Advances in Human and Social Aspects of Technology最新文献

筛选
英文 中文
Strategy to Implement Gamification in LMS 在LMS中实施游戏化的策略
Advances in Human and Social Aspects of Technology Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-8089-9.ch004
E. Somova, Mariya Gachkova
{"title":"Strategy to Implement Gamification in LMS","authors":"E. Somova, Mariya Gachkova","doi":"10.4018/978-1-7998-8089-9.ch004","DOIUrl":"https://doi.org/10.4018/978-1-7998-8089-9.ch004","url":null,"abstract":"The main goal of the chapter is to discuss implementation of the structural gamification in LMS. The overview of pedagogical approaches, theories, models, and systems connected to the serious games and in particular for gamification is presented. The possibilities for using the game elements and techniques in е-learning (incl. possible realization with the standard elements of a non-gamified LMS) are presented. A four-stage cyclical gamified learning model is proposed. For the four categories of learners from the Bartle's classification, the appropriate game elements are determined. Two plugins for the application of structural gamification in Moodle have been designed and developed, which integrates game elements and techniques in the process of e-learning. The first plugin changes the design of the course into a game view. The second plugin allows adding specific game elements, which do not exist in Moodle. Different experiments of structural gamification have been done and presented.","PeriodicalId":383647,"journal":{"name":"Advances in Human and Social Aspects of Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128241526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Linked Data 关联数据
Advances in Human and Social Aspects of Technology Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-6367-9.CH005
Leila Zemmouchi-Ghomari
{"title":"Linked Data","authors":"Leila Zemmouchi-Ghomari","doi":"10.4018/978-1-5225-6367-9.CH005","DOIUrl":"https://doi.org/10.4018/978-1-5225-6367-9.CH005","url":null,"abstract":"The data on the web is heterogeneous and distributed, which makes its integration a sine qua non-condition for its effective exploitation within the context of the semantic web or the so-called web of data. A promising solution for web data integration is the linked data initiative, which is based on four principles that aim to standardize the publication of structured data on the web. The objective of this chapter is to provide an overview of the essential aspects of this fairly recent and exciting field, including the model of linked data: resource description framework (RDF), its query language: simple protocol, and the RDF query language (SPARQL), the available means of publication and consumption of linked data, and the existing applications and the issues not yet addressed in research.","PeriodicalId":383647,"journal":{"name":"Advances in Human and Social Aspects of Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129668636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Technological Convergence 技术融合
Advances in Human and Social Aspects of Technology Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6772-2.CH002
J. Cordeiro
{"title":"Technological Convergence","authors":"J. Cordeiro","doi":"10.4018/978-1-7998-6772-2.CH002","DOIUrl":"https://doi.org/10.4018/978-1-7998-6772-2.CH002","url":null,"abstract":"Technological convergence is accelerating and allowing humanity to move from slow and erratic biological evolution to fast and precise technological evolution. The expression “emerging technologies” is used to cover new and potentially powerful fields such as biotechnology, artificial intelligence, and nanotechnology. Although the expression might be somewhat ambiguous, several clusters of different technologies are advancing exponentially and will be critical to humanity's future. NBIC is a common abbreviation that stands for nanotechnology, biotechnology, information technology, and cognitive science. Other technologies like robotics, quantum computing, and space technologies can be added towards an accelerating “technological convergence” that might lead to a “technological singularity” as proposed by US engineer and futurist Ray Kurzweil. According to Kurzweil, we will reach a “technological singularity” by 2045, when we will be able to transcend many of our current limitations and move from biological humans to technological transhumans, both on planet Earth and beyond.","PeriodicalId":383647,"journal":{"name":"Advances in Human and Social Aspects of Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127443349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing Cyber Security Competences Through Simulation-Based Learning 通过基于模拟的学习发展网络安全能力
Advances in Human and Social Aspects of Technology Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-4285-9.ch008
B. Vassileva
{"title":"Developing Cyber Security Competences Through Simulation-Based Learning","authors":"B. Vassileva","doi":"10.4018/978-1-7998-4285-9.ch008","DOIUrl":"https://doi.org/10.4018/978-1-7998-4285-9.ch008","url":null,"abstract":"The importance of cyber security competences is growing both in practice and in academia during the last few years. This chapter provides a current overview of the existing body of the literature in the field of simulation-based learning and the key cyber security issues. The author's primary goal is to develop a methodological business-oriented and evidence-based learning framework which will provide students or trainees with the opportunity to develop practical skills in the field of cyber security issues through a virtual business simulator. The overall intention is to provide a coherent framework that makes use of active-based learning and gamification to support the active participation of students or trainees. To meet these goals, the Reference Framework for Applied Competences (REFRAC) is applied. Taking into account that in 2040 ICT and internet will be ‘culturally invisible', cyber security competences will be a must for everyone. They will be critical both for personal and companies' survival in the turbulent and highly competitive digital environment.","PeriodicalId":383647,"journal":{"name":"Advances in Human and Social Aspects of Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129054115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maintaining Social Well-Being and Meaningful Work in a Highly Automated Job Market 在高度自动化的就业市场中维持社会福祉和有意义的工作
Advances in Human and Social Aspects of Technology Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-2509-8
{"title":"Maintaining Social Well-Being and Meaningful Work in a Highly Automated Job Market","authors":"","doi":"10.4018/978-1-7998-2509-8","DOIUrl":"https://doi.org/10.4018/978-1-7998-2509-8","url":null,"abstract":"","PeriodicalId":383647,"journal":{"name":"Advances in Human and Social Aspects of Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130532107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Decision Making in the Choice of Condition-Based Maintenance Techniques in a Subsidiary of a Petrochemical Company 某石化子公司状态维修技术选择的决策
Advances in Human and Social Aspects of Technology Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7152-0.CH017
María Carmen Carnero-Moya, F. Cárcel-Carrasco
{"title":"Decision Making in the Choice of Condition-Based Maintenance Techniques in a Subsidiary of a Petrochemical Company","authors":"María Carmen Carnero-Moya, F. Cárcel-Carrasco","doi":"10.4018/978-1-5225-7152-0.CH017","DOIUrl":"https://doi.org/10.4018/978-1-5225-7152-0.CH017","url":null,"abstract":"Condition-based maintenance (CBM) may be considered an essential part of the Industry 4.0 environment because it can improve production processes through the use of the latest digital technologies, which allows improvements to products, processes, and business models. Nonetheless, despite this importance, there are no models or methodologies in the literature to assist in choosing predictive techniques and the level of complexity to be used in a given organization. This chapter describes a model for choosing the most suitable CBM technique to be introduced in a subsidiary of a petrochemical plant. The predictive techniques of vibration analysis, lubricant analysis, and a combination of the two were considered at three technological levels. The model was built using the measuring attractiveness by a categorical based evaluation technique (MACBETH) approach. The present model could avoid failures in these programmes when making decisions about the techniques and technologies most suited to the characteristics of the industrial plant.","PeriodicalId":383647,"journal":{"name":"Advances in Human and Social Aspects of Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126865017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effect of Social Networks on Relationships Outside the Network 社会网络对网络外关系的影响
Advances in Human and Social Aspects of Technology Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-4047-2.CH012
T. Seifert, Idit Miara
{"title":"The Effect of Social Networks on Relationships Outside the Network","authors":"T. Seifert, Idit Miara","doi":"10.4018/978-1-5225-4047-2.CH012","DOIUrl":"https://doi.org/10.4018/978-1-5225-4047-2.CH012","url":null,"abstract":"This chapter examines the impact of three different aspects of romantic discourse on social networks: romance, identity, and privacy. Qualitative research focused on the influence of the social networks on the opinions and interpersonal behavior of 11 single academics, aged 30-45 years old, men and women who used Facebook as a means for meeting potential romantic partners. The research employed semi-structured in-depth interviews to elicit qualitative data. Results indicate that an intimate, romantic setting cannot exist on the social network. Most users enhanced their identity in order to appear more attractive online. Most of the interviewees clearly felt that they needed to control the exposure of their personal details, and there was a clear indication that privacy does not exist online: it seems to be impossible to limit exposure of the published contents to specific selected audiences. Online romantic relationships are a metonymy for rapidly changing values and social norms in a dynamic global reality.","PeriodicalId":383647,"journal":{"name":"Advances in Human and Social Aspects of Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123156510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study of the Factors Influencing ICT Adoption in SMEs 中小企业信息通信技术采用影响因素的实证研究
Advances in Human and Social Aspects of Technology Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-6367-9.CH013
Japhet Eke Lawrence
{"title":"An Empirical Study of the Factors Influencing ICT Adoption in SMEs","authors":"Japhet Eke Lawrence","doi":"10.4018/978-1-5225-6367-9.CH013","DOIUrl":"https://doi.org/10.4018/978-1-5225-6367-9.CH013","url":null,"abstract":"ICT has the potential to radically change the way business is conducted, offering a competitive edge and a gateway to the global marketplace. The explosive growth of ICT has opened a vast arena providing opportunities for businesses, particularly SMEs to sell their products and service to a global audience than they would have been able to afford to reach using the traditional methods. This chapter reports on the empirical study of ICT adoption in small to medium-sized enterprises. The intention of the study is to present evidence on the factors that influence SMEs' decision to adopt ICT in business. The study is chosen because of the strategic importance of SMEs to the economy and their contribution in creating jobs cannot be over emphasized. The study uses in-depth case studies, conceptualized within the grounded theory method to generate thick description to explain the phenomenon. The study uses diffusion theory and the technology acceptance model as a basis for the theoretical framework.","PeriodicalId":383647,"journal":{"name":"Advances in Human and Social Aspects of Technology","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121186462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptualizing the Domain and an Empirical Analysis of Operations Security Management 领域概念与运营安全管理的实证分析
Advances in Human and Social Aspects of Technology Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-6367-9.CH015
Winfred Yaokumah
{"title":"Conceptualizing the Domain and an Empirical Analysis of Operations Security Management","authors":"Winfred Yaokumah","doi":"10.4018/978-1-5225-6367-9.CH015","DOIUrl":"https://doi.org/10.4018/978-1-5225-6367-9.CH015","url":null,"abstract":"Operations security management integrates the activities of all the information systems security controls. It ensures that the entire computing environment is adequately secured. This chapter conducts an in-depth review of scholarly and practitioner works to conceptualize the domain of operations security management. Drawing upon the existing information systems security literature, the chapter classifies operations security management into 10 domains. Following, the chapter performs an empirical analysis to investigate the state-of-practice of operations security management in organizations. The findings show that the maturity level of operations security management is at the Level 3 (well-defined). The maturity levels range from Level 0 (not performed) to Level 5 (continuously improving). The results indicate that operations security processes are documented, approved, and implemented organization-wide. Backup and malware management are the most applied operations security controls, while logging, auditing, monitoring, and reviewing are the least implemented controls.","PeriodicalId":383647,"journal":{"name":"Advances in Human and Social Aspects of Technology","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116622193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human-Computer Interaction and Technology Integration in Modern Society 现代社会的人机交互与技术融合
Advances in Human and Social Aspects of Technology Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5849-2
{"title":"Human-Computer Interaction and Technology Integration in Modern Society","authors":"","doi":"10.4018/978-1-7998-5849-2","DOIUrl":"https://doi.org/10.4018/978-1-7998-5849-2","url":null,"abstract":"","PeriodicalId":383647,"journal":{"name":"Advances in Human and Social Aspects of Technology","volume":"15 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113943061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信