Search results for "Data Science"
showing 10 items of 495 documents
Evaluación de la educación digital y digitalización de la evaluación
2021
La evaluación de la educación digital y digitalización de la evaluación son procesos por el que transita tanto la educación digital como la educación digital de emergencia. Aunque el tema de la evaluación, por sí misma, ya es complejo, esta complejidad aumenta cuando media la tecnología digital. Lejos de pensar que se trata de una acción técnica, la evaluación digital y la digitalización de la evaluación, como lo demuestra el contenido de este monográfico, no se reducen a la inserción de sistemas tecnológicos, sino a la comprensión pedagógica de su rol e impacto en los procesos educativos. Los trabajos que conforman este monográfico buscan contribuir, desde el análisis empírico y la reflexi…
The sharing of research data in the cell & Tissue engineering area: Is it a common practice?
2018
The availability of research data sets is an important milestone because it can enhance the dynamics of research. This study aims to analyze the PubMed Central repository to determine the availability and type of raw data sets in Cell & Tissue Engineering journals indexed in Journal Citation Reports. The number and types of files were registered. The main finding of this study is that, beyond the mandatory deposit of data in specific repositories that some journals require, the exchange of data as supplementary material in the Cell & Tissue Engineering journals is not a common practice since researchers are still reticent to do so.
Empirical Research in Linguistics
2021
SQL Education
2020
Structured Query Language (SQL) skills are crucial in software engineering and computer science. However, teaching SQL effectively requires both pedagogical skill and considerable knowledge of the language. Educators and scholars have proposed numerous considerations for the betterment of SQL education, yet these considerations may be too numerous and scattered among different fora for educators to find and internalize, as no systematic mappings or literature reviews regarding SQL education have been conducted. The two main goals of this mapping study are to provide an overview of educational SQL research topics, research types, and publication fora, and to collect and propagate SQL teachi…
Nethnography and Social Network Analysis for Studying Online Social Space
2022
Author's accepted manuscript This chapter contributes to the current methodological debate on digital, internet-based studies in social research. Based upon an introductive analysis of the research's perspectives, trajectories, and stages that have brought the online social spaces into social research, the chapter focuses on the advantages of combining quanti-quali approaches for approaching online complexity. In particular, the authors offer a deep discussion concerning the value, the methodological, and ethical challenges of netnography and social network analysis (SNA) methods for inquiring online social research by proposing a possible emerging methodological framework guiding further e…
Author response: Large-scale language analysis of peer review reports
2020
Reporting Empirical Research in Global Software Engineering: A Classification Scheme
2008
Increased popularity of global software engineering (GSE) has resulted in quite a number of research and industrial studies. As the area matures, an increased focus on empirically supported results leads to a greater potential impact on future research and industrial practice. However, since GSE scenarios are diverse, what works in one context might not directly apply in another. Thus it is necessary to understand, how GSE-related empirical findings should be reported to be useful for practitioners and researchers. Furthermore, itdasias important to summarize progress and get the big picture of published research to identify gaps and commonalities. In this paper we analyze differentiating f…
Two Times Four Integrative Levels of Analysis: A Framework
2001
Walsham (2000) urged Information Systems researchers to truly cover all levels of analysis from the individual to the societal in their research agenda. In this paper, we accept his challenge by proposing a research framework offour integrative levels of analysis: individual, group/activity, organizational, and societal. Each level is divided into two viewpoints: intra (single case) and inter (multiple cases, relational, comparative). In addition, the temporal/historical dimension should be applied on all levels and viewpoints. We argue that although all of the levels and viewpoints of the “2 × 4 + history” framework cannot be thoroughly covered in any single study, researchers should alway…
Data Analysis as a Tool for Optimizing Learning Management Systems
2009
The advent of the Internet has opened a scope for research in new methods and tools that may facilitate the teaching and learning processes. This has, in turn, led to the development of learning platforms to support teaching and learning activities. The market penetration of these has been such that nowadays most universities provide their academic community with some form of a learning management system (LMS).Although a lot of effort has been put into deploying these platforms, the usage statistics that they generally provide are not generally processed to optimize their use within a specific context or institution (or confronted with quality or innovation indexes to produce useful feedbac…
Analysis of computer user behavior, security incidents and fraud using Self-Organizing Maps
2019
Abstract This paper addresses several topics of great interest in computer security in recent years: computer users’ behavior, security incidents and fraud exposure on the Internet, due to their high economic and social cost. Traditional research has been based mainly on gathering information about security incidents and fraud through surveys. The novelty of the present study is given by the use of Self-Organizing Maps (SOMs), a visual data mining technique. SOMs are applied to two data sets acquired using two different methodologies for collecting data about computer security. First, a traditional online survey about fraud exposure, security and user behavior was used. Second, in addition …