changes was not
solved. Bradski [6] further modified the mean shift
tracking algorithm and developed the Continuously
Adaptive Mean Shift (CAMSHIFT) algorithm. The
moment of the weight image determined by target model
2. OUR FRAM EW ORK
Our framework aims to filter the potentially harmful
content out of videos according to the preferences of
parents and teachers. The filtering can either be skipping
over the objectionable scenes, or blurring out the unsavory
objects in the scenes.
To skip over objectionable scenes, we first segment the
videos into frames, and ask the users to seek some frames
as the potentially objectionable scenes. The videos are
then censored by removing the objectionable scenes, and
shown to users during playback. Such skipping may affect
the continuity of the video storyline. To enhance the
censoring, we resort to the filtering strategy of blurring
unsavory objects in the scenes. We illustrate the blurring
strategy in Fig.1. The strategy consists of four steps. We
first invite the users to watch the movie or TV shows, and
1
found to be illegal by a 2006District of Colorado court ruling.
108
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
+ˆ ( y ) , +[ pˆ ( y ), qˆ ] ! $ u !1 pˆ u ( y )qˆu
is used to estimate the object scale and orientation.
Although it is not robust, it could handle various types of
object movements in real time. Many tracking methods
were proposed to tackle the problem of target scale and
orientation estimation. By exploring the relativity of the
weight image and the Bhattacharyya coefficient between
the target model and candidate model, Ning et al. [7]
proposed a method to determine the scale and orientation
of the target object. Zivkovic and Krose [8] employed the
EM algorithm to estimate the position and the covariance
matrix that can describe the shape. Collins [9] adopted
scale space theory [10] to estimate the scale of the target.
Unfortunately, it cannot handle the rotation changes of the
target, and the computational cost is also very expensive.
m
candidate locations. The new target position ŷ1 is
calculated to be a weighted sum of pixels contributing to
the model.
% yˆ 0 # xi 2 &
$ i !1 xi wi g '' h ((
)
*,
(5)
yˆ1 !
2
% yˆ 0 # xi &
nh
$ i !1 wi g '' h ((
)
*
qˆu
m
.
(6)
wi ! $ u !1 " [b( xi ) # u ]
pˆ u ( yˆ 0 )
where g ( x) ! # k -( x) is the negative derivative of the
nh
M ean shift tracking algorithm
In object tracking, a target model is typically defined by
an ellipsoidal region or a rectangle surrounding a region of
interest in the image. Color histogram is widely employed
to represent the target model because of its robustness to
partial occlusions, invariance to scaling and rotation, and
low computational cost. The pixel location of the target
*
model is denoted by {xi }i !1...n , which is centered at the
origin point and have n pixels. The probability of the
feature u (u=1,2,… ,m) in the target model is computed as
n
where
kernel profile.
Scale and orientation estimation
For the target scale and orientation estimation, the
moment of the weight image is used. The weight image is
corresponding to wi . The mean location, scale and
orientation are calculated as follows. Firstly, find the
zeroth moment, first order moments, and second order
moments for x and y
M 00 ! $$ Ix
( , y) ,
(1)
x
k ( x) is a convex, monotonically decreasing
" is the Kronecker delta function, and
x
b( xi* ) is the histogram bin associated with the pixel
by C ! 1
$
i !1
x
x
candidate region which are centered around y in the
current frame. Similarly, the probability of the feature u in
the target candidate model is given by
x
y
(9)
y
The second order central moments are determined by
.20 ! M 20 M 00 # x 2 ;.11 ! M 11 M 00 # x y ;
% y # xi &
n
pˆ u ( y ) ! Ch $ i !h1 k '
" [b( xi ) # u ] , (2)
(
' h
(
)
*
where h is the bandwidth and Ch is the normalization
2
2
y
The mean location of the target candidate region is
computed as
(10)
( x , y ) ! ( M 10 M 00 , M 01 M 00 ) .
Let {xi }i !1...nh be the normalized pixel locations in the
% y # xi
function Ch ! 1 $ i !1 k '
' h
)
y
M 11 ! $$ xyIx
( , y ).
2
|x |
|) .
k (|
nh
x
M 20 ! $$ x Ix
( , y );M 02 ! $$ y 2 Ix
( , y );
x The normalization constant C is represented
*
i
y
2
*
i .
n
(7)
y
( , y );M 01 ! $$ yIx
( , y ) , (8)
M 10 ! $$ xIx
isotropic kernel,
location
(4)
The mean shift algorithm finds the local maximum of the
similarity function +ˆ ( y ) by iteratively sampling the
In this paper, we present a scale and orientation adaptive
mean shift based non-rigid object tracking algorithm. We
employ the moment features and then estimate the scale
and orientation of the target object.
2
|xi* |
|)
" [b( xi* ) # u ] ,
qˆu ! C $ i !1 k (|
.
2
.(3)
02 ! M 02 M 00 # y .
(11)
Then the target scale and orientation can be obtained by
decomposing the covariance matrix as follows
/ .20 .11 0
T
2.
3 ! U 1 S 1U ,
.
02 5
4 11
/612 0 0
/ u11 u12 0
where U ! 2
and
.
S
!
2
3
23
4u21 u22 5
4 0 62 5
&
.
(
(
*
To determine the similarity between the target model and
the candidate model, the similarity function is defined as
109
(12)
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
T
compared the proposed non-rigid object tracking
algorithm with the classical mean shift algorithm with
adaptive scale [5] and the EM-shift algorithm [8].
T
The eigenvectors (u11 , u21 ) and (u21 , u22 ) represent
the orientation of the two major axes of the ellipse target.
The values 61 and 62 denote the estimated length and
width of the ellipse target. In practice, these values are
smaller than the length and width of the real target. The
zeroth moment can be regarded as the real area of the
target that is A0 ! M 00 . Therefore, the length l and width
w can be computed as
l ! 61 A0 (762 ) ! 61M 00 (762 ) ,
(13)
w ! 62 A0 (761 ) ! 62 M 00 (761 ) .
(14)
Our proposed framework was implemented under the
programming environment of MATLAB R2012a. In
Fig.3, a snapshot of our framework graphical user
interface is shown.
4. VIDEO M ASKING
There are various types of visual masking techniques in
censorship to obscure the objectionable images or videos
from viewing. The most common ones are pixelization,
censor bar and fogging (blurred out) techniques.
Pixelization technique obscures an image by displaying
part or all of it in a remarkably low resolution. Censor bar
is a black rectangle or square box used to occlude a small
area in the image. For example, censor bars are used to
cover the eyes of the suspects at crime scenes. Fogging is
to blur out an area for a picture or movie. One drawback
of pixelization is that the original image can be easily
reconstructed by exploiting more moving images in that
video. Another disadvantage of pixelization is that it does
not perfectly blend with the surroundings in an image. In
contrast, fogging technique is irreversible, and it blends
smoothly with the surroundings in an image. Therefore,
fogging technique is preferable over most other forms of
masking techniques.
Fig. 3. Snapshot of the proposed framework.
The below TABLE I shows the details of the video
sequences. Three of them are sitcoms broadcasted from
TV, while one is from reality television series. The first
experiment is on a model runway show scene (see Fig. 4);
the bikini model’s bottom with change in scale is to be
tracked and blocked. First row are some frames from the
original video sequence. Second row shows the tracking
results. The initialized target region is selected by the user.
The red ellipse represents the estimated target region.
Third row shows the blurred out censored results after
video masking is carried out. The proposed algorithm was
also tested on Kissing scene 1 to 3;the kissing human
faces with deformation, change in scale and orientation,
change in illumination, partial and full occlusions and
sudden camera zoom out were tracked and blocked (see
Fig.5, Fig.6and Fig.7).
In this paper, we use fogging (blurred out) technique to
block the unsavory object. Fig.2 demonstrates our video
masking technique. To generate the blurry effect, we
convolute the tracking results obtained from Section III
with a circular averaging filter.
TABLE I.
Fig. 2. Video masking tehnique.
5. EXPERIM ENTAL RESULTS AND DISCUSSIONS
In this section, we first present a snapshot of our
framework. Then several real-world video sequences are
used to evaluate the proposed framework. In addition, we
110
VIDEO SEQUENCES USED FOR PROPOSED
FRAMEWORK EVALUATION
Video Sequences
Size
Frame No.
fps
Model runway show
624×352
318
29
Kissing scene 1
1024×576
553
23
Kissing scene 2
1024×576
985
23
Kissing scene 3
1024×576
218
23
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Fig. 7. Censoring kissing scene 3 sequence. First row:frames
from original video sequence. Second row:tracking results. Last
row:censored results. From left to right, frames 55, 61 and 72
are shown.
Fig. 4. Censoring model runway show sequence. First row:
frames from original video sequence. Second row: tracking
results. Last row:censored results. From left to right, frames
167, 188and 209are shown.
We compared the performance of our proposed algorithm
with the adaptive scale Mean Shift tracking algorithm in
[5] and the EM-shift algorithm in [8]. The visual
description of tracking performance for the algorithms can
be observed from Fig. 8to Fig. 11.
Fig. 5. Censoring kissing scene 1 sequence. First row:frames
from original video sequence. Second row:tracking results. Last
row:censored results. From left to right, frames 260, 266 and
293 are shown.
Fig. 8. Tracking model runway show sequence. First row:Scale
Adaptive Mean Shift. Second row:EM-Shift. Last row:our
proposed algorithm. From left to right, frames 171, 182 and 193
are shown.
Fig. 6. Censoring kissing scene 2 sequence. First row:frames
from original video sequence. Second row:tracking results. Last
row:censored results. From left to right, frames 1, 82 and 96are
shown.
Fig. 9. Tracking kissing scene 1 sequence. First row: Scale
Adaptive Mean Shift. Second row:EM-Shift. Last row:our
proposed algorithm. From left to right, frames 261, 266and 296
are shown.
111
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
methods. From the comparison results, we can see the
adaptive Mean Shift object tracking algorithm shows good
performance in tracking the target object, however it
cannot estimate the orientation of the target. The EM-shift
algorithm fails to localize the object center accurately.
And it wrongly estimates the scale and orientation of the
target. In addition, the tracking area has the tendency to
continue shrinking or enlarging. The experimental results
show that our proposed algorithm has good performance
in tracking the target object throughout the video
sequence. It is robust to partial/
full occlusions, complex
clutter background, object scale variations, rotation in
depth, changes in camera position and illumination
variations.
Fig. 10. Tracking kissing scene 2 sequence. First row:Scale
Adaptive Mean Shift. Second row:EM-Shift. Last row:our
proposed algorithm. From left to right, frames 33, 75 and 161
are shown.
6. CONCLUSIONS
In this paper, we propose a framework which empowers
parents and teachers to censor movies and TV shows
according to their level of acumen and discretion. In our
framework, we developed an adaptive mean shift based
non-rigid object tracking algorithm and video masking
technique to blur out the unsavory objects on the scenes.
The proposed framework is tested on challenging realworld video sequences. Experimental results demonstrated
effectiveness and robustness of the proposed framework.
Our algorithm has shown superior tracking performance
when compared to the adaptive scale Mean Shift tracking
algorithm and the well-known EM-shift algorithm.
Fig. 11. Tracking kissing scene 3 sequence. First row:Scale
Adaptive Mean Shift. Second row:EM-Shift. Last row:our
proposed algorithm. From left to right, frames 61, 73 and 81 are
shown.
TABLE II.
7. REFERENCES
[1]
[2]
THE MLE AND TAR VALUES BY THE COMPETING
TRACKING METHODS.
Scale Adaptive
MS
M LE
TAR
M LE
TAR
M LE
TAR
Model
runway
show
4.17
87.52%
13.43
48.29%
3.26
98.43%
[4]
Kissing
scene 1
8.38
72.64%
7.03
78.35%
2.42
92.16%
[5]
Kissing
scene 2
15.08
28.41%
8.20
53.36%
4.77
85.52%
Kissing
scene 3
2.94
89.13%
7.72
63.82%
2.61
94.11%
M ethod
EM -Shift
[3]
Our Proposed
[6]
[7]
To evaluate the competing methods, TABLE II lists the
mean localization errors (MLE) and the true area ratios
(TAR) by the three methods on the four real video
sequences. The TAR is defined as the ratio of the
overlapped area between the tracking result and the
human annotated ground truth to the area of human
annotated ground truth. The MLE and TAR are closely
related to scale and orientation estimation of the target
being tracked. TABLE II shows that our proposed method
achieves the best performance among the three tracking
[8]
[9]
[10]
112
V. Rideout, “Parents, Children, and Media,” Menlo Park,
CA The Henry J. Kaiser Family Foundation, 2007.
Singapore Censorship Review Committee 2010 report,
http:/
/www.mda.gov.sg/
Public/Consultation/Documents/C
RC_2010_Report.pdf.
K. Fukunaga and L. Hostetler, “The Estimation of the
Gradient of a Density Function, with Applications in
Pattern Recognition,”in IEEE IT, vol. 21, no. 1, pp. 32-40,
1975.
Y. Cheng, “Mean Shift, Mode Seeking, and Clustering,”in
IEEE Transactions on Pattern Analysis and Machine
Intelligence, vol. 17, pp. 790-799, 1995.
D. Comaniciu, V. Ramesh, and P. Meer, “Kernel-Based
Object Tracking,” in IEEE Transactions on Pattern
Analysis and Machine Intelligence, vol. 25, no. 5, pp. 564577, May 2003.
G. Bradski, “Computer vision face tracking for use in a
perceptual user interface,”in Intel Technology Journal vol.
2, pp.1-15, 1998.
J. Ning, L. Zhang, D. Zhang and C. Wu, “Scale and
Orientation Adaptive Mean Shift Tracking,” in Computer
Vision, IET, vol. 6, iss. 1, pp. 52-61, 2012.
Z. Zivkovic and B. Krose, “An EM-like algorithm for
color-histogram-based object tracking,” in IEEE Conf.
Computer Vision and Pattern Recognition, vol. 1, pp. 798803, 2004.
R. T. Collins, “Mean-shift blob tracking through scale
space,” in IEEE Conference on Computer Vision and
Pattern Recognition, pp. 234-240, 2003.
T. Lindeberg, “Feature detection with automatic scale
selection,” in International Journal of Computer Vision,
vol.30, iss.2, pp. 77-116, 1998.
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
PERCEIVED USEFULNESS, PERCEIVED EASE OF USE, AND ATTITUDE
RELATED TO E-MAIL USAGE TOWARD INTENTION TO USE E-MAIL
SYSTEMS OF UNIVERSITY STUDENTS
Penjira KANTHAWONGS. Ph.D
Business Computer Department, School of Business Administration, Bangkok University
Phahonyothin Rd., Pathum Thani 12120 Thailand
e-Mail: penjira.k@bu.ac.th
and
Penjuree KANTHAWONGS
Bachelor of Business Administration (English Program), Kasem Bundit University
1761 Phatthanakan Rd., Bangkok 10250 Thailand
e-Mail: penjuree_ka@bba.kbu.ac.th, penjuree@hotmail.com
ABSTRACT
1. INTRODUCTION
E-mail is always significant means in communication for
business and academic. Nowadays, it allows more flexible
ways to communicate in terms of length, language, and
structure used in e-mail systems. Students use e-mail to
get help, make excuse, and make formal request with their
teachers. The attitude related to e-mail usage and
Technology Acceptance Model (TAM) are combined and
extended in this study. This research attempts to
investigate a power of prediction of perceived usefulness,
perceived ease of use, attitude related to e-mail usage
toward intention to use of university students in Thailand.
The author revealed only perceived ease of use
significantly positively related to intention to use e-mail
systems of the university. Nevertheless, the researcher did
not find relationships between perceived usefulness and
intention to use nor attitude related to e-mail usage and
intention to use. Although a limitation of this research is
the small sample size used, these preliminary results
should give light to educators or university administrators
to make a good use of e-mail for university students at its
potential.
E-mail has become an important method to communicate
in business and academic worlds. In the past two decades,
the existence of email as the primary medium of internal
and external business communication has revolutionized
the way in which individuals work and companies operate
[1]. During the pre-Internet age or Globalisation 2.0, the
external communication seemed to be “conducted via
carefully crafted letters bearing a company’s letterhead” [2,
3]. Now, in the more flexible and fluid environment
governed by Globalisation 3.0 professionals worldwide,
the transacting business via e-mail messages seem to have
length, language and structure as formal as those
encountered in Business English textbooks and
classrooms [2, 3]. The use of email has been widespread
within higher education [4]. Advantages of e-mail as a
communication channel are being asynchronous [5],
textual [6], shared [7], traceable [8], instantaneous [9], and
efficient [10]. Disadvantages of e-mail are being overload
[11], information deficiency [12], and poorly targeted
emails [13]. E-mail can be a means of creating and
sustaining relationships among students and teachers.
This method of communication mostly uses for “phatic
communication, asking for help, making excuses, and
making formal requests” in teaching or learning
environment [14]. Evans conducted a research providing
“pedagogically relevant information about the function of
e-mail in internal and external communication, its intimate
Keywords: Perceived Ease of Use, Perceived Usefulness,
Attitude Related to E-Mail Usage, Intention to Use,
Educational Technology
113
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
relationship with spoken communication, the importance
of intertextuality in e-mail chains and the length, as well as
language and structure of email messages” [15]. The
researcher suggested the implementation of a
simulation-based approach in which email communication
was embedded in a series of interdependent activities that
integrated speaking, listening, reading and writing [15].
E-mail also allows students to “explore different aspects of
their personality that they may not feel as comfortable
expressing in face-to-face situations” [16]. “It gives them
a space to exchange their opinions on common interests
and topics, thus creating a sense of community and a
shared knowledge base” [16]. In Thailand, several
researchers conducted research to compare writing
competence of the students before and after study writing
skill by analyzing the students’ homework sent through
e-mails. The researchers found that the students’ writing
competence developed moderately [17]. In the technical
perspective, Sornsuwit development e-mail alerts with
open-source software for Thai students [18]. Based on the
technology acceptance model (TAM), scarce research has
directly examined power relations between TAM and
e-mail’s intention usage, therefore, this research attempts
to explore such a power of prediction of perceived
usefulness, perceived ease of use, attitude related to e-mail
usage toward intention to use of university students.
their perceptions, which drive them to monitor and deal
with incoming e-mails continuously [23].
Several researches can possibly apply TAM to e-mail
usage. Cheng explored the roles of interaction and flow
in explaining nurses’ e-learning acceptance. Based on
TAM with the flow theory, this study presented three
types of interaction factors, learner-system interaction,
instructor-learner interaction, and learner-learner
interaction to construct an extended TAM to explore
nurses’ intention to use the e-learning systems. The
results showed that flow had significant effects on
perceived usefulness and perceived ease of use, and
perceived ease of use had a significant effect on
perceived usefulness. The effects of flow, perceived
usefulness, and perceived ease of use on intention to use
were significant [25]. Chong studied a two-staged
SEM-neural network approach for understanding and
predicting the determinants of m-commerce adoption and
found that perceived usefulness had significant influence
on consumers’ m-commerce adoption intentions [26].
Moreover, several researchers guided by TAM and
reactance theory sought to study the determinants of
college students’ adoption of mobile-based text alert short
message service (SMS). The findings showed that the
probability adoption the text alert SMS was not directly
increased by perceived ease of use and perceived
usefulness of the service, but was indirectly affected by
the two antecedents through ones’ attitude toward the use
of SMS [27]. Escobar-Rodriguez and Monge-Lozano
attempted to understand the factors impacting the
intention to use Moodle, which would allow them to
determine which actions might be carried out to boost its
use by University students in order to improve both their
skills and grades. They found that perceived usefulness
for professors, perceived compatibility with student tasks,
and training did provide specific insight on the adoption
of Moodle by business administration students [20].
Therefore, this study hypothesizes that perceived
usefulness, perceived ease of use, attitude related to
e-mail’s usage impact intention to use e-mail for
university students.
2. LITERATURE REVIEW
A widely applied Information Systems (IS)’ theory of the
Technology Acceptance Model (TAM) suggested that an
individual’s behavioral intention to use a system is
explained by perceived ease of use and perceived
usefulness [19]. Davis described perceived usefulness as
“the degree to which a person believes that using a
particular system would enhance his/her job
performance” and perceived ease of use as “the degree to
which a person believes that using a particular system
would be free of physical and mental effort” [19, 20].
Then, the
system use is directly determined by
behavioral intention to use, which is in turn influenced by
user’s attitude toward using the system [20, 21]. Attitude
towards usage defines at “a person’s affective evaluation
of the costs and benefits of using a new technology” [22].
Attitude related to e-mail usage can be explained by Hair
and others that people are voluntarily and regularly
switching to e-mail from other applications and checking
it throughout their working day [23]. Gonza´lez and
Mark argued that it was not only the activity of dealing
with the interruptions, such as reading e-mail, but also the
switching activity required a need to change mental
context with every activity switch. They found that
workers tended to spend an average of only 3 minutes
working on any one activity before switching to another
[24]. Then, in the case of e-mail’s usage, the evidence
appears to suggest that this stress is self-imposed. Hence
it would appear that the students’ behavior is caused by
3. RESEARCH METHODOLOGY AND FINDINGS
The target population was undergraduate students
enrolling in an Introduction to Business course conducted
with the use of several e-mail systems including a
university’s messaging portal system and that university’s
e-mail system provided to students in Thailand. An
instructor at that university administered the course
materials with face-to-face lectures along with e-mail
systems’ usage. A survey questionnaire assessing the
constructs in the current study was developed from
published scales of previous research as stated in the
literature review. All of the scales were measured on a
5-point Likert scale, ranging from 1 = strongly disagree
to 5 = strongly agree. The survey was collected from
114
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
October to November 2012.
A total of 160
self-administrated questionnaires were distributed to all
students in the class and 100 usable surveys were
returned giving an overall response rate of 62.5%. The
small sample size of 100 usable surveys was used
because this study is in the preliminary step of a larger
sample size’s research. Nevertheless, at this stage, the
response rate was more than 50%, mainly due to the fact
that the questionnaires were collected right after the
respondents completed the forms on the last week of the
classes. The sample was females (61%) more than male
(39%); the typical respondent was 19 years old; have
2-2.99 grade point average.
In this study, the
psychometric properties of the instrument were utilized
for checking reliability and construct validity. The alpha
coefficients of the reliability analysis ranged from .730 to
.890 indicating that all of the scales were acceptable [28].
Construct validity was assessed by principal component
analysis. The analysis produced four components. All
results and multiple regression analysis are reported in
the table below.
total variance. The relative strength of their explanatory
power; however, was different. Ease of use (β= 0.389)
was significant predictor of user’s attitude towards usage
with the e-mail systems. One group of researchers
indicates that the multicollinearity problem becomes too
serious when a VIF value is equal to or higher than four
[29]. For this study, VIF values are acceptable for all items
studied. Overall, the results indicated a statistically
significant linear relationship between the constructs with
a p-value less than 0.05. There was a positive association
between the students’ attitude towards e-mail usage and
perceived ease of use. Hence, a part of hypothesis (H) was
supported. The regression analysis for identifying the
relationships between independent and dependent
variables were illustrated in figure below.
Figure 1: conceptual model of students’ intention to use
the e-mail systems
P. Usefulness
β = .168
β =.389**
Table 1: Multiple Regression Results – Part 1
De. Var.: IntentionToUse (SumIue)(Mean = 2.92,
S.D. = .56, C. A. = .74), r = .52, R2 = .27
Ind.
HypoMe
C.
S.D.
β
Var.
theses
an
Alpha
P.
Useful
3.78
.77
.79
.168
ness
P.
H
Ease of
3.65
.68
.73
.389
use
E-mail
Attitud
3.48
.76
.89
.055
e
P < 0.05, N = 100
P. Ease of Use
Intention to
Use E-mail
β =.055
E-mail
Attitude
Note: Significant paths (p<.05) between constructs were
reported with standardized beta weights.
4. CONCLUSION AND RECOMMENDATION
E-mail becomes crucial part in communication for both
business and academic worlds. Now, during the age of
Globalization 3.0, professionals in business world are
more flexible in terms of length, language, and structure
used in their e-mail as compare to Globalization 2.0 when
companies carefully crafted letters with companies’
letterhead. Disadvantages and advantages of e-mail were
explored. In academic world, students use e-mail to get
help, make excuse, and make formal request with their
teachers. In Thailand, several researches conducted
related to e-mail usage. The attitude toward intention to
use e-mail and TAM models are combined and extended in
this study. The researcher found that only perceived ease
of use significantly positively related to intention to use
e-mail systems of the university students. This result is
similar to research by Cheng that perceived ease of use
significantly influence intention to use [25] e-mail systems
of the university students. Nevertheless, the result of this
study is different from Chong that perceived usefulness
had significant influence on consumers’ m-commence
adoption intention [26]. Furthermore, this result is
different from Escobar-Rodriguez and Monge-Lozano
Table 1: Multiple Regression Results – Part 2
De. Var.: IntentionToUse (SumIue)(Mean = 2.92,
S.D. = .56, C. A. = .74), r = .52, R2 = .27
Ind.
Supp
Sig.
t
VIF
Var.
ort
P.
Useful
1.554
.124
No
1.470
ness
P.
Ease of
3.648
.000**
Yes
1.440
use
E-mail
Attitud
.577
.566
No
1.156
e
P < 0.05, N = 100
Only perceived ease of use was found to be significant
determinant of user’s attitude towards usage of the e-mail
systems provided by the university, explaining 27% of the
115
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
work. The researchers suggested that perceived usefulness
for professors would likely to provide specific insight on
the adoption of Moodle by business administration
students [20]. While many software or simulations
especially the ones from the Western countries seem hard
to use [26, 27], e-mail systems appear to be easy to use for
Thai university students. Moreover, the more new i-pad,
i-phone, or blackberry are offered in the market, the better
intention to use of many e-mail systems since most of
these device are easy to operate. Universities’ instructors
should be certain to train their students to be familiar with
many e-mail software or hardware device to confirm that
e-mail method is still considered to be the most
advantageous means for communication in learning and
teaching environment.
Universities executives,
instructors, software vendors should offer easy-to-use
e-mail systems for the students. Nevertheless, there are
several limitations to this research. First regardless of the
significance of the relationships between factors in the
regression model, the researcher cannot ignore the fact that
this relationship may not apply to some universities. The
e-mail systems may be limited to universities in rural
areas. So, universities with limited Internet accesses may
not be able to it. It should be noted that the model
variables explained 27% of the variance on intention to use
of the e-mail system, while the larger percentage on
intention to use remain unexplained. Then, there should
be the need for additional research incorporating potential
unmeasured variables in this study. Due to the small
number of the sample size of 100, there might be some
problem with construct validity.
[7] L. A. Dabbish, and R. E. Kraut, Email overload at
work: An analysis of factors associated with
email strain, pp. 431–440: ACM Press, 2006.
[8] H. Clark, Using language, New York: Cambridge
University Press, 1996.
[9] W. Mackay, More than just a communication
system: Diversity in the use of electronic mail,
ACM Press, 1988.
[10] K. Renaud, J. Ramsay, and M. Hair, “You’ve Got
E-Mail!. Shall I Deal With It Now? Electronic mail
from the eecipient’s perspective”, International
Journal of Human–Computer Interaction, vol.
21, no. 3, 2006, pp. 313–332.
[11] A. M. Szóstek, “‘Dealing with My Emails’: Latent
user needs in email management”, Computers in
Human Behavior, vol. 27, no. 2, 2011, pp.
723-729,
[12] C. Kimble, and J. Abu Bakar, "Information
overload and electronic mail: tagging message
content—a partial solution?", pp. 371–380.
[13] C. Kimble, P. Hildreth, and D. Grimshaw, “The role
of contextual clues in the creation of information
overload, matching technology with organisational
needs,” in The third UKAIS conference, Lincoln,
UK, 1998, pp. 405–412.
[14] J. Bloch, “Student/teacher interaction via email: the
social context of Internet discourse”, Journal of
Second Language Writing, vol. 11, no. 2, 2002,
pp. 117-134.
[15] S. Evans, “Designing email tasks for the Business
English classroom: Implications from a study of
Hong Kong’s key industries”, English for Specific
Purposes, vol. 31, no. 3, 2012, pp. 202-212.
[16] Y. Liu, “Power perceptions and negotiations in a
cross-national email writing activity”, Journal of
Second Language Writing, vol. 20, no. 4, 2011,
pp. 257-270.
[17] W. Seetacha, A. Moot, P. Sittipong et al., “Using an
e-mail for developing students' writing competency
: a case study of the third year bachelor of arts
students
in
english
major,”
Ratchaphat
Walaialongkorn University, 2012.
[18] P. Sornsuwit, The development of e-mail alerts with
open-source software, Ratchaphat Kumpangpetch
University, 2011.
[19] F. D. Davis, “Perceived Usefulness, Perceived Ease
of Use, and User Acceptance of Information
Technology”, MIS Quarterly, vol. 13, 1989, pp.
319-340.
[20] Escobar-Rodriguez, and T. P. Monge-Lozano, “The
acceptance of Moodle technology by business
administration students”, Computers & Education,
vol. 58, 2012, pp. 1085–1093.
[21] I. Wu, and J. L. Chen, “ An extension of Trust and
TAM model with TPB in the initial adoption of
on-line tax: An empirical study”, International
Journal of Human-Computer Studies, vol. 62, no.
6, 2005, pp. 784-808.
5. REFERENCES
[1] P. Hewitt, “Electronic mail and internal
communication: A three-factor model”, Corporate
Communications, vol. 11, 2006, pp. 78–92.
[2] S. Ehrenreich, “English as business lingua franca in
a German multinational corporation”, Journal of
Business Communication, vol. 47, 2010, pp.
408–431.
[3] A. Kankaanranta, “Hej Seppo, could you pls
comment on this! – Internal email communication in
lingua franca English in a multinational company”,
Business Communication Quarterly, vol. 69,
2006, pp. 216-225.
[4] S. Gilbert, AAHESGIT: new thread email, 1996.
[5] G. F. Thomas, C. L. King, B. Baroni et al.,
“Reconceptualizing e-mail overload”, Journal of
Business and Technical Communication, vol. 20,
no. 3, 2006, pp. 252.
[6] J. Tyler, and J. Tang, When can I expect an email
response? A study of rhythms in email usage, pp.
239–258: Kluwer Academic Publishers, 2003.
116
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[22] F. D. Davis, R. P. Bagozzi, and P. R. Warshaw,
“User acceptance of computer technology: A
comparison
of
two
theoretical
models”,
Management Science, vol. 35, no. 8, 1989, pp.
982-1003.
[23] M. Hair, K. V. Renaud, and J. Ramsay, “The
influence of self-esteem and locus of control on
perceived email-related stress”, Computers in
Human Behavior, vol. 23, no. 6, 2007, pp.
2791-2803.
[24] V. M. Gonza¨lez, and G. Mark, “Constant, constant,
multi-tasking craziness: managing multiple working
spheres,” in the 2004 conference on Human factors
in computing systems 2004, pp. 113–120.
[25] Y. M. Cheng, “Exploring the roles of interaction
and flow in explaining nurses' e-learning
acceptance”, Nurse Education Today, vol. 33, no.
1, 2013, pp. 73-80.
[26] A. Y.-L. Chong, “A two-staged SEM-neural
network approach for understanding and predicting
the determinants of m-commerce adoption”, Expert
Systems with Applications, vol. 40, no. 4, 2013,
pp. 1240-1247.
[27] D. Lee, J. Y. Chung, and H. Kim, “Text me when it
becomes dangerous: Exploring the determinants of
college students adoption of mobile-based text alerts
short message service”, Computers in Human
Behavior, vol. 29, no. 3, 2013, pp. 563-569.
[28] C. Nunnally, Psychometric Theory, New York:
McGraw-Hill, 1978.
[29] J. Miles, and M. Shevlin, Applying regression &
correlation: A guide for students and
researchers, London: Sage, 2001.
117
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Applying the Technology Acceptance Model in a Study of
the Factors Affecting Intention to Use Facebook in
Education of the Thai University Students
Penjuree KANTHAWONGS
Bachelor of Business Administration (International Program)
Kasem Bundit University
1761 Phatthanakan Rd., Bangkok 10250 Thailand
e-Mail: penjuree_ka@bba.kbu.ac.th, penjuree@hotmail.com
Penjira KANTHAWONGS. Ph.D
Business Computer Department
School of Business Administration, Bangkok University
Phahonyothin Rd., Pathum Thani 12120 Thailand
e-Mail: penjira.k@bu.ac.th
Mr.Chaisak Chitcharoena
Bachelor of Business Administration (International Program)
Kasem Bundit University
1761 Phatthanakan Rd., Bangkok 10250 Thailand
e-Mail: chaisak _ch@bba.kbu.ac.th, chaisak34@yahoo.com
Keywords: Technology Acceptance Model, Facebook,
Educational Technology, Thai, Intention to Use
ABSTRACT
Facebook becomes an important part in communication
for both social and academic worlds. Teachers may be
likely to adopt a technology like Facebook as a way to
facilitate communication with students. Students are
much more open to the possibility of using Facebook and
similar technologies to support their classroom work
while instructors are more likely to use “traditional”
technologies such as email. The paper concluded that
only perceived computer self-efficacy was found to be a
significant determinant of users ‘s attitude towards usage
of Facebook of university students in Thailand.
Nevertheless, the researchers did not find relationships
between perspective on Facebook in education, perceived
usefulness, and perceived ease of use toward intention to
use of the site.
1. INTRODUCTION
Boyd and Ellison explain that social networking sites
(SNS) are web-based services that people can create a
public or semi-public profile within a bounded system,
search for a list of other users with whom they share
connection, and view their list of connections and those
made by others within the system [25]. Furthermore, SNS
would include profiles in which users may present
themselves to get in exchange with other users. Profiles
commonly include personal information like the user´s
name, gender, hometown, group affiliations, interests,
occupation, personal statements, favorite music, books or
movies [26]. “Whether or not social networking sites
(SNS) like Facebook is useful for education?” This
118
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
question should still be controversial. Although there are
many SNSs such as myspace, Twitter, and Instagram,
facebook is the most popular SNS in Thailand [27].
Moreover, the site is one of the latest examples of
communications technologies that has been widelyadopted by students and potentially become a valuable
resource to support their educational communications and
collaborations with instructors. In the US, comparisons of
instructor and student responses indicate that students are
much more likely than instructors to use Facebook. Most
interestingly, students are much more open to the
possibility of using Facebook and similar technologies to
support their classroom work while instructors are more
likely to use “traditional” technologies such as email.
Moreover, instructors tend to prohibit classroom uses of
technologies that are frequently used by students
especially the use of SNS like Facebook [1]. In Malaysia,
Facebook (FB) is currently considered as the most popular
platform for online social networking among university
students. A survey of 300 undergraduate students at
Universiti Sains Malaysia (USM), Penang was found that
the students believed FB could be utilized as an online
the findings on students' willingness to integrate
technologies found that “… 54% (of institutions) reported
that (teacher) candidates' lack of interest was not at all a
barrier, and 41% reported it as a barrier to a minor
extent” (p. 11). In sum, students are willing; faculty
members are not.
environment to facilitate the learning of English.
However, teachers or language instructors had to integrate
FB as an educational project with predetermined learning
objectives and outcomes for the learning experience to be
meaningful [2].
Although higher education institutions had a wellestablished trend toward non-adoption of new
technologies, the movement toward hybrid and online
instructions has altered this picture in recent years, since
most institutions currently offer at least some online
courses [3]. Many higher education faculty members
remain laggards when it comes to adopting technology
innovations. For example, a recent report [4] on
educational technology use in teacher education programs
by the National Center for Education Statistics in the US
concluded that faculty member reluctance remains a
major barrier to effective integration of technologies in
teacher preparation. Some 73% said faculty members’
lack of interest was an impediment; about a quarter said it
was a moderate to major issue. On the contrary,
lesson already learned, 3) playing Facebook in classes, 4)
an inability to hand in their assignments on time, and 5)
failure to do as good work as expected [6]. Last but not
least, based on the technology acceptance model (TAM),
scarce research has directly examined power relations
between TAM and Facebook’s intention usage, therefore,
this research attempts to explore such a power of
prediction of perspective on Facebook in education,
perceived usefulness, perceived ease of use, and
perceived computer self-efficacy toward intention to use
of university students.
When it comes to the fastest-growing and most popular of
the Internet-based technologies especially SNSs such as
Facebook with young people, there are several reasons to
believe this adoption trend among higher education
faculty would be different from the past. One feature of
SNSs such as Facebook is that they function primarily as
communication tools and instructors may view them as
akin to email, a technology in which most of them
already use. A great deal of communication between
students and teachers about courses already goes on via
email. Teachers may be likely to adopt a technology if
they perceive it as a way to facilitate communication with
students. A second aspect is the social perspective.
Teachers who see teaching as establishing a relationship
with students may view “Facebook-like technologies as
an efficient, even business-like way to accomplish that
connection” [5]. Many teachers have their own Facebook
pages and actively seek to link with their students. This
modeling may help persuade teachers that SNSs of this
kind are a practical solution to teachers' need to keep in
close contact with students [5].
SNSs began in 1997 with the launch of SixDegrees.com.
The site gave abilities for users to create profiles, listed
their Friends and surfed the Friends list [7]. After that
time, SNSs have hit the mainstream with a great impact.
MySpace and Facebook have become very popular as
Vincci Kwong (2007) says, “Both MySpace and
Facebook are social networking websites that provide
personalized and interactive services based on users'
interest and activities on the web” (p.1) [5, 8]. Facebook
is one of the most widely-accepted SNSs for college
students and was by far the one website that helped “tip”
SNSs into the mainstream culture. “MySpace launched in
2003 and built up an audience for the SNSs that
followed” [5, 7, 8].
In Thailand, several researchers conducted research to
investigate Facebook using behaviors and their impacts
on the lifestyles of people studying at Chiang Mai
University. The researchers found that the impacts on the
learning performances of the students were 1) having less
time for exam preparation, 2) no chance to review any
In early 2004, Facebook was created. Mark Zuckerberg
started Facebook, while he was a student at Harvard in
2004 at the age of 23. The general concept was to digitize
the legendary (Harvard) freshman-year ‘facebook,’ and
allow students not only to look at one another's photos
but also to flirt, network, [and] interact. At first,
2. LITERATURE REVIEW
119
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Facebook.com was limited to college students at Harvard
with a university email address. Later, the Facebook
phenomenon spread like virus when opened up to all
college students. When Facebook opened its doors to
people outside the university network, with over 350
million
subscribers
worldwide
(according
to
Facebook.com statistics retrieved in March, 2010),
Facebook, now has a diverse community of users at all
levels of education and areas of society, including
companies and universities [7, 8].
Implications and insights were provided to event
practitioners and were discussed accordingly [10].
To understand event fans’ acceptance process of
Facebook event page, several authors identified the TAM
[11] as the theoretical foundation. It is a widely used
theoretical model to explain potential users’ behavioral
intentions to access a technology or a new system [12].
TAM is based on the well-known Theory of Reasoned
Action (TRA) [13] that attempted to explain how
individuals construct behaviors. The original TAM
proposes that perceived ease of use (PEOU) and
perceived usefulness (PU) impact users’ behavioral
intentions (BI) toward accepting a new technology or a
system. Davis (1989) defined perceived usefulness as
“the degree to which a person believes that using a
particular system will enhance his or her job
performance”. He also defined perceived ease of use as
“the degree to which a person believes that using a
particular system will be free of effort.” Both perceived
ease of use and perceived usefulness have a strong
positive influence on the acceptance of the technology
[11].
The growing popularity of SNSs indicates that social
communications can become a contributor to successful
learning. Interaction in online courses identifying five
components
(socially
designed
interaction,
instructionally-designed
interaction,
interactivity
affordances of technology, student engagement, and
instructor engagement) has been recognized as a key
indicator of quality in online courses. The social and
interactive nature of SNSs presents “the intriguing
possibility that by enhancing social interactions with and
among students through the use of an SNS such as
Facebook, instructors can increase the overall quality of
engagement in a given instructional setting and, thus,
create a more effective learning environment. SNSs also
provide easily-measured evidence of both student and
instructor interaction” [9].
Based on TAM with the flow theory, this study presented
three types of interaction factors, learner-system
interaction, instructor-learner interaction, and learnerlearner interaction to construct an extended TAM to
explore nurses’ intention to use the e-learning systems.
The results showed that flow had significant effects on
perceived usefulness and perceived ease of use, and
perceived ease of use had a significant effect on
perceived usefulness. The effects of flow, perceived
usefulness, and perceived ease of use on intention to use
were significant [14]. Chong studied a two-staged SEMneural network approach for understanding and
predicting the determinants of m-commerce adoption and
found that perceived usefulness had significant influence
on consumers’ m-commerce adoption intentions [15].
Moreover, several researchers guided by TAM and
reactance theory sought to study the determinants of
college students’ adoption of mobile-based text alert short
message service (SMS). The findings showed that the
probability adoption the text alert SMS was not directly
increased by perceived ease of use and perceived
usefulness of the service, but was indirectly affected by
the two antecedents through ones’ attitude toward the use
of SMS [16]. Escobar-Rodriguez and Monge-Lozano
attempted to understand the factors impacting the
intention to use Moodle, which would allow them to
determine which actions might be carried out to boost its
use by University students in order to improve both their
skills and grades. They found that perceived usefulness
for professors, perceived compatibility with student tasks,
and training did provide specific insight on the adoption
of Moodle by business administration students
In Thailand, a research showed that the students already
knew and used Facebook. Notebooks, netbooks or Ipads
were used to access this social network service.
Moreover, Facebook was assessed around 1 to 3 times
per day on average. Each time took 31 minutes to 1 hour.
Totally, it was used 1.01 to 3.00 hours per day. The
students began playing Facebook from 06.01 to 08.00 pm
until 10.01 to 12.00 pm. The most favorite activities on
Facebook done by the students included 1) viewing
photos of their friends, 2) chatting with their friends, 3)
reading their friends’ profiles or messages, 4) writing or
changing their statuses, and 5) giving their opinions on
others’ photos or statements. The impacts on the daily
lives of the students were 1) sleeping and waking up later
than usual, 2) performing fewer other activities, 3)
becoming more isolated, 4) having headaches and body
pains from spending too long time continuously playing
facebook, and 5) taking less exercise [6]
An extended Information Systems (IS)’ theory of the
Technology Acceptance Model (TAM) was adopted to
explain the mechanism by which social media marketing
influenced attitudes toward Facebook event pages.
Several researchers found that users’ emotions exhibited
on the Facebook event page did have a significant impact
on the perceived usefulness and perceived ease of use,
and perceived enjoyment of such social media marketing.
However, only the last construct significantly influences
users’ attitudes and intentions toward an event.
120
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Additionally, the original technology acceptance model
was expanded with learner related variables such as
perceived self-efficacy. “Students with higher learning
self-efficacy would tend to use more sophisticated selfregulated learning strategies” such as planning,
monitoring, or help seeking [17]. According to Bandura,
“self-efficacy” is defined as “one's beliefs and
expectations regarding one's ability to perform a task
required to achieve specific outcomes” [18]. Students’
self-efficacy was found to have an indirect positive effect
on students’ overall course management systems use via
students’ perceptions [19]. Researchers revealed that
students with higher self-efficacy tended to have better
information searching strategies [20]. Liang and Wu's
study illustrated that nurses' self-efficacy plays an
essential role in their motivation toward e-learning [21].
Self-efficacy can influence performance expectations and
performance expectations also influence behavior [22].
Thus, we hypothesize, perspective on Facebook in
education, perceived usefulness, perceived ease of use,
and perceived computer self-efficacy have the power to
predict intention to use Facebook of university students
Table 1: Multiple Regression Results – Part 1
De. Var.: IntentionToUse (Mean = 3.37, S.D. = .61, C.
A. = .77), r = .58, R2 = .34
Hypo
Ind.
C.
Mean
S.D.
β
Var.
Alpha
these
s
Perspe
ctive
3.78
.62
.70
.247
on FB
in edu.
P.
Useful
3.27
.72
.75
-.028
ness
H
P.
Ease of
3.06
.68
.71
.172
use
Sellf
Efficac
3.36
.60
.77
.309*
y
P < 0.05, N = 57
Table 2: Multiple Regression Results – Part 2
De. Var.: IntentionToUse (Mean = 3.37, S.D. = .61, C.
A. = .77), r = .58, R2 = .34
Ind.
t
Sig.
Support
VIF
Var.
Perspe
ctive
1.838
.072
No
1.420
on FB
in edu.
P.
Useful
-.221
.826
No
1.222
ness
P.
Ease of
1.266
.211
No
1.441
use
Sellf
Efficac
2.026
0.48
Yes
1.828
y
P < 0.05, N = 57
3. RESEARCH METHODOLOGY AND FINDINGS
The target population was undergraduate students
enrolling in Bachelor of Business Administration
majoring in business computer, marketing, and
management in the university in Thailand.
A survey questionnaire assessing the constructs in the
current study was developed from published scales of
previous research as stated in the literature review. All of
the scales were measured on a 5-point Likert scale,
ranging from 1 = strongly disagree to 5 = strongly agree.
The survey was collected from October to November
2012. A total of 57 self-administrated questionnaires
were distributed to all students in the class and 57 usable
surveys were returned giving an overall response rate of
100%. The response rate was more than 50%, mainly due
to the fact that the instructor collected questionnaires
right after the respondents completed the forms in the
classes. The sample was females (72%) more than male
(28%). The students’ ages vary between 19-22 years
old. In this study, the psychometric properties of the
instrument were used for checking reliability and
constructing validity. The alpha coefficients of the
reliability analysis ranged from 0.70 to 0.77 indicating
that all of the scales were acceptable [23]. Construct
validity was assessed by principal component analysis.
The analysis produced four components. All results and
multiple regression analysis are reported in the table
below.
Only computer self-efficacy was found to be a significant
determinant of users’ attitude towards usage of Facebook,
explaining 34% of the total variance. The relative
strength of their explanatory power; however, was
different.
Computer self-efficacy (β= 0.309) was
significant predictor of user’s attitude towards the use of
Facebook. One group of researchers indicates that the
multicollinearity problem becomes too serious when a
VIF value is equal to or higher than four [24]. For this
study, VIF values are acceptable for all items studied.
Overall, the results indicated a statistically significant
linear relationship between the constructs with a p-value
less than 0.05. There was a positive association between
the students’ attitude towards Facebook usage and
computer self-efficacy.. Hence, a part of hypothesis (H)
was supported. The regression analysis for identifying
121
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
the relationships between independent and dependent
variables were shown in figure below.
that the successful intention to use of SNSs in education
should start with informing of usefulness and ease of use
of the sites like Facebook for learning or teaching
environment. However, there are several limitations to
this research. Since this is the preliminary findings, the
sample size of the research may be relatively small.
Then, there should be the need for additional research
incorporating larger sample size. Future research may
involve respondents from various universities. Other
potential measurement variables such as cultural aspects
or emotional aspects may be added for further studies.
Figure 1: conceptual model of students’ intention to use
Facebook
Perspective on
FB in Education
P. Usefulness
β = .247
β = -.028
Intention to
Use Facebook
β .172
P. Ease of
Use
5. REFERENCES
β =.309*
[1] T. Escobar-Rodriguez, and P. Monge-Lozano, “The
acceptance of Moodle technology by business
administration students”, Computers & Education,
vol. 58, no. 4, 2012, pp. 1085-1093.
[2] M. K. Kabilan, N. Ahmad, and M. J. Z. Abidin,
“Facebook: An online environment for learning of
English in institutions of higher education?”, The
Internet and Higher Education, vol. 13, no. 4,
2010, pp. 179-187.
[3] I. A. Allen, and J. Seaman. "Staying the
course:Online education in the UnitedStates," 2
March, 2012; http://www.sloanc.org/publications/survey/pdf/staying_the_course.pd
f.
[4] B. Kleiner, N. Thomas, and L. Lewis, Educational
technology in teacher education programs for
initial licensure (NCES 2008-040), National Center
for Education Statistics, Institute of Education
Sciences, Washington, DC, 2007.
[5] M. D. Roblyer, M. McDaniel, M. Webb et al.,
“Findings on Facebook in higher education: A
comparison of college faculty and student uses and
perceptions of social networking sites,” The
Internet and Higher Education, vol. 13, no. 3,
2010, pp. 134-140.
[6] T. Tantheeptham, “Using Facebook that Affected
Chiang Mai University Students’ Lifestyles,”
Chiang Mai University, 2010.
[7] D. M. Boyd, and N. B. Ellison, “Social network
sites: Definition, history, and scholarship,” Journal
of Computer-Mediated Communication, vol. 13,
2008, pp. 210−230.
[8] V. Kwong, “Reach out to your students using
MySpace and Facebook”, Indiana Libraries
vol.26, vol. 3, 2007, pp. 53-57.
[9] M. D. Roblyer, and W. Wiencke, “Exploring the
interaction equation: Validating a rubric to assess
and encourage interaction in distance courses,” The
Journal of Asynchronous Learning Networks,
vol. 8, no. 4, 2003, pp. 24-37.
[10] W. Lee, L. Xiong, and C. Hu, “The effect of
Facebook users' arousal and valence on intention to
go to the festival: Applying an extension of the
technology acceptance model,” International
Computer
Self- Efficacy
Note: Significant paths (p<.05) between constructs were
reported with standardized beta weights.
4. CONCLUSION AND RECOMMENDATION
Facebook becomes an important part in communication
for both social and academic worlds. Teachers may be
likely to adopt a technology like Facebook as a way to
facilitate communication with students. Disadvantages
and advantages of Facebook were explored. Students are
much more open to the possibility of using Facebook and
similar technologies to support their classroom work
while instructors are more likely to use “traditional”
technologies such as email. The site may be used as a
primary communication tool similar to email.
Furthermore, many teachers may actively seek to link
with their students. This modeling may help persuade
teachers that SNSs of this kind are a practical solution to
teachers' need to keep in close contact with students. The
researchers found that only perceived computer selfefficacy significantly positively related to intention to use
Facebook of the university students. This result is similar
to research by Tsai and Tsai (2003), Liang & Wu (2010),
and Wu et al. (2010) that perceived computer selfefficacy significantly influence intention to use [20-22]
Facebook of the university students. Nevertheless, Thai
students do not perceived Facebook in terms of
perspective in education, perceived usefulness, and
perceived ease of use. It is possible that the educator
reluctance remains a major barrier to effective integration
of Facebook technologies in teacher preparation.
Moreover, the results of this study confirm that Thai
students were 1) having less time for exam preparation,
2) no chance to review any lesson already learned, 3)
playing Facebook in classes, 4) an inability to hand in
their assignments on time, and 5) failure to do as good
work as expected [6]. Last but not least, university
executives, IT trainers, software vendors should be aware
122
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
Journal of Hospitality Management, vol. 31, no.
3, 2012, pp. 819-827.
F. D. Davis, “Perceived Usefulness, Perceived Ease
of Use, and User Acceptance of Information
Technology,” MIS Quarterly, vol. 13, 1989, pp.
319-340.
W. R. King, and J. He, “A meta-analysis of the
technology acceptance model,” Information and
Management, vol. 43, no. 6, 2006, pp. 740-755.
M. Fishbein, and I. Ajzen, Belief, Attitude,
Intention and Behavior: An Introduction to
Theory and Research, Reading, MA: AddisonWesley, 1975.
Y.-M. Cheng, “Exploring the roles of interaction
and flow in explaining nurses' e-learning
acceptance,” Nurse Education Today, vol. 33, no.
1, 2013, pp. 73-80.
A. Y.-L. Chong, “A two-staged SEM-neural
network approach for understanding and predicting
the determinants of m-commerce adoption,” Expert
Systems with Applications, vol. 40, no. 4, 2013,
pp. 1240-1247.
D. Lee, J. Y. Chung, and H. Kim, “Text me when it
becomes dangerous: Exploring the determinants of
college students' adoption of mobile-based text
alerts short message service,” Computers in
Human Behavior, vol. 29, no. 3, 2013, pp. 563569.
K.-H. Cheng, and C.-C. Tsai, “An investigation of
Taiwan University students' perceptions of online
academic help seeking, and their web-based
learning self-efficacy,” The Internet and Higher
Education, vol. 14, no. 3, 2011, pp. 150-157.
A. Bandura, Self-efficacy: The exercise of control,
New York: Freeman, 1997.
G. Lust, N. A. Juarez Collazo, J. Elen et al.,
“Content Management Systems: Enriched learning
opportunities for all?”, Computers in Human
Behavior, vol. 28, no. 3, 2012, pp. 795-808.
M.-J. Tsai, and C.-C. Tsai, “Information searching
strategies in web-based science learning: The role of
internet self-efficacy.,” Innovations in Education
and Teaching International, vol. 40, no. 1, 2003,
pp. 43-50.
J. C. Liang, and S. H. Wu, “Nurses' motivations for
web-based learning and the role of Internet selfefficacy,” Innovations in Education and Teaching
International, vol. 47, no. 1, 2010, pp. 25–37.
J.-H. Wu, R. D. Tennyson, and T.-L. Hsia, “A study
of student satisfaction in a blended e-learning
system environment”, Computers & Education,
vol. 55, no. 1, 2010, pp. 155-164.
C. Nunnally, Psychometric theory, New York:
McGraw-Hill, 1978.
J. Miles, and M. Shevlin, Applying regression &
correlation: A guide for students and
researchers, London: Sage, 2001.
[25] D. M. Boyd and N.B. Ellison, Social network sites:
Definition, history, and scholarship, Journal of
Computer-Mediated Communication, vol.13,
no.1, 2007, p.2.
[26] F. Stutzman, An evaluation of identity-sharing
behavior in social network communities,
International Digital and Media Arts Journal,
vol.3, no.1, 2006.
[27] Sydneysapper, retrieved 3 June 2013 from
http://tulaneict4d.wordpress.com/2013/04/05/socialmedia-in-thailand/
123
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Using Virtual Classroom: Learning through Video Analysis to Engage Educators in
Meaningful Facilitated, Online Distance Learning
Cynthia Long and John Ristvey
McREL
Denver, CO 80237 United States
to reflect on their fall lessons and think about how
their spring lessons might be improved.
ABSTRACT
NanoTeach is a National Science Foundation
sponsored Discovery Research K-12 project, (#DRL0822128), led by Mid-continent Research for
Education and Learning (McREL) with assistance
from partner organizations: Stanford Nanofabrication
Facility, Georgia Institute of Technology, and Aspen
Associates. NanoTeach is developing and evaluating a
professional development model intended to assist
high school educators in integrating nanoscience and
technology into their curriculum in life, physical, or
earth science to promote student understanding. Using
instructional strategies from Designing Effective
Science Instruction [4], NanoTeach supports educators
in designing and implementing lessons that integrate
emerging content in a manner that reflects effective
science instruction. In this project, the emerging
science content of nanoscience and technology
intersects with the pedagogical shift to create a
coherent content storyline to increase educator
understanding and practice by seeing and listening to
active science instruction in a classroom through
synchronous video coding. The learning platform,
Virtual Classroom: Learning through Video Analysis
(VC-LVA), effectively integrates distance learning,
collaboration, and discourse among educators, using
technology.
The purpose of VC-LVA is for educators to analyze
delivery of science lessons through synchronous video
coding of an authentic classroom and determine
evidence of strategies used that support a coherent
content storyline [3]. These strategies align with
Designing Effective Science Instruction, Content
Strategy 6: Sequencing the Learning Targets into a
Progression [4]. Educators look for evidence of one
main learning goal, determine if activities are aligned
to that learning goal, and look for evidence that there
are explicit links between the science ideas and the
activities. Once the main learning goal of a coherent
content storyline is identified, it is important to share it
with students. The strategies that support creating a
coherent content storyline for which educators
collected evidence are (adapted from Roth, 2011):
Focus on one main learning goal
Link the learning goal (the main science idea)
to ideas learned in previous lessons
Keywords: Virtual, Classroom, Video, Distance
Learning,
Professional
Development,
Online,
Educator, Storyline, Strategies
1. INTRODUCTION
VC-LVA is an innovative component of the
NanoTeach project, which was field tested in 20122013 (Figure 1). This component virtually brought
together participating educators from sites representing
four states across the country (Colorado, Texas,
Georgia, Louisiana). Prior to the VC-LVA experience,
educators in the facilitated group participated in an
intense two-week summer professional development
program and implemented at least one nanoscience
and technology lesson during the fall semester. VCLVA for NanoTeach occurs prior to implementation of
their spring lesson. The timing allowed for educators
124
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Set the purpose using a focus question or goal
statement (in kid friendly language)
Refer back to the goal statement or focus
question throughout the lesson
Select activities and content representations
that are matched to the learning goal
PARTICIPANTS
For educators, reviewing what a learning goal is and
what evidence one might see or hear in a classroom
paves the way for understanding how to help students,
through facilitation and instruction, build conceptual
understanding of even the most difficult concepts. In
this way, students have the opportunity to build their
knowledge and develop an overall conceptual
understanding. A secondary purpose to VC-LVA is
providing a tool and a model for educators to use for
both self-reflection and peer review based on a video
recording of their own lesson in order to improve their
practice. Prior to conducting the VC-LVA in the
virtual environment, facilitators worked with the
educators to practice video coding and determining
evidence during the summer face-to-face sessions.
This prior experience made for an easy transition to
analyzing video in a virtual environment.
CHAT
NOTES
Figure 2: A screen capture from the VC-LVA platform used
for the virtual, online sessions.
The overall desired outcome for teachers in this
component of the NanoTeach project is for them to use
video analysis to put “words-to-images” [1], to learn
or review the strategies that support a coherent content
storyline, and to understand what this means when put
into practice. The goal of the session is to support
educators as they apply this understanding to the
design, development, and delivery of their own
lessons. Modeling good instruction is also a goal of the
Virtual Classroom session.
2. THE INNOVATION
Using an adaptation of a Cisco WebEx© online
meeting system, the VC-LVA platform permitted the
presentation of synchronous video viewing. Groups of
three to six educators connected with a NanoTeach
facilitator through an audio conference and the online,
synchronous presentation. This 70-minute interactive
session included ongoing discourse orally and through
an online chat function. Using the platform tools,
participants were encouraged to “raise their hand”
using an icon indicator and asked questions and shared
their ideas. This prevented participants from talking
over one another and let all voices be heard. The
facilitator reviewed the pedagogical content and
strategies, the focus of the session, and guided the
interaction by eliciting feedback, views, and examples
from participants.
We began each session by displaying and discussing
the learning goals of the session. The specific goals
for the VC-LVA are that educators:
1) understand that a content storyline is
important to connect student learning from
student initial ideas to subsequent ideas as
they build a larger conceptual understanding;
and
2) recognize that video analysis and coding
allows us to examine educator/student
interactions by identifying evidence of
educator practice to create mental models of
what good instruction looks like.
Through facilitated interactions, educators reviewed
and used an analysis instrument to record evidence
from the video they observed. The instrument includes
instructions and strategies that support a coherent
content storyline. Teachers had the opportunity to
record on the instrument itself or in a notes section on
the platform. As educators watched the video, they
recorded both the evidence they saw and/or heard from
the student/teacher interactions on the video and the
time-code at which it the evidence occurred. This
allowed for meaningful discussion based on the
evidence they recorded and their process of forming an
image of what good instruction looks like. The
Does the Video Matter?
While the video coding strategies and VC-LVA
can be used with any instructional video, we found
that having a video using a teacher versed in
creating a content storyline works best. There
should be some evidence of strategies in play yet
room for improvement. For the NanoTeach field
test, we recorded a physics teacher conducting a
culminating lesson on static forces adapted from
www.mcrel.org/nanoleap.
125
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
facilitator has full control of the video which is shown
with little to no delay. The video was paused several
times to allow for discourse prompted by the
facilitator. Each participant shared evidence they
recorded and discussion ensued. To end this
synchronous session, participants shared via the chat
box two things they saw or heard the educator doing
well during instruction regarding strategies that
support a coherent content storyline or other ideas that
resonated with them. They additionally shared one
thing they wished they had seen the educator do during
the lesson. To wrap up the session, participants shared
how they were going to apply what they learned
during the VC-LVA session to their own practice
during their spring implementation.
quality and satisfaction of the experience. What
follows are excerpts of the participant perceptions of
this experience (N=21) (Figure 3).
Over 95% of the VC participants agreed or
strongly agreed that the session was well
organized.
90% of the VC participants agreed or strongly
agreed that the sessions were educational and
a model of effective online instruction.
Over 85% of the VC participants agreed or
strongly agreed that the overall experience
was positive.
3. FINDINGS
VC-LVA sessions for the field test were conducted in
January and February, 2013. 10 sessions were held
online using the VC platform with between two to six
teachers present at each session. The sessions were
typically 70 minutes in duration and included the
following elements:
Welcome and introductions
WebEx basics
Learning goals and outcomes
Review of video analysis basics and the
instrument
Review of content storyline and strategies to
look for that support a strong storyline
Three clips of real-time video and participant
coding
Discussion for each clip
Reflection
Two stars and a wish focused on the video
Wrap-up which included how teachers will
apply what they’ve learned
Update on revised resource inventory
Questions
Figure 3: Survey question to participants asking their
perception of the Virtual Classroom: Learning through Video
Analysis session.
The following feedback was about the application of
the VC sessions (N=21):
Over 85% stated that the VC helped them use
the DESI Framework (content storyline) to
improve existing lessons.
About 76% stated that the session helped
them from a fair amount to a great extent
develop or revise science lessons in their own
classroom.
For the VC-VLA session, participants used a video
coding instrument which was developed for teachers to
record evidence they observed in the video for each
content storyline strategy. The participants watched a
video recorded in a general physics class in a public
school. The class consisted of approximately 30
students, tenth through twelfth grades. The lesson was
adapted from NanoLeap [5] and was focused on forces
and interactions. The educator, a veteran of 24 years,
implemented this lesson at the end of a unit on forces.
About one week after the Virtual Classroom (VC)
sessions, the project’s external evaluator sent the
participants an online survey to determine the overall
126
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Figure 5: Survey question to participants asking the extent
to which the Virtual Classroom: Learning through Video
Analysis session helped them learn strategies for creating a
coherent storyline in their lessons.
Open-ended comments regarding effectiveness,
impact, and application revealed that participants
appreciated the interaction and exchange of ideas
across different places and with science experts, as this
was important for reflecting on their own practice; that
the use of technology and the “chunking” of videos
enabled real-time comments and immediate feedback
grounded in the analytic tasks; and that the project and
its tools had served as an impetus to improving their
own teaching.
Figure 4: Survey question to participants asking the extent
to which the Virtual Classroom: Learning through Video
Analysis session helped them to improve, develop, or revise
lessons in their own classroom.
Open-ended comments regarding impact:
What impact do you believe the Virtual Classroom
will have on your science teaching?
“Helpful. Good ideas that I plan to
incorporate. I believe it will help sharpen my
focus on goal, content, and connections.”
“It is always helpful to see the science behind
science instruction and this virtual classroom
helped illustrate this well”
“I hope to incorporate these ideas into ALL
my lessons (not just nano).”
“The virtual classroom provided a venue on
how to walk the students through the process
of learning a concept.”
“I think exposure to this type of "reminder"
helps us focus on effective learning strategies
throughout the school year.”
“It gave me ideas that I could immediately use
in my classroom.”
The following responses are the number of participants
that rated the extent to which the VC helped them
learn about the strategies for creating a coherent
storyline into their lessons to a great extent and a fair
amount. (N=21)
Focus on one main learning goal: 62% great
extent; 24% a fair amount
Link the learning goal to ideas learned in
previous lessons: 57% great extent; 33% a fair
amount
Set the purpose using focus question or goal
statement: 62% great extent, 29% a fair
amount
Refer back to the goal statement or focus
question throughout the lesson: 62% a great
extent; 29% a fair amount
Select activities and content representations
that are matched to the learning goal: 48% a
great extent, 38% a fair amount
Open-ended comments regarding use:
What was most useful about the Virtual Classroom
experience?
Convenience of participation at home without
driving to a specific location
Being able to communicate with people from
other school districts
It is the interaction and exchange of ideas
between and among teachers not physically
together in one place.
Visual and audio interaction. Immediate
feedback.
I liked that it was a small group setting.
Being able to ask questions and get
immediate feedback.
127
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
4. CONCLUSIONS AND FUTURE
RESEARCH
REFERENCES
[1] Learning Forward. Standards for Professional
Learning.
(2011).
Retrieved
from
http://learningforward.org/standards.
[2] K. J. Roth, , S. L. Druker, H. E. Garnier, M.
Lemmens, C. Chen, T. Kawanaka, R. Gallimore,
Teaching science in Five Countries: Results
from the TIMSS 1999 Video Study. Washington,
DC: U. S. Department of Education, National
Center for Education Statistics, 2006.
[3] K. J. Roth, H. E. Garnier, C. Chen, M. Lemmens,
K. Schwille, & N. I. Z. Wickler, Videobased
lesson analysis: Effective science PD for teacher
and student learning. Journal of Research in
Science Teaching, 48(2), 2011, pp. 117–148.
[4] A. Tweed, Designing Effective Science
Instruction: What Works in Science
Classrooms, Arlington, VA: National Science
Teachers Association, 2009.
[5] NanoLeap Project. Funded by NSF# ESI0426401.
Retrieved
from
www.mcrel.org/nanoleap.
Our preliminary data demonstrate there is great
potential to use VC-LVA as a learning platform for
expanding disciplinary and pedagogical content
knowledge of educators and creating opportunities for
virtual peer communities to participate in meaningful
learning. Bringing together teachers virtually into
small peer communities is a realistic and convenient
approach that supports discourse focused on videos of
authentic classroom instruction. The specific emerging
science content addressed in this Virtual Classroom:
Learning through Video Analysis program focuses on
nanoscience and technology integrated with content
storyline pedagogical strategies. There is promise,
however, for this model to be applied to any discipline
and pedagogy. Engaging in a facilitated review process
of authentic classroom video with educators will be
needed to support both current and future educators.
VC-LVA has the potential to provide online,
synchronous professional development to educators
that are geographically distant, but have similar focus
and interest, in a meaningful and engaging way using
authentic classroom video in a platform that allows for
multiple ways of communication.
This approach is practical and meaningful, aligns with
the Standards for Professional Learning from Learning
Forward [1], engages educators in developing
understanding and skills that inform their practice, and
helps ensure that they and their students are inspired,
engaged and motivated through relevant, contextually
based and personally meaningful experiences that
prepare them for lifelong learning in a technologically
progressing society. The VC-VLA platform reflects
the best use of academic standards, research, and
innovative approaches to learning.
While VC-LVA has shown promise in this
professional development project, more research
should be done to determine how a more intense
treatment of learning with this platform might improve
practice in a sustained manner over a longer period of
time. Additional studies could be conducted to
determine the extent to which teachers would be
comfortable coding lessons that they developed with
communities of practice in different geographic
regions. Other research areas could include using VCLVA and measuring growth in areas that include
different pedagogical content and subject matter.
128
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
A Tool Supporting Writing Technical Documents in English Using Corpora:
Retrieving Functions by Cosine Similarity and Pattern Matching
Yoshinori MIYAZAKI
Graduate School of Informatics, Shizuoka University
Hamamatsu, Shizuoka 432-8011, Japan
Shosaku TANAKA
College of Letters, Ritsumeikan University
Kyoto, Kyoto, 603-8577, Japan
and
Yukie KOYAMA
Center for Research and Development in Higher Engineering-Education, Nagoya Institute of Technology
Nagoya, Aichi, 466-8555, Japan
ABSTRACT
In this paper, the development of a piece of Web application is
reported which supports non-native speakers of English to write
technical documents in English. Previously, this tool presented
English texts extracted from corpora, with high similarities with
the original English texts input by users. In this study, a new
function was implemented to this tool for the retrieval by pattern
matching algorithm, enabling users to specify parts of speech and
synonyms. These functions, or, retrieving functions by cosine
similarity and pattern matching, are found complementary.
Another feature is also added to store input logs for retrieval by
users. This paper also includes the result of user experiments.
Keywords: Technical Corpora, Support to Write English
Composition, Web Application, Cosine Similarity,
Pattern Matching Retrieval
1. INTRODUCTION
Because English is the most common language in science and
technology, researchers including undergraduate or graduate
students are often required to write technical documents in
English. However, writing technical academic documents in
English is quite challenging for non-native speakers (NNSs)
especially in EFL settings [1], since technical documents usually
contain specific words and phrases that we seldom use in general
English. In this light, using corpora as a resource to support
foreign language writing is appropriate and useful, especially for
less proficient learners [2] and [3].
Our research group has worked on the development of a webbased application to help NNSs compose academic documents in
English [4]. In order to facilitate a user's English composition
practice, the application requires an English sentence as an input,
not giving an English sentence translated from the Japanese input.
Therefore, expected users are learners of English who have
studied English for a certain period of time but make not only
trivial grammatical mistakes but choose inappropriate words for
the necessary explanations. The application retrieves authentic
English sentences from technical corpora developed by Nagoya
Institute of Technology (NIT) of Japan and presents them in a
more accessible manner. The features of the system include: (a)
retrieving sentences on the basis of calculated cosine similarities
(using n-grams) to the input, (b) retrieving similar sentences again
with the keywords replaced by their synonyms, (c) considering 129
domain-specific expressions of the relevant field, and (d)
summarizing long output sentences in order to show their simple
structures, of which (c) and (d) have not been adopted by other
literature.
In this study, a new module was implemented to this application
for the retrieval by pattern matching algorithm. This feature was
added to solve the problem that the conventional system
sometimes outputs excessive texts which do not appear to be
similar to the input. The module controls such outputs by
specifying the grammar with normalized expressions stipulated by
the authors. For example, when “[N] is conducted” is input, the
application returns corpus sentences containing some noun
followed by “is conducted” or its conjugated form (such as “study
was conducted” and “experiments were conducted”). This usage
is also applicable to verbs [V], adjectives [J], adverbs [R],
prepositions [I], pronouns [P], conjunctives [C] and articles [D].
Another example is “aim- of * research~”, for retrieving sentences
which have “aim” (not allowing its conjugated form (-)), “of”, an
arbitrary word (*), and “research” (or its synonyms (~)), in this
order. Another function is added to store input logs by individual
users, for the purpose of future personalization and use for social
learning.
In the pilot experiment, the application was applied for the
technical English texts composed by university students majoring
in informatics. From the result of the experiment conducted, it
was observed that many subjects issued their queries one after
another, in the course of using both modules. The combined use
of the two modules was also found complementary, from the
histories of subjects.
2. LITERATURE REVIEW
Up to present, there are various research projects going on which
deal with developing systems to support English compositions [5]
[6] [7] [8]. Many of them allow users to input Japanese sentences
for their corresponding English. On the contrary, users are
required to input English sentences, for the purpose of facilitating
their English composition practice in our study.
[5] is the study for presenting sample documents for the given
Japanese. It first translates the given Japanese into English with
commercial software, and extracts similar sentences from the
corpus made from specific domains. The drawback of this system
is that the selection of keywords is limited to verbs and nouns.
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[6] has implemented a web-based composition system with the aid
of a search engine. This system prompts users to issue queries
with wildcards, representing the unclear parts provided by users,
and directs the query to Google search engine to obtain
expressions appearing often on the web. The cons are 1. this
system is greatly influenced by the constraints of Google and 2.
when a multiple number of wildcards are used, results are not
obtained as users expect.
[7] retrieves sentences from corpora similar to input English
sentence, from the dependency of the input words. This site is
open to public at http://escort.itc.nagoya-u.ac.jp/.
[8] developed StringNet as a resource for investigating
constructions and a range of multiple word expressions and for
supporting NLP applications that traffic in constructions.
StringNet supports discovery of grammatical dependencies in
noncanonical configurations as well as lexical dependencies by
adopting hybrid n-grams.
3. RETRIEVING BY COSINE SIMILARITY
Outline
First, let us introduce the web application which the authors had
previously developed for presenting English texts extracted from
corpora, with high similarities with the original English texts
input by users. See the following sections for the details. This
algorithm consists of three steps, for the retrieval of similar
sentences:
Step 1. [Replacement by synonym groups] Applies the
morphological analysis to the input sentence and extracts
keywords from the result. If the obtained keyword is in some
synonym group(s), replace the keyword by the synonym group
ID(s). This step corresponds to (b) mentioned above.
Step 2. [Approximation of contextual-information] Computes ngram components and applies [9] and [10] for multi-word
expressions (MWEs). The use of n-grams and MWEs enables the
application to compute the similarities between sentences based
on approximate contextual-information in the sentence (c).
Step 3. [Extraction of similar sentences] Generates vectors from
the input sentence and each of the corpus sentences, and
quantifies the similarities (a). The technical corpora used in this
study were developed by NIT 1. The extracted sentences appear
with the option for its generalization (d).
Selection of Keywords
First, the morphological analysis using Tree Tagger2 is applied to
an input sentence in order to obtain the part of speech and the
lemma of each word. For the purposes of this study, we defined a
keyword as a word whose part of speech is either a noun,
adjective, adverb, or a verb. A word judged as either a
preposition, determiner, or a cardinal number, retains the
information of its part of speech. The delexical verbs are
eliminated because these words are used quite often with different
meanings and hence they might negatively affect the sentence
identification process3.
Keyword Replacement by a Synonym Group
In composing technical documents, learners of English might end
up using inappropriate words, phrases or collocations. Synonym
groups are capable of working well even in such situations.
Synonym groups are used as a union set of those collected from a
book and a dictionary. The number of the group, which is 102, is
small whereas the reliability is high, since the book is intended for
helping to write technical documents. To reinforce the small
number, the adoption of WordNet4 was attempted. The synonyms
in WordNet are much larger in number, but with the treatment of
various meanings. Therefore, the straightforward use of the
synonyms might produce excessive or redundant results. To
prevent this, we regarded a word as an input suitable for reference
to WordNet only when the word was considered specific to
technical documents. The Chi-square test for homogeneity was
carried out after extracting words from a technical corpus and
English textbooks in (junior)-high schools5. The resulting groups
which were significant at 1% level were 2,943 in number.
N-gram and Computation of Similarities
An n-gram is a subsequence of n items from a given sequence.
For example, a set of 2-grams of “Corpora consist of documents.”
are “corpora consist”, “consist of”, and “of documents”. In this
study, these are generated after a synonym group (ID) or
information of part of speech replaces the original sentence.
The degree of similarity is given by cosine similarity (vector
space model) and expressed as a value between 0 and 1. First a
vector v is composed. As a component of v, each of the keywords
and n-grams (n = 2, and 3) is respectively added, while these
keywords and n-grams are both obtained from the input sentence
and corpus sentence. If the same component is already in v, the
component is skipped. Next, let vectors vL be defined as having 1
(0) in the i-th element if the i-th component of v is (not) found in
the input sentence (i =1, 2, …, the last component of v). Likewise,
each vector of vC for sentences in the corpus is determined. Now
the cosine similarity is computed as
cos(v L , vC ) (v L , vC ) v L vC
where (*, *) denotes the inner product of the two vectors, and
|| * || the length of the vector (2-norm).
Weighting
Weighting by Domain-Specific MWEs: A technical corpus
does not always include sentences that contain typical technical
expressions (e.g., introductory paragraphs). This shows that
weightings should be effective by the degrees of the sentences
having likelihood of being technical. [9] and [10] have
successfully generated a list of domain-specific MWEs in
technical corpora, and obtained 2,677 MWEs in ACL (The
Association for Computational Linguistics) corpus. Some
examples are:
NIT Concordancer, http://lang.cc.nitech.ac.jp/conc/conc.pl
2
http://www.ims.uni-stuttgart.de/projekte/corplex/TreeTagger
3
We tentatively selected the 7 words as delexical verbs:“be”, “do”, 130
“give”, “take”, “have”, “make”, and “get”.
The subjects : “DT system”, “this paper”, “figure CD”, “et
al., CD”, “DT number of”
The predicates : “However”, “for example”, “case”,
“therefore”, “finally”
where “DT” stands for a DeTerminer, and “CD” a CarDinal
number. The authors provisionally set a weight on Ci to
[some constant] × [number of MWEs in Ci] / ([number of
keywords in Ci] + 1).
Weighting by Vector Components:
4
1
It is not unusual that a
A large-scale English conceptual dictionary,
http://wordnet.princeton.edu/
5
English textbooks in high and junior-high schools in Japan used
2002 to 2005 academic year, which was compiled by ELPA
(Association for English Language Proficiency Assessment).
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
word belongs to more than one synonym group. It turns out that
some of them are the members of more than 10 groups. In such
cases, distributing the weightings (such that they sum up to 1) is
probably a reasonable solution. In contrast of 0 or 1 being given
as each of the vector components, 1/k is allocated to the word
belonging to k synonym groups. When more than one word (say,
m words) in the n-grams belong to synonym groups,
1
m
wS
k (w)
Options
In addition to the functions above, two retrieving options are set
up to realize flexible pattern matching. The first option is to
suppress the inclusion of derivatives of words, by adding “-” at
the end of the word. Another option is not just for its derivatives,
but its synonyms altogether. This works by adding “~” at the end.
This function is already equipped in cosine similarity retrieval,
since we consider it essential from the perspective that users tend
to make inappropriate word choices.
Algorithms
In this section, the algorithm of pattern matching is explained.
There are three steps, namely, pattern analysis, word analysis, and
pattern matching, as a procedure to obtain matched sentences.
was weighted, where S is the set of such words, m is the number
of elements of S, and k(w) is the number of synonyms of the
group the word w belongs to.
Pattern Analysis: In the step of pattern analysis, the
order of elements consisting of the input pattern is stored, along
with its classification. This is necessary because their functions
differ depending on the types (words, tags for parts of speech,
wildcards, or options) of the referred element. For example, the
input “is- [V] of” is interpreted as a word (is) without its
derivatives, tag for a part of speech (verb), and a word (of) with
its derivatives in its order. The correspondence table for the
categories and their symbols is shown in Table 2, followed by
some examples in Table 3.
Generalization
What are extracted from corpora have authenticity since they are
actually used and refereed by journal referees. At the same time,
they are sometimes too complicated to learn from due to their
authenticity. Generalization is the procedure to summarize such
sentences and show the general form of each authentic sentence
by replacing specific words with their grammatical markers such
as part-of-speeches. This procedure puts frequently observed
subsequences into chunks and enables us to show structures of
long sentences by repetition of the above replacement (examples
are shown in the next section). The basic idea of generalization is
as follows: (1) high-frequent words in a set of sentences should be
retained, and (2) words occurring in various sentences should be
also retained even though the frequency is not so high. On the
other hand, (3) low-frequency words should be replaced to
grammatical markers, and (4) words, whose frequencies probably
are low, occurring in specific sentences should be replaced. Based
on the idea, words to be replaced are selected. The generalizing
procedure repeatedly replaces words in each sentence in the set
with grammatical markers, in descending order of the computed
value considering (1)-(4). For more details on this formalization,
see [11].
Table 2: Correspondence between Categories and Their Symbols
Category
Symbol
A word with its derivatives
L
A word without its derivatives
W
Tag for a part of speech
P
Wildcard
X
A word with its synonyms
G
Table 3: Examples of Classifying Words in Input Patterns
4. RETRIEVING BY PATTERN MATCHING
Outline
Pattern matching is the function to extract sentences from corpora
which include a phrase (a pattern) specified by users. In this study,
it is our objective to deepen users’ understandings by providing
various patterns such as tags for parts of speech and wildcards.
Input patterns
Symbol
From * to [N]
LXLP
[P] conclude- *
PWX
The aim~ of
LGL
Word Analysis: This step is executed when the input
pattern has at least one word in it. Lexeme correspondence table
(Table 4) arrays approximately 40,000 lexemes appearing in
corpora. Frequency in the table denotes the number of sentences
containing the lexeme. Also, “NULL” represents that there are no
synonym groups the lexeme belongs to. Original forms of the
words in the input pattern are gained by morphological analysis.
The pattern consists of three components: English words, tags for
parts of speech, and wildcards. When an English word is specified,
all of its derivatives are defined to match the word (case
insensitive). For example, the input “run” extracts all the phrases
containing “runs”, “running”, and “ran” as well. Likewise, when
“runs” or “running” is input, the same output returns. One may
also specify tags for parts of speech, for instance, “[V]” for verbs,
and “[N]” for nouns. Table 1 is a list of the tags.
ID
…
L06696
Table 1: List of Tags for Parts of Speech
Verb
Noun
Adjective
Adverb
[V]
[N]
[J]
[R]
Preposition
Pronoun
Conjunctive
Article
[I]
[P]
[C]
[D]
L06697
L06698
L06699
…
A wildcard “*” represents an arbitrary single word. Another usage
is “*^p” (where p is some natural number) for arbitrary p
sequential words.
Table 4: Lexeme Correspondence Table
Frequ
Synonym
Lexeme
Synonyms
ency
group ID
…
…
…………
…………
computable
473
NULL
NULL
computation
896
NULL
NULL
al
compute, assess,
compute
1469
G0024
estimate, …
computer
1629
NULL
NULL
…
…
…………
…………
Pattern Matching: Pattern matching is the last phase
of the retrieval. If a word in the input pattern is not registered in
the lexeme correspondence table, the pattern matching may be
131
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
skipped. Otherwise, matching procedure is adopted using regular
expressions (of SQL) to the target database.
Interface of Retrieving by Pattern Matching
The following figure (Figure 2) shows an input form for pattern
matching retrieval.
5. INTERFACE
This section shows the details of the interfaces with their
screenshots for both of retrieving by cosine similarity and pattern
matching.
Interface of Retrieving by Cosine Similarity
One is given the following options for cosine similarity retrieval
(in the form of CheckBoxes).
Corpus…One may choose an arbitrary number of corpora
registered in the web application
Synonym Retrieving…When “Yes” is selected, sentences
including synonyms of the specified words will also be
extracted.
Size of synonym groups…This is selectable only when “Yes”
is checked in the synonym retrieving option above. When
“Large” is chosen, synonym groups created by WordNet is
used, while synonym groups created by the aforementioned
book are used for “Small” option.
Figure 2: Input Form for Pattern Matching Retrieval
In the pattern matching retrieval, all the corpora are automatically
the target corpus. In the output screen, phrases which matched the
input pattern are displayed in a descending order of frequencies of
the phrases in the corpus. Figure 3 is the screenshot for the output
screen when “[J] construction” was input.
Output screen consists of 3 panes, or, a pane for displaying an
input sentence, synonym groups, and similar corpus sentences.
Highlighting in different colors helps visually understand the
correspondence between words in the input sentence and corpus
sentences.
Figure 1: Screenshot for Output by Cosine Similarity Retrieval
Similar corpus sentences are displayed in a descending order of
cosine similarity. Also, the following naming rule is stipulated as
IDs of each corpus sentence, in order to clarify which corpus the
sentence was selected from (Table 5). In the table, “*” represents
some one-digit number.
Figure 3: Screenshot for Output by Pattern Matching Retrieval
When one of the phrases is clicked, the specific corpus sentences
containing the phrase are displayed in an ascending order of the
number of the words in the sentences. Figure 3 is also the case
when “grammatical constructions” is clicked after “[J]
construction” was input.
Table 5: Naming Rule of Corpus Sentence ID
Corpus
Corpus Sentence ID
ACL
A******
Nature
N******
Biology
B******
Scientific American
S******
6. EXPERIMENTS & DISCUSSION
132
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Comparison of the Results by the Two Retrieving Algorithms
At first, let us show the result of the fuzzy search by pattern
matching retrieval. As an example, let us consider the case of
combining “aim of” with “research”. Let “*” be used prior to
“research” for some word such as an article. Also, let the words
“aim” and “research” be attached with “~” as their suffixes for
searching their synonyms or similar expressions (Table 6).
User Experiments by Composite Use of Retrieving Algorithms
The next experiment was conducted in order to investigate
usefulness of the composite use of the two retrieving algorithms.
The subjects are six university students majoring in informatics.
Phase 1. Subjects translate a prepared Japanese sentence to
English. The use of dictionaries is allowed. The original sentence
is regarding an introductory remark on information science.
Phase 2. Improve the English sentence composed in Phase 1. The
use of cosine similarity retrieval is only permitted.
Phase 3. S Improve the English sentence composed in Phase 2.
The use of pattern matching retrieval is permitted.
Table 6: Results of the Search “aim~ of * research~”
Input pattern
aim~ of * research~
Results (109 sentences matched)
goal of our research
12 sentences
purpose of this study
11 sentences
aim of this study
11 sentences
goal of this research
10 sentences
……
……
The result of each subject is compiled in Table 9. “PH” represents
“phase”, and if there are two numbers in this column, the two
sentences created in the phases are identical.
Now, let us show that the combined use of the two modules was
complementary, along with the histories of subjects (their history
data are omitted due to space constraints). The first is the result of
the compositions by the subject B. They are:
Next follows the result of the searching algorithm by cosine
similarity. This retrieval was executed for the cases with/without
the synonym option, based on the input “The aim of this work is
to develop system”.
Composition at Phase 1:
Table 7: Result of Cosine Similarity Retrieval (without Synonym)
CS
Input: “the aim of this work is to develop system”
The aim of this work is to provide some help to the
0.545
Akkadian learner .
The goal of this work is to develop systems that can
robustly extract information from massive corpora of
0.464
unrestricted ( " open " ) texts .
The aim of this paper is to illustrate FAME , a
0.368
Functional Annotation Meta-scheme for Evaluation .
The aim of the research presented here is to develop a
0.367
completely automatic method for constructing
phonotactic descriptions .
The purpose of this work is to support related work in
0.360
automatic word-sense disambiguation .
0.355
Applications of this work are also discussed .
The aim of this SIGLEX workshop is to bring together
0.353
NLP researchers working on all areas of MWEs .
“Recently, Information technology focuses the way that people
apply information.”
Composition at Phase 2 & 3:
“Recently, Information technology focuses on the way that people
use information.”
The difference between them is “on” after “focuses” in Phase 2 &
3. From the study history, it is found that the subject checked the
phrase “focuses the way” in Phase 2. Thus, cosine similarity
retrieval enables users to extract corpus sentences similar to the
input by using n-gram. After that, also from the history, the
subject has confirmed that the expression “focus on” is frequently
used in Phase 3. With single pattern matching retrieval, the
subject would not have been able to find this phrase since it would
be difficult to guess such a pattern without the knowledge of the
conventional phrase.
The next case is the subject E.
Table 8: Result of Cosine Similarity Retrieval (with Synonym)
CS
Input: “the aim of this work is to develop system”
The goal of this work is to develop systems that can
robustly extract information from massive corpora of
0.629
unrestricted ( " open " ) texts .
The goal of this study was to " evaluate the
0.609
psychological reality of phonotactic constraints .
The purpose of this work is to support related work in
0.585
automatic word-sense disambiguation .
The aim of this work is to provide some help to the
0.545
Akkadian learner .
The purpose of this study is to construct a semantic
0.504
analysis method for disambiguating Japanese
compound verbs .
One of the goals of this work is to describe algorithmic
0.478
and data-structure changes that support the
construction of PSTs over unbounded vocabularies .
One of the purpose of this study is to make a
0.472
distinction between an event aald an event class using
surprising features .
Composition at Phase 1 & 2:
“In recent years, we aim at the way people can exploit information
in information technology.”
Composition at Phase 3:
“In recent years, we aim at ways people can exploit information
on information technology.”
The difference between them is “in” and “on” before “information
technology”. In this case, there were no evident history of the
subject in Phase 2 searching for the usages of the prepositions, but
it is presumed that retrieving by pattern matching worked
somewhat for the improvement of the composition.
User Experiments by Composite Use of Retrieving Algorithms
Lastly, the impressions or comments from the subjects are listed
below.
Pros of pattern matching retrieval
・ It is useful to target all the conjugated forms.
・ It helped observe roles of prepositions between words, by
using tags for parts of speech.
・ It worked well when you have specific phrase you want to
look into.
・ Its interface was easy to use.
Table 7 shows that retrieval with no synonyms works well but
also shows that such sentences would lessen if there are more
words in the input sentence. In Table 8, it is found that there are
more sentences with higher cosine similarities (CS).
133
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Cons of pattern matching retrieval
・ The frequency of the matched pattern does not always help
judge whether it may be used in different contexts.
・ The frequency information will be useful if used relatively to
the others, but won’t be for absolute use.
・ The grammar of the patterns was complicated.
・ Wildcards don’t help unless it could mean an arbitrary
number of words.
ACKNOLEDGMENT
This work was supported by Grant-in-Aid for Scientific Research
(C) (24501185) and by The Institute of Statistical Mathematics for
"Analysis of Multi-word Expressions of Science and Technology
Corpora and Its Application to Education". We also owe special
thanks to Shizuoka University student Shohei Yamamoto (Faculty
of Informatics) for his help with the implementation of the
application (module for pattern matching retrieval) which was
indispensable in our study.
Table 9: Transition of Compositions by Each Subject
ID
Composed sentences
Recently, on information science, researchers focus on
the method that people use information.
Recently, on information science, researchers focus on
the method that people make use of information.
Recently, on information science, researchers focus on
a method that people make use of information.
Recently, Information technology focuses the way that
people apply information.
Recently, Information technology focuses on the way
that people use information.
In recent year, how to exploit for information about
Computer science.
In recent year, people focus of a way to exploit
information in computer science.
In recent year, people focus of attention to exploit
information in computer science.
People have attentioned the method exploit
information on information science in the latest.
People have attracted the method use information on
information science in recent years.
People have attracted the method use information on
information science in recent years.
In recent years, we aim at the way people can exploit
information in information technology.
In recent years, we aim at ways people can exploit
information on information technology.
In recent years, people watch the way that people
exploit an information in information science.
In recent years, people watch the way that people use
an information in information science.
A
B
C
D
E
F
PH
REFERENCES
1
[1] S. Evans & C. Green, “Why EAP is Necessary: A survey of
Hong Kong Tertiary Students”, Journal of English for
Academic Purposes, Vol. 6, No. 1, 2007, pp. 3-17. ]
2
3
[2] A. Chambers, “Integrating Corpus Consultation in Language
Studies”, Language Learning & Technology, Vol. 9, No. 2,
2005, pp. 111-125.
1
2,3
[3] C. Kennedy & T. Miceli, “Corpus-assisted Creating Writing:
Introducing Intermediate Italian Learners to a Corpus as a
Reference Resource”, Language Learning & Technology,
Vol. 14, No. 1, 2010, pp. 28-44.
[4] Y. Miyazaki, S. Tanaka & Y. Koyama, “Development and
Improvement of a Corpus-based Web Application to Support
Writing Technical Documents in English”, International
Conference on Computers in Education 2011, 2011, pp.
263-270.
[5] S. Takakura & T. Furugori, “TransAid-A Writer's Aid System
for Translating Japanese into English-“, Institute of
Electronics, Information, and Communication Engineers,
NLC2002-11, 2002, pp. 7-14.
[6] H. Oshika, M. Satou & H. Yamana, “A Translation Support
System Using Search Engines”, Institute of Electronics,
Information, and Communication Engineers, DE2004-88,
2004, pp. 237-242.
[7] S. Matsubara, S. Egawa & Y. Kato, “ESCORT: English
Sentence Retrieval System: Library Service Using Article
Database”, INFOPRO2007, 2007, pp. 125-129.
[8] D. Wible & N. Tsao, “StringNet as a Computational Resource
for Discovering And Investigating Linguistic Constructions”,
Proceedings of the NAACL HLT Workshop on Extracting
and Using Constructions in Computational Linguistics,
2010, pp. 25–31.
[9] S. Tanaka Y. Koyama, “Extracting Domain-specific
Expressions from ESP Corpora in View of Syntactic
Structures”, The Institute of Statistical Mathematics
Cooperative Research Report 239, 2010, pp. 13-30.
[10] S. Tanaka & Y. Koyama, “Towards Extracting Domainspecific Expressions on a Variety of Linguistic Levels Based
on a Sentence Classification Model”, The Institute of
Statistical Mathematics Cooperative Research Report 233,
2010, pp. 21-33.
[11] S. Tanaka, Y. Miyazaki, T. Ikemoto & Y. Koyama,
“Towards Generalization of Set of Sentences to Support
Sentence Composition in English Using Large-scale n-gram
Database”, The Institute of Statistical Mathematics
Cooperative Research Report 254, 2011, pp. 1-19.
1
2
3
1
2
3
1,2
3
1
2,3
7. CONCLUSION
This paper outlined a web application helping writing technical
documents in English using corpora. In addition to previously
developed function to retrieve similar sentences to the original
English texts input by users by cosine similarity, a new function
was implemented for the retrieval by pattern matching algorithm,
enabling users to specify parts of speech and synonyms. Also,
the function to store users’ input histories was reinforced for
data analysis. For the future plan, the following itemized factors
may be feasible.
Further fusion of the two retrieving functions by cosine
similarity and pattern matching.
Detailed analysis of the input histories of the experiment.
A large-sized experiments with more subjects.
Improvement of this application as a tool for social
learning.
Development of a function to help input words and to
help learners with correct spellings.
134
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
CalcPlusWeb: A Computer Game to Stimulate the Reasoning in
Mathematics
Ilana A. SOUZA-CONCILIO, Claudio K. ANAGUSKO, Gracia M. C. ANACLETO, Beatriz A.
PACHECO
Mackenzie Presbyterian University, Computer and Informatics Faculty
São Paulo – SP – Brazil
significant for instructional design, because they
can offer learning tools based on more varied and
complex models, allowing the creation of
repositories with dynamic educational products
(learning objects) that educational institutions,
educators and students access for consultation and
study [3]. Examples of LOs can quote pictures,
videos, animations, simulations, games, etc. [2].
ABSTRACT
The traditional way of teaching must gradually
adapt to new technologies and educative games
have been shown to be a great tool to help the
teaching-learning process. This article briefly
describes a project that develops a game as
Learning Object (LO) to assist in Mathematics.
CalcPlusWeb is an online board game and was
developed using the Java language. The game was
tested by student of 5th /6th grades, with a total of
66 (sixty six) children. For the evaluation, a
questionnaire was created evaluating the game
usability and playability and the results were all
positive.
Keywords: Mathematics,
Learning Object.
Educational
The use of games as a teaching and learning
strategy in the classroom is a great resource. It
creates situations that allow students to develop
problem-solving
methods,
stimulates
their
creativity in a challenging environment while
motivate them.
According to Smole, Diniz and Milani [4], working
with games is a resource that benefits the
development of learning, different reasoning
processes and interaction among students, since
during a game, the player can follow the work of
others, defend their points of view and learn to be
critical and confident in themselves.
Game,
1. INTRODUCTION
In order to bring together the informal experiences
of learners and the formal education, and to deal
with complex concepts in a more ludic way,
emerges at the end of the twentieth century, the
concept of Learning Objects (LO), digital resource
designed for educational purposes to assist the
learning [1].
Koster [5] explains that when our brain is
practicing something, we´ll dream about it, and that
this is the spontaneous part of the brain “working
on turning newly grasped patters into something
that fits within the context of everything else we
know”. He also says that the goal is to turn it into a
routine.
LOs are also known as "learning object",
"instructional object", "educational object",
"knowledge object", "intelligent object" or "data
object". Regardless of the name used, this concept
seeks to facilitate the decomposition of educational
systems, general computer-based modules in
relatively small and potentially reusable [2].
Therefore, educational games are of great
importance in the life of a child. There are several
games of many different areas and all of them help
in fundamental for the ongoing whole-person
formation of a child. Some challenges during Basic
Education may be the lack between the concepts,
their visualization and training. For example, in
Mathematics, which is where many children find it
difficult to assimilate certain concepts, the game
can be a powerful tool to be aid in teaching.
The LOs are part of an area known as Instructional
Design. Filatro [3] defines it as "the process (set of
activities) to identify a learning problem (a need),
design, implement and evaluate a solution to this
problem." Advances in computer science are
135
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
1. The game works for two, four or six players –
it can be played individually (one to one) or in
group (two on two or three vs. three).
2. Each player (or group) receives thirty markers
of a single color (blue or red).
3. The player (or team) who wins the "odd or
even" starts the game.
4. Each player (or group) will launch three dice
simultaneously and do a math operation with
the values obtained in your move. Example: if
the values obtained were 2, 3 and 1, two
possibilities of moves are: 4 from the
operation "2 +3-1", or 7 from the operation "1
+2 x 3".
5. It’s only allowed to use the four basic
operations
(addition,
subtraction,
multiplication and division).
6. The player (or group) must click on the board
marking the resulting number from the
calculation and the turn passes to the next
player.
7. If the time runs out, the player (or group) will
lose its turn.
8. If the chances of the player (or group) are
finished, he will lose again.
9. If the player loses his turn, he will also lose a
marker.
10. The player (or group) will have a limited
number of hints.
11. The objective of the game is to form five or
more markers together and straight.
12. If markers of the two players (or groups) had
run out, the winner is the one who obtained the
highest number of collinear markers in the
sum of all your results.
Based on all above statements, the main goal of this
work is the development and test of an educational
computer game using Java Applets to stimulate the
reasoning in Mathematics.
There are several online games for the same
purpose [6],like the “FindPair M ath” game,where
you select a card with a math operation and you
have to find out in wich square on the board is the
result. Other example is the “M agic Square” wich
goal is to make all lines, columns and diagonals
results in the sum of indicated values.
In this article are presented the game development,
the evaluation methodology and the results and
analysis of the tests.
The LO developed in this work consists of a board
game, focusing on the area of Mathematics, which
aims to develop some skills in students. Among
them we can mention: development of reasoning,
mental arithmetic, agility, cunning, teamwork,
setting the basic operations with natural numbers
and strategic actions.
2. THE COMPUTER GAME CalcPlusWeb
CalcPlusWeb is an online board game (Figure
1). The objective of the game is to score on the
board five (5) collinear numbers (they must be
directly straight). Players may choose to play in
three different difficulty levels: easy, medium and
hard. What differs in each level is the player'
s time,
the number of hints per game and the number of
chances to play.
After the level is selected, each player or group will
have each turn to play, alternating between a player
(or group) and another. When the player has the
time, he can perform three actions by clicking
buttons. There is an order to be followed. The first
action is to click the button "Play data", which
randomly chooses three values between 1 and 6,
symbolizing the game dices. The second is
optional, the button "Help!" shows all possible
operations (not yet played) for the selected dices;
you can only press the button if the dices have
already been released. The third action is the choice
of the number on the board;pressing (clicking) the
number, the marker will be placed on the color of
the player if this move is accepted. The move can
only be done while the time lasts.
The game was developed using the Java language,
including the technology for applets to be more
secure and portable. It can be accessed through url:
http://calcplus.webs.com.
3. PLAYABILITY AND USABILITY
EVALUATIONS
The playability and usability concepts are
important to assure the quality of the software.
Cybis [7] explains the difference between usability
and playability: "Usability is when you go from
The rules defined for this game are as follows
(Figure 2):
136
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
point A to B, with fewer errors, unhindered.
Playability is when you are getting from point A to
B through an experience designed to be fun which
means that you propose a set of targets with the
correct level of challenge, characters and scenario
graphically attractive and interesting story".
·
·
·
To determine whether a software offers good
usability, Nielsen [8] proposes a set of usability
guidelines, used for heuristic evaluation. And
according to Grassioulet [9], the fun exists with the
following components: optimized challenge;
attention completely absorbed in the activity;clear
goals;clear and consistent feedback that the goals
are being achieved;activities that release the player
of concerns and frustrations, at least temporarily;
feeling of controlling the activity;disappearance of
any feelings of self-consciousness, and the
changing of time during the activity.
All options for closed questions were created based
in the Likert scale.
The tests were performed in Santa Marina School, a
private school located in Vila Carrão, east of São
Paulo.
Results
The aim of the tests was three classes from 5th /6th
grades with a total of 66 (sixty six) students. The
game and rules were first presented then they all
played the game and answered the questionnaire.
Methodology
An interesting fact was that 68.18% (45 students)
of the students said that Mathematics is among
their favorite disciplines, which may have
contributed to the good result of the research.
For the evaluation, a questionnaire was created
evaluating the game usability and playability.
The questionnaire consists of ten questions, eight of
them closed (answer required) and two open
response (optional). The first five questions were
based on the following Nielsen heuristics: "Speak
the language of the users", "Minimize the users'
memory load", "Dialogue simple and natural",
"Feedback" and "Avoiding mistakes". The last five
questions were based on the concepts of [9] that
evaluate the playability and entertainment.
All students had some familiarity with the
computer, half of them (33 students) answered that
they use the computer every day, 25.
76% (17
students) use 2-4 times per week, 16.
67% (11
students)used 5-6times per week, and only 7.
58%
(five students)use once a week.
In general, the results were very satisfactory since
most students scored positive (between 78% and
89%) in all of the questions.
The questions were:
·
·
·
·
·
·
·
·
After a few gameplays, was it possible to
make the moves more quickly?
Would you change any game feature? If
yes, which one?
Would you like to add any feature to the
game?If yes, which one?
An interesting fact is that only 16,67% students (a
total of 11) suggested features to be changed in the
game and only 10,61% (a total of 7 students)
proposed new ones to be added.
Is Mathmatics between your favorite
disciplines?
In your opinion, had the game motivated
the logic reasoning in maths?
The game uses simple and easy words to
understand?
All informations were available when
needed?
W ere there informations that weren’t
important in the rules or during the
gameplay?
Was it easy to understand what was going
on during the gameplay?
Have you found any errors in the game?
Was it possible to notice the evolution of
levels difficulties?
Thus, the students who answered that Mathematics
weren’t among their favorite subjects praised and
liked the game. And students who already liked this
discipline, became much more excited about the
proposal of the game. It was possible to analyze the
children during the tests and some interesting
details were observed. At the start of the game the
addition operation was more used, so that the
moves were made only at the edges of the board
and most of the students did not use the division
and subtraction operations.
Some students were more focused on find a best
choice to mark on the board than on winning the
137
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[7] CYBIS, Walter; BETIOL, Adriana Holtz;
FAUST,
Richard.
Ergonomia
e
Usabilidade: Conhecimentos, Métodos e
Aplicações. 2ª edição, São Paulo: Novatec,
2010.
game. For this reason, the players began to help
each other, even though opponents.
4. CONCLUSIONS
This work presents the development and
evaluation of a game as Learning Object called
CalcPlusWeb. This is an online board game that
works with the four basic mathematical operations
and natural numbers, with the aim to stimulate the
logical reasoning and mental calculations in
Mathematics.
[8] NIELSEN, Jakob. Usability Engineering.
New York, NY: Academic Press, 1993.
[9] GRASSIOULET,
Yves.
A
Cognitive
Ergonomics Approach to the Process of
Game Design and Development. Dissertação
de Mestrado, Universidade de Gênova, 2002.
The game was developed in Java language, and the
Applets technology was used to provide access
through the Web. The graphic interface was created
based on similar games.
After its development, it was evaluated by sixty six
students from 5th /6th grades. The evaluation
consisted on the following phases: game
presentation, rules introduction, experiment playing
the game and evaluation answering a questionnaire.
The results were very positive in all playability and
usability aspects evaluated.
Among all the satisfactory results, it is important to
point out that the game achieved its purpose and
stimulated the child interest in Mathematics.
5. REFERENCES
[1] WILEY, David. Learning object design and
sequency theory, 2000. Thesis (PhD) Brigham Young University, Provo, 2000.
[2] TORI, Romero. Educação sem distância: as
tecnologias interativas na redução de
distâncias em ensino e aprendizagem. São
Paulo: Editora Senac São Paulo, 2010.
[3] FILATRO, Andrea. Design Instrucional na
prática. São Paulo, Pearson Education do
Brasil, 2008.
[4] SMOLE, K.S.; DINIZ, M.I.; MILANI, E.
Jogos de Matemática do 6° ao 9° ano.
Cadernos do Mathema. Porto Alegre: Artmed,
2007.
[5] KOSTER, Ralph. A theory offun for game
design. Scottsdale, AZ: Paraglyph Press, 2005.
[6]
GAMES ONLINE. Avaiable at http://
www.jogoonlinegratis.com.br. Acessed in
April, 2013.
138
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Figure 1: Initial interface presenting the game rules
Figure 2: Game interface during a gameplay
139
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Perceptions of Electronic Health Records in Mississippi
Jennifer L. Styron, Ph.D.
College of Nursing, University of South Alabama
Mobile, AL 36688, United States of America
and
Barry Cumbie, Ph.D.
College of Business, The University of Southern Mississippi
Hattiesburg, MS 36906, United States of America
ABSTRACT
EHR Characteristics, Benefits, Challenges
Electronic health records are similar in basic purpose to the
traditional, paper-based records; however, by virtue of being
digital they are readily accessed, duplicated, shared, and
transported via networks, the least not being the Internet.
AHRQ [2] defines EHRs as, “an inclusive system of information
technology software, hardware, peripherals, and network
connectivity that must be selected, acquired, installed,
implemented, taught, maintained, and secured.” The digital
aspect of EHR opens up many possibilities ranging from
patients who are empowered and engaged in their own care to
aggregated databases of treatment outcomes and efficacy.
This study reports perceptions of Electronic Health Record
(EHR) adoption among key constituents in Mississippi to inform
health care professionals and administrators about factors that
influence the adoption and integration of EHRs into practice.
The results from a survey conducted at two statewide health
conferences in Mississippi indicated a high degree of optimism
in regards to successful EHR adoption, but less for specific
practices and in rural areas. These results are relevant to
healthcare decision and policy makers to determine needed
professional preparation and programming, if any, for current
and future healthcare professionals; and to identify workforce
development challenges lending insight into the technology
skills needed to adopt and utilize EHRs at a meaningful level.
Further, the assessment identified potential factors that may be
associated with the current level of adoption of utilization of
EHRs.
As with any major technological shift, there are several complex
challenges, potential improvements, and development
opportunities associated with EHR adoption. The expected goals
of EHR adoption are reduction of health costs resulting from
inefficiencies and duplications, quality of care improvement,
better coordinated care across the continuum of healthcare
services, promotion of evidence-based medicine, and
improvement of record keeping and mobility [3; 4; 5; 6; 7].
Improvements in quality of care are expected from providing
appropriate guidance to help guide medical decisions at the time
and place of care and the reductions of medical errors, health
disparities, incorrect patient information, and inappropriate
and/or duplication of care. These outcomes work to advance the
objective of patient-centered medical delivery [8].
Keywords: Electronic Health Records, Health Information
Technology, Health Informatics, and Technology Adoption
INTRODUCTION
William Hovarth recounts the experience of the British Air
Defense Command circa World War Two: “To make effective
use of [new technological developments such as radar] required
drastic overhaul of inappropriate operating procedures and
outmoded combat organizations. This is the situation facing the
health industry today ” [1, p. B-276]. He identifies the
resistance among physicians to avoid interference and protect
the privacy of their patients, yet points out the sharp rise of costs
for consumers and hospitals as an impetus for change. Hovarth
wrote this in 1968 speaking about the need for operational
management techniques in the health industry. The situation
today is similar; with EHR as an available technology envisaged
to curtail rising costs, yet one that can disrupt organizational
structure and medical practice, with risk of exposure of
confidential patient records to new security threats. Hovarth
issues a caution to management scientists, “For, if they are not
careful, they may arouse unrealistic expectations of quick
solutions to all managerial and organizational problems of the
health field. These expectations could quickly turn into
disillusionment in the face of the hard realities of dealing with
the complexities in the organization of medical care” [1, p. B276]. Some 40 years later, we must balance the expectation of
EHRs with the complex reality of the healthcare industry.
Challenges associated with EHR adoption include compliance
with federal legislation and state and federal privacy laws
(HIPAA), EHR certification, technology development, rural and
urban adoption, maintenance and support, and competitive
choices [9; 10; 11; 12; 13; 14; 15]. In addition to the
relationship with a complex health care environment, EHR
adoption faces other significant adoption barriers including
initial and ongoing investment; insufficient return on
investments; lost productivity; increased legal exposure;
increased management and administration effort; training and
professional development; and changes on established business
practices [13; 14; 16; 17; 18]. Further, these systems face
regulatory scrutiny. The time and cost associated with the
adoption of EHRs are significant and include the opportunity
costs of productivity loss and taking resources from other
investments such as new medical equipment [15].
Even with federal subsidy, provider adoption of EHR remains a
complex problem, with basic adoption rates estimates around
one in five [2; 19]. For one, EHR is but one component of a
140
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
complex and dynamic health care industry. The national EHR
adoption mandate comes amid other health care reforms (e.g.
universal health insurance coverage) and the intersections of
emerging technologies including consumer health IT
applications [20] and telemedicine, economic hardships,
political uncertainty, judicial scrutiny, and environmentally
related conditions (e.g. health concerns arising after the
Deepwater Horizon Oil Spill in the Gulf of Mexico in 2010). As
a whole, EHR adoption is not a singular problem but
interdependent with many other equally important and resourceheavy issues.
perform.
Two constructs common to the Technology
Acceptance Model [24] and Diffusion of Innovation Theory
[25]: (6) EHRs are useful, and (7) EHRs are easy to use.
The open-ended items are as follows: (8) What is the most
advantageous aspect of EHRs?, (9) What is the most challenging
aspect of EHRs?, (10) What aspect about EHR is not being
adequately addressed?, (11) In 2014 Medicare and Medicaid
will require EHR systems to be in place for practices to avoid a
1% non- compliance penalty. What impact will this requirement
have on the practice community?, (12) What types of resources
do you think are needed to spread the adoption and usage EHRs
in the state?, and (13) What types of legal challenges (if any)
have been identified with EHR adoption and use?
Achieving a better understanding of adoption rates – at what
stage and how they got there? – is a fundamental step toward
improving healthcare outcomes. This problem is complex,
given the background of EHR adoption, including the innate
challenges of and training necessary when adopting a new
technology, the special challenges of medical providers in rural
and underserved areas, the nature of technology and the
industry, and the overarching sociopolitical climate. This study
therefore looks to gain insight into the nature of EHR adoption
among by gathering perceptions from key healthcare
constituents.
Questionnaires were disseminated at two statewide conferences:
the Mississippi Health Summit (Spring, 2011) and the
Mississippi Rural Health Association Annual Conference (Fall,
2011). Following collection, data were analyzed for similarities
and differences among responses to determine perceptions of
potential factors that may be associated with the current level of
adoption of utilization of EHRs. Recurrent themes among rural
healthcare professionals were also drawn for open form
questions to better understand the connection (if any) of these
themes in accordance with Stage One Eligible Professional
Meaningful Use Core and Menu Set Measures for Electronic
Health Records.
METHODOLOGY
Purpose of the Study
The purpose of this study is to investigate the perceptions of
EHRs and the resources needed of health care professionals and
administrators to determine the factors that influence the
adoption and meaningful use of EHRs.
Eisner’s
Connoisseurship Model of Inquiry was used as the framework
for this study and focuses on two key areas of connoisseurship
and criticism [21; 22]. His approach is one of many frameworks
in qualitative research and identifies that such research is both
subjective and objective.
In Eisner’s model of inquiry,
connoisseurship suggests that the researcher captures the data
and transform it into some type of public form in order to
disseminate knowledge on the phenomenon studied. The second
area to this model, criticism, implies that the research process of
collecting data is a subjective and objective process (or
“transactive” as defined by Eisner), thus the researcher needs not
only to disseminate the information, but also provide a critique
of findings in a positive and/or negative manner [21].
Participants
Questionnaires were distributed to 279 conference participants
attending either the 2011 Mississippi Health Summit at The
University of Southern Mississippi in Hattiesburg, Mississippi
(April 2011) or the 2011 Mississippi Rural Health Association
annual conference held at the Clyde Muse Center in Pearl,
Mississippi (September 2011). Participants at the Mississippi
Health Summit (n = 165) and the Mississippi Rural Health
Association (n = 114) annual conference included health-related
professionals and public officials in the State of Mississippi.
The research team received 50 completed questionnaires for a
total response rate of 18%.
FINDINGS
Demographic Data
The first section of the questionnaire was demographic to collect
information about the participant including consent for
participation, participant’s name, organizational affiliation,
current position and title, the number of years in the current
position, and other relevant experience. Participant names,
titles, and organizational names were omitted to ensure
confidentiality.
Research Design
A brief questionnaire was developed specifically for this study
to identify common themes and issues associated with EHR
adoption and usage. The questionnaire deployed was used to
gather quantitative and qualitative data and consisted of
demographic, five point Likert-scale, and open-ended questions.
Items were based on existing adoption theory, although not
intended to be a comprehensive theory-testing instrument.
Of the 49 participants who reported organizational affiliations in
this study, the highest (34%) were from state organizations (n=
17). Followed by medical centers (n = 11) and academic
institutions (n= 11), each accounted for 22% of reporting
participants. Slightly less than one quarter (24%) of the
participants reported 10 or more years of experience with 50%
(n= 25) being within the first five years of employment (n= 25).
Participants indicated their level of agreement (from strongly
agree to strongly disagree) to the seven items. The first set
dealing with their perceived level of optimism regarding EHR
adoption. The first I am optimistic about the rate of successful
EHR adoption (1) in general, (2) in Mississippi, (3) in
Mississippi’s stand-alone practices, and (4) in Mississippi’s rural
healthcare settings. The next item, drawing from the Task
Technology Fit Model [23] relates to alignment between tasks
characteristics and technology characteristics: (5) EHRs
currently match the tasks that the health care professionals
Participants were also asked if about their relevant experience
related to healthcare. Twenty-eight participants responded to
this item. Of these, eleven (39%) reported practical experience
including nursing, clinical physician practice, and clinical
141
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
administration; and eight (29%) reported education experience
such as teaching, advising, and obtaining a graduate degree in a
healthcare related field. Other categorical experience included
four reporting health information management experience
including computer programming, health information
management, and electronic medical and health record
management; three reporting state organization experience with
the Mississippi State Department of Health (MSDH); two
reporting assessment experience including administrative
positions overseeing assessment and experience as an analyst;
and four reporting other experience not directly related to
healthcare including social security, serving as an education
governing board member, public accounting and consulting.
The second theme, improves clinical processes, is defined as
any type of improvement to the current practices and processes
of clinicians. Categories within the improving clinical processes
theme included the ability of EHRs: to increase disaster
preparedness, improve clinical measuring and reporting,
increase decision support, promote the continuity of care and the
coordination of services for a patient, increase clinician
efficiency, provide enhanced referrals, and utilize electronic
prescriptions also known as e-prescriptions.
The third theme, increases record system functionality, is
defined as those advantages associated with the increased
functionality of using an electronic health record system. The
categories included: improves clinician work flow, decreases
error reduction, decreases duplication of services, increases
patient quality care, and promotes quality care improvement.
Additionally, the use of an EHR system as it relates to the
system’s functionality is that is allows for remote access, and
improves billing processes, increases portability, increases
convenience, and increases the speed of which healthcare
information can be accessed and retrieved.
Descriptive Data
Next, participants were solicited about professional opinions as
related to the adoption and use of EHRs. Most participants were
optimistic about the adoption of electronic health records in
general however were less optimistic in specific relation to
Mississippi. Table 1 provides an overview of descriptive data
reported on electronic health record system adoption.
Table 1. Levels of Optimism for EHR Adoption.*
Minimum
General
1.00
Mississippi (MS)
1.00
MS stand-alone practice
1.00
MS RHC practices
1.00
* n = 49
Maximum
5.00
5.00
5.00
5.00
Mean
4.02
3.63
3.10
3.08
Challenges Associated with EHR Adoption and Use
Themes developed to address the responses to the most
challenging aspects of EHRs and the aspects of EHRs that are
not adequately being addressed include financial challenges,
technology issues, policy concerns, and organizational factors.
Each of these themes along with the respective categories
associated with the theme will be provided below.
SD
.94
1.15
1.07
1.20
Approximately 48% of the 49 participants believed EHRs match
current practitioner task while (32%) were indifferent. All
participants agreed to some level that EHRs are useful with 64%
of the respondents (n = 32) indicating strong agreement and
18% somewhat agreeing. When asked whether EHRs are easy
to use almost half (48%) of the participants (n = 24) reported
some level of agreement, while 36% (n = 18) were indifferent.
The first theme, financial challenges, is used to define any
challenge of EHR adoption and its use that is associated with a
financial barrier. Categories found within financial challenges
included the cost associated with the adoption (initial start up
costs), implementation, software equipment, and maintenance of
the system including equipment upgrades and software updates;
the lack of broadband coverage; and the lack of resources
needed to provide support help, training, and education on how
to meaningfully use EHRs.
The open-ended questions explored the most advantageous
aspects of EHRs, the most challenging aspects of EHR, the
aspect(s) of EHR that is not being adequately addressed, the
impact of the mandate by Medicare and Medicaid to utilize
EHRs in a meaningful way by 2014 to avoid a 1% penalty, the
types of resources needed to spread the adoption and usage of
EHRs in Mississippi, and the types of legal challenges (if any)
that have been identified with EHR adoption and use.
Responses from this section were organized into themes through
three rounds; the first of categorical identification and response
selection, then further refined the selected categories by
compiling those categories that emerged with similar themes.
The third round of analysis grouped categories into identifiable
and explainable themes. Developed themes will be discussed in
detail for each question.
Technology issues were another theme and describe categorical
responses that related specifically to barriers associated the
technology needed to utilize an EHR system. Categories
included the lack of a standardized program; EHR system
relevance, compatibility, complexity, flexibility, and reliance;
the ability of vendors to meet healthcare providers and clinical
needs; the lack of convenience and ease of use associated with
using EHRs; the difficulty (or lack of) in providing clinical
customization; and the strain associated with required workflow
changes needed to successfully utilize EHR systems.
The third theme, policy concerns, is defined as those related to
security, confidentiality, and workload concerns. Categories in
this section included issues and concerns related to patient
confidentiality, the ambiguity of a universal database for storage
(risk of abuse and privacy breaches), system compatibility
specific to linking across fragmented healthcare services, and
increased documentation requirements by regulatory agencies.
Advantages of EHR Adoption and Use
The three predominant themes of perceived advantages of EHR
adoption and use are that these systems improve data, improve
clinical processes, and increase record system functionality.
The first of these, improve data, is defined as any type of
advantage in which the respondent thinks EHRs improve
healthcare data that is available to practicing healthcare
professionals. Categorical topics that were included in this
theme include: centralized data, ability to share data, uniformity
within the data, ability to have paperless data, and that the data
related to an individual’s healthcare is compiled.
Organizational factors, the final theme, describes the categories
that are associated with the motivation and perceptions of
healthcare workforce and the ability of the provider supply
adequate training, education, and resources needed to
successfully integrate EHRs into practice. Categories among
142
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
this theme included perceptions and willingness of healthcare
professionals to “buy-in” or “adopt” EHRs, the lack of
comprehensive data available within EHRs, deficiency in
available training and education for healthcare professionals,
lack of ability to implement systems based on provider size or
geographic location, and the learning curve associated with the
integration of an EHR system.
participant responses did not fit into the emerging themes.
The first theme was a decrease in the number of providers and
healthcare professionals. Categories included the retirement of
older physicians, the disincentive to accept Medicare and
Medicaid beneficiaries in clinics, the decrease in the number of
providers and practices available, increased service cost (as a
result of non-compliant penalties) for those providers unwilling
to adopt EHRs, and the disincentive for healthcare professionals
to continue work in the field.
Aspects of EHRs Inadequately Addressed
In addition to identifying challenges associated with EHR
adoption and use, participants were asked to identify the aspects
of EHRs that are not being addressed. Because this question is
an extension of the challenges associated with electronic health
record adoption and use, four of the same themes were found
which include financial concerns, technology issues, and policy
concerns, and organizational factors.
Additionally some
responses did not fit into these four themes therefore a fifth
category, other, was created to recognize and report these
categories.
The acceleration of adoption was also reported by many
respondents as a result of the mandate to utilize EHRs as many
providers and physicians would not want to face the noncompliance penalty.
Increased compliance categories that emerged within the
compliance theme included general compliance with Medicare
and Medicaid, an increase of EHR non-use in provider medical
liability, an increase in pressure on the vendors to meet
deadlines, and an increase in accountability to adopt some type
of EHR system and use it in meaningful ways.
Financial concerns in relationship to aspects of EHRs that are
not being adequately addressed included the needed technology
support by providers to successfully purchase, install, maintain,
and utilize EHR systems; the lack of resources of current
providers to be able to provide appropriate training, education,
and time release for current professionals; the costs associated
with upgrades and updates to the system; and the lack of funding
available for providers to integrate and utilize EHR systems
meaningfully, specifically costs associated once the initial
incentives currently available are removed or no longer
available.
Increased costs was another theme and included categories such
as: additional costs associated with training, the economic
impact the mandate with have on healthcare providers’ operating
costs, and increased cost associated with adequate release time
for healthcare professionals to learn how to use EHRs.
The other category was identified to include responses that did
not correlate with the emerging categories and themes associated
with this questionnaire item. Responses in this theme included
responses such as “not sure,” “little or no change,” or “huge and
significant.” In addition, one respondent stated that the mandate
will decrease the time with patients.” Although these responses
appropriately answered the question, they did not fit within the
emerging themes.
Technology issue categories that responders felt are not currently
addressed include the effectiveness of system usability, system
compatibility with other EHR systems regionally, statewide,
nationally, and internationally; the follow-up capabilities of
EHR systems; the technology comfort levels of current
healthcare professionals; system outages; challenges with eprescribing; the environmentally friendly aspect of being
paperless; and how to safely transfer data to and from other
sources.
Resources Needed to Adopt and Use EHRs
The three prominent themes for the types of resources needed to
spread the adoption and usage of EHRs in the state include
support, coordination and collaborative efforts, and financial
assistance or incentives. Almost unanimously were the first
three themes among respondents however a fourth category was
established for other responses that did not fit into the three
emerged themes for resources.
In relationship to the aspects of EHRs that are not currently
being addressed, public education (or lack of) was the only
category associated within the organizational factor theme.
Three respondents were unsure of the current aspects not being
addressed with EHRs or did not provide specific information
recognizable for placement into a category. One respondent
stated, “Most of it is being addressed.” The second respondent
stated, “None that I’m aware of.” Finally, the third participant
stated, “Not sure.” In order to recognize these responses (while
they do not provide any insight into specific aspects that aren’t
being addressed by EHRs) the other category to ensure these
answers were also reported.
Support for resources to assist in the adoption and use of
electronic health records included the following categories
technology training and support, education, webinars, increased
IT staff in the healthcare facilities, and broadband access.
Coordination and collaborative efforts categories included
collaboration with community organizations, statewide
meetings, the need for a statewide coordinated system, applicant
assistance while adopting and utilizing electronic health records,
and participation and collaboration of insurance companies
during the adoption process.
Impact of EHR Requirement on Practice Community
Participants were also asked to indicate the impact of the 2014
Medicare and Medicaid requirement on the practice community.
This requirement will result in a 1% non-compliance penalty for
those who do not utilize EHRs in meaningful ways. Themes
emerging from participant responses included a decrease in
providers, accelerated adoption, compliance, and cost. A fifth
category, other, was also created for this item as some of the
Financial assistance and/or incentives was the most commonly
cited resource with categories including state and federal
funding (incentives and assistance) to assist with the
infrastructure, purchase, implementation, and maintenance of
electronic health record systems, affordable technology training
143
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
and education for healthcare professionals, and the ability to add
IT costs to capital payment models for cost reimbursement to
Medicare and Medicaid in order to assist in the financial costs of
adopting an electronic health record system.
be particularly useful in rural areas where individuals may have
to travel greater distances to receive medical treatment as their
health records would be able to be easily retrieved and shared
when utilizing an electronic health record system.
Other responses included more involvement from public
relations, documentation for electronic health records, and the
removal of the EHR requirement allowing the providers to
decide whether or not they should adopt electronic health
records. Additionally, one participant responded that they were
not sure of the resources needed to adopt and utilize electronic
health records.
Identified perceived challenges currently associated with the
adoption and use of electronic health records included financial
challenges, technology issues, policy concerns, and
organizational factors. Financial challenges may significantly
impact the adoption process for electronic health records. While
incentives are in place to assist providers in adopting EHRs,
these funds are not adequate to purchase, train, implement, and
sustain electronic health record systems.
Further, some
healthcare professionals believe the costs of adopting and using
electronic health records outweigh the non-compliance penalties
that will go into effect in 2014. Additionally, many rural
healthcare providers are older and findings indicate that these
mandates decrease incentives for aging healthcare providers to
continue practicing with could result in a reduction of the
number of providers and healthcare professionals currently
practicing in rural areas of Mississippi.
Legal Challenges Associated with EHR Adoption and Use
Themes relative to the types of legal challenges that have been
identified with EHR adoption and use include confidentiality
and privacy, data sharing and documentation, and system
security.
Participants consistently reported confidentiality of patient data
and patient privacy as a legal challenge associated with utilizing
electronic health records. In addition, the health insurance
portability and accountability act of 1996, more commonly
referred to as HIPAA, was another commonly reported legal
concern in relation to protecting patient confidentiality and
privacy. Additionally, providing patient’s the right to opt-out of
electronic health records and health record sharing was also a
cited concern.
Along with financial issues are those challenges related to
technology.
Considerations include the relevance,
compatibility, complexity, flexibility, and reliance of the system.
Lack of standardized programs, convenience, and ease of use of
the EHR systems continue to challenge the adoption and use of
EHRs. Additionally, the difficulty associated with the required
workflow changes, and any change to current practice in
general, will create barriers to the adoption process.
Maintaining patient confidentiality, the potential risk of abuse
and privacy breaches, and increased amounts of documentation
required by regulatory agencies are policy concerns of
healthcare professionals. Further, the lack of standardized
systems integrated within the state and the compatibility specific
to linking across fragmented healthcare services presents
challenges to the adoption process. Motivation and perceptions
of healthcare workforce and the ability of the provider supply
adequate training, education, and resources needed to
successfully integrate EHRs into practice are also a challenge to
adopting electronic health records. Without “buy-in” from key
constituents, even with financial support, providers will find it
difficult to properly adopt and utilize these systems.
Data sharing and documentation was another theme that
included categories such as data sharing and data access; the
potential for unidentified health diagnoses or the lack of followup for abnormal results of labs and procedures; foreseeable
problems with marginal charting by technology-challenged
providers; the chance of late entry of notes; and the lack of
standardized documentation.
System security was also a theme and included the protection of
individual identities, individual health records, and concerns
about the likelihood of data breaches and computer hackers
being able to obtain electronic health information more easily
than with traditional systems and paper records.
DISCUSSION
Aspects that participants felt are not being adequately addressed
included financial costs of adopting and supporting meaningful
use of electronic health records, lack of resources to provide
appropriate training and education for healthcare professionals,
and the effectiveness of system usability and compatibility with
other EHR systems regionally, and statewide. Additionally,
down time required for system updates, upgrades and potential
outages that may result from faulty or outdated equipment
should also be evaluated. Such concerns will hinder the
adoption and use of EHRs and may potentially cause providers
to keep two sets of records (one paper and one electronic) that
will result in increased workload and decreased levels of
efficiency for clinicians.
Healthcare professionals identified advantageous aspects of
adopting and utilizing electronic health records which were
consolidated into three general themes: improving data,
improving clinical processes, and increasing record system
functionality. Advantages of improving data included the ability
of health records to be centralized, shared, uniformed, compiled
and paperless. Additionally, the ability for EHRs to improve
clinical processes including clinical measuring and reporting,
enhancing available decision support, and promoting the
continuity and coordination of care provide the potential for
decreased duplication of services, the ability to better coordinate
and ensure the continuity of patient care, and access to tools
which could assist healthcare professionals in decision support.
Finally, the ability of electronic health record systems to
improve record system functionality provides the opportunity to
alleviate time-consuming processes such as billing, can decrease
errors in patient services, and may improve patient care by
providing quick, convenient opportunities for health care
providers to access medical information. These advantages may
Identified themes relevant to the impact of the EHR requirement
on the practice include an accelerated adoption model, a
decreased number of providers and healthcare professionals,
and increased compliance and costs associated with the adoption
of EHRs. Participants had two opposite perspectives on the
impact of the mandate. One group of respondents believed the
144
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
mandate would accelerate the adoption process and increase
compliance with the mandate. Because financial incentives are
built in for early adopters and penalties will not start for noncompliance until 2014, it may be beneficial for providers to get
on board early to recoup some of the financial burdens of
adopting EHRs within their practices. Categories within this
theme include the additional costs associated with training, the
economic impact the mandate with have on healthcare
providers’ operating costs, and the increased cost associated
with adequate release time for healthcare professionals to learn
how to use EHRs.
legitimate concern for healthcare providers and professionals.
Communication problems can result in an increased risk for
clinical negligence or medical malpractice and the ability for
information to be entered electronically with no clear
communication standard in place may increase the probability of
such an issue arising. System security should also be included
in legal concerns as the protection of individual identities,
individual health records and the ability for illegal hacking and
confiscating personal information being heightened with the use
of multiple electronic health records systems.
LIMITATIONS & FUTURE RESEARCH
The other group of respondents pointed to a complete opposite
perspective indicating that older physicians may retire due to the
mandate that will decrease the number of providers and
professionals in rural healthcare community. This is a cause for
concern as the state of Mississippi already has the lowest doctor
per capita of any state in the United States. This may lead to a
greater disparity in provided healthcare to those citizens within
rural areas and widen the gap between the services these citizens
are provided. Further, the increased costs incurred by healthcare
providers who may be already financially struggling to stay
afloat may impact the number of providers and healthcare
professionals within the state. State resources such as financial
assistance and training and education may be one solution to
assisting professionals in rural areas.
While the study provides general perceptions of EHRs within
the state of Mississippi it is not guaranteed that these perceptions
are representative of the rural area population. Further, while
the findings of this study provide insights for the state of
Mississippi, they may not be useful in forming generalizations
about other southeastern rural areas or national rural areas.
Thus, caution should be taken when considering the potential
implications of this study when compared to other state rural
areas.
Information derived from this study may serve as a foundation
for future research studies involving the adoption and use of
EHRs in rural areas on a state, regional, or national level.
Convenience and maximal variation sampling techniques were
utilized for the needs assessment with the selection of
participants based on attendance at a statewide healthcare
conference. This sampling was utilized to gather information
from participants who displayed different attitudes and rates of
adoption of electronic health record adoption and use.
Among the resources identified that are needed to adopt and use
electronic health records includes support, coordination and
collaborative efforts, and financial assistance and incentives.
Most respondents reported the need for technology training and
support, education, and professional development opportunities
such as conferences or webinars. Additionally, respondents
indicated the need for additional IT healthcare care and
broadband access to the list of support needed.
CONCLUSION
Based on the findings it is evident that that most healthcare
professionals are optimistic about the successful adoption and
use of electronic health records in general. However, when
asked about their optimism for adoption in Mississippi, selfreported levels of optimism were lower than optimism levels in
general. Mean scores for levels of optimism for Mississippi’s
stand-alone practices and rural healthcare practices were low
with rural healthcare practices reporting the lowest mean score
(M = 3.08, SD = 1.20). This suggests that healthcare
professionals in the state of Mississippi are generally optimistic
about electronic health record adoption however are less likely
to be optimistic about the adoption of EHRs within the state.
There was also recurring theme of statewide collaboration
including a statewide coordinated system, and partnerships with
community organizations. Applicant assistance while adopting
and utilizing electronic health records and participation of
insurance companies during the adoption process were also
mentioned as resources needed to successfully integrate EHRs.
Financial assistance was the most commonly cited resource
needed with categories including state and federal funding
(incentives and assistance) to assist with the infrastructure,
purchase, implementation, and maintenance of electronic health
record systems, affordable technology training and education for
healthcare professionals, and the ability to add IT costs to capital
payment models for cost reimbursement to Medicare and
Medicaid in order to assist in the financial costs of adopting an
electronic health record system. Clearly the current incentive
program by Medicare and Medicaid does not adequately support
the adoption and meaningful use of electronic health records.
Further, findings from this study suggest further research should
be conducted to investigate perceptions of Mississippi’s rural
healthcare practices, as reported levels of optimism were the
lowest for this particular group within the state. Since rural
healthcare settings typically have scarce resources, few
providers, and large numbers of Medicare and Medicaid
patients, it is imperative that factors that impede or facilitate
EHR adoption, specific to this population, should be explored.
Failure to better understand this unique setting and the
challenges of EHR adoption and use will result in a greater
disparity of healthcare services provided in rural areas of the
state.
Legal challenges associated with EHR adoption and use
included confidentiality and privacy, data sharing and
documentation and system security. As privacy is already a
huge concern in regards to patient information with such acts as
HIPAA in place it is not surprising that respondents felt
confidentiality and privacy are appropriate legal concerns and
will increase liability for breaches in information. Additionally
the increased risk for unidentified health diagnoses or the lack of
follow-up for abnormal results of labs and procedures, etc. is a
145
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
REFERENCES
[1] Hovarth, R. J. (1968). Organizational and management
problems in the delivery of medical care. Management
Science, 14(6), B-275-B-279.
[2] AHRQ (2010a). Health IT in small and rural communities,
available from the AHRQ National Research Center at
AHRQ.com, retrieved 25 October, 2010, from
http://healthit.ahrq.gov/
[3] Ferris, N. (2010). Meaningful Use of Electronic Health
Records.
Health
Affairs.
Retrieved
from
http://www.healthaffairs.org/healthpolicybriefs/brief.php?b
rief_id=24
[4] Gagnon, M., Duplantie, J., Fortin, J., & Landry, R. (2006).
Implementing telehealth to support medical practice in
rural/remote regions: What are the conditions for success?
Implementation Science, 1(18). doi:10.1186/1748-5908-118
[5] Medicare Payment Advisory Commission [MedPAC].
(2004). Information technology in health care. In: Report
to the Congress:
New Approaches in Medicare.
Washington, DC: MedPAC, 157-181. Retrieved from
www.medpac.gov/documents/june04_entire_report.pdf
[6] Miller, R. H., West, C., Brown, T. M., Sim, I., & Ganchoff,
C. (2005). The value of electronic health records in solo or
small group practices. Health Affairs, 24(5), 1127-1137.
[7] Cartwright-Smith, L., Thorpe, J. H., Burke, T., &
Rosenbaum, S. (2010). An overview of final regulations
implementing HITECH’s meaningful use provisions and
their implications for regional collaboratives. Retrieved
from
http://www.rwjf.org/qualityequality/product.jsp?id=71451
[8] Institute of Medicine [IOM]. (2001). Crossing the quality
chasm: A new health system for the 21st century.
Washington, DC: National Academies Press.
[9] Chen, L. W., & Skinner, A. (2008). Electronic health
records adoption:
Rural providers’ decision-making
process. Rural Policy Brief, 4, 1-4.
[10] De Veer, A. J., Fleuren, M. A., Bekkema, N., & Francke,
A. L.
(2011).
Successful implementation of new
technologies in nursing care: A questionnaire survey of
nurse-users. BMC Medical Informatics and Decision
Making, 11(67).
[11] Gans, D., Kralewski, J., Hammons, T., & Dowd, B. (2005).
Medical groups’ adoption of electronic health records and
information systems. Health Affairs, 24(5), 1323-1333.
[12] Menachemi, N., Burke, D., Clawson, A., & Brooks, R. G.
(2005).
Information technologies in Florida’s rural
hospitals: Does system affiliation matter? The Journal of
Rural Health, 21(3), 263-268.
[13] Schoenman, J. A. (2007). Small, stand-alone, and
struggling: The adoption of health information technology
by rural hospitals. NORC Walsh Center for Rural Health
Analysis Policy records: Is the technology acceptance
model enough? Brief, W series, 9, April. Retrieved at
http://www.norc.uchicago.edu/NR/rdonlyres/8A93D7E0C7E8-4593-96C8C7E86C641883/0/Schoenman2007_Small_StandAlone_and
_Struggling.pdf
[14] Street, D., & Cossman, J. S. (2008). Mississippi physician
reports of technology use in practices: Computers and
electronic medical records. Mississippi Health Policy
Research Center. Retrieved from
http://www.healthpolicy.msstate.edu/publications/Physicia
nTechUse.pdf
[15] United Health Center for Reform and Modernization.
(2011). Modernizing rural health care: Coverage, quality,
and
innovation.
Retrieved
from
http://www.unitedhealthgroup.com/hrm/UNH_WorkingPap
er6.pdf
[16] Falkenburg, N. (2004). Report from the field: Insights by
community clinics on information technology adoption.
Retrieved
from
http://www.communityclinics.org/content/general/detail/70
8
[17] Simon, S. R., Kaushal, R., Cleary, P. D., Jenter, C. A.,
Volk, L. A., Poon, E. G., Orav, E. J., Lo, H. G., Williams,
D. H., & Bates, D. W. (2007). Correlates of electronic
health record adoption in office practices: A statewide
survey. Journal of the American Medical Informatics
Association, 14(1), 110-117.
[18] Terry, A. L., Brown, J. B., Denomme, L. B., Thind, A., &
Stewart, M. (2012). Perspectives on electronic medical
record implementation after two years of use in primary
health care practice. Health Affairs, 25(4), 522-527.
[19] Cummings, J. (2010, September 15). Doctors’ Notes Go
High-Tech. The Wall Street Journal Online. Retrieved
from
http://online.wsj.com/article/SB2000142405274870337650
4575491723747314224.html
[20] AHRQ (2010b).
Consumer health IT applications,
available from the AHRQ National Research Center at
AHRQ.com, retrieved 25 October, 2010, from
http://healthit.ahrq.gov/
[21] Willis, J. R. (2007). Foundations of qualitative research:
Interpretive and critical approaches. Thousand Oaks,
California: Sage Publications, Inc.
[22] Eisner, E. (1997). The enlightened eye: Qualitative
inquiry and the enhancement of educational practice.
Columbus, OH: Merrill.
[23] Goodhue, D. L. & Thompson, R. L.
(1989).
Understanding user evaluations of information systems.
MIS Quarterly, 19(2), 213-236.
[24] Davis, F. D. (1989). Perceived usefulness, perceived ease
of use, and user acceptance of information technology.
MIS Quarterly, 13(3), 319–340.
[25] Rogers, E. M. (2003). Diffusion of Innovations (Fifth ed.).
New York: Free Press.
146
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Expertise Evaluation using PathFinder Networks
Scaling in Ranking of Satellite Images
Adrian S. Barb
Information Science Department, Penn State Great Valley
Malvern, PA 19355
Email: adrian@psu.edu
visual patterns and to the coexistence of visual patterns
related to multiple semantics in each image. For example,
Figure 1 shows some examples of geospatial images that
contain visual patterns related to multiple semantics of
interest. For example image tile in Figure 1(a) shows an
example of a barren area which occupy more than 50% of
the tile. While analysis would have little issues in
assigning this barren as semantic metadata to this image,
they would have a more difficult choice when evaluating
the existence of urban areas or wetlands which occupy
less than 12% of the image tile. Similar patterns are
shown in Figure 1(b) and Figure 1(c) where grassland
and shrubland may render subjective interpretations by
coexisting with urban area and forest respectively. In this
context, it is important to recognize and evaluate the
degree of expertise of individuals that contribute to a
community that evaluates images by semantics.
ABSTRACT
In this article we propose a methodology to evaluate the level of
expertise of image analysts when searching domain-specific
images by semantics. We apply our methodology to ranking
high-resolution satellite images by semantics. Our methodology
applies PathFinder Network Scaling methods to create concept
maps for representing associations of semantics to regions of a
feature space for each image analyst. The relevance of each
node in a concept map is evaluated using a hits authority
algorithm. The expertise of each image analyst is then evaluated
by comparing to ground truth models using the Kendall tau rank
correlation coefficient. Our system allows us to identify areas of
expert disagreement by evaluating the relative difference
individual models place on features as well as recommend areas
of that needs to be stressed by novice image analysts.
Keywords: data mining, Pathfinder Network, expertise,
content-based image retrieval, ranking, geospatial images.
1
Several data reduction algorithms [14, 23, 12] can be
applied to reduce dimensionality and correlation of data,
as well as to maximize data information and increase
understandability of the generated models [8]. Pathfinder
Network analysis [15, 20] is a methodology that evaluates
models’ structure by comparing the similarity of model
constituents using co-occurrence measures. It can be
applied for elicitation and analysis of knowledge
structures in raw data. Each model is considered a
network where concepts are represented as nodes
connected by their strongest links to proximal/related
concepts. The concept of Pathfinder Network analysis
can be extended to image analysis where feature regions
are concepts that explain a visual pattern. They have the
advantage of better representing the localized rather than
global characteristics of the model structure [6].
INTRODUCTION
Supervised learning for domain-specific image ranking is
a very important research area of machine learning. A
critical assumption is that supervised training methods
can guaranty successful exploitation of existing
information to generate useful patterns that can
generalize well when applied to new, not yet evaluated
data sets. Part of such assumption is that the training data
is covering the semantic domain at a high level of
accuracy. Consequently, supervised methods rely heavily
on the quality of semantic metadata as assigned by image
analysts. Previous research [3] shows that such ranking
models are likely to overfit [11] fact that may render the
models as unfit to predict new, unlabeled data. A diverse
range of researches [5, 7, 10, 21, 22] address the issue of
ranking quality by providing several data mining
algorithms, to represent the complex domain knowledge
found in images. Among such methods, ensembles [17,
19, 24] address overfitting by building multiple models
on subsets of the training data and combining the results
to produce a more accurate predictive model. However
these methods are highly dependent on the quality of
manually assigned semantic labels by image analysts.
In this paper we explore methods for evaluating expertise
levels of image analysts using PathFinder Network
Scaling methods in conjunction with additive associative
models for ranking domain-specific images by semantics.
We have chosen associative ranking due to their whitebox approach that allows us to pinpoint to the main areas
of disagreement among image analysts. For each image
analyst we generate cross-folder associative ranking
models [2], which are averaged for better representation
of experts’ models, reduced with a PathFinder network
Attaching semantic information to domain-specific
images, such as geospatial, is difficult due to complex
147
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
algorithm, and pruned of irrelevant association. This
paper is organized as follows: In Section II we present
the methodology used to evaluate the level of expertise,
(a)
in Section III we perform experimental evaluation, and
then in Section IV we conclude the article with future
work.
(b)
(c)
Figure 1. Geospatial image tiles with multiple possible semantic assignments.
2
(
METHODOLOGY
In this section we present our methodology for evaluating
image analysts’ expertise when ranking satellite image tile
by semantic. The key feature of our methodology is the
construction of additive, associative semantic models by
choosing feature spaces that maximize area under the
curve (AUC) value on the training set. Features are
grouped in categories of interest such as color, object
shape, etc. so that each association mined contain only
features from same category. Once a combination of
features is selected, we model the assignment using
sigmoid possibilistic functions. Further, sets of feature
spaces are used additively to model the correlation to a
semantic . To evaluate which subspace is the most relevant
we also apply genetic operations at this level.
)
(
[
( (
Each semantic model is a set of associations between
feature regions and a semantic of interest that are
optimized to maximize the AUC value. For example,
Figure 2 shows a mapping of a semantic into a twodimensional feature space formed from two object
orientation features. When a new image is presented to
the system, the features are computed and the relevance
of the image to the semantic of interest is computed using
the procedure explained below. The extracted features are
grouped into natural categories C such as, object
orientation, color, or texture. Each association rule maps
region of the feature space
into the semantic
of interest
.
)
{ (
)} where
(
)] ( )
The function
is an asymmetric double sigmoid
possibilistic distribution (L - left and R - right) that models
the relevance of a measurement
to a semantic . Each
half sigmoid is controlled by two parameters: (a) center
(1) and (b) width (2) while
is weight of the
relevance retrieved by the g and it is shaped using the
relevance assessments provided by image analysts for the
semantic of interest. For details of this mapping function,
the reader is referred to [5]. The relevance of an image
to an association rule over a semantic is determined
by the relevance of the feature values
of the image
over region of the feature space :
Semantic Model for Image Ranking
(
)
)) | (
)
(3)
Further, for each semantic we create a semantic model
{
} defined as the set of mappings of
subspaces
of into a semantic space . The overall
relevance ( | ) of an image with feature measure
, to a semantic is computed by using a weighted
average of relevance to each feature subspace
:
(|
)
∑
( )
Finally, results are sorted in descending order of ( | )
and AUC is computed as an aggregate measure of
(1)
148
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
ranking across all the recall levels for each model
over a feature space .
accumulated in the semantic metadata attached to each
training image and derived by mining associations
between features
and a semantic
. For more
accurate results, we construct multiple such concept maps
using cross-fold methods which are ensembled into one
average model. Such ensemble conceptual maps are
better fit for comparing and contrasting semantic models
from different image analysts. To achieve a final concept
map for a semantic-analyst pair, we apply a Pathfinder
Network Scaling algorithm to simplify and evaluate each
semantic model. The generated conceptual map contains
feature categories as nodes and proximal relationships as
vertices. This article extends the research in [4, 9] by
creating concept map representations of semantic models
for each image analyst with the goal of identifying
similarities and differences to ground truth semantic
information. We generate each concept map using a four
steps algorithm: (1) co-occurrence matrices are constructed
for each semantic-analyst pair using cross-fold
experiments, (2) co-occurrence matrices are aggregated to
generate a unique semantic-analyst matrix representation,
(3) Pathfinder Network Scaling are applied to the resulting
network to elicit internal knowledge structures, and (4)
irrelevant nodes of the PathFinder network are pruned
using a threshold on node strength.
for
Figure 2. Example of semantic model for a semantic of
interest
In the first step, the resulting feature subspaces are
associated to feature categories as explained in Section 0.
Then, the data mining algorithm in Section 0 is applied to
cross-fold subsets of the training set. Each association in
a model contains only features from one feature category
C. The set of relevance measures (
) is computed
for each image in the training which is ranked in a
descending order. The co-occurrence matrix CM is
defined over the feature categories as a
matrix
and it is populated by incrementing each cell as follows:
[
]
(1) for every
, increment
by
and
(2)
for
every
sequence
[
]
increment
[
]
by a
value
of
(
) . In the second step, we
generate a unique cross-fold co-occurrence matrix by
summation and normalization of all the fold-specific cooccurrence matrices. In step 3, we apply a Pathfinder
Network Scaling algorithm to the average network to
reduce the irrelevant raw proximal vertices and convert
the co-occurrence matrix into a least-weighted path of
linked feature subspaces [9, 20]. Finally, in the last step,
we compute the HITS authority score [16] of each node
and we further simplify the PathFinder network by
applying a threshold on authority of nodes at two
standard deviations from the average. This network is
then used to evaluate the expertise of an image analyst to
ranking images by a semantic.
Semantic Model Generation
Although associative methods have the advantage in
better interpretation, they are difficult to train and
optimize due to the fact that the subspace generation is
exponential to the number of possible subspaces. This
makes brute force associative methods NP-hard [13]. To
address this issue, we use a genetic algorithm [2] to
reduce the complexity of the problem. Although genetic
algorithms are greedy, they have the advantage of
avoiding local maximum traps. The key feature of our
genetic algorithm is the usage of genetic operations at
both feature and subspace levels. At the feature level, we
vary the set of features used to mine association rules
while at the subspace level we vary the region for the
same feature set that will be used in ranking. Using
genetic operations we randomly choose and evolve
combinations of feature using methods such as
crossovers, shrink, constant, or grow mutations. Once a
combination of feature is selected, we randomly generate
and evolve features subspaces modeled by sigmoid
possibilistic functions. Further, sets of feature spaces are
used additively to model correlation to a semantic of
interest. To evaluate which subspace is the most relevant
we also apply genetic operations at this level. For a more
in-depth description of the training algorithm, the reader
is directed to [2].
PathFinder Network Analysis
Once a semantic model
is generated, we can convert
it to a concept map that represents the knowledge
149
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
3
Further, we selected a number of 1,124 tiles that were
labeled by an expert with one or more labels from the
Urban Area (L100), Shrubland (L250), and Other
(L260). We will further refer to this expert as
groundtruth. In this semantic assignment, 121 tiles were
labeled Urban Area (L100), 128 were labeled Shrubland
(L250), and 15 were labeled both. Further, 22 tiles were
labeled with both Urban Area (L100) and Other (L260)
while 8 were labeled with both Urban Area (L100) and
Other (L260). Two other image analysts (expert1 and
expert2), which are the subject of the experiment,
performed the semantic assignment on the same image
data set and semantic labels. For example, expert1 ranked
125 images labeled Urban Area (L100), 121 tiles
Shrubland (L250), and one tiles with both. Similarly,
expert2 ranked 123 images labeled Urban Area (L100),
118 tiles labeled Shrubland (L250), and nine tiles both.
For each of the three image analysts, we trained semantic
models on Urban Area (L100) and Shrubland (L250)
using four-fold experiments. The information on each
fold result was aggregated to construct average semantic
models as described in Section 1.
EVALUATION
For our experiments we used the 2010 WROC satellite
imagery data set of Wisconsin [1]. This data set contains
18”, 3-band GeoTIFF image tiles 15,678 x 11,105 pixels
which was collected in spring 2010. Each of these images
was partitioned into minimal overlapping 1000x1000
tiles. For each tile, a feature extraction algorithm was
applied to include color, texture and object features. For
each of these features average, quartile, standard
deviation, skewness, and kurtosis were calculated
resulting in a 292 feature vector for each tile. Each of
these feature were assigned exclusively to 26 categories
based on their meaning. For example, color features were
assigned to eight categories for the RGB, HSV, and gray
models. Also, object features were assigned exclusively
to 14 categories based on area, centroid, bounding box,
major and minor axis, eccentricity, orientation, convex
area, filled area, Euler number, equivalent diameter,
solidity, extent, or perimeter. The rest of categories were
for texture and object phase congruency.
(a)
(b)
(c)
Figure 3. Aggregated model of semantic representation for the semantic Urban Area (L100) for the image analysts (a)
groundtruth, (b) expert1, and (c) expert2.
(a)
(b)
(c)
Figure 4. Aggregated model of semantic representation for the semantic Shrubland (L250) for the image analysts (a)
groundtruth, (b) expert1, and (c) expert2.
150
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Figure 3 shows the resulting PathFinder Networks for
Urban Area (L100) semantic models generated by image
analysts using the Network Workbench Tool [18]. In this
figure the sized of each node in the network in
proportional with the authority score generated by the
HITS algorithm [16]. For example, in Figure 1(a) node
C18, which correspond to features related to object area,
has the most relevance to ranking images by this
semantic. However, Figure 1(b) shows that expert1
places more emphasis on features related to the category
of features related to object bounding box (C11). We can
conclude that this expert emphasize more features related
to object solidity (C19) than features in the C18 category,
which were expected if this image analyst matched the
groundtruth expert. Similarly, Figure 1(b) shows the
PathFinder network for expert2, which is much more
similar to the one of the groundtruth expert. In both these
networks features related to object area (c18) were the
most authoritative .Overall these networks have less
visible differences. We can also see some difference in
the number of feature categories used in modeling
semantics. For example, the groundtruth image analyst
uses 19 feature categories to assess the presence of visual
patterns associated with this semantic, expert one uses
18, while expert2 only 15. For example, expert2 does not
use color features from the R spectrum (C01) although
these features are considered relatively important by the
groundtruth expert. Figure 4 shows the generated
conceptual maps for ranking images by the Shrubland
(L250) semantic. As shown in this figure, there are wider
variations in identifying the most relevant feature
categories for labeling images by this semantic. Figure
4(a) shows that the groundtruth expert places more
importance on color features from the HSV encoding
model (C03 and C05) and on object eccentricity (C13).
Object phase congruency features (C24) are used
predominantly by the expert1 while color saturation
features (C05) are used by expert2.
Table 1. Estimation of the level of expertise of image analysts groundtruth, expert1, and expert2for evaluating images by the
Urban Area (L100) and Shrubland (L250) using Kendal tau rank correlation coefficient.
L100
groundTruth
groundTruth
1
expert1
expert2
L250
0.450735
0.733309
groundTruth
groundTruth
1
expert1
expert2
0.416096
0.528562
expert1
0.450735
1
0.438968
expert1
0.416096
1
0.261851
expert2
0.733309
0.438968
1
expert2
0.528562
0.261851
1
To evaluate the expertise level of the image analysts
(expert1 and expert2) we compute the Kendal tau ranking
correlation between the pairs HITS authority scores.
Results for this experiment are shown in Table 1. For
ranking images by Urban Area (L100), the correlation
between groundtruth and expert1 is 0.45 while the
correlation between groundtruth and expert2 is 0.73.
Although the two values show positive correlation of the
two experts to the groundtruth, we observe that expert2
has a higher degree of expertise than expert1 when
evaluating for Urban Area (L100). However, when
ranking images by Shrubland (L250), the correlation
between groundtruth and the two experts is rather similar
at 0.42 for expert1 and 0.52 for expert2. This shows that
expertise needs to be evaluated on a semantic assignment
basis and different experts can discern different visual
patterns with different accuracies. The evaluation of
expertise brings also the advantages of pointing out expert
training needs. For example, upon reviewing expertise
levels of individual image analysts, training specialists can
further evaluate the structure of each PathFinder network
and focus the training procedure on an area of interest.
4
semantic of high resolution satellite images. We apply
PathFinder network scaling methods to contrast and
compare feature categories used by different image
analysts when they assign semantic labels to domainspecific images. Our model has the advantage of being
applicable in practice since it can suggest areas of high
difference among experts’ perception of semantics, which
can be used for training as well as for reaching agreement
in organizations that perform such tasks. Our future work
includes a more comprehensive evaluation on different
domain-specific data and semantic sets as well as a more
in-depth evaluation on accuracy of the resulting
assessments. We also plan to evaluate methods of
assessing the degree of truthfulness of ratings by ground
truth image analysts.
BIBLIOGRAPHY
[1] The Wisconsin Regional Orthophotography Consortium
(WROC), 2012.
[2] A. S. Barb and C. S. Barb. Genetic methods for
associative semantic ranking of landsat image regions by
land cover. In Proceedings of Image Information Mining
Workshop, pages 102–105, Oberpfaffenhofen, Germany,
October 2012. European Space Agency and Joint
Research Commissions.
CONCLUSIONS AND FUTURE WORK
In this article, we have developed an approach to
evaluate the level of expertise applied to image ranking by
151
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[3] A. S. Barb and C. R. Shyu. A study of factors that
influence the accuracy of content-based geospatial
ranking systems,. International Journal of Image and
Data Fusion, 3(3):257–268, September 2012.
[4] A. S. Barb and Chi-Ren Shyu. Associative semantic
ranking of satellite images using pathfinder network
scaling ensemble methods. In Proc. IEEEGeoscience and
Remote Sensing Symposium IGARSS 2012, 2012.
[5] A.S. Barb and C.-R. Shyu. Visual-semantic modeling in
content-based geospatial information retrieval using
associative mining techniques. IEEE Geoscience and
Remote Sensing Letters, 7(1):38 –42, jan. 2010.
[6] I. Borg and P.J.F. Groenen. Modern Multidimensional
Scaling: Theory and Applications. Springer Series in
Statistics. Springer, 2005.
[7] D. Bratasanu, I. Nedelcu, and M. Datcu. Bridging the
semantic gap for satellite image annotation and automatic
mapping applications. IEEE Journal of Selected Topics in
Applied Earth Observations and Remote Sensing,
4(1):193–204, 2011.
[8] Christopher J. C. Burges. Dimension reduction: A guided
tour. Foundations and Trends in Machine Learning, 2(4),
2010.
[9] R.B. Clariana. Deriving individual and group knowledge
structure from network diagrams and from essays. In Dirk
Ifenthaler, Pablo Pirnay-Dummer, and Norbert M. Seel,
editors, Computer-Based Diagnostics and Systematic
Analysis of Knowledge, pages 117–130. Springer US,
2010.
[10] M. Datcu and K. Seidel. Human-centered concepts for
exploration and understanding of earth observation
images. IEEE Transactions on Geoscience and Remote
Sensing, 43(3):601–609, 2005.
[11] R.O. Duda, P.E. Hart, and D.G. Stork. Pattern
classification. Pattern Classification and Scene Analysis:
Pattern Classification. Wiley, 2001.
[12] Kenji Fukumizu, Francis R. Bach, and Michael I. Jordan.
Dimensionality reduction for supervised learning with
reproducing kernel hilbert spaces. J. Mach. Learn. Res.,
5:73–99, December 2004.
[13] T. Hastie, R. Tibshirani, and J. Friedman. The Elements of
Statistical Learning. Springer series in statistics. Springer,
2009.
[14] Aapo Hyvärinen. Independent component analysis.
Neural Computing Surveys, 2, 2001.
[15] D.H. Jonassen, K. Beissner, and M. Yacci. Structural
knowledge: techniques for representing, conveying, and
acquiring structural knowledge. L. Erlbaum, 1993.
[16] Jon M. Kleinberg. Hubs, authorities, and communities.
ACM Comput. Surv., 31(4es):5, 1999.
[17] K.J. Mackin, T. Yamaguchi, E. Nunohiro, Jong Geol
Park, K. Hara, K. Matsushita, M. Ohshiro, and
K. Yamasaki. Ensemble of artificial neural network based
land cover classifiers using satellite data. In Systems, Man
and Cybernetics, 2007. ISIC. IEEE International
Conference on, pages 1653 –1657, oct. 2007.
[18] NWB Team. Network Workbench Tool, 2006.
[19] L. Rokach. Pattern Classification Using Ensemble
Methods. Series in Machine Perception and Artificial
Intelligence. World Scientific, 2010.
[20] R. W. Schvanevelt. Pathfinder Associative Networks:
Studies in Knowledge Organization. Norwood, NJ:Ablex,
1990.
[21] C.-R. Shyu, M. Klaric, G. J. Scott, A. S. Barb, C. H.
Davis, and K. Palaniappan. GeoIRIS: Geospatial
information retrieval and indexing system - content
mining, semantics modeling, and complex queries. IEEE
Transactions on Geoscience and Remote Sensing,
45(4):839–852, 2007.
[22] O. Sjahputera, G.J. Scott, B.C. Claywell, M.N. Klaric,
N.J. Hudson, J.M. Keller, and C.H. Davis. Clustering of
detected changes in high-resolution satellite imagery
using a stabilized competitive agglomeration algorithm.
IEEE Transactions on Geoscience and Remote Sensing,
49(12):4687 –4703, dec. 2011.
[23] Michael E. Tipping and Chris M. Bishop. Probabilistic
principal component analysis. Journal of the Royal
Statistical Society, Series B, 61:611–622, 1999.
[24] P. Zhong and R. Wang. A multiple conditional random
fields ensemble model for urban area detection in remote
sensing optical images. IEEE Transactions on Geoscience
and Remote Sensing, 45(12):3978 –3988, dec. 2007.
152
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Ebooks, Cost Savings, Creative Commons, and Enhancements to Lectures
Dennis BIALASZEWSKI
Management, Information Systems, and Business Education, Indiana State University
Terre Haute, Indiana 47809, United States
ABSTRACT
and 18.6 million students in blended courses.
[1] [2] Furthermore, findings show that many
educators not only expect to increase their use
of this approach in the coming years but also,
several believe that blended learning is more
effective than classroom-based teaching
alone.[1] [3]
In this paper we look at the changing
trend in education as technology is being
incorporated into assignments and lectures.
Moreover, we will look at the use of ebooks in
courses through an empirical study of a
midwestern university. We will look how new
copyright licenses such as Creative Commons
has impacted assignments.
CREATIVE COMMONS
A movement towards open source
thinking has led to a movement towards more
free data availability for the student. Yet certain
rights of the researchers gathering data should
be maintained. . A result of these two actions is
the Creative Commons licensing.
This data
availability has brought about several related
changes. For example, there have been
changes related to COPYRIGHT with data
downloads easily accessible. The CREATIVE
COMMONS licensing is starting to become
commonplace. For example the website
http://gs.statcounter.com/
allows
one
to
download monthly data such as social media
usage or browser usage by countries. Students
can analyze trends in growth rates of mobile
browsers and many other variables. This may
lead them to further research into the
demographics and technical advancements in
the various countries. And although this “free”
data can be used for research they cannot sell
any of the results they obtain as the data is
protected by the CREATIVE COMMONS
licensing. The data can be used but not sold.
Results of the research could not be published
in any text that is sold because that would
break the licensing agreement for the “free”
data. However, this leads to many new
KEYWORDS: ebooks, technology, Creative
Commons, pedagogy, Information Systems,
educational delivery
INTRODUCTION
There have been many changes in
educational delivery as the field of education
has adopted technology to transform methods
of teaching. Education has gone from straight
lecture of several years ago to incorporating
experiential
learning
into
the
student
educational experience. This experiential
learning does not mean working with a
business in the community but an access to a
great deal of real world actual data for the
purpose of analysis and research.
Learning now takes places with a
blending
of
lecture with technological
advancements. “Blended Learning” is a
combination of face to face mixed with
technology based activities. Studies show a
growing trend toward the use of this education
model. Researchers estimate that by 2014,
there will be 5.1 million higher education
students solely in brick and mortar classrooms;
3.5 million students solely in online classrooms;
153
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
and a list of pages that contain SSD appear.
The student just needs to click on the
appropriate link and is taken directly to the
relevant page. Of course not all ebooks are
written to enable this but the majority of newly
written texts are. Further links could be included
to either access directly or copy and paste and
the student can be taken to further detailed
information related to SSDs. Links to relevant
videos may be given that the instructor may
access during a lecture.
This availability also enhances class
lectures as rather than project some Power
Point of PREZZI images to the class, the
instructor can easily bring up the text, scroll to
the appropriate areas, and enter in appropriate
links, and present relevant videos or sites to the
class in a very organized fashion. This
technological advancement makes lecture
presentation easier as it relies on the built in
organization and search inherent in the new
ebook.
Again, not all ebooks offer all
conveniences but what many allow the reader
to do is to make notes in the ebook, and
highlight passages in various colors. For
example, vitalsource.com uses the following
color code for highlighting: Perhaps a yellow
EBOOKS
highlighted passage could be used for material
they consider IMPORTANT and their own notes
can be added, a red highlighting could be used
Along with the availability of much more
for NEEDS CLARIFICATION and again notes
data at no cost, publishers and universities are
can be added. For example, if a student has
moving towards the utilization of ebooks. The
some questions about that material he might
ebook of the future is not just taking the printed
include his question as a note at that point. A
text and allowing it to be placed in a digital
green highlight could be used for MAY BE ON
format. The new ebooks include many links for
EXAM so students might note that the instructor
direct connectivity to a multitude of videos and
hinted that this material might be on an exam.
that can be accessed in the classroom or by the
The color highlighting also can help the
student without the drudgery of trying to enter in
instructor with his/her class presentation as the
some lengthy URL. The ebooks of the future
instructor could add his/her own notes with
will be very different than the old books of
further clarification of material or add their own
today. For example, if one was discussing
important URL to go to at that point of their
hardware in an introductory information
lecture. They can use the e-book as a way to
systems course, prior to ebooks, is a Solid
enhance their own material with little additional
State Drive was being discussed; quite some
work. Notes can also be shared.
time ago a student would look up the page
Besides enhancing lectures these new
numbers to find text information and then may
books will dramatically reduce costs to
see pictures in the text that raised the cost of
the text. However, all one needs to do now 154 students. The costs to purchase of an ebook
are much lower than the cost of a hard copy
while reading the ebook is enter the term SSD
developments for lecturing and course
exercises.
For
example,
a current
ebook
“INFORMATION
SYSTEMS
FOR
THE
FUTURE” by Bialaszewski [4] presents many
student exercises whereby the student must
use data that he may freely obtain in order to
solve problems. The data from such websites
is made available through a Creative Commons
license. In the past, if data was accessible,
tables might have been created, tables
structured, and results printed in texts. This
technique is somewhat limited and does not
allow for original research to be performed by
the student with original data. However, this
new licensing allows for much more data to
become available to the instructor, researcher,
and student. The Creative Commons licensing
allows one to use the data but one cannot sell
the free data in any way. There are many more
possibilities now for the researcher. Tables with
data licensed through Creative Commons
cannot be used to create tables in a text that
the author could sell, however, exercises can
be given to the student to create tables and
perform other research using this free data.
Again, of course the results cannot be sold.
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
book. Many ebook costs can even be lowered
by opting to rent an ebook with a usual rental
time of 6 months. However, these ebooks, at
this time, are also offered in a printed version
as some students still would rather carry around
the text wherever they go. On the other hand,
with the new ebooks, the student does not even
need to carry around a laptop as the book could
be accessed by just going to an open lab at the
university or library.
These developments also bring about
the need for standardization. I have had no
problems accessing material regardless of
device used. When I lecture I just access the
site and am ready with my lecture. Of course
they are also accessible on mobile devices. If a
student has their smart phone with them they
then have their ebook with them. There is no
need to buy special devices or particular ebook
readers. Fonts can be adjusted. Although I
confess, I enjoy using a wide screen desktop at
home for my reading.
Some may view these changes to be
adopted gradually by some faculty. However,
the question also is how adaptable are students
to these changes, In the next section we will
discuss survey results obtained from a study of
the current situation at a Midwestern university.
We will get a glimpse of how prevalent the use
of ebooks are and how desirable the ebooks
are for students at a typical large university.
THE SURVEY METHODOLOGY AND USING
EBOOKS
An eighteen question survey was
developed which covered areas such as the
cost of texts, availability and preference of
traditional printed version versus and ebook,
propensity to purchase online, propensity to
purchase used texts or to rent texts, as well as
several related questions. Demographics were
also collected such as gender, class standing,
living on campus versus off campus and so
forth.
A method was devised for distributing
the surveys randomly and originally 361
surveys had been collected. However, not all
students answered all questions. It was also
apparent that not all students took the time to
carefully read all questions. For example,
Questions 4 stated “I am taking ____________
courses this semester. “ There were students
who entered in the value of 15 and perhaps
they interpreted the question as how many
credit hours are you taking this semester.
However, it was decided to remove all surveys
which had questionable responses rather than
to assume an answer a respondent might have
meant. All surveys collected with any question
not answered were also removed. There was a
strict removal process in order to ensure that
the most accurate data was the only data
included for the study. After removing any
questionable data the data set contained 317
completely usable respondents.
There were 176 undergraduate male
respondents and 141 female respondents.
There were 168 lower level (Freshmen or
Sophomores) and 149 upper level (Junior or
Senior) respondents. The respondents were
primarily full time students as only 10 of the 317
respondents were currently taking less than 4
courses. There are 1 credit courses offered at
this university and that may account for the fact
that 81 of the 317 respondents stated they were
taking either 6 or 7 courses during the spring
2013 semester.
One interesting result was that 8
students stated that they did not purchase texts
for any course this semester. It is possible to
use all online sources or even use free texts. In
the past I had used texts from Flat World
Knowledge and at that time could obtain an
electronic version at no cost. However, it may
be more the case that they were renting texts
and did not actually buy a text. It could also be
the case that some of these 8 students just
borrowed classmate’s texts. When I was an
undergraduate a friend of mine never
purchased a text for a Theology course
because of a lack of money and just borrowed a
text when needed for the length of a semester
and so i know that it is being done. There were
235 respondents who stated that they
purchased texts for 4 or more courses.
However, there were only 35 respondents who
stated that they were given an option to
155 purchase an ebook for 4 or more courses. This
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
which may include a video presentation of a
result clearly shows that all faculty are not
new technology. Lastly, exercises can be
clearly gravitating to the use of an ebook!!!
developed making use of the most current data
Perhaps this is because some faculty
available. This is something that we should
have not been exposed to the use of ebooks
strongly consider as it is understood that
and how they might be quite useful to students
students can now buy almost any test bank,
and that they could improve lectures while also
exercise set, or study guide that exists by
cutting costs for students. I would like to add
obtaining a source for them via the internet.
that I firmly believe that my lectures have been
Fraternities and sororities may help to make
greatly enhanced with the use of an ebook. I
them available to their members. These types
am using the text INFORMATION SYSTEMS
of breaches of ethics may be even more
FOR THE FUTURE by Bialaszewski. I would
prevalent when online courses are not strictly
like to add that I recently served under contract
monitored. I have had a student (not mine) tell
for the College Board/Educational Testing
me that in a course where there was no real
Service for three years on a committee
oversight on exams and exercises that their
responsible for constructing the the College
girlfriend took the course for them. With an
Level Examinatiion Program (CLEP) exam in
online text and using current data and exercises
Introductory Information Systems. CLEP exams
this activity would be somewhat minimized as
assess college-level knowledge in several
the exercises can easily change from semester
subject areas that are administered at more
to semester.
than 1,700 colleges and universities across the
United States created by the College Board. [5]
SURVEY RESULTS
There are 2,900 colleges which grant CLEP
credit. [6] Being extremely familiar with what is
A five point Likert Scale was used for several of
covered in an introductory IS course serving on
the questions. The scale used is 1 = strongly
the committee constructing and analyzing the
agree, (2) = agree, 3 = neutral or no opinion, 4
questions on this standardized exam I am
= disagree, and 5 = strongly disagree.
certain that the Bialaszewski text covers key
Question 9 on the survey is “In general I prefer
introductory course concepts. However, since it
to use a printed textbook rather than an ebook.”
is an ebook which can direct the reader to
I was slightly surprised but not shocked by the
websites with pictures and videos it is not
result. The findings are: 141 strongly agreed, 75
necessary to use much “print” space to include
agreed, 65 neutral, 24 disagreed, and only 12
pictures of new technologies. The student can
strongly disagreed. Thus at this particular
either click on a link or copy and paste the
university at this time it is quite evident that
URLs given into their web browser to get the
students have not been gravitating towards the
most current information about the new
purchase of ebooks. Only 36 of the 317
technology.
respondents disagreed to some extent with
I can also state that using an ebook has
preferring to use a printed text. That is only
helped decrease the organization time for my
11.3% of the students in the sample disagreed
lectures. I am fortunate that the classrooms
with preferring a printed text even though all of
that I use have a computer, internet connection,
these students are continually using their
and projector. Often upon entering class I login
laptops, tablets, and smartphones. Constructing
to http://vitalsource.com/Pages/home.aspx [7]
a 95% confident interval for the population
and select the text I am using for that course. I
percent we find that we aew 95% certain that at
can easily scroll to pages I am discussing or
least 8% to at most 15% of the students of all
highlight text that I feel students should spend
students surveyed state that they disagree with
more time researching. There is no need to
a printed text being their choice. With ebooks
develop Power Point presentations using this
not being introduced in many classes the
technology when lecturing. Moreover, I can
copy a link from the references given at the end 156 students might be unaware that they could have
access to their text on any device. In my own
of a chapter and provide more indepth material
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
classes I do not require an ebook. The students
are given an option to purchase a printed text.
But after purchasing the printed text many
students in class see how other students have
been able to use their ebooks and have
regretted their decision of buying a traditional
printed text. However, my evidence is anecdotal
as I have not surveyed my class on this matter.
Some students may have had a bad
experience using an ebook which perhaps was
no more that the printed version placed in
digital format. Although that may loosely may
be considered as an ebook it may not have
access to current data or current videos
captured and it may even include pictures
which may not translate well to all devices.
However, these students were asked if cost
was a factor, and i stated the question to be “If
an ebook only cost 50% of the cost of a printed
text I would still prefer the printed text” to make
the savings more tangible. And as an aside, the
ebook in Information Systems that I am using is
actually less than one third of the price of most
competing new hard cover texts purchased
new. When costs of a 50% savings were being
considered by the respondents the number who
would disagree with a printed version being
their preference rose from 36 respondents to
124 respondents and an additional 53 were
neutral. The sample proportion who did not
agree in some way that a printed version would
still be preferred is 55%. Constructing a 95%
confidence interval we see that we are 95%
certain that at minimum at least 50% would not
prefer a printed ebook to at most 61% would
not prefer a printed text. However, many
students have not had the opportunity to try and
use an ebook.
When factoring out only the subset of
students who said they have used an ebook
138 of 205 were neutral or disagreed to some
extent that they have a preference for using a
printed version when cost is factored into the
situation. That is, when costs are considered,
and for those who have used an ebook, we
obtain a sample proportion of 67% who are not
agreeing with a preference for a printed text.
Once again, we find that at least 60% would not
agree to some extent to at most 74% would not 157
agree to some extent with a preference to a
printed version.
There is much more analysis to be
completed for this research. Data was collected
on many related topics and the relationships
between questions and also relationships to
demographic variables have not yet been
presented. This analysis will be presented in a
final version intended for journal publication.
CONCLUSION
Although there is much analysis that
remains to be completed there are some
important conclusions to be drawn. Whereas
only student information was captured from one
university it does give some insight to what may
be the existing situations at other universities
and begs for more research to be performed in
this area. It is certain that many courses are not
offering the option of using an ebook. It is also
certain that costs for an ebook are much less
than the cost of a printed text. Students seem to
not prefer a printed text when there is a
dramatic cut in costs and yet we are not always
making ebooks an option for the students. Why
is this not an option in more courses than
currently available? I would conjecture that
there has been limited training for long standing
training for faculty and that they may not be
aware of all technological possibilities. That is
not to say that current faculty do not use
technology. However, I would conjecture that
universities are not spending the dollars on
training and faculty development that they
should be spending.
The research presented in this study
leads to much more research related to student
preferences and their use of technology for
learning. Moreover, this study leads to further
research related to faculty preferences for
teaching methodologies. Are faculty making
conscious decisions to shy away from ebooks
or are they unaware of the new possibilities that
they bring. Ebooks lend themselves to using
current data and videos. Are faculties more
concerned with the content of the text of choice
or are they more concerned with the ancillaries
including test banks. Are administrators truly
aware that large classes almost force faculty to
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
References
moving towards objective testing and that test
bank answers may be currently obtainable from
sources over the net. Perhaps a line of future
research this paper might lead to is to actually
determine the percent of test bank answers that
may be obtainable via the internet. When i
served under contract for the Educational
Testing Service we met in person in privacy to
construct questions. However, we also
submitted and critiqued potential questions via
e-mail. However, we used Pretty Good Privacy
(PGP) software as a data encryption and data
decryption program. I wonder if a part time
instructor teaching one course for say $1,800
would be willing to sell his copy of the test bank
or just make a copy of the test bank if he/she
was offered $10,000. I wonder if students knew
a particular test bank was being used what they
might be willing to pay for a copy of the test
bank. I wonder how many universities actually
explore whether any of their students might
have a copy of their test bank and if there are
firm penalties in place. Does this really happen
in today’s world? Well, when i was a graduate
student I saw an undergraduate student who
had a printed copy of test bank questions and
that was in 1972. I believe it still happens today
but, again, I believe that is an area for further
research. However, I do believe we all should
be aware of how we can make use of current
technologies and today money budgeted for
faculty development may be more important
than ever before.
[1]https://moodle.elac.edu/pluginfile.php/138132
/mod_resource/content/1/RosettaStone_Campu
sTechnologyWhitepaper_TechnologyTransform
ingEducation.pdf
[2]
Statistics.
Going
the
Distance.
http://www.onlinelearningsurvey.com/reports/
goingthedistance.pdf. Retrieved 8/13/12.
[3]
http://www.webct.com/service/ViewContent?co
ntentID=19295938. Retrieved 7/21/12
[4] INFORMATiON SYSTEMS FOR THE
FUtURE - by Dennis Bialaszewski. Kendall
Hunt Publishing, Dubuque, IA Copyright 2013
[5] http://clep.collegeboard.org/exams/about
[6] http://clep.collegeboard.org/started
[7] http://vitalsource.com/Pages/home.aspx
158
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
A Language Exchange Program: Sustainability Innovation in Language and
Culture Engagement
Trinidad FERNANDEZ
Dept. of Linguistics Applied to Science and Technology, Polytechnic University of Madrid
Madrid, Spain
and
Grisel GARCIA-PEREZ
Dept. of Critical Studies, University of British Columbia Okanagan
Kelowna, Canada
and
Joaquin SANTIAGO
Dept. of Applied Linguistics to Science and Technology, Polytechnic University of Madrid
Madrid, Spain
ABSTRACT
1.
Spanish Educational Laws have been promoting the
widespread use of English; as a result, Spanish Universities
are looking for ways to give students more international
training in order to prepare them for a future that will
increasingly involve global problems and partnerships.
Therefore, the Polytechnic University of Madrid, Spain
(UPM), and the University of British Columbia, Okanagan,
Canada (UBCO) have come together to offer opportunities for
international collaboration and learning, thus facilitating
virtual encounters among Spanish and Canadian students. The
Language Exchange Program between the UPM and UBCO
acts as a model for sustainability innovation in language and
culture engagement as the students can interact with native
speakers in communication tasks. This interdisciplinary
initiative supports the latest methodological principles
observed in the Common European Framework for
Languages, such as autonomous and life-long learning, selfassessment and peer-assessment as well as the incorporation
of new technologies to the learning process. Additionally the
‘virtual’ mobility is provided at no extra cost. This article
presents the preliminary results of two virtual exchange
programs that have been offering varied forms of study which
are venue-independent, and have clearly expanded the range
of scenarios for the students on both sides by promoting
collaborative work and cultural exchange.
INTRODUCTION
Sustainability can be defined as the capacity to endure. It
covers three spheres:social, environmental and economic. For
humans, sustainability is the potential for long-term
maintenance of well being, which has environmental,
economic, and social dimensions. The philosophical and
analytic framework of sustainability is connected to many
different fields. As shown in Fig 1 all the three spheres
overlap [1].
Key words: innovation, sustainability, second language
learning, virtual exchange, new trends in education,
international cooperation, interdisciplinarity.
Fig 1: Three Spheres of Sustainability
159
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
In a globalizing world of limited resources universities play a
vital role in preparing students to meet the sustainability
challenges of the future. The imperatives of sustainability
point not only to new course content, but also to new ways of
teaching that content. As a project with relevance across the
disciplines, sustainability presents a valuable paradigm for
rethinking
pedagogy.
Sustainability
embraces
interdisciplinarity; a critical and thorough understanding of
issues related to environmental sustainability necessarily
involves contributions from a wide variety of disciplines
throughout the natural sciences, the social sciences, and the
humanities.
However, the UPM encourages its graduates to reach a good
level of proficiency in the English Language, which is now a
growing demand in the workplace and a basic requirement for
engineers, architects, scientists and researchers all around the
world [4]. All UPM graduates have to prove that they can use
the necessary language skills specified in the Common
European Framework for Languages (CEFL) [5][6]as a basic
condition to registering in the curricular English subjects and
thus to obtaining their degree. W ithin this framework, the
university is undergoing a deep changeover that is affecting
both its curricular and normative structure and its teaching and
learning dynamics. One of the ways in which the objectives of
the new curricula can be met is by virtual exchange programs
with English speaking universities. Accordingly, the UPM and
the UBCO are facilitating virtual encounters among Spanish
and Canadian students. The Language Exchange Program
between the UPM and UBCO acts as a model for
sustainability innovation in language and culture engagement.
Using a case study to analyze the impact of virtual encounters
on learning improvement and language-culture awareness,
both effectiveness of the program and exploration of the
nuances of a multi-dimensional perspective are assessed.
More specifically, this exchange program links second
language learning with intercultural contacts in a virtual way
with a view to estimating the impact of the learning model
proposed (see section 3).
The three spheres of sustainability are concentric circles:
social— people,
communities,
nations— economic—
businesses, markets and policies and these two partly cover
the environment sphere and are therefore bound by its features
and limits. As we will see, our exchange program is associated
to social sustainability, which in turn is linked to the other two
spheres. Although the term social sustainability receives far
less attention in literature than environmental or economic
sustainability, the issues and concepts associated with social
sustainability have been addressed for decades [2]. Social
sustainability is the core element of sustainability since it is
about creating and maintaining life quality for people.
Financial and environmental factors are important, but they
are both means to an end, rather than ends in themselves.
Therefore, by working towards financial or environmental
sustainability, work towards social sustainability is
accomplished.
Current perspectives on how students learn have resulted in
significant redirections when designing new learning
environments; likewise the Information Age has provided an
excellent tool for teachers to create virtual learning spaces
[7][8]. Virtual encounters not only reduce communicative
distances between people, but they also serve as a tool to
enhance language proficiency and develop intercultural
awareness in Second Language Teaching and Learning
(SLTL). The implementation of virtual exchange programs
entails supplementing the physical mobility models for the
program to be sustainable. Virtual experiences add new
flexibility and time prospects to the universities in order to
fulfil SLTL objectives. In this sense, a virtual program can
offer more varied forms of study that can be shorter, timespecific and venue-independent, and in turn, it can offer the
students more personalised opportunities. Additionally, distant
learning programs provide different dimensions of mobility,
and facilitate international collaborative work between
lecturers in different countries and with different academic
cultures [4].
Sustainability is studied and managed over different time and
space benchmark and in many contexts of environmental,
social and economic organization. Education for sustainable
development means including key sustainable development
issues into teaching and learning [3]. It also requires
participatory
teaching
and
learning
methods
–
interdisciplinarity- that motivate and empower learners to
change their behavior and take action for sustainable
development. Interdisciplinarity can be a challenge, but it
becomes easier with a more effective use of resources on
one’s campus community and beyond, such a team teaching
with colleagues from different disciplines or in different
campuses.
Consequently, education for Sustainable
Development promotes competencies like critical thinking,
imagining future scenarios and making decisions in a
collaborative way. Education for sustainable development
requires far-reaching changes such as autonomous learning,
self-assessment and peer-assessment as well as the
incorporation of new technologies to the learning process [3].
Universities around the world are looking for ways to give
students more international training; however, exchange
programs are expensive and difficult to handle, mostly
through lack of sustainability criteria. The number of student
exchange programs in the Mobility Office at EU Arquitectura
Técnica de Madrid (EUATM) of UPM has substantially
increased. There were five exchange programs in the
academic year 2008/
9, with only four students going abroad.
However, in the academic year 2011/12 the number increased
to 25 exchange programs mobilizing 119 students to different
universities round the world. Nevertheless, this represents
0.035% of the total the enrolment at EUATM (UPM) in 201112 which was 3400. It is necessary to point out that the
students travelling get a small grant that partially covers their
expenses.
On one hand, the program follows the latest methodological
trends such as the development of autonomous and life-long
learning and self-assessment as key to improvement. On the
other hand, it incorporates new technologies and virtual
systems to the learning process. Students will learn not only
about writing and speaking but also about how to question the
effects of globalization, intercultural communication by reexamining their assumptions about technology, culture and
location. Hence emphasizing the analysis of culture will let
the students understand the contextual and situated nature of
communication processes. To raise cultural awareness as well
as inspire linguistic confidence in the students is the ultimate
goal in such encounters. Moreover, it is expected that their
knowledge of L2 will considerably improve by sharing
experiences with each other via e-mail or Skype [9].
160
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
2.
B2. The matching with their peers at the Macquarie University
was done considering the levels of both parties.
EXCHANGE PROGRAM 1
The first program was between UPM University (Spain) and
Macquarie University (Australia), and was represented by the
EUATM students and the International Studies Department
respectively. Students were offered the opportunity to improve
their knowledge of the foreign language and culture they were
studying:English and Spanish respectively. To that end, each
participant was matched to a partner in the other university.
Both participants were required to complete a number of
writing and speaking tasks on a variety of topics dealing with
everyday situations, with the description of emblematic sites
and buildings or with career prospects, depending on their
level, so that the Australian students should revise and correct
the Spanish students’ writing assignments in English, and the
Spanish students correct and give feedback to the Australian
students in Spanish. Assignments were ultimately revised and
assessed by tutors in both universities.
Students in both universities were required to fill in a
questionnaire related to the program. The information
retrieved from their answers proved that a good number of
students, at both universities, understood and embraced the
objectives of the project and wanted to engage on the different
writing and speaking tasks. Students were also enthusiastic to
be able to communicate with native speakers, to practice their
skills and to improve their Spanish or English. Most students
liked the idea of being able to help their peers with their native
language and most of them at both universities expected to
continue their relationship beyond the project requirements.
Some outcomes
This program has helped students, not only improve their
speaking and writing skills, but also gain a wider insight into
the effects of globalization, intercultural communication and
information technologies by making students re-examine their
assumptions about technology, culture and location. At the
end of the program, students filled out a questionnaire on what
they had learnt about the Spanish and Australian culture. In
this way, they were able to analyze their peer’s culture and
customs, and raise awareness of other contexts and
educational realities. It is important to note that all these
achievements were at no cost contributing thus to the
sustainability principles that led the undertaking of the project.
Faculty members involved in the project in both institutions
selected a range of topics including but not limited to:youth
culture, current events, cultural heritage, curriculum
background, curricular subjects taken, difficulties of second
language learning, home descriptions, reasons that have made
students choose their degree, etc. These topics were graded
from the easiest to the most difficult depending on the
students’ stated proficiency levels [10].
Given the fact that the two participating universities were
situated in different hemispheres, resulting in an asynchronous
academic syllabus practice, the project development was
difficult to follow. Australian universities start their academic
year in February whereas the Spanish year begins in
September; students’ summer vacations were also in different
time periods. The experience with the Macquarie University
proved that effective collaboration can sometimes be difficult
to attain.
As we have stated above the time zone and different academic
syllabi enactment on both the UPM and the Macquarie
University was a difficult issue. On revision of the
technologies, we concluded that some obstacles could have
been overcome by incorporating virtual platform Moodle, in
the second program, to the daily working of our operations as
a unique ready-to-use resource for the written assignments,
and Skype for the oral tasks. Actually, the excessive number
of students participating in this program and the low number
of tutors was not viable.
Students profile and methodology
The project included two target groups:UPM students in the
EUATM1— those pursuing the Building Engineering Degree
on their first and second year— and Macquarie University
partners in the Department of International Studies taking the
Intermediate Course II-SNP202, and the advanced courses
SPN102 and SPN102 making a total of 260 partnerships,
namely, 130 Building Engineering UPM Students and 130
Macquarie students, tutored by 5 lecturers at UPM and by 3
lecturers at Macquarie University. This was a compulsory
activity for those students who had voluntarily registered in
the English tuition courses in the Building Engineering School
at UPM and for those students enrolled in the Spanish Courses
of the Department of International Studies at Macquarie. For
the written assignments we used *Nicenet and e-mailing and
the oral communication tasks were done on Skype.
In order to guarantee effective communication across different
time zones and solve the drawbacks we had in Exchange
Program 1, some changes were made for Exchange Program 2
(see section 3).
3.
Results from Exchange Program 1 revealed that exposing
students to global technological environments promotes
interpersonal communication skills and supports the
development of a positive attitude essential to the nature of
this type of initiative (Fernandez, et al. 2010). In view of this
fact, we extended the scope of the virtual exchange project so
as to incorporate another university. The new partner involved
was the University of British Columbia Okanagan, most
specifically, the Department of Critical Studies in the Faculty
of Creative and Critical Studies. This new collaboration paved
the way for an ongoing project but this time experience from
Program 1 evinced the need for some minor, although
important changes, such as:
To facilitate language transfer and improvement, two
subgroups were further identified at the Building Engineering
School. This further classification was based on the Common
European Framework for Languages (CEFL) placement scale,
so that students having an intermediate level were classified as
B1 and those with an upper-intermediate level were placed as
The former EUATM is now called Building Engineering
School within the framework of the European Space for
Higher Education.
EXCHANGE PROGRAM 2
161
Less number of students to a manageable size to
facilitate instructor'
s supervision.
Some of the assignments were voluntary in order to
facilitate constant exchange and contact between the
students on both sides of the program.
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Span-101, Span-102, Span-201 and Span-204 the students
should be fluent enough to carry out a conversation in
Spanish. This is achieved through courses in grammar,
conversation and translation. The program follows a standard
university four-year B.A. structure and length (four years,
eight terms, 120 credits). The program offers courses per
school year plus 2 first and 2 second year language courses in
the summer, and is committed to creating opportunities for
students to participate in international types of learning.
Information technologies:the use of Moodle or emailing
for written assignments and Skype for oral practices to
ensure an easy and accessible channel for immediate
communication.
Voluntary participation:it is not of interest to make this
practice compulsory.
In view of the fact that motivation is one of the key success
factors for student engagement in learning and knowledge
sharing activities, in both universities we recruited only those
students who wanted to connect with a pen-pal from
Spain/Canada. Moreover, we followed a participatory design
approach where all students had a sense of ownership
of scheduling the times and activities they would carry out
with their international counterparts. Regarding the
motivational aspect of this latter virtual collaborative learning
was the students’ involvement in the planning and evaluation
of all learning activities and their desire to improve their
overall language skills (see Methodology)
Methodology
The experience from Program 1 (Australia) allowed us to
develop the methodology for Program 2 (Canada). One of the
biggest drawbacks of the Macquarie University experience
was communication across different hemispheres with
different academic years (see section 2); since UPM and
UBCO share the same academic year this problem was solved.
W ith regards to time zones, Australia is 10 hours ahead of
Spain and the situation with UBCO is very similar
because Madrid is 9 hours ahead of Kelowna (the Canadian
city where UBCO is); therefore, in order to guarantee
effective communication across different time zones, students
were encouraged to schedule meetings using online
collaborative tools such as Microsoft Office Live W orkplace
or Google W ave. W eekly status updates of these meetings
were also requested. The third hindrance of Program 1 was the
way the population was drawn into the study. All the students
enrolled in a course were automatically included in the study
without taking motivation into consideration; as a
consequence we made this encounter voluntarily (see below).
UPM students’profile
W ith the incorporation of the Bologna Principles in the UPM
syllabus design, all UPM Schools have introduced the
compulsory subject English for Academic and Professional
Communication equivalent to 6 ECTS2. As indicated in the
introductory section of this paper, all UPM students are now
faced with the necessity to proof a certain level of language
proficiency before they obtain their degree, what is more,
before they can officially enrol in the compulsory subject;
more particularly, they have to submit written proof of an
upper-intermediate level designated as B2 in the Common
European Framework for Languages [5]. It is important to
note that at the moment most UPM students have not acquired
this stated level nor obtained the B2 diploma. In view of this
situation, our program makes full sense as the perfect way to
conflate both linguistic competence needs and intercultural
exchange, bearing in mind that sustainability is a key issue in
the midst of the current economic and social crisis.
More particularly, Program 2 was aimed at delving into
intercultural aspects and language learning based on a two
group classification; namely an experimental group (the one
participating in the program) and a control group. It was our
belief that by developing the intercultural competence of the
students who learn Spanish at UBC Okanagan and English at
the UPM de Madrid, the students' overall language
proficiency will improve. Additionally, by providing the
students with virtual intercultural encounters their intercultural
awareness could be raised. An experimental design with a pretest/post test procedure was used in order to determine the
subjects’ intercultural and language proficiency followed by a
guided program with virtual encounters. The intercultural
development and language proficiency of the participants in
the language-culture learning program would be compared
with that of a control group of language learners (in the two
locations) undergoing more traditional language instruction.
Students from the 2nd and 3rd years were selected based on a
personal interview with the program instructors. Language
proficiency was important but not decisive in the selection and
not L1-L2 language level matching was considered, given the
fact that students were engaged in the tasks using one
language at a time. Another key issue was to find a group of
students with a high degree of motivation and an eagerness to
learn about other cultures and contexts.
UBCO students’profile
The Spanish program in the Faculty of Creative and Critical
Studies (FCCS) at the University of British Columbia in the
Okanagan (UBC Okanagan) is aimed at students who are
interested in acquiring abilities, experience and skills other
than English language-based, and secondarily students who
are pursuing a major or minor in Spanish. In addition to
language skills, students pursuing a B.A. in Spanish are
presented with literary master pieces of Spain and Spanish
American, and gain a basic understanding of the Spanish and
Latin American culture. The language-learning aspect of the
program covers practical skills and daily application of
Spanish, as well as skills that are transferable to a work
environment and to an academic setting. After completing
Fifteen Canadian students who were enrolled at the Spanish
Language Program at UBC Okanagan were selected to match
fifteen counterparts in the EUATM at the UPM, in Spain.
These groups were divided into two experimental groups (15
students each) and two control groups (15students each). The
groups received a guided program list of virtual encounters
requesting information on topics such as early events in each
country, national customs, accomplishments, global
connections, provinces and territories, traditions, and national
holidays. The control groups received a regular on-campus
language class.
These were the following tasks for the experimental group:
a)
ECTS stands for European Credit Transference System. 1
credit in this system is equal to about 26 global work hours
including teaching, testing, tutorials and student study time.
162
Pre-program tasks:students attended an information
session where we explained the objectives of the study
and advised then to use one language at a time when
they were practising with their peers. Then students
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
completed a language background questionnaire, took
an online language proficiency test were provided
with a guided program of the virtual assignment.
b)
In-program procedure: students could practice their
tasks before submission as many times as they
considered fit, both on Skype, Moodle or email. After
practices, they had to post in Moodle the written
assignments (properly corrected by his/her peer). At
the end they had to submit their instructors a record of
their oral and written connections
c) Final-program tasks:in the final stage all participants
will be required to complete a language proficiency
test a second time and a questionnaire
5.
[1] J.D. Lousier, Sustainable Economy II: Sustainability
Models.
BC
Institute
of
Social
Ecology.
http:
//www.bcise.com/Papers/Nov-2010/sustainabileeconomy-2-sustainability-models.pdf , 2010 (accessed 5
February, 2013).
[2] B. Littig, and E. Grießler, ·
Social sustainability: a
catchword between political pragmatism and social
theory”, Int. J. Sustainable Development, Vol. 8, Nos.
1/2, 2005, pp. 65–79.
[3]UNESCO,Education for Sustainable
Development
www.unesco.org/new/en/.../education-for-sustainabledevelopment/,2005-2014(accessed 14February, 2013).
[4] T. Fernández, T., J. Santiago, A. Tomaino, M. del Rí
o, A.
Casaravilla, “A Virtual Challenge: English-Spanish
learning exchange between Australian and Spanish
university students”. International Technology,
Education and Development Conference. IATED,
2011.
[5]Council of Europe, Common European Framework of
Reference for Languages: Learning, teaching,
assessment, 2001, Strasbourg: Cambridge University
Press.
[6] D. Little, “The Common European Framework and the
European Language Portfolio: involving learners and
their j
udgments in the assessment process”. Language
Testing, 2005, Nos. 22 (3) pp. 321-336.
[7] G. García-Pérez, “Effectiveness of formative eassessment in large language classes”. Proceedings of
the 6th International Conference on e-Learning.
University of British Columbia Okanagan Campus,
Kelowna, Canada. (27-28 June, 2011). Edited by Philip
Balcaen. Academic Publishing Ltd. Reading.
[8] M.L. Niess, M.L., K. John and S.B. Kajder, Guiding
Learner with Technology,.2008, John W iley and Sons,
Inc.
[9] G. García Pérez, T. Fernández and L. Mueller, “W hen
Three Cultures Meet: Enhancing Intercultural
Communication through Virtual Story Telling”. IX
International Conference on Education and
Information
Systems,
Technologies
and
Applications: EISTA, 2011.
[10] J. Seely, Oxford Guide to Effective W riting and
Speaking. 2005, New York:Oxford University Press.
W hile the students in the experimental groups were exposed
to the guided program of virtual encounters, the control
groups received regular in campus language class. Currently,
we are working in Exchange Program 2. As a consequence,
only general outcomes are available at the moment (see
section 4). W e are now comparing the main differences
observed in the experimental and control groups with a view
to writing an article for a journal.
4.
REFERENCES
CONCLUSIONS
The students were very pleased to have new friends that are
native in the language they are learning and to gain insights
into cultural codes that are hard to learn from text books or
prepare for a trip overseas. Students gained conversational
experience and confidence in communicating in English or
Spanish, and have maintained or improved their language
skills. Through these virtual encounters, participants gained a
sense of ownership for being asked to give feedback to their
pen pals. Furthermore, they developed a sense of learning
community:groups sharing the same values that are actively
learning together from each other. Unfailing students/tutors
orientation means getting everyone to agree about the
objectives of the program before it starts and this should be
kept in the forefront as the program proceeds. At the same
time, in keeping with the guidelines in the CEFL referring to
self-assessment and autonomous learning, they become more
aware of their own language development and of the problems
they have with grammar and pronunciation, and start being
more conscious of the mistakes they make. Our Language
Exchange Program allowed UPM and UBC students to meet
and exchange language and cultural insights in a relaxed
environment at no cost. Adequate support and resources are
also important; our program meets the required statements to
be sustainable. Sustainability is at once an integrative
discipline and a multidisciplinary project with statistical,
scientific and humanistic underpinnings. Sustainability
suggests place-based and project-based approaches to student
learning. Teaching towards sustainability means that
classroom and community are important. Teaching
sustainability is both stimulating and challenging because of
the interdisciplinary nature of the problems at stake. W e
expect that when students graduate from university and are
faced with the need to actually apply many of the theoretical
knowledge that they have acquired in their classrooms, they
should benefit from this program, which attempts to provide
them with not only the basic ability to employ innovative and
modern communication hardware and software, but also to
develop self-teaching and self-learning skills at no cost.
163
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Strategies for Improving Creative Ability Under the Context of Globalization in
Higher Education
Ching-jung Hsieh
Lecturer, Department of Marketing and Distribution Management, WuFeng University
Doctoral Student, NCYU
private schools.
Abstract
The characteristics of teachers in an
university will catch up with the change.
The purpose of this study was to describe and explain
This paper will
the srategies for improving creative ability under the context
improve creative ability under the context of globalization in
of globalization in higher education.
higher education to discuss the characteristics by
global century.
The 21st century is a
globalization ,creative professional development and global
The implications of globalization spread all
over the world; not only economical and political, but also
perspective. Creativity refers to the phenomenon whereby
educational, social and so on, the whole world is now in the
a person creates something new (a product, a solution, a
same boat.
work of art etc.) that has some kind of value.
In addition, because we suffer from lacking
What counts
natural sources and hereafter pay more attention to the
as "new" may be in reference to the individual creator, or to
concept of protecting the earth, we need to create new ways
the society or domain within which the novelty occurs.
and products like electric vehicle to solve this situation. To
What counts as "valuable" is similarly defined in a variety of
build the strategy for improving creative ability under the
ways.
context of globalization is the most important one in dealing
relationship between creativity and general intelligence; the
with these problems, it should start with education;
mental and neurological processes associated with creative
especially, higher education.
activity; personality type and creative abilityand so on
In the process of finding their
Scholarly interest in creativity ranges widely: the
place in university environments, teachers should build and
(Wikipedia).
develop their professional development to catch up with the
consider the interests, needs, value and ideology which are
world.
inextricably connected to reach the target of organization.
A globalization lens provides a powerful conceptual
In addition, the members of organization need
tool to disentangle the highly competitive and changeable
In order to achieve objectives, the members of organization
conditions of students.
can use innovative strategies and skills to create, maintain or
The main purpose of this paper is to
discuss and analyze the strategies of improving creative
fight with their profits and the conditions of work.
ability in higher education.
(Kelchtermans, 1996; Kelchtermans & Ballet, 2002).
This research mainly explores
The
the strategies for improving creative abiltiy under the context
challenge of the teacher turns to be heavier and heavier than
of globalization in higher education in a university,
before.
especially for globalization, creative professional
themselves to survive in this competitive educational
development and global perspective.
environment under the rapidly change.
The teachers of college need make progress for
Accordingly, the
responsibility for the teacher is not only teaching knowledge
Introduction
but also enlarging their critical ability and skill to meet the
In the past few years, the educational environment was
demands of the university.
This paper mainly explores to
rapidly changing because of the reduction of new-born baby;
improve creative ability under the context of globalization in
the structure of family resulted from new immigrants; the
higher education in the university, especially for
economic recession resulted from global financial storm and
globalization, teacher creative professional development and
the vacillating educational policy.
These reason will
global perspective.
influence the operational way of most schools; especially,
164
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
westernization of America.
Strategies for Improving Creative Ability Under the
On the contrary, languages of
many tribes disappeared through the broad use of English.
Context of Globalization in Higher Education
As Graham Vulliamy (2004) advocates, the nature of
Traditionally, the responsibility for the teacher is to
propagate doctrine, to teach the student and to solve the
contemporary globalization is best viewed as a multifaceted
students’ problem. Time changes, the society become
rather than a singular condition, and it is associated with
complex and multiple.
various consequences at the economic, political and
Teacher training program has to
consider different aspects to train the future teacher facing
sociocultural levels.
this changeable society.
influence on different aspects. M ore than this, Kathleen E.
In order to adapt in the need of
In this case, globalization presents its
educational environment, the strategies for cultivating
White (2003) prostates “that the four major dimensions of
creativity under the context of globalization in higher
globalization are:
education; particularly for globalization, professional
the economic.” Again, these lines explicate the multiple
development and global perspective.
aspects of globalization that enrich the content of
I.The Context of Globalization
globalization.
the cultural, the social, the political, and
Aside from this, Vulliamy also clarifies the “central
In order to explore improving creative abiltiy under the
context of globalization is, this article tries to discuss the
feature of the objective changes taking place is the manner in
historical context of globalization first.
which, as a result of recent developments in
John H. Coatsworth
telecommunications using satellite TV and the linking of
(2004) generalizes five globalization cycles.
computers through cyberspace, economic and cultural
The first globalization cycle began in 1492 and lasted
until the early 1600s.
activities can take place on a planetary scale in real-time.”
The second cycle commenced in the
late seventeenth century with the rapid growth of a second
(Vulliamy, 2004) Undoubtly, telecommunication provides
wave of European colonization that established the main
instant information and communication.
slave colonies in the New World.
information of what happened in the world instantly and
The third cycle ended
We may get the
synchronally.
with a series of major shocks in the early nineteenth century,
In addition, Otavio Velho (2003) points out, one of the
including the wars of the French Revolution and Napoleon,
which helped to set off the Haitian Revolution of 1791.
implications to approach to globalization is that
The most recent cycle began with the liberalization of
“globalization can be no longer seen as a ‘foundation’ in
international trade after the Second World War and
opposition to others, but rather as a text, a cultural resource,
intensified after a further liberalization of global trade in
that may be activated by different agents and in different
manufactured goods after 1967. Globalization cycles have
contexts.”
produced immense and measurable increases in human
cultures constructs the variety of culture resource that relates
productivity.
to different dimensions of globalization.
(Coatsworth, 2004)
From this perspective the diversity of different
For example,
Korean Kimchi and culture have spread all over the world by
Each cycle contributes to the spread of globalization
and its influence, especially in economical and political
the popularity of the Korean drama. In the other hand,
dimensions.
M andarin China attracts lots of people to learn Chinese
Among them, colonialism and imperialism
fosters the westernalization for those who under colonialism.
because they will hold the 2008Olympic Game in Bai-Gin.
In order to consolidate the authority of the planter, English
We may discuss a topic from Korean and Chinese
has embedded into daily life to those who have been
viewpoints; thus, we may obtain opinions from different
colonized.
dimensions.
The diffusion of English also reinforces the
development of computer technology.
It also contributes to
165
This is what globalization contributes.
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
practice, support student learning and ensure high
Above all, an important aspect of the global information
educational standards.
revolution is that the advancement in computer technology
Golding (2006) believes that professional development
and the use of the Internet have facilitated the exchange of
research findings worldwide.
comprises active and reflective engagement in a range of
(Vulliamy, 2004) Here,
global information revolution accelerates the spread of
professional experiences that are considered supplementary
intellectual knowledge innovation. Owing to the multiple
to the day-to-day responsibilities of a teacher.
aspects and different dimension in the context of
professional development is to enhance the skills, knowledge
globalization, the medium of globalization to link and
and understandings of teachers in order to influence student
connect with those different dimensions plays a crucial role
learning outcomes.
to this extent. To this extent, to improving creative ability
development include:
The intent of
Some approaches to professional
Table.1:Aapproaches to professional development
under the context of globalization needs to involve these
multiple aspects
Approach
Definition
Consultation
to assist an individual or group of
II.Creative professional development
Higher Education provides a competitive and learning
environment for students, to better prepare them to compete
individuals to clarify and address
with the elites around the world.
immediate concerns by following
M oreover, universities
will require the faculty such as the teachers for make
a systematic problem-solving
progress in their skills of teaching and the ability of research.
process
Therefore, the teachers need to advance their professional
development in the field of their major.
Coaching
Under the pressure
to enhance a person’s
competencies in a specific skill
of making progress, this research will discuss the strategy,
area by providing a process of
professional development under creativity, required for
observation, reflection, and action
cultivating creativity of students in higher education.
Professional development (Speck, 2005) refers to skills
Communities of
to improve professional practice
Practice
by engaging in shared inquiry and
and knowledge attained for both personal development and
learning with people who have a
career advancement. Professional development
common goal
encompasses all types of facilitated learning opportunities,
Lesson Study
to solve practical dilemmas
ranging from college degrees to formal coursework,
related to intervention or
conferences and informal learning opportunities situated in
instruction through participation
practice. It has been described as intensive and collaborative,
with other professionals in
ideally incorporating an evaluative stage.
systematically examining practice
There are a
variety of approaches to professional development, including
M entoring
to promote an individual’s
consultation, coaching, communities of practice, lesson study,
awareness and refinement of his
mentoring, reflective supervision and technical assistance.
or her own professional
In addition, there are many opportunities for teachers to
development by providing and
continue to develop creative skills and knowledge required
recommending structured
for rapidly changing educational environments.
opportunities for reflection and
Through
engagement with a variety of professional development
observation
opportunities, teachers have the opportunity to enhance their
166
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Global education has been the main trend in the 21st
Reflective
to support, develop, and
Supervision
ultimately evaluate the
century.
performance of employees
students’ understanding in the complexity and value of
through a process of inquiry that
multicultural society; and moreover, it intends to construct
encourages their understanding
students’ global perspective so that the student may adapt in
and articulation of the rationale
the globalized environment and contribute to construct a
for their own practices
more equal and sustainable world (Kao, 2002).
Technical
to assist individuals and their
raise the students’ competitive capacity to compete with
Assistance
organization to improve by
other country and adapt to the globalization trend, the
offering resources and
ministry of education emphasizes the importance of
information, supporting
internationalization in an university in the upcoming
networking and change efforts
University Evaluation.
The objective of global education is to deepen the
In order to
M any Universities set a goal to
As for my own experience, I work in a university. I
expand the students’ global vision so they can fit the
should obey the school of culture and policy; for instance,
requirements of M OE about Internationalization and
the most important decision is every student when he
globalization. Hsun-Fan Kao quoted Hanvey’s idea about
graduate from the business college of this school.
global vision which contains five different aspects:
The
student can learn the professional skill of creative digital
consciousness, state of the planet awareness, cross
marketing. Consequently, teacher must to improving and
perspective-cultural awareness, knowledge of global
retraining the professional development under globalization,
dynamics, and awareness of human choices(Kao, 2002).
the teachers in the business school need to learn the ability
From this point of view, global vision includes both internal
and skill of digital marketing before they teach the students
and external facets in viewing the world, not only from
and so on.
personal point of view but also from the world’s, even from
Professional development is a crucial
the universe’s point of view.
characteristic to maintain the position of teacher of the
Besides, M s. Ying-Tai Long argues that global vision
changeable educational environment in a rapid development.
Accordingly, creative professional development is an
should include humanitarian concerns for the world.
important strategy required for improving creative ability
points out that when tsunami in the south sea happened, all
under the context of globalization in higher education.
people in the world devoted themselves to secure the people
III.Global perspective
and help them; ironically, young people in Taiwan were
celebrating the new coming year at the same time.
Due to the invention of the airplane diminishes the
She
The
geographical distance between people, the creative
ignorance of concerning those who encountered big disaster
information technologies break up the boundary between
in other countries somehow reveals the coldness of the
different nations and change the way of communication,
young men in Taiwan.
economic activities between countries reinforce the
concern and care from those young men.
opportunity to travel abroad; the idea of globalization seems
it reveals the lack of global vision in young people in Taiwan.
to be the main stream in the 21st century.
The teacher should pay more attention in this situation, they
This paper will
Probably the distance detracts the
In some aspects,
discuss another strategy, global perspective, required for
must teach the student to create their career plan or to judge
cultivating creativity of students in higher education.
by global perspective.
From this perspective, global vision
should include human concern to people in the world, and
extensively, to the whole universe.
167
As a future teacher
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
should perceive and sense what is happening in the world
up their globalization and professional development and to
and share the feeling.
set up global perspective is a big task for the teacher
M ore importantly, the educators
should develop their global vision to respect the difference
training program. Aside from deepening the teachers’
between different culture and individual opinion, to concern
understanding in the complexity and value of multicultural
the issues about politic, economic, ecology, and the society,
educational environment, it intends to improving the
and to recognize the value of ourselves, the difference
teachers’ professional development to continue the position
between our culture and others, and to deprive from bias and
of teaching, to awake the awareness of globalization culture
discrimination.
to run the school innovative and effectively, and to
Teachers have to participate in
international activities to broaden our own world view and
construct students’ global perspective so that the teachers
construct our global vision. Then, we can get rid of the
may adapt in the globalized educational environment and
geographical limitation of Taiwan to connect with the world
contribute to construct a more equal and sustainable world.
and get involved in the global village to construct a better
world.
Thus, global perspective is a significant strategy
Reference
required for improving creative ability under the context of
Coatsworth, John. H.
globalization in higher education.
Welfare in History.
(2004.)
Globalization, Growth, and
In Suarez-Orozco, M arcelo M ., and
Zin-Hilliard, Desiree Baolian (Eds). Globalization:
Conclusion
Under the viewpoint of improving creative under the
Culture and Education in the New M illennium.
London:
context of globalization in higher education, the power and
University of California Press
conflict can transfer peacefully, the teachers play an
Corwin Press National Professional Development Center on
important role in a university.
Inclusion. (2008). What do we mean by professional
When they find the
educational environment has changed, the teachers have to
development in the early childhood field?Chapel Hill: The
face it and to develop themselves to adapt it.
University of North Carolina, FPG Child Development
For instance,
the crisis of financial resulted in the reduction rate of recruit
Institute, Author
students; especially in private schools.
Freire, Paulo(2002) Pedagogy of the Oppressed.
The teacher want
Taipei:
to keep their job, they can match up the requirements of the
Wu-Nan.
school such as reducing an annual bonus.
Golding, L. & Gray, I. (2006).Continuing professional
In the other case,
teacher training program is no longer limited in normal
development for clinical psychologists:A practical handbook.
education system.
The British Psychological Society. Oxford: Blackwell
It symbolizes an open, multiple, and
progressive idea in education.
In order to adapt in the
Publishing
multi-cultural and transitionary educational environment,
Greene, M axine(1978).
highly development in information technology, and the
Life.
form of global village, how to renew professional
Hsin-Jen Chen(2007).
development, to form or create the school organizational
that is, the micro-politic. Journal of Educational
climate and to build global perspective from viewpoint of
Administration and Evaluation.
creativity in an university is an important mission.
Joyce, Natzke(1996). Capitalizing on the Differences in
In the
Wide-awakeness and the M oral
New York: Techer College Press.
A new field of school administration;
other word, the strategies required for cultivating creativity
Organizational Culture in Lutheran High Schools.
under the context of globalization in higher education are
Unpublished doctoral dissertation, M arquette University,
globalization, professional development and global
M ilwaukee.
perspective.
Hence, how to encourage the teacher to bring
168
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Kao, Hsun-Fan(2002). A Study of Global Education in
Teacher Training Grogram:
A Development of Global
Perspective for the Teacher.
Normal Education Association.
R.O.C. Taipei: Shui-Fu Corporation.
Kelchtermans, G (1996). Teacher vulnerability:
Understanding its moral and political roots. Cambridge
Journal of Education
Kelchtermans, G., & Ballet, K. (2002). The M icropolitics of
teacher induction: A narrative-biographical study on teacher
socialization. Teaching and Teacher Education.
National Professional Development Center on Inclusion.
(2008). What do we mean by professional development in
the early childhood field?Chapel Hill: The University of
North Carolina, FPG Child Development Institute, Author
Schein, Edgar H. (1992). How Culture Forms, Develops and
Changes, in Ralph.
Speck, M . & Knipe, C. (2005). Why can'
t we get it right?
Designing high-quality professional development for
standards-based schools(2nd ed.). Thousand Oaks.
Velho, Otavio.
(2003) Globalization: Object, Perspective,
Horizon. In Roland Robertson and Kathleen E. White.
Globalization: Critical Concepts in sociology.
New York:
(Eds)
Vol. 1.
Routledge
Vulliamy, Graham. (2004). The Impact of Globalization on
Qualitative Research in Comparative and International
Education. Compare, Vol. 34, No.3, September.
Carfax
publishing.
169
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Designing, Constructing and Implementing a Low-Cost Virtualization Cluster for
Education
Daryl Johnson, Bill Stackpole
CSEC Dept., GCCIS, RIT
Rochester, New York 14623
And
Sharon Mason & Bruce Hartpence
IST Dept., GCCIS, RIT
Rochester, New York 14623
between existing and new hardware platforms and the desire
for new features that may not be supported by existing
hardware.
ABSTRACT
Virtualization technology has become a mainstay of the
enterprise and a critical element in the arsenal of commerce.
It allows enterprises to grow and be managed more
efficiently and with less dependence on specific hardware
platforms. At the same time, complexities and changes such
as those represented by virtualization constitute disruptive
technologies requiring careful attention to ensure that
systems continue to operate as expected. There are several
options available when deploying these technologies; one
that deserves significant consideration is the virtualization
cluster.
In other words, the use of virtualization allows one to
maintain consistency across deployed systems. Typical
hardware and software incompatibilities can be minimized.
At the same time, complexities and changes represented by
virtualization constitute a disruptive technology requiring
careful attention to ensure that systems continue to operate as
expected.
In addition to these benefits offered by
virtualization, adding another layer of abstraction may
increase the difficulty of comprehending configurations
especially for individuals who are new to the virtual
concept[1]. For example, will the amount of server downtime
increase because the network and system administrators lack
the background or training necessary to run equipment?[2] Is
the architecture well understood? Will troubleshooting
efforts be delayed? While there are several options available
when deploying virtualization technologies, one of the most
significant to consider is the virtualization cluster.
This paper will document the rationale, design, selection, and
construction process involved in creating such a
virtualization cluster. The efforts documented in this paper
have shown that, with minimal funding, any educational
institution can construct and provide a hands-on
virtualization cluster environment to help teach students
about virtualization and provide opportunities for
undergraduate and faculty research. One can affordably build
a sufficiently powerful environment using Commercial-Offthe-Shelf (COTS) components.
A locally available
virtualization cluster can enhance student success by
providing hands-on access helping them to grasp the
concepts and prepare them to make use of the technology. It
may also servers to facilitate experimentation with many
aspects of systems administration and security.
Virtualization clusters typically include a collection of
processors, memory, storage and networking that allow for
the deployment of multiple virtual machines (VMs) in a
flexible and easily reproducible environment. Large and
expensive, such systems often extend well beyond the budget
of a small organization or school. To address the cost issue,
free or relatively inexpensive public, cloud-based
virtualization providers might be used. While this may help
to provide initial cost savings, it also limits access to students
as users or consumers only, and does not provide them
experience acting as a designer, implementer, or
administrator of the virtual hosting environment[1]. With a
cloud provider, someone else owns the hardware and
controls access to the infrastructure. As a tenant, the user
pays a fee for the privilege of temporary use of those
systems. Should a cloud provider feel so inclined, it may take
the opportunity to raise the price, change the technology, or
even withdraw the service entirely. Clearly this represents a
disadvantage for those dependent upon the service.
Keywords: virtualization, cluster, education
1.
INTRODUCTION
Virtualization technology has become ubiquitous in
enterprise environments and has enjoyed significant growth
and a meteoric rise in deployment. It allows enterprises to
grow and be managed more efficiently and with less
dependence on specific hardware platforms or vendors.
Virtualization acts to homogenize the hardware and
networking infrastructure: two components that can be costly
and challenging to upgrade over time due to incompatibilities
170
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Further, it is important to have students gain experience and
confidence designing, configuring, creating, and managing
the technology. Understanding the theory of how the
technology should work, and experiencing it in practice are
two very different concepts to grasp. Student administration
of a cluster provides an understanding of the limitations and
capabilities of the system. Studying the theory in lecture,
coupled with hands-on practice in the lab, is likely to yield
students with a better understanding of the assets and
liabilities of virtualization clusters as well as better long-term
retention of the parts of the system that are important[3].
allowing many students to use the system concurrently.
Desktop virtualization can help but it does not achieve the
same virtual:hardware ratio.
In an effort to address these points, the faculty researched
approaches to collaboration spanning geographically remote
sites. It was determined that a faculty and student constructed
virtualization cluster would be an excellent mechanism,
provided that it could built affordably. The primary uses of
the cluster, at least as far as the current project was
concerned would be teaching, learning and research of
security and forensics topics. In order to facilitate a wide
range of topics, the cluster would be located in a secure and
isolated environment. It turns out that there are actually no
limits as to what can be done with an architecture of this
type.
The public cloud approach also has the potential to
negatively impact learning by requiring students to make an
even greater mental leap from the physical environment to an
abstraction[1]. The student is leaving the “I can touch it”
environment for a very removed, hands-off “no one here
knows what’s going wrong” situation. A locally managed
cluster can help students more easily bridge that gap. Other
virtualization technologies such as simple desktop
virtualization can bridge this gap but often do not fit the
needs of an entire department or advanced studies.
2.
Two main objectives were selected. The first objective was
to investigate how inexpensively one could assemble and
operate a virtualization cluster and to prove that it could be
accomplished within the budgetary reach of a cash-strapped
organization. A secondary objective was to prove that a
system could be constructed in such a way that, with little
disruption, it could be reorganized to facilitate study and
research of multiple virtualization technologies on the same
physical setup. For example, the system could initially be
deployed using VMWare products. After experimentation,
other vendors (Microsoft, Oracle, and Citrix) or open source
solutions could be deployed.
BACKGROUND
In 2007, RIT was awarded a Scholarship for Service Grant
from the National Science Foundation. Through a series of
hands-on workshops and site visits, this project shared the
Department of Networking, Security and Systems
Administration’s faculty knowledge and applied technical
expertise in network and systems security and forensics with
the faculty at three partnering institutions: Texas A&M
University Corpus Christi, Hampton University and
Oakwood College.
As noted previously, our initial use of the cluster was for
studies in security. This was accomplished via the virtual
machines (VMs) deployed on the cluster. However,
curricular topics such as security, quality of service,
programming, etc. could vary depending on the faculty
utilizing the cluster.
The overarching goal of the project was to increase the
number of information assurance professionals within the
United States of America through applied teaching
workshops. This grant promoted the adaptation of the RIT
curriculum (with an applied approach and focus) to the
partnering educators themselves, and indirectly to their
students.
The next section of this paper will address creating a
virtualization cluster that has sufficient performance to
support a reasonable number of students at a cost that is
affordable. A hands-on environment will provide alternative
views and perspectives on virtualization.
During the course of the project two points became clear: 1)
The group was interested in continued research and
curricular collaboration, and 2) onsite laboratory facilities
were challenging to develop, maintain and staff for most
organizations. As an example of this problem, let us
consider the budget typical of small academic departments.
Small departments often lack the means to develop the
necessary programs let alone build, outfit and maintain a lab
filled with modern networking and storage equipment. This
problem also becomes the central point in developing the low
cost cluster approach. For several of the projects associated
with the grant, RIT donated this equipment to the partner
school. A cluster not only moves some hardware to a
software environment, but encourages economy of scale in
3.
GOALS FOR THE CLUSTER
The goals of the project include creation of a template or
reference design that is inexpensive, flexible, and
distributable. Inexpensive means affordable by a wide
variety of target populations that previously would have
considered virtualization technology to be financially out of
reach. Flexible means that the design would not just allow
but would also support the inclusion of many different and
competing virtualization technologies in an easily
manageable way. This design should allow modification,
expansion, and customization necessary to meet the needs of
individual adopters. The design must be useful for teaching
and training of students (and faculty) in the operation and
technology of virtualization. The design should also increase
171
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
the awareness of others to the applications and limitations of
virtualization. Ultimately the goal is to create a package that
could be easily distributed and shared with many different
target populations. The package would have a variety of
capabilities.
allowing some measure of classroom support for other nonvirtualization topics.
3.2 Other virtualization technologies
The initial deployment was completed using ESXi.
Subsequent experimentation allowed the team to work with
Xen, Proxmox, and XDM virtualized environments. These
technologies were compatible with the cluster hardware that
was selected. Thus, the cluster design proves that supporting
reconfiguration from one virtualization technology to another
with minimal effort and hardware reconfiguration is an
attainable goal. The design includes the ability to isolate the
virtual machines running on the cluster in order to support
working with malware and other offensive technologies.
Secure and remote access to the cluster allows continued
collaboration with external organizations and individuals.
3.1 Inexpensive
The cluster hardware equipment budget was set at $15,000.
All equipment was to be housed in the RIT NSSA lab
facilities, with remote VPN connections provided for access.
The virtualization cluster was based on 12 AMD hex core
motherboards, each with 16G of memory and dual Gb
Ethernet cards. These components were selected as they
provided the best cost:performance ratio. A big part of a
virtualization cluster is storage. In order to provide
networked storage, an additional hex core motherboard with
16 G memory and an Adaptec RAID controller with solid
state storage (SSD) cache and four 1.5 GB SATA drives
made up the iSCSI target. For storage accessed by clients and
virtual machines, the benefits provided by solid-state storage
include decreased access time and increased performance.
Virtualization Cluster Laboratory
Daryl Johnson, Bill Stackpole, Bruce Hartpence & Sharon Mason
June 2010
Cloud
VPN Access Control
VM1-1
Node 1
SAN
SAN
Switch
Node 2
LAN
Switch
VM2-1
Node 12
Figure 2 – Virtualization Cluster Design
3.3 Storage
Regarding storage, three options were explored: completely
local storage, completely network-based storage, and some
hybrid combination of local and networked storage.
Local storage provides quick access time and does not
require significant network performance or a dedicated
storage node. A downside to local-only storage is that virtual
machines stored on one node would be isolated, and only
accessible to that node. This would preclude VM migration
between nodes that might be desirable for reasons such as
fault tolerance and load balancing.
Figure 1 – Cost basis for cluster
The initial configuration was based on ESXi from VMWare.
The cost was kept down in part by utilizing desktop-class
(rather than server-class) hardware. For example, a
commercial deployment might use expensive blade
architecture for servers while we used desktop motherboards,
memory, and drives. This is reasonable given that the cluster
is not intended to be deployed as part of a production
environment with greater performance demands. The design
can be scaled down to a 2-node cluster (at a cost of less than
$2k) and at that level can still effectively illustrate many
important aspects of virtualization technologies while
Network-based storage provides a centralized repository for
VMs and helps to facilitate sharing of VMs and images
between nodes. Issues with network-based storage are
typically related to difficulty in achieving reasonable
throughput to the nodes requesting service. Many initial
implementations of network based storage exhibit poor
172
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
performance. One condition is described as being "spindle
bound" meaning having an insufficient number of physical
drives to support the data access rates necessary for fluid
performance of the VM. Another condition is described as
being “network bound”, to mean insufficient network
performance is available to support data transfer traffic
between virtual nodes and the storage system. In addition to
these conditions, other factors can also negatively impact
network based storage performance.
software RAID. A variety of open source and commercial
operating system storage platforms were available, to include
storage servers built on Linux (OpenFiler and FreeNAS), and
Microsoft Windows (Windows 2008 Storage Server edition).
The hardware configuration provided a platform that allowed
for experimentation with competing storage techniques such
as NFS, iSCSI, DAS, NAS, and SAN.
We envisioned as a spinoff of this effort that a course
studying advanced and alternative storage technologies could
be developed.
A hybrid combination of local- and network-based storage
can bridge the gap between the two exclusive alternatives. A
local repository can be provided in which images can be
stored and deployed, while a shared repository can be
utilized at the same time. Such a hybrid design can offer a
balance between the speed and simplicity provided by local
storage, while also offering access to more advanced features
provided by a network-based storage solution.
3.4 Flexible
Based on the rapidly changing virtualization landscape, it
was clear that an environment allowing experimentation and
the use of more than a single virtualization technology was
needed. VMWare, Proxmox, Xen, and XDM all deserve
examination and understanding. A remote lab system
(RLES) had been built at RIT in 2007 at a much higher cost
($140k+) and suffered from one very debilitating
characteristic: production demands[4]. RLES was created
and intended to support students doing work in a virtualized
OS, not for the deployment and understanding of the
virtualization technology itself. RLES could not be shutdown
and reconfigured without disrupting the service requirements
of other students. The virtualization cluster was designed
and intended to be non-production with the expectation of
occasional or periodic service disruptions.
Internet
iSCSI Server
10.141.2.100
Router for inter-VLAN
routing / IP helper / IPSEC/
SSL VPN
iSCSI VLAN (Dual aggregate uplinks)
Trunk
Uplinks to room patch panel
1
SYST
RPS
STAT
DPLX
SPEED
PoE
Dual uplinks (trunk) from
each PC to the switch
Node 1
10.141.2.101
Node 2
10.141.2.102
Node 7
10.141.2.107
Node 8
10.141.2.108
2
3
4
5
6
1X
2X
MODE
POWER
OVER
ETHERNET
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
To Room Switches
Catalyst 2960 Series PoE-48
48
11X
13X
23X
25X
35X
37X
47X
12X
14X
24X
26X
36X
38X
48X
1
2
3
4
740W
Room Patch Panel
Node 3
10.141.2.103
Node 4
10.141.2.104
Node 9
10.141.2.109
Node 10
10.141.2.110
Node 5
10.141.2.105
Node 6
10.141.2.106
Node 11
10.141.2.111
Node 12
10.141.2.112
The virtualization cluster was initially configured to boot
from USB flash drives as these were less expensive than
local boot disks. A library of flash drives, each with a
different configuration, was to enable the virtualization
technology to be “swapped out” with the ease of changing
from one pre-configured USB drive to another.
Datacenter with clustered nodes
Multiple VLANS configured on each node
VMs
Virtualized DHCP/DNS
Server
Windows Server 2008 R2
10.141.2.50
Virtualized vCenter Server
Windows Server 2008 R2
10.2.142.98
The hardware platform was designed to be consistent
throughout the cluster. Flash drives with preinstalled
versions of VMware ESX/ESXi, Zen, Proxmox or XDM
could be replicated and those duplicates simply plugged into
any of the nodes. As new or alternative virtualization
platforms were released, additional USB drives could be
configured and replicated. As an experimental laboratory,
changing from one virtualization platform to another could
be done in as little as 15 minutes by simply swapping out the
drives and rebooting the system(s).
Figure 3 – Hardware connections
A repurposed Cisco switch forms the network backbone for
the cluster. The design intended that the systems could
easily be reconfigured to run any available virtualization
software.
The cluster was initially constructed using
VMWare ESXi 4.x with VSphere and VCenter to support an
estimated 200 virtual machines running concurrently.
VMWare was selected as an initial option for academic
institutions based on the VMWare Academic Program
having a nominal pricing structure for academic research and
classroom usage.
While the concept has merit, the USB drives initially
purchased were too small and too slow to perform
adequately. Scavenged SATA drives from retired
workstations were added to the local nodes to replace the
initial USB flash drives as boot media and local storage.
The utilization of the cluster has demonstrated that it can be a
valuable platform for experimentation, development and
awareness. Labs and exercises have been developed to
provide experience to students in virtualization technologies.
AMD was selected for the motherboard/processor
combination for cost/performance reasons at time of
selection. Memory was configured at 16 Gb based on the
sweet spot of cost/Gb at the time.
The network storage server hardware was selected to allow
for flexibility. A hardware RAID card from Adaptec with an
SSD cache module was installed. The motherboard supports
173
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Thru these labs, students have been made aware of what
virtualization can and cannot do.
The cluster has also been used for thesis, independent study,
and undergraduate and graduate research projects. It has
been used in several classes for demonstrating security
vulnerabilities and weaknesses and increasing awareness of
privacy and confidentiality concerns. Other classes are being
developing to study advanced virtualization, storage, and
network technologies.
Experimentation has been performed to support the
possibility of using Macintosh hardware as the base platform
allowing MacOS to also be legally virtualized. This can
provide students with experience in a broader array of
operating systems. Unfortunately, this feature cannot be
provided for free due to the licensing requirements.
Physical hardware in a virtual environment – Many physical
devices and operating systems have a virtual equivalent. The
way that a physical device succumbs to exploits or failures
may be different then it’s virtual equivalent. This is
particularly valuable in the cyber security realm where
virtual equivalents may not fail as a physical device might
fail.
3.5 Distributable
The hardware design and specifications are available upon
request (web link to follow presentation). The entire cluster
design can be bundled and packaged for distribution to
academic institutions. The reference design has been
documented and can be easily replicated at other institutions
on a variety of platforms. Regarding software, although
many of the licenses are free, institutions with Microsoft
MSDNAA and VMware agreements can benefit as academic
licenses for those products can be acquired with minimal
paperwork.
To address this disparity, a reference design is being
developed to allow for the inclusion of physical hardware to
the virtual cluster. This will provide control over power and
other physical actions as well as access to serial console
interface(s) from the virtual systems. With such a
configuration, students will be exposed to the capabilities
and limitations of the actual physical device, both when
operating correctly, and in failure mode.
4. FUTURE WORK
Despite the success of the virtualization cluster, there are
many improvements that might be explored.
As an example, experiments have been started where Cisco
switches and routers have been introduced into the virtual
environment. Students can perform experiments and
activities allowing them to control and configure those
physical objects from within the virtualized environment.
Free solution - Work is underway for implementation of a
reference design of the base package that would not require
fee-based licenses. Most of the function has been established
but further testing and packaging are still necessary.
PXEboot - USB booting is a functional solution for changing
the hosts from one virtualization platform to another. A less
labor-intensive approach would be to set the machines up to
boot from the network via PXEboot. This would allow for
remote reconfiguration of the cluster, without the
requirement for a physical presence and could allow for webbased, menu-driven or scripted reconfiguration. PXEboot
would be used to designate the kernel image to be loaded on
the hosts for the virtualization architecture desired.
Workshop – Currently in the proposal stage is a workshop to
bring faculty from K-14 together for an introduction to
virtualization technologies. The plan will be to introduce the
technology, help build a small, extensible cluster (2-3 nodes),
and then install and operate a virtualization environment in
that cluster. The intent will be to send each faculty home
with the small cluster that they built. This will provide K-14
faculty experience building a cluster and sufficient
knowledge to use the technology in the classroom, for
distribution of OS images for students to work on. It will also
introduce the concepts of virtualization to a younger
audience in the hopes of preparing them more completely for
their transition to a college environment.
Figure 4 – Phase II concept
5. CONCLUSION
Academic units are often faced with the challenge of
remaining current while dealing with shrinking budgets.
Today, one of the most rapidly advancing areas is
virtualization. Virtualization is both a process and a product
– this is one reason that review of multiple technologies is so
important – one should not be constrained to use only a
single virtualization technology. Deploying contemporary
Macintosh-based - The current implementation of the cluster
is limited to x86 windows and Linux infrastructure.
174
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
virtualization architecture can create flexibility
economies of scale but at considerable initial cost.
and
This paper describes an approach to clustering that is both
flexible and low cost, putting virtualization within the grasp
of organizations that previously may not have considered it
possible due to either cost constraints, or lack of exposure to
the technology. This project has the additional benefit of
allowing almost any course requiring computing facilities to
be taught on the same system.
6.
REFERENCES
[1] Burd S., et al “Virtual Computing Laboratories: A Case
Study with Comparisons to Physical Computing
Laboratories”, Journal of Information Technology
Education, volume 8, pp. 55-78, 2009.
[2] Kara Nance, Brian Hay, Ronald Dodge, Alex Seazzu, and
Steve
Burd,
“Virtual
Laboratory
Environments:
Methodologies for Educating Cybersecurity Researchers”,
Methodological Innovations Online, volume 4:3, pp. 3-14,
2009.
[3] Gaspar, A., Langevin, S., Armitage, W.D. "Virtualization
Technologies in the Undergraduate IT Curriculum", IT
Professional, vol.9, no.4, pp.10-17, July-Aug. 2007
[4] Border, C., “The Development and Deployment of a
Multi-User, Remote Access Virtualization System for
Networking, Security, and System Administration Classes”,
Proceedings of the 38th SIGCSE technical symposium on
Computer Science education, p 576-580, 2007.
175
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
How to Educate and Train Science Teachers in IBSE Experimentation
Josef Trna
Faculty of Education, Masaryk University
Brno, Czech Republic, EU
ABSTRACT
(2) Structured level
School experiments are a core tool of science education.
Inquiry-Based Science Education (IBSE) is considered to be an
innovative educational method which has a strong motivational
effect on students and teachers. This method is based on
experimentation. Experiments have different roles and
characteristics in each of the four levels of IBSE. The presented
research tries to answer questions aimed at: the characteristics
of experiments at each of the IBSE levels, principles for
applying IBSE experiments, and teacher training methods
suitable for IBSE experimentation. A mixed research method
combining a theoretical comparative analysis and design-based
research, was used. The primary outcome of our research is the
taxonomy of IBSE experiments. The study describes four types
of IBSE experiments, including specific examples from
hydromechanics. Principles for implementing IBSE experiments
are also presented. The taxonomy of IBSE experiments and the
principles for their implementation into teaching/learning
science must be added to pre-service and in-service physics
teacher training. This task is performed by the European project
PROFILES.
(3) Guided level
(4) Open level
Experiments play a crucial role at all four IBSE levels because
they are the foundation of inquiry in science education.
Five acquiring stages exist in developing teachers’ skills [9].
(1) Motivation Stage: the stage of teacher’s motivation
(2) Orientation Stage: the stage of teacher’s orientation in the
acquired skill
(3) Stabilization Stage: the stage of new skill stabilization
(4) Completing Stage: the stage of completing the skill and its
inclusion in a wider contextual frame
(5) Integral Stage: the stage during which a new skill is
integrated into the skill structure
The first three stages can be developed during the teachers’ preservice training; the fourth and the fifth stages are possible to
complete during the teachers’ in-service training.
Keywords: Experiments, Inquiry-based science education,
taxonomy, science education, teacher training.
Our study focuses on the education and training of teachers to
use IBSE experiments at all four IBSE levels based on a
connectivist approach.
1. INTRODUCTION
Inquiry-based science education (IBSE) is an innovative
educational method which has a strong motivational impact on
students and teachers. This method is based on experimentation
which has a decisive role in science education. The motivational
role of experiments is based on the importance of experiments
in science research [12] and the cognitive importance of
experiments in science education [2]. That is why the teachers’
professional competence in using experiments in IBSE
(hereinafter IBSE experiments) is a very important part of their
pre-service and in-service training. Motivation, understanding,
training, and experience in the use of IBSE experiments are
integral parts of the pedagogical content knowledge [11] of
science teachers and should be improved by the implementation
of connectivist [10] educational and training methods.
3. RESEARCH QUESTIONS AND METHODOLOGY
The aim of this study is to create the foundations for teacher
education in IBSE experimentation in the form of a taxonomy
of IBSE experiments and to determine of the role of IBSE
experiments. Our research has applications in finding suitable
training methods for teachers in IBSE experimentation.
The research questions are:
(a) Are experiments different at various levels of IBSE? In
which characteristics do they differ? On this basis it is
necessary to create a taxonomy of IBSE experiments.
(b) What are the principles of the implementing experiments at
various levels of IBSE? These principles should then be defined
and applied to IBSE.
2. RATIONALE
(c) What teacher training methods with connectivist elements
are suitable for IBSE experimentation? The teacher training
methods will later be used in practice.
IBSE is based on understanding the process of science learning
[6]. The main principles of IBSE are student involvement in
discovering natural laws, linking information into a meaningful
context, developing critical thinking, and promoting positive
attitudes towards science ([5], [8]).
A mixed research method combining a theoretical comparative
analysis and design-based research, was used. The theoretical
IBSE analysis led to the creation of the basic characteristics of
IBSE experiments at various levels. The combined method of a
video study and a questionnaire for teachers examining the
In terms of teacher involvement, there are four levels of IBSE
[1]:
(1) Confirmation level
176
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
incidence of these four types of IBSE experiments in teaching
followed. Using design-based research, we discovered specific
patterns of IBSE experiments and verified their compatibility
with different IBSE levels. Using action research, which was
part of the design-based research, we modified the
characteristics of each type of IBSE experiment.
their inquiry by asking appropriate questions. Students generate
an explanation supported by evidence they have collected
through experimentation. The process of structured
experimentation is determined by the teacher, but the solution is
not known in advance; the teacher significantly affects the
students’ inquiry by asking guiding questions and by
determining the method of inquiry. Students express their
creativity in discovering laws.
4. RESULTS
Example: Floating and sinking 2.
Students place small balls, which are made from different
substances of known density, into water (Figure 2).
4.1 Taxonomy of IBSE experiments
By comparing the role of experiments at all four levels of IBSE
we found four basic types of IBSE experiments. Each type is
supplemented by particular examples of physics experiments
([15], [14]).
4.1.1 Confirmation experiments: The outcome of this type of
experiment is the confirmation of knowledge of principles,
concepts, and theories. Students gain experience and specific
inquiry skills, such as collecting and recording data. Students
carry out confirmation experiments following their teacher’s
detailed instructions and under his/her direct supervision. The
expected results of the experiments are known in advance; the
students confirm or verify laws.
Example: Floating and sinking 1.
Students gradually insert balls, which are made from
substances of known density, into water (Figure 1).
Figure 2. Balls with different density
Students enter the substance’s name and density into the table.
They record the behavior of the solids in the liquid (Table 2).
The final analysis of the balls’ density leads to the conclusion
that their behavior depends on their density in comparison with
the density of liquid.
Table 2. Worksheet – structured experiment
Substance
Density of the Behavior in water
substance
(sinking, hovering,
floating)
Figure 1. Glass of water; polystyrene, plastic, and iron balls
1
iron
7,8 g/cm3
The worksheet (Table 1) contains a table which identifies the
substances and their densities. They are listed with the
reference density of water with which the students initially
compared the density of the balls. By immersing the balls in
water, the students confirm the expected behavior.
2
aluminum
2,7 g/cm3
3
glass
2,5 g/cm3
4
plastic
1,0 g/cm3
5
ice
0,92 g/cm3
Table 1. Worksheet – confirmation experiment
Substance
1
iron
Density of the
substance
7,8 g/cm3
Behavior in
water
sinking
2
plastic
1,0 g/cm3
hovering
3
expanded
polystyrene
0,03 g/cm3
floating
6 dry spruce wood
0,33 g/cm3
7
0,03 g/cm3
expanded
polystyrene
4.1.3 Guided experiments: Here, the teacher is the "guide” of
the inquiry. He/she encourages the students using research
questions and provides the students with guidance about their
investigation plans. The students design procedures to test their
questions and the resulting explanations. The students propose
their own methods and guided experiments to address the
research questions; the teacher cooperates with the students to
4.1.2 Structured experiments: In these experiments, the
teacher has an influence on the procedure and helps students in
177
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
provide them with the research questions and gives advice on
planning and implementing of the research.
Example: Floating and sinking 3.
The teacher only gives students a research question. They do
not have given procedures and experiments. The basic research
question might be: "Find the factors which determine the
behavior of solids in a liquid." Students should seek out their
own experiments and equipment (Figures 3, 4, 5).
Figure 3. Solids only differing in shape
Figure 6. Galileo thermometer
4.1.4 Open experiments: At this level, students should be able
to come up with questions, design and carry out investigations
using experiments, record and analyze data, and draw
conclusions from the evidence they have collected. Because this
requires a high level of scientific reasoning and places a high
cognitive demand on students, it is generally more suitable for
the development of gifted students. Students form their own
research questions, methods, and procedures; they carry out
open experiments on their own.
Figure 4. Solids only differing in volume
Example: Floating and sinking 4.
An inflated rubber balloon is sealed in a plastic bottle closed by
a cap with a valve (Figure 7). The air in the bottle and inside
the balloon is compressed by a bicycle pump. The volume of the
balloon decreases. When the overpressure has been relieved,
the balloon returns to its original dimensions.
Figure 5. Solids only differing in density
Guided experiments are also very effective in the fixation and
application phase of instruction. It is effective here to ask
guiding questions such as: "Can a solid of high density float in
water? Can a solid float in a liquid of lower volume than the
volume of the solid itself? Does the behavior of solids in a
liquid change with its changing temperature? Explain the
function of the Galileo thermometer (see Figure 6)!" Students
themselves generate and verify hypotheses leading to the
solution of the problem identified by the teacher at the
beginning. They perform additional experiments and
measurements. In the end, they synthesize their research and
discover their own way to resolve the problem.
Figure 7. A model of a lung when diving in a hyperbaric
chamber
The experiment simulates the phenomenon that occurs when
diving. The volume of air-filled body cavities (the lungs, the
middle ear) is reduced to half at a depth of 10 meters and to a
178
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
quarter at a depth of 30 meters. The diver’s breathing
apparatus automatically balances these conditions by
increasing the pressure of the breathing gas. Rapid emergence
(faster than 18 meters per minute) may cause barotrauma (lung
rupture, fatal bleeding, and air embolism).
and they adopt connectivistic elements in their behavior. So we
came to the conclusion that it is necessary to introduce
connectivism into teacher training. This is consistent with the
standards and resources within UNESCO’s project “ICT
Competency Standards for Teachers” [16] that provide
guidelines for all teachers, specifically for planning teacher
education programs and training.
4.2 Principles of IBSE experimentation
We discovered the following principles for implementing IBSE
experiments:
the selection of experiments from daily life;
an emphasis on student experiments;
the creation of alternative student experiments;
the functional use of ICT during experimentation.
These principles must be verified and completed.
We decided to educate and train teachers in IBSE
experimentation in a web-based environment and use teacher
collaboration to improve their skills in how to teach effectively
[13]. We verified this training in our international project
PROFILES [7]. Teachers create teams of 4-5 members and
together prepare teaching/learning modules and solve problems
during their implementation. They share ideas, experiences, and
prepared materials together in a web-based environment.
4.3 Teacher training methods for IBSE experimentation
Continuous professional development (CPD) of teachers is very
important because the way is taught depends on the teachers. It
is essential for teachers to acquire the necessary professional
competency to apply IBSE experiments through the acquiring of
a set of specific skills. Teachers need to be able to determine
what level of IBSE can be used, and what knowledge and skills
their students should acquire, at what level and in what order.
5. CONCLUSIONS AND IMPLICATIONS
IBSE is an innovative educational method which supports the
development of critical thinking and promotes positive attitudes
towards science. According to research findings, IBSE
experiments are very important motivational tools for increasing
student interest.
But the implementation of IBSE experiments in instruction
alone does not lead to appropriate and sufficient learning
outcomes and the development of student knowledge and skills.
Teachers have to know how to apply experiments in their
instruction. It is primarily necessary to improve primarily the
implementation methods of IBSE experiments.
Five acquiring stages exist in developing teachers’ skills
applying IBSE experiments:
(a) Motivation Stage: Acquiring professional interest and
attitudes towards IBSE experiments
(b) Orientation Stage: Acquiring the knowledge necessary for
IBSE experimentation
(c) Stabilization Stage: Solving simple applied tasks in applying
IBSE experiments
(d) Completing Stage: Solving complicated applied tasks in
applying IBSE experiments
(e) Integration Stage: Solving teaching situation problems in
school practice (new skills are integrated into the existing skill
structure)
The completing and integration stages are conditioned by
several years of experience on the part of the teacher which is
why the complete acquisition of these skills is not possible by
the end of pre-service teacher training.
A subsequent research problem in IBSE is teacher proficiency
in: combining experiments and problem tasks [3], simple
experimenting [4], project teaching, etc. It is necessary to
implement the principles of using experiments and their IBSE
taxonomy in physics teacher training.
Teachers have to acquire the skills necessary to implement
IBSE experiments into instruction. It is not possible to complete
the development of teacher professional skills in IBSE
experimentation during pre-service science teacher training.
That is why there is a need to educate and train teachers in
understanding and training in the use of IBSE experiments
during their entire CPD. We verified the development of this
professional teacher competence using connectivist educational
and training methods.
In pre-service professional training at university, a teacher
candidate is usually able to handle only the first three stages of
skill development. An appropriate training method is an
introduction to IBSE experimentation where the teacher
candidate plays the role of a student. A video analysis of lessons
has been successful as well. Later the teacher candidate, led by
experienced teachers and university educators, uses IBSE
experiments in their teaching practice at schools. At the end of
the pre-service training the teacher candidate is usually
sufficiently qualified for the first two levels of IBSE:
confirmation and structured. During the in-service phase, a
teacher can reach the other two levels of IBSE. A necessary
condition is sufficient teaching experience.
REFERENCES
[1] H. Banchi, & R. Bell, “The Many Levels of Inquiry”,
Science and Children, Vol. 2, 2008, pp. 26-29.
[2] D.L. Haury, & P. Rillero, Perspectives of Hands-On
Science Teaching, Columbus: ERIC-CSMEE, 1994.
[3] A. Hofstein, O. Navon, M. Kipnis & R. Mamlok-Naaman,
“Developing Students Ability to Ask More and Better
Questions
Resulting
from
Inquiry-Type
Chem.
Laboratories”, Journal of Res. in Sc. Teach., Vol. 42,
2005, pp. 791-806.
[4] P.A. Kirschner, J. Sweller & R.E. Clark, “Why minimal
guidance during instruction does not work: an analysis of
the failure of constructivist, discovery, problem-based,
experiential, and inquiry-based teaching”, Educational
Psychologist, Vol. 41, No. 2, 2006, pp. 75–86.
The discovery that today’s students (the “Net Generation”) have
a different learning styles, preferences, and world views has
lead to the origination of the new pedagogical theory of
connectivism as a "theory of digital age learning” [10].
Connectivism reflects the influence of ICT on education. Young
teachers are already members of the Net Generation, so the
principles of connectivism are natural for them. Older teachers
are influenced by contact with students and young colleagues
179
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[5] W.C. Kyle, “What research says: Science through discovery:
Students love it”, Science and Children, Vol. 2, 1985, pp.
39–41.
[6] R. Narode, Teaching Thinking Skills: Science,
Washington: National Education Association, 1987.
[7] Profiles, PROFILES project, 2013, Retrieved May 20,
2013, from http://www.profiles-project.eu/
[8] S.J. Rakow, Teaching Science as Inquiry, Fastback 246,
Bloomington (USA): Phi Delta Kappa Educ. Found., 1986.
[9] J.M. Royer, Ch.A. Cisero & M. Carlo, “Techniques and
procedures for Assessing Cognitive Skills”, Review of
Educational Research, Vol. 2, 1993, pp. 201-243.
[10] G. Siemens, Connectivism: A Learning Theory for the
Digital Age. Elearnspace. 2005, Retrieved October 20,
2012,
from
http://www.elearnspace.org/Articles/connectivism.htm
[11] L. S. Shulman, “Knowledge and Teaching: Foundations of
the new reform”, Harvard Educational Review, Vol. 57,
1987, pp. 1-22.
[12] J. Trna, „How to motivate science teachers to use science
experiments“, Journal of Systemics, Cybernetics and
Informatics, Vol. 10, No. 5, 2012, pp. 33-35.
[13] J. Trna & E. Trnova, “ICT-based collaborative action
research in science education“. In IMSCI'10. The 4th
International Multi-Conference on Society, Cybernetics
and Informatics. Proceedings. Volume I, Orlando (USA):
International Institute of Informatics and Systematic, 2010,
pp. 68-70.
[14] J. Trna & E. Trnova, “Inquiry-based Science Education
Experiments“, In Inquiry-based Science Education in
Europe: Reflections from the PROFILES Project, C.
Bolte, J. Holbrook, & F. Rauch (Eds.), Berlin: Freie
Universitat Berlin, 2012. pp. 212-215.
[15] E. Trnova & J. Trna, “Hands-on experimental activities in
inquiry-based science education”, In Proceedings book of
the joint international conference MPTL'16 - HSCi
2011, Ljubljana (Slovenia): University of Ljubljana, 2011,
pp. 293-298.
[16] UNESCO, ICT Teacher Competency Standards
Modules, Paris: UNESCO, 2008. Retrieved October 20,
2012,
from
http://cst.unescoci.org/sites/projects/cst/The%20Standards/ICT-CSTCompetency%20Standards%20Modules.pdf
ACKNOWLEDGEMENTS
The study initiated within the project PROFILES: Professional
Reflection-Oriented Focus on Inquiry-based Learning and
Education though Science (FP7-SCIENCE-IN-SOCIETY-20101, 266589).
180
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
DISTANCE EDUCATION IN THE SERVICE OF HEALTH AND
SUSTAINABILITY
Glauco VILLAS-BÔAS
Nucleus of Management Biodiversity and Health- Institute of Drug Technology Farmanguinhos - Oswaldo Cruz Foundation (Fiocruz)
Av. Comandante Guaranys nº 447 - Jacarepaguá, Rio de Janeiro, ZIP/Zone 22775-903, Brazil
Maria da Conceição MONTEIRO
Nucleus of Management Biodiversity and Health- Institute of Drug Technology Farmanguinhos - Oswaldo Cruz Foundation (Fiocruz)
Av. Comandante Guaranys nº 447 - Jacarepaguá, Rio de Janeiro, ZIP/Zone 22775-903, Brazil
Regina Coeli COSTA
Nucleus of Management Biodiversity and Health- Institute of Drug Technology Farmanguinhos - Oswaldo Cruz Foundation (Fiocruz)
Av. Comandante Guaranys nº 447 - Jacarepaguá, Rio de Janeiro, ZIP/Zone 22775-903, Brazil
Sheila Torres NUNES
Distance Education – National School of Public Health (ENSP) - Oswaldo Cruz Foundation
(Fiocruz)
R. Leopoldo Bulhões, 1480 - Manguinhos, Rio de Janeiro - RJ, 21041-210
ABSTRACT
The Management of Biodiversity as an
Innovation in Drug Development is presented
in the form of a professional qualification
course for managers of local groups, using
distance education. The course in the area of
phytomedicine is designed to promote safe
access and rational use of medicinal plants and
herbal drugs, the sustainable use of biodiversity
and the development of the productive chain
for the national drug industry. The article
demonstrates the importance of distance
education in improving public health in Brazil,
considering the size of the country and the
possibility of building knowledge of the use of
medicinal plants in rural communities spread
over a vast territorial area, many of them in
places where medical care and drug distribution
are difficult for the authorities. Informatics
technology and distance education enable
highly qualified managers and researchers in
urban centers to pass on their knowledge and so
qualify professionals to develop the supply
Chains of plants drugs from Brazilian
biodiversity and contribute to the improvement
of health and the reduction of social
inequalities,
always
respecting
local
community knowledge.
Keywords: Distance Education, Public Health,
Phytomedicine, Technology Innovation, Social
Inclusion.
181
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
1. INTRODUCTION
The National Policy on Medicinal Plants and
Herbal Drugs (PNPMF) introduced in Brazil by
Decree. 5813 of June 22nd, 2006, establishes for
the first time the prospect of the sustainable use
of biodiversity for the development of drugs of
plant origin for the public health system and so
meet
the considerable
epidemiological
demands of the country.
Taking into account the territorial dimension of
Brazil and its demographic characteristics the
importance of Distance Education Program in
the implementation of the National Policy on
Medicinal Plants and Herbal becomes apparent.
The method enables the spread of information
and skills from north to south and from east to
west, integrating the national and regional
innovation systems as an interactive process all
the
way
from
basic
research
to
commercialization and diffusion of each drug.
In order to support the Ministry of Health in the
implementation of this Policy, a Center was
established for Biodiversity Management and
Health - NGBS, within the Institute of Drug
Technology - Farmanguinhos a unit of the
Oswaldo Cruz Foundation - FIOCRUZ. The
program has, as its main objective, to ensure
safe access and rational use of medicinal plants
and herbal medicines by the Brazilian
population at the same time promoting the
sustainable use of biodiversity and the
development of the productive chain in
association with national industry.
2. IMPORTANCE OF DISTANCE
EDUCATION IN PROFESSIONAL
QUALIFICATION
Distance education is shown as an important
pedagogical tool for a Drug Innovation from
Biodiversity
Postgraduate
Specialization
(Sensu Lato). The course has as its main
objective the qualification of local managers
who then become able to contribute to
pharmaceutical innovation from the Brazilian
flora, and help create a research, development
and innovation network with a solid database.
The PNPMF foresees the training of human
resources in order to develop the technical
skills necessary to add value and quality
assurance at various stages of the supply chain.
The development of medicinal plants and
herbal medicines can be configured as an
important strategy for coping with regional
inequalities across the country, and can provide
a new socio-economic opportunity for
populations of regions characterized by low
economic dynamism and precarious social
indicators.
The course curriculum places emphasis on
interactivity, incorporating local culture and
global culture, facilitating access to knowledge
building in a significant extension of the
Brazilian territory. Distance education using
digital technologies with the mediation of
teachers (mentors / tutors), using systematically
organized teaching materials provides access to
knowledge and the development of habits,
skills and attitudes for a population previously
excluded.
The expansion of therapeutic options offered to
users of the Brazilian Health System (SUS),
with guaranteed access to medicinal plants,
herbal remedies and herbal medicine services,
with safety, efficacy and quality, is an
important strategy in the improvement of
public health and social inclusion.
The conceptual frameworks used were the
inseparability between theory and practice;
collective construction of knowledge, the
teacher as a facilitator of learning, the
formation of a work-force qualified for the job,
182
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
the students with an active role, a solid and
well defined pedagogical model; learning
materials designed especially for the course,
and communication strategy adapted to the
limitations of the students.
The system of democratic administration of the
FIOCRUZ is an example of a public
management model, effective in terms of
institutional results, effective in finding
efficient solutions to the health demands of the
population and transparent accountability to the
Brazilian society.
3. BACKGROUND
The participants are professionals who have a
college degree and who are interested in
working in the area of medicinal biodiversity.
These professionals will be located in different
regions of the country and, through distance
education, can form the bridge between
traditional
knowledge
of
their
local
communities with scientific knowledge from
academic and specialized centers, without
either losing their essential characteristics.
4. RELEVANCE OF DESIGN
The FIOCRUZ belongs to the Ministry of
Health and is the leading non-university
institution for training and qualification of
human resources for science and technology in
Brazil. It has 18 programs for post-graduate
studies in various areas, a technical school and
many sensu lato programs.
The course was designed by professionals of
the Center for Biodiversity Management and
Health with the help of the Distance Education
staff of the National School of Public HealthENSP, Oswaldo Cruz Foundation. The material
was developed by professionals from
FIOCRUZ, the Fluminense Federal University
-UFF; the Federal Rural University of Rio de
Janeiro - UFRRJ, the Federal University of Rio
de Janeiro - UFRJ ; University Paris 8 /France
and Experice Laboratory – Paris- France.
Farmanguinhos, the largest official drugmaker
attached to the Ministry of Health, is part of the
Oswaldo Cruz Foundation (FIOCRUZ) as one
of its technical and scientific units. It is
responsible for the production of over one
billion units per year of medicines distributed
to the population by the National Health
Service - SUS, as well as meeting emergency
demands in Brazil and abroad for the
production of medicines. Its mission is to
contribute to the promotion of public health
through the production of drugs, technological
development and diffusion of knowledge. It is a
center of research, development and Brazilian
pharmaceutical production. It prioritizes the
Brazilian population's access to government
health programs.
The coordinators of the course are doctors and
masters of ENSP and Farmanguinhos. The
course also includes, among its participants,
tutors and learning mentors with experience in
distance education and in the area of medicinal
biodiversity, accompanying the development of
students during the course.
The relevance of this course is the possibility of
training managers to develop structure and
manage projects that facilitate public access to
herbal drugs and articulate partnerships among
institutions in the productive sector both private
and public - municipal, state, and federal.
Attention is given to social and regional,
inclusion as well as sustainable use of Brazilian
biodiversity, valuation, and the preservation of
traditional knowledge through the effective
participation of indigenous and traditional
communities in Local Productive Units.
Among the units of FIOCRUZ the National
School of Public Health - ENSP and the
Institute of Drug Technology - Farmanguinhos
stand out, whose mission is to produce and
disseminate knowledge and technologies aimed
at the strengthening and consolidation of the
Brazilian Health System (SUS) and contribute
to promoting health and quality of life of the
population. Both have as core values the
reduction of social inequalities, the promotion
of national innovation, and the right to health
and citizenship.
183
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Initially the course was developed in the face to
face model in the city of Rio de Janeiro and
currently is in its fourth class qualification.
With the introduction of information and
communication technologies applicable to open
distance education, it is intended to increase the
scope of knowledge of the use of medicinal
plants and herbal medicines throughout the
country, enabling communities far from major
centers to themselves manufacture and
distribute herbal drugs, particularly in remote
localities where official drug distribution is
difficult.
and standardize of traditional educational
processes.
With the development of audiovisual
communication in real time, videoconference
or internet, one can think of qualification on a
large scale, with teachers-mediators serving a
larger number of students, interacting with
them live and, with the help of assistants,
organizing distance activities,
The methodology adopted is designed to tackle
complex and multidisciplinary issues taking as
reference the historical social construction of
knowledge. The course is multidisciplinary,
involving the collective construction of
knowledge, with researchers, managers and
phytotherapists taking active roles to enhance
and extend their knowledge on Medicinal
Plants and Herbal Drugs.
The course in the distance mode meets a
demand from society to access knowledge of
herbal medicines with quality and safety. At the
same time, it meets the demand of the drug
industry, for skilled labor.
5. METHODOLOGY
Pedagogical planning, monitoring and course
evaluation are developed by a multidisciplinary
team. Planning is positive in nature and flexible
as required for a course that will be offered in
many diverse locations.
Evaluation is made during the course with a
mandatory test at the end when the student, to
receive a final certificate, must submit a final
conclusion paper to be evaluated by a panel of
teachers.
To participate in a virtual environment means
to live in this environment, to express thoughts
and to expound existing knowledge, make
decisions, act, talk, exchange information and
experiences and to produce new knowledge.
6. CURRICULUM
Innovation - 45 hours
Public Policy - 45 hours
Biodiversity - 90 hours
Innovation Management - 150 hours
Science and Methodologies - 30 hours
Total - 360 hours
In this approach to Distance Education,
teaching is to organize learning situations, to
plan and propose activities, identify students
thoughts, act as a mediator and advisor, provide
relevant information, encourage the search for
new sources of information, perform
experiments, stimulate reflection on processes
and products,
provide the student with
something meaningful, encourage learning
interchange and promote the formalization of
concepts.
7. CONTRIBUTIONS OF DISTANCE
EDUCATION TO THE DEMANDS OF
PUBLIC HEALTH
Distance education contributes not only to the
FIOCRUZ Human Resources Policy on
Medicinal Plants and Herbal Medicines, apart
of its wider mission to train professionals in
Health Science and Technology but is also
capable of meeting the needs imposed by the
process
of
decentralization
and
municipalization of health resulting from the
implementation of the National Health System
in Brazil.
Working with educational technologies
transforms teachers into mediators, establishing
a close relationship with the students, sharing
their experiences and knowledge, showing
solidarity and reducing the impact of isolation
184
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
The new challenges faced today by distance
education include social inclusion, appreciation
of identities, the construction of autonomy and
introduction of citizens into scientific culture.
These must be a priority in the construction of
the distance courses, especially in the health
field.
8. CONCLUSION
The local development of innovative herbal
drugs derived from Brazilian biodiversity,
requires the qualification of local managers that
include farmers, researchers, administrators and
professionals. Distance education available
through digital media networks makes possible
the collective construction of knowledge for
those who take active roles in this process.
The use of modern technologies in teaching is
expected to bring the necessary knowledge to
local cultures, using distance education as a
tool to establish a relationship between the
mediator and the physical and social
environment in which he or she operates.
Network communication in the form of
distance education requires new broad concepts
that replace old norms and standards both in
control and planning, and a new concept of
dialogical relations.
The main challenge is not to lead to a foregone
classical conclusion but to a search for a true,
as far as possible perfected, manner to address
the demands of reality.
The course provides a perspective of
sustainable use of Brazilian biodiversity for the
development of drugs of plant origin to be
made available through the health system and
successfully
meet
the
epidemiological
demands.
The qualification of managers at the receiving
end is certain to add value and contribute to
quality assurance at various stages of the
supply chain of herbal drugs ranging from
cultivation and sustainable management of
medicinal plants through to herbal drug
production. The aim is to strengthen the
productive base and, by local innovation,
bringing competitiveness to domestic industry.
Based on the concept "innovation as a social
process," the formation of local production
with the participation of the many actors
involved in the production chain has been taken
into account. The recovery of local knowledge
of medicinal plants from each of the
participants contributes to a model that takes
into account the just distribution of the benefits
generated as well as protection of the
ecosystem.
The development of the medicinal plants and
herbal medicines sectors can be configured as
an important strategy for coping with regional
inequalities that exist in Brazil, and can provide
an important opportunity for socio-economic
betterment
for
populations
in
areas
characterized by a lack of economic initiative
and precarious social indicators.
The establishment of a well-structured network
in research, and development will lead to
pharmaceutical innovation in each biotope.
This same type of network could also be
applied to other biodiversity-based industries
with great potential for development
(insecticides,
repellents,
cosmetics,
nutraceuticals) that use information generated
in the course of research and development, and
thus extend the rational use of biodiversity.
In this way, by creating productive chains
within local communities focused on farming
and trade of medicinal plants and herbal
medicines not only can contribute to the
improvement of health but also to the reduction
of social inequalities.
This new paradigm aims to substitute ingrained
and outdated concepts that in the present global
economy directly affect the formation of
professionals in the health area.
185
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
The course, by the use of communication
technologies, leads to a knowledge-based
management network, which, by an interactive
process, progresses from basic research to
commercialization and diffusion of new herbal
drugs. It fulfils the needs of government
policies relating to Medicinal Plants and Herbal
Drugs and of those institutions that are
responsible for their execution.
[4] MASSETO, M. T. Mediação pedagógica e
o uso da tecnologia. In: MORAN, J. M;
BEHRENS, M. A. Novas tecnologias e
mediação pedagógica. Campinas, SP: Papirus,
2000. (Coleção Papirus Educação)
[5] SILVA , M. T.; NUNES, S. T. Curso saúde
do trabalhador: orientações gerais. Rio de
Janeiro: EAD/Ensp/Fiocruz, 2006.
REFERENCES
[6] VILLAS-BÔAS, G. K. GADELHA &
C.A.G.. Opportunities in the pharmaceutical
industry based on the development of local
biomes: basis for the discussion of a national
policy. Cadernos de Saúde Pública. Rio de
Janeiro, 23 (X):105-114, 2007.
[1] BRAZIL, Ministry of Health 1st National
Conference on Medicinal and Pharmaceutical
Assistance. Preliminary Final Report. 2003.
[2] BRAZIL, Decreto 971 of MS of May 3rd,
2006. Approves the National Policy on
Medicinal Plants and Herbs (PNPMF). Diário
Oficial, Brasilia, June 22nd, 2006.
[3] GADELHA C. A. G. The industrial Health
complex : Challenges for a policy of innovation
and development. Brasilia: Ministry of Health.
186
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
A Framework for Achieving Web Accessibility
for University Web Sites
Qi Zhu
Department of Computer Science
University of Houston -Victoria
Victoria, Texas, USA
zhuq@uhv.edu
ABSTRACT
Web Accessibility Standards
Web accessibility standards are used by the web developers
with information and guidelines about how to create
accessible websites. In the context of U.S. laws, whether a
website is “accessible” is defined as on that follows the U.S.
Section 508 regulations. Section 508 was included in the
1998 amendment to the Rehabilitation Act of 1973. It is
mandated by law and applies to all websites of federal
agency and organizations that receive federal monies [6]. By
extension, this implies that all state governments and their
respective agencies including the Universities, although there
are currently no legal accessibility requirements for
university sites [7]. Section 508 consists of 16 paragraphs
that focus on dissolving barriers that inhibit persons with
disabilities from accessing information technology (IT)
resources.
As the World Wide Web becomes one of the main communication
channels between universities and their community of
stakeholders, the need to provide equal access and equal
opportunity to people with disabilities is no longer just an ethical
issue but a legal obligation. This paper proposes a framework to
achieving web accessibility for university web sites.
Keywords: Accessiblitity, Disability,WCAG,WAI
1. INTRODUCTION
The web is a widespread educational information
infrastructure to delivery academic, administrative, and
student services. It is gradually and continually displacing
traditional forms of media and communication. The web
pages often contain important information about academic
resources, campus events, and administrative policies.
Students could access to university web services such as
distance learning, library, course registration, and activities
or news announcements. A 2002 study found that 48% of
university students are required use of the Internet in courses
[1].
While not backed by law, the international standard Web
Content Accessibility Guidelines (WCAG) is part of the
World Wide Web Consortium’s (W3C) Web Accessibility
Initiative (WAI) in 1999 [8], and it plays a critical role in
establishing website accessibility standards. WCAG provides
a set of checkpoints that web developers may follow to
ensure that their sites are accessible to a wide variety of
users. WCAG defines three levels of web accessibility,
Priority 1 (P1), Priority 2 (P2), and Priority 3 (P3). The
priorities do not cascade, therefore, a site may meet all the
requirements of P3 and still fail to meet the P1 and P2
requirements. Each WCAG priority consists of various
guidelines. Fourteen guidelines make up the WCAG
framework. Each guideline is broken down into individual
checkpoints.
With the growing role of university web sites, it is important
that these sites be designed and accessible to all the users,
including those with disabilities. The Web Accessibility
Initiative (WAI) of the World Wide Web Consortium (W3C)
defines web accessibility as “meaning that people with
disabilities can perceive, understand, navigate, and interact
with the Web, and that they can contribute to the Web. Web
accessibility also benefits others, including older people with
changing abilities due to aging [2].”
The Section 508 and WCAG guidelines share several
common requirements. Thirteen out of sixteen paragraphs of
Section 508 could be found in P1 and P2 guidelines of
WCAG. However, WCAG solidifies the need for web pages
accessibility moves beyond Section 508, and achieve higher
accessibility by implementing P1, and P2.
Several studies found that about one fifth (20%) of the
population has some kind of disability, including visual,
auditory, physical, speech, cognitive, and neurological
disabilities though not all of these people have disabilities
that make it difficult for them to access the internet [3, 4].
Also in [5], it reports that 12% of all internet users have
disabilities. It is essential that the websites are accessible in
order to provide equal access and equal opportunity to
people with disabilities. Furthermore, an accessible website
can also help students with disabilities more actively
participate in learning.
Review of the Literature
Regardless of the existing standards and legislation supports,
a number of studies have found that many university web
pages remain inaccessible to users with disabilities.
Schmetzke had conducted a survey of 56 North American
colleges that offer ALA-accredited programs in library and
187
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
information science and the home pages of 1051 community
colleges [9, 10]. He found that only one web site was free of
accessibility errors and 77 percent of university and
community college web pages contained at least one
accessibility error. Rowland and Smith evaluated a random
sample of 400 U.S. prominent colleges, universities, and
online learning institutions, and found that fewer than 25
percent of university home pages met the minimum
accessibility criteria [11].
implementing, and evaluating. The whole process is
repetitive and it adapts forward incrementally, see Figure 1.
Next we explain each step in details.
Figure 1: The framework for adaptive process
Design
Much of the literature revolves around how to achieve
website accessibility. Sloan, Kelly, Heath, Petrie, Hamilton,
Guidelines
Implementing
and Phipps emphasize that dissemination of accessibility
standards and adoption of accessibility guidelines by web
authoring tools are not enough [12]. They argue that web
Evaluating
pages should be viewed in a much larger social context and
that the role of the web page cannot be separated from itsPublishing
accessibility. Richards and Hanson look at web accessibility
beyond its goal of helping a small population of disabled
Guidelines and Templates
users [13]. Disabled users represent users with attention,
Some general strategies, guidelines, and resources are
cognitive, and motor impairments. They stipulate that web
available to make the web more accessible for people with
accessibility can benefit a much larger group of users, such
disabilities. Usually these guidelines are developed in a
as young children and older adults. Petrie and Kheir studied
forum by international participators including developers,
the link between accessibility and usability [14]. They show
researchers, experts, and end-users, and are widely
that little data is available on the link between websites that
recognized in many parts of the world. We list some wellare accessible and the sites’ usability. When implementing
known guidelines in Table 1.
accessibility, it should not be separated from usability. Vigo,
Kobsa, Arrue, and Abascal also show that accessibility does
WCAG 1.0 was published in the late 1990s by the World
not imply usability. Disabled users of websites that meet
Wide Web Consortium’s (W3C) Web Accessibility Initiative
accessibility guidelines may still experience issues accessing
(WAI) to provide an international guideline identifying Web
web content [15].
accessibility for people with disabilities. There are three
standards: Web Content Accessibility Guidelines describe
From the designer and programmers’ point of view on
how to make accessible Web content and Web sites;
achieving accessibility, Rosmaita offers an “accessibility
Authoring Tool Accessibility Guidelines cover how to use
first” approach to web design [16], which stresses the
web development software, content management systems,
importance of not separating web design from web
and multimedia design tools to create Web accessible; and
accessibility, and that web accessibility should be built into
User Agent Accessibility Guidelines describe how to make
the design of the site. Centeno, Kloos, Gaedke, and
browsers, assistive technologies, and other user tools
Nussbaumer also argue that web accessibility needs to be
accessible.
included in the design process rather than be a post-design
process [17]. They also show that designers cannot rely
Table 1: Well-known guidelines for Web accessibility
solely on authoring and design tools. Web accessibility
Name of Guidelines
Comments
requires human intervention and inspection. Jackson lays a
Web Content Accessibility
The original and best-know
framework for interdisciplinary teams to create accessibility
Guidelines 1.0
guidelines for web content
guidelines [18]. The interdisciplinary team includes
Web Content Accessibility
The current version of WCAG
accessibility and web development members. Lastly, Gibson
Guidelines 2.0
points out that with Web 2.0 becoming more prevalent, users
Authoring Tool Accessibility
Developing accessible development
Guidelines 1.0
tools
with disabilities may be unaware of how to interact with the
User Agent Accessibility
Developing accessible user tools
dynamically created rich user interfaces [19]. This highlights
Guidelines
the need for accessibility to be considered as part of the
Accessible Rich Internet
Developing accessible web
design process.
Applications Suite
applications using technologies
United States Section 508
Guidelines
Research-based Web Design and
Usability Guidelines
IBM Accessibility Center
Guidelines
2.A FRAMEWORK FOR ACHIEVING WEB ACCESSIBILITY
In this paper, a framework for achieving web accessibility is
proposed for people with disabilities - people with auditory,
cognitive, neurological, physical, speech, and visual
impairments. The framework we propose uses the basic idea
of Agile Software Development, encompassing a set of rules
with the context of four parts: guidelines, design,
such as AJAX and Javascript
US regulations
Web design from the research
literature
Accessibility checklists
At that time, the Web consisted mostly of static information
(HTML) and few interactive technologies are supported by
either browsers or assistive technologies. The main purpose
188
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
of WCAG 1.0 was to help users to access the websites via
alternatives such as auditory and visual content or to increase
the likelihood that a person will find what they are looking
for. However, the Web has changed dramatically for the past
decade; it is not only an HTML world, but also CSS, SMIL,
SVG, XML, PDF, Flash, and many more. A working group
was formed by W3C and developed WCAG 2.0 as the
second version in 2000. Like WCAG 1.0, WCAG 2.0
requirements are organized into three levels – A, AA and
AAA, and levels are a sort of implementation order for
authors; Level A is always required to achieve level AA; and
Levels A and AA are both met in order to achieve level
AAA conformance.
TABLE 2: TYPES
ACCESSIBILITY
Design for Inclusion
Even the importance of accessibility among Web developers
and site commissioner is recognized. However, there are
many challenges such as effective Web design techniques,
complexity and cost for the design, and the ambiguous
definition of “accessibility” [22].
Control changes to requirements as they appear
throughout the life cycle in order to satisfy users’
changing needs.
Define the
accessible
system
architecture
OF
Category
Simulation Tools
There are many different approaches of design processes for
accessibility; here we propose one with core principles to
include accessibility from the beginning of the Web design.
We propose some principles for the design process based on
[23]:
Develop the product incrementally and present each
result to users in order to correct possible
misunderstanding and inconsistencies in a timely
and efficient manner.
Constantly evaluate the system through users.
There are a wide range of tools and templates usable with the
organization's authoring software, including content
management systems (CMS), WYSIWYG ("What You See
Is What You Get") tools, save-as-HTML conversion tools
such as word processors, database-generation tools, site
management tools. Some popular ones like Dreamweaver,
NVU, GoLive, and FrontPage. In Table 2, we give some
tools focusing on accessibility, and they are categorized into
simulation tools and content conversion tools.
There is no one set of practical guidelines for universal use,
in addition, guidelines must be constantly kept up-to-date to
new technologies, and finally, the guidelines must be
developed and modified so that they can be easily
understood and effectively implemented in real-world.
Implementing and Related Tools
The implementation encompasses a set of coding and tools
that lead to websites ready for publishing to the customer or
end users. For new or redesigned sites, build accessibility in
starting with the first draft. On the other hand, for existing
sites, implement necessary modifications and revisions. The
most important thing is to verify accessibility using
accessibility checklists at key stages.
Also an existing draft of guidelines for Accessible Rich
Internet Applications (ARIA) is available by WAI for the
accessibility of dynamic Web content for people with
disabilities. It introduces the new technologies such as map
controls, Ajax live regions, and new navigation to treat
common Web structures as menus, primary and secondary
content, banner information and other types of Web
structures.
Make accessibility a priority throughout the
development process.
Define the system structure and behavior with visual
models that can be understood by users.
In design process, content accessibility, navigational
accessibility, and user interface accessibility of Web sites are
considered as three primary goals of Web accessibility. Each
goal can be divided into some sub goals, representing the
requirements that need to be met so the Web component
(content, navigation and UI) are accessible by the users with
disability. It is important for designers to memorize and
commit to accessible design processes and guidelines
throughout the entire cycle of development.
We include United States Section 508 regulations in Table 1
while guidelines from other national governments [20, 21]
were not included since most other governments hold very
closely to WCAG than the US government does. The current
508 revision is based on WCAG 2.0 for the regulations on
web pages.
Content Conversion Tools
AUTHORING TOOLS
FOR
WEB
Tools
Accessibility Designer
Macromedia
Usablenet
Microsoft and Adobe
Adobe PDF conversion Tool
Daltonize
The Accessibility Designer is a visualization tool allowing
designers to grasp the weak points in their pages, and to
recognize how accessible or inaccessible their pages are at a
glance [24]. The Accessibility Designer will mark a page’s
different areas by using colors and gradations to illustrate the
accessibility, and the text information can be read to a user
through a screen reader. Macromedia improves Web
accessibility in the recent version of their vector-based
animation tool “Flash MX” by including an enhanced user
interface, supporting the rich-media, and having a new pixellevel snapping tool. Web developers also have the ability to
add text descriptions to graphic elements and animated
presentation.
UsableNet
extends
Macromedia
Dreamweaver’s functionality to allow the auto-checking of
the web pages’ accessibility against 508 Accessibility Suite.
considering
189
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
functionality of each step is briefly introduced and discussed.
More research needs to be done in regarding to the details of
each step such as guidelines, principles, challenges, and
interrelated connection with others. Additionally, the
implementation on some real websites could be studies.
UsableNet also offers LIFT and LIFTPro to allow the
developer to select the accessibility set, then exam the
reports item-by-item to find the accessibility problem.
Microsoft FrontPage 2003 and Adobe InSight also have
more accessibility features built into the software.
Another type of the tools is content conversion. Adobe
InDesign CS5.5 software allows you to PDF files and Adobe
Dreamweaver files into HTML, XML, or XHTML formats.
In addition, tags and alternative text attributes can be added
to InDesign documents to support. Because PDF and similar
document formats can often present accessibility problems
when created incorrectly, Adobe InDesign CS5.5 is very
useful to create universally accessible alternatives to often
inaccessible file content. Daltonize is a tool to correct the
inaccessible problem with images by image processing
algorithm for color-blind users [25]. The algorithm shifts
red/green color dimensions to light/dark and blue/yellow
coloration to be more distinguishable for the color blind
users.
4.
[1]
[2]
[3]
[4]
Evaluating Methodologies
Evaluation tools can be employed to determine the
conformance of web sites to accessibility checks
automatically. The best known is Bobby, developed by the
Center for Applied Special Technology and now owned by
Watchfire. Bobby automatically evaluates the accessibility of
web pages on a number of objective measures [10, 11].
Some more automated evaluation tools such as Cynthia Says,
utilize WCAG and Section 508 accessibility guidelines [26].
Functional Accessibility Evaluator (FAE) evaluates web
sites and provides authors with directed feedback about
accessibility in several categories [27] and WebInSight that
detects what impedes access to the web and offers
suggestions to improve access [28].
[5]
[6]
[7]
However, automated evaluations for accessibility have many
issues. As the World Wide Web Consortium (W3C) points
out, “Some of the web-content accessibility checkpoints
cannot be checked successfully by software algorithms
alone. There will still be a dependence on the user's ability to
exercise human judgment to determine conformance to the
guidelines”. According to the research literature, human
processes in evaluating are more effective than automated
evaluations [29]. In particular, the best way for accessibility
evaluation is to have experts (with vision) use a screen reader
to evaluate a website [30].
[8]
[9]
[10]
3. CONCLUSION
As websites become the defacto form of communication
between universities and their community of stakeholders, it
is increasingly more important to provide equal access to
online resources. The growing awareness of web
accessibility should be introduced to all educators, web
developers, and website designers.
[11]
In this paper, a framework for achieving web accessibility is
proposed for people with disabilities. The framework uses
the basic idea of Agile Software Development to have four
steps: guidelines, design, implementing, and evaluating. The
[13]
[12]
190
REFERENCES
Jones, S., and Madden, M. 2002. The internet goes to college:
How students are living in the future with today’s technology.
Pew
Internet
and
American
Life
Project.
http://www.pewinternet.org/~/media/Files/Reports/2002/PIP_
College_Report.pdf.pdf .
Web Accessiblity Initiative (WAI) Home. 2011. Introduction
to Web Accessibility. Retrieved Dec 22, 2011,
http://www.w3.org/WAI/intro/accessibility.php.
U.S. Department of Commerce, 1997. Bureau of the Census,
Disabilities Affect One-fifth of All Americans.
Washington, D. C. Retrieved Dec 22, 2011, from
http://www.census.gov/prod/3/97pubs/cenbr975.pdf.
Kraus, L., Stoddard, S., & Gilmartin, D., 1996. Chartbook
on Disability in the United States, 1996. An InfoUse Report.
Washington, DC: U.S. National Institute on Disability and
Rehabilitation Research.
Lenhart, A., 2002. Barriers to internet access: From the nonuser and new user perspective. Proceeding of
Telecommunications Policy Research Conference.
Retrieved
Dec
22,
2011,
from
http://intel.si.umich.edu/tprc/papers/2002/44/Lenhart_Barriers
_TPRC.pdf
Salamone, 2002. Opening web access to the disabled.
Network World, 43.
Johnson, K., Brown, S., Amtmann, D., and Thompson, T.
2003. Web accessibility in post-secondary education: legal
and policy considerations. Information Technology and
Disabilities, 9, 2.
Chisholm, W., Vanderheiden, G., and Jacobs, I., 2001. Web
Content accessibility guidelines 1.0, interactions, 8(4),
pp.35-54.
Schmetzke, A. 2001. Accessibility of the homepages of the
nation’s community colleges. Retrieved Dec 27, 2011 from
http://library.uwsp.edu/aschmetz/Accessible/nationwide/CC_
Survey2001/summary_CCC.htm
Schmetzke, A., 2002. Web site accessibility at 56 North
American universities: 2002 survey data on libraries and
library schools. Retrieved Dec 27, 2011, from
http://library.uwsp.edu/aschmetz/Accessible/nationwide/Surv
ey2002/contents2002.htm.
Rowland, C., & Smith, T. (1999). Web site accessibility. The
Power of Independence (Summer Edition), 1-2. Logan, UT:
Outreach Division, Center for Persons with Disabilities, Utah
State University.
Sloan, D., Kelly, B., Heath, A., Petrie, H., Hamilton, F., &
Phipps, L. 2006. Contextual web accessibility - maximizing
the benefit of accessibility guidelines. W4A (pp. 121-131).
Edinburgh: ACM.
Richards, J., & Hanson, V. 2004. Web accessibility: A
broader view. WWW 2004 (pp. 72-79). New York: ACM.
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[14] Petrie, H., & Kheir, O. 2007. The relationship between
[24] Takagi, H, et. al., 2004. Accessibility designer: Visualizing
accessibility and usability of websites. CHI (pp. 397-406).
San Jose: ACM.
Vigo, M., Kobsa, A., Arrue, M., & Abascal, J. (2007). Usertailored web accessibility evaluations. HT (pp. 95-104).
Manchester: ACM.
Rosmaita, B. 2006. Accessibility first! A new approach to
web design. SIGCSE (pp. 270-274). Houston: ACM.
Centeno, V. L., Kloos, C. D., Gaedke, M., & Nussbaumer, M.
2005. Web composition with wcag in ming. W4A (pp. 3845). Chiba: ACM.
Jackson, S. 2003. How interdisciplinary teams created
company-wide section 508 accessibility guidelines for
writers. SIGDOC (pp. 140-142). San Francisco: ACM.
Gibson, B. 2007. Enabling an accessible web 2.0. W4A (pp.
1-6). Banff: ACM.
Gulliksen, J., Axelson, H., Persson, H., & Goransson, B.
2010. Accessibility and public policy in Sweden.
Interactions, 17(3), 26-29.
UK Cabinet Office, 2005, eAccessibility of public sector
services in the European Union. Retrieved Dec, 27, 2011 from
http://www.dgaep.gov.pt/media/0601010000/uk/eAccessibilit
y.pdf
Lazar J., Dudley-Sponaugle A., and GreenidgeK. 2004.
Improving Web Accessibility: A study of Webmaster
perceptions. Computers and Human Behavior, 20(2), 269288.
Sousa, K., Furtado, E. 2005. From usability tasks to usable
use inerfaces. Proceeding of 4th ACM international
workshop on task models and diagrams. Gdansk, Poland.
usability for the blind,” Proceeding of the 6th international
ACM SIGACCESS conference on Computers and
Accessibility, Atlanta, USA.
Dougherty, B. & Wade, A, 2009a. Daltonize, (accessed
12/27/2011)
http://www.vischeck.com/daltonize/runDaltonize.php.
Kane, S., Shulman, J., Shockley, T., & Ladner, R. 2007. A
web accessibility report card for the top international
university web sites. ACM Communications, pp. 148-156.
Gunderson, J., Rangin, H.B., and Hoyt, N. 2006 Functional
web accessibility techniques and tools from the university of
Illinois. In Proc. Of the 8th international ACM
SIGACCESS Conference on Computers and Accessibility,
pp. 269-270, Portland, USA.
Bigham, J.P., Kaminsky, R.S., Ladner, R.E., Danielsson,
O.M., Hempton, G.L. 2006. WebInSight: Making Web
Images Accessible, In Proc. Of the 8th international ACM
SIGACCESS Conference on Computers and Accessibility,
pp. 181-188, Portland, USA.
Jaeger, P. 2006. Assessing Section 508 compliance on
federal-eGovernment websites: A multi-method, usercentered evaluation of accessibility for persons with
disabilities. Government Information Quarterly, 23(2),
169-190.
Mankoff, J., Fait, H., & Tran, T. 2005. Is your web page
accessible? A comparative study of methods for assessing
web page accessibility for the blind. Proceedings of the
ACM Conference on Human Factors in Computing
Systems, pp. 41-50.
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[25]
[26]
[27]
[28]
[29]
[30]
191
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
CreativEngineering for 2020
Mark M. Budnik
Electrical and Computer Engineering, Valparaiso University
Valparaiso, IN 46383, USA
1.
TABLE 1: Objectives for the CreativEngineering Class
1. Students will be able to give examples of creativity in
engineering
2. Students will be able to use tools and processes that
help them to be more creative.
3. Students will be able to explain how individuals can be
more creative.
4. Students will be able to explore the role of a leader in
the creative process.
INTRODUCTION
The United States National Academy of Engineering's
seminal work, The Engineer of 2020 – Visions of
Engineering in the New Century was written to prepare
industrial, governmental, and academic institutions for
the future of engineering. The authors of the report state,
“Emphasis on the creative process will allow more
effective leadership in the development and application
of next-generation technologies to problems of the
future.” In 2011 and 2012, engineering undergraduates
from the Valparaiso University College of Engineering
participated in three-day off-site course focused on
creativity, innovation, and leadership in the creative
process. The course was taught by a member of the
engineering faculty and included session and on-location
tours (near Orlando, Florida) that were led by instructors
from an external training organization. Pre- and postcourse surveys identify a significant improvement in the
students' understanding of the roles of creativity,
innovation, and leadership in the creative process. The
2012 class represented an approximately 25% reduction
in the student cost of the trip while still significantly
improving the students' creativity.
Valparaiso University's College of Engineering partnered
with an external training organization to develop the
CreativEngineering class. This reduced the faculty load
for the course. In addition, by working with a corporation
known world-wide as a leader in creativity and
innovation, publicity for the course was easier. The
course was primarily taught by a faculty member while
specific on-location tours (near Orlando, Florida) and
sessions were led by instructors from the external training
organization. Additionally, the faculty member served as
class administrator for all the logistics related to traveling
to and from the external training organization's location.
The cost of the trip for students was $1,025. Twenty-two
students enrolled in the course. Partial scholarships were
available for needful students donated by an alumnus.
The cost of the course (including travel and hotels) was
$37,100. The cost difference was covered through the
Dean's Annual Giving Fund. The cost breakdown of the
trip is summarized in Table 2.
2. BACKGROUND
The intent behind The Engineer of 2020 – Visions of
Engineering in the New Century was two-fold. First, it
provided guidelines for the future of undergraduate
engineering education in the United States. Second, it
presented the attributes required for engineering
undergraduates in 2020. Strong analytical skills and the
ability to work under increasing constraints were
considered mandatory. In addition, The Engineer of 2020
identified a number of skills typically absent in most
engineering undergraduate curricula: practical ingenuity,
creativity, communication, business management, and
leadership.
TABLE 2: Cost of the CreativEngineering Class
Airplane tickets
Hotel rooms
On-site tours of external training organization
Venue and food/beverage minimum
External training organization led session
Theme park tickets for class activities
Textbooks
College of Engineering shirts
Supplies
Snacks
Total
To address these needs, the Valparaiso University
College of Engineering is developing a series of courses
on the creative process dedicated to enhancing the
undergraduate students' knowledge and capacity for
creativity, innovation, entrepreneurship, and leadership.
$7,100
$5,400
$4,900
$2,000
$12,900
$3,200
$300
$800
$300
$200
$37,100
An outline of the course is shown in Table 3. The course
was held over a four-day fall break and began with
students' transporting themselves from Valparaiso
University's campus to the airport in Chicago
(approximately 100km). An early evening flight was
selected to avoid students having to miss any other
classes. At the airport, students received the course
textbook [4], a reading assignment for the flight,
3. 2011 CLASS OFFERING
In 2011, CreativEngineering was offered for the first
time. The objectives for the class are shown in Table 1.
192
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
additional details about the course's activities, and a pretrip survey. The survey questions asked them how
creative they believed themselves to be and how they
would self-assess their ability to meet the four course
objectives shown in Table 1. The students answered all
questions on a Likert scale (1 being Not At All and 5
being Yes, Definitely).
On Sunday morning, the class met briefly at the hotel for
breakfast and a short review. The students and faculty
member then returned to the Orlando airport to begin
their trip home.
At the end of the semester (approximately seven weeks
after the trip), students were given the same survey. In
addition, a control group of undergraduate engineering
students that did not participate in the CreativEngineering
class completed the survey. The results for the class and
the control group are shown in Figure 1. After the class,
the students showed a significant improvement in their
responses to all five questions. Of special note, the
averages for questions two through five (students'
assessment of their ability to meet the course objectives)
demonstrated a 0.9, 1.7, 1.8, and 1.6 point improvement,
respectively.
TABLE 3: Agenda for the CreativEngineering Course
Wednesday Fly to Orlando and hotel check-in
Course orientation
Thursday
Seven hour on-site tour led by external
training organization
Informal social event
Review of tour and brainstorming session
Friday
Four hour Inspiring Creativity lecture
session
Engineering scavenger hunt in theme park
Saturday
Review of Friday's session
Engineering scavenger hunt in theme park
Review of scavenger hunt results
Sunday
Course wrap-up
Fly back to Chicago and return to campus
2011 Control Group
2011 Pre-class Survey
2011 Post-class Survey
Are you creative?
On Thursday, the external training organization led the
class on a seven hour behind-the-scenes tour of their
facilities. Details were provided on both the creative
aspirations and technical operation of several of their
most popular attractions. The day ended with a ninety
minute review session led by the faculty member. After
first discussing the tour, an open-ended question was
given to the students. With all of the success of the
external training organization, what was still to be done?
How could the attractions, facilities, and resort continue
to grow and evolve over time?
Can you give examples of
creativity in engineering?
Can you use tools to be more
creative?
Can you explain how to be more
creative?
Can you explain the role of a
leader in the creativity process?
1
2
3
4
5
FIGURE 1: Averages of student self-assessments performed
before and after the 2011 CreativEngineering class. Data is also
provided for a control group of students that did not participate
in the class.
On Friday, the class received a four hour lecture session
on inspiring creativity from the external training
organization. Lessons included rules for brainstorming
and various brainstorming techniques. Additional topics
included the role of leadership during the creative process
and how to keep the creative process moving forward.
Afterwards, the students self-selected into smaller teams
and participated in an engineering scavenger hunt at one
of the external training organization's theme parks. As
directed by the scavenger hunt, students looked at the
attractions and observed their engineering challenges.
4. 2012 CLASS OFFERING
From the 2011 assessment data, it was apparent the
CreativEngineering class resulted in a significant
improvement in the students' perceptions of their
creativity and their ability to use and lead creative a
process. While this improvement in the students'
perception was real, it did not necessarily result in a
sustained, quantifiable improvement in their creative
process work. Therefore, in addition to adding lessons
on creativity throughout their classes, it was also decided
to make the CreativEngineering course an ongoing
experience that students could take during each of their
four years of undergraduate study.
Saturday started with a review of Friday's lessons and
activities. The class then traveled to another external
training organization theme park to partake in a second
engineering scavenger hunt. After five hours, the
students and faculty member met for a review session.
The faculty member acted now as a facilitator, allowing
the students to lead the discussion and ask and answer
each other's questions. After ninety minutes, the students
were dismissed to spend the remainder of the day on their
own in the theme park.
For the 2012 iteration of the class, the decision was made
to reduce the student cost ($1,025 in 2011) and the
Dean's Annual Fund contribution ($15,200 in 2011).
193
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
This necessitated the development of an entirely new
curriculum with our external training partner. The seven
hour tour (which visited four different theme parks) was
replaced with a five hour tour (which stayed at one theme
park). The four hour lecture session on inspiring
creativity was replaced with two different three hour
"laboratory" sessions (Teamwork in the Creative Process
and Leading the Creative Process. Finally, a third
scavenger hunt was added to the trip. Student costs were
reduced to approximately $775 (approximately 25%
reduction) and the Dean's Annual Fund contribution was
reduced to $3,750 (approximately 75% reduction).
answered these additional questions (see Figure 3). The
average student ratings for the Overall Trip and the
Scavenger Hunt Experiences were 4.89/5.00 (almost
unanimously Excellent). Likewise, the students rated the
behind-the-scenes facility tour very highly (4.72/5.00).
The two "laboratory" sessions (Teamwork in the Creative
Process and Leading in the Creative Process) were not
rated as highly with average scores of 4.44/5.00 and
3.50/5.00, respectively.
Excellent
Figure 2 shows how the 2012 CreativEngineering class's
pre- and post-trip survey results compared to the 2011
class and control group. In each case, the 2012 margin of
student improvement in the five questions decreased
from the 2011 offering of the class. This was understood
as a possibility with the cost reduction changes made in
the 2012 trip. However, the improvements in the
students' assessment of their ability to meet the course
objectives (questions two through five) still saw a 0.9,
1.2, 1.1, and 1.5 point improvement, respectively.
2011 Control Group
2011 Pre-class Survey
2011 Post-class Survey
Good
Average
Trip Overall (4.89)
16
2
0
0
0
8
Teamwork in the Creative
Process Session (4.44)
0
0
0
2012 Pre-class Survey
2012 Post-class Survey
4
Leading the Creative
Process Session (3.50)
1
Are you creative?
1
Facilities Tour Tour (4.72)
0
0
Can you give examples of
creativity in engineering?
0
Can you use tools to be more
creative?
2
Poor
16
2
0
0
0
Scavenger Hunts and
Experience (4.89)
Below Average
5
10
6
15
2
4
8
12
16
Number of Students
20
FIGURE 3: Histogram of student ratings of individual
components of the 2012 CreativEngineering class from
Excellent (5) to Poor (1).
Can you explain how to be more
creative?
It is the belief of the authors that replacing the 2011
lecture session on inspiring creativity with the laboratory
sessions in 2012 is the predominant reason for the
reduced improvements in the self-assessments shown in
Figure 2. However, this substitution was the largest
factor in reducing the overall costs of the 2012 course.
Can you explain the role of a
leader in the creativity process?
1
2
3
4
5
5. FUTURE IMPROVEMENTS
FIGURE 2: Averages of student self-assessments performed
before and after the 2011 and 2012 CreativEngineering class.
Data is also provided for a control group of students that did not
participate in the class.
In the EISTA 2013 presentation, additional details will be
provided on the two trips, and cost reductions taken for
2012. Information will be provided on the behind the
scenes facility tours and creativity/leadership sessions.
Finally, the four year curriculum will be presented as
Valparaiso University's College of Engineering rolls out
its plan to facilitate instruction in the creative process for
students during each of their four years of undergraduate
study.
For 2012, additional questions were asked in the post-trip
survey. Students were asked to rate each part of the
course as either Excellent (5 points), Good (4 points),
Average (3 points), Below Average (2 points), or Poor (1
point). 70% of the students participating in the 2012 trip
194
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Digital music math: technology as a STEM teaching tool
for Aboriginal students
Joyce VAN DE VEGTE
Electronics & Computer Engineering Technology
Camosun College
Victoria, BC, Canada
vandevegte@camosun.ca
24 and 32% aged 25 to 44 lack high school certification,
while only 10% of non-Aboriginals aged 20 to 44 do [3].
ABSTRACT
A series of learning units was developed as a high-interest
STEM teaching tool for a group of Aboriginal high school
students. The units integrated e-learning, classroom
learning and technology in a way designed to spark
interest in subject matter, and to help students see links
between mathematics and engineering and the real world.
The series, entitled “Digital Music Math,” culminated in a
field trip to the local college to construct an electronic
game, and each learning unit was connected in a material
way to this final project.
The federal government is beginning to recognize the
importance of the science, technology, engineering and
mathematics (STEM) dimensions of this issue in
particular. In December 2012, new funding was
announced for the Indigenous Education Coalition (IEC),
through the Federal Economic Development Agency for
Southern Ontario, specifically for the purpose of
providing innovative STEM training to First Nations and
other Aboriginal students [4].
As Nicol et al have observed, “school mathematics has
often functioned to exclude Aboriginal students and
others from advanced studies of mathematics” [5]. The
work described in this paper began as a challenge to
engage and motivate Grade 7 to 11 students at the
LÁU,WELNEW Tribal School in Brentwood Bay, BC, in
their mathematics and technology studies. Ten male and
five female students participated in the pilot project.
Keywords: e-learning, STEM, digital music, math,
Aboriginal, First Nations
1. INTRODUCTION
Teachers often lament how difficult it is to convince
students that math is useful. Many students cannot see
past rows of times tables and right-angled triangles to
anything that pertains to their own lives. In this regard,
Aboriginal students are no different from non-Aboriginal
students. Where Aboriginal students do differ from their
non-Aboriginal peers is in their numeracy, reading and
writing scores, and their high school graduation rates. The
Fraser Institute’s 2011 Report Card on Aboriginal
Education in British Columbia, for example, reports that
Aboriginal students score 15% to 20% lower than average
on standardized tests, and experience delays in
advancement on average twice as often [1]. These
statistics are of course not an indictment of student
performance but rather an indication of how poorly the
education system serves Aboriginal students.
2. PLANNING PARTNERS
Cora Oliver, a Grade 10 teacher at the LÁU,WELNEW
Tribal School, was able to provide essential information
about her students’ backgrounds and abilities. She
arranged for both classroom and laboratory space to be
available at the Tribal School for all meetings, and
reviewed proposed teaching materials to assess their
suitability. Cora was also a teaching partner in all
activities.
A local employer and strong community supporter,
Schneider Electric, agreed to provide printed circuit
boards and electronic components for the project.
In Canada, high school dropouts are more likely to live in
poverty, are 2.5 times more likely to be unemployed,
receive 85% of government welfare spending, and form
80% of the population of federal jails [2]. The urgent need
to find better ways to connect with Aboriginal high school
students is manifest when this information is paired with a
few additional statistics: 40% of Aboriginals aged 20 to
3. LEARNING STRUCTURE AND TOOLS
Learning units were designed around a final project, an
electronic musical memory game, to be constructed
195
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
during a field trip visit to Camosun College. The hope
was that the promise of a field trip and the idea of
soldering and programming an electronic device would be
motivating and would help to maintain student interest in
the subject matter. To this end, each two-hour lesson was
linked in some way to the electronic game the students
would build. An outline of the lessons is provided in
Table 1.
The musical memory game requires the soldering of
electronic components onto a printed circuit board, as
well as the programming of the PIC microcontroller that
controls the game’s operation.
Digital audio software
The digital audio editor Audacity [6] was used to support
the lessons. With a bit of guidance, the interface was
fairly straightforward for the students to operate. Within
the Audacity environment, students were able to record
sounds from tuning forks and also their own voices, and
then study the shapes of both the signals and their spectra.
Audacity could also generate signals such as chirps, noise
and tones, and cursors allowed users to make
measurements.
Electronic musical memory game
The game circuit is depicted in Figure 1. The game is
driven by a PIC microcontroller. A short musical
introduction is played with a speaker, after which a single
LED lights, accompanied by a tone. If the player presses
the correct button, the microcontroller proceeds with a
sequence of two LEDs and tones. As the player faithfully
reproduces the required patterns, the sequences lengthen.
A high score produces a short happy tune; a mistake
produces a short sad tune.
Lesson Title
Location
Lesson Activities
Lesson 1
Sound
Lab
discuss the concepts of sound, frequency and spectrum
calculate the frequency of a repeating wave
use digital audio software to examine the signals and spectra for
tuning fork and voice sounds
Lesson 2
Sine waves
Classroom
discuss the concepts of amplitude and period
relate period and frequency
Lesson 3
Music notes
Lab
relate piano notes and frequency using an online piano
use digital audio software to examine piano note signals and spectra
identify harmonics
compare frequencies of piano notes
Lesson 4
MP3 and
compression
Classroom
discuss digital images, pixels and the concept of compression
calculate compression ratio
listen for differences between CDA/MP3 versions of the same song
calculate how many songs can be stored in an iPod Touch in CDA or
MP3 format
Lesson 5
Programming
concepts
Lab
the concept of a computer program and a programming language
view the C program for the musical memory game
identify the parts of the program that determine the songs and notes
played
use an online piano to connect notes in the computer program to
sounds
Lesson 6
Your own song
Classroom/Lab
Lesson 7
Lesson 8
Lesson 9
LEDs, resistors, and
other electronic
parts
Lab
Building an LED
circuit
Lab
Field trip
(6 hours)
College Lab
write a sequence of notes in the format required by the computer
program to play a song selected or composed by the student
introduce musical notation and link to computer program notation
introduce the electronic circuit components needed for the musical
memory game
use metric prefixes
interpret resistor colour codes
measure resistance using a multimeter
introduce the breadboard for circuit construction
determine the correct resistor to pair with an LED of a particular
colour
build an LED and resistor circuit on a breadboard
measure voltage using a multimeter
select electronic parts
solder parts to a printed circuit board
personalize the songs in a computer program
program a microcontroller
test the electronic musical memory game
Table 1. The lessons.
196
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Figure 3. Audacity spectrum for “ooo” sound
Figure 1. Electronic musical memory game.
Online piano
Figure 4 shows a screenshot of the online piano used in
the lessons, another free resource [7]. Very few of the
students had experience playing the piano, so the online
instrument was a favoured element. With both Audacity
and the online piano running, students were able to record
piano notes and study the signals and spectra in real time.
Figure 2 shows what the Audacity screen looks like and
Figure 3 gives an example of a spectrum for a spoken
“ooo” sound. Real-time interaction with signals is a great
strength of Audacity as a tool for learning. Once they
have mastered the simple record procedure, students can
quickly and easily experiment with all manner of sounds,
even goofy ones. Moreover, none of the students had
previously conceived of the idea that his or her own voice
was linked to the time-varying waveform observed on the
screen.
The digital music math lessons exploited only a small
fraction of the capabilities of the software and, because it
was freely available, students could continue to use it
beyond the end of the project, at school or at home, to
experiment with other features.
Figure 4. Online piano.
Later in the lesson series, students used the online piano
to invent a song. The labelling of the keys according to
note and octave allowed a relatively simple translation
between the song being played and the computer program
code that would enable the same song to be played in the
electronic musical memory game.
Integrating related ideas about music notes from several
sources permitted students to gain confidence with the
technology. They could play and hear a note, see what the
signal looked like in Audacity, view where the note’s
code (e.g. C3) appeared in the computer program, and
link the note they were hearing to its representation in
formal musical notation.
Digital music and MP3 compression
Music is intensely interesting to most high school
students. Many of them carry digital music players. Very
few have ever considered how the songs they listen to are
stored. The basic ideas behind MP3 compression are
appealing and easy for students to grasp because of the
strong links to human perceptual abilities. A classroom
demonstration of a loud sound concealing subsequent
quieter sounds is useful.
Figure 2. Sample Audacity screen for “ooo” sound
197
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Electronic hardware and software
The final project, the construction and programming of
the musical memory game, gave students a great deal of
personal satisfaction. They began the day with an
unpopulated printed circuit board, a handful of
components and a lesson on soldering, and at the end of
the day they took home a working electronic game to
show off to friends and family.
Beyond the project alone, students had a glimpse of the
hardware and software that are “inside the box” for so
many items they use every day.
Student workbook and teacher solution guide
A workbook was designed to help guide and focus student
activity. The workbook contained the instructions to
follow, worked examples, and spaces for student
calculations and entries. Workbook excerpts from two
lessons are provided in Figures 5 and 6.
Figure 6. Excerpt from Lesson 3.
The technological tools allowed many STEM themes to
be explored – math (scientific notation, ratios), pure
science (tuning forks, sound), technology and engineering
(spectrum, MP3 compression, programming, electronic
circuits) – at a level suitable to Grade 9 and 10 high
school students. Many of these themes are traditionally
considered to be specialized and advanced, but immediate
feedback through the use of technology made the
concepts quite accessible, even to junior high school
students with lower than average math facility.
The Digital Music Math workbook is available upon
request, as is the accompanying fully-annotated teacher’s
guide, including solutions for all exercises.
4. REFLECTIONS
The alternation between laboratory and classroom
activities added variety that helped to maintain student
attention. In addition, lessons were designed for high
interest. Many lessons involved hands-on elements, such
as tuning forks, electronic components, breadboards and
multimeters. And, even though computers are really no
more “hands on” than pencils, the e-learning activities
based on the online piano and digital audio software
created similar high attention levels among the students as
did the manipulations of more concrete objects. Another,
lesser, motivator was the completion of the workbook
pages for each lesson.
Access to concepts was further facilitated because
numerical grading was not applied for this lesson series.
Neither students nor teachers had to be concerned about
whether everyone was learning at the same rate.
Observation suggests that freeing students to explore and
enjoy activities produced useful learning that was
permitted to vary by student.
The choice of music as a core theme was a good one for
an Aboriginal classroom: The Canadian Council on
Learning [8] reports that Aboriginal youth (37%) are
more likely than all Canadian youth (27%) of a similar
age to participate in art or music, with more Aboriginal
girls than boys participating.
One of the goals of the day-long field trip visit to
Camosun College was to encourage students to visualize
themselves as future college students. Their teacher
confirmed that her students “got a glimmer that this was
something they could do.”
5. STUDENT AND TEACHER FEEDBACK
The students loved the Digital Music Math lesson series,
especially the field trip to Camosun College and the
building of the electronic game. Students said: “I really
Figure 5. Excerpt from Lesson 1.
198
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
had a lot fun,” “My favourite part was recording my voice
on the computer,” “I liked learning how to solder,” “I’d
do it again in a nanosecond!”
7. FUTURE WORK
In future iterations of the Digital Music Math project,
greater attention can be given to cross-cultural issues. As
Aikenhead points out, many students experience school
science learning as “assimilation into a foreign culture,”
and “the problem of alienation is more acute for
Aboriginal students whose worldviews, identities, and
mother tongues create an even wider cultural gap” [12,
pp. 2-3].
Cora Oliver, the teacher, felt the students got a lot out of
the lessons. She observed that students did well when they
could see connections, and that interesting tidbits hooked
student interest. In her own teaching, she strives to make
math a hands-on activity because so many of her students
are kinesthetic learners. Cora notes that her Grade 7
students exhibit on average a Grade 3 math level and if
she were to use the lesson series again, she would be
inclined to do so with higher level students and to extend
the series to allow more time for repetition and review.
To this end, a number of directions may be explored with
the help of Aboriginal educators to attempt to align the
Digital Music Math lessons more intelligently with
research findings:
6. CONNECTIONS WITH RESEARCH
•
The 2010 “Handbook for Educators of Aboriginal
Students” [9] encourages: frequent interaction between
students and faculty, cooperative, collaborative and social
learning, active learning techniques, prompt and
constructive feedback, learning tasks that respect cultural
differences, high expectations, and diverse learning
experiences. It also recommends a “focus on experiential
learning rather than exclusive reliance on teacher-led
discussions focusing on texts” [9, p. 20]. The Digital
Music Math lessons align with many of these principles.
•
•
Perso uses the phrase “inclusive pedagogy” when she
recommends that “teachers and students should interact
and negotiate meaning as equals, since this will result in
students empowering themselves to succeed rather than
waiting for and expecting teachers to ‘drip-feed’
knowledge in an effort to maintain control and authority”
[10, p. 45]. Freedom to explore unique uses of the
technological tools within the lessons promoted this kind
of equality and helped to narrow the “power distance”
between teacher and student in a culturally-responsive
way.
Aikenhead [12] describes the concept of “coming to
knowing” in participatory learning and its
implications for power sharing in the classroom.
Perso’s “integration of culture” [10, p. 41] inspires
the possibility of integrating lesson elements that are
culturally stronger, e.g. students might elect to
program a drum sequence instead of song.
Cajete advocates that teachers involved in
Indigenous
education
“practice
contexting
information in culturally sensitive and holistic ways”
[13, p.139], and proposes that storytelling practices
will connect strongly with Aboriginal oral culture.
8. ACKNOWLEDGEMENTS
The author wishes to thank Cora Oliver, the
LÁU,WELNEW Tribal School, Schneider Electric,
Dianne Biin, Marla Weston, Ian Browning, and Camosun
College for their support of this project, and to
acknowledge the welcome she received in the traditional
territories of the Tsartlip, Pauquachin, Tseycum and
Tsawout peoples.
9. REFERENCES AND BIBLIOGRAPHY
Perso points also to the importance of shared experiences
of teachers and students in strengthening a “shared mental
context” for learning. Interestingly, the students’ teacher
reports that her students’ recollections of the field trip are
particularly strong because their school bus became stuck
in the snow during an unusual snowstorm in the region.
[1] P. Cowley, S. Easton and M. Thomas, Report Card
on Aboriginal Education in British Columbia
2011, Studies in Education Policy, Fraser Institute,
March 2011.
http://www.fraserinstitute.org/uploadedFiles/fraserca/Content/researchnews/research/publications/report-card-aboriginaleducation-in-british-columbia-2011.pdf
[2] B.Trypuc and A. Heller, Breaking the cycle of
failure, Charity Intelligence Canada Report,
September 2008.
http://www.charityintelligence.ca/images/Ci_Educati
onReport_08.pdf
Finally, the 2008 “Learning Indigenous Science from
Place” report [11] suggests incorporating a balance of
academic and fun activities. The report notes that
presenting lifeless facts for rote learning turns students
away from sciences, and that for Indigenous peoples
rigorous mental learning is always balanced with fun,
humour, and laughter.
199
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[3] J. Richards, Closing the Aboriginal/
non-Aboriginal Education Gaps, C.D. Howe
Institute Backgrounder, No. 116, October 2008.
http://www.cdhowe.org/pdf/Backgrounder_116.pdf
[4] Harper Government Supports STEM Education
for First Nations and Aboriginal Students, Federal
Economic Development Agency for Southern
Ontario, December 2012.
http://www.feddevontario.gc.ca/eic/site/723.nsf/eng/
01572.html
[5] C. Nicol, Designing a model of culturally
responsive mathematics education: place,
relationships and storywork, Mathematics
Education Research Journal, Mathematics Education
Research Group of Australasia, November 2012.
[6] Audacity digital audio editor, 2012.
http://audacity.sourceforge.net/
[7] Play-Piano online piano, 2009.
http://www.play-piano.org/.
[8] Canadian Council on Learning, State of Learning
in Canada: A Year in Review, Ottawa, March
2010.
http://www.ccl-cca.ca/pdfs/SOLR/2010/SOLR2010-Report-FINAL-E.pdf
[9] Thompson Rivers University, Handbook for
Educators of Aboriginal Students, 2010.
http://www.tru.ca/__shared/assets/albaa_handbook2
3430.pdf
[10] T. Perso, Cultural responsiveness and school
education with particular focus on Australia’s
First Peoples: A Review & Synthesis of the
Literature, Menzies School of Health Research,
Centre for Child Development and Education,
Darwin Northern Territory, 2012.
http://ccde.menzies.edu.au/sites/default/files/Literatu
re%20review%20Cultural%20Responsiveness%20a
nd%20School%20Education%20March%202012%2
0FINAL.pdf
[11] H. Michell, Y. Vizina, C. Augustus and J. Sawyer,
Learning Indigenous Science from Place,
Research Study Examining Indigenous-Based
Science Perspectives in Saskatchewan First Nations
and Métis Community Contexts , November 2008.
http://aerc.usask.ca/downloads/Learning%20Indigen
ous%20Science%20From%20Place.pdf
[12] G. Aikenhead, Integrating Western and
Aboriginal Sciences: Cross-Cultural Science
Teaching, Research in Science Education, 2001,
Volume 31, Number 3, pp. 337-355.
http://www.usask.ca/education/people/aikenhead/rise
_article.pdf
[13] G. Cajete, Look to the mountain: An ecology of
Indigenous education. Durango, CO, Kivakí Press,
1994.
[14] M. MacLean, and L. Wason-Ellam, When
Aboriginal and Métis Teachers use Storytelling as
an Instructional Practice, A Grant Report to the
Aboriginal
Education
Research
Network,
Saskatchewan Learning, 2006.
http://www.education.gov.sk.ca/storytelling:
[15] University of Victoria, UVic STEM (science,
technology, engineering and math) project, Centre
for Aboriginal Health Research, 2009.
http://cahr.uvic.ca/programs-research/projectsevents/stem/
[16] P. Chigeza, Accommodating Indigenous students’
cultural resources in science classrooms,
Curriculum Leadership, Volume 9, Issue 2, February
2011.
http://www.curriculum.edu.au/leader/accommodatin
g_indigenous_students_cultural_resour,32832.html?i
ssueID=12344
[17] S. Matthews, P. Howard and B. Perry, Working
Together to Enhance Australian Aboriginal
Students’ Mathematics Learning, Mathematics
education research: Innovation, networking,
opportunity, Proceedings of the 26th Annual
Conference of the mathematics education Research
Group of Australia (MERGA 2003), 6-10 July 2003
http://www.merga.net.au/documents/Keynote_Matth
ewsEtAl.pdf
[18] V. Klenowski, S. Tobias, B. Funnell, F. Vance and
C. Kaesehagen, Culture‐‐fair assessment :
challenging Indigenous students through effortful
mathematics teaching, AARE International
Education Research Conference, Melbourne, 28
November ‐ 2 December 2010.
http://eprints.qut.edu.au/39326/1/c39326.pdf
200
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Writing is Dead! Long Live Writing! Twitter; an original Way to Engage ESL
Learners
Zahida Chebchoub UAE University
UFP Department, University College, AlAin, United Arab Emirates
but we need to teach our students how to be clear and concise at
the same time. Furthermore, no one can deny the effect and the
increase of mobile technologies in our daily life. According to
Gonsalves [1],“the number of mobile technologies with Internet
access predicted to reach 1 billion worldwide by 2013.”
Moreover, microblogging such as is the case with Twitter
promotes collaboration among peers. Wankel [2] writes :
ABSTRACT
Throughout the years writing has developed in different ways.
Because languages are alive, they mutate constantly and thus
dictate to us their own new rules. The medium of writing also
changes under the effect of philosophical thought, technology,
and social needs. The culture of writing, which has always
protected our collective memory and recorded everything that
pertains to our life is changing. In the past, learners were taught
the art of writing and the art of calligraphy. These days, of
course, language and language art teachers are continuing in this
direction. But writing has reached a turning point; it will not
continue to be the way it has always been. Writing has become a
digital art. Our youth have embarked on this technological wave
that perceives writing in a different light. Twitter, Facebook,
emailing and so on are there to remind us of this fact. As
teachers, need to adapt our methods to these youth’s ways and
find ways to attract them to writing through “technology”. In my
article, I propose ways to help ESL learners develop the culture
of writing by incorporating the art of writing with the features of
the digital era, namely through the use of Twitter.
“According to Dewey (1916), learning is a
cognitive and social process that develops
through conversation. Communication, therefore,
is an essential part through all learning processes
and microblogging can extend our possibilities’’
In several colleges and academic institutions worldwide, mobile
computing devices such as iPads and smartphones have become
the norm rather than the exception in regular classrooms. They
have profoundly changed the core of learning and teaching.
But some of us worry about “language decay” that might be
caused by an extensive use of electronic means of
communicating. But we need not worry; Crystal [3], a renowned
linguist (not a digital native though; born in 1941… )reassures us
with the points he has put forward in his book: Txtng: The Gr8
Db8 (logogram for Texting: The Great Debate):
1. Typically, less than 10% of the words are abbreviated
in text messages.
2. Abbreviating is not a new language; instead, it has
been present for many decades.
3. Children and adults both use SMS language, the latter
being more likely to do so.
4. Students do not habitually use abbreviations in their
homework or examinations.
5. Sending text messages is not a cause of bad spelling
because people need to know how to spell before they
can send a text message.
Sending text messages improves people'
s literacy, as it provides
more opportunity for people to engage with the language through
reading and writing. This is especially useful for school-age
children. We need to find ways to attract digital natives to writing
through “technology” and develop the culture of writing by
incorporating the art of writing with the demands and features of
the digital era. (Hand-written letters and assignments on
immaculate, lined A4 papers… almost obsolete just like landline
telephones). Our role as educators is to engage learners not
always because we have selected a particular topic or way of
expressing it but because learners have expressed and shown
interest in the topic and how to express it. We also need to
encourage students to focus on and write in the target language.
Whether we want it or not, we have to adapt our ways and style
of teaching to the digital world. By doing so, we will be able to
attract our students to the skill of writing which will be perceived
as an art that goes along the lines of their aspirations.
Keywords: Writing, E.S.L., Twitter, Native Speakers of Arabic
as ESL learners.
1. INTRODUCTION
We used to come to class with a pencil case filled with pens,
pencils and erasers. Our youth now come to class equipped with
iPads, Smartphones and Laptops. Our youth have grown up in a
digital world environment: Writing has become a digital art. Our
youth have embarked on this technological wave. Twitter,
Facebook, SMS and Emails are here to remind us of this fact. If
we do not embrace these media in our role as language teachers,
we might be perceived as somewhat out-dated or “oldfashioned”. Because, most of us are not digital beings by birth,
we sometimes try to impose our way of dealing with writing the
way we had been exposed to it in the not so far distant past. For
the majority of language teachers, writing is still perceived as a
pen-paper activity. But things have evolved so much these past
ten years or so. Mobile technologies are spreading in classrooms.
With an iPad in their hand, learners can discover places, meet
people at the touch of a finger; "Students are birds. Their wings
are their iPads1”. Our youth use social networks and platforms to
express their ideas, to exchange them, to discuss them. They do it
of course in their first language. Our role is to harness this and
use it to benefit second language learning and teaching. Whether
we want it or not, we have to adapt our ways and style of
teaching to the digital world. By doing so, we will be able to
attract our students to the skill of writing which will be perceived
as an art that goes along the lines of their aspirations. Of course,
students have to abide by the number of words required by their
instructor or by specific examination boards for writing an essay
1. H.E. Sheikh Nayhan Mubarak, Chancellor of UAE University,
at the First International Mobile Technologies Conference,
201
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
2. TWITTER; A POSSIBLE SOLUTION
I would like to propose a practical way that engages our students
to write by using a social platform; TWITTER. Our present era is
the era where conciseness is the rule; Twitter allows 140
characters long tweets. The Internet is about words and visuals.
The greatest benefit of Twitter is that it can teach students how to
write in a concise way since it allows only 140 characters. In a
way, students will learn how to put together or formulate ideas
and thoughts more clearly. Wankel [4]reports also that this social
platform can help teachers in various “issues of language, art,
creativity, innovation, literature, technology, and much more.”
Learning occurs mainly and efficiently through interactivity
between learners and teachers, in a way it is like cooperative
learning. For this, it is vital to take into account the learner’s
knowledge, beliefs and cultural and social background. When
content is relevant to the life of learners, they will feel engaged
and will gladly express their opinions. But sometimes, Twitter is
the pet-hate of some; indeed, if you mention the word twitter to
language and literature professors and teachers, some, if not the
majority, might look at you with disdain; how dare you
pronounce this word! Twitter allows tweets of 140 characters
only. “No Twitter in my language and literature class” would
they scream. Some writing/language and literature instructors
press their students into writing more than what is required.
They applaud students who when asked to write 500 words, end
up writing 1000 words. To them, wordiness should be achieved
at all costs. But I would like to develop the philosophy of
“concise wordiness” whereby students abide by the number of
words but are clear and concise at the same time. Of course,
students have to abide by the number of words required by their
instructor or by specific examination boards for writing an essay
but we need to teach our students how to be clear and concise at
the same time. As an interactive platform, Twitter promotes
effective learning through the interactivity between learners and
teachers, cooperative work as well as the inclusion of learner’s
knowledge, beliefs and cultural and social background learners.
All these factors make learners feel engaged in the learning
process.
4. WHAT CAN AN ESL INSTRUCTOR DO WITH
TWITTER?
An ESL instructor may find it useful to ask students to brain
storm ideas. Indeed, instead of asking students to jot down ideas
on paper, we can ask them to do so in tweets and exchange their
tweets with other students in a writing class, even across a whole
school or learning institution.
Studnets may also write a daily diary: ESL learners can compose
a daily tweet as part of their journal writing. At the end of the
academic semester, the class teacher can gather all the tweets and
use them for a class discussion to encourage students to reminisce
the events that were important for them throughout the semester.
TBLL, also known as “task-based language learning”, allows
students to concentrate on authentic language use. Because it is
related to their daily use, twitter is a good platform for this.
Another advantage is that in this particular activity, students are
assessed on task outcome rather than correctness of language.
This is crucial for developing fluency and confidence in the
acquisition of the second language. An example of a TBLL
activity would be to ask students to follow tweeting feeds about
their dream job. Then, students can write a tweet about it and say
whether they still want to have that job or not. I have used it in
class this past semester whereby I asked students to follow tweets
about their dream job. Then, they were asked to choose a
job/career and describe it in a tweet. I also let students follow
each other and evaluate each other’s dream job by searching
information about the job, hours of working in a particular job,
benefits, and academic requirements. Finally, I asked students to
vote on the best job or the worst one. In another activity, I asked
students to search for a weird/strange/unusual job and describe it
in a tweet.
Other activities an ESL instructor may incorporate into Twitter ae
as follows:
Twitterature:A possible activity would be to let students choose
a play. Afterwards, the teacher can bring to class a simplified or
abridged version of the play. Students read the play in class or
this can be assigned as homework. Then, the teacher can divide
the roles/characters of the play amongst students (one may have
two or three versions; selected according to two or three distinct
cultures or times; one group could represent grandparents time,
another parents time and the third present time OR two or three
cultures chosen by students). Each character in the play has to
write tweets according to her/his version.
Nanolitterature: this is useful as it helps learners learn engage
in literary prose or verse experimenting with short sentences.
Because a tweet allows only 140characters, learners will have to
look for synonyms and so on.
Translation: Our students often follow newsfeeds in their first
language; as ESL instructors, we should use this to benefit our
students’ second language skills: ask them to translate some of
the most interesting feeds from Arabic into English.
M ovie/book/newspaper or magazine article review:students
could twitter their thoughts on an article they have read or a video
they have watched.
Role play:In groups, students create their own characters and
create Twitter accounts with the new character and its profile.
Then, they will write tweets as their character would have written
them.
Anagrams: give students a number of letters for them to
rearrange into words. Organize a class contest on the fastest tweet
responses.
Dictionary
work:
let
students
look
for
synonyms/antonyms/homonyms and homophones for a word.
Then ask them to write a tweet with words they have found.
Topic and concluding sentences: Practice writing topic and
concluding sentences for paragraphs as tweets can only be 140
characters long.
3. THE BENEFITS OF TWITTER
Widely used: twitter’s popularity makes it relevant to language
learners,
Conciseness: Its 140 characters limit makes it an “original” and
trendy tool
Slog2 (SM S +blog): twitter is a micro-blogging tool that mixes
aspects of SMS text messages and blogs. Moreover, its
conversational and concise style offers opportunities to practice
specific language skills. Its distinct style is based on the brevity
of tweets (each message is limited to 140 characters. In addition,
a major advantage is that abbreviations such as “gr8” for “great”
are not generally used in tweets. Furthermore, using Twitter is a
casual way to communicate and imitates the fast sequence of
what people say in a normal conversation
Transfer ofskill: many students already use Twitter in their
own language. Most of them would wish to extend it to their
target language; especially English since many tweeters use this
language as the medium of communication. Twitter is also a part
of social, business, scientific and academic discussions.
Furthermore, it has already become a major platform in digital
communication.
Rapidity: the conciseness of twitter writing means that it is fast.
So it is easy to add to other learning activities, be it in the
classroom or for homework.
Go global: Twitterers very often make their tweets “public”;
Tyson et al [5] report: “Nearly 90 percent of Twitter users make
their updates public, so everyone can read them” Indeed, today’s
youth are for exchange of information globally
2
An expression I have created from “SMS” + “Blog”
202
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
The use of“multi-skill”3 to introduce/review grammar points:
This method will help students practice listening, reading,
speaking and writing. You read a short passage or dialogue that
contains a particular grammar aspect or structure (this passage
can be on a listening track). Then you give the typed transcript to
groups of students. They discuss the grammar point together in
their group. Afterwards, they write tweets using the grammar
point. Live projection of the tweets will engage a class discussion
(correcting errors, explaining the grammar point, etc.)
Practice verb tenses: Practice verb tenses by asking students to
write tweets about daily tasks/past events/future events
Poem writing:Short forms of poems such as Haiku poems can
be a fun activity. A student starts the first line/verse. Then the
next student writes the next by following the same idea in the
previous tweet.
M axim writing: Arabs love to write maxims, proverbs and
sayings. In fact, Arab literature whether oral or written relies very
much on conciseness when it comes to proverbs. Our students
like to write maxims and proverbs in their first language by using
twitter. We should encourage them to do the same in their target
language.
Summary writing: Twitter is an excellent tool for summary
writing as it teaches learners to be concise which quite the
essence of summary writing is. Students can read 100-word
paragraphs. Then they summarize each paragraph into one tweet.
Correcting Tweets: Students sometimes resent having their
language errors underlined with a red pen. However, with tweets,
they do not mind having their errors shown or corrected. In fact,
they like to have linguistically correct tweets (anybody can read
them and especially their friends so they want to feel proud of
their writing). This can be done collaboratively or individually.
5. CLASSROOM RESEARCH ON THE USE OF TWITTER
WITH TWO GROUPS OF ESL LEARNERS (PREINTERM EDIATE LEVEL)
M ethodology:
informants: one control group (18students)and one experiment
group (17students)
data: digital story writing and multi-skill using twitter with the
experiment group
story writing and multi-skill using the classic pen and paper
method with the control group
Experiment group/digital story writing:
Writing the story in tweets:45 minutes
I asked students to choose a fairy tale. They chose “Cinderella”.
Then, I asked them to recall the events in the story; this was a
good speaking practice activity. Afterwards, I let them log on to
twitter, using the twitter account used specifically for our class. I
asked them to change parts in the story to reflect their present day
life. One student wrote a line to start the story. Then, another
student continued and so on until all students had contributed at
least one tweet to the story. The tweets were projected live onto
the smartboard screen.
Editing the tweeted story:45 minutes
Two days later, I asked students to correct errors in the tweeted
story. In particular, I asked them to check spelling, punctuation
and grammar errors. Students worked in groups of 5students.
Control group:Story writing/classic pen and paper way:
Writing the story:45 minutes
I gave a piece of A4 paper to one student and asked her to write
the first sentence of the “Cinderella” fairy tale. I told students
they could change the events of the story if they wished to do so.
Then, the first student passed the paper to another classmate and
so on until everybody had contributed at least one sentence to the
story.
Editing the story:45 minutes
Two days later, I made copies of the written story and brought it
to class. In groups of fives, students corrected the mistakes.
Results:
The following table shows the amount of editing undertaken by
the experiment and the control groups:
table 1:pre & post editing results (percentages of edited errors)
Experiment group:multi-skillwith the present progressive vs. the
simple present & comparative adjectives vs. superlative one:
Students listened to a short audio file where the speaker used the
present progressive and present simple as well as comparative and
superlative adjectives. Then they were given the script to discuss and
explain the grammar points. Students worked in groups. To show they
understood the grammar points, they were asked to write tweets.
Control group: multi-skill with the present progressive vs. the
simple present & comparative adjectives vs. superlative one:
Students listened to a short audio file where the speaker used the
present progressive and present simple as well as comparative and
superlative adjectives. Then they were given the script to discuss and
explain the grammar points. Students worked in groups. To show they
understood the grammar points, they were asked to write sentences on
handouts given out by the teacher.
Results:the following table shows the amount of correct grammar
usage by students in both groups:
table 2:percentages ofcorrect answers
T
6. CONCLUSIONS
The results showed significant improvement in the experiment
group for the following reasons:Students feel confident about using
mobile technologies; they are part of their daily life. They did their
best to edit the tweets as they know that tweets are public.
7. REFERENCES
3
Multi-skill: an expression I have coined for an activity that
involves all the language skills.
203
[1] Gonsalves, A. (2009). One billion mobile Internet devices
seen by 2013. Information Week, December 9. Available at
http://www.informationweek.com/news/internet/webdev/sho
[2] Wankel, Charles (Editor). Cutting-edge Technologies in
Higher Education, Volume 1 : Educating Educators with Social
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
M edia Bradford, GBR:Emerald Group Publishing Ltd, 2011.
p 32.
[3] Crystal, David. (2009) Txtng: The Gr8 Db8. Oxford
University Press, USA
[4]Tyson, William; Zemsky, Robert (Foreword by). Pitch Perfect
Communicating with Traditional and Social M edia for
Scholars, Researchers, and Academic Leaders.Sterling, VA,
USA: Stylus Publishing, 2010. p 172
204
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Multiple Perspectives - Assessing Student Learning in Distance Based
Education though Asynchronous Online Discussions
Dr. Donna DUELLBERG
Regional Education Services Officer
United States Coast Guard
Honolulu, HI 96813, USA
and
Mary Ann SWENDSEN
Graduate Student
University of Arkansas
Honolulu, HI 96813, USA
and
Christine HANSEN, Ph.D.
Dept. of Humanities, Hawaii Pacific University,
Honolulu, HI 96813, USA
education programs. Specifically, random pulls from
asynchronous discussion boards across multiple
learning platforms were analyzed for the presence and
frequency of the following cognitive skills:
regurgitation; clarification; understanding; application;
analysis and evaluation; and creating. In addition, a
comparison of the presence and frequency of the
aforementioned cognitive skills was be made across
online/non-traditional schools divided into categories
using the following graduation rates: 1-20%; 21-40%;
and 41-60%. (The researchers did not have access to
the discussion boards of schools with higher
graduation rates). This work is important because
graduation rates at many colleges and universities
have come under increasing scrutiny. To be good
stewards of dollars invested in education,
administrator and student stakeholders would like to
be able to identify specific types of cognitive skills
that-- when effectively targeted in the online
classroom-- are likely to lead to increased graduation
rates.
ABSTRACT
Evaluation of progressive cognitive skills on
asynchronous discussion boards was investigated as a
contributing variable for raising institutional
graduation rates of online institutions which target
veterans and other military related populations. This
approach is formalized theoretically through an
examination of Herzberg's motivators suggesting
completing challenging work increases intrinsic
academic satisfaction and thus, the likelihood of
graduation. Statistical analysis of level of cognitive
domain presence was tied to academic institutions
falling into three different graduation rate categories:
1-20%; 21-40%; and 41-60%. The researchers found
that a statistical significance existed between the mean
cognitive skill demonstrated on discussion boards in
each graduation rate category. In fact, a positive
correlation existed: The higher the institution
graduate rate, the higher the occurrence of higher
cognitive skills, to include analysis and application.
This investigation is timely in light of current
nationwide concerns about institutional graduation
rates.
Instructors are online facilitators and are not generally
directly involved as either stewards or investors of
educational dollars. Nevertheless, if there exists some
direct relationship between graduation rates and the
active engagement of certain cognitive skills,
instructors may play a role in targeting those skills.
However, instructors are not economic stakeholders,
strictly speaking.
Keywords: graduation rates, cognitive skills,
discussion board, metacognition, online, distance
education, internal locus of control
1. INTRODUCTION
After presenting results, we offer discussion and a
possible theoretical explanation of intrinsic versus
external motivators in light of certain cognitive skills
selectively engaged on the discussion board in light of
Herzberg's motivators1. External motivators have a
Three different perspectives (professor, student and
administrator) of current online modalities assessed
the degree of student learning (via cognitive skills
demonstrated on discussion board posts) in distance
205
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
short term impact on behavior, but intrinsic motivation
is necessary to change behavior over the long haul 2,
and thus, an important variable to target for increasing
of higher graduation rates.
higher learning. All schools fell into three different
graduation rate groupings. The researchers did not
have access to discussion board posts from schools
within these higher graduation rate categories (61-80%
and 81-100%). An ANOVA was conducted in order
to see if the mean differences in each category
observed were statistically significant. Statistical
significance was found between all 3 graduate rate
categories – the higher the graduate rate, the higher the
mean level of cognitive skill demonstrated by students
on the discussion board.
2. METHODS
Research was conducted by randomly pulling
discussion board posts from the discussion boards of
ten different classes within six different institutions of
Results (Combined):
Graduation rates &
Cognitive Skill Set
Demonstrated
Regurgitation = 1 pt
Clarification
= 2 pts
1-20% Mean Score
21-40% Mean Score
41-60% Mean Score
61-80%
81-100%
NA
NA
2.4 was the mean score
for all 3 researchers
3.04 was the mean score
for all 3 researchers
Understanding = 3 pts
3.85 was the mean score
for all 3 researchers
Application = 4 pts
Analysis & Evaluation =
5 pts
Creating = 6 pts
Application
Understanding
4
3.5
3
Clarification
Regurgitation
2.5
2
Mean
1.5
1
0.5
0
1-20%
21-40%
Experimental design was to total the frequency of
posts which fell into qualifying descriptors of
cognitive skills in six categories: Regurgitation;
Clarification; Understanding; Applications; Analysis
and Evaluation; and Creating. The random discussion
posts were assigned to a category and statistically
analyzed against graduation rates. The methodology
was carried out by participants Hansen, Duellberg and
Swendsen in compiling the professor, administrator
and graduate student perspectives, respectively.
Pictured above is a combination of those mean results.
41-60%
All three researchers agreed that measuring the on-line
responses on students’ thought processes, learning of
the material and relevance to course material is
difficult. Each student has his or her own challenges
such as time management, level of mastery of
technology, experience, and motivation. Instructors
are online facilitators and cannot solely depend on a
well-developed design of the on-line course outline,
material and presentation format. The impact on
student learning is delivery. Thus, administrators
206
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
cannot entirely guarantee outcomes on the discussion
board. Successful engagement of specific cognitive
skills on the discussion board results from a
combination of factors, some of which are not built
into question design, but reside in individual delivery
methods.
evidence is not sufficient to draw this conclusion.
Although this study may show some correlation
between the demonstration of higher-level cognitive
skills and graduation, more study needs to be done,
and it currently appears unlikely that successful
graduation can be tied to a cognitive skill at a
particular point in time.
4. DISCUSSION
The reason for this is that successfully graduating
requires the student to surmount a host of
unpredictable internal and external obstacles over a
long period of time. Therefore, measuring higherlevel cognitive skills at a particular point in time may
not be predictive of success.
Discussion
Administrator perspective: The analysis of
discussion board across schools with varying graduate
rates does demonstrate that the higher the school's
graduation rate, the higher the percentage of
discussion board posts by students showing
application or analysis and evaluation cognitive skills.
In fact, in schools with graduation rates of less than
20% the percentage (40%) is half of that for schools
with graduation rates falling in the 41-60% range. The
most glaring and obvious difference was in the
students’ use of analysis and evaluation on the
discussion board. No posts qualified for the use of
analysis and evaluation cognitive skills in the less than
20% graduate rate schools and was only demonstrated
17% of the time in schools within the 21-40%
graduation rate category.
Moreover, even if the skill could be successfully
measured at many given points in time-- providing
more than a single snapshot of its use-- the
demonstration of a particular cognitive skill or even
given set of skills may not be as important as the
ability to successfully choose the correct cognitive
skill or other life skill at a particular point in time,
based on the challenges presenting at that time
(Flavell, 1976). Thus, the ability to graduate could be
more closely related to metacognition than to
cognition.
Metacognition can be thought of almost as a higherlevel operating system as compared to a particular
cognitive skill (considered over time) can be thought
of as an individual program. In my opinion, the ability
to successfully graduate is more tied to such an
operating system rather than to any one individual
program.
From an administrative perspective, high graduation
rates are desirable, and there is considerable utility in
identifying specific cognitive skills that can be
targeted in online curriculum to maximize or raise
graduation rates.
Cognitive skills are an effective pivot point for
considering graduation rates, because motivation
exists as part of the student's internal cognition.
Schools with higher graduation rates present higher
level cognitive skills (application, analysis and
evaluation) on their discussion board are more likely
to give rise to internal motivation in Herzberg's sense.
Schools which facilitate online discussions where
there is heightened evidence of the higher cognitive
skills meet several of Herzberg's motivators,
specifically: Gaining recognition, Responsibility,
Challenging / stimulating work, and a sense of
personal achievement & personal growth.
Collectively, these motivators serve to fuel one's
intrinsic motivation and once fueled, lasts the journey
(well beyond graduation). On the other hand, when
only lower level cognitive skills are engaged in the
classroom (regurgitation/description, clarification), the
easy "A" that students receives is a lesser fuel which
only gets them around them once around the block.
External motivators have a short term impact on
behavior, but intrinsic motivation is necessary to
change behavior over the long haul (Gneezy, Meier,
Re-Biel, 2011).
We could think of this metacognitive ability as a
resilient internal system that allows us to navigate a
path through life's challenges (Zohar & Ben David,
2009), much as a robotic vehicle might need to
navigate a path through obstacles on a course
presenting various types of navigation challenges.
Though successful graduation from school is not per
se a navigation task, it has much in common with a
navigation task. The "internal guidance system of
decision-making" for the student must function as a
single, internal "guidance system." This requires
some very specific things to be true at the educational
institution. The most important thing to foster in a
student is an internal locus of control, so that the
individual is not simply acting continually on outside
instructions, but also possesses an internal guidance
system along the educational path, with an internal
locus of control.
Landine & Stewart (1998) link internal motivation to
the existence of an internal locus of control. In
classroom design, this may mean that institutions with
a very high level of top-down administrative control
over the classroom-- such as those characterized by a
very high degree of standardization and administrative
influence over curriculum and classroom interaction-may not offer sufficient opportunity for development
Instructor perspective: The analysis of discussion
board cognitive skill levels across schools cannot be
tied directly to the school's graduation rate. The
207
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
of an internal locus of control. Establishing one's
inner locus of control is an ill-defined and complex
process. It is inexact. There is no formula. When a
student is placed in an environment of sufficient
latitude, the student will grow up intellectually, often
by trying different things and making mistakes. At
some point, the student stops depending so much on
outside instructions and rules, and moves toward
personal intellectual empowerment. But in classrooms
which strongly foster a locus of external control, and
which manifest no consciousness of the pitfalls of
excessive external loci of control, there is a risk of the
student never developing the necessary educational
autonomy to graduate.
educational autonomy. In some ways, these goals run
counter to the administrator view, since administrators
have a strong stake in standardization for the purposes
of its data collection, institutional self-study, outcomes
assessment, and accreditation functions. Yet it must
be understood that these same factors can inhibit the
emergence of an environment of educational
autonomy.
We need to view student graduation as a systemic
issue, and create a notion of leading the student toward
building a resilient internal "educational guidance
system" that can rebound from challenges and allow
the student to maintain educational persistence in the
face of obstacles. A study of cognitive skills at a
snapshot in time-- while useful-- cannot by itself
accomplish this. Cognitive skills are surface features
that can have many motivational causes. For example,
a student can demonstrate strong cognitive skills on a
discussion board because the student is competing
with a rival student in that class, because point value
of the assignment is high, because the student is facing
dire financial circumstances that temporarily bring the
importance of education into focus due to external
pressures, or because the student has been told by the
school that he or she must demonstrate the skill set in
order to become competent in the desired profession.
None of these temporary factors may lead ultimately
to graduation. Yet all are forms of internal
motivation, and all may lead to surface features of
cognition as measured on the discussion board.
Sherer, Maddux, Mercandante, Prentice-Dunn, Jacobs,
& Rogers (1982) closely link this factor-- a strong
internal locus of control-- with persistence. The
ability to persist in the face of adversity would seem to
be a strong factor in the ability to graduate.
Presumably, a strong awareness of agency is necessary
in order for the student to respond successfully and
resiliently to unpredictable educational setbacks. The
development of this factor is paramount if graduation
rates are to rise, and thus it is possible to hypothesize
that institutions that maintain the strongest external
loci of control-- and which do little to foster the
development of a climate where internal locus of
control can emerge-- will exhibit the lowest
graduation rates.
Therefore, educational institutions seeking a higher
graduation rate should diligently strive to instill a high
degree of autonomy in the educational process. Lately
the pendulum has swung strongly toward overarching
top-down administrator control, due to pressures
linked to assessment, and this has filtered down to the
classroom as a powerful set of external instructions for
both student and teacher, thus reducing autonomy and
the instructor's ability to foster the emergence of an
"internal educational guidance system" within the
student. In other words, the goals of administrator and
instructor need to be brought into better accord . This
is not to say that there should be conflict, but rather
that there should be more awareness of the inherent
tendency of administration to try to tailor programs
and classrooms for the purposes of assessment,
whereas the inherent duty of the instructor is to try to
tailor classrooms to stimulate the growth of an
"internal educational guidance system" within the
student. The former tends toward standardization and
pressures for externalizing control; the latter tends
toward a need for more autonomy so as to avoid
having the student fall into educational dependency.
Rather than manipulating external individual factors,
we need to view educational success systemically.
This requires fostering the "emergence" of an internal
student educational navigation that cannot be forced
through external controls, though it can be encouraged
and facilitated. This, in fact, is one of the key
problems of educational theory and its applications.
Although external actors can do much to help the
student, some process also has to emerge internally
and the process has to persist and be resilient over
time if graduation is to occur. This is best modeled as
a system, looked at metacognitively, and studied
across various points in time.
To recap, the emergence of long-term internal
motivation requires not just cognitive factors, but also
metacognitive factors. Specifically, an internal locus
of control must be hypothesized. In order to sustain
long-term internal motivation that leads to higher
graduation rates, this locus of internal control is
needed to sustain the long-term educational effort in
the face of obstacles, adversity, and setbacks. Passive
consumers of education who are "told what to do"
may become stunted in their ability to form an internal
locus of control, and thus become intellectually
dependent on external decision-makers and external
structures. It is further hypothesized that students who
fail to develop an internal locus of control may never
be able to develop the long-term internal motivation
that leads to graduation. To repeat, without an internal
In order for higher graduation rates to take place, all
stakeholders in the process need to be led toward
autonomy. Internal motivation must be accompanied
by a shift from an external to an internal locus of
control. This shift is best accomplished by a focusing
on reducing dependency on external intellectual
factors, which occurs in an environment of
208
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
locus of control, a student may produce short-term
work with high level cognitive skills, but these may
not necessarily be indicative of long-term ability to
graduate.
dependent on the shaping of Socratic questions. A
well-crafted Socratic question by the instructor can
promote a productive discussion board session among
the students and instructor. Typically, a discussion
board question is posted for one week online for
students to respond and share perspectives. This type
of forum allows for on-going dialogue and if the
Socratic questions are structured to invoke critical
thinking responses and sharing of real-life
experiences, the more engaged the student will be to
relate discussions to course content and learn from
other students.
Future research should investigate whether an internal
versus external locus of control is more effective to
fostering long-term internal motivational persistence,
and ask whether long-term motivational persistence is
predictive of successful graduation. Attempts should
be made to measure internal motivational persistence
at more than one snapshot in time, and ideally at
numerous points. It is true that we cannot directly
measure internal motivation, so the measure of
cognitive skill level may be helpful in giving some
indication of motivation at a snapshot in time. But we
should also remember that we are not measuring
actual internal motivation, and also that motivation
may exist on a temporary basis that will not propel the
student successfully to graduation. A better measure
would be of student persistence in the face of
obstacles, which should be an indication of resilient
agency as made possible by an internal locus of
control. This means that meacognitive, not just
cognitive, levels of proficiency should be discussed
and considered, and that more emphasis should be
placed on them in educational research.
Measuring the on-line responses on students’ thought
processes, learning of the material and relevance to
course material is difficult. Each student has their
own challenges such as time, technology, readiness to
learn, student experience, and motivation. Instructors
are online facilitators and cannot solely depend on a
well-developed design of the on-line course outline,
material and presentation format. The impact on
student learning is delivery.
Socratic questioning needs to be part of the design of
the course but be curtailed to deliver to a variety of
student’s learning preference. Engagement and
detailed responses with examples help determine
success in learning. Exam scores reinforces the
student’s level of learning the course material. The
overall course grade depends on the weighted grade
for online discussions, homework and exams.
Other possible explanations can be attributed to class
size and degree of focus within the classroom (single
tasking vs. multi-tasking) and other possible factors.
Student perspective: Critical thinking is the process
students use to reflect on, access and judge the
assumptions underlying own and others ideas and
actions. Socratic questioning is a way to provoke
critical thinking and use these questions are often
used by college instructors for online homework
assignments and/or discussion board to share
experiences and ideas with other class students.
Based on our study on cognitive skill sets
demonstrated for on-line discussion board
assignments, many online courses are promoting
regurgitation clarification and application. One
assumption is that the Socratic questioning is limited
to the aforementioned categories based on the type of
responses that were analyzed. One can further assume
that if the Socratic questioning is designed to promote
critical thinking then it leads to higher cognitive skill
development.
There are six types of Socratic questions:
1.
2.
3.
4.
5.
6.
Questions for clarification.
Questions that probe assumptions.
Questions that probe reasons and evidence.
Questions about viewpoints and
perspectives.
Questions that probe implications and
consequences.
Questions about the question.
5. CONCLUSION
It is possible that administrative intervention in the
design of specific discussion board questions to target
specific cognitive skills can be a positive factor in
raising graduation rates. Yet administrative
intervention should be coordinated with an overall
systemic approach. It is possible that too much
administrative intervention may be detrimental to the
development of the student's internal locus of control,
and that some "Goldilocks" level of administrative
intervention may be better than too much or too little.
It is also possible that instructor delivery in the form
of Socratic questions is also needed in order to fully
engage these target cognitive skills on online
discussion boards. The data supports one or both of
these possible conclusions.
Use of Socratic questioning is becoming popular for einstitutions desiring to cater to online learners.
Instructors teaching an online course will have to
adapt their teaching style to the various learning styles
in a nontraditional setting.
Socratic questioning can be an effective way to
determine if students are demonstrating critical
thinking in relation to the course content. Measuring
the effectiveness and level of critical thinking is highly
209
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[4] J. Landine, and J. Stewart. Relationship Between
Metacognition, Motivation, Locus of Control, SelfEfficacy, and Academic Achievement. Canadian
Journal of Counseling. Vol. 32, No. 3, 1998, pp.
200-12.
[5] M. Sherer, J.E. Maddux, B. Mercandante, S.
Prentice-Dunn, B. Jacobs, and R.W. Rogers. The
Self-Efficacy Scale: Construction and Validation.
Psychological Reports 51, 1982, pp. 663-671.
[6] A. Zohar, and A. Ben David. Paving a clear path in
a thick forest: a conceptual analysis of a metacognitive
component. M etacognition Learning. 2009; 4:177–
195.
6. REFERENCES
[1] J. H. Flavell. Metacognitive Aspects of Problem
Solving. In Resnick, L. B. (Ed) the Nature of
Intelligence. Hillsdale, NJ: Erlbaum, 1976.
[2] F. Herzberg, B. Mausner, and B.B. Snyderman.
The Motivation to Work (2nd ed.). New York: John
Wiley, 1959.
[3] U. Gneezy, Meier S. and P. Rey-Biel. "When and
Why Incentives (Don't) Work to Modify Behavior",
Journal of Economic Perspectives, Vol. 25, No. 4,
2011, pp. 191–21.
210
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Enriching Syllabi, Teaching and Testing Using Two-Step Problems
Russell Jay Hendel
Department of Mathematics, 8000 York Road
Towson Maryland, 21252
RHendel@Towson.Edu
has the following features, endowing it with superiority over
test items #1a and #1b:
ABSTRACT
We present a method, two-step problems (TSP), which can
enrich syllabi, assessment and teaching. TSP is consistent with
other syllabus enrichment methods such as AFL, assessment for
learning , and SLO, specific learning objectives. We show that
TSP i) is operationally defined and easy to implement, ii)
builds, in students, higher-level cognitive abilities such as
executive function, iii) allows a teaching to the test that
enhances, rather than restricts, curriculum, iv) can be applied to
a spectrum of age levels, K-12 as well as university level, v) can
be adopted in a variety of curriculum content situations,
technical, literary, and mathematical and vi) is consistent with
and enriches current syllabus improvement methods such as the
Common Core State Standards (CCSS).
Keywords: teach to the test, assessment, evaluation, multi-step
problems, two-step problems, executive function, assessment
for learning (AFL), specific learning objectives (SLO), syllabus
construction, Common Core State Standards (CCSS), higher
level cognitive functions.
1.
Each of these features – two-step, reversibility, and non-explicit
reference – facilitates development of higher cognitive skills
and the writing of challenging problems.
GOALS, OVERVIEW AND BACKGROUND
We emphasize that test items #1a, b and test item #2 test the
same curriculum learning objective or syllabus item. The fact
that they are different points to a need to supplement syllabus
construction with other features.
The Common Core State Standards (CCSS) [34] with
their emphasis on physical and thinking models, in
contrast to memorization, explains the difference
between test item #1a and test item #1b.
TSP explains the difference between the test item #1
group and test item #2.
Just as the introduction of physical and thinking models by the
standards has enriched former “rote memorization syllabi”, so
too, introduction of TSP can further enrich syllabi.
To concretize our discussion of goals and background we
present a simple syllabus enhancement that, as we shall show in
section 3, dramatically changes the learning experience,
develops higher level cognitive learning skills, and allows more
focused teaching and assessment,
1.1 The Multiplication Example
Consider a 3rd grade class with the curriculum topic,
multiplication table. The following three test items each assess
the same learning objective, learning of the multiplication table;
however, they dramatically differ in the skills they measure.
Two-step: Test item #2, requires two applications of
the multiplication table; these two applications are
marked (a) and (b).
Reversibility: Test item #2 requires reversibility.
When a student learns the multiplication table they
start with pairs of numbers and then give their
product. However, test item #2 requests the student to
reverse direction; to go from the product to the pair
that produced this product. This approach to raw facts
– using reversibility – is called the missing factor
interpretation of division and is routinely taught by
elementary school teachers.
Non-explicit reference: Test item #2 identifies
multiplicands by reference (itself) rather than by
explicit numerical identification.
Test item #1a: Give the product of 8 x 7.
1.2 Goals
Using the above example, we can now state this paper’s goals:
Two step problems (TSP): Show general methods to
incorporate two-step problems (TSP) into teaching.
Syllabus construction: Demonstrate that such an
incorporation is consistent with modern syllabus
theory which advocates AFL and SLO be routinely
incorporated into syllabi.
Challenging problems: Show that TSP is consistent
with literature recommendations for writing advanced
problems.
Higher-level cognitive skills: Cite current brain
research suggesting that despite the superficial
Test item #1b: Samantha wishes to purchase a
different colored piece of liquorice for each day of the
week. Each piece of liquorice costs 8 cents. How
much will the purchase for the week cost?
Test item #2: (a) A certain number when multiplied
by 7 equals 56. (b) Give the product of that number
with itself.
Test item #1a is a raw fact from the multiplication table. Test
item #1b tests the same raw fact underlying test item #1a by
requiring the student to do real-world modeling. Test item #2
211
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
simplicity of a TSP, it does differ significantly from
single step problems; the solution of TSP uses
different parts of the brain.
Age and Content independent methods: Example 1.1
involves a technical skill (multiplication) in K-12.
However, the methods used- TSP, reversibility, nonexplicit reference – are content independent and are
applicable at any age. Accordingly, we show that the
methods of this paper apply to a broad spectrum of
age groups and curriculum contents.
Teaching to the test: Teaching to the test is bad when
such teaching leads to restriction of curriculum. For
example, if I specify that only certain topics will be
on the “test” then I restrict the curriculum to those
topics; in such a case teaching to the test is bad.
However, teaching to the test is good when such
teaching leads to broadening of the curriculum For
example, suppose I tell a 3rd grade class: On this test
you will be tested on the multiplication table. Each
problem will also involve the construction of physical
and thinking models. Each problem will be a TSP
with two sub problems. Such a teaching to the test
broadens the curriculum; the student must do more
than understand the multiplication table; they must be
prepared for diverse modeling situations as well as
diverse two-step problems.
The Standards: As indicated in Section 1.1, just as the
teaching of physical and thinking models enriches a
syllabus based on rote memorization, so too, TSP
further enriches the syllabus.
students and superior performance on standardized
tests.
Section 6 – The Standards: We show that TSP further
enhances such features as thinking and physical
models emphasized by the standards.
2.
AGE AND CONTENT INDEPENDENCE
In this section, we show that TSP can be used at any age level,
K-12 or university and similarly, TSP can be applied to any
content, technical or non-technical. We present examples from
K-12, mathematics and literature.
2.1 Multiplication Table
We have already presented in section 1.1 the following simple
example of a TSP for the multiplication table: A number time
seven is fifty-six; compute the product of that number times
itself. Such an example is typical of possible problems in K-12.
2.2 University Level Mathematics
The examples presented in this subsection come from Financial
Mathematics and are in fact typical homework and test
problems used by the author in a university, senior level,
undergraduate course whose content closely follows the Society
of Actuary syllabus for its Financial Mathematics course
[SOA]. Discussion in this section will be non-technical.
There is a formula – A(y) = P (1+ i)y – which allows
computation of
A(y) the accumulated value in a bank account after y
years, given the following three pieces of information:
P , the principle deposited at the beginning of the bank
account
i, the interest rate per year, used by the bank and
y, the number of years the money remains in the bank
The computational details of the formula need not concern us.
For purposes of discussion, we only need the fact that given an
initial deposit, a bank rate and a certain period, we can compute
the accumulated amount in the bank after y years.
1.3 Overview of Sections
Consistent with the above set of seven goals, an outline of the
rest of this paper is as follows:
Section 2 – Age and content independence: We show
that TSP methods are independent of age and
curriculum content. We explore three examples:
o (2.1) K-12: The multiplication example
already brought in section 1.
o (2.2) Technical / Mathematics: We apply
the TSP method to upper level university
mathematics courses.
o (2.3) Literature: We apply the TSP method
to reading/writing at the university level.
Section 3 – Challenging problems – Higher cognitive
skills: This section focuses on three items:
o (3.1) We show the consistency of TSP with
the Bloom taxonomy of teaching methods.
o (3.2) We cite recent brain research showing
that solving two-step problems involve
higher cognitive levels of the brain.
o (3.3) We show that TSP is consistent with
recommendations for advanced problem
writing.
Section 4 – Syllabus: The modern approach to
syllabus construction proposes proposes incorporating
assessment for learning (AFL), and specific learning
objectives (SPO) in the syllabus proper. We show
TSP consistent with SPO and AFL. Note: Throughout
the paper, although examples focus on two-step
problems they equally apply to multi-step problems.
Section 5 – Teaching to the test: We show that TSP
is similar to inquiry based teaching in science and
writing workshop teaching in literature. All three
methods result in challenging teaching, motivated
The following problems are all consistent with this one syllabus
item:
Traditional plug-in problem: I deposit 1000 in a bank
CD yielding 4% per annum for 5 years. How much
will I have in five years?
A Solve problem: How many years are needed for an
initial deposit of $1000 to double if the bank rate is
4% per year.
Sequential TSP: $1000 is deposited in a bank CD
yielding 2% for 3 years. At the end of the three-year
period, the accumulated value of the CD is deposited
in another bank CD that yields 5% for 4 years.
Compute the accumulated value at the end of 7 years.
Comparison TSP: A person loans $1000 and is
offered in return $100 a year, with a return of the
$1000 at the end of five years. Compute the annual
rate, i%, that would give an identical return on $1000
in five years.
Parallel TSP: A certain amount, deposited in a bank
CD yielding i% per year yields $1200 in y years. The
same amount when deposited in another CD yielding
2i% per year yields the same amount, $1200, in half
the time. Compute the amount needed to accumulate
$2000 in 2y years at rate 3i%.
212
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
paths of righteous people, but the paths of wicked
people will be lost. Develop this theme using the four
paragraph development methods of i) contrast, ii)
details, iii) consequence and iv) analogy.
2.3 College Literature
The purpose of this subsection is to show how TSP can be
incorporated in a (college) literature course. First, we recall
from section 3.2 two types of TSP: sequential and parallel:
Sequential: I deposit $1000 for 3 years at 2% and then
reinvest the proceeds for 4 years at 5%.
Parallel: I obtain $1200 in y years in CD #1 yielding
i%. But the same initial deposit yields $1200 in y/2
years in CD #2 at 2i%.
Actual Psalm
Prosperous is the
man who has not
followed wicked
advice, not stood
in sinner paths, nor
sat with scoffers
Rather, his desires
are for the law of
God; in His law he
meditates
continuously
He will be like a
tree planted on
water tributaries,
with
timely
sprouting of fruit,
with no withering
of leaves, and
everything he does
succeeds
Not so are the
wicked; rather they
are
like
chaff
pushed by the
wind
Development
method used
Contrastive
method:
The
righteous are not
wicked
Possible
student
version
Righteous people
differ from wicked
people
Developmental
Details: Righteous
yearns for Gods
law
Their interests are
in God’s law
Analogy
(Righteous like a
flourishing plant)
Righteous are like
a well-tuned car;
they travel to all
destinations
without
impediment.
Contrast: Wicked
are
not
like
righteous
Similarly,
the
wicked are not like
the righteous
Analogy: Wicked
like chaff
The wicked are
like old cars that
constantly break
down and do not
allow
timely
achievement
of
destinations.
The wicked do not
prosper in their
jobs or social life
One possible solution uses the following developmental ideas:
Development of righteous:
(Contrastive method) Not wicked
(Details) Interested in God’s law
Development of knows (God knows the righteous)
(Consequence) Righteous are prosperous
(Analogy) Like a flourishing tree
Development of lost
(Contrastive) Not like righteous
(Analogy) Like uprooted chaff
(Consequence) Lose court cases
Table 1 presents the actual Psalm, the Psalmist’s method of
development and a possible student solution to applying these
development methods. In reading Table 1, the actual Psalm may
be read vertically down column 1, the paragraph developmental
method may be found in column 2, while a student version
using these methods may be found by reading down column 3.
3. ARE TSP CHALLENGING ENOUGH?
Colleagues to whom I have informally presented the TSP idea
express surprise that examples such as the 2-step multiplication
example in section 1.1 (test item #2) are richer and more
challenging than traditional single step methods which may
involve modeling (Test items #1a,b). Accordingly, in this
section we address the following questions
Are two-step problems intrinsically more challenging
than plug-in problems?
Are their standards of challenging instruction with
which TSP are consistent?
Is there any psychological research confirming that
TSP is more challenging?
Are standards of writing advanced problems for
courses consistent with TSP?
3.1 The Bloom-Anderson Hierarchy
Benjamin Bloom [6] headed a group of psychologists who, in
the early fifties, proposed a 6-level taxonomy of learning skills
This taxonomy has been widely used. It was improved and
expanded in the nineties by Lorin Anderson [1,2,19].
Consequently, the Consequence
wicked will not
arise in court, nor
sinners in religious
communities
For God knows the Theme sentence
paths
of
the
righteous; but the
path of the wicked
will be lost.
Table 1: Summary of Psalmist (Column 1) and student (Column
3) approach to development of themes (Column 2) of Psalm 1.
The original six Bloom levels are knowledge, comprehension,
application, analysis, synthesis, evaluation. The new Anderson
levels are remembering, understanding, applying, analyzing,
evaluating, creating.
Using this taxonomy, we easily see that
Asking a student for the product of 8 x 7, is classified
as remembering , since the answer can be returned,
provided the student has memorized the
multiplication table.
Asking the student to compute total cost of buying
liquorice with different colors for each day of the
week requires understanding and application.
Contrastively, asking a student to take the product of
the number which when multiplied by 7 yields 56,
with itself, requires analysis. At the very least, the
student must break the problem into two component
Holism is a modern reading and writing method which seeks to
simultaneously apply multiple skills to a single story or essay.
The alternative to holism is a teaching of individual skills.
Consequently, holism illustrates a parallel multi-step approach.
We now present an example. Consider the following assessment
problem:
The theme of the first Psalm is that God knows the
213
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
problems.
4.1 Special Terms and Their Meanings
Syllabus: Syllabi are used for seven purposes which
can be summarized in three categories [27, 32].
o Motivational: Setting lofty but achievable
goals for students
o Structural: Indicating course content,
methods, evaluation and assessment
o Evidentiary: Creating course transparency
that facilitates discussions of tenure and
promotion, university accreditation, and
credit transfer.
There are other uses of syllabi, for example, the
syllabus may contain information on the instructor,
meeting place and times. In this section however, we
will focus on the motivational and structural aspects
of syllabi.
Evaluation: By evaluation we refer to terminal
evaluation of a student’s knowledge.
Assessment: By assessment we refer to in-progress
continuing measurable objectives which teachers and
students use to provide feedback and to modestly
adjust course instruction.
SLO – specific learning objectives: SLO refers to
performance tasks that a typical student probably
cannot perform prior to taking the class but can
perform after taking the class. The major attributes
allowing an SLO to become assessment are
o (i) measurability,
o (ii) usage of the SLO during the term rather
than solely on terminal tests and
o (iii) actually using the SLO during the term
for immediate feedback to students to
improve learning [4,5].
Test items / Test banks: These refer to specific
questions, relating to course material. Instructors can
typically create tests from test banks.
Thus despite its simplicity, TSP involves higher level learning
experiences than pure memorization problems.
3.2 Psychological Evidence – the Trailmaking Test
The trailmaking test is a simple two-part test with the following
parts.
Part A of the test, requires a person to connect 25
circles with randomly placed numbers between 1 and
25 in order. A correct response would be 1,2,3,4,….
Part B of the test requires connecting 25 circles with
randomly placed numbers and letters. A correct
response would be A,1,B,2,C,3…
As can be seen, Part A is a single step problem (enumerate
1,2,3…) while Part B is TSP (two-step), involving enumeration
of both letters and numbers.
Superficially, Part B, the TSP, does not appear that much
different than Part A. Yet the “scores” on the two parts – the
time required to complete the parts – are statistically
significantly different. In fact, and surprisingly, this trailmaking
test is routinely used in clinical settings to test for brain damage
and the possibility of recovery after stroke.
Clinicians theorize that Part B requires executive functions and
consequently tests higher-level brain activity [7, 10, 14, 30].
This suggests, by analogy, that the two-step multiplication
example of section 1.1 (test item #2) involves higher-level
cognitive functions then the single-step examples (test items
#1a,1b).
It would therefore be welcome to rigorously
statistically test improvements from using TSP; such
improvements should have validity, reliability and consistency.
3.3 The Problem Writing Literature
In response to requests for K-12 teachers to create challenging
education experiences, there has arisen a literature in recent
years describing what makes good problems [33] and how to
write “good” problems [9, 11].
4.2 Syllabi with AFL
While there is great deal of literature on how to write the
syllabus and what it should contain [25], there is very little
literature on why incorporation of certain features in a syllabus
makes it good [27].
Hendel [16] summarized the literature into five broad categories
of problem writing: plug-in, reversal, multi-step, comparison
and (sequential) iteration. Hendel shows that these five
categories apply uniformly to all content and age levels.
Contrastively, there is a rich literature on incorporating in
syllabi, AFL with its three key components – measurability,
continual use during term vs. one time terminal use on “the
final”, and prompt feedback. A review of roughly 250 papers
shows that AFL raises student achievement levels 40% - 70%
[4,5].
TSP corresponds to the categories multi-step, comparison and
iteration (iteration is technically multi-step rather than two
step). Examples of comparison and sequential TSP were
presented in section 2.2. Thus TSP is consistent with the recent
literature on writing good challenging problems.
3.4 Conclusion
This section reviewed the Bloom-Anderson Taxonomy, the
Trailmaking test, and the problem writing literature. These
measures of superiority suggest that TSP is instructionally
superior to single step problems. Statistical confirmation of this
suggestion would be welcome.
TSP is one method of AFL. Its chief virtue is that TSP is easily
implemented and content-independent:
It can be applied to any syllabus content
Training instructors to construct such problems is
relatively straightforward.
In section 5 we will show that TSP has a further
unique unusual feature – it allows teaching to the test
that is nevertheless pedagogically challenging.
4. ASSESSMENT AND SYLLABI
In this and the next section we show how TSP can be
incorporated into syllabi and used to create more challenging
test assessments. To facilitate discussion we 1st clarify the
meaning of terms, which have multiple meanings in the
literature:
5. TEACHING TO THE TEST
5.1 The Literature
The No Child Left Behind act (NCLB) [35] created national
214
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
and higher level learning.
standards and legislative pressure on schools to achieve those
standards. The effect of this was that many teachers of K-12
taught to the test. This took on various forms: e.g. i) focusing on
subjects tested on (typically math and English) and neglecting
other subjects (for example science and history); or ii) itemteaching (vs. curriculum teaching).
When teaching a university level financial mathematics course,
it is my personal practice to announce tests as follows: We are
having a test next week. To prepare for the test you should know
the derivation (or memorize) the following 10-20 formulae. You
should also know how to calculate these formulae on your
special financial mathematics calculators. The typical problems
will be two-step problems . While perfect scores do not require
a correct answer they do require a clear outlining of work, an
identification of component problems and an indication of how
the problem components integrate .
Not all research papers criticize teaching to the test. Some
research papers argue that standardized tests even if they
involve teaching to the test are good for students of poorer
ability who are economically disadvantaged [8,20].
Another group of research papers specifically advocate good
teaching practices that both improve teaching and improve
performance on standardized tests. Some research papers
simply advocate detailed methodologies to achieve a holistic
approach of good curriculum with commensurate tests [31].
This holistic approach takes on specific forms for certain
content areas: For example, some research papers advocate
inquiry based science teaching as a means of improving
teaching the test performance [21,22]; other papers advocate
writing workshops and such writing programs as 6+1 as
methods of improving teaching and testing [26]. For further
ideas on teaching to the test see [15,19,28] or [3,23,24,34].
6. COMMON CORE STATE STANDARDS
The Common Core State Standards (CCSS) Initiative is a stateled effort coordinated by the National Governors Association
Center for Best Practices (NGA Center) and the Council of
Chief State School Officers (CCSSO). The standards were
developed in collaboration with teachers, school administrators,
and experts, to provide a clear and consistent framework to
prepare children for college and the workforce. The standards
are informed by the highest, most effective models from states
across the country and countries around the world. The
standards include rigorous content and application of
knowledge through high-order skills. As of the writing of this
essay, 45 states have accepted the CCSS standards [34].
5.2 TSP and Teaching to the Test
Techniques such as TSP allow teaching to the test. Using the
multiplication example of section 1.1, consider the following
test-announcement scenarios of 3rd grade teachers:
o Scenario 1a: We are having a test next week. I
will test you on your knowledge of
multiplication. Typical problems will be, for
example, to calculate 8 x 7.
o Scenario 1b: We are having a test next week. I
will test you on your knowledge of
multiplication. Typical problems will require
you to produce thinking and physical models
whose solutions will require use of the
multiplication table.
o Scenario 2: We are having a test next week.
Typical problems will test you on your
knowledge to do two-step and multi-step
problems such as the example in section 1.1.
In mathematics for example, the standards stress not only
procedural skills but also conceptual understanding; they call on
students to practice applying mathematical ways of thinking to
real world issues and challenges; the standards emphasize
mathematical modeling, that is, choosing and using appropriate
mathematics and statistics to analyze empirical situations, to
understand them better, and to improve decisions.
Currently, the standards to not specifically advocate use of TSP.
However, TSP is consistent with several requirements for
inclusion in the standards: i) They involve higher-order skills,
ii) there is preliminary indication that they are evidence-based,
iii) they are clear and consistent, iv) they prepare children for
the higher-order executive functions they will need in college
and in the workplace.
We therefore advocate inclusion of TSP, along with the
inclusion of modeling, in the standards.
Analysis: Scenario 1a while not item teaching is nevertheless
teaching to the test. Passing the test simply requires
memorization of the multiplication table, a level 1 activity in the
Bloom-Anderson taxonomy. Everyone agrees that such an
approach is pedagogically unsatisfactory.
7. CONCLUSION
In this paper we have focused on TSP, two-step problems.
These problems are easily constructed but nevertheless are more
challenging; their solutions require higher level cognitive brain
functions. We showed that TSP could be incorporated into any
age level and any curriculum content. We showed that using
TSP was consistent with the educational learning hierarchies,
with modern psychological research, and with current theories
of syllabus construction. TSP can enhance the CCSS, core
standards, and can also be used to teach to the test while
broadening the curriculum.
Scenario 1b is a teaching to the test that broadens the
curriculum. The student can’t prepare for the test by rote
memorization. The student will be required, in each test
problem, to construct appropriate physical and thinking models.
Scenario 2 is also good teaching, since it broadens instead of
restricts the curriculum.
Both scenario 1b and scenario 2 teach to the test. However,
since the test is also testing higher-order analytic skills, there is
no way for the student to fully prepare for it. The students will
be required to creatively think on the test.
In light of its simplicity and specificity of use, we advocate
routinely incorporating TSP into syllabi and tests. We also
advocate instructing student teachers in its use. We would
encourage future standardized tests and future standards to
consider TSP as an essential component of implementing goals.
In summary TSP allows both focused curriculum and testing
development as well as instruction that fosters creative thinking
215
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[17] S. A. Josephson, “Design Your Tests to TEACH, Not Just
Test,” Education Digest, 66(3), 2000, p65.
8. REFERENCES
[18] D. R. Krathwohl, “A revision of bloom's taxonomy: An
overview,” Theory into Practice, 41(4), 2002, pp. 212-218.
[1] L. W. Anderson and D. R. Krathwohl (editors), Bloom's
taxonomy: a forty-year retrospective. Ninety-third yearbook
of the National Society for the Study of Education, Pt.2,
Chicago , IL.: University of Chicago Press, 1994.
[19]
L. Lambert, “Good teachers teach 'for' the test,”
Christian Science Monitor, 100(115), 2008, p8.
[2] L. W. Anderson and D. R. Krathwohl (editors), A
taxonomy for learning, teaching and assessing: A revision of
Bloom's Taxonomy of educational objectives: Complete
edition, New York : Longman, 2001.
[20] E. P. Lazar, “Speeding, terrorism, and teaching to the test,”
The Drama Review, 2006, pp 1029-1061.
[3] J. Ballis, “Victorian teachers told to teach to the test,”
Education, 91(1), 2010, p 22.
[21] T. Lord, C. Shelly, R. Zimmerman, “Putting Inquiry
Teaching to the Test: Enhancing Learning in College Botany,”
Journal of College Science Teaching, 36(7), 2007, pp 62-65.
[4] P. Black, C. Harrison, C. Lee, B. Marshall, and D. Wiliam,
“Working inside the black box: Assessment for learning in the
Classroom,” Phi Delta Kappan, Vol. 86 No. 1, 2004, pp. 8–21.
[22] S. Macpherson, “Teaching Biology or Teaching to the
Test? How High Stakes Standardized Tests Impact the Biology
Classroom,” International Journal of Learning, 16(7), 2009.
[5] P. Black and D. William, 1998. “Inside the black box:
Raising standards through classroom assessment,” Phi Delta
Kappan, Vol. 80 No. 2, 1998, pp. 139–148.
[23] M. D. Miller and A. E. Seraphim, “Can Test Scores
Remain Authentic When Teaching to the Test? Educational
Assessment. 1(2), 1993, p. 119.
[6] B. S. Bloom and D. R. Krathwohl, Taxonomy of
educational objectives: The classification of educational
goals, by a committee of college and university examiners.
Handbook 1: Cognitive domain, NY , Longmans, 1956.
[24] K. Maloney, “Teaching to the Test,”
Journal of Learning, 13(6), 2006, pp 19-25.
International
[25] L. B. Nilson, Teaching at its best: A research-based
guide for college instructors. SF, CA: Jossey-Bass, 2007.
[7] C. R. Bowie and P.D. Harvey, "Administration and
interpretation of the trail making test," Nature Protocols, Vol.
No. 5, 2006, pp. 2277–2281.
[26] NREL - Northwest Regional Educational Laboratory. “6
+1Traitwriting”,http://www.nwrel.org/assessment/about.php
?odelay=1&d=1, last retrieved Dec. 31, 2012.
[8] B. Boyle and J. Bragg, “How teaching to the test can
undermine performance,” Literacy Today, 58, 2009, pp. 25-27.
[27] J. Parkes and M. Harris, 2002. “The purposes of a
syllabus,” College Teaching Vol. 50, No. 2, 2002, pp. 55–61.
[9] Stephen I. Brown and Marion I. Walter, The Art of
Problem Posing, 3rd Edition, Mahwah, New Jersey: Lawrence
Erlbaum Associates, 2005
[28] W. J. Popham, "Teaching to the Test: An Expression to
Eliminate,” Educational Leadership, 62(3), 2004,pp 82-83.
[29] D. Posner, “What's Wrong with Teaching to the Test?” Phi
Delta Kappan, 85(10), 2004, p. 749.
[10] J. D. Corrigan and M. S. Hinkeldey, “Relationships
between parts A and B of the Trail Making Test,” J. Clin.
Psychol., Vol. 43, No. 4, 1987, pp. 402–409.
[30] R. M. Reitan, “Validity of the Trail Making test as an
indicator of organic brain damage,” Percept. Mot Skills, Vol.
8, 1958, pp. 271-276.
[11] Sandra Cresco and Nathalie Sinclair, “What makes a
Problem Mathematically Interesting? Inviting Prospective
Teachers to pose better problems”, Journal Math Teacher
Education, Vol. 11, 2008, pp. 395-415.
[31] P. Shank, “To Plan Good Instruction, Teach to the Test,”
Online Classroom, June 2006, pp 4-5.
[12] C. Ferguson , “Using the Revised Taxonomy to Plan and
Deliver Team- Taught, Integrated, Thematic Units,” Theory
into Practice, Vol. 41, No. 4, 2002, pp. 239-244.
[32] J. M. Slattery and J.F. Carlson, “Preparing an effective
syllabus.” College Teaching Vol. 53, No. 4, 2005, pp 159–164.
[33] Brian M. Stecher and Karen J. Mitchell, “Vermont
Teacher’s understanding of Mathematical Problem Solving and
Good Math Problems”, (Presentation) Annual Meeting of the
American Educational Research Association, SF, CA, 1995.
[13] K. Gallagher, “Why I Will Not Teach to the Test,”
Education Week, 30(12), 2010, pp. 26-29.
[14] E. A. Gaudi no and N. K. Squires, Construct validity in
the Trail Making Test: What makes Part B harder? J Clin. Exp.
Neuropsychology., 17 (4), 1995, pp. 529-535.
[34] The Standards, The Common Core State Standards,
http://www.CoreStandards.Org, (Last accessed Feb 28,2013)
[15] A. Greene and G. D. Melton, “Teaching With the Test, Not
to the Test,” Education Week, 26(45), 2007, p 30.
[35] U.S. Congress, No Child Left Behind Act of 2001, Public
Law, No. 107-110, 2002
[16] R. J. Hendel, “Five Basic Creative Problem-Extension
Methods for a Fixed Syllabus,” Journal of Education,
Informatics, and Cybernetics, 2(2), 2010, pp. 7-12
216
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
A Re-Conceptualisation of Information Literacy in Accordance with New
Social Media Contexts.
Agneta Lantz
Linköping University, SE-581 83 Linköping, SWEDEN
agneta.lantz@liu.se
and
Christina Brage
Linköping University, SE-581 83 Linköping, SWEDEN
christina.brage@liu.se
Social media has altered the information landscape
by expanding the flow of information
tremendously and has changed the way people
find, use, and experience information. The
interactivity of the new technology has in many
ways transformed the way we live. It has changed
the ways we communicate and share information
and we now tend to produce and communicate
through multiple modalities. Social media
environments are collaborative and free-flowing,
requiring a comprehensive understanding of
information in order to critically evaluate, share,
and produce content in multiple forms. Social
media is creating entirely new types of information
resources and new approaches to information
practices as well as new user expectations which
challenge traditional definitions of Information
Literacy.
ABSTRACT
The aim of this article is to review the need for a
re-conceptualisation of Information Literacy in
accordance with the development of new social
media contexts. A review of the literature indicates
that there is need to take the concept of
Transliteracy into consideration. Some major
challenges like the new information world, digital
risky behaviours, democratic challenges and
educational challenges will be discussed.
Keywords:
Information Literacy, Transliteracy, Social Media, EDemocracy, Curriculum Development.
1. INTRODUCTION
Information literacy instruction needs to focus on
helping people develop skills that will benefit them
in answering questions and to conduct informed
decision-making throughout their lives within the
new and changing information discourse. This
indicates that there’s a need for a reconceptualisation of the traditional view of
Information
Literacy
education,
generally
understood within the field of library and
information science, as well as a need for
curriculum development. One way to do this is to
incorporate and extend Information Literacy with
Transliteracy, meaning to be able to read, write
and interact across a range of platforms, tools and
media recognised as life skills for the digital age.
Transliteracy should be seen as a response to the
ongoing and emerging changes within the
Information and Communication Technology
sector.
When we talk about social media we normally talk
about networked digital media such as Facebook,
Twitter, blogs, and wikis. Social media enables
people to socialise, organise, learn, play, inform,
persuade, and influence the beliefs of others and
also to engage in commerce. In doing so, people
move from participation to collaboration and the
technologies that we possess today are powerful
engines for participation. When you participate,
you become an active citizen rather than simply a
passive consumer of what you see in adverts, what
you learn and what your government wants you to
believe. In doing so you become what is described
as a “Produser” which is a combination of producer
and user. The produser produce and use at the
same time [1].
But it is crucial to understand the rhetoric’s of
participation and the nature of technical and social
networks. Therefore we need well educated
citizens who freely can access information and who
2. SOCIAL MEDIA DEVELOPMENTS
217
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
knows how to communicate in concert with other
citizens in a productive and legal manner; people
who are information literate or transliterate,
meaning being able to communicate and interact
with multiple platforms. Furthermore we must
emphasise the skills needed in order to become a
critical consumer of information and recognise that
critical evaluation rests on a substantial body of
knowledge. Unfortunately young people are
seldom taught this and they often lack contextual
knowledge and critical evaluation skills according
to Livingstone and Bovill [2].
and when interacting in digital environments. It’s a
life skill for the digital age.
3. CHALLENGES OF THE NEW INFORMATION
WORLD
Research [3; 4; 5] into risky behaviors and online
safety makes clear that there are youth who face
risks and are harmed in connection to their
participation online. Especially sexual online
behaviours have been considered particularly
alarming according to Liau [3]. Some suggest that
adolescents who appear to engage in risky online
behaviours try to compensate for minimal social
interactions in their everyday lives. They may
nourish a hope while interacting with strangers
online that they will find new friends and new
social connections. Therefore, they are more
willing to take the risks associated with
communicating with strangers and even
sometimes place their personal and contact
information online. Sheldon [6] on the other hand
suggest that the Internet primarily benefits
extraverted people who have strong social skills
and who use Internet as another setting to interact
with
friends.
Since the start of the Internet there has been a
debate where some emphasised the potential for
empowerment while others suggested that the
Internet is the great destructor of civilization. After
the introduction of new social media technologies
the debate has moved on and now stresses the
worry regarding risky behaviours. There has been a
concern about the safety of these online spaces
and especially the risky behaviors in which youth
engage.
Producing, sharing and evaluating information are
critical activities in participatory Web 2.0
environments and we need a critical awareness of
the handling, organisation and utilisation of
information from various contexts. We have to
make sure that the students are able to keep
abreast with the cutting edge of emerging trends
behind the innovations of social media as well as
understanding the variety of ethical and juridical
issues
associated
with
social
media
communication. They also need to become
independent learners and they need to understand
the process of learning e.g. the metacognitive
aspect of learning. It involves students being able
to articulate the expectations of a new information
context, and also being able to reflect on their own
learning. We need to help students develop
strategies for dealing with new knowledge, and to
understand how arguments are put together.
5.
The concept of Information Literacy has assumed
new meanings and a new literacy is required. A
literacy that stress the ability to understand what
we see, to interpret what we experience, to
analyse what we are exposed to, and to evaluate
what we conclude against criteria that support
critical thinking.
DEMOCRATIC CHALLENGES
The Internet has more and more become a means
for including citizens in government policy making
and administrative processes [7; 8; 9]. EGovernment for instance is seen as a balanced
combination of electronic services and forms of
electronic participation in order to improve the
political dialogue in society. However, online
dialogues, using for example social media, still
seems to be inhibited not only by internet access
but also in terms of skills, abilities and motivation.
Within the field of the digital divide research,
access is seen as a first level divide while divide in
appropriate skills and motivation constitute a
second level divide [10].
4. DIGITAL RISKY BEHAVIOURS
The participatory nature of digital environments
requires skills such as being able to locate
appropriate material in social media streams as
well as being able to determine the validity of
information. The communication and participatory
aspects of the Internet requires a comprehensive
understanding of the flow and shifting nature of
information. Furthermore there is an increased
need of being able to recognise potential personal
safety and privacy risks when using the Internet
There is still more research focusing on access to
internet resources than on the second level divide
[11; 12]. Some studies have however examined the
effects of motivation to the use of internet
218
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
the personal realm, in the workplace and for
inclusion in the new information environment.
resources e.g. [11; 13]. Skills and motivation are
central in the conceptualisation of the digital divide
according to Norris [14]. There are also some
psychological studies examining Internet selfefficacy [15; 16] a field related to motivation and
skills. DiMaggio, Hargittai, Celeste and Shafer [17]
articulated the need for research on digital
inequalities. The concept of E-Democracy is still in
its infancy and so is E-Democracy research. There is
need for interdisciplinary studies with focus, not
only on the ICT aspects but also on the social and
behavioural dimensions of E-Democracy to learn
for the improvement of future E-Democratic
processes.
According to Johnson [19] social media, mobile
spaces and gaming are expected to influence the
future of education and it is essential to
experiment in these spaces to prepare for the
future. In order to acknowledge the full impact of
networked and digital media we must recognise
that the educational sector needs a whole new
way of looking at learning and teaching. Social
media must therefore be considered as a vital
component in any information literacy curriculum.
This because of the fact that we cannot
underestimate the huge impact of social
networking sites, blogs and wikis. We have to
admit that social media technologies and literacies
already shape the cognitive, social, and cultural
environments of the 21st century. The more social
media technologies become central in everyday
life, the more it is imperative to identify, and to
manage the development of the skills and abilities
required to use them. In everyday life, whether at
home or university, our students are engaged in
learning, collaboration and content creation. They
are increasingly relying on mobile devices, flexible
delivery of services and 24/7 access. As
information literacy instructors we must recognise
the need to be proactive in meeting the changing
needs of our patrons. We need to move toward a
more social approach in order to understand
information seeking behaviour, and to embrace
that there is a growing consensus that Information
Literacy is a social practice embedded in contexts
where shared meanings are constructed.
When considering the prospects for E-Democracy
inequality should be taken into account. Different
studies indicate that there is still a digital divide,
inequalities created by new information
technologies in society [11; 12]. A participation gap
exists that could lead to a political gap in society.
According to Weber and Murray [18, p. 104] there
is an indication that “the inequalities of education,
income, race, and gender that are present in
political participation among nonusers are
reflected in political participation among Internet
users. In short, with regard to politics, the digital
divide remains”.
st
E-Democracy centered education in the 21
century needs a curriculum that directs students to
master social media in order to become conscious
citizens fully able to act and react in new societal
arenas. An educated citizenry is acknowledged as
crucial to informed participation in a wellfunctioning democracy. Empowering citizens by
enhancing their information literacy skills altered
into a new kind of literacy is without doubt of great
importance in bridging the barrier of the secondlevel digital gap in order to improve E-Democracy
and the interactive dialogue in society. Our
democratic way of life depends more and more on
producing learners who know how to think and
how to solve problems within a diversified
information and communication world.
Already Prensky [20] among others, argued that
today’s students no longer are the people our
educational systems were designed to teach.
Therefore there might be a need for lecturers to
tailor their teaching to match the new skills, the
new learning styles, the experiences and
expectations of the students now entering the
universities. Philip [21] strongly emphasised that
technology will be an important part of the Net
Generation’s education and learning.
6. EDUCATIONAL CHALLENGES
The Net Generation is a label used to describe
today’s young adults born between 1980/1982,
(some authors even say 1977) and 1994, a
generation shaped by their experiences of having
grown up surrounded by all the “toys and tools of
the digital age” [20, p.1]. This generation’s
landscape of childhood is often connected to that
of Google and Facebook and other similar social
media.
Social media offers a potential for educators to
empower students to learn, lead and create with
technology, preparing them with skills and
competencies to support a cohesive framework for
future academic and career success. The
importance of these new skills requires a
refinement of existing competencies in order to
meet future demands in academic situations, in
219
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
literacies? In many countries traditional
information literacy standards are in place, but are
these good enough to support the way people
currently communicate across various media, how
they produce information in different formats, and
how they establish rapidly expanding social
networks? Traditional definitions of Information
Literacy do not consider collaborative media
production and the impact on learning, which is
why we need an expanded model with an
emphasis on active production and sharing of new
knowledge through technology. In our mind we
have to move towards Transliteracy and a reconceptualisation of the concept Information
Literacy.
Crittenden [22] argues that this wired generation is
more interested to participate in learning activities
that promote social interactions. As Oblinger and
Oblinger [23] point out, interaction is a key
element of learning. They also described the
essential differences in the way that the Net
Generation learns and they stated that the Net
Generation
is
more
comfortable
with
environments that are rich in multimedia images
[23]. These interactions are not only face to face
but are supplemented by the use of a range of ICT.
They are avid users of technology but recently
research has noted that they want more than
technology as a method to help them to learn [24].
If the classroom does not provide opportunities for
these kinds of interactions, it could happen that
the Net Generation will not come to class. To meet
the above demands of these new students,
universities might have to rethink how they
operate. The Net Generation, who now is entering
the
universities,
probably
has
learning
expectations, learning styles, and learning needs
different from past students, something that we
might call a new learning paradigm.
Understanding social media should form an
important part of Information Literacy as
mentioned above, but the term Transliteracy may
be more appropriate for understanding the full
range of media. Transliteracy refers to a set of
literacies needed to function in the Internet age
due to ubiquitous media, mobile devices and social
networking. According to Thomas et al [26]
Transliteracy is defined as "the ability to read, write
and interact across a range of platforms, tools and
media from signing and orality through
handwriting, print, TV, radio and film...".
Transliteracy calls for a change of perspective away
from print media towards a more unifying concept
that is relevant to reading, writing, interaction and
culture in the digital age. The essential idea here is
that Transliteracy is concerned with mapping
meaning across different media and not with
particular literacies about various media.
The use of social media could be a way of engaging
students who normally are uninterested in learning
the skills of information literacy and to teach them
to be discerning and critical of their sources. Jones
[25] explored the potential for using social
technology to support Information Literacy and she
argues that “online social technologies such as
Weblogs, wikis and social bookmarking can be
used to build fluency in the skills required to be
information literate.”
A new curriculum should be holistic so that
students understand the complexity of the
research process and approaches to learning in
higher education. The structure of a new
curriculum should be a departure from previous
teaching approaches in the library field, which are
often not embedded, holistic or even responsive to
students’ needs. It should be focusing on habits of
mind, developing appropriate attitudes and
behaviour in addition to skills.
In the report from 2007, The Future of Learning
Agents [27], the researchers stated that
“transliterating social and creative life implies new
social and political understandings as new relations
of creative production emerge. Collective
authorship and collective intelligence are modes of
active learning and discovery that present new
dynamics between individuals and groups with
respect to knowledge.”
7. MOVING ON FROM TRADITIONAL
INFORMATION LITERACY TOWARDS
TRANSLITERACY
Transliteracy is unique in combining democratizing
communication formats, questioning authority and
devaluating
hierarchical
structures
for
disseminating
information,
expressing
no
preference of one over the other, bridging the
digital divide and emphasizing the social
construction of meaning via diverse media.
The more ICT-skills become vital in order for
individuals to be able to participate in modern
society the more it is crucial to identify the issues
at stake. One important question out of many is to
figure out if we are dealing with one, many or new
In order to accomplish the above we have to figure
out how to provide learning experiences that
provide students with more ownership and
220
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Transliteracy is an inclusive concept which bridges
and connects past, present and future modalities
and changes with the invention of each new
media-type [26]. Through the re-conceptualisation
of Information Literacy into Transliteracy we
st
transfer the concept into the 21 century including
all aspects relevant to reading, writing, interaction
and culture. In other words all relevant literacies
are embedded.
increased participation in conversation for
learning. There is need to move towards
connectivism that is the process of creating
connections and developing a network. In the
literature according to Dunaway [28] Transliteracy
articulates pedagogical practices that reflect a
connectivist approach to Information Literacy
education.
Connectivism is to be seen as a learning theory for
the digital age, where thinking and emotions
influence each other. Learning is the process of
connecting specialized information sources, and
rests in a diversity of opinions. Currency is the
intent of all connectivist learning and learning is a
knowledge creation process – not only knowledge
consumption [29].
9.
REFERENCES
[1] A. Bruns, A. Produsage and Producerism, 2007,
http://www.P2pfoundation.net.
[2] S. Livingstone & M. Bovill (Eds.), Children and
their Changing Media Environment: A European
Comparative Study, Hillsdale, N.J.: Lawrence
Erlbaum, 2001.
8. CONCLUSIONS
What is clear is that technology is evidently a
factor that has changed the way we live,
communicate and share information and must be
integral to the development of a new curriculum
for information literacy education. As academic
librarians we must be aware of the developments
in this new field of Transliteracy to continually
assess and understand what impact it may have on
the ways we assist and interact with our patrons
and each other.
[3] A.K. Liau, A. Khoo & P.H. Ang, “Factors
influencing adolescents' engagement in risky
Internet behavior”, CyberPsychology & Behaviour,
Vol. 8, No. 2, 2005, pp. 513 - 520.
[4] S. Livingstone & L. Haddon, EU Kids Online:
Final report, London: London School of Economics,
2009.
At the moment Transliteracy in its initial form lacks
a pedagogical imperative probably because of the
newness and holistic nature of the concept. Still no
one, as far as we know, has managed to define the
necessary skills included in the concept maybe
because of the fact that the terminology is new
and the study of Transliteracy is still in the early
stages, but a definition is likely to evolve. Already
some librarians have tried to promote Transliteracy
but more work needs to be done to formalise what
relationship libraries will have with Transliteracy
according to Andretta [30]. Andretta [30] also
states that “the lack of familiarity with the
terminology does not mean that Transliteracy is
not integrated in the practice of information
professionals.”
[5] S. Livingstone & E.J. Helsper, “Taking risks when
communicating on the Internet: The role of offline
social-psychological factors in young people's
vulnerability to online risks”, Information,
Communication and Society Vol. 10, No. 5, 2007,
pp. 619-644.
[6] P. Sheldon, “The relationship between
unwillingness-to-communicate
and students’
Facebook use”, Journal of Media Psychology, Vol.
20, 2008, pp. 67-75
[7] B. Bimber, “Information and Political
Engagement in America: The Search for Effects of
Information Technology at the Individual Level”,
Political Research Quarterly, Vol. 54, No. 1, 2001,
pp. 53-67.
As more research is created in the field, librarians
can incorporate these new ideas into the ways
they assist patrons with accessing, understanding,
and producing information. The social aspects of
Transliteracy can enhance the workplace by
creating robust systems of knowledge sharing and
can enhance user experience by granting them a
role in the construction of information.
[8] L. Dahlberg, The Internet and Democratic
Discourse: Exploring the Prospects of Online
Deliberative Forums Extending the Public Sphere,
Information, Communication and Society, Vol. 4,
No. 4, 2001, pp. 615-633.
221
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[20] M. Prensky, “Digital Natives, Digital
Immigrants,” On the Horizon, Vol 9, No. 5, 2001.
[9] C. Weare, “The Internet and Democracy: The
Causal Links Between Technology and Politics”,
International Journal of Public Administration,
Vol. 25, 2002, pp. 659-692.
[21] D. Philip, “The Knowledge Building Paradigm:
A Model of Learning for Net Generation Students,”
Innovate, Vol 3, No. 5, 2007.
[10] E. Hargittai, “Second Level Digital Divide in
Internet Use: Mapping Differences I People’s
Online Skills”, First Monday, Vol. 7, No 4, 2002.
[22] S. Crittenden, “Silicon Daydreams: Digital
Pastimes of the Wired Generation”, Virginia.edu,
Vol 1, No. 2, 2002.
[11] P. Muhlberger, “Access, Skill, and Motivation
in
Online
Political
Discussion:
Testing
Cyberrealism”, In: Shane, P.M. (Ed.), Democracy
Online: Prospects for Political Renewal through
the Internet. London: Routledge, 2004, pp. 225237.
[12] P. Muhlberger, “Human Agency and the
Revitalization of the Public Sphere”, Political
Communication Vol. 22, No. 2, 2005, pp. 163–178.
[23] D.G. Oblinger & J.L. Oblinger (Eds.), Educating
the Net Generation, Washington, D.C.: Educause,
2005.
[24] G. Roberts, “Technology and Learning
Experiences of the Net Generation, In: D.G.
Oblinger & J.L. Oblinger (Eds.), Educating the Net
Generation, Washington, D.C.: Educause, 2005.
[13] J.E. Katz, R.E. Rice & P. Aspden, “The Internet,
1995-2000: Access, Civic Involvement, and Social
Interaction”, American Behavioral Scientist, Vol.
45, No. 3, 2001, pp. 405-419.
[25] K. Jones, “Connecting Social Technologies with
Information
Literacy,”
Journal
of
Web
Librarianship, Vol, 1, No. 4, 2007, pp. 67–80.
[14] P. Norris, Digital Divide: Civic Engagement,
Information Poverty, and the Internet Worldwide.
Cambridge, NY: Cambridge University Press, 2001.
[26] S. Thomas & C. Joseph, & J. Laccetti,
Transliteracy: Crossing Divides, First Monday, Vol.
12, No. 12, 2007.
[15] M.S. Eastin & R. LaRose, “Internet Self-Efficacy
and the Psychology of the Digital Divide”, Journal
of Computer-Mediated Communication, Vol. 6, 1,
2000.
[27] A. Saveri & M. Chwierut, The Future of
Learning Agents and Disruptive Innovation, The
Institute of the Future, California, 2007.
[28] M.K. Dunaway, “Connectivism: Learning
Theory and Pedagogical Practice for Networked
Information Landscapes, Reference Services
Review, Vol 39, No. 4, 2011, pp. 675-685.
[16] G. Torkzadeh, & T.P. Van Dyke, Development
and Validation of an Internet Self-Efficacy Scale.
Behaviour & Information Technology, Vol. 20, No.
4, 2001, pp. 275-280.
[29] G. Siemens, “Connectivism: A Learning Theory
for the Digital Age, International Journal of
Instructional Technology and Distance Learning,
Vol. 2 No. 1, 2005.
[17] P. DiMaggio, E. Hargittai, C. Celeste & S.
Shafer, “Digital inequality: From Unequal Access to
Differentiated Use”, In: Neckerman, K.M. (Ed.),
Social Inequality, New York: Russel Sage, 2004.
[30] S. Andretta, “Transliteracy: take a walk on the
wild side”, IFLA General Conference "Libraries
create futures: Building on cultural heritage",
Italy, 2009.
[18] L. Weber, & S. Murray, “Interactivity, equality,
and the Prospects for Electronic Democracy: A
Review”, In: Shane, P.M. (Ed.), Democracy Online:
Prospects for Political Renewal through the
Internet. London: Routledge, 2004.
[19] M. Johnson, “User Involvement, Social Media,
and Service Evolution”, In: Proceedings of the 43rd
Hawaii International Conference on System
Sciences, 2010. (HICSS-43 2010), 5-8 January 2010,
Koloa, HI, IEEE Computer Society, 2010.
222
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Demands concerning Educational Media: Integration of eco-friendly Transport in
Education and Training in Austria
Lisa-Maria PUTZ
Logistikum – Department for Traffic and Transport Logistics, University of Applied Sciences Upper
Austria
Steyr, 4400, Austria
and
Oliver SCHAUER
Logistikum – Department for Traffic and Transport Logistics, University of Applied Sciences Upper
Austria
Steyr, 4400, Austria
place. Since industry and society are currently hardly
willing to limit mobility or availability of goods,
international and national policy in Europe focus on a
shift to more eco-friendly transport modes. In fact, goals
are anchored in both the European transport policy, but
also in national action plans [1] [2].
ABSTRACT
The purpose of this paper is to provide evidence that the
number of teaching units dealing with eco-friendly
transport correlates with the provision of modern
educational material. This study presents first results of
the cooperation REWWay (Research and Education in
Inland Waterway Logistics), whose overall research
objective is to identify the current situation and future
ideas concerning contents about eco-friendly freight
transport and learning material used to educate it. This
study takes place at an Austrian University, which is
located in the middle of Europe. Qualitative research
methods such as expert interviews and focus groups are
conducted. Participants of this empiric research are
teachers at upper and vocational schools and university
lecturers for education and training of logistics. Results
suggest that more teaching units on sustainable transport
are able to support decisions which are in favor of ecofriendly alternatives.
One important issue to enhance the usage of rail and
ships - apart from financial and governmental incentives is knowledge concerning alternative transport modes. In
particular, knowledge gained through education and
training may be able to raise awareness for a more ecofriendly transportation [3] [4].
However, in Austria sustainable transport is given far low
priority which may be reflected in few teaching units
used for transport in general [5]. This lack of knowledge
could be one reason for the low usage of eco-friendly
transport modes in Austria (i.e. waterway and railway)
since decision makers choose well-known opportunities.
In fact, only 2 % of goods are transported on inland
waterway and 23 % are carried by rail [6].
Key words
Education,
eco-friendly
transportation,
transport
education, sustainable logistics, training, Europe
Due to the fact that the government and industry is trying
to enhance the modal split of inland waterway and
railway, transport education gains greater attention. Thus,
an important step to reach greenhouse gas emission goals
may be the increase of knowledge of eco-friendly
transport alternatives.
1. INTRODUCTION
Mobility is the engine which drives modern society. It is
an essential part of our everyday lives and something we
tend to take for granted. However, increasing mobility
causes ecological, economic and social difficulties.
2. OBJECTIVES
The aim of this research is to provide evidence that the
number of teaching units dealing with eco-friendly
transport correlates with the availability of modern
educational material. In particular, the priority for green
transport modes is expressed in number of teaching
hours. This contribution presents first results of the
cooperation REWWay (Research and Education in Inland
Waterway Logistics). The overall research objective is to
In fact, in Europe an increase of freight transport up to 40
% by 2030 and up to 80 % by 2050 is forecasted. To
achieve European greenhouse gas emission goals a 60 %
cut in emissions for the transport sector compared to
1990 level is obligatory [1].
To decrease emissions, either total transport volume must
be reduced or a shift to more eco-friendly transport
modes such as inland waterway or railway must take
223
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
identify the current situation and future ideas on inland
waterway freight transport.
about difficulties to find up-to-date and valuable
information [12] [13].
To demonstrate these assumptions qualitative empiric
research is applied. Expert interviews and focus groups
are conducted and participants’ statements are analyzed
by using qualitative empiric methods [9].
4. METHODOLOGY
The research question guiding this study is: Is it possible
to enhance number of teaching units concerning ecofriendly transport in Austria through the availability of
modern educational material?
3. LITERATURE REVIEW
The paper reports on the authors’ work on qualitative
research according to the concept of qualitative socialresearch using a three-step process [14] [15].
People around the world utilize modern information and
communication technologies. More and more people use
the World Wide Web and due to smartphones, the access
to information through internet is ubiquitous. Moreover,
the number of people who use web 2.0 tools such as
Wikis or Facebook is rising. The internet has enabled the
permanent access to information for people of all ages.
First, a data collection is conducted to identify secondary
and tertiary educational establishments which offer
teaching units/courses focusing on logistics in Austria. In
fact, curricula of Austrian schools are analyzed regarding
logistics contents. Relevant schools are classified due to
this curriculum analysis by using screening criteria.
Accordingly, the integration of the internet in classrooms
is necessary. Years ago the so called “ex-cathedra
teaching” or “lecture-and-test teaching” was the most
common teaching method. This method supports only
specific persons in their personal learning style.
However, this method is more and more outdated as
people demand modern educational media which
integrate interactive methods of learning. An active
involvement of students in the educational process
achieves better results than traditional “lecture-and-test”
methods [7]. Current developments promote selforganized learning because even complex tasks may be
solved efficiently. In addition, modern technologies can
definitely be incorporated. [8].
Second, after the identification of Austrian educational
institutions concentrating on logistics, they are divided
into three groups: secondary education, tertiary education
and vocational schools (dual system). Austrian vocational
schools combine ten weeks school per year with practical
training at a company. This dual system takes between
three to four years and ends with a diploma [16].
Universities offer both graduate and undergraduate
degrees in logistics.
Third, due to the lack of studies concerning education in
inland waterway in Austria and Europe, a qualitative
research approach is selected. Thus, empirical analysis of
two focus groups and six expert interviews were
conducted. The interviews are transcribed and a content
analysis including a comparative analysis is performed to
interpret these transcribed interviews [14].
In the 1970s, logistics as an area of study gained
popularity because of a rising demand of the industry for
logistics graduates and specialists. Currently, request for
logistics professionals is still expanding and as a result,
many schools and universities offer more logistics
courses [9]. Lancioni et al. (2001, p.744) emphasizes the
need for logistics education as follows: “A career in
logistics […] is one that all schools should provide for
their graduates”.
5. PARTICIPANTS
The research sample included lecturers at upper level
schools, vocational schools and universities focusing on
logistics in Austria.
Moreover, importance of logistics or transport education
strongly depends on governmental key areas [10].
Nevertheless, little research has been done in the area of
logistics education and even less in the field of
transportation education [11] [5].
First, Austrian education institutions which focus on
logistics are identified by means of interviews and
research. In order to collect institutions (concentrating on
logistics), criteria concerning the amount of logisticcontents are determined. Accordingly, vocational schools
offer an apprenticeship as a logistics manager, upper
schools offer possibilities for logistics-specialization and
universities also provide such logistic-specializations.
Furthermore, some universities operate particular
institutes for transport or logistics. In total, 34 institutions
are identified which focus on logistics and include
contents on transport management.
In Austria, teaching material for vocational and upper
school concerning inland waterway are rather limited. In
detail, contents in workbooks are restricted to few pages
and mostly, only basic information is provided and
contents are often outdated. Teaching material used at
universities highly depends on professors’ interests, since
most of them develop teaching material themselves.
Furthermore, an online learning platform dealing with
inland waterway and an extensive “Manual on Danube
Navigation” exist. Nevertheless, many trainers complain
Second, representatives of these 34 institutions are
contacted and invited to participate in focus groups or in
224
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
TABLE II
RANKING EDUCATIONAL MEDIA
expert interviews. 21 institutions participated in this
examination. Thus, the following results are a good
indicator for logistics and transport education in Austria.
Ranking
learning
material
Vocational
School
Upper
School
University &
research
1
films &
questions
presentation
slides
case studies
2
presentation
slides
teacher
training
field trips
The total amount of identified institutions and number of
institutions which did participate are presented in table 1.
3
case studies
case studies
external
lecturers
TABLE I
RESEARCH SAMPLE
4
field trips
films
presentation
slides
5
lecture notes
lecture notes
films &
questions
Finally, two focus groups and six expert interviews are
conducted. A total of 27 participants representing 21
different institutions are included in the research sample.
If more than one person from an institution participated
in this study multiple answers are excluded.
Results in Austria
Total number of
institutions
Investigated
institutions
Vocational
School
Upper
School
University
& research
3
13
18
3
8
10
Vocational schools: All three interviewed
institutions agreed on the fact that films are of
particularly high interest for this type of school. A film’s
length between five and maximum 20 minutes is
considered as appropriate to give students a better insight
into the topic. Additionally, films are a time-efficient
alternative to field trips. However, in order to ensure
students’ attention, questions concerning the film should
be provided before watching it.
Furthermore, teaching units mostly require literature
background which can be provided by useful and
appealing presentation slides. All three respondents
absolutely require presentation slides as an elementary
educational media.
Efficient ways to anchor information in students’ longterm memories are activities which demand active
involvement. Thus, comprehensive case studies are
mentioned by all three teachers as an effective learning
method.
6. RESULTS
The results of the expert interviews and the focus groups
indicate that few teaching units deal with the topic
transport in general. Whereas most of these units focus on
road only few describe and discuss eco-friendly
alternatives such as inland waterway or railway.
However, as this study demonstrates, teachers and
lecturers are willing to invest more time to teach topics
regarding green transport modes, if high quality learning
material is provided.
In Austria, the number of schools and universities which
offer a major in logistics has been rising particularly.
Some years ago only few programs focusing on logistics
existed. However, respondents claimed a lack of valuable
learning material dealing with railway or inland
waterway transport.
Upper schools: All eight institutions claimed
that appropriate structured presentation slides which can
be easily adapted and modified are highly important for a
successful teaching unit.
Due to the reason that trainers often record a lack of
knowledge on eco-friendly transport modes, they
appreciate an annual training for teachers. This training
should include basic knowledge, excursions and external
lecturers. All respondents absolutely require teacher
trainings.
Moreover, seven out of eight teachers whose major field
is logistics mentioned case studies as a highly efficient
way of teaching.
Educational media
Participants are questioned about their ideas related to the
design of educational media. A ranking presenting the
five most mentioned educational media by lecturers’ is
given in table 2.
Educational media can be divided into two groups:
literature and interactive material (Table II in italics).
Whereas presentation slides and lecturers notes can be
assigned to literature, films including questions, case
studies, teacher trainings, excursions, external lecturers
pertain to interactive material. As shown by table two,
most lecturers prefer interactive learning material.
Universities and research: Eight out of ten
interviewees agreed that case studies, field trips and
external lecturers are appropriate methods to educate on
eco-friendly transport modes.
Case studies which compare e.g. train, inland vessels and
trucks can be used to raise students’ awareness
concerning pollutions, costs and advantages and
disadvantages.
225
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
The human brain can more easily remember experiences
which may frequently be generated during field trips.
Students and lecturers get a unique insight in various
processes. Furthermore, discussions with on-site staff
talking about their experiences may enhance knowledge
of students as well as lecturers.
Lecturers appreciate lectures which are organized by
external experts since they often admit a lack of
knowledge. In fact, external lecturers are welcome
because they induce variety in courses and own
specialized knowledge.
beginning and one at the end of the focus groups.
Questions deal with numbers of teaching units and
importance of sustainable transport modes. The black
circles represent participants’ opinions at the beginning
and the grey circles represent opinions at the end.
ILLUSTRATION I
RESULT FOCUS GROUP UPPER SCHOOL
Analysis of the three groups’ results: Results
of this study show that ideas concerning design of
learning material are quite similar among the three
investigated groups.
18 out of total 21 institutions consider the use of case
studies as extremely useful since an active involvement
of students in the learning process is required. In detail,
case studies should integrate calculations and emission
values which compare trucks, inland waterway, sea
shipping and rails within an international setting.
Additionally, interviewed lecturers strongly support a use
of computers or haptic elements for case studies. These
instruments should definitely increase students’ interest.
The preparation of presentation slides is evaluated as
basic equipment for courses by 19 persons. At the
beginning of a course, a structured overview of the topic
is absolutely necessary to inspire students for a topic. In
addition, to attract students’ attention and interest, slides
need to be designed appealingly.
16 respondents argue that films create added value
through provision of accurate insights. In fact, one of the
respondents said: “Films really impress students – at all
ages”. Nevertheless, it has to be considered that films
should not be longer than 20 minutes because after this
time students’ attention decreases significantly.
Eleven out of 13 lecturers of vocational schools and
universities strongly support the integration of field trips
within curricula. A lecturer told about an experience at
the port of Hamburg (Germany): “It is really fascinating
to travel with a tourist boat next to a giant container ship
– every student was deeply impressed”. Teachers in
upper schools would appreciate more field trips but do
have little time resources for it.
The lack of lecturers’ knowledge could be the reason why
respondents strongly support teaching trainings, external
lecturers or field trips. Thus, it is definitely important to
provide lecturers with a list of trainings, external experts
and field trips in order to reduce barriers.
Focus group upper school: At the beginning of
the focus group, participants are asked to estimate the
current number of teaching units used for eco-friendly
transport on a scale from very little (0) to very much (10).
Afterwards, at the end they are questioned to estimate
number of teaching units, assuming that high-quality
learning material is available on the same scale. At the
beginning, three schools are located between 0 and 1, the
other four schools between 3 and 5. Afterwards, all
schools are placed between 3.5 and 7. In average, an
increase of 2.4 points is recorded. Results show a high
willingness to use more teaching units for sustainable
transport modes.
ILLUSTRATION II
RESULT FOCUS GROUP UNIVERSITY & RESEARCH
Focus group university and research: At the
beginning, participants are asked to estimate the current
importance of eco-friendly transport on a scale from very
little (0) to very much (10). At the end of the focus group
participants are questioned to estimate importance,
assuming that high-quality learning material is available
on the same scale. Whereas five institutions are located
between 0 and 3, two are situated at 7 and at 9.5. All
institutions show an increase of importance of 0.6 points
in average.
Total results: 14 out of 15 focus group
participants will use more time for eco-friendly transport
modes within their courses. However, a major difference
between the results of upper schools and universities
exists. Whereas results of upper schools show an average
increase of 2.4 points, universities’ results demonstrate an
average rise of 0.6.
5 out of 6 interviewed institutions also agree on the use of
more time for sustainable transport. In total, 20 out of 21
institutions assured that they will use more or the same
Availability of learning material and number of units
The lack of knowledge and a challenging access to
information on eco-friendly transport modes are the main
barriers the lecturers declared. In fact, lecturers do not
know where to search for (high-quality and current)
information, whom to ask about external lectures or
where to go for field trips. The following illustrations
show results of questions which are asked during the
focus groups. In detail, one question was positioned at the
226
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
time for sustainable transport modes if valuable learning
offerings are available. In detail, 18 institutions definitely
will spend more time when appropriate teaching material
is offered.
All respondents argue that more teaching units on
sustainable transport are able to support decisions which
are in favor of eco-friendly alternatives. As one
university professor stated “[…] more time used for
sustainable transport modes during education will bring
positive tendencies towards a modal shift in future”.
[1] European Commission (2011). WHITE PAPER Roadmap to a Single European Transport Area –
Towards a competitive and resource efficient transport
system. Brussels
[2] bmvit - Bundesministerium für Verkehr, Innovation
und Technologie (2012): Gesamtverkehrsplan für
Österreich. Wien
[3] H. Giesecke (2004). Einführung in die Pädagogik.
Juventa Verlag. Weinheim München.
7. CONCLUSIONS
This study provides strong evidence that a correlation
between the provision of high-quality learning material
and time spent on training concerning green transport
modes exists. High-quality teaching material is defined as
learning material which is developed according to
questioned professors’ and teachers’ ideas. Main barriers
which prevent lecturers from using more teaching units
are a lack of knowledge and the missing availability of
high-quality educational media.
[4] B. Gehlert, H. Pohlmann (2010). Praxis der
Unterrichtsvorbereitung. Bildungsverlag EINS GmbH,
Troisdorf
[5] A. Breinbauer et. al (2012): Empfehlungen für eine
nachhaltige Aus- und Weiterbildung im Intermodalen
Güterverkehr. Logotrans: Wien
[6]
Autorenteam
VPÖ
2025+.
(2009).
Verkehrsprognose Österreich 2025+ - Güterverkehr.
Wien: bmvit.
In this study, a first indicator concerning design of
educational media is presented since 21 out of 34
identified institutions participated in this study and the
majority suggests a high level of approval to the research
question.
In order to integrate more contents of green transport in
courses, five educational media are recommended: i)
presentation slides, ii) case studies, iii) films & questions,
iv) field trips and v) lecturers notes. Nevertheless,
frequently mentioned options do not consequently induce
a high didactic value.
[7] T. Byland (2011). Was ist moderner Unterricht?
http://bylandeducoaching.blogspot.co.at/search?q=moderner+unterric
ht. [Accessed on 03.01.2013]
[8] G.M. Kellar., B.E. Jennings, H.L. Sink, and R.A.,
Mundy (1995): Teaching Transportation with an
interactive Method. Journal of Business Logistics.
16(01), pp.251-279
[9] R. Lancioni, H. Forman and M.F. Smith (2001):
Logistics and supply chain education: Roadblocks and
challenges. International Journal of Physical
Distribution & Logistics Management, Vol. 31(10),
pp.733-745
To summarize, there is high evidence that high-quality
teaching material will be used by Austrian schools and
universities, with logistics focus, for their courses.
Moreover, teachers and professors will spend more time
on education and training regarding eco-friendly transport
modes.
[10] K.M. Ruppenthal (1998): Transport education in
Canada: a contrast. International Journal of Physical
Distribution & Logistics Management, Vol. 28(4),
pp.255-258
Although the authors made every possible effort to be
comprehensive in data gathering and to reduce bias that
may effect results, this study does suffer some
limitations. Due to the fact, that our research sample is
limited to the Austrian logistics education sector, some
other important aspects may be missing. Moreover, focus
groups and personal interviews often stimulate social
effects such as group pressure which may bias results.
Further research direction may investigate if frequently
mentioned education media have a high didactic value.
Another research direction would be to conduct a similar
investigation in other countries or regions to find
differences in lecturers’ preferred education media.
Nevertheless, comparability between different countries
is limited since curricula vary and thus, same criteria to
identify institutions which focus on logistics are not
applicable.
[11] Y.-C. J. Wu (2007): Contemporary logistics
education: an international perspective. International
Journal of Physical Distribution & Logistics
Management, Vol. 37(7), pp. 504-528
[12] via donau (2013). Manual on Danube Navigation.
Vienna: via donau.
[13] INeS (2012). Online learn platform – inland
waterway. Available at: http://www.ines-danube.info/.
[Accessed on 03.01.2013]
[14] P. Mayring (2010). Qualitative Inhaltsanalyse.
Weinheim. Beltz
8. REFERENCES
227
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[15] U. Flick (2007). Qualitative Sozialforschung: Eine
Einführung. Rowohlt-Taschenbuch-Verl.: Reinbek bei
Hamburg
[16] Ministry for Education, the Arts and Culture
(BMUKK) (2012). Definition of Austrians’ vocational
schools.
http://www.bmukk.gv.at/schulen/bw/bbs/berufsschulen.x
ml. [Accessed on 03.01.2013]
ACKNOWLEDGMENT
The authors would like to thank all focus group
participants and all persons which took part in the expert
interviews. Many thanks also to our colleagues for their
valuable time and resources.
228
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Enhancing Student Learning in STEM Disciplines
Ronald A. Styron, Jr., Ed.D.
Professor and Director of Quality Enhancement
Office of Academic Affairs, The University of South Alabama
Mobile, AL 36688, United States of America
ABSTRACT
higher order thinking, and collaborative skills found in TeamBased Learning, were incorporated into program and coursebased student learning outcomes. Team-Based Learning (TBL)
was selected as the pedagogical strategy to be implemented by
University instructors because of its utilization of application
activities based on critical thinking and collaboration. It has
been proven as an effective learning strategy applicable to
multiple disciplines including STEM [11, 12, 13].
The purpose of this research study was to collect data and draw
conclusions regarding the impact on student learning outcomes,
relative to critical thinking and collaboration, through the
utilization of Team-Based Learning Strategies in STEM classes.
The data will be used to make recommendations for university
administrators pertaining to the use of Team-Based Learning in
multiple disciplines, and also to help shape professional
development. The study took place at a university located in the
southern region of the United States. Participants will be
university professors and college students.
Student Learning Outcomes at the project level were
comprehensive and represented the broadest level of outcomes
contained within the project. Project outcomes served as the
framework for both program and common courses student
learning outcomes. Project outcomes included: 1) students will
achieve higher mastery levels of course content and real-world
application of the content, 2) students will develop higher levels
of skills in critical thinking, 3) students will develop higher
levels of collaborative skills, 4) students will have higher levels
of engagement, and 5) persistence in STEM courses will
increase. Common Course Outcomes were student-learning
outcomes expected in all courses regardless of content. These
outcomes were more specific than project outcomes, but broader
than student learning outcomes. Selected examples of programs
included Biomedical Sciences, Computer and Information
Sciences, Earth Sciences, Engineering and Sociology and
Anthropology. Common course outcomes included: 1) students
will be able to evaluate information by separating factual
information
from
inferences,
interpreting
numerical
relationships in graphs, understanding the limitations of
correlated data and evaluating evidence and identifying
inappropriate conclusions, 2) students will be able to synthesize
alternate versions of problems or issues by identifying
alternative interpretations for data or observations, identifying
new information that might help analyze hypothesis and
explaining how new information can change a problem, 3)
students will be able to base a conclusion or solution on
appropriately applied information by separating relevant
information from irrelevant information, integrating information
to solve problems, and learning and applying new information,
and 4) students will be able to effectively communicate ideas
relevant to the problem by leading and participating in group
discussion. Student Learning Course Outcomes are specific to
each STEM class and tailored to the curriculum of individual
classes. Student learning outcomes were designed around course
content and higher order thinking skills as defined by Bloom
[10]. In each STEM course, through the use of action verbs or
keywords, there were no less than 3-5 student learning outcomes
that incorporated higher-level thinking skills (Analysis,
Synthesis, Evaluation). Student learning outcomes addressing
knowledge, comprehension and application were utilized as
appropriate. The classes scheduled for project inclusion during
the first three years of the project include accounting,
anthropology, biology, biomedical sciences, cell biology and
neuroscience, chemical and bimolecular engineering, chemistry,
civil engineering, computer and information science, earth
Keywords: Critical Thinking, Collaboration, Engagement,
Student Learning Outcomes
INTRODUCTION
The quality enhancement plan is focused on improving student
learning outcomes in STEM courses. This will be accomplished
by increasing critical thinking and collaboration through the
utilization of Team-Based Learning instructional strategies. The
goal of the project is for students to achieve higher mastery
levels of course content and application through the
development of critical thinking and collaboration. The project
goal is aligned with the mission of the university to apply
knowledge in service to the constituents of the university as
citizens of a global community and with goal #1 of the
University’s strategic plan, “To build upon the academic quality
and learning environment of the University” [1].
There was broad-based involvement of constituents, students,
faculty, administrators, community members and alumni,
throughout the planning and implementation stages of the
project. These constituencies were involved in the management
and oversight of the project. Constituents provided feedback at
several public hearings and through various data collection
mechanisms. Representatives were also invited to serve on the
Leadership Team, the Concept Development and Selection
Committees, the Implementation Team and the Advisory
Council. During this process it was determined that student
needs were more critical in Science, Technology, Engineering,
and Mathematics (STEM) courses which then became the
criteria for selection of class participants.
STUDENT LEARNING OUTCOMES
Student learning outcomes were developed around the
integration of critical thinking and collaboration into course
content. Content acquisition and application was constructed
around the student’s ability to evaluate information, synthesize
alternate versions of problems or issues, base conclusions or
solutions on applied information, effectively communicate ideas
relevant to the problem and work together to develop solutions
to complex problems. Benjamin Bloom’s taxonomy [10] of
229
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
science, electrical and computer engineering, geology,
geography, mechanical engineering, nursing, pathology,
pharmacology, physician assistant, speech pathology and
statistics. Additional courses from mathematics, mathematics
education, physics, and science education will be added during
years 3 and 4 of the project for participation in years 4 and 5.
Participants
Participants included 6 university professors from 100, 200, 300
and 400 level STEM courses with a total student enrollment of
280 students. Class sizes ranged from 14 to 92.
Limitations
METHODOLOGY
This study was limited to a university located in the southern
region of the United States. The university is a major research
institution and has several research centers and institutes. It is an
urban, public, regional institution with a commitment to the
development of human capital through exemplary practices in
teaching, research and service to the community. The University
serves students who otherwise may not have had the opportunity
to pursue an undergraduate, graduate, or professional degree.
Current enrollment is approximately 15,000 students with 74%
enrolled full-time. Many students are Pell grant recipients, first
generation college students, and students of color.
Purpose of the Study
The purpose of this descriptive study was to collect data
regarding the effectiveness of the utilization of Team-Based
Learning strategies in STEM classes on student learning
outcomes related to critical thinking, collaboration, engagement
and persistence. Findings of this study will yield important
information pertaining to the influence of the utilization of
Team-Based Learning strategies on student learning outcomes
constructed around critical thinking and collaboration.
Hypothesis Statement
FINDINGS
Improved student critical thinking and collaboration into STEM
courses will lead to improved student-learning outcomes,
engagement and persistence.
There were 23 student-learning outcomes based on critical
thinking with target mastery levels developed for the six pilot
courses. Of these, mastery levels were reached on 73% of the
outcomes, 27% of the outcomes were not.
Research Questions
There were five research questions associated with the project
hypothesis and directly related to project goals. They consisted
of:
RQ1:
RQ2:
RQ3:
RQ4:
RQ5:
Are there higher mastery levels of student learning
outcomes in STEM courses where TBL instructional
strategies are used?
Are there higher levels of critical thinking skills
among students enrolled in STEM courses where TBL
instructional strategies are used?
Are there higher levels of collaborative skills among
students enrolled in STEM courses where TBL
instructional strategies are used?
Are there differences in student engagement among
students enrolled in STEM courses where TBL
instructional strategies are used?
Are there lower withdrawal rates among students
enrolled in STEM courses where TBL instructional
strategies are used?
Figure 1. Assessment target level mastery for pilot courses.
Of the 18 student-learning outcomes addressing analysis, 12
(75%) were reached, 4 (25%) were not reached, of the 3 studentlearning outcomes addressing synthesis, all (100%) were
achieved, and of the 4 student-learning outcomes addressing
evaluation, 1 (25%) was reached and 3 (75%) were not.
Assessments
Multiple formative and summative assessments were
administered during the term of the project. They included the
National Survey of Student Engagement (NSSE), courseembedded assessments created by the professors, student and
faculty satisfaction surveys based on the Baylor Value of Teams
Survey and The New Jersey Medical School Student Perceptions
of Team-Based Learning Survey, and peer reviews developed by
Team-Based Learning Collaborative. Data from the assessments
was utilized to help gauge improvement in mastery levels of
student learning outcomes including critical thinking and
collaborative skills.
Figure 2. Assessment target level mastery for pilot courses
disaggregated by analysis, synthesis and evaluation.
230
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Post-test scores were higher than pre-test scores for all 8 items
addressing critical thinking.
the semester prior to the study. The withdrawal rate dropped
from 5% to 4%.
Figure 3. Critical thinking item summary.
Figure 6. Withdrawal rates.
Post-test scores were higher than pre-test scores for the 10 of the
12 items addressing collaboration.
On a scale of 1 (strongly disagree) to 5 (strongly agree), faculty
responses were 4.33 when asked if the use of Team-Based
Learning strategies has helped increase student critical thinking
(Q2), responses were 4.5 when asked if the use of Team-Based
Learning helped improve student collaboration (Q3), responses
were 4.33 when asked if Team-Based Learning strategies helped
increase student engagement (Q4) and responses were 4.2 when
asked if utilization of Team-Based Learning had improved
attendance.
Figure 4. Collaboration summary.
Of the items addressing engagement, on a scale 1 (strongly
disagree) to 5 (strongly agree) 9 of the 10 items were scored at
3.5 or higher.
Figure 7. Faculty satisfaction survey results.
DISCUSSION
As demonstrated in the findings, the majority of mastery levels
were reached. When disaggregated by higher levels of cognition
including analysis, synthesis and evaluation, analysis and
synthesis mastery targets were reached, but evaluation was not.
Post-test scores of all items pertaining to critical thinking were
slightly higher than pre-test scores and 10 out of 12 post-test
items pertaining to collaboration were slightly higher than pretest scores. Of the items addressing engagement, on a scale 1
(strongly disagree) to 5 (strongly agree) 9 of the 10 items were
Figure 5. Engagement item summary.
Pilot courses were compared to identical courses taught during
231
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
scored at 3.5 or higher. Also, when compared to identical
courses offered during the previous semester by the same
instructor, pilot courses had a lower withdrawal rate. These
indicators suggest project merit so consequently, the plan will be
expanded and implemented across a wider range of classes to
include approximately 30 professors.
[7]
Based on feedback from professors and students involved in the
project, after their review of the pilot data, it was determined
that a few adjustments needed to be made to improve the quality
of the project. As a result next year (year one of the project)
fidelity of Implementation would be stressed using the TBL
Course Scorecard developed by Michaelsen and Sibley [14].
Fidelity of Implementation will be addressed to help reduce
confusion between the many forms of collaborative learning and
active learning strategies such as Team-Based Learning. The
format of the professional development sessions would be
reformat from one stand alone session per semester, to three
sessions including an introductory session at the beginning of
the semester to introduce the concept, a second session midsemester to discuss the application of the concept and necessary
adjustments, and a final concluding session at the end of the
semester. This format will give instructors time to practice the
new concepts gained during professional development sessions
and engage in collegial dialogue aimed at refinement.
Professions development would focus on course redesign.
Utilization of TBL in most cases requires instructors to
restructure their syllabus because of the emphasis on Backward
Design [9]. Coaching Teams composed of 3-4 professors from
similar disciplines would be created to facilitate professional
growth in an non-evaluative setting using Learning Walk
techniques [15]. Moreover, the Critical Thinking Assessment
Test, developed by Tennessee Tech University, a would be
added to provide addition project data related to critical thinking
competencies. This test is a nationally recognized valid and
reliable assessment and will be included in the data collection
portion of the project implemented during the next academic
year to ascertain the effectiveness of the project with the
modifications previously discussed.
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
University Mission Statement (2008). University of
South Alabama Long-Range Planning Goals and
Assessment. Retrieved from www.southalabama.edug
alsandobjectives.pdf.
Michaelsen, L. K., Knight, A. B., & Fink, L. D.
(2004). Team-Based Learning: A transformative use
of small groups in college teaching. Sterling, VA:
Stylus Publishing.
Dunaway, G. A. (2005). Adaptation of team learning
to an introductory graduate pharmacology course.
Teaching and Learning in Medicine, 17(1), 56-62.
Haidet, P., Morgan R. O., O’Malley K., Moran, B. J.,
& Richards B. F. (2005). A controlled trial of active
versus passive learning strategies in a large group
setting. Advanced Health Science Education Theory
and Practice, 9(1), 15-27.
Koles P., Nelson S., Stolfi A., Parmelee D., &
Destephen D. (2005). Active learning in a Year 2
pathology curriculum. Medical Education, 39(10),
1045-1055.
McInerney, M. J., & Fink, L. D. (2003). Team-based
learning enhances long-term retention and critical
232
thinking in an undergraduate microbial physiology
course. Journal of Microbiology Education, 4(68).
Retrieved from http://jmbe.asm.org/index.php/jmbe/ar
ticle/view/68/html_29.
Vasan, N. S., & DeFouw, D. (2005). Team learning in
a medical gross anatomy course. Medical Education,
39 (5), 439-513.
Zgheib, N. K., Simaan, J. A., & Sabra R. (2010).
Using Team-Based Learning to teach pharmacology to
second year medical students improves student
performance. Medical Teacher Journal, 32(2), 130150.
Wiggins, G., & McTighe, J. (2005). Understanding
by design. Arlington, VA: Association for Supervision
and Curriculum Development.
Bloom, B. S. (1956). Taxonomy of educational
objectives, handbook I: The cognitive domain. New
York, NY: David McKay Co Inc.
Clark, M., Nguyen, H., Bray, C., & Levine, R. (2008).
Team-Based Learning in an undergraduate nursing
course. Journal of Nursing Education, 47(3), 111-117.
Haberyan, A. (2007). Team-Based Learning in an
industrial/organizational psychology course. North
American Journal of Psychology, 9(1), 143-152.
Thompson, B., Schneider, V., Haidet, P., Levine, R.,
McMahon, K., Perkowski, L., & Richards, B. (2007).
Team-based learning at ten medical schools: two years
later. Medical Education, 41(3), 250–257.
Michaelsen, L. K. (2011). Three keys to using TeamBased Learning effectively. Retrieved from http://ww
w.missouriwestern.edu/appliedlearning/documents/3-k
eys_cardMichaelsen2011pdf.
Guilott, M., & Parker, G. (2012). A value added
decision: Learning about learning together. Outskirts
Press.
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Influence of Interpersonal Relationship in Class on the Motivation and
Effect of Blended e-Learning*
Dowming Yeh
Department of Software Engineering
National Kaohsiung Normal University
Kaohsiung, Taiwan
and
Min-kun Wu
Graduate Institute of Information & Computer Education
National Kaohsiung Normal University
Kaohsiung, Taiwan
adequate interaction for learning. These are all main
contributing factors for vigorous growth of e-Learning.
ABSTRACT
This study aims to explore the interrelationship between
interpersonal interaction in a class and the motivation and
effect of e-Learning. The interpersonal interaction in a class is
classified as teacher-student relationship and peer relationship.
This study is to find out whether different teacher-student
relationships and peer relationships impose influence on the
motivation and effect of e-Learning. This study is conducted by
first administering scales of teacher-student relationship and
peer relationship on students in quantified results. Next, an
interactive online course is designed, where online course
content and an online test to assess learning result are available.
All participating students receive the same online course. Two
classes of junior high students are selected as experimental
sample for participating in online course for a time period.
After the e-Learning session, students are required to take a test
after class and fill out scales of teacher-student relationship,
peer relationship, and learning motivation. After data analysis,
the result shows that interpersonal interaction between students
and the teachers significantly influences on students’ learning
motivation and effect.
E-Learning has become a trend in modern days, and is
frequently compared with traditional teaching. ELearning is a series of learning solutions delivered
through the Internet for enhancing knowledge and
performance [1]. Some scholars have reported that
development of e-Learning environment brings about the
following revolutions in learning: (1) venue of learning
changes from traditional classroom to the Internet; (2)
learners’ role in learning changes from passive to active;
(3) teacher’s role changes from instructor to facilitator; (4)
teaching activities emphasize collaborative learning; and
(5) content of teaching materials change from traditional
static textbook to interactive materials [2].
Other scholars believe that in the process of e-Learning, if
interactive tests are built in the webpage for
understanding students’ learning progress, then the
network will provide immediate feedback with calculated
scores and explanations to questions after students have
finished the tests and sent out the answers. This will
increase students’ learning motivation and achievement
[3]. Lin and Chen believe that “quality of Internet
access” is the major factor that influences students’
willingness to learn in an e-Learning environment [4].
“Network traffic jam that makes access difficult” and
“network connection interruption,” in particular, are key
factors that influence students’ e-Learning. This study
designs e-Learning materials according to the related
theories of e-Learning described above, and offer an
environment with good Internet access for students to
perform e-Learning, in order to prevent interferences
from other factors.
Keywords: Teacher-student relationship, peer relationship,
effect of e-Learning and learning motivation
1. INTRODUCTION
As information technology develops at high speed, its
applications in teaching become more and more common.
It has been now important research subjects that how may
information technology facilitate the creation of an ideal
environment for teaching. Among such facilitations,
education application on the Internet is a popular topic.
Diversified information sources in the Internet world are
able to deliver audio, image, video, text, and other
multimedia information to attract learners’ interest, and
therefore inspire learning of multiple subjects and provide
Some teachers adopted a blended learning model that
combines traditional classroom teaching and E-learning
systems [5]. In this model, a teacher may teach the first
This work was supported by the National Science Council, Republic of
China, under the grant number NSC- 96-2221-E-017-006-.
233
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
few sessions in a classroom. After the students have
established a general idea of the course, he can then
proceed to on-line teaching and interaction. Ideally, if we
can take the advantages both from classroom teaching
and e-Learning, the learning effect will be enhanced and
extended in a blended model [6] [7].
important reference for teachers who plan to set up eLearning website for a class and implement blended eLearning.
Issues about to be explored in this study are listed below:
(1) Whether different teacher-student relationship will
influence motivation of e-Learning? (2) Whether different
teacher-student relationship will influence effect of eLearning? (3) Whether different peer relationship will
influence motivation of e-Learning? (4) Whether different
peer relationship will influence effect of e-Learning?
Interaction model of online education websites, in fact,
differs from the interaction model of traditional
classroom teaching. It would be more appropriate that
development of online education website be planned in
connection with traditional teaching process in the initial
stage. In traditional education, students obtain knowledge
primarily through teachers who teach according to
textbooks in classroom setting. However, in the modern
society of information technology and knowledge
economy, students obtain knowledge through various
channels in addition to school textbooks; various
information media and the Internet offers information
sources that never run short. Students may enjoy more
flexible studying methods by selecting online courses
according to their own needs. In the environment of eLearning,
teacher-student
relationship
changes
accordingly. Teachers become learning partners of
students. Teachers and students may communicate and
learn from each other, and learning effect can be
enhanced.
2. INTERPERSONAL RELATIONSHIP
Various studies points out that the interpersonal
relationship and the learning attitude of students are
positively correlated [13] [14]. The interpersonal
relationship, including the teacher-student relationship,
influences significantly on the vigorousness of learning
attitude, and students with inferior relationships
compared to other students tend to have negative attitude
toward learning. Li concludes in his study that teacherstudent relationship in junior high school today is not
very ideal, but students with good relationship with
teachers have relatively better academic achievements
compared to others [15]. In addition, the correlation
among
teacher-student
relationships,
academic
performances, and deviant behaviors of students is
significant.
In a pure e-Learning, the interpersonal relationship may
not be a significant factor in learning satisfaction and
motivation. Factors influencing the learning effects of eLearning discussed in the literature do not cover
interpersonal relationship. According to priori research,
fifteen influencing factors have been identified, which fall
into six dimensions. These factors are learner prior
experience in e-Learning courses, learner attitude toward
the computers, learner computer anxiety, learner Internet
self-efficacy, and learner initial computer skills in learner
dimension; instructor response timeliness, and instructor
attitude toward e-Learning in instructor dimension; eLearning course flexibility, e-Learning course quality in
course dimension; technology quality, and Internet
quality in technology dimension; perceived usefulness,
and perceived ease of use in design dimension; diversity
in assessment, learner perceived interaction with others in
environmental dimension, respectively [8] [9] [10] [11]
[12]. In the blended setting where teachers and students
meet frequently, however, the interpersonal relationship
could be an influencing factor on learning effects as in the
traditional learning environments.
Teacher-student relationship consists of two major factors:
teachers and students. If teachers and students may
mutually respect and trust each other, then students’
learning progress may be accelerated and learning
efficiency may be enhanced in the process of teaching
[16]. Good teacher-student relationship may aid a warm
class atmosphere generated from it, and it would help
students in taking a positive learning attitude. An
invisible force is formed, which drives students’ initiative
to learn. Teaching will be greatly benefited if the learning
interest and motivation in students can be effectively
triggered.
Desevova and Verma discover in their study that position
within a peer group is significantly correlated with
academic achievement for high school students [17]. A
research of social behavior and social relation of high
school students and elementary students conducted by
Huang also suggests that scores of ethics, intelligence,
sports, and society are significantly and positively
correlated with students’ peer relationship [18].
This study intends to probe into influences of
interpersonal relationship, consisting of teacher-student
relationship and peer relationship, on students’ learning
motivation and the learning effect in a blended eLearning experimental environment, and to find out
whether interpersonal relationship imposes influence in a
blended e-Learning environment as a traditional teaching
environment. Influences of teacher-student relationship
and peer relationship on motivation and effect of eLearning are examined. Our results may serve as an
In addition to teacher-student relationship, interpersonal
relationship also includes peer relationship among
students. Good class atmosphere can be cultivated only
with good peer relationship and harmony among students.
In the activities of learning, it is inevitable that oral or
behavioral conflict or disagreement may occur, which
may lead to disputes in students’ interpersonal
relationship. How teachers relieve students’ emotion and
234
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
resolve disputes among students is very important in
managing a class. Experience of peer interaction differs
from parent-child relationship in family and teacherstudent interaction. Students may explore their own
personality characters through such experience, and make
appropriate adjustment to their own shortfalls for
adopting future life in the society. Such experience also
has greatly influences learning effects in a class and
emotional control in a group throughout school years of a
student. In a learning community, life experience is
participated and developed by every individual member.
Fellow students provide opportunities for an individual in
collaborative learning. These factors may enhance
development of a student both physically and
psychologically, and allow him/her to learn how to adopt
in a community..
learning motivation is conducted after the session.
Learning effect is assessed according to students’ scores
of e-Learning. To prevent influence from different online
courses on experiment results, content of the online
course is fixed.
This study first constructed an e-Learning website with
focus on junior high school students, and conducted a
questionnaire survey. Pre-test and post-test of the
questionnaire survey were conducted, and the total time
of the experiment lasted for one month. After screening
the data, experimental data from total 74 students was
acquired, on which data analysis and research are
conducted.
The measurement scales on teacher-student relationship,
peer-relationship, and learning motivation developed in
this study are based on the literature and related theories,
and the Cronbach index is used to test level of
confidence. The results of confidence test are listed in
Table I. Statistic methods used in this study include:
factor analysis on consistency and level of confidence in
the scales, test of level of confidence. Pearson productmoment correlation, paired t-test and regression analysis
are used for data analysis.
3. RESEARCH DESIGN
Based on the reference literature, a research model is
formed in Fig. 1 and the following hypotheses are
proposed:
Teacher-student
relationship
Learning Motivation
TABLE I.
Concept
Peer
Relationship
Teacher-student
relationship
Peer relationship
Learning motivation
Learning Effect
RESULTS OF CONFIDENCE TEST
No. of
Questionnaire
19
5-point
Level of
Confidence
0.9042
20
19
5-point
5-point
0.8966
0.9106
Scale
Fig. 1. Research model
Hypothesis 1: Teacher-student relationship influences on
learning motivation in blended e-Learning.
4. RESULT ANALYSIS AND DISCUSSION
Hypothesis 2: Peer relationship influences on learning
motivation in blended e-Learning.
The research purpose of this study is to validate the
research model. The model consists of 4 variables:
teacher-student relationship, peer relationship, learning
motivation and learning effect. This paper adopts the
statistics methods aforesaid to conduct data analysis, and
all of the hypotheses proposed in this study are tested and
discussed according to the results of data analysis. This
study adopts regression analysis to validate the research
model. Results of the tests are described below.
Hypothesis 3: Teacher-student relationship influences on
learning effect in blended e-Learning.
Hypothesis 4: Peer relationship influences on learning
effect in blended e-Learning.
Hypothesis 5: Learning motivation influences on learning
effect in blended e-Learning.
The research scope of the study is to explore the influence
of students’ cognition of their teacher-student relationship
and their peer relationship on learning motivation and
learning effect of online course. Therefore, there are two
independent variables in the research: teacher-student
relationship and peer relationship. Quantified parameters
for teacher-student relationship and peer relationship are
obtained through measurement scales on teacher-student
relationship and peer relationship. Dependent variables
are learning motivation and learning effect. Learning
motivation is also quantified parameters obtained through
a measurement scale of students’ learning motivation.
Surveys for interpersonal relationships are conducted
before the e-Learning session, while the survey for
Result of regression analysis
It can be observed from Table II that the teacher-student
relationship are highly correlated to learning motivation
and learning effect, suggesting that the interpersonal
relationship between students and the teachers who
implement online course has significant influence on the
result and willingness of e-Learning. Peer relationship is
significantly correlated to learning effect, but not to
learning motivation, which suggests that peer relationship
among students has little influence on learning motivation
of e-Learning.
235
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
TABLE II.
online course, the better the students’ results of online
course will be.
PEARSON CORRELATION COEFFICIENT FOR RESEARCH
VARIABLES
TeacherPeer
Learning
student
relationship motivation
relationship
Teacher-student
relationship
1.000
Peer relationship
0.337*
0.436***
1.000
Learning
motivation
Learning
effect
Effect of e-Learning
0.369*
1.000
0.446***
Predictor
variables
1.000
In Table III, relationship between independent variables
and dependent variables is explained by significance of
regression coefficients. The test of regression coefficient
reveals that teacher-student relationship has significant
influence on motivation of e-Learning that the P-value of
regression coefficient reaches a significant level of 0.001.
Peer relationship, on the contrary, shows a different result
that its P-value is 0.686; suggesting peer relationship has
little influence on the motivation of e-Learning. Teacherstudent relationship has positive influence on motivation
of e-Learning. That is, the more positive about the
judgment or impression that students perceive about the
teachers who implement the online course, the stronger
the students’ motive to participate in online course.
F-Value
0.420
0.000
Teacherstudent
relationship
3.548 0.001** 1.128
0.048
0.406
2
Adj. R
P-Value
0.136
1.555
0.125
Adj. Square
P-Value
1.128
0.543
0.000
The two standardized regression coefficients of the two
predictor variables for learning motivation are 0.420 ***
and 0.48 N.S respectively, and the other two for learning
effect are 0.689*** and 0.136 N.S respectively. Among
these, the path coefficients of motivation and effect of
learning with peer relationship are not significant. Based
on the above analysis, the research model is shown in Fig.
2.
Non-standardized Standardized
coefficients
regression
T-Value P-Value VIF
coefficients
B Std. Error
Beta
5.631
0.867
7.858 0.000*** 1.128
Discussions
The path coefficients of the path analysis diagram by the
researcher are the values of standardized regression
coefficients (Beta distribution), with the effect and
motivation of learning being dependent variables, and
teacher-student relationship and peer relationship being
predictor variables.
SUMMARY OF MULTIPLE REGRESSION ANALYSIS OF
MOTIVATION OF E-LEARNING
Constant
35.083 6.230
Teacher-student
0.250 0.071
relationship
Peer
0.032 0.080
relationship
2
R
0.192
F-Value
7.742
40.850
0.168
0.689
*** p<0.001,** p<0.01,* p<0.05
Motivation of E-Learning
Predictor
Variables
Non-standardized Standardized
coefficients
regression
TP-Value VIF
coefficients Value
B
Std. Error
Beta
Constant
1.360 8.107
Teacher-student
0.722 0.092
relationship
Peer
0.163 0.105
relationship
2
R
0.557
*** p<0.001,** p<0.01,* p<0.05
TABLE III.
SUMMARY OF MULTIPLE REGRESSION ANALYSIS OF
EFFECT OF E-LEARNING
0.735***
0.190
Learning effect
TABLE IV.
.420***
Learning
motivation
0.686 1.128
0.168
0.001
.627***
.048
*** p<0.001,** p<0.01,* p<0.05
Peer
relationship
In Table IV, relationship between independent variables
and dependent variables are explained by significance of
regression coefficients. The regression coefficients test
of the two independent variables suggests that teacherstudent relationship has significant influence on the
effect of e-Learning, that its P-value reaches a
significance of 0.000.
.129
Effect of eLearning
Fig. 2. Path analysis result
It can be observed from the path coefficients of the path
analysis diagram above, that on the influence path for
effect of e-Learning, there is only one significant path,
which is teacher-student relationship. On the influence
path for learning motivation, there is, similarly only one
significant path, which is teacher-student relationship.
This suggests the fundamental influence of teacherstudent relationship in this study. Based on the
Peer relationship, on the contrary, shows a different
result; its P-Value is 0.125, suggesting that peer
relationship has little influence on the effect of eLearning. Teacher-student relationship has significant
positive influence on the effect of e-Learning. That is,
the more positive the judgment or impression those
students perceive about the teacher who implement
236
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
experiment parameters, the adjusted model is illustrated
in Fig. 3.
teacher-student relationship, the stronger the motivation.
This study finds that peer relationship has no significant
correlation with learning motivation; students with good
peer relationship do not necessarily have stronger
learning motivation.
Result of research hypotheses
Based on the above results, the results of substantiation
for the hypothesis proposed in this study are summarized
in Table 5.
Teacherstudent
relationship
.436***
REFERENCES
Learning
motivation
[1]
.735***
Effect of eLearning
[2]
[3]
Fig. 3. Adjusted model
[4]
TABLE V.
HYPOTHESES VERIFICATION
Hypotheses
Result of substantiation
Hypothesis 1
Accepted
[5]
[6]
Hypothesis 2
Rejected
[7]
Hypothesis 3
Accepted
[8]
Hypothesis 4
Rejected
[9]
[10]
5. FINDINGS AND CONCLUSIONS
After completion of the experiment, the study finds that
many domestic and international studies suggest that
teacher-student relationship has significant influence on
the effect of face-to-face teaching in traditional school
education. But even in online education, interpersonal
interaction between students and the teachers who
construct the online course website still has very
significant influence on students’ learning effect.
Influence of peer relationship on learning effect is only
partially relevant. However, this study discovers that
implementation of online course enhances both teacherstudent relationship and peer relationship.
[11]
[12]
[13]
[14]
Many studies suggest that teacher-student relationship in
traditional school education has influence on students’
learning motivation. This study discovers that teacherstudent relationship has great influence on students’
learning motivation in online course as well; the better the
[15]
237
D. Rigas and M. Sallam, “Multimodal E-learning On Note-taking:
A User Satisfaction Perspective.” Proceedings of the 9th WSEAS
international conference on Software engineering parallel and
distributed systems SEPADS 10, 2010, pp. 228-231.
T.M. Connolly and M. Stansfield,
“Using Interactive
Technologies in Teaching an Online Information Systems
Course.” Proceedings of the 2006 Informing Science and IT
Education Joint Conference, 2006, pp. 49-60.
S.P. Fredericksen, E. Pickett, A.W. Pelz, and K. Swan, “Measures
of learning effectiveness in the SUNY Learning Network.” In J.
Bourne & J. Moore (Eds) Online Education: Proceedings of the
2000 Sloan Summer Workshop on Asynchronous Learning
Networks, Volume 3. Needham, MA: Sloan-C Press, 2001.
G. Lin and N. Chen, “Learning problems in network university
(in Chinese),” proceedings of Global Chinese Conference on
Computers in Education, 2001.
D. Yeh, C. Lee, and P.-C. Sun, “The Analysis of Learning
Records and Learning Effect in Blended e-Learning,” Journal of
Information Science and Engineering, Vol. 21 , No. 5., 2005,
pp.973-984.
B.-C. Lee, J.-O. Yoon, and I. Lee, “Learners' acceptance of elearning in South Korea: Theories and results.” Computers and
Education, 53(4), 2009, pp. 1320-1329.
D. Zhang, J.L. Zhao, L. Zhou, and J.F. Nunamaker, “Can elearning replace classroom learning?” Commun. ACM 47, 5,
2004, pp. 75-79.
J.B. Arbaugh and R. Duray, “Technological and structural
characteristics, student learning and satisfaction with web-based
courses: an Exploratory study of two on-line MBA programs.”
Management Learning 33, 2002, pp. 331-347.
N. Jahng, D. Krug, and Z. Zhang, “Student achievement in online
distance education compared to face-to-face education.”
European Journal of Open, Distance and E-Learning, I, 2007.
H. Kanuka and N. Nocente, “Exploring the effects of personality
type on perceived satisfaction with web-based learning in
continuing professional development.” Distance Education 24,
2003, pp. 227-245.
S.H. Lau and P.C. Woods, “An investigation of user perceptions
and attitudes towards learning objects.” British Journal of
Educational Technology, 39(4), 2008, pp. 685–699.
P.-C. Sun, R. J. Tsai, G. Finger, Y.-Y. Chen, and D. Yeh, “What
drives a successful e-learning? An empirical investigation of the
critical factors influencing learner satisfaction.” Computers &
Education, 50(4), 2008, pp. 1183–1202.
D. Solomon, V. Battistich, M. Watson, E. Schaps, C. Lewis, “A
six-district study of educational change: direct and mediated
effects of the Child Development Project.” Soc Psychol Educ.
2000; 4: pp. 3-51.
J.A Durlak, R.P. Weissberg, A.B. Dymnicki, R.D. Taylor, K.B.
Schellinger, “The impact of enhancing students’ social and
emotional learning: a meta-analysis of school-based universal
interventions.” Child Dev. 2011;82(1), pp. 405–43.
W. Li “The study of academic credits, deviation behavior, and
relationship of teachers and students for Junior middle school
students” (in Chinese), Humanistic Education Journal, Vol. 56,
1994, pp. 75-103.
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[16] A.M. Klem and J.P. Connell, “Relationships Matter: Linking
Teacher Support to Student Engagement and Achievement,”
Journal of School Health, 2004, Vol. 74, No. 7, pp. 262-273.
[17] P. Desevova and P. Verma, “Sociometric status as related to
achievement, anxiety, and intelligence.” Psychological abstracts,
61,1979, pp.365.
[18] D. Huang, “Factors influencing social behavior and social
relationship of students in primary and junior high schools” (in
Chinese), PhD dissertation, Graduate Institute of Education,
National Chengchi University, 1988.
238
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Capability of Students (Candidates) to Apply E-learning Knowledge
and Skills in Real World Based on Accreditation Requirements
Saleh Mohammed Aloteawi, Ph. D.
King Saud University, Riyadh, Saudi Arabia
College of Education, Instructional Technology Department
Standard that focused on e-learning tools and their integration,
which was credited by NCATE, as well as, Conceptual
Framework of the College of Education that asserted all
students (candidates) had to obtain knowledge and skills of elearning through learning and practices in the College of
Education. Thus, some students (candidates) would have
graduated from College of Education and have not met elearning requirements that part of IRTE adopts NCATE unite
standards.
Abstract
The integration of e-learning in educational
environments required that all students (candidates) after
graduation from College of Education at King Saud University
in Saudi Arabia were able to apply their knowledge, skills, and
experiences in real world in order to meet the demands of
society needs. The findings revealed that there were some
students (candidates) who said "I do know" or "strongly
disagree and disagree" with all questionaire statements in all
departments. Consequently, the results have not met the ISTE
Keywords: Candidate, E-learning, NCATE, IRTE, ISTE.
1. INTRODUCTION
E-learning is a new innovation in the third millennium
that supports educational environments. It leads educational
institutions to improve their outputs quality, and meet society
demands.
In fact, students (candidates) should obtain
knowledge and skills of e-learning through their study and
practice in the colleges of education, as well as, they are able to
think how to apply them in educational settings in the future.
Accreditation organizations that evaluate the colleges of
education focus on integrating e-learning through learning and
teaching processes. Indeed, it is a required element for the
colleges of education to be accredited. Twomey, Shamburg and
Zieger (2008) asserted that students in the college of education
are the axis diffusion of e-learning in the future when they
practice it in real world. In the current century e-learning is
imperative in K-12, and its applications are required with high
quality outputs in the colleges of education. They confirmed
that "preparing effective candidates is one of the most important
responsibilities of the colleges and universities" (p. 1, 2008).
The innovation of e-learning is growing rapidly from
year to another in the last ten years that required universities
and colleges of education to develop strategies that ensure
infuse technology in learning environments accordingly (WilenDaugenti, 2009). Thus, Bonk (2009) designated that technology
has positive impact on learning and teaching, indeed it is the
bedrock of changing educational environments.
The National Council for the Accreditation of Teacher
Education (NCATE, 2012) constructed unit standards in 2008,
which is called the standards of excellence in teacher
preparation, which concentrated on integrating technology tools
in learning and teaching in the educational setting throughout
the unit’s standards. NCATE (2012) asserted that students
(candidates) must acquire knowledge and skills of e-learning,
and infuse them to facilitate and construct learning and curricula
in the colleges of education, which are imperative to maintain
intellect which participates in the real world applications.
Problem Statement
College of Education in King Saud University in Saudi Arabia
(2013) announced on its website that it has received a
recognition seals from The Center of Quality Assurance In
International Education (QA, 2013) that adopts The National
Council for the Accreditation of Teacher Education (NCATE)
unite standards that focuses on the excellence in teacher
preparation. In fact, a part of unite standards concentrated on
incorporating technologies, with learning environments,
constantly, to make students (candidates) able to integrate elearning tools into curricula, research and interaction among
them during their study at the Colleges of Education. In fact,
QA (2013)was Mentioned to include a center that focuses on
teacher process evaluation and quality assurance of institutions,
which is called International Recognition in Teacher Education
(IRTE) that emphasizes on e-learning as part of conceptual
framework. It provides international educational recognition.
In addition to that, the College of Education has developed the
conceptual framework based on the requirements of NCATE
some of these requirements benefit and support the e-learning in
educational environments. As well as, College of Education
(2009, p. 11) said "… professional educators who are graduates
of the College of Education at King Saud University should
have [ten competences]", one of those is "they use technology
and integrate it in their professional practices"(p. 12). Oigara
and Wallace (2012) reported that:
Schools of Education must continue to
collaborate with and provide support to
partnership schools through the preparation
of teacher candidates…and to ensure that
teacher candidates are placed with mentor
teachers' proficient in the use of technology
for instruction with the
ultimate goal of improving students learning
in our K-12 schools (p. 311).
239
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
or advanced preparation of teachers, teachers continuing their
professional development, or other school professionals.
Candidates are distinguished from students in P-12 schools
(2008, p. 85).
Research questions
1.
2.
Is there a significant difference in abilities in integrating
knowledge and skills of e-learning in educational setting
toward (candidates) students' majors (Islamic studies,
Special Education, Art Education, Physical Education, and
Psychology).
What are (candidates) students' perceptions abilities in
integrating knowledge and skills of e-leaning in
educational setting knowledge?
2. LITERATURE REVIEW
Vitality of technology standards
Twomey, Shamburg, and Zieger (2006) said that
International Society for Technology in Education (ISTE) has
created technology standards that were accredited by NCAT,
which were facilitated to incorporate technology in learning and
teaching. Also, ISTE Sought to gather data and feedback about
programs in colleges of education and candidates, after that, it
started to analyses them to derive results that lead to maintain
quality of candidate and programs. Consequently, Twomey,
Shamburg, and Zieger (2006) asserted that "For college [of
education] and university programs that prepare these
candidates, adherence to these standards is proven through
accreditation"(p.1). Furthermore ISTE (2010) developed a
standard that lead to incorporate technology into teaching, is
learning and curriculum in order to support students
(Candidates) learning. The standard encouraged to be used in
various methods, which are:
1. Facilitate technology – enhance experiences that address
content standards and (Candidates) students' technology
standards.
2. Use technology to support learner-centered strategies that
address the diverse needs of (Candidates) students.
3. Apply technology to demonstrate (Candidates) students'
higher-order skills and creativity.
4. Manage (Candidates) students learning activities in a
technology-enhanced environment.
5. Use current research and district/regional/state/national
content and technology standards to build lessons and unit
of instruction (2010, p. 2).
Research goals
1.
2.
To know the differences of candidates' skills and
knowledge of e-learning based on their majors.
To know students' perceptions toward knowledge and
skills of e-learning.
Purpose of the Research
The purpose of the research was to know whether or
not students (candidates) acquire knowledge and skills through
their study and practice in the College of Education, and if they
are able to practice in the real world. Another purpose was to
align with e-leaning principles that have been commented by
NCATE and Conceptual Framework of College Education.
The vital of research
The importance of the research was to provide
solutions to assist College of Education toward improving
integration e-learning requirements in learning environment,
which were derived from research results. As well as, providing
information for the future research related to colleges of
education environments.
Limitation of the study
1.
2.
The study focused on male students, in main Campus in
Aldrriah. Because the learning environment is different
between female and male campus.
The study was implemented in the second semester
1432/1433(2011/2012).
Candidates' roles to integrate e-learning
Department of Business Innovation & Skills BIO (2009)
conducted a study that focuses on roles of universities in the
current age in Britain, the study indicated that:
1. E-learning enhances quality of learning through
communication tools that provides various feedbacks
between teachers and students. That means universities
should develop new learning environments that depend on
e-learning tools to maintain students' knowledge and skills,
which ensure all students ability to perform their jobs after
graduation.
2. E-learning tools should be available in institutions and
suitable for each course. Information is available for
students to help them when and how to integrate e-learning
tools in activities courses.
Procedural definition
E-learning: that includes learning and teaching strategies in
using e-learning tools such as (Blackboard, threads, search
engines to enhance learning, develop products).
Candidates: Students who enrolled in College of Education in
King Saud University in second semester 1432/1433
(2011/2012).
E-learning knowledge and skills: are accumulative of
knowledge that candidates obtain from development teaching
and learning strategies and e-learning tools experience. As well
as, abilities that they have to integrate those strategies and elearning tools experience in real world.
Terminology definition
Moreover, Crossick (2010) viewed that the main
responsibility of universities ensuring that students (candidates)
after graduation are ready to perform their jobs that need new
knowledge and skills. Therefore, Twomey, Shamburg and
Zieger(2008) declared that school districts seek resources of
finance to support purchasing e-learning tools, otherwise, if
E-learning: is an approach to learning and development: a
collection of learning methods using digital technologies, which
enable, distribute and enhance learning (Fee, 2009, p. 16).
Candidates: NCATE provides a definition which is
"Individuals admitted to, or enrolled in, programs for the initial
240
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
teachers don’t have enough skills and knowledge that enable
them to integrate e-learning tools in classrooms and follow up
the new innovation in the field will fail to meet society needs in
this era. Baytak & Akbyik (2010) conducted a research that
focused on infusing skills and experiences students (candidates)
technology in educational environments, the finding designated
that are able how to integrating technology meet schools goals.
As well as, the participants represented (87%) who can infuse
technology into learning and teaching strategies.
integrating e-learning throughout the entire unites. The most
points that are recommended for colleges of education that
effect education setting are:
1. Unite should include information technology resources so
that candidates meet requirement standards in order to
support learning.
2. Candidates are able to use data research and use
technology to enhance their practices.
3. Candidates expected to meet professional standers for
subject matter that will teaches and apply technology
standards in order to enhance students learning.
4. Candidates use various e-learning tools to enhance learning
and research.
5. Candidates use e-learning for interaction with others.
6. Candidates are able to develop e-learning strategies that
maintain learning and teaching in the future.
Furthermore, QA (2013) it a center that focuses on
teacher process evaluation and quality assurance of institutions,
which is called International Recognition in Teacher Education
(IRTE) that emphasizes e-learning as part of conceptual
framework.
Alrwaily(2012) conducted a study that concentrated
on students barriers towards utilizing learning management
systems (Blackboard) in College of Education in King Saud
University, the study' results were (79%) don’t have enough
time to use blackboard, (70%) of participants said faculty
members don’t care to use blackboard throughout course works,
and do not encourage students to use it. As well as (72%) of
participants strongly agreed that university did not provide
appropriate programs that help them to utilizing blackboard.
The result of one way ANOVA test asserted that there were not
significant differences among students studying levels toward
barriers of using blackboard. In other words students were
facing obstacles to implement learning management systems in
learning environments. Ituma (2011) conducted a study seeking
evaluation of students' perceptions toward e-learning integration
at a university in London, the study included whether or not
students were using components of learning management
systems (LMS), the results indicated that students have positive
viewpoints to support learning face to face in classrooms that
enhance active learning among students.
Colleges of Education should Drive emerging
E-learning
Universities and colleges of education should drive
change that leads to integrate new e-learning tools in e-learning
environments in order to provide needs of new generation.
Additionally, Wilen-Daugenti (2009) asserted that universities
in new era recognize the imperative development of new
learning environment as well as reporting that universities
"…make an impact on their students and schools need to be
aware of current trends" (p. 3).
Therefore, Shelly, Cashman, and Gunter (2001)
declared that integrating technology is to configure more two
things to perform specific work, such as, incorporating
PowerPoint, hardware to present information regarding a lesson,
or part of curriculum in order to enhance teaching and learning
that ensure attaining learning environments outcomes, which is
vital to prepare students (candidates) in digital age. WilenDaugenti (2009) said the success of learning environment in
colleges of education required integrated curricula into
appropriate e-learning technology to distribute information and
increase interaction. Tam and Werner (2005) said that the
continuous changes in e-learning tools are so swift, thus,
institutions must determine the change that the affects effects
internal learning environments and apply features of new elearning tools that meet demands of these changes in the world.
Tam and Werner (2005) confirmed these institutions in order to
motivate students toward incorporate technology they should
determine "…What they can do to minimize student fears in
dealing with technology? ... [Also] Most importantly, how can
institutions ensure that the standards and knowledge imparted to
students do not suffer? Robinson, Lee, and Soutar (2009)
conducted a study that emphasizes the roles of technology in
and out of classroom throughout post e-resources for learners to
direct learning, the research approved that technology
integration into higher education can provide fruitful results
when universities aligned learning and teaching strategies with
technology strategies and content activities. As a result, that led
to create appropriate climate for demonstrating learning and
encourage learners to use e-resources frequently and take their
responsibilities to control their learning. Therefore, there was a
direct correlation between increasing e- content and accessing
them online.
3. RESEARCH METHODOLOGY
The researcher used quantitative method to design and analyze
data and draw appropriate conclusions. Furthermore,
quantitative method included descriptive statistics, and
hypotheses test. A questionnaire was developed to collect data,
which was composed of two parts which are: Participant's
demographics and candidates' knowledge & skills of e-learning.
Research population and sample
The population was all undergraduate students (candidates)
based on statistic report that was given by Registration Unit in
College of Education in Second Semester in 1432/1433H
(2011/2012) that is illustrated in Table (1):
E. learning Integration
NCATE (2012) posted in its web site Unite Standards
that were developed in 2008 for evaluating teacher programs in
universities and colleges of education based on specific
elements. In fact, the Unite Standards concentrated on
241
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Table (1) Distribution population numbers among candidates majors.
Majors
Islamic
Studies
Special
Education
Art
Education
Physical
Education
Psychology
Science
Total
Number of
Candidates
338
545
91
278
235
1487
Table (2) Distribution sample numbers among participants' majors.
Majors
Islamic
Studies
Special
Education
Art of
Education
Physical
Education
Psychology
Science
Total
Number of
Participants
114
171
41
95
87
508
Participants
Percentage of
Major
34%
31%
45%
34%
37%
34%
In order to attain questionnaire validity, it was
presented to expert faculty members in instructional technology.
Therefore, they submitted their viewpoints and comments,
which assisted reconstructing the questionnaire. After
redesigning the research questionnaire, the pilot study was
conducted. The participants were (20), the purpose of the
reliability was to measure the dependent variable. The value of
Cronbach's Alpha for the dependent variable was (0.906), the
result was acceptable to collect data.
Research Questions Answers
1.
Is there a significant difference in abilities in integrating
knowledge and skills of e-learning in educational setting
toward (candidates) students' majors (Islamic studies,
Special Education, Art Education, Physical Education, and
Psychology)?
In order to answer this question (One Way ANOVA)
test was used to know the significant differences among
students (Candidates) knowledge and skills based on
departments. As shown in Table (3).
Data Analysis
Data was analyzed based on research methodology, therefore, it
leaded to derived results that focus on two parts included:
demographic, and knowledge & skills e-learning.
Table (3) One Way Analysis of Variance
Sum of Squares
Between Groups
1.340
df
4
Mean Square
.335
.433
Within Groups
217.925
503
Total
219.266
507
242
F
.773
Sig.
.543
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
The results in Table (3) indicated that there were not
significant differences among students (candidates) abilities to
infuse e-learning knowledge and skills based on departments
which P>.05 which is =.543, df=4, f=0.773. The result
designated those students (candidates) among departments
learned in the identical learning methods. Furthermore, students
used the equivalent e-learning tools in classrooms. As well as,
qualitative research emphasized that most students (candidates)
used regular e-learning tools, such as: PowerPoint. They rarely
used e-learning tools intensively or integrated learning
management systems.
2.
What are (candidates) students' perceptions toward abilities
in integrating knowledge and skills of e-learning in
educational setting knowledge and skills of e-learning in
educational setting?
It used descriptive analysis; the results included
participants' percentage of department, and total participants of
sample who said "I do not know" for each item. All results are
reprinted in Table (4).
Table (4) Participant who said I don’t know based on statements
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
Total
Rank
I have ability to design teaching strategies that support integrating
educational software in curricula.
I have abilities to design teaching strategies that integrate email and
forums that enhance learning processes.
I have abilities to apply strategies that support integrating electronic
research tools in e-contents.
161
31.8%
150
29.6%
166
32.7%
12
I have abilities to apply teaching strategies that support integrating
various technologies in problems solving.
I have abilities to apply teaching strategies that support learning digital
TV.
I have abilities to integrate e-learning tools in content in order to enhance
learning and teaching.
I have abilities to choose appropriate e-resources from the Internet that
enhance students learning.
I have abilities to apply strategies that support using various e-resources
that to be used with various learners such as blind learners.
I have abilities to apply various strategies that vital for integrating elearning in teaching problems solving.
I can use currant research result that support integrating emergence
technology in educational environment.
I can apply policies and procedures that support ethical issues in using
instructional technology in educational environment.
I obtain knowledge of applying information technology copy rights.
233
46.0%
231
45.9%
122
24.5%
100
20.1%
192
38.3%
145
%92
217
43.6%
149
29.7%
224
45.3%
144
28.9%
205
41.0%
172
34.3%
160
31.8%
122
24.5%
1
I obtain knowledge and skills of applying research concepts in
educational setting from appropriate various electronic resources.
I have abilities to develop policies and procedures that support
developing human resources in order to attain special needs.
I can use instructional technology to provide special needs requirements.
19.
I have abilities to prepare policies that motivate using secure instructional
technology that support using electronic resources.
I able to produce instructional technology products that include various
electronic tools such as Microsoft word, and Excel that support learning
processing.
I have abilities to develop multimedia product that support learning
processing.
I have knowledge and skills to use learning management systems.
20.
I can develop distance training program for students.
17.
18.
243
98
19.7%
134
27.4%
186
38.3%
15
11
2
20
22
6
17
4
16
3
18
5
8
13
21
23
19
7
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
21.
22.
23.
I have knowledge and experiences to apply Instructional design
principles in developing multimedia products.
I have knowledge and scientific principles that make me able to evaluate
educational software.
I have abilities to develop the main principles that support choosing
appropriate educational software that enhance educational environment.
In fact, the results of twenty three statements in Table
(4) divided into three categories. The first category starts from
(40% to 46%) includes five items, which are (4, 5, 10, 12, 14),
the percentage for each item of sample as followed (46.0%,
45.9%, 43.6%, 45.3%, 41.0%). The second category starts from
(30% to less than 40%) includes nine items which are (1, 3, 8,
15, 16, 20, 21, 22, 23), the percentage for each item of sample
as followed (31.8%, 32.7%, 38.3%, 34,3%, 31.8%, 38.3%,
34.1%, 31.8%, 34.1%). In addition, the third category that
represents participants responses ratio is from (19% to less
30%) of sample includes nine items which are (2, 6, 7, 9, 11, 13,
17, 18, 19), the percentage for each item as followed (29.6%,
169
34.1%
160
31.8%
170
34.1%
10
14
9
24.5%, 20.1%, 29.0%, 29.7%, 28.9%, 24.5%, 19,17%, 27.4%).
Therefore, the participants' ratio was high for who said "I do not
know" about (23) items that focused on knowledge and skills of
e-learning. Indeed, regarding to their responses, the participants
(candidates) rarely have heard about those twenty three items.
In fact, that indicated students (candidates) have not
had knowledge and skills that support them to deal with elearning innovation that required infusing new technologies in
classroom after gradations. Consequently, the participants
(candidates) who said "I do not know" faced main challenges
that prevent integration technology in educational setting in the
future.
Table (5) Participants sum percentages who said strongly disagree, disagree based on departments, and total for each item of sample.
Total
Rank
1.
I have ability to design teaching strategies that support integrating
educational software in curricula.
78
15.4%
10
2.
I have abilities to design teaching strategies that integrate email and
forums that enhance learning processes.
71
14.9%
14
3.
I have abilities to apply strategies that support integrating
electronic research tools in e-contents.
71
14.0%
17
4.
I have abilities to apply teaching strategies that support integrating
various technologies in problems solving.
I have abilities to apply teaching strategies that support learning
digital TV.
I have abilities to integrate e-learning tools in content in order to
enhance learning and teaching.
I have abilities to choose appropriate e-resources from the Internet
that enhance students learning.
I have abilities to apply strategies that support using various eresources that to be used with various learners such as blind
learners.
I have abilities to apply various strategies that vital for integrating
e-learning in teaching problems solving
I can use currant research result that support integrating emergence
technology in educational environment.
58
11.3%
76
15.1%
69
13.9%
53
10.6%
85
17%
21
61
12.2%
53
14.6
20
I can apply policies and procedures that support ethical issues in
using instructional technology in educational environment.
I obtain knowledge of applying information technology copy
rights.
I obtain knowledge and skills of applying research concepts in
educational setting from appropriate various electronic resources.
I have abilities to develop policies and procedures that support
developing human resources in order to attain special needs.
66
13.2%
85
17.1%
75
15%
95
19%
19
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
244
12
18
23
8
15
7
13
4
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
15.
19.
I can use instructional technology to provide special needs
requirements.
I have abilities to prepare policies that motivate using secure
instructional technology that support using electronic resources.
I able to produce instructional technology products that include
various electronic tools such as Microsoft word, and Excel that
support learning processing.
I have abilities to develop multimedia product that support learning
processing.
I have knowledge and skills to use learning management systems.
20.
I can develop distance training program for students.
21.
I have knowledge and experiences to apply Instructional design
principles in developing multimedia products.
I have knowledge and scientific principles that make me able to
evaluate educational software.
I have abilities to develop the main principles that support choosing
appropriate educational software that enhance educational
environment.
16.
17.
18.
22.
23.
To derive appropriate outcomes were analyzed twenty
three statements based on departments. In fact, the results
asserted that there were participants (candidates) of the sample
said "strongly disagree and disagree" with all twenty three
statements, in addition, Table (5) included three categories
which are: the first category represents participants percentages
from (10% to less than 15%) includes ten items, which are (2, 3,
4, 6, 7, 9, 10, 11, 17, 18), the percentages for those items are
(14.9%, 14.0%, 11.3%, 13.9%, 10.6%, 12.2%, 14.6%, 13.2%,
14.4%, 11.2%). The second category represents participants
percentages from (15% to less than 20%) includes items (1, 5, 8,
12, 13, 16, 19, 23), the percentages for those items as followed
(15.4%, 15.1%, 17.0%, 17.1%, 15.0%, 15.1%, 16.1%, 18.6%).
The third category represents participants percentages from
(20% to less than 30%) includes items (14, 15, 20, 21, 22), the
percentages for those items as followed (19.0%, 18.1%, 25.9%,
21.8%, 20.7%). The results revealed that there are participants
(candidates) who said "strongly disagreed and disagreed" with
all statements in all departments, that means, participants who
knew the meaning of all statements but their knowledge and
skills of e-learning were not existent . Indeed, the participants
(Candidates)’ results represented real obstacles that prevented
infusing e-learning innovation in school environments, and
effected the schools reformed movement to attain the current
era e-learning requirements.
4.
4.
5.
6.
7.
8.
91
18.1%
76
15.1%
71
14.4%
56
11.2%
79
16.1%
106
25.9%
108
21.8%
113
20.7%
93
18.6%
6
11
16
22
9
1
2
3
5
There are (57%) of students (candidates) not able to
integrate e-learning to support problems solving.
The research outcomes designated that there are (52.4%) of
participants did not know how to apply copyrights through
infusing information technology in educational setting.
Roughly (40%) of participants did not know how to use
learning management systems, which vital to distribute
learning.
There were (38.4%) of participants not able to integrate elearning tools in contents.
Qualitative analysis indicated that there are some of
students (candidates) are not able to deal with e-learning
tools.
5. DISCUTION
The purpose of this research was to explore students
(candidates) abilities toward applying e-learning knowledge and
skills in educational setting in order to enhance schools
environments. This research revealed that students (candidates)
knowledge and skills of e-learning in College of Education in
King Saud University were not aligned with principles of
e-learning requirements in IRTE that based on NCATE unite
standards which is part of accreditation. The results indicated
that there were some of participants said "I do not know" about
e-learning statements in the questioners, such as: (46%) of
participants in all departments did not know about statements
that focus on how students are able to integrate e-learning tools
in teaching and learning. in addition, (43.6%) of respondents
pointed out that they did not know how to use currents research
technologies in integrating e-learning tools in educational
environment. As well as, (45.3%) of respondents did not know
about applying information technology copyrights. In general,
the findings for all statements designated that there were
participants percentages rang (from 19.7% to 46.0%) for who
said "I do not know". Indeed, the findings were not aligned with
IRTE that adopts NECATE principles, ISTE, and College
Education of Conceptual Framework in King Saud University
that based on IRTE principles. In fact, the results were not
attained the ninth competence which students must obtain
RESEARCH FINDINGS
The finding of this research indicated to some main points that
facilitate decision makers to improve educational environments
in order to reach optimal outcomes, these are:
1. The results indicated that there are participants who did not
have e-learning knowledge and skills.
2. There are some of respondents said strongly disagreed and
disagreed with all questioner statements.
3. In general, the results pointed out there are students
(candidates) who were not able to deal with e-learning
innovation.
245
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
e-learning proficiency before graduation from College of
Education.
These finding are not consistent with NCATE (2012)
that requests students (candidates) in the College of Education
to be able to integrate technology in teaching and learning, as
well as, having abilities to use e-research resources to enhance
learning. In addition, the results are not alignment with the
College Education of Conceptual Framework in King Saud
University that asserted all students must attain ten proficiencies
one of them integrating technology in real practices in order to
acquire e-learning knowledge and skills that enable them to
enhance teaching after graduation. Furthermore, the finding are
not in agreement with research that conducted by Ltuma(2011)
that found there are positive attitude toward utilizing learning
management systems. In fact, Alrwaily(2012) conducted a study
that concentrated on students barriers in College of Education in
king Saud University towards utilizing learning management
systems (Blackboard) in College of Education in King Saud
University and found that most students are not using learning
management systems (Blackboard) in learning, which constants
with results of this research. The study results indicated that
participants cannot develop technology strategies that link with
learning and teaching strategies, which were not disagreed with
the research that conducted by Baytak & Akbyik (2010) that
mentioned (87%) are able to develop technology strategies that
align with learning and teaching strategies.
CONCLUSION and RECOMMENDATIONS
This research focused on students' (candidates)
capability of e-learning knowledge and skills toward infuse
them in educational environments after graduation in real world.
In fact, the research used questioner that included various
statements that seeking to discover abilities of students in
integrating e-learning through their learning and practices in
College of Education in King Saud University, which enabled
them to enhance and create their needs of e-learning Knowledge
and skills. Indeed, the results exposed that some of students
(candidates) were not obtained e-learning knowledge and skills,
which were not aligned with Conceptual Framework of College
Education, NCATE e-learning principles, and ISTE standard.
The College of Education should assert in infusing elearning tools in all departments in order to enhance and create
new e-learning innovation through various course works. As
well as, it is vital to develop training programs for students that
assist them to integrate new innovation in real classrooms that
prepare them for the future in order to meet society needs.
References:
Alrwaily, A. (2012). Study students' barriers toward using
learning management systems in College of Education in king
Saud University. Un-published research. A Graduation project.
Fee, K.(2009), Delivering E-learning a complete strategy for
design, application and assessment. Philadelphia, PA: Kogan
Page.
Baytak, A., and Akbyik, C. (2010), Classroom teacher
candidates' definitions and beliefs about technology integration.
World Academy of science, Engineering and Technology
42(2010), 90-93.
International Society for Technology in Education (ISTE,
2010). Technology facilitation standards. Access in 28/6/2012,
available at: http://www.apple.com/education/docs/AppleISTE-NETS-Teachers.pdf
Bonk, C.(2009). The world is open how web technology is
revolutionizing education. San
Francisco, CA: Jossey-Bass.
Ituma, A. (2011). An evaluation of students' perceptions and
engagement with e-learning components in a campus based
university. Active Learning in Higher Education, 12(1) 57-68.
Buzzetto-More, N. (2008). Students perceptions of various elearning components. Interdisciplinary Journal of E-learning
and Learning Object, 4(19), 113-135.
Ltuma, A. (2011), An evaluation of students' perceptions and
engagement with e-learning components in a campus based
university. Active Learning in Higher Education, 12(1), 57-68.
College of Education(2009), Conceptual framework of the
College of Education, King Saud University. Riyadh, KSU:
Printed in College of Education.
NCATE (2013). Professional standards for the accreditation of
teacher preparation institutions. Available at:
http://www.ncate.org/, retrieved in 19/11/2012.
Crossick, G. (2010) the future is more than just tomorrow:
Higher education, the economy and the longer term. Available
at: www.universitiesuk.ac.uk, Retrieved in 22/10/2012.
NCATE (2012), The standards of excellence in teacher
preparation. Access in 28/10/2012. Available at:
http://www.ncate.org/Standards/NCATEUnitStandards/
UnitStandardsinEffect2008/tabid/476/Default.aspx
Department of Business Innovation & Skills BIO (2009). The
future of universities in a knowledge & skills. Retrieved in
1/2/2013,from:www.bis.gov.uk/wpcontent/uploads/.../Higher-Ambitions-Summary.pdf
Oigara, J. and Wallace, N (2012). Modeling, training, and
mentoring teacher candidates to use SMART board technology.
Issues in Information Science and Information Technology, 9,
297-315.
Paechter, M, Maier, B., & Macher, D.(2010), Students'
expectations of, and experiences in e-learning: Their relation to
246
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
learning achievements and course satisfaction. Computers &
Education, 54(2010),222-229.
Journal of Leadership and Organizational Studies, 11(2),
15-25.
The Center for Quality Assurance in Institutional Education
(QA, 2013), Available at:
http://cqaie.org.phtemp.com/current.htm, retrieved in 1/2/2013
Robinson, D., Lee, M., and Soutar, A. (2009), Using technology
to direct learning in Higher Education. Active Learning in
Higher Education, 10(1), 71-83.
Twomey, C., Shamburg, C., and Zieger, L. (2008), Teachers as
technology leaders. Eugene, Oregon: ISTE.
Shelly, G., Cashman, T., and Gunter, G. (2001), Teaching
discovering computers integrating technology in the classroom.
Cambridge, MA: Course Technology.
Wilen-Daugenti, T. (2009), .edu technology and learning
environments in higher education.
New York, NY: Peter Lang Publishing.
Tam, C., and Werner, J. (2005), Designing and evaluation elearning in Higher Education: A review and recommendations.
247
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
MOOCs Offer Students Opportunity to Grow as Writers
Denise COMER
Thompson Writing Program, Duke University
Durham, North Carolina, 27708, USA
At the time of this publication, most MOOCs emerge from
disciplines that rely primarily on lectures for content
delivery and multiple-choice exams for student assessments.
As such, disciplines in the natural sciences and social
sciences can develop and adapt course content for MOOCs
in a manner that parallels, at least to some degree, their
main pedagogy in residential classrooms. Less transportable
toward MOOCs, it seems, are humanities-based disciplines
and the more student-centered, humanistic elements of
pedagogy and assessment across disciplines, such as teambased learning, student-driven discussion and presentations,
and writing.
ABSTRACT
At this juncture, most MOOCs emerge from disciplines
that rely primarily on lectures for content delivery and
multiple-choice exams for student assessments. As such,
disciplines in the natural sciences and social sciences can
develop and adapt course content for MOOCs in a manner
that parallels, at least to some degree, their main pedagogy
in residential classrooms. Less transportable toward
MOOCs, it seems, are humanities-based disciplines and
the more student-centered, humanistic elements of
pedagogy and assessment across disciplines, such as teambased
learning,
student-driven
discussion
and
presentations, and writing. However, the latter of these—
writing—is central to learning. It enables students to think
critically, apply, synthesize, and analyze ideas, compare
ideas, connect more personally with course material,
conduct ethical reasoning, and engage with, retain, and
carry forward course material on deeper levels. Using my
own experience teaching a writing-based MOOC through
Coursera in spring 2013—which had an enrollment of
81,000 students—this paper explores the following
questions: How might writing be integrated into MOOCs
across disciplines? What are some of the challenges to
doing so? What might be some of the advantages?
Ultimately, I argue that writing offers MOOC learners an
important opportunity to grow as writers.
However, the latter of these—writing—provides a
particularly compelling frame for considering the learning
goals and potential of MOOCs. The Association of
American Colleges and Universities (AACU) 2008 LEAP
report identified writing as one of a select group of “highimpact educational practices” that improve “essential
learning outcomes” key to twenty-first-century learning [3].
Writing enables students to think critically, apply,
synthesize, and analyze ideas, compare ideas, connect more
personally with course material, conduct ethical reasoning,
and engage with, retain, and carry forward course material
on deeper levels.
Given what writing can accomplish for students, then, it is
important to consider how writing might function in
MOOCs. Using my own experience teaching a writingbased MOOC through Coursera in spring 2013—which had
an enrollment of 81,000 students—this paper explores the
following questions: How might writing be integrated into
MOOCs across disciplines? What are some of the
challenges to doing so? What might be some of the
advantages?
Keywords: MOOCs, Writing, Learning Outcomes, ELearning, Technology.
1. INTRODUCTION
Massive Open Online Courses (MOOCs) are among the
latest and fastest-growing approaches to e-learning. The
first MOOC was offered in 2008: “George Siemens and
Stephen Downes co-taught … ‘Connectivism and
Connective Knowledge’ … to 25 tuition-paying students at
the University of Manitoba and offered [it] at the same
time to around 2,300 students from the general public who
took the online class at no cost” [1]. However, it was not
until the past year that MOOCs gained incredible traction.
2012, dubbed by the New York Times as “The Year of the
MOOC” [2], saw an incredible expansion in MOOC
offerings through such platforms as Coursera, Udacity, and
EdX.
2. WRITING IN MOOCS 2012-13
Writing occupies a somewhat paradoxical position in
MOOCs right now. In many ways, writing is a cornerstone
of MOOCs in that it is the medium upon which the
discussion forums function. MOOC learners use writing in
these discussion forums for all sorts of purposes: to
comment on lectures; to discuss course materials; to ask
questions; to signal difficulties or confusion; to form and
maintain learning communities or friendships; and to
otherwise communicate with one another and staff
members. Writing, then, is the largely basis through which
248
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
MOOC learners communicate and, arguably, a key mode
of learning as they process course content.
sole writing MOOC was followed in spring 2013 by a
cohort of four other writing MOOCs, the first of which (one
I taught through Coursera and Duke University) launched in
March 2013, all through Coursera: English Composition I:
Achieving Expertise. The other three writing MOOCs were:
“Writing II: Rhetorical Composing” (Delagrange et al, Ohio
State University); “First-Year Composition 2.0” (Karen
Head, Georgia Institute of Technology); and “Crafting an
Effective Writer: Tools of the Trade” (Lawrence Barkley,
Ted Blake, and Lorrie Ross; Mt. St. Jacinto Community
College). [7]
Even as writing is central, however, writing does not yet
have an explicit role in many MOOCs as part of their
stated learning objectives or as part of student assessments.
In November 2012, for instance, Coursera was offering
195 courses, only one of which involved writing in a
sustained way: “Writing in the Sciences” by Stanford
Professor Kristin Sainani. Sainani outlined for her MOOC
learners the following goals: “principles of good writing,
tricks for writing faster and with less anxiety, the format of
a scientific manuscript, and issues in publication and peer
review” [4]. Thus, at the same time as writing in MOOCs
is highly visible through the discussion forums, it is also as
of yet much less visible as an element of MOOC
pedagogy. Even less visible are MOOCs that are centered
entirely on writing.
These four writing MOOCs were funded through a Bill &
Melinda Gates Foundation grant as part of their
Postsecondary Success initiative. The RFP was designed to
stimulate development of gateway college courses so that “a
broad range of students [would have the chance of]
successfully advancing their general and developmental
education” [8]. As a response to what at the time was a
prevalence of MOOCs designed for upper-division college
learners, the Gates Foundation invited proposals in
September 2012 that would develop introductory-level
MOOCs such as developmental arithmetic, first-year
writing, introductory psychology, and general chemistry. In
this RFP, the Gates Foundation expressed a commitment to
helping “make high-quality, affordable learning content and
experiences for the full sequence of high-demand general
education and developmental education courses available to
all students” [9]. Because MOOCs are free and have
unlimited enrollment globally, MOOCs have the potential to
provide unprecedented educational access to historically
underserved and/or under-represented students in higher
education.
The dearth of writing as a focal point in MOOCs is in
some ways understandable given what are agreed-upon
tenets of effective writing pedagogy: cultivating a
community of writers, positioning student writing as
central to the work of the course, facilitating ample space
for revision and reflection, and providing and facilitating
substantive, effective tailored feedback on student writing
from faculty and peers. A group of 30,000 or more learners
viewing five- to-seven-minute videos about writing from
their separate places around the world, with widely
divergent experiences and capabilities as writers, makes it
challenging to implement these cornerstones of effective
writing pedagogy. And this does not even broach
additional hurdles to writing MOOCs such as plagiarism,
multilingualism, calibrated peer review, and the overall
time, energy, and motivation it takes to develop one’s
writing and improve as a writer.
Still, the draw of integrating writing into MOOCs in some
way, or experimenting with writing-intensive disciplinary
based MOOCs, remains alluring. And, indeed, several
MOOCs across disciplines include writing projects and/or
short answer quizzes. These MOOCs, to varying degrees,
might be seen as ranging from those that include writing
on a cursory level to those that integrate it a bit more
decisively, perhaps through a small writing assignment as
part of the coursework. Roger Barr, for instance, includes a
writing assignment in his Engineering MOOC,
“Bioelectricity: A Quantitative Approach.” Barr asks
students to write a brief analysis and description of a
bioelectric signal of interest to the student [5]. Some
integrate writing to such a degree that they are approaching
writing-intensive, such as Peter Struck’s “Greek and
Roman Mythology.” In Struck’s course, students are asked
to write two 300-word essays throughout the course on
such aspects of course content as analysis of parts of The
Odyssey or application of theoretical ideas to texts. [6]
Since MOOCs have such a far reach and writing has such a
high impact on learners, and because writing already
operates so systemically in MOOCs, even in those that do
not explicitly include writing, it seems important to consider
strategies for more deliberately integrating writing into
MOOCs in more sustained and meaningful ways. The
following section outlines several such strategies.
3. STRATEGIES FOR INTEGRATING WRITING INTO
MOOCS
Faculty teaching MOOCs—as with residential courses—
have a variety of options for how much or how little to
integrate writing, for what purposes, and which kinds of
writing they might value. To help faculty think through
these options in residential courses, writing-studies scholars
often describe writing assignments as operating along a
continuum of high-stakes or low-stakes. According to Peter
Elbow, this continuum asks faculty to decide how much
weight they will place on a particular writing assignment,
making it higher or lower stakes in terms of a student’s
grade and in terms of the level of response given to a
writing project [10]. A major final essay would be highstakes, whereas an informal in-class quickwrite would be
Even more compelling (from my perspective) is the very
small but growing number of writing MOOCs. Sainani’s
249
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
low-stakes.
student learning and foster student engagement during the
middle of a video stream. These are not technically included
in the course grade, but can include short-answer questions
and might be seen as “writing-to-learn” moments. Official
quizzes, which are included in the course grade, can be
multiple-choice, short answer or long answer. If they are
qualitative long answer, however, there is currently no
functionality to grade them other than credit/no credit. In
my course, I asked students to complete an open-ended long
reflection at the end of our course on what writing-related
practices, skills, and knowledge they can transfer to other
writing occasions after this course. I also asked students to
complete shorter reflections throughout the course on
learning goals after each writing project, offering them a
chance to evaluate their own progress as writers and make
choices about what they will continue to work on for
subsequent writing projects.
Another continuum along which writing-studies scholars
often position possible writing assignments involves
“writing to learn,” which entails using writing to think
through ideas, and “learning to write,” which entails
learning to write from within a particular disciplinary
context or discourse community [11].
As in residential classes, MOOCs offer a full range of
options for integrating writing: high stakes, low stakes,
writing to learn, and learning to write. Decisions about
which ways to proceed with writing integration depend on
what the learning goals are of a particular MOOC and
faculty priorities.
Some of the more prevalent examples of how MOOC
faculty can design writing assignments and integrate
writing are as follows:
Writing Projects: The more formal writing projects in
MOOCs are those that students create and submit through
the Peer Review tab on the MOOC. A student writes and
submits his or her paper by a deadline. The course platform
then randomly assigns that paper to a specified number of
peers. Peers have one week to respond to and/or evaluate
(grade) that writing project. The writing project, with the
peer feedback and grade, is then returned to the writer.
Major writing projects can be submitted as pdf attachments
or pasted directly into an assignments box. In my course we
had several 600-800 word essays that went through a draft
phase and a revision phase. Students’ grades on writing
projects are determined by dropping the lowest peer grade
and averaging together the remaining peer grades. The
MOOC faculty member decides how many peers will
respond to and/or evaluate each project.
Student-Initiated Discussion Forums. These are the
discussion forums that emerge each week during a course
as students create learning communities and communicate
with one another. In the MOOC that I just taught, some
examples of discussion thread titles initiated by students
include: “I am a happy latecomer.”; “Where will this
course take me?”; “Why I Took the Course”; “Reflecting
on My Words” [12]. These student-initiated discussion
forums can serve an important purpose in terms of helping
students to clarify course content, work together to
understand concepts more deeply, or otherwise collaborate
with one another. These informal, student-initiated and
maintained forums are one of the mainstays of MOOC
pedagogy across nearly all disciplines. Students form
communities with one another and have ongoing
conversations that sometimes last the entire course. Forum
contributions range in length from brief comments to
longer, more sustained thought pieces or exchanges. The
forums are searchable so people can enter search terms and
follow an idea or individual throughout a course.
Peer Feedback: Reading and responding to others’ writing
improves one’s own writing. In this way, the peer feedback
that occurs in MOOCs is another important dimension of
writing integration. MOOC faculty can ask students to give
primarily quantitative rubric evaluations, with an openended question or two at the end of the rubric; or they can
ask students to give substantive qualitative peer review.
Students in English Composition I responded to peers’
drafts by offering suggestions for revision as they answered
such questions as the following: “Summarize in a sentence
or two what the writer is arguing, if you can. If you cannot,
say what the writer might do to make the argument more
clear.”; What did you like best about this essay?”; and
“What did you learn about your own writing/your own
project based on responding to this writer’s project?” [13]
Teacher-Initiated Discussion Forums. Like the studentinitiated discussion forums, these teacher-initiated
discussion forums are not weighted as student assessments,
but, unlike their student-initiated counterparts, they are
work of the course in a more deliberate way. These involve
specific forums where instructors have asked students to
write in response to a certain prompt or activity. In my
class, for instance, I had several of these kinds of teacher
initiated discussion forums: “I am a writer”; a rhetorical
reading of a course text; a crowdsourced annotated
bibliography; pre-writing activities such as brainstorming;
reflections on writing workshops; reflections on writing
transfer at the end of the course.
4. CHALLENGES TO INTEGRATING WRITING IN
MOOCS
Even in residential courses, it can be difficult to integrate
writing effectively. MOOCs generate some of the same
challenges, as well as several others. The following are key
challenges involved with integrating writing effectively in
Short- and Long-Answer Quizzes: MOOCs have a quiz
function that can be used to assess student learning, and/or
as part of learning engagement during videos. During
videos, MOOCs offer pop-up quizzes designed to assess
250
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
MOOCs:
thousands of people. MOOC faculty should pay heightened
attention to elements of document design, write assignments
with an awareness of English Language Learners, and make
each assignment’s purpose and process as visible and
deliberate as possible. These course materials are difficult to
create even under the most amenable of residential
circumstances.
Feedback: What is the impact of having a solely peerdriven system of responding to student writing? Although
peer review is a staple component of writing pedagogy,
and is crucial to learning how to write, most students are
accustomed to eventually receiving teacher feedback.
Writing in MOOCs, on the other hand, is driven by peer
review. As such, students may have more resilience and
autonomy, and learn more about responding, but that there
might also be uneven peer feedback and evaluation. Since
faculty cannot monitor the peer feedback, this also leaves a
possible slippage of response. This challenge, however,
assumes that faculty response to student writing is even
and meaningful, which is not always the case. Machine
grading is currently under exploration as an alternative or
supplement to instructor or peer response. This initiative,
however, has several key difficulties and, according to
many, may not be viable or effective [14].
Lack of resources: Resource shortage in MOOCs emerges
in a number of ways related to writing. Where many
universities have a rich Writing across the Curriculum
Infrastructure, MOOC faculty may not have as much
support for creating writing rubrics and assignments.
Because so many elements of MOOC development and
delivery are new (and time consuming) for MOOC faculty,
they may not have time to spend thinking about how to
integrate writing effectively, much less creating
assignments. Students lack access to key writing-related
resources such as writing center support, training in citation
practices, how to avoid plagiarism, etc. Another resource
aspect of resource shortage in MOOCs involves research.
Although JSTOR is beginning to allow more access to its
holdings [17], most research in a MOOC must be from
open-access sources. This limits the extent of research
MOOC learners can conduct.
Diversity of Students: English Composition I had over
81,000 learners enrolled from all over the world.
According to a pre-course survey, 75% of them were from
countries outside the U.S. [15]. Some learners had Ph.D.s,
while others had no high school diploma. Ages of learners
ranged from as young as 12 to people in their 80s. With
learners who carry such diverse experiences, educations,
and backgrounds, it becomes difficult to create writing
assignments that meet students where they are as learners.
5.
Massiveness of the MOOC Community: The notion of
community is central to effective writing pedagogy. Since
writers need to have confidence and a safe space to
experiment, writing faculty work hard to create a trusting
and collegial writing community. Learners in MOOCs do
create communities. One student in English Composition I
formed a writing group that persisted throughout the
course; she referred to them as her MFF (MOOC Friends
Forever) [16]. Still, MOOC communities are student
initiated and maintained. Some students might be less
effective at or inclined toward forming communities in this
context. Other students can inadvertently become silenced
on the forums, or unheard. It should also be said that some
people on the forums might be not be inclined to be civil
towards classmates, and there might be some unproductive
forms of response happening that then might alienate other
learners.
ADVANTAGES OF INTEGRATING
WRITING IN MOOCS
Despite the many complex challenges surrounding the
effective integration of writing into MOOCs, the advantages
for doing so make the prospect worthwhile.
Learning Gains. Writing is a high-impact learning mode,
enabling students to synthesize, evaluate, and process
course material on deeper levels. If MOOCs are intended to
make education more accessible to larger numbers of
people, writing is a methodology that will help people learn
in greater strides and with deeper efficacy.
Massiveness of the MOOC Community. Although this
can pose a challenge in terms of meeting students where
they are, it is also an incredible opportunity. Writers in
MOOCs have at their hands an audience of thousands. They
are writing for publics, making their writing reach beyond
the walled classroom. People from all over the world can
give feedback and exchange and debate competing views.
Writing in this context has the chance to be much more
nuanced and reflective since the readership is so diverse and
the stakes are potentially so high.
Pacing: Because MOOCs are organized on a weekly basis
rather than a class basis, the process for writing can be
time consuming. Going through a full cycle of the writing
process (pre-writing, drafting, feedback, revision,
evaluation) can take as many as five weeks or more in a
MOOC. This pacing limits the number and kind of writing
projects one can ask of students.
Responding. Often, when students write in school-based
settings, they can adopt a counterproductive perception that
they are only writing to please a teacher. The MOOC
enables students to have the opportunity to receive feedback
from real people beyond the teacher. While one can do this
in a residential classroom as well, the MOOC has higher
stakes in this regard because MOOC learners are likely not
Rubric and Assignment Development: The MOOC
environment also demands the creation of valid rubrics and
assignments which can be easily understood and used by
251
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
to know their readers. This helps writing take on a realworld dimension; writers often (usually) do not know their
readers.
Writing can be a powerful mode for learning; it can help
people make a difference in the world. MOOCs offer an
unprecedented opportunity to help learners around the world
grow as writers and become more able to create and achieve
their own ambitions and goals. Being able to critically read
and understand others’ arguments, effectively pose
questions, respond to others, create arguments, and use
evidence will go far in benefitting people in our growing
digital and global era.
Faculty Growth. MOOCs can help faculty grow as
teachers in many ways. Faculty are even likely to grow as
writers themselves by creating course materials for so
many readers, needing to rely almost solely on written
assignments rather than the in-class contextualization that
can otherwise occur in residential classrooms. As faculty
think deeply about the purpose of writing assignments, and
the ways in which writing can help learners accomplish
course learning outcomes, they can become more effective
teachers in residential settings as well.
7.
[1] “7 Things You Should Know about MOOCs.”
ned.educause.edu. Web. 14 June 2013.
[2] Pappano, Laura. “Year of the MOOC.” New York
Times. Web. 2 Nov. 2012.
[3] “Liberal Education and America’s Promise.”
Association of American Colleges and Universities. Web.
15 June 2013.
[4] Sainani, Kristen. Writing in the Sciences. Stanford
University and Coursera. n.d. Web. 12 Nov. 2012.
[5] Barr, Roger. Bioelectricity: A Quantitative Approach.
Duke University and Coursera. n.d. Web. 15 June 2013.
[6] Struck, Peter. Greek and Roman Mythology. U of Penn
and Coursera. n.d. Web. 15 June 2013.
[7] Coursera. Coursera. n.d. Web. 10 June 2013.
[8] Bill & Melinda Gates Foundation. Request for
Proposals. 2012. PDF file.
[9] “Postsecondary Success.” Bill & Melinda Gates
Foundation. n.d. Web. 11 May 2013.
[10] Elbow, Peter. “High Stakes and Low Stakes in
Assigning and Responding to Writing.” Writing to Learn.
Strategies for Assigning and Responding to Student
Writing across the Disciplines. 69. San Francisco, Calif.:
Jossey-Bass, 1997. 5-13. Brooklyn-wac.org. Web. 13 June
2013.
[11] McLeod, Susan. “Writing Across the Curriculum. An
Introduction.” Writing Across the Curriculum. A Guide to
Developing Programs. Ed Susan H. McLeod and Margaret
Soven. Newbury Park, Calif: Sage Publications, 2000. 1-8.
aw.colostate.edu/books. Web. 14 June 2013.
[12] “Discussion Forums.” English Composition I:
Achieving Expertise. n.d. Web. 14 June 2013.
[13] Comer, Denise. “Project 2 Peer Review Evaluative
Feedback.” English Composition I: Achieving Expertise.
Duke University and Coursera. n.d. Web. 14 June 2013.
[14] Strauss, Valerie. “Grading Writing. The Art and
Science—and Why Computers Can’t Do It.” The
Washington Post. 2 May 2013. Web. 15 June 2013.
[15] Mueller, Elise. “Day One: English Composition One.”
Center for Instructional Technology. Duke University. 20
Mar. 2013. Web. 15 June 2013.
[16] “Writing Workshop 5/30.” English Composition I:
Achieving Expertise. n.d. Web. 14 June 2013.
[17] “Register and Read.” JSTOR. n.d. Web. 15 June 2013.
Cultivate growth as writers. Cultivating conversations
about writing across a diverse range of learners and
encouraging more people around the world to think about
themselves as writers can have profound impact. Learners
can gain confidence and skills at sharing their views,
making their ideas heard; this will in turn create space for
them to contribute and communicate as global citizens in
ever more meaningful ways. Since many students move in
and out of MOOCs, they have the chance to grow as
writers even with a tiny bit of participation. Even if their
participation amounts only to receiving weekly emails that
discuss writing and outline the purpose of the week’s
writing activities, they have had more of a chance to think
about themselves as writers than they otherwise would
have.
6.
REFERENCES
CONCLUSIONS
MOOCs are still relatively new for higher education, and
they are likely to shift and adapt over the next several
years. Writing can play a vital role in MOOCs, helping
MOOC learners reach their goals and engage with course
material on more profound levels.
One of the best arguments for thinking more deliberately
about the roles writing can play in MOOCs is that writing
is already in MOOCs. It forms the basis for much of the
communication and discussion of course material. MOOC
faculty and students can benefit from more sustained
attention to writing as a mode of learning.
However, more support and resources may be needed to
integrate writing effectively into MOOCs. More research
is also needed to understand more deeply what kinds of
writing can or should be valued in MOOCs, depending on
disciplinary context. One area of particular interest is how
writing in MOOCs might work in blended formats, where
faculty in residential courses supplement their courses with
MOOC components. Other questions arise too, particularly
in the area of cross-cultural interaction over writing: How
can MOOCs fully appreciate and take advantage of the
opportunity for cultural interchange?
252
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Facilitating Public Archaeology through E- learning: use of information and
communication technology and the construction of virtual worlds
Devena HAGGIS
Graduate School of Humanities
and Social Sciences
University of Tsukuba, Japan
and
Simona VASILACHE
Graduate School of Systems
and Information Engineering
University of Tsukuba, Japan
they have been used increasingly as educational and research
tools [1]. This combination of ICT and archaeology not only
provides the public with other ways to access information on
heritage, it also allows them to control their interaction with
heritage material and influence its use in a collaborative
learning environment.
ABSTRACT
Archaeology focuses on the study of the material remains of the
human past. These processes reflect the human need to learn
about and in some instances preserve the past and can be
considered part of fulfilling the basic human need of situating
ourselves in time.
Archaeologists in general advocate the use of technology and
often adapt techniques from other industries in their research
and to disseminate information about archaeology. The process
of facilitating public involvement and education in archaeology
is known as ‘Public Archaeology’. The Internet allows the
representation and recording of archaeological material and
sites and the dissemination of information to a wide audience in
new ways.
The construction of an archaeological virtual world provides the
opportunity for archaeologists to introduce collaborative Elearning opportunities to the public and engage them in a set of
archaeology related activities. It has been suggested that this
type of learning environment allows the construction,
manipulation and exploration of virtual objects and provides a
more effective learning environment than 2-D alternatives. This
paper explores the contribution of ICT in the construction of
virtual archaeology worlds and the impact it has on
archaeological dissemination.
ICT AND ARCHAEOLOGICAL DISSEMINATION
ICT provides information through communication technologies
such as the Internet, wireless networks, mobile phones and other
mediums that allow people to communicate electronically. A
simple description of the interaction of ICT and virtual worlds
is given in Figure 1.
Keywords: ICT, Public archaeology, Virtual worlds, Elearning
1. INTRODUCTION
Figure 1 ICT and virtual worlds
Archaeology is traditionally a ‘hands on’ discipline. The
practical aspects of archaeological investigation focus on the
survey, excavation and analysis of archaeological sites.
However the advent of the Internet and its associated
technology provide opportunities for public ‘virtual
participation’ in archaeological activities, and since the 1980’s
Data regarding sites, artefacts and heritage are used to create
archaeological virtual worlds that are stored on a medium such
as a server or cloud. Open access to these worlds via the
Internet make them a powerful tool in communicating
archaeology to the public. Virtual worlds are valuable not only
253
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
for education purposes but also because they concentrate and
preserve data that is represented in visual form. This allows a
site or excavation to have a continuous presence as an education
medium because it never closes, which means contact between
the public and cultural heritage represented in virtual worlds is
not lost. This can be a symbiotic and productive relationship
between information provision and the user, particularly in
regard to programs that utilize virtual worlds for education and
information dissemination. The extent to which members of the
public become involved in archaeology is partly influenced by
how archaeology as a profession responds to public input and
opinion. The public can influence the profession even via
virtual access just as virtual worlds and their content can
influence and educate the user. The choices of a visitor to a
virtual archaeology site are reflected in their use of the
interactive mediums that allow them to explore the virtual world.
These users make choices about how and to what extent they
explore the site and their choices can be measured through web
analytics. Web analytics can determine the optimum conditions
for visitor interaction and a virtual site can be adapted
accordingly. In effect the user influences how the information
about archaeology is represented to the public as clicks and site
navigation focus on information that is of most interest to the
user. Technology redefines the boundaries between the creators
of the site and the users similar to the changes occurring in
social media communication [2]. This analysis in turn can be
used to develop further variables associated with a web site
such as marketing or visitor data that have commercial
applications.
As a method of interface between the visitor and the site, virtual
worlds can redefine the relationship between the public and
archaeology. Similar to the way that site usage may reflect its
eventual development, users of virtual worlds may be tempted
to visit a ‘real’ site they have visited virtually and this in effect
may expose a section of the community to heritage where
previously there was none [3]. Therefore access to virtual
words about archaeology and their use is much more than just
information dissemination; it is an active and engaged
environment. This virtual environment does not facilitate
learning by doing where students learn through problem solving
[4]; doing becomes learning as the virtual visitor navigates their
way around a virtual archaeology site clicking and interacting
via a variety of choices. These choices provide an unlimited
opportunity for archaeology learning experiences via virtual
worlds.
Table 1 Virtual world categories
Site: These provide the public with the opportunity for
interactive virtual tours of archaeological sites. Examples
include
the
‘the
Virtual
World
Project’
(http://www.virtualworldproject.org/)
or
CyArk
(http://archive.cyark.org/) which has 3D and 2D content on
different heritage sites.
Maritime: Access to maritime archaeology through a virtual
world experience is one way to negate the difficult factors
normally associated with visiting this type of archaeological site.
Environment, diving, site and artefact restrictions play a great
part in depriving access to the public. This is true of a
traditional dive or conservation site where the artefacts must be
kept under controlled conditions such as those of the ‘Mary
Rose’ or of shipwreck sites present in virtual 3D worlds like
those in ‘Second Life’ [5].
Reconstruction: The reconstruction of buildings using 3D and
video provides an opportunity to superimpose a digital version
of the ruins on top of the current site or vice versa. This can
give insights about the construction methods, materials,
destruction and cultural aspects of ancient building technology.
It can also provide an opportunity for public archaeological
education of indigenous people to learn skills and about cultural
heritage that they have lost or forgotten [7].
Real estate: This provides the opportunity for the public to
create and participate in an online virtual community whose
focus varies according to the user. Membership of a virtual
world such as ‘Second Life’ allows the user to create sites
related to archaeological activities such as site tours,
excavations, shipwreck sites as well live content such as
discussion and interaction activities and classrooms [5]. It can
be also used as a visualization tool to enhance analysis of sites
through the use of modelling the original site within a virtual
world [8].
VIRTUAL WORLDS AND THEIR USE
A review of the literature revealed that there are seven
categories of virtual world related to archaeology. Table 1
indicates a representative example of each type of category: site,
shipwreck, reconstruction, real estate, landscape, excavation
and museums. These categories do not represent the totality of
the virtual worlds representing public archaeology on the
Internet but were defined for illustrative purposes. Each site
type varies and some contain only images and text whilst others
include, video, simulation, animation, panoramic video and 3D
content. Each virtual world archaeology site has its own focus,
educational resources and strategies; however the experience
they provide is common insofar as they each represent a
different aspect of archaeology and its dissemination to the
public through a virtual experience.
Landscape: Virtual reproduction of landscape can be modelled
to show changes between the past and the present and the
position and impact of sites on the landscape. This is useful in
site interpretation but also allows for scenario testing in the
reconstruction of past sites and the surrounding environment as
well as indicating human environment interaction [9].
Representation of these changes on a website allows the public
to understand the context in which sites were formed and
developed as well as consider human/environment interaction.
254
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Excavation: The practice of excavation in a virtual world can
represent professional and a public archaeological experience.
Practical field experience involving a considerable investment
in time and money is not always an option for archaeology
students despite the necessity of acquiring discipline specific
skills. Projects such as the LAVA project provide an
environment where students can gave necessary skills in a
cooperative exploratory environment [10,12].
The
development of a virtual participatory framework whereby
people advance in skill and level acquisition similar to games
technology provides a valuable tool for both students and the
wider public such as site volunteers who also need training in
excavation skills.
heritage on a virtual level and acts as a medium to influence
those who might not visit a physical site. The 3D world
becomes a place of play, dissemination and research and given
the increasing refinement and use of technology in artifact
analysis and conservation provides an indication of the direction
of future public and discipline interaction.
Museum: A visit to a museum provides an interactive
experience and can be combined with a visit to the actual
museum site. It can also provide exposure to collection material
that is not displayed in the physical site due to funding or space
restrictions. It also provides participants (public, disabled,
students, children) with differing needs the opportunity to
access collections in an integrated manner [11].
Modelling three-dimensionally can help archaeologists preserve
their findings, share them with the world, and, very importantly,
prevent artefacts from becoming damaged or even destroyed.
Using 3D technologies can help preserve even the most fragile
and minuscule artefacts. Computer programs specialized in 3D
image processing, along with 3D scanning techniques and 3D
printers, all contribute to creating replicas of ancient objects or
even entire ancient sites.
One common method is to take pictures of the real objects from
numerous angles (sometimes hundreds of different pictures) and
then recreate the object in 3 dimensions. Once the object is
translated into a 3D image that can be saved in a file, using the
appropriate software program, 3D printers read the files and
create a number of layers. They are printed and then, through
various methods, like using glue and binders, powders that can
be removed etc., the actual 3D real-life model is created. This
technology is reflected in the Wilder 3D Imaging, used by the
Texas A&M University, Center for Maritime Archaeology and
Conservation
(http://nautarch.tamu.edu/WilderLab/3dprinting.shtml).
A
process called "photomodeling", with 3D printers and 3D
scanners, is used by Harvard University's Semitic Museum
(http://www.semiticmuseum.fas.harvard.edu).
3D technologies are used for larger scale projects, as well. 3D
models of entire sites can be created, with all details in place,
with the artefacts in view and with the soil layers displayed in
colour codes. Scientists can manipulate these models in ways
that would be impossible in the real world (freely changing the
point of view, "slicing", observing objects hard to reach without
actually disturbing them in any way and so on).
Using 3D technologies in constructing virtual worlds has raised
the public interest as well. It is not only the archaeologists, but
also the IT developers who find this a fulfilling and exciting
field. Computer scientists, along with software developers have
taken on the task of creating software that helps with 3D
simulations of archaeological sites. Many commercially
available products exist that offer such services.
To offer a single example, "Digitale archaeologie" is a German
company based in Freiburg that specializes in computer aided
visualization and reconstruction of archaeological objects
(http://www.digital-archaeology.com) [17]. It has an extensive
portfolio and its clients include museums, universities, research
institutes etc. A visit on their web site allows the public to visit
Roman forts, medieval castles, Stone Age sites and many others.
USING 3D TECHNOLOGIES AND DIGITAL
ARCHAEOLOGY
A simple Google search on the Internet using the terms
‘Archaeology and Virtual Worlds’ on 30 April 2013 yielded
‘About 8,210,000 results (0.21 seconds)’. The first 50 pages
were reviewed to ascertain in general which type of virtual
world was most accessible to the public. Links to virtual
archaeology sites or information about them were counted.
The results are not definitive but serve as example for
illustrative purposes only. Figure 2 shows the breakdown in the
different web pages. Category refers to the distinct page type of
a virtual world whilst Referral refers to their mention in other
web page results.
Fig. 2 Accessibility of virtual world sites
By far the most accessible web page containing virtual worlds
on archaeology are the ones that contain site tours, followed by
museums and pages giving access to virtual real estate. The
visual and interactive natures of tours are reasons why this type
of medium is more accessible. Site tours are more prolific than
virtual real estate experiences that offer free and paid
membership through the installation of specific software to
access the sites. For example the number online avatars vary at
any given time [5]. However, access to virtual estate such as
Second Life provides an opportunity for people to interact with
Among the large number of 3D applications that can model
archaeological data, the following are worth mentioning:
AutoCAD, ArcGIS 3D Analyst, Blender, OpenSim etc.
While the use of 3D technology along with virtual reality have
been around for more than 30 years in the field of archaeology,
it is only in the past decade that scientists are using 3D as a
255
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
research tool as well [13]). In their paper, Hermon and Nikodem
integrate a database with a 3D modelling tool offering a
solution for the virtual reconstruction of a structure that does
not exist anymore [ibid].
In their paper dealing with a 3D model of an archaeological
excavation, Barcelo et. al. explain how to acquire 3D data from
the field, a task that has to be performed by the archaeologists
themselves [14]. Details are given regarding capturing the
coordinates and shape data, and then the mathematical approach
to processing the images is explained. Brutto and Meli explore
the automatic approach of using computer vision interfaces for
3D survey of archaeological sites [15].
It is worth mentioning at this point that, even though many
proprietary software applications exist, in numerous cases,
archaeologists appear to prefer open source software. The
continuous improvement of such software programs, along with
the other advantages of open source programs, is as appealing to
archaeologists as they are to other scientists today.
heritage sites increasing site exposure and the possibility of
funding contributions and conservation for lesser-known sites.
In a museum environment the objects on display usually only
represent a small percentage of the total collection, most of
which is in storage and virtual access to objects extends this
exposure.
CONCLUSION
The practical aspects of archaeology often limit the contribution
and engagement of the public in archaeological activities
however archaeology as a discipline has always been quick to
adopt new technology. The tradition of using virtual technology
for modelling and reconstruction is continued and enhanced
through the use of 3D technology to analyze and re-create
artefacts and sites in virtual worlds. These virtual worlds
provide a place for public interaction and engagement. Virtual
worlds have the capacity to reach and enthuse the public
towards physical site visits because of their prior virtual
exposure. They also have the potential to facilitate exposure to
cultural heritage because of the interactive nature of this
medium and to reach an audience interested in technology.
A brief count of accessibility for virtual world examples via the
Internet indicated that virtual tours not virtual real estate was
the more accessible option however if the number of visitors or
participants in virtual worlds are taken into consideration then
places such as Second Life have much higher potential to
become a platform for archaeology and public interaction. This
environment can provide a learning environment for the public
and a research and professional development environment for
the discipline. The increasing complexity and application of 3D
imaging software provides a valuable tool to catalogue and
record artefacts and sites before they deteriorate and represents
an opportunity to retain and digitally curate threatened material
as well as provide an opportunity not only for public
archaeological engagement in the present but also in the future.
PUBLIC PARTICIPATION AND ENGAGEMENT
Archaeologists and cultural heritage professionals need to ‘sell’
heritage to the public to protect and ensure that cultural heritage
is available to future generations. One way this can be done is
to involve members of the public in what archaeologists do.
The best way to preserve something is to educate people about
its importance. Exposure to cultural heritage is an important
criterion in determining and changing how the public thinks.
For this reason cultural heritage professionals and
archaeologists need to ensure that the public comes into contact
with all types of archaeology in order to foster this
understanding. Virtual worlds, via computer and Internet access
provide this opportunity to a wider participatory audience than
traditional site visits.
The advent of the Internet allows the representation and
recording of archaeological material and sites and the
dissemination of information about them to a wide audience in
new ways. This includes the construction of archaeological
virtual worlds, which facilitates public participation in
archaeology on another level. Virtual worlds provide an
opportunity for remote but nevertheless interactive public
participation and engagement in heritage activities.
Archaeological virtual environments or buildings are a product
of data and are representations of the original sites that are used
to construct them. They are limited by the quality and quantity
of the data used in their creation. However their interactive
nature allows a level of participation that is hard to duplicate at
a physical site. This interaction facilitates a collaborative
learning process for visitors to virtual sites. Collaborative
learning occurs where students are in control of their own
learning and outcomes [16] and in a virtual world, participants’
control the extent of their interaction with the medium and their
exposure to public archaeology. Virtual worlds provide another
opportunity for people to come into contact with heritage.
The appreciation of cultural heritage can be developed,
reinforced or discouraged depending on the experience of
visitors. This is equally true of visitors to a virtual or a physical
site. The participation of the public in online excavations, site
tours or museum visits in a virtual world is beneficial in many
ways. Virtual participation in an excavation is an educational,
safe and non-destructive way of demonstrating archaeological
techniques. On line site tours offer wider audience access to
REFERENCES
[1] D.H. Sanders, “Virtual Worlds for Archaeological Research
and Education”, Archaeology in the Age of the Internet:
Proceedings of the 25th Anniversary Conference of CAA,
Birmingham, April 1997.
[2] D. Zheng, H. Chen, R. Lusch & S.H. Li, “Social Media
Analytics and Intelligence”, Intelligent Systems, Vol 25, No. 6,
2010, pp.13-16.
[3] M. Malkemis, Science and Space: CNN Future Summit
Forum (opinion),
http://edition.cnn.com/2007/TECH/science/05/08/fs.virtual.herit
age.forum/, 2007, (Date accessed 1 June 2013)
[4]Y. Anzai, & H.A. Simon, “The theory of learning by doing”,
Psychological Review, Vol 86, No. 2, 1979, pp.124-140.
[5] B.A. Chiarulli, R.S. Moore, S.W. Neusisius, B. Ford & M
Smeltzer, “Public Archaeology in Virtual Worlds”,
Anthropology News, Vol 51, No. 6, 2010, p.35.
256
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
[6] G.P. Watts, & T.K. Knoerl, “Entering the Virtual World of
Underwater Archaeology” in John H Jameson & Della A ScottIreton, (eds), Out of the Blue, Springer, 2007, pp. 223-239.
[13] S. Hernon & S. Nikodem, “3D Modeling as a Scientific
Research Tool in Archaeology”, International Conference on
Computer Applications and Quantitative Methods in
Archaeology (CAA), 2007.
[7] P. Dawson, R. Levy & N. Lyons, “Breaking the fourth
wall’: 3D virtual worlds as tools for knowledge repatriation in
archaeology”, Journal of Social Archaeology, Vol 11, No. 3,
2011, pp.387-402.
[14] J.A. Barcelo, O. De Castro, D. Travet & O.Vincente, “A
3D Model of an Archaeological Excavation”, in The Digital
Heritage of Archaeology. Computer Applications and
Quantitative Methods in Archaeology, 2003.
[8] C.L. Morgan, “(Re) Building Catalhoyuk: Changing Virtual
reality in Archaeology”, Archaeologies: Journal of the World
Archaeological Congress, Vol 5, No. 3, 2009, pp.468-487.
[15] M.L. Brutto & P. Meli, “., Computer Vision Tools for 3D
Modeling in Archaeology”, International Conference on
Cultural Heritage and Digital Libraries, EUROMED 2012.
[9] S.J. Winterbottom & D. Long, “From Abstract digital
models to rich virtual environments: landscape contexts in
Kilmartin Glen, Scotland”, Journal of Archaeological Science,
Vol 33, No. 10, 2006, pp.1356-1367.
[16] T. Panitz, “Collaborative vs Cooperative Learning:
Comparing the two definitions help understand the nature of
interactive learning”, Cooperative Learning and College
Teaching, Vol 8, No. 2, 1997, Accessed online at
http://home.capecod.net/~tpanitz/tedsarticles/coopdefinition.ht
m (April 2013)
[10] K. Getchell, A. Miller, J.R, Nicoll, R. Sweetman, & C.
Allison, “Games Methodologies and Immersive Environments
for Virtual Fieldwork”, IEEE Transactions on Learning
Technologies, Vol 3, No. 4, 2010, pp. 281-293.
[17] "Digital Archaeology: 3D Modeling Reveal Ancient
Artifacts:
http://www.popularmechanics.com/technology/gadgets/tools/di
gital-archaeology-3d-modeling-reveals-ancient-artifacts15222887 (Date accessed: June 3rd, 2013)
[11] K. Walczak, W. Cellary, & M. White, “Virtual Museum
Exhibitions”, Computer, Vol 39, No. 3, 2006, pp. 93-95.
[12] K, Getchell, A. Miller, C. Allison, R. Hardy, R. Sweetman
& V, Crook, “. The Lava Project: A Service Based Approach to
supporting Exploratory Learning”, Proceedings of the IADIS
International Conference. WWW/Internet (Vol.2006).
257
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
E-Learning for Teaching Humanities in Undergraduate Medical Education
Ksenia A. MITROFANOVA
Department of Foreign Languages, Ural State Medical Academy
Yekaterinburg, Sverdlovskaya oblast, Russia
Moreover, there is a problem concerning ubiquitous use
of information and communication technologies during
pre-clinical and clinical years of medical education in the
Russian Federation. Generally not all medical courses are
considered to be suitable for the replacement of
conventional teaching methods with the innovative one.
Nevertheless, the Humanities traditionally being taught
face-to-face during medical training are appeared to be a
field of interest for IT introduction in the studying
process.
ABSTRACT
The Humanities traditionally being taught face-to-face
during medical training are appeared to be a field of
interest for E-learning introduction. An electronic version
of the elective course “Intercultural Communication” was
approved for first-year medical students and the pilot
study was conducted during September 2012 – January
2013 at the Ural State Medical Academy. We offered 119
students three possible ways to study this course:
conventional learning, E-learning, and blended learning.
None of the students chose E-learning. Thus, the students
formed two groups: conventional learning and blended
learning groups, their distribution was voluntary. 64
students were considered as the blended learning group.
Students’ perception of the new approach was collected
using a questionnaire. The results showed that the
majority of students (n=53) preferred blended learning,
they considered that the most interesting forms of study
were participation in virtual seminars (n=44) and face-toface seminars (n=41). All students (n=64) found it
convenient to have 24-hour access to course documents.
They considered blended learning to be useful for
communication. Nevertheless, small number of students
(n=6) thought it was possible to study the Humanities
using only E-learning technologies. Further studies need
to be conducted to get data on effectiveness of blended
learning approach in medical education.
SETTING
The Ural State Medical Academy is a medical school in
Yekaterinburg (the Russian Federation) that provides
undergraduate medical education in general medicine,
preventive medicine, pediatric care and dentistry. About
600 first-year medical students study at this medical
school.
INTRODUCTION
The humanities are taught during first two pre-clinical
years. They included obligatory courses in Philosophy,
Bioethics, Russian History, History of Medicine, the
medical foreign language (English, German or French),
Latin, Psychology and Pedagogy, and Science of Law.
Moreover, students should choose one of the following
elective courses: Anthropological Basis of Medical
Practice, Social Work in Medical Practice, Intercultural
Communication, History of Beneficence and Charity,
History of the Ural region, Organization of Unsupervised
Work, or Theory of Constitutional State and Civil
Society. E-learning was firstly introduced in the Ural
State Medical Academy in 2007 [6].
Currently due to the development of new technologies
alternative teaching methods such as E-learning and
blended learning have been introduced in undergraduate
medical curriculum. Blended learning has been
introduced in integrated, problem-based learning
curriculum for pre-clinical medical students [1, 2], and
for development of communication skills and lab training
skills in clinical medical students [3, 4]. David A. Cook
et al. performed a systemic review of 266 studies
comparing web-based learning with traditional or other
educational methods and revealed that 24% of courses
used blended web-based and non-computer-based
instructions; however, the authors noticed lack of valid
statistically significant data confirming advantages of
web-based learning [5].
An elective course in intercultural communication was
firstly introduced in the undergraduate medical
curriculum in 2008. Thereafter about 110 students studied
this course each year. According to the present
curriculum the elective presupposes 36 hours of
classroom work (18 hours of lectures and 18 hours of
seminars). Taking into account that at least 70 students
study the elective simultaneously it appeared to be
challenging to organize effective work for such number
of students during a seminar. Therefore it was important
to find adequate teaching methods and educational
approaches to provide more personalized learning
experience for medical students. Moreover, we wanted to
create comfortable educational environment for students
to support their learning.
Key words: blended learning, undergraduate medical
education, Humanities, preclinical education, E-learning
258
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
We considered blended learning to be an effective
method to teach electives in the Humanities during preclinical years. Thus, we offered blended learning to the
medical school administrators as an approach to teach
electives in the Humanities. Blended learning for the
elective “Intercultural Communication” was approved for
first-year medical students during September 2012 –
January 2013.
MATERIALS AND METHODS
In September 2012 119 first-year medical students chose
“Intercultural Communication” as an elective course in
their curriculum. We offered three possible ways to study
this course. The first was a conventional one consisting of
face-to-face lectures and seminars. The second one was
based on E-learning approach realized in the virtual
campus. The third one was based on blended learning
where students were allowed to combine face-to-face
education with E-learning. None of the students decided
to exclude completely face-to-face communication. Thus,
the students formed two groups: conventional learning
and blended learning groups. Students’ distribution
between these two groups was voluntary. Blended
learning or E-learning were not obligatory ways to study
the elective. Moreover, students had an opportunity to
register in the virtual campus and start using E-materials
during the whole study course. It made difficult to
determine students from conventional learning and
blended learning groups. Therefore, we had to introduce
the following criteria to include students in the blended
learning group: 1) studying at least 50% of material in the
virtual campus (data provided by virtual campus
administrators); 2) participation at least in 50% of virtual
seminars; 3) completion of controlling tasks (essay
writing and the final test) in the virtual campus; and 4)
registration in the virtual campus within September –
October 2012. Sixty four students met the above
mentioned criteria and were considered as the blended
learning group. However, it should be noted that by the
end of the course 94% of students (n=112) had been
registered in the virtual campus.
Blended learning at our medical school is based on Elearning technologies that have been recently introduced
in the curriculum. New information technologies
available via the Internet help both to interact with
students and control them more effectively. The virtual
campus (http://do.teleclinica.ru) has been functioning
using complex educational software “CixSoft”. It offers a
number of courses for pre-clinical medical students
which correspond to the conventional courses taught at
our medical school. The courses in the virtual campus are
identically designed. Each course includes the complex of
hypertexts (usually electronic version of lectures) divided
into modules according to the topics. Modules include
not only text but also all necessary illustrated material,
e.g. tables, pictures, photos and even multimedia.
Visualization helps to study theoretical courses more
effectively. Undergraduates are able to choose how much
time they spend to study certain modules. Moreover, the
system of links allows them to refresh their knowledge of
previous topics.
All courses in the virtual campus have a developed
system of controlling tasks. It includes teaching tests,
controlling tests, problem solving tasks, term papers etc.
depending on the requirements of the curriculum.
However, students do not gain access to final tests if they
have missed some topics and teaching tests in modules of
a course. Nevertheless, undergraduates can choose what
topics to study first within the course.
The aims of our research were to evaluate students’
activity in the virtual campus while studying an elective
humanities course, to get students’ feedback on blended
learning and E-learning methods introduced to teach the
Humanities, and to determine whether blended learning
and E-learning increase comprehension of the subject.
Though E-learning has obvious advantages, it cannot
substitute face-to-face communication with lecturers and
comrades which is really important for undergraduates.
Currently, we offer our students various opportunities to
study both in classrooms and in the virtual campus.
However, limited technological resources do not allow us
to make the use of the virtual campus obligatory for all
students. Therefore, the virtual campus at our medical
school is only a subsidiary method of learning. Moreover,
blended learning methods have not been yet used to
conduct seminars in the virtual campus.
We evaluated students’ activity by the period of time
spent by a student in the virtual campus studying the
course material, completion of teaching and final tests
and writing an essay in the virtual campus, and
participation in virtual seminars and discussions (only
informative comments were assessed). We conducted a
survey to get students’ feedback. Students’ perception of
the new approach was collected using a questionnaire.
The self-administered questionnaire included 7 closedend questions concerning the preferred learning
approach, the most complicated tasks, the most
interesting forms of work, the factors influencing their
comprehension of the subject both negatively and
positively, and their general perception of blended
learning methods for teaching the Humanities. Content
validation of the questionnaire was performed by two
medical school experts. The questionnaire was distributed
We offered first-year students a completely electronic
elective humanities course that can be studied without
classroom attendance. We used the virtual campus to
organize not only lectures and controlling tasks but also
seminars. Seminars were designed using the option
“Forum” where students could answer questions, share
their ideas and participate in discussions by commenting
to different points of view.
259
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
only among students from the blended learning group.
Though the completion of the questionnaire was
voluntary, all students (n=64) did it. Each participant
provided consent. We examined the questionnaire’s test –
retest reliability. Reliability information was collected
from 16% of students (n=10). The mean time between the
surveys was 20 days (range 14 – 30 days). Students’
comprehension of the subject in both groups was
estimated according to the final scores obtained to pass
the examination. The minimum score required for passing
grade was 50 and the maximum score was 100.
majority of first-year medical students (94%, n=60)
considered online learning environments to be
particularly useful for communication and collaboration
both with other students and a lecturer. Students’
satisfaction with blended learning environment
introduced for studying the elective was evaluated
according to the scale (range 0 – 5 points, where ‘0’
meant unsatisfied and ‘5’ – completely satisfied). The
majority of students were completely satisfied with the
study process using blended learning methods (77%,
n=49), other students evaluated their satisfaction as 2
(10%, n=7) and 3 (13%, n=8) points. Ninety two percent
of students (n=59) would recommend blended learning
approach to teach other courses in Humanities.
RESULTS
Sixty four students regularly participated in virtual
seminars (n=8); less than three comments in each virtual
seminar were assessed as uninformative. The discussion
on the topic of the first virtual seminar involved 55% of
students (n=35); of the second one – 72% (n=46); of the
third one – 100% (n=64); of the fourth one – 98% (n=63);
of the fifth one – 50% (n=32); of the sixth one – 77%
(n=49); of the seventh one – 69% (n=44); and of the
eighth one – 98% (n=63). The mean time spent by
students in the virtual campus was 27.5 academic hours
(range 22.5 – 35 academic hours). Compared to
conventional teaching approach we were able to evaluate
less than 17 students during each face-to-face seminar.
We had no opportunity to assess the time spent by
students for unsupervised work using traditional teaching
methods. Though, according to the curriculum the
elective includes 36 academic hours of unsupervised
work.
The comprehension of the subject between the blended
learning and conventional learning groups was
significantly different. The mean final score in the
blended learning group was 86 (range 69 – 100 scores),
and in the conventional group it was 63 (range 50 – 76
scores).
LIMITATIONS
The present pilot research had a number of limitations.
Firstly, as participation in the study was voluntary
students were not randomized between the blended
learning and conventional learning groups. Those who
were included in the blended learning group were thought
to be more active and enthusiastic concerning the
introduction of new approaches in the study process.
Moreover, we suppose that they had wider range of
opportunities to obtain higher scores due to more
personalized learning process. This fact might
significantly influence the comparison results of subject
comprehension between the groups. Secondly, only about
54% of students wanted to try new approaches (blended
learning and E-learning) to study the humanities elective;
thus, the rest 46% of students were missed from our
survey.
The questionnaire results showed that the majority of
students (83%, n=53) preferred blended learning to study
the elective; 9% of students (n=6) were ready to study the
elective using only E-learning methods; and 8% of
students (n=5) preferred only classroom work. According
to the acquired data the most captivating forms of study
were participation in discussions during virtual seminars
(69%, n=44) and face-to-face seminars (64%, n=41);
students also found interesting lectures and following
discussions (23%, n=15), essay writing (25%, n=16), and
the final test (38%, n=24). The most difficult task for the
majority of students was essay writing (78%, n=49); the
following forms of study also caused some problems for
students: the final test (21%, n=13), face-to-face seminars
(17%, n=11), virtual seminars (17%, n=11), and lectures
with the following discussion (10%, n=6). Students
determined the following factors that complicated their
comprehension of the subject: large number of people
(about 100) who had to participate in face-to-face
seminars simultaneously (47%, n=29); problems with
registration in the virtual campus (21%, n=13); absence
of permanent access to the Internet (15%, n=9); and lack
of time to prepare for seminars and controlling tasks (8%,
n=5). However, all students (100%, n=64) found it
convenient to have course documents all in one place and
get to the course any time they want. Furthermore, the
CONCLUSIONS
Students supported the introduction of new technologies
in medical education. Nevertheless, they were not ready
to give up the classroom; small number of students
thought it was possible to study the Humanities using
only distant learning technologies. Though E-Learning
has obvious advantages such as providing course material
in an organized and structured manner available for
students 24 hours a day, it cannot substitute face-to-face
classroom communication which is really important for
undergraduates.
Blended learning which combines both conventional
methods of teaching with current E-Learning methods
may be an optimal approach to teach the Humanities in
medical school to satisfy the needs of students. This
approach was enthusiastically accepted by the majority of
260
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
students due to its ability to improve comprehension of
the subject, enhance communication and stimulate
educational process. However, the problem of students’
motivation to study courses using blended learning
approach need to be considered, as currently only about
50% of students are ready to use new study methods.
The results of the pilot research are promising in terms of
possible creation of blended learning environments to
teach the Humanities during pre-clinical years in the
medical school. However, further experiments need to be
conducted to get statistically significant data on
effectiveness of blended learning approach in medical
education.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
S.M. Bridges, J.E. Dyson, E.F. Corbet “Blended
learning, knowledge co-construction and
undergraduate
group
work”,
Medical
Education, Vol. 43, Issue 5, 2009, pp. 490-491.
S.M. Bridges, M.G. Botelho, P.C.S. Tsang
“PBL.2.0: Blended learning for an interactive,
problem-based pedagogy”, Medical Education,
Vol. 44, Issue 11, 2010, p. 1131.
A. Szulewski, L.K. Davidson “Enriching the
clerkship curriculum with blended e-learning”,
Medical Education, Vol. 42, Issue 11, 2008, p.
1114.
R. Lehmann, H.M. Bosse, S. Huwendiek
“Blended learning using virtual patients and
skills laboratory training”, Medical Education,
Vol. 44, Issue 5, 2010, pp. 521-522.
D.A. Cook, S. Garside, A.J. Levinson, D.M.
Dupras, V.M. Montori “What do we mean by
web-based learning? A systematic review of the
variability
of
interventions”,
Medical
Education, Vol. 44, Issue 8, 2010, pp. 765-774.
P.V. Ivachev “Innovative models and
technologies of training in the sphere of social
and medical education”, Ural Medical Journal,
Issue 6, 2010, pp. 107-110.
261
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Mathematical Laboratory in Your Smartphone
Mercedes BARCHILON BEN-AV
Achva Academic College,
Mobile Post Office Shikmim 79800, Israel
and
Radel BEN-AV
Software engineering Department, Azrieli College of Engineering
P.O.Box 3566, Jerusalem, Israel
virtual reality environment for mathematics
education using special equipment (e.g. [3]).
ABSTRACT
In the last years there is an explosive growth of
smartphone availability in the USA and other
western countries. In our work we show how
existing smartphones properties (hardware and
software) can be used to teach and experience the
abstract concept of a vector. We believe that using
gadgets loved by the students will enhance their
motivation, curiosity and active participation in the
class.
Smartphone characteristics
An accelerometer is a device that measures the
proper acceleration in the Cartesian coordinates
(x,y,z). At rest, on the earth surface, it measures the
gravitational vector denoted by . The highly
popular iPhone©, introduced in 2007, has an
integrated accelerometer. The main reason for the
accelerometer integration was the ability to sense
the iPhone orientation and automatically change the
view when the phone is held vertically or
horizontally. It is also used for controlling games.
Since then, integrated accelerometer became a
standard for almost all smartphones. As of today
“everybody” has an accelerometer in his/her pocket.
There are available Software tools in smartphones
(apps) that record the data measured by the
accelerometer in a log file. The data can be later
analyzed on a PC.
Keywords: Mathematical education, smartphone,
new technology for education
INTRODUCTION
In the last years there is an explosive growth of
smartphone availability in the USA and other
western countries[1]. Some educational authorities
drew attention to the disturbance it creates to the
learning process[2]. We wish to view also possible
positive contribution of this wave on high education
learning. In this paper we show how smartphones
can contribute to enhance the quality of learning of
mathematical concepts.
METHOD
In our work we show how this data can be used to
teach and experience the abstract concept of a
vector. We take the gravitational vector as an
example. Using their own smartphones, we teach
the students how to show to themselves some
important properties of a vector:
Modern smartphones contain sensors that enable to
set up an environment where the learner (student)
can feel and “play” with virtual (and at the same
time real) objects in their mathematical
representation. It is important to note that this can be
achieved using commonly available smartphones
and easy “of the shelf” products. It does not
necessitate any additional or specially designed
software or hardware unlike previous work building
262
Measuring the vector size given its
coordinates
Vector size independence of rotation
Rotation effect on the coordinates of a
vector
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Rotation matrix in two dimensions (2D
rotation matrix) and in three dimensions
(Euler angles).
15
The experimentation uses the smartphone’s
ability to measure the components of the
acceleration on earth surface according to the
smartphone’s self coordinate system (see figure
1)
5
10
1
14
27
40
53
66
79
92
105
118
131
144
157
170
183
196
209
0
-5
Ax
Az
-10
Ay
Figure 2- Vector coordinates under rotation
CONCLUSIONS
We believe that using gadgets loved by the students
will enhance their motivation, curiosity and active
participation in the class, thus improving the
understanding of the learned subject[4,5].
Figure 1- Vector coordinates under rotation
RESULTS
In figure 2 we show the result of a sample activity
were accelerometer raw data of the proper
acceleration along the axis (Ax,Ay,Az) is plotted
against time. The data was recorded while manually
rotating a common smartphone (Samsung Galaxy
SII) using standard free application (Accelerometer
Log). We calculated the acceleration vector size also
as a function of time using Eq. (1).
Ax 2 Ay 2 Az 2
13
8
3
(1)
-2
The result is plotted in figure 3. All the graphs were
produced using Excel. One can note that the
projection along the axis may change due to rotation
of the smartphone while the proper acceleration
vector size does not change.
-7
1
14
27
40
53
66
79
92
105
118
131
144
157
170
183
196
209
A
The depth level and the subject matters can be
adjusted according to the class level.
Ax
Ay
Az
Vector Size
-12
Additional activities were developed and will be
presented.
Figure 3-Vector size invariant under rotation
REFERENCES
[1] Business Insider; 9/12/2012
http://www.businessinsider.com/us-smartphonemarket-2012-9
[2] http://www.telegraph.co.uk/education/
educationnews/9326884/Ditch-smartphones-toboost-reading-skills-pupils-told.html
[3] H. Kaufmann, D. Schmalstieg, M. Wagner, (2000)
“Construct3D: A Virtual Reality Application for
263
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Mathematics and Geometry Education”;
Education and Information Technologies, 5(4),
pp 263-276
[4] G. W Hill, R. A. Smith, & M. Horn (2004). Using
Technology to Increase Student Interest,
Motivation, and (Perhaps) Learning,
http://smartroom.com/KSUAPA.pdf
[5] T. Campbell, S. K. Wang, H-Y. Hsu, A. M.
Duffy, P. G. Wolf (2010). “Learning with Web
Tools, Simulations, and Other Technologies in
Science Classrooms”. Journal of Science
Education and Technology. ISSN: 1059-0145
(Print) 1573-1839 (Online)
264
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Enhancement of an Undergraduate Software Engineering Course by Infusing
Security Lecture Modules
Hyunju KIM, Natarajan MEGHANATHAN, and *Loretta A. MOORE
Department of Computer Science, *Division of Research and Federal Relations
Jackson State University
Jackson, MS 39217, USA
ABSTRACT
2. BACKGROUND AND RELATED WORK
As software is used everywhere in our daily lives, the
importance of developing secure software becomes more
apparent. Software security is increasingly considered a
software engineering problem, thus traditional software
engineering curricula need to be enriched with security
components. This paper reports an effort to incorporate
security topics in a senior-level undergraduate software
engineering course. The course was modified with
respect to topics covered, course objectives, and course
requirements. This paper also details specific security
topics introduced into the course and their associations
with traditional software engineering topics. Course
assessment data and student feedback show that our
enhancements have been efficient in infusing the security
considerations required for secure software development.
The Department of Homeland Security has established
the Build Security In (BSI) project and provided useful
resources through a website (https://buildsecurityin.uscert.gov/) for incorporating security into every phase of
software development. These resources have been
developed according to the principle that software
security is a software engineering problem and must be
addressed in a systematic way throughout the software
development life cycle [6]. In response to this principle,
there have been several efforts to develop new software
engineering modules and courses to educate computer
science majors in secure software development.
A study reported in [13] developed a course module for
writing secure code. The module consisted of security
and insecure code concepts, safe programming practices,
and simple lab exercises. It was taught in an introductory
Java programming class and a programming design class
for freshman and sophomore, respectively. This study
showed that a course module-based approach is an
effective method of educating the students about the
impacts of insecure code and safe programming practices.
Alternatively, the authors of [3] developed a software
security learning process that used outcomes of a
traditional software engineering course and developed
secure software. It was an effort to develop a teaching
process for secure software rather than to develop
teaching materials.
Keywords: Software Engineering Education, Secure
Software Engineering, Security Lecture Modules, Course
Enhancement, Software Security Attacks
1. INTRODUCTION
As software is used everywhere in our daily lives, the
importance of developing secure software becomes more
apparent. The challenge is to enrich the traditional
software engineering approach with security aspects,
taking into account limited time and resources. Most
successful attacks result from targeting and exploiting
known, non-patched software vulnerabilities and
insecure software configurations, many of which are
introduced during design and coding [2]. Thus it is
imperative that secure design and coding principles are
embedded throughout the whole software development
lifecycle.
Efforts reported in [4, 5, 8, 9, 11, 12] developed
undergraduate or graduate software engineering courses
and/or teaching materials to incorporate security topics
and issues into a traditional software engineering
education. The studies in [8, 11, 12] involved the
development of teaching modules covering major
security topics for a graduate secure software
engineering course. Although the course developed in [9]
was undergraduate-level, it was designed to replace the
traditional software engineering course within an
undergraduate computer science curriculum.
This paper reports an effort to incorporate security
lecture modules in a traditional undergraduate software
engineering course. This effort forms part of the NSF
(National
Science
Foundation)-funded
TUES
(Transforming Undergraduate Education in STEM)
program on incorporating security aspects in the
undergraduate Computer Science curriculum at Jackson
State University.
On the other hand, an effort reported in [4, 5]
incorporated security studies into an existing
undergraduate software engineering course. This
traditional undergraduate software engineering course
265
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
was modified in three areas: instructions; lecture
materials and exercises; and the semester-long project.
The course adopted a combination of both facilitator and
formal authority-based teaching. Along with the
traditional software engineering topics, security-related
topics such as the security development lifecycle model,
security risk, and secure design were introduced to the
course. A single, semester-long project was executed as
well. The challenges identified from this effort were a
lack of security teaching materials for undergraduate
students and a lack of time for completing the
development project within a single semester. Besides
developing or enhancing software engineering courses, a
study in [10] proposed security topics for secure software
engineering according to the Software Engineering Body
of Knowledge (SWEBOK) Guide.
before their graduation. While students are taking the
software engineering course, they form a team of three to
four members for their senior project. Each team selects
a capstone project, and students are asked to complete
requirements engineering and system analysis while in
CSC 475. During their capstone project course, they
focus more on system design, implementation, and
testing.
The CSC 475 Software Engineering course has the
course description: "Introduction to software engineering,
software design, APIs, software tools and environments,
software development processes, software requirements
and specifications, software verification and validation,
software implementation, software evolution, and
software project management". As this description
indicates, the course covers the fundamentals of software
engineering for senior-level computer science majors.
Prior to Fall 2010 semester, however, it did not have
appreciable coverage of security-related issues.
These efforts demonstrate an awareness that traditional
software engineering education needs to be enhanced
with security components. The new Computer Science
Curricula 2013 [1] reflects this particular need by
introducing the new knowledge area of Information
Assurance and Security (IAS). IAS covers Security
Concepts, Secure Design, Defensive Programming,
Threats and Attacks, Network Security, and
Cryptography as its Core-Tier topics.
As part of our TUES project, since Fall 2010 semester,
we have (1) identified security-related issues and topics
in developing software; (2) developed security lecture
modules; (3) mapped security topics to relevant software
engineering topics; and (4) incorporated the security
lecture modules into the software engineering teaching
materials. In this particular effort, our team did not
intend to develop a new software engineering course.
Instead, we aimed to efficiently incorporate security
components in the traditional software engineering
course.
The traditional knowledge area of Software Engineering
(SE) has been also changed: Security Risk has been
added to Software Project Management, and Software
Construction (secure coding practices, security enhanced
programming, security problems in programming, and
security considerations) has been added as two hours of
Core-Tier2. In addition, the elective topic of Software
Reliability from the 2001 computing curricula is now a
one hour Core-Tier2 topic.
3.1 Course Modification
As security topics were introduced, the course has been
modified with respect to topics covered, course
objectives, and course requirements. A set of security
topics that are closely related to software development
was identified as follows:
• Secure Software Development Lifecycle
• Principles and Models for Software Security
o System
dependability:
security
fundamentals
o The 10 principles of software security
o Bell-LaPadula confidentiality model
o Biba integrity model
• Security Requirements
o Functional and nonfunctional security
requirements
o Misuse cases and mitigation plans
• Security Risk Analysis
o Risk assessment process
o STRIDE threat model
o Attack trees
• Software Security Attacks
o Attack patterns
o Dependency attacks
o User interface attacks
o Design attacks
o Implementation attacks
Addressing the need for secure software engineering, this
paper presents security component enhancements made
to a traditional undergraduate software engineering
course. As part of our TUES project, the team developed
two new elective senior-level undergraduate security
courses: Systems and Software Security, and Advanced
Information Security [7]. Besides these elective courses,
we adopted security lecture modules used in these
courses into our undergraduate software engineering
course required by the Computer Science BS program.
Consequently, all computer science majors have been
educated in the essentials of secure software engineering
for the past three academic years. Section 3 of this paper
introduces this enhanced software engineering course.
Section 4 discusses findings from our experiences,
followed by a conclusion in Section 5.
3. THE UNDERGRADUATE
SOFTWARE ENGINEERING COURSE
The BS program in Computer Science at Jackson State
University requires students to take CSC 475 Software
Engineering followed by a senior capstone project course
266
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
•
Testing for Software Security
o Security functional testing: a fault
model
o Fuzz testing
o Mutation testing
o Run-time fault injection
•
•
These topics range from the concepts of software
security to security testing methods so that students can
learn security considerations and guidelines in every
phase of software development. Thus, the course teaches
the importance of secure software development lifecycle
as a semester progresses. Our approach to infuse these
security topics to the existing software engineering
topics is presented in Section 3.2. The course objectives
were also updated accordingly as follows:
Not all these exercises were required by the course in
every semester: they were selectively provided to the
class depending on student's background and learning
pace. However, all the exercises were usually covered in
the two consecutive courses of Software Engineering and
Senior Project.
Each student who successfully completes this course
should be able to:
• CO1: Explain software process models and their
characteristics and principles and models for
software security.
• CO2: Understand issues in project management,
including planning for software development
and specify software evolution processes and
issues in software maintenance.
• CO3: Apply key elements and common
methods for elicitation and analysis to produce
a set of software requirements, including the
appropriate security-related aspects, for the
chosen Senior Project.
• CO4: Select and apply appropriate design tools
and guidelines in developing software.
• CO5: Specify issues in risk assessment for
secure software design and explore different
software security attacks with respect to
dependency, user interface, design, and
implementation.
• CO6: Test software, including the security
aspects using software verification and
validation methods.
The course requires each student to be in a team for a
capstone project. The project teams are directed to
identify a project topic that has security components, for
instance authentication, authorization, encryption, etc.
During the requirements engineering and system analysis,
each team is asked to identify and document security
requirements, misuse cases, and mitigation plans for
their project. The knowledge and tools taught by this
course are heavily used in implementing and testing the
project during the capstone project course.
3.2 A Mapping of Security Topics in Software
Engineering
As mentioned earlier, our TUES project developed two,
new security courses (CSC 438 Systems and Software
Security and CSC 439 Advanced Information Security)
as senior-level electives. During the first year of the
course modification, the software engineering course
invited the instructor who developed the new security
courses. The invited instructor taught the security lecture
modules of the topics listed in Section 3.1. However,
based on student feedback, the team decided to infuse
these security topics to the existing software engineering
teaching materials, and a single instructor began to teach
all the course topics. This made the class flow more
seamless, and a consolidated set of teaching materials
became available to students.
The course objective of CO5 was newly added, and the
course objectives of CO1, CO3, and CO6 were updated
in order to incorporate the security components. Each
student was evaluated with respect to the objectives
through exams, quizzes, and project assignments. In
addition, the following in-class or lab exercises were
designed and used to provide students hand-on
experiences and/or real-life attack examples:
•
•
are launched. An online auction site was setup
using PHP and XAMPP. Students are asked to
develop client-side input validation controls and
server-side controls to prevent such injection
attacks.
Cross-Site Request Forgery (XSRF) attack: this
exercise shows how the attack exploits a web
site's trust in the user.
Email tracker: this exercise shows a web bug
and how it works.
In order to infuse the security topics to the teaching
materials, we identified software engineering topics that
are related to these security topics. We developed a
mapping of security topics in software engineering,
which also includes the associations with the course
objectives. Table 1 summarizes the mapping that has
been implemented as teaching materials in the forms of
lecture notes, project assignments, and/or lab exercises.
All the security modules and teaching materials are
available
through
our
project
website
(http://www.jsums.edu/cms/tues) for the public and
possible adoption at other institutions.
TOCTTOU (Time-of-Control-to-Time-of-Use)
attack: this exercise asks students to simulate
the TOCTTOU vulnerability by granting and
revoking the permissions to access a text file in
an Ubuntu virtual machine.
Code injection attack: this exercise shows how
code injection attacks such as SQL injection
attack and Cross-Site Scripting (XSS) attacks
267
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Table 1. A mapping of security topics in software engineering
Software Engineering Topics
Software Process Models
Software Quality Management: System
Dependability
Project Risk Management
Requirement Engineering: Functional,
Nonfunctional, User, System, and Domain
Requirements;
Object-oriented Analysis: UML Diagrams
Object-oriented Design: Providing Access
Control
Software Verification and Validation
Security Topics
Secure Software Development Lifecycle
Principles and Models for Software
Security
Security Risk Analysis
Security Functional and Nonfunctional
Requirements;
Misuse cases and mitigation plans
Authentication and Authorization;
Software Security Attacks
Testing for Software Security
Adding the security topics to the course required the
course topics and their depth to be adjusted. The
incorporation of security topics limited the coverage of
certain elective or advanced software engineering topics
in the course. Project discussions during lecture were
also limited in order to allocate sufficient time for the
security coverage.
Course Objectives
CO1
CO2, CO5
CO2, CO5
CO3
CO4
CO6
software engineering course to be 1.3 on average. After
taking the course, they evaluated their ability to be 2.7 on
average, which indicates that the course has contributed
to their security education.
Students were also able to design and implement security
modules in their senior projects. Table 2 summarizes
security features that were commonly incorporated into
capstone projects since the course was modified.
4. FINDINGS AND STUDENT ASSESSMENT
Unlike the most of the previous studies described in
Section 2, our goal in this effort was not to develop a
new secure software engineering course, but to enhance
the existing software engineering course with security
components. Independent guest lectures on security
topics were not appreciated by students because the
lectures were considered an extra burden. Therefore,
there was a need to seamlessly integrate the teaching of
security and the teaching of software engineering. Our
approach of developing subject mapping and infusing
security topics according to mapping in software
engineering has been observed to be sufficient to satisfy
this need.
As reported in the previous studies [4, 5, 8], challenges
commonly faced in efforts to incorporate security into
the teaching of software engineering, especially at
undergraduate level, include a lack of teaching materials
and a lack of time for students to complete development
projects. Our approach to these problems was to develop
portable security lecture modules in one or more security
courses and infuse them to the existing teaching
materials in the software engineering course/s. This also
made it possible to easily adjust levels of coverage and
depth of the course depending on the student's
background and learning pace.
In relation to the implementation of security features,
capstone projects have been used. Because the projects
span two consecutive courses, students are able to spend
more time working on security aspects and risk analysis
in developing system requirements. On the other hand,
the course demands that students select projects with
security features, which puts a limit on available project
topics. It has been challenging to identify student
projects that are both reasonable and diverse.
5. CONCLUSION
We developed a mapping of security topics in software
engineering and infused the security lecture modules to
the undergraduate software engineering teaching
materials according to the mapping. This approach
required modification of the course topics, course
objectives, and course requirements. Our approach has
been observed to be efficient in delivering a desirable
amount of security coverage according to student
background and learning pace. Thus, it can be utilized as
a method to introduce security components to
undergraduate software engineering, with no curriculumlevel changes.
The incorporation of security topics into the course has
primarily been evaluated through faculty course
assessment and self-assessment feedback surveys from
students. The data and feedback indicate that students
have gained knowledge on the security topics as intended.
On a scale of 1-4 (1 being Poor and 4 being Excellent),
students from Fall 2010 through Spring 2012 semesters
evaluated their ability to incorporate security-related
aspects in software development before taking the
In order to evaluate our activities, we collected course
assessment data through faculty course assessment and
feedback surveys from students. The data has shown that
268
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
the students' knowledge of software security and its
related issues increased after taking the enhanced
software engineering course, and they were able to
effectively incorporate security modules in their capstone
projects.
[3] A. Hazeyama and H. Shimizu, "A Learning
Environment for Software Security Education", In
Proc. of the 5th International Conference on
Secure Software Integration and Reliability
Improvement - Companion, 2011, pp. 7-8.
[4] C. Y. Lester and F. Jamerson, "Incorporating
Software Security into an Undergraduate Software
Engineering Course", In Proc. of the 3rd
International Conference on Emerging Security
Information, Systems and Technologies, 2009, pp.
161-166.
[5] C. Y. Lester, "A Practical Application of Software
Security in an Undergraduate Software Engineering
Course", International Journal of Computer
Science Issues, Vol. 7, No. 7, 2010, pp. 1-10.
[6] G. M. McGraw and N. R. Mead, "Engineering
Security into the Software Development Life Cycle",
CrossTalk: The Journal of Defense Software
Engineering, Vol. 18, No. 10, 2005, pp. 4.
[7] N. Meghanathan, H. Kim, and L. A. Moore,
"Incorporation of Aspects of Systems Security and
Software Security in Senior Capstone Projects", In
Proc. of the 9th International Conference on
Information Technology - New Generation, 2012,
pp. 319-324.
[8] R. Shumba, J. Walden, S. Ludim C. Taylor, and A. J.
A. Wang, "Teaching the Secure Development
Lifecycle: Challenges and Experiences", In Proc. of
the 10th Colloquium for Information Systems
Security Education, 2006, pp. 116-123.
[9] M. L. Stamat and J. W. Humphries, "Training≠
Education: Putting Secure Software Engineering
Back in the Classroom", In Proc. of the 14th
Western Canadian Conference on Computing
Education, 2009, pp. 116-123.
[10] M. A. Talib, A. Khelifi, and L. Jololian, "Secure
Software Engineering: A New Teaching Perspective
based on the SWEBOK", Interdisciplinary Journal
of Information, Knowledge, and Management,
Vol. 5, 2010, pp. 83-99.
[11] J. Walden and C. E. Frank, "Secure Software
Engineering Teaching Modules", In Proc. of the
3rd Annual Conference on Information Security
Curriculum Development, 2006, pp. 19-23.
[12] S. S. Yau and Z. Chen, "Software Security:
Integrating Secure Software Engineering in
Graduate Computer Science Curriculum", In Proc.
of the 10th Colloquium for Information Systems
Security Education, 2006, pp. 124-130.
[13] H. Yu, N. Jones, G. Bullock, and X. Y. Yuan,
"Teaching Secure Software Engineering: Writing
Secure Code", In Proc. of the 7th Central and
Eastern
European
Software
Engineering
Conference in Russia, 2011, pp. 1-5.
Table 2. Security features commonly incorporated in
capstone projects
Injection attack
prevention
module
Authentication
module
Encryption
module
Denial of Service
(DOS) prevention
module
Automatic logout
module
Static testing with
Fortify SCA
(Static Code
Analyzer)
User input fields are protected
from injection attacks with a
white-list sanitization approach.
Security questions are asked for
registration and used when the
user tries to reset the password
after failing to provide the correct
one in a certain number of tries.
Confidential data such as user IDs
and passwords are protected by
encryption procedures at the client
and server sides.
* Each user's requests are limited
to a certain number during a
certain period of time to prevent
DOS attacks.
* A registration email is sent to an
email address during registration
to prevent a single user from
having multiple user accounts.
When the user is inactive for a
certain amount of time, the
application automatically logs out
the user to prevent spoofing
identity.
As part of testing, the code is
tested with Fortify SCA.
Acknowledgement
This work has been supported through the National
Science Foundation CCLI/TUES grant (Grant # DUE0941959) on "Incorporating Systems Security and
Software Security in Senior Projects". The views and
conclusions contained in this document are those of
the author and should not be interpreted as necessarily
representing the official policies, either
expressed or implied, of the funding agency.
6. REFERENCES
[1] Computer Science Curricula 2013, Ver. 1.0,
http://ai.stanford.edu/users/sahami/CS2013/ironman
-draft/cs2013-ironman-v1.0.pdf.
[2] K. M. Goertzel, "Introduction to Software Security",
https://buildsecurityin.us-cert.gov/introductionsoftware-security.
269
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Introducing Requirements Acquisition and Analysis
Through a Very Incompletely Specified Problem
Thomas J. Marlowe
Seton Hall University
South Orange, NJ, USA
thomas.marlowe@shu.edu
James W. Benham
Montclair State University
Montclair, NJ, USA
benhamj@mail.montclair.edu
Vassilka Kirova
Alcatel-Lucent
Murray Hill, NJ, USA
vassilka.kirova@alcatel-lucent.com
Cyril S. Ku
William Paterson University
Wayne, NJ, USA
kuc@wpunj.edu
Susu Nousala
Aalto University
Helsinki, Finland
s.nousala@gmail.com
Norbert Jastroch
MET Communications
Bad Homburg, Germany
norbert.jastroch@metcommunications.de
ABSTRACT
need to be codified, and sometimes extracted
from common knowledge or in response
standard concerns, or in discussions with
stakeholders
and
experts
(requirements
elicitation and acquisition) and then developed
in a coherent and consistent set of documents
and artifacts (requirements analysis) [9,27].
Moreover, real-world or research development
projects have to deal with the Moving Target
Problem [25], in which requirements are
changed or refined as the project evolves and
product emerges, and thereafter, during
maintenance and evolution.
After succeeding in programming courses, many
students in computer science and related areas have
developed expectations, habits and practices that
make the need for analysis of complex problems—
through modeling, requirements and specification—
difficult to grasp. Exposing students to a highly
incomplete problem description early in a software
engineering course promotes internalization of this
often critical process. We suggest that analogous
challenges may be important across many disciplines
and at all levels of education.
Keywords: Computer science pedagogy,
requirements analysis, problem specification, critical
thinking, modeling, software engineering
Offered a simple but very incompletely specified
problem, many students will, based on their past
experience, conclude that they know enough, or
will be given enough information to precisely
define the task and allow its completion.
Challenged with either writing the program, or
simulating development activities, they soon
become convinced that requirements analysis is
a non-trivial and important activity.
1. INTRODUCTION
A common problem in an upper-level
introductory software engineering sequence is
that most problems that students have seen are
close to fully specified and require only a
prototype solution that has to work once for
users familiar with the application, and who are
more interested in its core functionality. They
are moreover suited to individual developers or
small teams and a short development interval.
2. A VERY INCOMPLETELY SPECIFIED
PROBLEM
Students are presented with the problem: Sort a
collection of student records and provide the
result. The constraints they are told are: the
program will be used by administrators who are
not familiar with the code; it will be used
repeatedly; and it must return the intended result
in the intended form. They are then asked: “Do
In contrast, most software engineering projects
are much larger and will take much longer—
often requiring large teams with changing
personnel. The problems are initially only
partially defined, with many requirements that
270
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
you know enough to write the program?” Most
agree that they do.
3. THE FURPS+ REQUIREMENTS
FRAMEWORK
Then “What questions would you want to ask?”
Typically, questions will concern the
programming language or environment to be
used (“Your choice”), whether the program
should run on laptops or mobile devices, or both
(“Good question. We’ll get back to that.”), and
possibly other implementation issues.
FURPS+ [22,23] is one of the standard
frameworks for requirements. The classification
(with comments) is as follows. It may be a
student’s first formal introduction to the
difference between functional and nonfunctional requirements—most students may
never have thought of a non-functional
requirement other than the project due date.
Figure 1 shows a view of the software
engineering process (compare [10]). The lower
highlighted box shows — perhaps overestimates
— a typical student’s experience and awareness
of the process, while the upper highlighted box
shows the disciplines introduced in this exercise.
Figure 1. Software Engineering
Disciplines/Workflows
Business Modeling
This Exercise
Requirements
Specification/Domain Analysis
Design
Past Student Experience
Implementation
Testing
Deployment
Maintenance
Students’ worldview is limited not only by this
narrow awareness, but also by their experience
of and faith in a simple code-and-fix model [24],
in which a program can (supposedly) be
modified to fit any instructor demands as they
emerge. This often suffices for class projects,
but causes substantial economic, managerial,
and technical problems for larger or more
realistic projects undertaken for a client [15].
Functionality: What should the program do?
What should the inputs and outputs be, and
in what form and syntax? What are the
major possible errors and exceptions, and
how should they be handled? Are needed
options provided?
Usability: How does a typical user interact
with the application? Is this natural and
understandable? [Do interface choices
interfere with usability? Are the needs of
disabled users addressed?]
Reliability: Generally has two dimensions,
Availability and Integrity (security and
privacy). [Safety and timeliness also fit here,
and are further concerns for real-time,
embedded and active applications.]
Performance: average and worst-case
throughput, number of simultaneous
transactions,
Supportability:
Documentation,
help,
learnability, maintenance.
Other criteria: resource constraints (staffing,
budget, time), implementation interactions
and constraints, interfaces with other
systems, operations, packaging, legal,
standards and compliance.
In addition to considering the issues that need to
be addressed by requirements, the resulting set
of requirements have to be reviewed to eliminate
conflict, incompleteness, imprecision, and
ambiguity. For example, “the records should be
sorted” is, as we have said, ambiguous, since
neither the key nor the order has been specified.
“The application needs to handle large numbers
of students, and a moderate number of changes
between instances” is obviously imprecise and
arguably incomplete. Likewise, “the application
should be easy to learn”, a non-functional
requirement, is clearly imprecise.
The next step is to review a requirements
classification/framework and to see if that
provokes questions, and to attempt to come up
with a full initial specification for the problem.
Most questions about program semantics or even
user interfaces are not addressed. We have
typically spent some time trying to suggest
directions to look, but rarely get many issues
covered. Most times, however, someone will ask
the crucial question, “What should we be sorting
on?” But many issues remain to be addressed.
271
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
4. MISSING INFORMATION AND
INTERESTING QUESTIONS
There are more relevant questions than can be
addressed here, and not all questions are likely
to emerge, even with guidance, in any given
class. Some of the most important or interesting
include the following. For clarity, some of the
requirements that span functionality and another
category have been moved to that alternative
category. Finally, while most are phrased as if
this is a development project, a few remain in
the context of a student project.
Usability:
Functionality:
[Perhaps] Is storage for large files local or in
the cloud?
Will the users be on an organizational LAN?
Alternatively, what remote access should be
supported?
What user interface will be provided? (Or
will this be a completely batch process?)
What user input will be required and how
will the user enter it? What options will the
user have? Should we provide a browse
function for the output?
Reliability and security:
What is the key for sorting? (Name, student
number, GPA, … .) What is the order?
(Ascending or descending for numerical
keys, more complex otherwise.)
What is the form and syntax of student
records? Is the set of records homogeneous?
If not, what variants are supported? Is there
a limit to record length?
How large a set of records should the
application be able to handle?
What should be done about duplicate key
values? (Assuming key values are supposed
to be unique, there could be different error
messages for exact duplicate records and
repeated keys for non-duplicates. If key
values are not unique, non-duplicates may
not be an error, but lead to the question,
“How are ties broken?”) What should be
done about records with invalid keys or
invalid data? What if some record is empty,
perhaps except for a key value?
Where is the input coming from? (File,
network, user input.) One source or more?
If, for example, file input, is it a fixed file?
Otherwise, how will the location and file
name be provided? Will all the input be
available initially? Likewise, where is the
output to be sent?
What should be done if the input is empty?
What if either the input or output file cannot
be opened?
Is this a one-shot process, or will it be
executed repeatedly? If repeatedly, do we
need to handle changes to existing
information, or will we always start with
fresh information?
Is the information confidential? Does
communication and/or storage need to be
secure?
Once the application is deployed, who will
have permission to run it? To look at the
output? What access controls will be
needed? What user authentication will be
required?
If the process is to be run often, when should
the results be available? If a revision is in
process, should the old results be available?
Supportability:
What menus, documentation, error messages
need to be provided?
What responsibilities do we have for
testing? What
Other (primarily resources and planning):
How long will we have for this project?
What intermediate products have to be
submitted, and when? How will the final
project be evaluated?
Are we working alone or in teams?
Performance
and
other
supplementary
requirements are arguably not ripe for discussion
this early in the course.
5. DISCUSSION
This approach promotes critical and contextual
thinking. It can easily be extended to other
disciplines and domains, although some may not
have useful and well-accepted frameworks
analogous to FURPS, requiring more effort from
the instructor or mentor. Requirements analysis
272
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
is closely related to mathematical, statistical, and
scientific modeling, but naturally differs in its
emphasis of the interaction of the problem with
the conceptual solution.
That is, case studies solve a (largely) known
problem, and involve model elaboration and
perhaps
translation,
while
requirements
elicitation and analysis demands formation an
evaluation of an initial model. Case studies
entail finding good answers; requirements
analysis is based on finding good questions.
On the other hand, modern software engineering
methods, such as Agile Methods [11,12,13] or
Extreme Programming [1], seem to devalue
requirements analysis, letting requirements
emerge and be refined during an integrated
design and programming process, and students
also need to internalize that lesson as well. But
even the strongest proponents of those
approaches would acknowledge that the project
should not begin without a basic understanding
of the nature of the problem/customer request
and the intended functionality and constraints,
any governing non-functional constraints, and
the resource constraints and deadlines for the
project itself [15,22]. Moreover, there is a
widespread understanding that issues such as
security and privacy, safety for embedded
applications, timeliness for hard-real-time
applications, and environmental interactions for
active applications such as robot process
controllers require full and early exploration of
requirements and incorporation of those
concerns from the start of design and
implementation, although agile methods and
object-oriented design can be used within that
context (compare [5,14,21]).
As a method for qualitative research, the case
study method also includes determining and
defining the research questions, selecting cases
and specifying data collection approaches,
which in turn requires survey design [2,8].
While these additional activities have more of a
flavor of requirements analysis, they typically
“emphasize detailed contextual analysis of a
[well-understood] limited number of events or
conditions and their relationships” [2], and
develop a “logic model” (which connects
conditions or inferences rather than actions) to
be tested [8]. One can think of contextual
analysis as finding a path to explore on a map,
while requirements analysis also looks to
develop or refine the map.
6. EXPERIENCE
Marlowe uses this approach very early in his
upper-level undergraduate software engineering
class, more-or-less as described in Section 2. Ku
introduces the same issues a bit later in his
undergraduate course, with a more complex but
underspecified problem, in the course of
introducing Use Cases and system-level
Communication Diagrams [10,24]. As the
diagrams are constructed, the functional
requirements (and some of the non-functional
requirements) emerge and are clarified,
sometimes as a result of instructor interactions.
Requirements analysis complements the case
study method [8,19] used in business,
economics, engineering, and other areas. The
case study approach (a study of “history” or
synthesized instances) presents students with a
(largely) complete collection of data and
information, together with a problem or set of
questions. The difficulties in the case study
method are extracting or translating information
from data and knowledge from information,
analyzing the problem or questions in the
context of that knowledge, and arriving at
recommendations in the face of complications
such as ambiguity, uncertainty and risk. To the
extent that incompleteness or ambiguity in the
specification is addressed, the result would be
conditional recommendations: “Determine the
average ambient January daily minimum
temperature at the construction site. If it is below
freezing, use Plan 1. Otherwise, use Plan 2.”
Ideally, this approach should be introduced
earlier, at an appropriate level, and revisited
more than once in subsequent appropriate
courses. Benham has used something similar in
a
second-semester
freshman
course,
emphasizing missing functionality (such as
alternative flows) rather than other requirements.
The problem is “Read in a list of positive
integers I will provide, and sort them in
ascending order. The list is read from the
keyboard and the result displayed to the screen.”
Students are then asked, “Do you understand
enough to write the program” (other than details
273
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
of language syntax and semantics)? After the
students agree, examples are presented with
invalid input (negative numbers, floating point
numbers, characters, and so on) and duplicates.
It also became clear that there was no agreed
way for the user to end the list, and no
understanding of how to handle display of the
empty
list.
(Subsequent
programming
assignments were defined clearly and fully, but
students became aware of the need for
requirements, and perhaps more comfortable
with asking if they perceived a problem.)
information. The approach encourages critical
thinking and develops analytical skills. The
section of the course and the exercise described
above are followed by a lecture and project work
on use case modeling [10], allowing the students
to practice requirements analysis and
specification. Through this exercise, students (on
average) demonstrate noticeably improved
understanding of the iterative nature of
requirements elicitation and the acquisition of an
understanding of system behavior, constraints,
and important extra-functional properties such as
availability, usability, performance, security and
safety. They also specify more balanced use case
models, with “sunny day” and “rainy day”
scenarios (roughly, “happy path” and
“alternative flows”) and associated nonfunctional requirements.
Kirova has likewise used a similar if more
nuanced educational approach in a graduate
level software engineering course. The exercise
presented below is integrated into a set of topics
related to agile methods, including values,
principles, practices and frameworks [3,4,11,12].
After the introduction of essential concepts, a
student-moderated discussion on requirements
and requirements analysis in agile frameworks,
and several brief exercises on self-organization,
writing user stories and creation of a simple
Product Backlog [3,26], students are introduced
to agile estimation techniques, including the
“Planning Poker Game,” [6] based on Wideband
Delphi method [4]. This is followed with an inclass exercise, in which students are asked to
form “agile” teams of 5+/-2 members and are
given a simple product backlog (a collection of
user stories) for a simple project from a domain
of general familiarity. The teams are then asked
to rank-order the items on the product backlog
and to estimate them using “story points” or
“ideal hours” [4]. The items on the backlog are
concrete, but provide no detail on size,
complexity or dependency information. Some
teams rush and complete the exercise, assuming
their understanding of the domain is sufficient.
Most teams, however after an initial discussion
(if needed, prompted by the instructor) discover
that the requirements are grossly incomplete and
that gathering of additional information is
needed for them to perform even initial
estimation and planning activities. As the
exercise simulates an agile team environment,
the next steps include the formulation of a list of
questions and a meeting/discussion with the
“product owner” and/or “customer” to elicit
additional
requirements
and
contextual
Finally, such an exercise and emphasis may well
be applicable across a wide range of disciplines.
Nousala has had similar experiences with
graduate students in the interdisciplinary Aalto
LAB Mexico projects, oriented on sustainability
in
community
environments:
students
[7,16,17,18,20]. While the group’s approach
blends analysis, case studies, application and
evaluation/reflection, it is found that although
students may be well-prepared for the case study
and application aspects, they are less familiar
and less comfortable with requirements analysis
and reflection [7,19], and similar exercises are
employed to develop those skills.
7. CONCLUSION
In many computer science programs, students’
exposure to application development as
underclassmen, and for that matter in many
upper-level courses, consists of well-defined,
fully specified programs that need to work only
in constrained settings. It is therefore difficult
for many students to appreciate the need for
requirements elicitation and analysis and highlevel design.
We propose challenging students in an
introductory software engineering course with a
very incompletely specified problem, but one
well within student programming experience and
capability. This not only provides those students
with an appreciation of requirements analysis,
but also allows students to participate in
274
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
specification and preliminary (if not fully objectoriented) application design.
[17]
What students learn in this exercise will apply
not only in the rest of their software engineering
courses (and often other courses such as
databases), but also after graduation, in careers
in computing and IT or in graduate education.
There are in fact benefits for critical analysis and
problem analysis across a wide range of fields.
[18]
[19]
We therefore suggest that the education of
technical managers and staff (particularly in
software development) needs to combine
requirements analysis, case studies, application
design, and reflection.
[20]
[21]
8. REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[22]
K. Beck, C. Andres: Extreme Programming Explained:
Embrace Change. Pearson Education Inc., 2004.
The Case Study as a Research Method.
http://www.gslis.utexas.edu/~ssoy/usesusers/l391d1b.htm
(last accessed February 14, 2013).
M. Cohn: User Stories Applied: For Agile Software
Development, 2004.
M. Cohn: Agile Estimating and Planning, Prentice Hall PTR,
2005.
B.P. Douglass: Real-Time UML: Developing Efficient
Objects for Embedded Systems, 3rd ed. Addison-Wesley
Object Technology Series, 2000.
J. W. Grenning: Planning Poker or How to Avoid Analysis
Paralysis while Release Planning, 2002.
http://www.objectmentor.com/resources/articles/PlanningPok
er.zip (last accessed February 16, 2013).
W.P. Hall, S. Nousala, B. Kilpatrick: One company — two
outcomes: Knowledge integration vs. corporate disintegration
in the absence of knowledge management. Vine, 39 (3), p.
242-258, 2009.
L.T. Kohn: Methods in Case Study Analysis. The Center for
Studying Health Care Systems Change, Technical
Publication 2, June 1997.
P. Laplante: Requirements Engineering for Software and
Systems. Redmond, WA: CRC Press, 2009.
C. Larman: Applying UML and Design Patterns. 3rd ed.,
Prentice Hall, Pub. 2004.
C. Larman, B. Vodde: Scaling Lean & Agile Development:
Thinking and Organizational Tools for Large-Scale Scrum.
Addison-Wesley Professional, 2008.
C. Larman, B. Vodde: Practices for Scaling Lean & Agile
Development: Large, Multisite, and Offshore Product
Development with Large-Scale Scrum. Addison-Wesley
Professional, 2010.
R.C. Martin: Agile Software Development: Principles,
Patterns and Practices. Prentice Hall, 2002.
P. Marwedel: Embedded System Design: Embedded Systems
Foundations of Cyber-Physical Systems. Springer, 2011.
S. McConnell: Rapid Development: Taming Wild Software
Schedules. Redmond, WA: Microsoft Press, 1996.
http://www.stevemcconnell.com/.
J.P.T. Mo, M. Zhou, J. Anticey, L. Nemes, M. Jones, W.P.
Hall: A study on the logistics and performance of a real
‘virtual enterprise’. International Journal of Business
[23]
[24]
[25]
[26]
[27]
275
Performance Management, 8 (2/3), p. 152-169,
http://tinyurl.com/yyjx9q
S. Nousala, A. Miles, B, Kilpatrick, W.P. Hall: Building
knowledge sharing communities using team expertise maps.
International Journal of Business and Systems Research, 3
(3), 2009.
S. Nousala, J. Jamsai-White: The value of sustainable
knowledge transfer methods for SMEs, utilizing sociotechnical networks and complex systems. 4th International
Conference on Knowledge Generation, Communication and
Management (KGCM), 2010.
S. Nousala: Social Adaptability of Communities of Practice
Case Studies: A review of indicators and developments for
economic sustainability, Proc. 56th ISSS Conference, 2012.
S. Nousala, A. Moulet, B. Hall, A. Morris: A polydisciplinary approach: A creative commons for social
complex adaptive systems. Book of Abstracts, European
Conference on Complexity Systems (ECCS 2012), p 79,
2012.
F.J.B. Nunes, A.D. Belchior, A.B. Albuquerque: Security
Engineering Approach to Support Software Security. 2010
6th World Congress on Services (SERVICES-1), 2010.
T. Ottinger, J. Langr: Agile In a Flash: FURPS+.
http://agileinaflash.blogspot.com/2009/04/furps.html (last
accessed February 14, 2013).
R. S. Pressman: Software Engineering: A practitioner’s
approach, 7th ed.. McGraw-Hill., Pub. 2010.
S.R. Schach: Object-Oriented and Classical Software
Engineering, 8th ed. McGraw-Hill, 2010.
S.R. Schach, A. Tomer: Development/Maintenance/Reuse:
Software Evolution in Product Lines.
https://www.research.ibm.com/haifa/info/ple/papers/evolutio
n.pdf (last accessed February 14, 2013).
Scrum.org: Scrum Guides.
http://www.scrum.org/scrumguides (last accessed February
16, 2013)
Wikipedia: Requirements Analysis.
http://en.wikipedia.org/wiki/Requirements_analysis, last
accessed February 14, 2013.
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Challenging academic performance to excel: the ‘BE’ project (performing Beyond Expectations)
$
! "
$%& ' $ ! (
%
Abstract
This paper attempts succinctly present and share
our recent experience and reflections in
planning and producing a digitally-rich Teacher
Training (TT) Numeracy and Additional
Learning needs recently validated course in a a
Higher Education Institution in the UK.
Services’. Career pathways could see learners
teaching in one of a broad range of lifelong
learning sector settings, ranging from traditional
FE college settings, through to charities and
offender learning with varied technology access
and uses as well as levels of restriction in using
resources (i.e. some colleges do not allow access
to social media resources within their college
servers). Consequently, teacher trainers have to
adapt and innovate content, activities and
delivery approaches to the market.
Keywords: Teacher Training, Online,
Digital, Engagement, Performance, Literacy,
Technology
As a Reader in Technology Enhanced Learning
at a British University (The University of
Bolton - UoB, UK) and a passionate about staff
engagement and development, I am use to face
challenges when planning, developing and
delivering
Technology-rich
courses.
However, when challenged by teacher trainees
new innovative e-developments, I always feel I
need to go back to the basics: eStaff
engagement principles.
The website also adds that ‘the University has a
reputation as one of the leading universities in
the country when it comes to support with
academic staff operating an open door policy to
support trainees ‘.
The recent achievement of the programme
(Outstanding) by Ofsted (the Office for
Standards in Education, Children’s Services and
Skills in the UK), demonstrates the TT
programme commitment to deliver high quality
standards in teaching and learning supported by
a highly qualified, motivated and supported
academic staff team as well as strong learning
infrastructure.
By 2014, many things could happen in the
world: David Cameron Could resign; Barrack
Obama could resign; England could win the
football (soccer) world cup; or all our planets
climate changes problem could end!. Or, all
these might not happen at all!. One thing will:
Students technology demands to enhance their
learning experience will increase and our staff
need to be prepared for it!.
Indeed, the UoB provides with a range of
technologies and ICT infrastructure to support
teaching and learning, however although all
academics have access to these, very few of
them are enthusiastic enough to integrate them
within the curriculum efficiently and effectively,
making visible a clear gap between students
technology expectations and academic staff
digital engagement.
We all know by know that Learning no longer
needs to be one size fits all . ‘The challenge for
our education system is to leverage technology
to create relevant learning experiences that
mirror students’ daily lives and the reality of
their
futures’.
National
Educational
Technology Plan, USED 2010
Following our success of the online
ESOL/Literacy programmes as well as the
Teaching and Learning for Professional Practice
(T&L PP) which addresses health practitioners
(which started in 2011), the UoB Education
Subject group has aimed to make available
integrated SfL Numeracy and Additional
Needs Initial Teacher Training provision for
trainees who find traditional provision difficult
to access. The plan has been to develop, with
some project partners, a blended learning
approach for the Numeracy and the Special
Needs routes, delivered flexibly, involving
online study supported by locally delivered faceto-face sessions. This is a fully technology-rich
blended learning approach. Numeracy and
Teaching is a challenging but rewarding
profession. However, the energy, enthusiasm
and talents are not always enough to fulfill
student satisfaction rates. The new emerging
technologies are challenging and reshaping the
way we present, deliver and collaborate in our
practice and the development of new digitallyrich tools are becoming more and more
necessary to provide access to all, to perform to
high standards and to develop personal career.
As in mentioned in our Website , our ‘teacher
training program embraces courses for the UK
Learning and Skills Sector. These Sectors
include Further Education Colleges, Adult
Education, Community Education, Sixth Form
Colleges, Universities and the National Health
#$
276
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Special Needs provisions, for both TT and CPD,
are increasingly difficult to access due to the
small number of providers regionally.
implications, but hey!, we are after all teachers
and we have a duty to continue our professional
development and to innovate in all areas of
teaching and learning.
Howeve, what any institution can do to ensure
their staff are digitally prepared to face new
challenges to fulfill the growing learners
expectations?.
Another consideration in our carefully planned
TT programme mentioned above, is to use a form
of loop input (using the technology to teach the
technology) so that teachers were learning about
the technologies they could use with students by
actually using them for themselves, breaking
barriers of access and resource ‘ownership’
issues. A teacher that feels confident using a
Virtual Learning Environment digitally-rich
multimedia video, for example, will be more
likely to use it innovatively in their session, that
one that is only a ‘user’ (someone else, i.e.
another colleague, upload resources and readymade activities for the module teacher to deliver
it with little or ‘no’ involvement with the
interactive content). For this purpose, discussions
are currently being carried out to agree
‘development time’ for academics (a one-off
time, as e-resources should be developed to be
‘reusable’ and shareable across the subject group)
to allow creative development of resources,
activities and delivery approaches for all TT
modules.
After 2 years of intense Teacher Training
developments, and in between two Ofsted visits,
four key areas have been identified as crucial to
guarantee highly performance staff :
•
Engaged and motivated staff
•
Empower staff to develop new ideas
•
Good ICT infrastructure and support
•
Promote and keep academic
collaboration to support best practice
and enhancements
After these testing two years, staff have almost
achieved
self-management
in
planning,
developing, implementing and reviewing
interactive courses (in ESOL/Literacy and T&L
PP), enhancing their staff development needs by
sharing practices and collaborating with partner
colleges and across university colleagues with
outstanding achievement in delivering digitally
–rich academic resources. The fact that these
academics are top performers in their various
teaching backgrounds, ensured that all resources
and activities were pedagogic-rich as well as
accessible and inclusive, resulting in simply but
creatively presented blended learning resources.
So, what are we looking at in our newly
validated TT programmes?: we have learned
and developed loads of good practices with the
ESOL/Literacy and T&L PP. In addition one
thing we consider important to look at, as
fundamental for any improvements in the way
teachers relate to technology, it is not just
changes and enhancements in the classroom
with supporting tools for teaching learners, but
also to consider technology as a tool within their
everyday working practice as well as their
professional lives.
The following examples (Examples 1) show
simple, inclusive and accessible approaches to
deliver a technology-rich session on ‘Applying
Knowledge of Literacy, Numeracy and ICT for
Learning and Teaching’. The module includes a
variety of interactive parts, which include
podcasts, video-casts, interactive reading, selfassessment and quizzes, as well as learners-led
online reflective and collaborative discussions
(asynchronous and synchronous). All these
produced by the module tutor with adequate UoB
ICT staff support.
Examples 1
Another key plan we want to progress on, is to
ensure that our paper-free ‘sub-goal’ courses to
be a reality in most new TT courses to set out to
run courses with minimum (and in some cases,
absolutely no) paper. That means minimum or
no photocopied handouts and no paper based
note taking from trainees, etc. The challenge is
to push teachers-to-be to the point where they
will work totally in the digital medium and
where paper became totally unnecessary. This
has clear accessibility and inclusivity
277
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
The learners-led online reflective and collaborative
discussions are supported by the VLE (Moodle
discussion and simple chat forums – asynchronous), as
well any other free cloud technology platform
available to students (Skype, Live Chat software, MSN
as Synchronous). Examples 2 below.
There has been an increasing pressure on all academic
institutions, at F and HE levels in the UK , to respond
quickly and efficiently to changes produced by the
increasing globalisation of education markets, and the
capacities of Information and Communication
Technologies (ICTs) to transform the ways education
is delivered and making it more flexible, inclusive and
accessible. This has presented serious challenges for
many academics whose own formative educational
experiences and professional orientations were shaped
under different circumstances, especially in Teacher
Training programmes. Teaching is experiencing its
biggest recruitment boom in years, with one in ten
workers now considering a career in teaching at the
moment. This new emerging markets require a more
flexible delivery keeping quality standards at its
highest, as competitors are aggressively opening new
opportunities
With all this in mind, it is important to develop new
partnerships and stronger collaborations, keeping
academic staff motivated, engaged and in constant
development, to ensure they perform ‘beyond
expectations’, keeping their programme highly
competitive in the market and in constant progression,
and the TT academic and support team are taking steps
by developing innovative but accessible resources and
delivery approaches to respond to a very demanding
emerging learners market
If we want our students to succeed in a global
environment, then we, as educators, must be engaged
in 21st century content, context, tools, thinking skills,
and assessment. Thanks to digitally-rich learning we
are all a 21st century inclusive life-long learners!.
References
OFSTED [online 07/29/2013]
University of Bolton, UK [online 07/29/2013]
National Educational Technology Plan, USED 2010 [online
07/29/2013]
278
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Critical Reflection;
Practicing Public Scholarly Inquiry while Processing with Science,
Technology & Society
Christine M. YUKECH
C & I, Science Education, the University of Akron
Akron, Ohio 44325, U.S.
ABSTRACT
will. Democracy is explained as the third leg of education.
Democracy is the ultimate end to be achieved, initiated by
university values of scholarship, academic discovery, and
artistic pursuit. These can be expressed as a public resource, not
void of volunteerism or philanthropic service. These are positive
benefits that help contribute to a worthy cause and help
community and civic organizations succeed.
This paper is a pilot for future courses such as the one discussed
in this paper to be supported through grants enhanced by the
application of research involving Science Technology & Society
projects related to public scholarship when solving real world
community based problems. A research study was conducted
with a 3707 course in Science, Technology and Society
undergraduate course with secondary science education
students. The goals of public scholarship are to present students
with a deeper understanding of their obligations and duties of a
democratic community and unity through academic and
experiential learning. This provides an opportunity to employ
the university's intellectual and creative resources in service of
those obligations. Public scholarship requires active thinking,
reflection, and engagement with relevant theory. It addresses
issues of public interest and knowledge generated by the
community by generating innovative awareness through
reflection and engagement with social theory.
Keywords:
Science, Technology & Society,
Scholarship, Science Education, Social Justice
PUBLIC SCHOLARSHIP DEFINED
Public scholarship by Lakshman Yapa’s definition is any
scholarly activity generating new knowledge through academic
reflection on issues in community engagement.
Public
scholarship requires active thinking, reflection, and engagement
with relevant theory. It addresses issues of public interest and
knowledge generated by the community by generating
innovative awareness through reflection and engagement with
social theory. The goals of public scholarship are to present
students with a deeper understanding of the obligations and
duties of democratic unity through academic and experiential
learning.
This provides an opportunity to employ the
university's intellectual and creative resources in service of those
obligations.
Public
INTRODUCTION
POPULAR THEORIES
The structure of scholarly inquiry from a science education
perspective allows the individual to view scientific phenomenon
from a variety of epistemologies to solve problems. Educational
philosopher John Dewey, suggest that we solve problems by
using our past experiences and connecting them to things we
currently know about. Modern philosopher, Thomas Kuhn
discusses the structure of scientific revolutions by experiencing
a paradigm shift. If we look at the disciplines in nature, culture
and religion we may reveal a deeper understanding of social and
science contexts.
These ideas are in line with the ideas of John Dewey (18501952) who was believed to be the most influential thinker in
education in the last 100 years. Dewey believed in learning by
doing. He integrated theories of politics, knowledge and
education. He linked democracy to education and theory to
knowledge, grounded by philosophical tradition of American
pragmatism. As partners of new knowledge and with hope that
this will have a profound effect on college students. Tools for
building such social and practical scholarship are rooted in John
Dewey's ideas and can build the epistemologies in philosophies
of postmodernism and American pragmatism.
HOW CAN FACULTY MOTIVATE RESEARCH IN
PUBLIC SCHOLARLSHIP INQUIRY?
PARTNERS OF NEW GENERATION OF KNOWLEDGE
WORKING WITH COMMUNITIES
Jeremy Cohen, founder of Penn State's laboratory for public
scholarship and democracy talks about the student and faculty
discovery contribution to public scholarship and how democracy
needs to be learned. Those who believe in this type of
scholarship say it goes beyond community service and good
Transitional paradigms
279
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
A research study was conducted from a 3707 course of Science,
Technology and Society undergraduate secondary science
students. Issues of Science/Technology and Society among preservice secondary science students became an interesting
endeavor. Students needed to first find out about issues related
to their content in science, how technology modifies the content
and how to understand how the issues relate to the Science
Technology, Society & community. Students who did have
exposure to technology were proficient users; however they had
no idea how to link that knowledge to their content, and had
issues relating to the content and technology needed to solve real
world problems. Students had little practical exposure to
professional practice of their subject matter. The ideas of
motivation related to Science, Technology & Society and public
scholarship were difficult to construct.
Tools for building public scholarship inquiry
The tools for building such social and practical scholarship are
rooted in John Dewey's ideas and can build the epistemologies
in philosophies of postmodernism and American pragmatism. In
relation to motivation for higher-order learning, Janet G.
Donald, discussed orientations to learning and studying. Higher
order learning goals help students take responsibility for their
learning, that is to assume self control to self regulate. Criteria
for student learning were the ability to analyze, and think
critically. Our homeless rates alone would point to the direction
that we need to be reaching for connections between
departments at universities and between neighborhoods and
communities. We can reciprocate needs faster and create a
starting place for curriculum and academics.
THE STEM APPROACH
Constructing Public Scholarly Curriculum
How does one motivate the science learners to use a STEM
platform and find conscientious ways to direct their future
technological experiences and find a direct link towards
public scholarly inquiry or practical tie into their lessons?
The 3707 course students were responsible for researching STS
curriculum research articles related to the STS approach and
reflect about them. They would then role-play representative
members of society who could help solve STS issues. Students
related the science content to technology issues relating to real
world issues and completed a STS project which was presented
through power point or another form of creative presentation.
The STS undergraduate class also used a book by Richard F.
Brinkerhoff, One minute reading issues in science, technology,
and society. Mentlo Park, CA: Addison Wesley., that addressed
societal issues related to physics, chemistry, and biology.
Social Justice Awareness & Public scholarship inquiry
Social justice awareness and perspectives provides clues that
recognize the need to teach towards democracy. Public
scholarship inquiry and social inquiry requires the proper
collaboration among and between departments at universities
and within communities. It also takes brain power in pre-thought
out ideas and proper access to professional engagements, with
faculty and resources. Some say it takes the whole to function
together so that synergetic transformations take place to engage
in social life in cognitive cooperative and non competitive ways.
SCIENCE/TECHNOLOGY AND SOCIETY COLLEGE
COURSE
Motivational projects and field trips
Critique: I wonder who influences who in such a
situation. In other words whose needs/interest comes first, the
student, the university or the community? If action is to take
place then students need to be doing something with processing
applications for democracy and public scholarly inquiry.
Possibly that is where the science, technology, engineering and
society ideas tie in. I do believe public scholarship is necessary
in order to keep things moving at the university level, to teach
democracy and to live, learn and take action that solve complex
societal problems. Public discussion needs to take place to
bridge the gaps given current tension. Only six universities in
the United States engage in public scholarship type inquiry;
Cornell, Michigan, Minnesota, Penn State, Stanford, and
Maryland.
The students had a tendency to resort to learning about STS
content. Later in the course they became more interested in
research that tied into the Science Technology and Society
approach. Projects: The projects students picked related to
distance learning, grant writing, surveys, video-broadcasting,
and a review and presentation of multi-media that can be used in
science classrooms to teach with the STS approach. Field trips:
A) a hospital mega-data center in Youngstown, the Youngstown
Business Incubator, a company that houses new software
companies for six months for free to get them established B)
The Curriculum Resource Center at YSU's Beeghly School of
Education with a presentation by the librarian who talked about
the information technology age related to the history of library
science and technology and the science content areas C) A
local grant writer D) A salesman for audio visual projectors,
wireless tablets and hand-held personal response systems.
HOW DOES ONE MOTIVE PRE-SERVICE SCIENCE
EDUCATION STUDENTS ABOUT ISSUES RELATED TO
SCIENCE TECHNOLOGY AND SOCIETY CONCEPTS?
Students then had to critique a STS lesson and or create one of
their own. The eight secondary science students in the course
280
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
became more curious, interested and motivated to look at
different aspects of the Science Technology and Society
approach to teaching.
Rebecca’s Article Reflection
Building a World and online science and learning
environment motivates and teaches
RESEARCH ARTICLE CRITIQUE AND SUMMARY
Elizabeth Anne Viau wanted to build a world where her students
could explore and learn so she did so with the help of a website.
She began the site at California State University as part of a
course for in-service teachers. The site included both basic and
more advanced material and has been developed over the last ten
years. It now includes 500 pages of instructional material and 34
fictional planets that were made by adult students and teachers.
There are also lessons, notes, links, rubrics, activities,
worksheets, tests and diagrams on the site. "World Builders" as
the site is called, has 10 different units that deal with different
parts of science. The units include astronomy, geology,
meteorology, microbiology, botany, zoology, and ecology.
Ultimately, students can take the information that they learn and
build a world that fits in with scientific principles. This type of
resource can lead to a deeper understanding of theme based units
relating to secondary science content. The STS issues could then
tie into the content.
Each student was given an assignment to research, summarize
and critique an article related to motivation and STS. This
assignment made them feel as authentic members of a whole
group project. Each summary related to the STS approach in a
creative and unique way. Some students included personal
reflections while others just chose to summarize an article
relating to the STS and motivation. The following ideas came
from
the
students
from
my
undergraduate
Science/Technology/and Society course who researched articles
related to the STS, and motivation. Most students provided
summaries and a personal critique others provided a summary.
The critique to their response and their articles is italicized for
distinction.
Heidi’s Article Summary
The article accelerating the Learning of Low Achievers, by
Deborah Perkins Gough
Katherine’s Reflection
This article talks about several different ways that could
motivate and encourage low achieving students to do better.
Some are:
"Motivational Aspects of Learning Genetics with Interactive
Multimedia"
This article discussed how motivation can affect the learning
and teaching of science subjects, specifically genetics. It also
talked about how learning the basic genetic concepts can lead to
further issues for students to investigate such as biotechnology
and genetic engineering. Additionally, it stated that biology
teachers are increasing their use of technology to supplement
their teaching. A survey of student interests and motivation was
included in the article. Students stated they become motivated to
learn about genetics when using software that provides them the
following: instant feedback, flexibility, visualization, control,
and challenges. I think this was a very useful and up-to date
article that really covers an important topic. Teaching basic
genetic concepts are important and if technology can be used to
enhance lessons that are even better. When students understand
the basics and are motivated they can then critically think about
larger issues such as genetic engineering.
Culture: this is the culture of the school. The high impact
schools had a culture of high expectations. Policies focused on
academics, and preparing students for college.
Academic Core: this is the teachers taking responsibility for
students' ability to succeed. They removed barriers from higher
level courses and encourage students to take them. Support:
they provided extra instructional time to students who needed it.
High impact schools provided the help in the form of college
prep courses.
Teachers: High impact schools made assignments to suit the
need of the students, instead of having cookie cutter assignments
to fit every student. The principle of the high impact schools
also had more say in which teachers were hired.
Time and other resources: the high impact schools used time
more efficiently and deliberately like in the way of college prep
courses instead of remedial classes. By incorporating all of these
one can see how motivated a school could be. The major part
was the staff. Without having an active, motivated, and excited
group of people to work with, I don't feel that this program
would work. There needs to be an environment of
encouragement where students are constantly hearing, “This is
possible" and that "They can do it".
Katherine’s Critique:
In this article about using multimedia and motivation to teach
genetics a lot of issues were covered. It is very important to
motivate students to learn difficult material such as genetics.
Devising new ways or ideas to motivate students can be
difficult. Using technology and the multimedia approach is
definitely the way to go in order for students to process the
lesson the best they possibly can. Teaching is about student
281
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
success, motivation, and understanding. No one ever said that
teaching or motivating students is an easy job, but we wouldn't
be pre-service teachers if someone hadn't motivated and inspired
us to pursue such a career.
Mario’s Article Reflection:
This article talks of the instructor's role in motivation instead of
looking at the students' role in motivation. Specifically the
article entailed cost-effective methods of utilizing differing
technologies (projects, power points, video, etc.) into instruction
strategies. This article discusses the fact that many college
students are commuters, having the availability of email and
other long distance forms of communication increases the
teacher/student interaction which can be done more
conveniently. Consequently, the article discusses that the
instructors influence on motivation among student increases.
This notion discusses time-delayed communication. In the past
this was done by a teacher giving homework, the student turning
the homework back in, and then the teacher giving feedback (by
means of a grade) back to the student. E-mail and other forms of
communication can decrease the time-delay communication
which can occur over a shorter period of time.
Critique: I liked the idea of BioLogica's use in the
classroom except that sometimes it is too playful in nature and
may distract from mindful activities. I'd like to see the software
rated by asking questions to see if the technology helps students
to think critically, apply the ideas to science theories, laws and
principles, or to the concept of Science/Technology/ and Society.
Julie’s Article Reflection
The use of flash technology as an assessment tool plays a major
role in the success or failure of the student learning process.
Students who enter a program with high motivation levels
usually sustain and improve on those levels. Those students who
lack motivation require attention and teacher intervention. This
article suggests using motivational and assessment tools that are
more interactive. Software applications such as Macromedia's
Flash MX and Swishzone's Swish and SwishMAX may be
beneficial. These applications assist students in creating
interactive technology projects. They also assist students by
allowing them to demonstrate their understanding of key
concepts and how to use various theories in context. By using
various software suggestions students are able to have more
insight into their individual progress which aides in improving
motivation levels. A few of the web sites mentioned in the
article
include
www.macromedia.com
and
www.swishzone.com.
Critique: Ultimately this article mainly discusses
how the use of technology can improve teacher/learner
relationships through increased communication. Furthermore,
motivation is achieved through the work that is put in by the
instructor. On the flip side of the coin, motivation can be a
function of self interest if the self interest is worth more than the
pay-out. You can relate the ideas to the feedback given to
students using the real time smart phone instant feedback.
Bonnie’s Article Reflection
Science, Technology & Society Approach by Gilbert,
Anthony F.
Julie's Critique:
The technology curricula used today focuses on knowledge
domain based science, technology and humanities. The
emphasis is on tools and materials and the student learns the
concepts and vocabulary through text and lectures. As a result,
students have lost interest in science, as well as school in
general; and this has resulted in the closing of schools and
programs. The students have lost their motivation to learn, thus
they are not learning the information and technology that they
will need to survive in a technology based world. When the
students graduate, they will not be able to work or exist in
society. They lack the skills to survive on their own thus
depending on the government to support them. This is a result of
losing their motivation to learn, due to boring school curriculum
that does not relate to the real world. Education should prepare
the students for the real world ahead; therefore the curriculum
should motivate students to learn. The overall objective of a
science/technology/society curriculum is to educate students
who understand science and technology and how it is
implemented and alters their environment.
We all realize that motivation can be intrinsic (internal) and
extrinsic (external). External rewards are useful; however, I
believe that if you are able to convince a student to strive for and
appreciate internal rewards, you have attained a major goal as a
teacher. I find myself often considering material rewards, such
as grades, a good income, etc., but in reality, these items are not
everlasting -they fade away with time. The true rewards are
those you internalize. Self-satisfaction in accomplishing a goal
and the power of knowledge itself are true rewards and
motivators. No one can ever rob you of these precious items. I
hope to be able to instill the value of these intrinsic motivators in
my future students.
Critique: I liked the idea of exposing students to flash
and swishzone. Tools such as these can help teachers and
students to create using modern software which helps make
students more authentic authors of their individual ideas related
to science topics and issues.
282
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
there was some resistance at first by Indians who lived on the
reserve. Once the Indians realized the intent of the project they
delivered their expertise and helped to build the straw houses.
They later used the houses for public resources such as stores
and as a place for students from other universities to visit and
study.
The STS approach is society centered, which in itself is the
means to the end. The students become motivated when society
is incorporated into science, because it then becomes an issue
that directly affects them or their families. They are also
motivated by the use of the technology as a tool to complement
the science curriculum through research and computer programs
that allow assignments to expand. The students should be taught
that the reason to learn science and technology is to be able to
use it to solve everyday problems. Thus they can make decisions
on social and environmental concerns, rather than become a
scientific genius or discover new cures. A science curriculum
should be society based, use technology as a tool, and be
saturated in the issues of society that effect the students, their
families and futures.
CONCLUSION
My personal interest in this study was to help to build an
environment for enrichment for my students and for my own
educational purposes. The study helped engage students when
dealing with the Science Technology & Society issues. This
course helped students understand the STS approach and why
they may need to use this approach to motivate their own
students.
Bonnie's Critique:
In order to demonstrate some aspects of public scholarship as it
relates to the STS issues chosen to study, the STS course at the
university students would have to incorporate their projects into
something worthwhile for university and school classroom
settings. The class talked of implementing ideas related to STS
problems to types of classrooms on campus and similar
classrooms of their own. To make the projects interactive
students would have to design them to impact community
schools, or businesses. This course may have been the pilot to
the future courses supported through grant funding enhanced by
the application of such research learning and STS projects
related to public scholarship and solving real world community
based problems. I found the articles the students reported about
of interest for the future types of environments that need to be
created for a STS university courses. In this way students can
experience the applications to test and use the technology related
to solving issues related to the content, technology critiques for
critical thinking, and social issues. I hope to be able to grow the
course into a project that will one day enhance many classroom,
teachers, faculty and community. Included is the rubric for the
STS projects to show a link into the types of community issues
students need to solve. Also included is a poem from the article
Teaching Global Reflections on the American Indian Housing
Initiative.
This article sums up everything that you have taught us all
semester. The fact is that we should teach the science curriculum
using technology for educational enhancement. The issues we
teach should be society based that will in itself motivate the
students. I totally agree with this article as it nicely sums up
your teachings and supplies examples on the curriculum
changes. I agree we need to move from the banking type of
curriculum to one that fosters empowering students to take
ownership of the knowledge gained through ideas in relation to
the STS and public scholarship. Students and teachers need to
feel empowered with the STS topics in order to find relevance to
them. However, some not all schools have the technologies and
structure to construct such curriculum.
HOW DOES ONE BUILD A PROGRAM AT THE
UNIVERSITY LEVEL THAT INCORPORATES A
SCIENCE TECHNOLOGY AND SOCIETY APPROACH,
MOTIVATES FACULTY & DOCTORATE STUDENTS
TO APPLY THESE IDEAS & HELPS INDIVIDUALS
ORGANIZE TOPICS THAT INFLUENCE CONCEPTS OF
PUBLIC SCHOLARSHIP?
When relating to public scholarship, many articles discussed the
need for departments to function as a whole and not separate
mechanic parts. In order to build healthy environments all
teaching faculty should share and engage in the research
teaching, and fostering of partnerships with local and state
communities and other university departments.
Poem from the American Indian Housing Initiative
An elder Cherokee Indian was teaching his grandchildren about
life, He said to them, “A fight is going on inside of me: It is a
terrible fight and it is between two wolves. “One wolf
represents, fear, anger, envy, sorrow, regret, greed, arrogance,
self-pity, guilt, resentment, inferiority, lies, false pride,
superiority, and ego. The other stands for joy, peace, love, hope,
sharing, serenity, humility, kindness, benevolence, friendship,
empathy, generosity, truth, compassion, and faith. They thought
The article, Teaching Global Citizenship Reflections on the
American Indian Housing Initiative, Dr. David R. Riley,
architectural engineering and director of the center for
Sustainability at Penn State and leader of the American Indian
Housing Initiative relating to public scholarship by talking about
building houses at a reserve in Montana. In this article, a labor
of love had to take place to complete the project. Although the
project was to help build up a community in an Indian reserve,
283
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
about it for a minute and then one child asked his grandfather,
“Which wolf will win?” The old Indian simply replied, “The
one you feed.”
~author unknown
Science Technology & Society Rubric:
Criterion for
Rubric
Unsuccessfu
l
Emerging
Evolving
Profic
2
3
4
clear
1
2
3
4
STS
accurate
Not accurate
vague
relevant
understood
STS
unifying
themes
vague
vague
Themes
relate to
content
Unified
themes
with
content
Important
communit
y or Social
Context
Does not
address a
community
problem
Vaguely
addresse
s
a
problem
Relates
to a local
problem
Address an
important
communit
y problem
1
STS
concept
Clear
Vague
Relevanc
e
Understood
REFERENCES
New Directions for Teaching and Learning. Jossey-Bass
Publishers. No. 78 Pp. 71-77.
[1] Brinkerhoff, Richard F. (1995). One Minute readings
issue in science, technology, and society. Menlo Park, CA:
Addison-Wesley
[10] Riley, D. (2006). Teaching Global Citizenship:
Reflections on the American Indian Housing
[2] Chickering, Arthur W., & Ehrmann, Stephen C. updated
(2003). lmplementing the Seven Principles: Technology as
a Lever. pp. 1-12.
[11] Initiative. New Directions for teaching and Learning.
Wiley Periodicals. No. 105. Pp. 51-61.
[3] Cohen, J. (2006) A Laboratory for Public Scholarship
and Democracy. New Directions for Teaching and
Learning. No. 105
[12] Robinson, M. &Tatar, D. (2003). Use of the Digital
Center to Increase Student Interest and Learning in High
School Biology. Journal of Science and Technology. Vol.
12, Plenum Publishing. Pp.89-95.
[4] Colbeck, C. &Wharton-Michael P. (2006). Individual
and Organizational Influences on Faculty Members'
Engagement in Public Scholarship. New Directions for
Teaching and Learning. Whiley Periodicals. No. 105 pp.
17-26.
[13] Theall, M. &Franklin, J. (1999) What Have We
Learned? A synthesis and Some Guidelines for Effective
Motivation in Higher Education. New Directions for
Teaching and Learning. Jossey-Bass Publishers. No.78. Pp.
99-109.
[5] Deal, W. (2004). Using Flash Technology for
Motivation and Assessment. The Technology Teacher. Vol.
63 No.8 Pp. 16-19.
[14] Tsui, Chi-Yan & Treagust, David F. (2004).
Motivational Aspects of Learning Genetics with Interactive
Multimedia. American Biology Teacher. Vol. 66 (4) pp.
277-285.
[6] Donald, J. (1999) Motivation for Higher-Order
Learning. New Directions for Teaching and Learning.
Jossey-Bass Publishers. No. 78. Pp.27-35.
[15] Viau, Elizabeth Anna, (2004) Building a World An
online science learning environment motivates and teaches.
U.S. &Canada: International Society for Teaching in
Education. Volume 31(5). Pp. 18-21.
[7]
Gilbert,
Anthony
F.
(2006)
The
Science/Technology/Society
Approach,
Journal
of
Curriculum Studies. 18(2). Pp.133-146.
[8] Gough, Debora Perkins. (2006). Accelerating the
Learning of Low Achievers, Educational Leadership. Pp.
88-89.
[16] Yapa, 1. (2006) Public Scholarship in the Postmodern
University. New Directions for Teaching and Learning.
Wiley Periodicals. Pp. 73-83.
[9] Feldman, Kenneth A. &Paulsen, M. (1999) Faculty
Motivation: The Role of a Supportive Teaching Culture.
284
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Coaching and Sponsoring Extra-Curricular Activities: Does it Make Future Principals Better
School Leaders?
Christopher N. Amos Sr.
School of Education, The University of West Florida
Pensacola, FL 32514
ABSTRACT
This paper examines a group of Blue Ribbon
School principals and their previous experiences
playing/participating, coaching and/or sponsoring
extracurricular activities and the impact these experiences
had on their leadership development. This paper presents
the principal’s self-reported growth and development of
leadership traits through various experiences in extracurricular activities. The data was collected through the
use of a 25 open-ended question survey, which was
completed by a group of 63 Blue Ribbon Principals and
the findings produced six main findings, which were:
1) Blue Ribbon Principals indicated at a high percentage
(87%) that they coached and/ or sponsored an extracurricular activity prior to becoming a principal.
2) Coaching and/or sponsoring an extracurricular activity
have a positive impact on the development of leadership
abilities.
3) That most of the respondents (66%) indicated they
coached more than two sports and/or activities while they
were in the K-12 teaching role and that experience was
significant in their leadership development.
4) Principals ranked teachers and students as having more
impact on their success as a principal than other factors
such as: testing data, district level support and funding.
5) That coaching or sponsoring an extracurricular activity
as a teacher can lead to the development of important
school leadership traits that can be transferred to the
principal role.
This study helps school districts and universities
identify candidates for education leadership programs and
eventually appoint them to school leadership positions to
increase the number of schools that are high achieving.
Keywords: Blue Ribbon Principal, Student
Achievement, Leadership, and accountability
INTRODUCTION
In this era of data driven decisions and school
accountability, the pressure on stakeholders in K-12 has
never been greater. The pressure to have high performing
students on high stakes testing has many school districts
and schools reevaluating their practices in areas such as:
hiring, curriculum development, teacher retention and
leadership development. These various points of concern
are intricate in the success of schools however this paper
will investigate leadership development and the
leadership traits of successful principals and how their
professional experiences influenced their leadership
development. The paper will also show how these traits
and experiences influence and impact their ability to lead
effectively as a K-12 school principal. The National Blue
Ribbon Schools Program, which was started in 1982,
recognizes public and private elementary, middle, and
high schools where students perform at very high levels
and/or where significant student achievement
improvements are being made. Since the program's
inception, more than 7000 schools have been honored to
fly the flag that has become a mark of excellence in
education recognized by everyone in thousands of
communities [1].
In the 2011 school year the DOE received
thousands of applications from schools across the country
to be recognized as a Blue Ribbon School. Of these
applicants, only 314 schools were awarded this distinction
[1].
The researcher used the most recent list (20112012) of Blue Ribbon Award winning school principals
(314 schools) and chose, at random, 150 principals to
participate in the study. The researcher asked these topperforming principals to identify their previous
experiences in extracurricular activities as a K-12 student,
collegiate student, coach, sponsor, teacher and school
administrator as well as some of the leadership traits they
attained through these experiences. The principals were
also asked to identify the level of importance these
experiences had on their leadership development and the
impact these skills had on their success as a school
principal. A response rate of 42% (63 out of 150) was
achieved and the data was collected via an electronic
survey, coded and evaluated.
As school districts search for various ways to
increase student achievement in their schools, the
principal is recognized as one of the most impactful
school positions. In 2007, a paper published in the
Peabody Journal of Education indicated that there were
several key items that a school leaders has direct impact
on, which were: Safe and Orderly Environment, Mission
and Vision, Stakeholder Involvement, Monitoring School
Progress, Instructional Focus, High Expectations for
Student Performance, and professional development [7].
When addressing these items a school leader must possess
leadership traits such as: being organized, effective
problem solving, interpersonal skills, and a student
centered philosophy, which allow them to handle the
various issues more efficiently and with greater impact to
ensure that the students are receiving the necessary
information and education to be successful. The research
indicates that school principals make a positive impact on
school performance. There is an ample amount of
evidence in the body of research and in educational
practice to confirm that the school principal is regarded as
285
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
critical to school success and student achievement. There
is research that suggests that the principal position has
morphed into a time-consuming position that is not
focused on student achievement. Educational leaders often
feel as though they are spread way too thin and that most of
the problems they manage have little to do with education or
helping children [4]. Understanding and developing future
school leaders to address these concerns is an important task
for school districts. The efforts of school district central
office leaders to support principals’ instructional
leadership reflect several specific developments in
research and practice that suggest the promise of these
efforts for strengthening systems of support for improved
classroom instruction and ultimately, results for students
[3]. In particular, several decades of research on the topic
has resulted in a body of knowledge that details the
positive relationships between the practice of school
principals and student academic achievement. Although
classroom instruction has the greatest school level impact
on student achievement, leadership has the second
greatest effect [5]. Leaders who improve upon their
leadership skills and responsibilities can contribute to as
much as a 10 percentile point increase on student test
scores [6]. The critical issue facing principals is
understanding the core practices that yield high results in
student achievement. Utilizing these practices enables us
to move beyond a ”cause-and-effect” approach to
effective school leadership found in many studies and
explore the multi-faceted nature of the leadership position
[8].
Extra-curricular activities are critical to the
success of students. Participation in school-based
extracurricular activities has been found to be associated
with increased educational achievement and attainment,
reduced problem behavior, improved attitudes toward
educational and occupational goals, more positive
psychosocial adjustment, and a decreased likelihood of
dropping out [2]. Coaches and sponsors are the teachers
that help these students do much more than just play a
sport or participate in a club. For a lot of these students,
these adults are the only person they have in their life that
can make a positive impact on their decisions and social
development. This is especially in the Latin and Hispanic
student population. It is within the educational system that
Latino immigrant children learn not only about U.S.
values, beliefs, and behaviors, but also about their social
and cultural role in American society [9]. The impact that
coaches and sponsors have is far more reaching than just
the activity they are engaged in with students. There is
little research available that identifies the relationship
between principals and their previous experience as extracurricular coaches/sponsors and the impact on student
achievement but there is research that shows these two
areas can have a significant impact on the success of
students.
STATEMENT OF THE PROBLEM
The purpose of this study was to investigate if
Blue Ribbon Principals had previous experience with
coaching and/or sponsoring extra-curricular activities and
if this experience impacted their leadership development.
The survey was based on the following research
questions:
1) Does coaching and/or sponsoring an extracurricular activities have an impact on the
leadership development of Blue Ribbon
Principals?
2) What factors, traits and lessons from coaching
and/or sponsoring an extracurricular activities
impacted their ability to lead at a successful
level?
METHODOLOGY
The participants consisted of 150 K-12 Blue
Ribbon Principals, chosen at random, from the United
States Department of Education Blue Ribbon Award
Winner list. Of these 150 principals, 63 principals (42%)
responded to the 25 open-ended question electronic
survey. There were 34 male and 29 female participants.
The responses were coded, collected and evaluated in
Excel.
LIMITATIONS
This study only looked at high achieving school
principals who were awarded the National Blue Ribbon
Award. Another limitation was that only 150 principals
were surveyed and only 63 principals responded to the
survey.
FINDINGS
The data was collected and evaluated using Excel and
the respondents indicated the following:
1) The 87% of respondents indicated they coached
and/sponsored an extra-curricular activity as shown
in Figure 1.
Figure 1
13%
Yes
No
87%
2) Figure 2 shows the percentage (70%) of respondents
who indicated that coaching and/or sponsoring an
extracurricular activity has a positive impact on the
development of leadership abilities.
286
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Figure 2
Figure 3
One Sport/
Activity
30%
Yes
70%
No
Two Sports/
Activities
8%
15%
The respondents also provided narrative
information when asked how their coaching experiences
impacts their leadership ability in a positive way: “It helps
me with Imparting motivating ideas to my team which is
very important. Everyone needs to have some recognition
for a job well done and have direction (either from myself
of another team mate) when needed.”, “Successful
administrators coach their faculty. It allows for faculty
input, teamwork, high morale, low turnover, the will to
want to succeed and more importantly the determination
to prepare students to succeed. Administration is
coaching!” and “Making thoughtful and at times, difficult
decisions that always considered the best interests of the
team. Treating all team members with honesty and
respect. Lead by example and not by words. Hold all
accountable, including myself to high standards of
performance.”
34%
Four Sports/
Activities
24%
8%
Three Sports/
Activities
11%
more than
four Sports/
Activites
None
Figure 4
3%$
Sports and
Non-Sports
Sports Only
3) That most of the respondents (66%) indicated they
coached two or more sports and/or activities while they
were in the K-12 teaching role and that experience was
significant in their leadership development as shown in
Figure 3. The majority of respondents (53%) coached and
sponsored both sports and non-sports as shown in Figure
4. This indicates that these principals were interested in
both athletic and non-athletic activities. There were more
respondents who indicated they coached sports only than
there were of teachers who indicated they sponsored only
non-sport and fine art activities. This is also indicated in
Figure 4.
44%$
53%$
Only NonSports and
Fine Arts
4) The respondents were asked to rank attributes/ factors
(1 being the most important to 10 being the least
important) as it pertains to their success as a school
leader, the rankings were as follows:
1. Teachers/Staff Ability
2. Students
3. Teacher/ Student Buy-In
4. Leadership Style
5. Personal Drive
6. Interpersonal Skills
7. Parents
8. Testing Data
9. District/School Board Support
10. Funding
287
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
The rankings indicated that these principals
value and attribute their success to the immediate
stakeholders (Teachers and Students) at a higher level
than the other factors such as testing data, funding and
district support. The respondents also self-identified their
leadership style (Democratic, Autocratic, Bureaucratic,
Laissez Faire) in this survey, these results are represented
in Figure 5. The respondents were given the definitions of
the four leadership styles, which are:
Autocratic: In this style of leadership, a leader
has complete command and hold over their
employees/team. The team cannot put forward their views
even if they are best for the team or organizational
interests. They cannot criticize or question the leader’s
way of getting things done. The leader himself gets the
things done. The advantage of this style is that it leads to
speedy decision-making and greater productivity under
leader’s supervision. Drawbacks of this leadership style
are that it leads to greater employee absenteeism and
turnover. This leadership style works only when the
leader is the best in performing or when the job is
monotonous, unskilled and routine in nature or where the
project is short-term and risky.
Laissez Faire: Here, the leader totally trusts their
employees/team to perform the job themselves. He just
concentrates on the intellectual/rational aspect of his work
and does not focus on the management aspect of his work.
The team/employees are welcomed to share their views
and provide suggestions, which are best for organizational
interests. This leadership style works only when the
employees are skilled, loyal, experienced and intellectual.
Democratic: The leaders invite and encourage
the team members to play an important role in decisionmaking process, though the ultimate decision-making
power rests with the leader. The leader guides the
employees on what to perform and how to perform, while
the employees communicate to the leader their experience
and the suggestions if any. The advantages of this
leadership style are that it leads to satisfied, motivated and
more skilled employees. It leads to an optimistic work
environment and also encourages creativity. This
leadership style has the only drawback that it is timeconsuming.
Bureaucratic: Here the leaders strictly adhere to
the organizational rules and policies. Also, they make sure
that the employees/team also strictly follows the rules and
procedures. Promotions take place on the basis of
employees’ ability to adhere to organizational rules. This
leadership style gradually develops over time. This
leadership style is more suitable when safe work
conditions and quality are required. But this leadership
style discourages creativity and does not make employees
self-contented.
Figure 5
2%3%2%
Autocratic$
Laissez$Faire$
Democratic$
Bureaucratic$
93%
5) That coaching or sponsoring an extracurricular activity as
a teacher can lead to the development of important school
leadership traits that can be transferred to the principal
role. The respondents were asked to list some of the
qualities and characteristics they believe are necessary to
become a successful school principal and were learned
from coaching and/or sponsoring an extracurricular
activity. Some of the respondents wrote: “Patience,
organization, time management, ability to motivate,
approachability, integrity”, “Ability to listen, servant's
attitude, endurance, patience”, “Content knowledge and
being able to manage people with various personalities.
Problem solving and quick thinking as well as be a people
person who has the ability to listen and communicate
effectively” and “Ability to get a group to form a vision
and goal and work toward them, flexibility, good decision
making skills, collaborative skills”.
CONCLUSION
The data indicates that coaching and/or
sponsoring has an impact on school leadership
development. The principals who responded to the survey
are considered by the U.S. Department of Education to be
the very best in their field and their overwhelming
indication that coaching and/or sponsoring had a positive
impact on their development indicates that school districts
and universities could focus on identifying future school
leaders who are in this role currently. School districts are
under an enormous amount of pressure to find highly
effective principals to lead schools to higher levels of
student achievement. This study indicates that these future
leaders are already leading student organizations. School
districts and universities should be mentoring and
encouraging them to move into school level leadership.
The impact of student achievement is far reaching in our
society and it is critical to provide our students with the
best teachers and to provide our teachers with the best
leaders to who can help them be the best teachers they
can. These Blue Ribbon Principals are a strong example
of the type of leader school districts should be identifying
288
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
and mentoring. The common theme that was evident
through the responses was that these principals have
“servant” leader mentality. Leading by helping everyone
be the best at what they can be and always putting the
students’ well being at the forefront of every decision.
This is should also be the charge of school district
administrators as well but there is little data to show that
superintendents have direct impact on student
achievement. The school boards and district level
administrators do have the job of selecting the best
candidate for the principal position. There are many
factors that go into picking a new principal for a school
and unfortunately sometimes the best candidate isn’t
chosen for the job because of various reasons. This study
has identified that successful principals are coaching and
sponsoring teams and organizations. These experiences
are providing these teachers with an opportunity to lead
and learn to lead more effectively. The traits needed to be
a successful coach and a successful principal are similar
and understanding how these traits can be applied to a
school-wide setting is critical to the development of future
school leaders. Mentoring and advancement for these
teachers are critical to their success as future school
leaders.
Future research in this area would be to duplicate
the study with non-Blue Ribbon Principals and compare
the findings, identify high achieving schools in the
various states and duplicate the study with those
principals and duplicate this study with superintendents.
Understanding teacher leadership in schools is
critical to ensure that the cycle of school leadership
continues to improve by keeping the best candidates in
schools and then encouraging them to move into school
leadership.
REFERENCES
[1] Blue Ribbon Schools Program. (n.d.). Blue Ribbon
Schools Program. Retrieved from
http://www2.ed.gov/programs/nclbbrs/index.html.
[2] Feldman, A. F., & Matjasko, J. L. (2005). The role of
school-based extracurricular activities in adolescent
development: A comprehensive review and future
directions. Review of Educational Research, 75, 159–211
[3] Honig, M. I. (2012). District Central Office
Leadership as Teaching : How Central Office
Administrators Support Principals' Development as
Instructional Leaders. Educational Leadership Quarterly,
48(4), 733-774.
[4] Hopkins, G. (2003, May). From the principal files:
The principal shortage-why doesn’t anybody want the
job? [Electronic version]. Education World.
http://www.educationworld.com/a_admin/admin/admin19
7_a.shtml
[5] Leithwood, K., Louis, K., Anderson, S. and
Wahlstrom, K. (2004), How Leadership Influences
Student Learning, Wallace Foundation, New York, NY.
[6] Marzano, R.J., Waters, T. and McNulty, B.A. (2005),
School Leadership that Works: From Research to Results,
Mid-continent Research for Education and Learning,
Aurora, CO.
[7] Nettles, S. M., & Herrington, C. (2007). Revisiting the
Importance of the Direct Effects of School Leadership on
Student Achievement: The Implications for School
Improvement Policy. PEABODY JOURNAL OF
EDUCATION, 82(4), 724-736.
[8] Parkes, S.E. and Thomas, R.A. (2006), “Values in
action: observations of effective principals at work”,
Journal of Educational Administration, Vol. 45 No. 2, pp.
204-28.
[9] Perreira, K. M., Harris, K. M., & Lee, D. (2006).
Making it in America: High school completion by
immigrant and native youth. Demography, 43, 511–536.
289
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
290
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
AUTHORS INDEX
Abreu, João Francisco de
Acs, Bernie
Aguilar Cisneros, Jorge
Aloteawi, Saleh Mohammed
Amos Sr., Christopher N.
Anacleto, Gracia M. C.
Anagusko, Claudio K.
Arnab, R.
Bahl, Vikram
Barb, Adrian S.
Barchilon Ben-Av, Mercedes
Barnes, Cathy
Ben-Av, Radel
Benham, James W.
Benton, Tara
Bialaszewski, Dennis
Bonometti, Robert
Brage, Christina
Budnik, Mark M.
Butrime, Edita
Cerruto, Audra
Chebchoub, Zahida
Chen, Jia-Ling
Chitcharoena, Chaisak
Comer, Denise
Costa, Regina Coeli
Cumbie, Barry
Duellberg, Donna
Fernández, Trinidad
Folley, Duncan
García-Pérez, Grisel
Guo, Jiayan
Haggis, Devena
Hansen, Christine
Hartpence, Bruce
Heilmann, Heidi
Hendel, Russell Jay
Hsieh, Ching-Jung
Hu, Yang-Chih
Hultman Jakobsson, Ann
49
6
10
239
285
135
135
23
107
147
262
85
262
270
16
153
29
217
192
38
16
201
68
118
248
181
140
205
159
85
159
107
253
205
91; 170
16
211
164
68
16
Jastroch, Norbert
Johnson, Daryl
Johnston, Hal
Kanthawongs, Penjira
Kanthawongs, Penjuree
Kim, Hyunju
Kirova, Vassilka
Koller, Karine
Korman, Thomas
Koyama, Yukie
Ku, Cyril S.
Kurtulus, Kemal
Kurtulus, Sema
Lantz, Agneta
Laudares, Sandro
Leong, David
Leszczy ska, Dorota
Long, Cynthia
Marlowe, Thomas J.
Mashl, R. Jay
Mason, Sharon
McCarthy, Erin
McGovern, Beth
Meghanathan, Natarajan
Menyhárt, László
Mitrofanova, Ksenia A.
Miyazaki, Yoshinori
Monteiro, Maria da Conceição
Moore, Loretta A.
Nousala, Susu
Nunes, Sheila Torres
Orantes-Jiménez, Sandra-Dinora
Ozturk, Selen
Pacheco, Beatriz A.
Pacheco, Roberto Carlos dos Santos
Pap, Gáborné
Peterson, Patricia
Polik, William F.
Putz, Lisa-Maria
Ristvey, John
291
270
91; 170
1
113; 118
113; 118
265
270
63
1
129
270
44
44
217
49
107
54
124
270
6
91; 170
16
16
265
97
258
129
181
265
270
181
59
44
135
63
97
103
6
223
124
Proceedings of The 7th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI 2013)
Rodriguez-Yborra, Maria A.
Romero Rivera, Manuel
Salm Junior, José Francisco
Santiago, Joaquin
Schauer, Oliver
Schiering, Marjorie S.
Schmidt, J. R.
Schneider, Viviane
Scott, Philip Richard
Serumaga-Zake, Philip A. E.
Siang, Jonathan
Souza-Concilio, Ilana A.
Stackpole, Bill
Styron, Jennifer L.
Styron, Jr., Ronald A.
Swendsen, Mary Ann
Tai, David W. S.
Tanaka, Shosaku
Tarnittanakorn, Nittana
Thorton, Quintan
Trna, Josef
Van de Vegte, Joyce
Vasilache, Simona
Vázquez-Álvarez, Graciela
Villas-Bôas, Glauco
Wang, Ray
White, Marta Szabo
Wilkinson, Stephen
Wiziecki, Edee Norman
Wu, Min-Kun
Yeh, Dowming
Yukech, Christine M.
Zavala-Galindo, Alejandro
Zhang, Ren-Cheng
Zhu, Qi
Zuzeviciute, Vaiva
276
10
63
159
223
16
6
63
85
23
107
135
91; 170
140
229
205
68
129
74
85
176
195
253
59
181
68
79
85
6
233
233
279
59
68
187
38
292