Search results for "software"
showing 10 items of 7396 documents
Estimating Programming Exercise Difficulty using Performance Factors Analysis
2020
This Work in Progress Paper studies student and exercise modelling based on pass/fail log data gathered from an introductory programming course. Contemporary education capitalizes on the communications technology and remote study. This can create distance between the teacher and students and the resulting lack of awareness of the difficulties students encounter can lead to low student satisfaction, dropout and poor grades. In many cases, various technological solutions are used to collect individual exercise submissions, but there are little resources for indexing or modelling the exercises in depth. Exercise specific feedback from students may not be easily obtainable either. In the presen…
Early science learning with a virtual tutor through multimedia explanations and feedback on spoken questions
2018
The purpose of this pilot study with a within-subject design was to gain a deeper understanding about the promise and restrictions of a virtual tutoring system designed to teach science to first grade students in Finland. Participants were 61 students who received six tutoring science sessions of approximately 20 min each. Sessions consisted of a sequence of narrated multimedia science presentations during which a virtual tutor explained science phenomena displayed in pictures. Narrated science explanations were followed by one or more multiple choice questions with immediate feedback about students’ choices and a possible second attempt, during which students reached 97% accuracy. A pretes…
Self-Directed Learning as a Practice of Workplace Learning: Interpretative Repertoires of Self-Directed Learning in ICT Work
2019
Changing technologies and competition in the field of information and communication technology (ICT) are challenging the learning of individual workers and teams alongside and through work. Organisations call for employees’ autonomy and self-directedness executed by agile operations and low hierarchies, where learning is also increasingly the responsibility of the individuals and teams themselves and occurs in practice without strong control of the organisation. Therefore, the multidimensional concept of self-directed learning becomes essential in the context of learning at work. In this study, we examine how employees in the ICT sector describe self-directed learning practices in the conte…
Searching for Global Employability : Can Students Capitalize on Enabling Learning Environments?
2019
Literature on global employability signifies “enabling” learning environments where students encounter ill-formed and open-ended problems and are required to adapt and be creative. Varying forms of “projects,” co-located and distributed, have populated computing curricula for decades and are generally deemed an answer to this call. We performed a qualitative study to describe how project course students are able to capitalize on the promise of enabling learning environments. This critical perspective was motivated by the circumstance of the present-day education systems being heavily regulated for the precipitated production of human capital. The students involved in our study described edu…
Designing and Implementing a CSCL-based Course on the Data Security of a Wireless Learning Environment
2012
This article reports on a design-based research (DBR) process for designing and implementing a computer-supported collaborative learning (CSCL) course on the data security of wireless learning environments. The study focuses on examining how university students practice data security when learning on a wireless campus, how data security aspects appear in this study and how students perceive the role of data security in CSCL. The research subjects included six pilot students and eight students enrolled in the course. To promote the reliability of the findings, various kinds of data were used. The data was analysed following the grounded theory approach. The results suggest that data security…
Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions
2023
AbstractIS literature has identified various economic, performance, and environmental factors affecting cybersecurity investment decisions. However, economic modeling approaches dominate, and research on cybersecurity performance as an antecedent to investments has taken a backseat. Neglecting the role of performance indicators ignores real-world concerns driving actual cybersecurity investment decision-making. We investigate two critical aspects of cybersecurity performance: breach costs and breach identification source, as antecedents to cybersecurity investment decisions. We use organizational learning to theorize how performance feedback from these two aspects of cybersecurity breaches …
Support for Knowledge and Innovations in Software Development – Community within Company: Inner Source Environment
2007
This case study considers a software development support portal adapted from open source developer communities into a company internal, so called inner-source development environment. With theoretical insights into knowledge management (KM) models, recent advancements in KM theory building, and observations of the inner source platform we make observations as regarding the KM approach and suggestions for its further development. Both technological and human components of KM are considered. The results of this study, can be generally applicable to the knowledge creation and innovation support in software development. We believe that many software companies are following the example and build…
Software patterns, organizational learning and software process improvement
2011
Chatbot Adoption in Tourism Services: A Conceptual Exploration
2019
Originality/value: This study is one of the earliest studies that advances firm-level adoption of chatbots by integrating two key organizational theories.
Expectations and Experiences of Implementing a Mobile Secure Communication Application
2020
The privacy and security of communication in corporations and governmental organizations has increased enormously over the years. At the same time, a growing amount of technological solutions to support this have emerged. This study examines user expectations before and use experiences during the implementation phase of a mobile secure communication application. These are investigated from the expectation–confirmation perspective and its influence on continued adoption. The study has an exploratory approach for this investigation. To guide the investigation, the study draws from the expectation–confirmation theory (ECT) and the unified theory of acceptance and use of technology (UTAUT). Emp…