Professional Documents
Culture Documents
Information
Communication
Technology
Antonio Cartelli
University of Cassino, Italy
Marco Palma
University of Cassino, Italy
Volume I
A-Im
Copyright 2009 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any
means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate
a claim of ownership by IGI Global of the trademark or registered trademark.
Encyclopedia of information communication technology / Antonio Cartelli and Marco Palma, Editors.
p. cm.
Summary: "This book is a comprehensive resource describing the influence of information communication technology in scientific knowledge construction
and spreading, with emphasis on the roles of product technologies, process technologies, and context technologies"--Provided by publisher.
ISBN-13: 978-1-59904-845-1 (hardcover)
ISBN-13: 978-1-59904-846-8 (e-book)
1. Telecommunication--Encyclopedias. I. Cartelli, Antonio, 1954- II. Palma, Marco.
TK5102.E644 2008
004.6'5--dc22
2007043957
All work contributed to this encyclopedia set is original material. The views expressed in this encyclopedia set are those of the authors, but not neces-
sarily of the publisher.
If a library purchased a print copy of this publication, please go to http://www.igi-global.com/agreement for information on activating
the library's complimentary electronic access to this publication.
Editorial Advisory Board
Antonio Calvani
University of Florence, Italy
John A. Clarke
Queensland University of Technology, Australia
Paolo Frignani
University of Ferrara, Italy
Athanassios Jimoyiannis
University of Peloponesse, Greece
Juha Kettunen
Rector of the Turku University of Applied Sciences, Finland
Terry Kidd
University of Houston Downtown, USA
Marco Pedroni
University of Ferrara, Italy
Giorgio Poletti
University of Ferrara, Italy
Maria Ranieri
University of Florence, Italy
Piercesare Rivoltella
Catholic University of Holy Heart, Italy
Lawrence Tomei
Robert Morris University, USA
List of Contributors
Volume I
Academic Guidance Model to Orient Distance Students, An / Luca Vanin, University of Milan
Bicocca, Italy; Stefano Castelli, University of Milan Bicocca, Italy; Alessandro Pepe, University of
Milan Bicocca, Italy; and Loredana Addimando, University of Milan Bicocca, Italy ................................ 1
Adaptation of Cognitive Walkthrough in Response to the Mobile Challenge / Chua Fang Fang,
Multimedia University, Cyberjaya, Malaysia ................................................................................................... 10
Adult Education and Adult Learning Processes with ICT / Y. Inoue, University of Guam, Guam ................... 14
Ambient Intelligence / Fortunato Sorrentino, Universit degli Studi di Firenze, Italy .................................... 32
Applying Constructivist Self-Regulating Learning Approach for ICT Students / Yuk Kuen Wong,
Griffith University, Australia; and Don Kerr, University of the Sunshine Coast, Australia ............................. 40
B2B E-Commerce Development in Syria and Sudan / Dimitris K. Kardaras, Athens University of
Economics and Business, Greece...................................................................................................................... 55
Classics Teaching Through ICT Experience to ICT Manual for Classics Teachers / Annarella Perra,
CIRD SSIS Cagliari, Italy .............................................................................................................................. 84
Cooperative Learning Strategies for Effective Teaching and Learning Science Courses in Large Classes /
I. A. Ajayi, Federal College of Education, Abeokuta, Nigeria; and O. B. Ajayi, University of Agriculture,
Abeokuta, Nigeria ........................................................................................................................................... 127
Data Caching Patterns / Tony C. Shan, IBM, USA; and Winnie W. Hua, CTS Inc., USA ............................... 139
Data Flow Diagram Use to Plan Empirical Research Projects / Jens Mende, University of the
Witwatersrand, South Africa ........................................................................................................................... 150
Distance Learning Techniques in University Courses / Paolo Frignani, University of Ferrara, Italy .......... 166
Dynamic Reconstruction of Concept Maps / Marco Pedroni, CARID Universit degli Studi di
Ferrara, Italy .................................................................................................................................................. 173
Education and E-Learning Evaluation and Assessment / Emilio Lastrucci, University of Basilicata, Italy;
Debora Infante, University of Basilicata, Italy; and Angela Pascale, University of Basilicata, Italy ........... 189
EduOntoWiki Project for Supporting Social, Educational, and Knowledge Construction Processes with
Semantic Web Paradigm, The / Corrado Petrucco, University of Padua, Italy ............................................. 195
Edutainment Framework Implementation Case Study, An / Zarina Che Embe, Multimedia University,
Malaysia; and Hanafizan Hussain, Multimedia University, Malaysia ........................................................... 202
E-Government Growth Barriers in Sub-Saharan Africa / Princely Ifinedo, Cape Breton University,
Canada ............................................................................................................................................................ 209
E-Knowledge / Fortunato Sorrentino, Universit degli Studi di Firenze, Italy ............................................. 215
E-Learning Function Integration with Corona 2 / Marco Pedroni, CARID Universit degli Studi di
Ferrara, Italy .................................................................................................................................................. 222
E-Learning is What Kind of Learning? / Flavia Santoianni, University of Naples Federico II, Italy ........... 243
E-Learning Methodological Models and Typologies / Maria Ranieri, University of Florence, Italy ............ 249
E-Learning Project for a Basic Mathematics Course at the University, An / Anna Torriero,
Catholic University of the Sacred Heart, Italy; and Immacolata Scancarello, Catholic University of the
Sacred Heart, Italy ......................................................................................................................................... 256
E-Learning to Games-Based E-Learning, From / Thomas M. Connolly, University of the West of Scotland,
UK; and Mark Stansfield, University of the West of Scotland, UK ................................................................. 268
E-Learning to T-Learning, From / Roberto Cuccu, University of Cagliari, Italy ........................................... 276
Electronic Knowledge a Plural Thought?, Is / Franco Frabboni, University of Bologna, Italy..................... 284
Electronic Loyalty Programs Comparative Survey / Yasin Ozcelik, Fairfield University, USA ..................... 286
Enhancement of Recorded Respiratory Sound Using Signal Processing Techniques / Feng Jin,
Nanyang Technological University, Singapore; and Farook Sattar, Nanyang Technological University,
Singapore ........................................................................................................................................................ 291
ERP Integration into Existing Courses: A Three-Step Approach / Jaideep Motwani, Grand Valley State
University, USA; and Asli Y. Akbulut, Grand Valley State University, USA ................................................... 301
Factors Determining Teachers Beliefs and Perceptions of ICT in Education / Athanassios Jimoyiannis,
University of Peloponnese, Greece ................................................................................................................. 321
GIS Use in Landscape Archaeology / Cristina Corsi, Universit di Cassino, Italy ....................................... 341
Higher Educations New Frontier for the E-University and Virtual Campus / Antonio Cartelli,
University of Cassino, Italy............................................................................................................................. 350
ICT and Interculture Opportunities Offered by the Web / Laura Corazza, Universit di Bologna, Italy ...... 357
ICT and the Virtual Organisation / Carmen de Pablos Heredero, Rey Juan Carlos University, Spain .......... 365
ICT Investment Evaluation Practices in Large Organizations / Chad Lin, Curtin University of Technology,
Australia; and Yu-An Huang, National Chi Nan University, Taiwan; and .................................................... 371
ICT Literacy in the Information Age / Ritchie Macefield, Staffordshire University & MEFU Ltd., UK ........ 378
ICT Policies in Africa / Esharenana E. Adomi, Delta State University, Nigeria; and Stella E. Igun,
Delta State University Library, Nigeria .......................................................................................................... 384
ICT Processes for Virtual Academic Research Teams (VART) in Academia / Jason S. Lecoure,
Saint Marys University, Canada; and Wendy R. Carroll, Acadia University, Canada.................................. 390
ICTs and Distance Education in Nigeria / Nwachukwu Prince Ololube, NOVENA University Ogume,
Nigeria; and Andrew Egba Ubogu, Ahmadu Bello University Zaria, Nigeria ............................................... 396
Volume II
Inference Tree Use to Design Arguments in Expository Reports / Jens Mende, University of the
Witwatersrand, South Africa ........................................................................................................................... 419
Information Communication Technology Tools for Software Review and Verification / Yuk Kuen Wong,
Griffith University, Australia .......................................................................................................................... 429
Information Environments of Middle Managers in Higher Education / Juha Kettunen, Turku University
of Applied Sciences, Finland; Jouni Hautala, Turku University of Applied Sciences, Finland; and
Mauri Kantola, Turku University of Applied Sciences, Finland ..................................................................... 436
Integrating Software Engineering and Costing Aspects within Project Management Tools /
Roy Gelbard, Bar-Ilan University, Israel; Jeffrey Kantor, Bar-Ilan University, Israel &
University of Windsor, Canada; and Liran Edelist, Bar-Ilan University, Israel ............................................ 443
Integrative Approach to User Interface Design, An / Vanja Kljajevic, NewHeights Software, Canada
& Carleton University, Canada ...................................................................................................................... 457
Intelligent Multi-Agent Systems / Uros Krcadinac, University of Belgrade, Serbia; Milan Stankovic,
University of Belgrade, Serbia; Vitomir Kovanovic, University of Belgrade, Serbia; and
Jelena Jovanovic, University of Belgrade, Serbia .......................................................................................... 464
Intelligent User Preference Mining / Sheng-Uei Guan, Xian Jiatong-Liverpool University, China; and
Ping Cheng Tan, National University of Singapore, Singapore ..................................................................... 470
Interactive Television Accessibility and Usability / Roberto Cuccu, University of Cagliari, Italy ................ 477
Introduction to Computer Forensics in the Age of Information Warfare / Terry T. Kidd, University of
Texas School of Public Health, USA ............................................................................................................... 490
IT-Enabled Reengineering: Productivity Impacts / Yasin Ozcelik, Fairfield University, USA ....................... 498
Learning Processes and ITC / Manuela Gallerani, University of Bologna, Italy ........................................... 518
Leveraging Supply Chain Management in the Digital Economy / Mahesh S. Raisinghani, TWU School
of Management, USA ...................................................................................................................................... 526
Linking E-Assessment to Students Use of Online Learning Content / Kar-Tin Lee, Queensland
University of Technology, Australia; Hitendra Pillay, Queensland University of Technology, Australia;
and Vinesh Chandra, Queensland University of Technology, Australia ......................................................... 532
Management Information System in Higher Education / Juha Kettunen, Turku University of Applied
Sciences, Finland ............................................................................................................................................ 542
Mobile Learning and an Experience with Blended Mobile Learning / Michelle Pieri, University of Milano
Bicocca, Italy; and Davide Diamantini, University of Milano Bicocca, Italy .......................................... 548
Modeling Business Actions / Peter Rittgen, University College of Bors, Sweden ....................................... 554
Modelling Wireless Local Area Networking in Higher Education Institutes / Ossi Vnnen,
Turku University of Applied Sciences, Finland............................................................................................... 563
Multimedia Integration in Active Online Learning Environments / Holim Song, Texas Southern University,
USA; and Terry T. Kidd, University of Texas School of Public Health, USA ................................................. 569
NETRIC: A Proposed System for Synthesis of Multicast Transport Protocols / Mihly Orosz,
Budapest University of Technology and Economics, Hungary; Dvid Tegze, Budapest University of
Technology and Economics, Hungary; Gbor Hossz, Budapest University of Technology and
Economics, Hungary; and Ferenc Kovcs, Budapest University of Technology and Economics,
Hungary .......................................................................................................................................................... 584
Network Management Resource Costs / Colin Pattinson, Leeds Metropolitan University, UK .................... 592
New Algorithm for Minimizing Tree Pattern Queries, A / Yangjun Chen, University of Winnipeg,
Canada ............................................................................................................................................................ 598
New Algorithm for Subset Matching Problem Based on Set-String Transformation, A / Yangjun Chen,
University of Winnipeg, Canada ..................................................................................................................... 607
Novel Application of the P2P Technology for Intrusion Detection, A / Zoltn Czirkos, Budapest
University of Technology and Economics, Hungary; and Gbor Hossz, Budapest University of
Technology and Economics, Hungary ............................................................................................................ 616
Online Catalogue of Manuscripts Conserved in Libraries in the Veneto Region / Barbara Vanin,
Biblioteca del Museo Correr, Italy .................................................................................................................. 631
Online Learnings Future in the Workplace with Augmented Reality / Katherine Ira, University of
Maryland, Baltimore County, USA; and Zane Berge, University of Maryland, Baltimore County, USA....... 637
Online Trust in Mobile Commerce / Yuk Kuen Wong, Griffith University, Australia; and
C. J. Hsu, Griffith University, Australia.......................................................................................................... 647
Open Catalogue of Manuscripts in the Malatestiana Library, The / Antonio Cartelli, University
of Cassino, Italy; A. Daltri, Biblioteca Malatestiana, Italy; P. Errani, Biblioteca Malatestiana, Italy;
M. Palma, University of Cassino, Italy; and P. Zanfini, Biblioteca Malatestiana, Italy ................................ 656
Overview of Online Trust Derivatives for E-Commerce Adoption, An / Omer Mahmood, University of
Sydney, Australia............................................................................................................................................. 662
Participatory Design Project on Mobile ICT, A / Ursula Hyrkknen, Turku University of Applied Sciences,
Finland; Juha Kettunen, Turku University of Applied Sciences, Finland; and Ari Putkonen,
Turku University of Applied Sciences, Finland............................................................................................... 669
Pattern-Based Identification in P2P Systems / Gbor Richly, Budapest University of Technology and
Economics, Hungary; Gbor Hossz, Budapest University of Technology and Economics, Hungary;
and Ferenc Kovcs, Budapest University of Technology and Economics, Hungary ...................................... 676
Product Evaluation Services for E-Commerce / Sheng-Uei Guan, Xian Jiatong-Liverpool University,
China ............................................................................................................................................................... 683
Quality Assurance View of a Management Information System / Juha Kettunen, Turku University of
Applied Sciences, Finland; and Ismo Kantola, Turku University of Applied Sciences, Finland .................... 691
Relationship Between Assessment and Evaluation in CSCL, The / Serena Alvino, Institute for
Educational Technology, National Research Council, Italy; and Donatella Persico, Institute for
Educational Technology, National Research Council, Italy ........................................................................... 698
Semantic Web Adaptation / Alexander Mikroyannidis, University of Manchester, UK; and
Babis Theodoulidis, University of Manchester, UK ........................................................................................ 704
Social Networking and Personal Learning Environment / Antonio Fini, University of Florence, Italy ......... 713
Stream of Training Approach in Project Management Training / David G. Vequist IV, University of
the Incarnate Word, USA; and Mark S. Teachout, University of the Incarnate Word, USA ........................... 721
Strengthening the Knowledge-Base of Cities Through ICT Strategies / Tan Yigitcanlar, Queensland
University of Technology, Australia; and Koray Velibeyoglu, Izmir Institute of Technology, Turkey ............ 728
Supporting Self-Regulated Learning with ICT / Giuliana Dettori, Institute for Educational
Technology, National Research Council, Italy; and Donatella Persico, Institute for Educational
Technology, National Research Council, Italy ................................................................................................ 735
Technology Enhanced Learning in Continuing Medical Education / Guglielmo Trentin, Institute for
Educational Technology, Italian National Research Council, Italy................................................................ 742
Theories and Principles for E-Learning Practices with Instructional Design / Maria Ranieri,
University of Florence, Italy ........................................................................................................................... 750
Towards a Framework for Evaluating ICT-Based Materials / Hitendra Pillay, Queensland University
of Technology, Australia; and John A. Clarke, Queensland University of Technology, Australia ................. 759
Towards a New Model for Knowledge Construction and Evolution / Antonio Cartelli,
University of Cassino, Italy............................................................................................................................. 767
Understanding RFID (Radio Frequency Identification) / Susan A. Vowels, Washington College, USA ......... 782
Video Object Segmentation / Ee Ping Ong, Institute for Infocomm Research, Singapore; and
Weisi Lin, Nanyang Technological University, Singapore .............................................................................. 809
Virtual Identity, Digital Identity, and Virtual Residence of the Digital Citizen, The /
Fortunato Sorrentino, Universit degli Studi di Firenze, Italy ....................................................................... 825
Virtual Reality and Virtual Environments in Education / Nicoletta Sala, Universit della Svizzera
italiana, Switzerland ....................................................................................................................................... 833
Web-Based Course Management Systems (WCMS) Acceptance with College Students in Estonia /
Princely Ifinedo, Cape Breton University, Canada......................................................................................... 839
Wireless Revolution and Schools, The / Terry T. Kidd, University of Texas School of Public Health,
USA ................................................................................................................................................................. 847
Contents
by Topic
Product ICT
BISER / Dimitar Christozov, American University in Bulgaria, Bulgaria ....................................................... 66
Data Caching Patterns / Tony C. Shan, IBM, USA; and Winnie W. Hua, CTS Inc., USA ............................... 139
E-Learning to T-Learning, From / Roberto Cuccu, University of Cagliari, Italy ........................................... 276
Enhancement of Recorded Respiratory Sound Using Signal Processing Techniques / Feng Jin,
Nanyang Technological University, Singapore; and Farook Sattar, Nanyang Technological University,
Singapore ........................................................................................................................................................ 291
Inference Tree Use to Design Arguments in Expository Reports / Jens Mende, University of the
Witwatersrand, South Africa ........................................................................................................................... 419
Information Communication Technology Tools for Software Review and Verification / Yuk Kuen Wong,
Griffith University, Australia .......................................................................................................................... 429
Integrating Software Engineering and Costing Aspects within Project Management Tools /
Roy Gelbard, Bar-Ilan University, Israel; Jeffrey Kantor, Bar-Ilan University, Israel &
University of Windsor, Canada; and Liran Edelist, Bar-Ilan University, Israel ............................................ 443
Integrative Approach to User Interface Design, An / Vanja Kljajevic, NewHeights Software, Canada
& Carleton University, Canada ...................................................................................................................... 457
Intelligent Multi-Agent Systems / Uros Krcadinac, University of Belgrade, Serbia; Milan Stankovic,
University of Belgrade, Serbia; Vitomir Kovanovic, University of Belgrade, Serbia; and
Jelena Jovanovic, University of Belgrade, Serbia .......................................................................................... 464
Interactive Television Accessibility and Usability / Roberto Cuccu, University of Cagliari, Italy ................ 477
Modelling Wireless Local Area Networking in Higher Education Institutes / Ossi Vnnen,
Turku University of Applied Sciences, Finland............................................................................................... 563
NETRIC: A Proposed System for Synthesis of Multicast Transport Protocols / Mihly Orosz,
Budapest University of Technology and Economics, Hungary; Dvid Tegze, Budapest University of
Technology and Economics, Hungary; Gbor Hossz, Budapest University of Technology and
Economics, Hungary; and Ferenc Kovcs, Budapest University of Technology and Economics,
Hungary .......................................................................................................................................................... 584
Network Management Resource Costs / Colin Pattinson, Leeds Metropolitan University, UK .................... 592
New Algorithm for Minimizing Tree Pattern Queries, A / Yangjun Chen, University of Winnipeg,
Canada ............................................................................................................................................................ 598
New Algorithm for Subset Matching Problem Based on Set-String Transformation, A / Yangjun Chen,
University of Winnipeg, Canada ..................................................................................................................... 607
Novel Application of the P2P Technology for Intrusion Detection, A / Zoltn Czirkos, Budapest
University of Technology and Economics, Hungary; and Gbor Hossz, Budapest University of
Technology and Economics, Hungary ............................................................................................................ 616
Pattern-Based Identification in P2P Systems / Gbor Richly, Budapest University of Technology and
Economics, Hungary; Gbor Hossz, Budapest University of Technology and Economics, Hungary;
and Ferenc Kovcs, Budapest University of Technology and Economics, Hungary ...................................... 676
Understanding RFID (Radio Frequency Identification) / Susan A. Vowels, Washington College, USA ......... 782
Video Object Segmentation / Ee Ping Ong, Institute for Infocomm Research, Singapore; and
Weisi Lin, Nanyang Technological University, Singapore .............................................................................. 809
Process ICT
Alternative Learning Platform to Facilitate Usability and Synchronization of Learning Resources, An /
Eugenia M. W. Ng, The Hong Kong Institute of Education, Hong Kong ......................................................... 21
Data Flow Diagram Use to Plan Empirical Research Projects / Jens Mende, University of the
Witwatersrand, South Africa ........................................................................................................................... 150
Dynamic Reconstruction of Concept Maps / Marco Pedroni, CARID Universit degli Studi di
Ferrara, Italy .................................................................................................................................................. 173
Edutainment Framework Implementation Case Study, An / Zarina Che Embe, Multimedia University,
Malaysia; and Hanafizan Hussain, Multimedia University, Malaysia ........................................................... 202
E-Learning Function Integration with Corona 2 / Marco Pedroni, CARID Universit degli Studi di
Ferrara, Italy .................................................................................................................................................. 222
E-Learning Project for a Basic Mathematics Course at the University, An / Anna Torriero,
Catholic University of the Sacred Heart, Italy; and Immacolata Scancarello, Catholic University of the
Sacred Heart, Italy ......................................................................................................................................... 256
E-Learning to Games-Based E-Learning, From / Thomas M. Connolly, University of the West of Scotland,
UK; and Mark Stansfield, University of the West of Scotland, UK ................................................................. 268
ERP Integration into Existing Courses: A Three-Step Approach / Jaideep Motwani, Grand Valley State
University, USA; and Asli Y. Akbulut, Grand Valley State University, USA ................................................... 301
ICT and the Virtual Organisation / Carmen de Pablos Heredero, Rey Juan Carlos University, Spain .......... 365
ICT Processes for Virtual Academic Research Teams (VART) in Academia / Jason S. Lecoure,
Saint Marys University, Canada; and Wendy R. Carroll, Acadia University, Canada.................................. 390
Information Environments of Middle Managers in Higher Education / Juha Kettunen, Turku University
of Applied Sciences, Finland; Jouni Hautala, Turku University of Applied Sciences, Finland; and
Mauri Kantola, Turku University of Applied Sciences, Finland ..................................................................... 436
Intelligent User Preference Mining / Sheng-Uei Guan, Xian Jiatong-Liverpool University, China; and
Ping Cheng Tan, National University of Singapore, Singapore ..................................................................... 470
Linking E-Assessment to Students Use of Online Learning Content / Kar-Tin Lee, Queensland
University of Technology, Australia; Hitendra Pillay, Queensland University of Technology, Australia;
and Vinesh Chandra, Queensland University of Technology, Australia ......................................................... 532
Management Information System in Higher Education / Juha Kettunen, Turku University of Applied
Sciences, Finland ............................................................................................................................................ 542
Modeling Business Actions / Peter Rittgen, University College of Bors, Sweden ....................................... 554
Multimedia Integration in Active Online Learning Environments / Holim Song, Texas Southern University,
USA; and Terry T. Kidd, University of Texas School of Public Health, USA ................................................. 569
Online Learnings Future in the Workplace with Augmented Reality / Katherine Ira, University of
Maryland, Baltimore County, USA; and Zane Berge, University of Maryland, Baltimore County, USA....... 637
Participatory Design Project on Mobile ICT, A / Ursula Hyrkknen, Turku University of Applied Sciences,
Finland; Juha Kettunen, Turku University of Applied Sciences, Finland; and Ari Putkonen,
Turku University of Applied Sciences, Finland............................................................................................... 669
Quality Assurance View of a Management Information System / Juha Kettunen, Turku University of
Applied Sciences, Finland; and Ismo Kantola, Turku University of Applied Sciences, Finland .................... 691
Relationship Between Assessment and Evaluation in CSCL, The / Serena Alvino, Institute for
Educational Technology, National Research Council, Italy; and Donatella Persico, Institute for
Educational Technology, National Research Council, Italy ........................................................................... 698
Stream of Training Approach in Project Management Training / David G. Vequist IV, University of
the Incarnate Word, USA; and Mark S. Teachout, University of the Incarnate Word, USA ........................... 721
Towards a Framework for Evaluating ICT-Based Materials / Hitendra Pillay, Queensland University
of Technology, Australia; and John A. Clarke, Queensland University of Technology, Australia ................. 759
Virtual Reality and Virtual Environments in Education / Nicoletta Sala, Universit della Svizzera
italiana, Switzerland ....................................................................................................................................... 833
Web-Based Course Management Systems (WCMS) Acceptance with College Students in Estonia /
Princely Ifinedo, Cape Breton University, Canada......................................................................................... 839
Wireless Revolution and Schools, The / Terry T. Kidd, University of Texas School of Public Health,
USA ................................................................................................................................................................. 847
Context ICT
Academic Guidance Model to Orient Distance Students, An / Luca Vanin, University of Milan
Bicocca, Italy; Stefano Castelli, University of Milan Bicocca, Italy; Alessandro Pepe, University of
Milan Bicocca, Italy; and Loredana Addimando, University of Milan Bicocca, Italy ................................ 1
Adaptation of Cognitive Walkthrough in Response to the Mobile Challenge / Chua Fang Fang,
Multimedia University, Cyberjaya, Malaysia ................................................................................................... 10
Adult Education and Adult Learning Processes with ICT / Y. Inoue, University of Guam, Guam ................... 14
Ambient Intelligence / Fortunato Sorrentino, Universit degli Studi di Firenze, Italy .................................... 32
Applying Constructivist Self-Regulating Learning Approach for ICT Students / Yuk Kuen Wong,
Griffith University, Australia; and Don Kerr, University of the Sunshine Coast, Australia ............................. 40
B2B E-Commerce Development in Syria and Sudan / Dimitris K. Kardaras, Athens University of
Economics and Business, Greece...................................................................................................................... 55
Classics Teaching Through ICT Experience to ICT Manual for Classics Teachers / Annarella Perra,
CIRD SSIS Cagliari, Italy .............................................................................................................................. 84
Computer Communication and ICT Attitude and Anxiety Among Higher Education Students /
Nwachukwu Prince Ololube, NOVENA University Ogume, Nigeria.............................................................. 100
Distance Learning Techniques in University Courses / Paolo Frignani, University of Ferrara, Italy .......... 166
EduOntoWiki Project for Supporting Social, Educational, and Knowledge Construction Processes with
Semantic Web Paradigm, The / Corrado Petrucco, University of Padua, Italy ............................................. 195
E-Government Growth Barriers in Sub-Saharan Africa / Princely Ifinedo, Cape Breton University,
Canada ............................................................................................................................................................ 209
E-Knowledge / Fortunato Sorrentino, Universit degli Studi di Firenze, Italy ............................................. 215
E-Learning is What Kind of Learning? / Flavia Santoianni, University of Naples Federico II, Italy ........... 243
E-Learning Methodological Models and Typologies / Maria Ranieri, University of Florence, Italy ............ 249
Electronic Knowledge a Plural Thought?, Is / Franco Frabboni, University of Bologna, Italy..................... 284
Electronic Loyalty Programs Comparative Survey / Yasin Ozcelik, Fairfield University, USA ..................... 286
Basilicata, Italy; Debora Infante, University of Basilicata, Italy; and Angela Pascale, University of
Basilicata, Italy ............................................................................................................................................... 315
Factors Determining Teachers Beliefs and Perceptions of ICT in Education / Athanassios Jimoyiannis,
University of Peloponnese, Greece ................................................................................................................. 321
GIS Use in Landscape Archaeology / Cristina Corsi, Universit di Cassino, Italy ....................................... 341
Higher Educations New Frontier for the E-University and Virtual Campus / Antonio Cartelli,
University of Cassino, Italy............................................................................................................................. 350
ICT and Interculture Opportunities Offered by the Web / Laura Corazza, Universit di Bologna, Italy ...... 357
ICT Investment Evaluation Practices in Large Organizations / Chad Lin, Curtin University of Technology,
Australia; and Yu-An Huang, National Chi Nan University, Taiwan; and .................................................... 371
ICT Literacy in the Information Age / Ritchie Macefield, Staffordshire University & MEFU Ltd., UK ........ 378
ICT Policies in Africa / Esharenana E. Adomi, Delta State University, Nigeria; and Stella E. Igun,
Delta State University Library, Nigeria .......................................................................................................... 384
ICTs and Distance Education in Nigeria / Nwachukwu Prince Ololube, NOVENA University Ogume,
Nigeria; and Andrew Egba Ubogu, Ahmadu Bello University Zaria, Nigeria ............................................... 396
Introduction to Computer Forensics in the Age of Information Warfare / Terry T. Kidd, University of
Texas School of Public Health, USA ............................................................................................................... 490
IT-Enabled Reengineering: Productivity Impacts / Yasin Ozcelik, Fairfield University, USA ....................... 498
Learning Processes and ITC / Manuela Gallerani, University of Bologna, Italy ........................................... 518
Leveraging Supply Chain Management in the Digital Economy / Mahesh S. Raisinghani, TWU School
of Management, USA ...................................................................................................................................... 526
Mobile Learning and an Experience with Blended Mobile Learning / Michelle Pieri, University of Milano
Bicocca, Italy; and Davide Diamantini, University of Milano Bicocca, Italy .......................................... 548
Online Catalogue of Manuscripts Conserved in Libraries in the Veneto Region / Barbara Vanin,
Biblioteca del Museo Correr, Italy .................................................................................................................. 631
Online Trust in Mobile Commerce / Yuk Kuen Wong, Griffith University, Australia; and
C. J. Hsu, Griffith University, Australia.......................................................................................................... 647
Open Catalogue of Manuscripts in the Malatestiana Library, The / Antonio Cartelli, University
of Cassino, Italy; A. Daltri, Biblioteca Malatestiana, Italy; P. Errani, Biblioteca Malatestiana, Italy;
M. Palma, University of Cassino, Italy; and P. Zanfini, Biblioteca Malatestiana, Italy ................................ 656
Overview of Online Trust Derivatives for E-Commerce Adoption, An / Omer Mahmood, University of
Sydney, Australia............................................................................................................................................. 662
Product Evaluation Services for E-Commerce / Sheng-Uei Guan, Xian Jiatong-Liverpool University,
China ............................................................................................................................................................... 683
Social Networking and Personal Learning Environment / Antonio Fini, University of Florence, Italy ......... 713
Strengthening the Knowledge-Base of Cities Through ICT Strategies / Tan Yigitcanlar, Queensland
University of Technology, Australia; and Koray Velibeyoglu, Izmir Institute of Technology, Turkey ............ 728
Supporting Self-Regulated Learning with ICT / Giuliana Dettori, Institute for Educational
Technology, National Research Council, Italy; and Donatella Persico, Institute for Educational
Technology, National Research Council, Italy ................................................................................................ 735
Technology Enhanced Learning in Continuing Medical Education / Guglielmo Trentin, Institute for
Educational Technology, Italian National Research Council, Italy................................................................ 742
Theories and Principles for E-Learning Practices with Instructional Design / Maria Ranieri,
University of Florence, Italy ........................................................................................................................... 750
Towards a New Model for Knowledge Construction and Evolution / Antonio Cartelli,
University of Cassino, Italy............................................................................................................................. 767
Virtual Identity, Digital Identity, and Virtual Residence of the Digital Citizen, The /
Fortunato Sorrentino, Universit degli Studi di Firenze, Italy ....................................................................... 825
xxiii
Preface
The information and communication technology revolution can be easily recognized as the latest revolution in the
history of mankind, impacting every facet of business, society, and life worldwide with a speed beyond imagina-
tion. The last centuries have seen a continuous evolution process, which started with the industrial revolution at
the end of 18th century. This revolution has its roots in the invention of the first electronic computers in the 1940s,
continued with the development of information technology during the following decades and exploded in the
early 1990s. In the 1960s and 1970s, computer technology was mainly utilized in business data processing and
scientific applications of a mostly number crunching nature. As a result, the use of this technology was limited
to those who had a good command of these systems and computer programming languages. With the invention
of microprocessors a new idea of distributed information established itself and computers became available on a
personal basis. The contemporary development of networking both on a local and a wide area (LAN and WAN)
merged computer and information technology with telecommunication. In the 1980s the matching of the two
technologies led to the information communication technology, with a strong focus on the management and
dissemination of information by both providers and users.
The most noticeable explosion in the information and communication technology revolution was the creation of
the World Wide Web (WWW) and its potential in the early 1990s. During the past two decades, WWW technolo-
gies have become the driving force in allowing people worldwide to communicate and exchange information in
ways that have created a totally new dimension for mankind, at such a point that global villages are the words
today better describing our planet. In recent years, through the use of Web-enabled technologies, organizations
of all types and sizes around the world have managed to utilize these technologies to conduct both information
processing and dissemination with their prospective customers, suppliers, students, and governments. These
technologies, now allowing readily available information for everyone regardless of their geographic location,
bring the true meaning of the information age to its full realization and prepare a new era for mankind: the
knowledge society.
In recent years, the science of understanding the nature of information processing and management combined
with computer and telecommunication technologies to process, disseminate, and manage information has become
known as information and communication science and technology. It has many resources and components and
originated many new disciplines but, whats more, it intervened in changing mankinds habits and lifestyle.
As information and communication science and technology have profoundly impacted science, business,
society, and every other aspect of life on our planet, numerous researchers around the world have focused on
accumulating knowledge on this discipline and its effects and influences. The volume and intensity of research
in the field of information and communication science and technology and the study of its implications on hu-
man and social behavior has by far exceeded many other fields of science, and the sheer impact of research
xxiv
discoveries in this area has become the driving force of many emerging studies, technologies, and applications.
No longer is this discipline limited to a few technology-related areas, but as for many other modern fields of
knowledge, information, and communication science and technology are today a collection of a great variety of
specific disciplines. This collection process has been accomplished by producing research results to understand
the potentials, problems, and challenges of each individual discipline, analyzing the cross-fertilization on neigh-
boring fields of knowledge and trying to expand the body of literature related to the topics of that discipline.
As a result we can today use the words of D. de Kerchkove (1995) who stated that a technology enters human
culture when it disappears or, to be more precise, when it becomes transparent.
To access the latest research related to the many disciplines of the information and communication science and
technology field, we decided to launch an encyclopedia project where researchers from all over the world would
assist us in providing the necessary coverage of each respective discipline in information and communication
science and technology and in the fields affected from its influence and application. The primary objective of this
project was to assemble research coverage related to the disciplines selected for this encyclopedia by defining
the technologies, terms, and acronyms related to each discipline, and providing the most comprehensive list of
research references related to each discipline.
To provide the most comprehensive, in-depth, and recent coverage of the developments of information and
communication science and technology and its application and influence, three different areas of interest were
selected:
Product ICT, focusing on materials, instruments for ICT, that is, hardware and software for information
communication, including studies, hypotheses, case studies, and so forth.
Process ICT, focusing on processes including ICT use or presence, that is, the organization and management
of processes in different environments by means of ICT (where it is used), and the planning and carrying
out of experiences and projects for information and communication management and/or involving ICT
use.
Context ICT, focusing on the most pervasive presence of ICT, that is, experiences, studies and researches
on information and communication technologies in informal and/or not well structured contexts, otherwise
said the influence of ICT on human and social phenomena (when there is no planned and structured ICT
intervention but the changes inducted by ICT clearly emerge).
In order to provide the best-balanced coverage of concepts and issues related to the selected topics of this
encyclopedia, researchers from around the world were asked to submit proposals describing their experiences
and the contribution of their work to the encyclopedia. All proposals were carefully reviewed by the editors-in-
chief in light of their suitability, the authors records of similar work in the area of the proposed topics, and the
excellence of their proposals. The goal was to assemble the best minds in the information and communication
science and technology field and their use and application from all over the world to contribute entries to the
encyclopedia. Each text was forwarded to at least three expert external reviewers on a double blind, peer review
basis. Only submissions with strong and favorable reviews were chosen as entries for this encyclopedia.
As a result, this encyclopedia includes more than 100 entries highlighting current concepts, issues and
emerging technologies, studies, and applications. All entries are written by distinguished scholars from many
prominent research institutions all over the world. Thousands of technical and managerial terms enhance these
entries. Each of these terms has a description that allows the readers of this extensive research source to learn
the language and terminology of the field. In addition, this encyclopedia offers a thorough reference section
with sources of additional information for scholars, students, and researchers in the field of information science
and technology.
To assist readers in navigating and identifying needed information, this encyclopedia has been organized by
listing all entries in an introductive chapter to each section.
In addition, a comprehensive glossary of all terms directs readers to a short definition of the subject. A key-
word index is also available, listing the most important concepts.
xxv
To keep up with emerging technologies and research discoveries, regular entry additions will be made to the
online version of the encyclopedia. We are pleased to add that complimentary online access to this encyclopedia
for the life of the edition will be provided to any library with the purchase of the print copy. This complimentary
online availability will allow students, researchers, and corporate managers to access the latest contents of this
comprehensive and in-depth encyclopedia regardless of their location. This particular feature will prove to be
an extremely valuable resource for distance learning educational programs worldwide.
The diverse and comprehensive coverage of multiple disciplines in the field of information and communica-
tion of science and technology in this authoritative encyclopedia will contribute to a better understanding of
all topics, researches, and discoveries in this evolving, significant field of study. Furthermore, the contributions
included in this encyclopedia will be instrumental in the expansion of the body of knowledge in this vast field.
The coverage of this encyclopedia provides strength to this reference resource for both information and com-
munication science and technology researchers and also decision makers in obtaining a greater understanding
of the concepts, issues, problems, trends, challenges, and opportunities related to this field of study. It is our
sincere hope that this publication and its vast amount of information and research will assist our colleagues,
their students, and our organizational decision makers in enhancing their understanding of this discipline and its
application. Perhaps this publication will even inspire its readers to contribute to the current discoveries in this
immense field, which can assist the mankind in making the world a better place to live in.
Acknowledgment
The editors would like to acknowledge the help of all persons involved in the collation and review process of
the encyclopedia, without whose support the project could not have been completed. A further special note of
thanks goes also to all the staff at IGI Global, whose contributions throughout the enire process from the initial
idea to the final publication have been invaluable.
Most authors of the articles included in this encyclopedia also served as referees for articles written by other
authors. Thanks go to all those who provided constructive and comprehensive reviews. However, some of the
reviewers must be mentioned as their reviews set the benchmark. Reviewers who provided the most compre-
hensive, critical and constructive comments include: Marco Pedroni, Giorgio Poletti, Athanassios Jimoyannis,
Terry T. Kidd, and Lawrence Tomei. We thank them in a particular way for their outstanding contribution.
Special thanks also go to Jan Travers, who kept the project on schedule, and Kristin Roth, whose enthusiasm
motivated us to accept the initial invitation to take on this project and supported us in carrying it out.
Finally, we wish to thank all authors for their insights and excellent contributions to this encyclopedia. We
also want to thank all people who assisted us in the reviewing process. Last but not least, we wish to thank our
relatives and friends for their patience and support throughout the realization of this project.
Antonio Cartelli was born in Cassino (Italy) in 1954. He graduated in mathematics at La Sapienza Uni-
versity in Rome and obtained, in the same university, the after-degree Special School Diploma in physics. After
the degree he taught nonstop until 2001-2002 school year in national schools of different level.
Outside the school he had different professional experiences. He was teacher of computer science in the
educational center of the local medical structure and in in-service training courses for teachers, he was also tu-
tor for programming languages and networking in distance courses, system administrator and Webmaster in an
Internet service provider and network administrator, Webmaster and networking consultant for the Faculty of
Humanities in the University of Cassino.
As a winner of the national competition for a researcher he is now in the employ of the Faculty of Humani-
ties of the University of Cassino, Italy, where he teaches basic computer science and teaching and learning
technologies.
He actively participated in many national and international research activities and in 2006 coordinated the
research local unit of the University of Cassino in a national project directed from the University of Florence
and in an international projects coordinated from the University of Paisley, Scotland, UK.
He actually manages:
a. The Faculty Centre for ICT and on line teaching, which assists lecturers and professors in the integration
of e-learning in everyday teaching,
b. The Laboratory for Teaching and learning technologies in the Department of Human and social sciences
he belongs to.
He is member of several national and international societies and cooperates as a volunteer in the review
process of international scientific journals.
Among his most recent publications is the book Teaching in the Knowledge Society: New skills and instru-
ments for teachers (IGI Global).
Marco Palma is full time professor of Latin palaeography in the Faculty of Humanities of the University of
Cassino (Italy). His main research interests are the morphology and development of different scripts of books
and charters in the Western Middle Ages (i.e., from the 6th to the 15th century). He is also working on the material
aspects of manuscripts, as well as the transmission of classic and medieval texts before the invention of printing.
He is particularly interested in the theoretical and practical problems of the description of medieval manuscripts,
and the diffusion of scientific information and didactic contents through the Internet. The open catalogue of
manuscripts, his recent main project, conceived some years ago along with Antonio Cartelli, was so far realized
by two historic libraries in Italy (Malatestiana of Cesena and Lancisiana of Rome).
xxviii
Section: Context ICT
Stefano Castelli
University of Milan Bicocca, Italy
Alessandro Pepe
University of Milan Bicocca, Italy
Loredana Addimando
University of Milan Bicocca, Italy
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
An Academic Guidance Model to Orient Distance Students
the organIzatIonal PersPectIve: brough, 1999, p. 362). According to these authors, the
the student and the educatIve three main components of a knowledge system are:
InstItutIon
1. Infrastructure: It is the strong element of the
Everyday, researchers in the field of education wit- organization, composed by the hardware and
ness the increasing use of technology in learning, and software of the communication, the net of physical
the spread of computer mediated communication in and communicational contacts between members.
knowledge management (Jones & Laffey, 2002; Pan Pan and Scarbrough (1999, p. 366) define this
& Scarbrough, 1999). Very often a nave use of tech- structure the knowledge architecture, made up by
nology is not appropriate, since it does not integrate human resources, organizational entities, docu-
three important elements: the students profile, the ments, books, as well as the physical structure of
educational system, and the organization. offices and databases.
The first element is a very important one for our 2. Infostructure: This level includes all the formal
purposes. We need to know many important data about rules which govern the exchange of information
the student (or about the individual within the organi- between the actors of the organization and produce
zation); in a previous paper we called this concept the a specific code, used by the actors to understand,
extended training profile (Vanin, 2006). exchange ideas and give sense to cultural meta-
The extended training profile includes the follow- phors and common language. Pan and Scarbrough
ing information: (1999, p. 367) stress the point that these rules can
be both formal and informal and govern both the
General personal data (age, gender, place of birth, use and the access to information sharing (who
etc.) can use what information). An example of an
Educational and training profile (school, profes- infostructural element is the (material, symbolic
sional and academic degrees, master courses and or virtual) path that information has to travel
specializations, etc.) through in order to reach its destination.
Technical profile (ability of using technical instru- 3. Infoculture: This third level refers to the culturally
ments and informatics skills) based code that organizations have developed to fit
Interactive profile (habits in accessing technical in their specific social and cultural environment.
equipments, in using the Internet, e-mails, discus- These practices, rules, values and habits define
sion forum, chat, etc.). the information sharing process and represent the
meaning and the role played by information in
With the concept of extended training profile, we the educational and organizational structure.
suggested (Vanin, Castelli, Brambilla, in press) to
increase the amount of information collected about Jones and Laffey (2002) elaborate over this model
students. Usually, this kind of information is collected and apply the same framework to educational organiza-
only to answer bureaucratic and administrative re- tions with massive use of e-learning systems, evaluating
quests; we suggest using it for didactical and training the opportunity of using e-collaboration or e-learning
purposes too. systems in order to share knowledge. In their study, these
On the other side, the educational system depends authors give specific attention to each single part of the
from the educational institution and its organization model: for what regards infrastructure, they point out
(ODonoghue, Singh, & Dorward, 2001). Pan and the importance of clearly perceived values and benefits
Scarbrough (1999), using a sociotechnical approach, of e-collaboration, especially to substitute old tools, the
give specific theoretical and methodological attention to role of training, of expectations and attitudes, the need
the matching between social and technical subsystems. to experiment new tools and to create user-oriented and
The authors outline three layers of interaction between user-friendly systems (Jones & Laffey, 2002, p. 254).
individuals and organizations, taking into account the Regarding infostructure, attention must be directed
form of knowledge, the organizational context and to knowledge repositories and databases to simplify
structure, and the role of technology involved in the the information sharing process. For what concerns
educational or organizational process (Pan & Scar- infoculture, designers have to work on leadership, on
An Academic Guidance Model to Orient Distance Students
An Academic Guidance Model to Orient Distance Students
suPPortIng
INFORMATIVE
ONLINE
GUIDANCE PreParIng
orIentIng
InFrastructure
organIzatIon
InFostructure
INDIVIDUAL
(STUDENT) InFoculture
2004/2005 350 73 21
2005/2006 535 83 16
2006/2007 387 12 3
clear, pragmatic and, from an ergonomic perspective, e-learning, even though it could be a main cause of
fully accessible and usable (Chou, 2003). e-dropouts (ODonoghue et al., 2004). Moreover, the
Of course, clarity and usability of orienting tools orienting phase offers implicit indications (a sort of
emerge from a long process of refinement, and are not ethological imprinting) on self-management skills re-
the result of a single intervention. Arranged according quired to students, about the importance of interactions
the academic year, in Table 1 the number of ques- with peers and about basic skills concerning learning
tions arrived via e-mail at our front desk are shown, tools (Castelli et al., in press; Vanin, 2006); in the
together with the number of questions which needed second phase, this imprinting becomes explicit and the
other e-mails to be completely answered (often, more preparing phase turns out to be a formal stage, a sort
than one email was needed). The percentage of e-mails of buffer in which students gain operative knowledge
which call for other e-mails is an obvious indication of basic educational and technological tools (DeRouin
of low efficiency of the system, and Table 1 shows a et al., 2004; Gervedink Nijhuis & Collis, 2005; Luck,
continuous trend of improvement, rather than a single 2000; Moshinskie, 2002; Piskurich, 2003). The main
resolutive intervention. goal of this phase is to reduce resistance to technology
The second phase (preparing) addresses students (Frazee, 2002; Frieden, 1999) through the improvement
needs concerning informative, didactic, and technologi- of technological skills for learners, in order to facili-
cal skills. Students often need to be trained to bridge the tate the process of sharing experiences and building
gap between the educational organizations demands knowledge through the transformation of experiences
and their skills (Bozarth et al., 2004; Hoffman, 2002; in understanding.
Jones & Laffey, 2002; Piskurich, 2003). Castelli, Vanin, The last phase, supporting, includes activities
and Brambilla (in press) define this training as a meta- aimed to offer motivational, relational and technical
training, and stress how often this part is neglected in assistance to students during the whole academic year
An Academic Guidance Model to Orient Distance Students
educatIonal
and
orIentIng PreParIng suPPortIng organIzatIonal
systeM
(Bozarth et al., 2004; DeRouin et al., 2004; Edwards & S.D.=6.9) in students already enrolled. Educational and
Fintan, 2001; Gao, Baylor, & Shen, 2005; Lee, 2001; training profile showed that potential students (N=660)
Lynch, 2001). Web-based courses can exactly match have mainly technical secondary degrees (59.4%), or a
students needs in order to create conditions for an diploma in classical or scientific studies (29.6%). But
optimal learning experience. the interesting thing was that only about 10% of them
As shown in Figure 2, the development of this kind had some idea of what actually is distance education.
of informative guidance model can encourage the en- This entailed a deep revision of our guidance system,
trance in the educational system, leveling off all initial in order to correctly inform perspective students about
differences (i.e., technical gaps between educational the characteristics of this kind of learning technology.
system and individuals profile), thus creating a common The technical profile was not very different between
background to reduce the risk of e-dropouts (Booker would-be students and actual students (the only real
& Rebman, 2005; ODonoghue et al., 2004). differences were the percentages of people owning
A consequence of this perspective is that selection a broadband connection and using Webcams, higher
procedures (when and if provided) and criteria should among actual students than in the potential students
include all described aspects, in order to reduce pos- population: but this could be an obvious effect of be-
sible wrong expectations (Vanin et al., in press). In ing enrolled to a distance course). The last part, the
our case study, for instance, we applied the extended interactive profile, which refers to the informatics skills
training profile to explore needs and to detect prob- as well to the online interaction habits, proved to be
lematic areas (i.e., gaps between students profiles very interesting: our students and perspective students
and the requests of the educational organization) in rarely use the chat (57% never used, 36% sometimes).
order to schedule extra training for beginners and/or This means that we should avoid/reduce this kind of
to re-engineer our educational tools. A questionnaire communication and/or start a technical training on
is routinely administered to all would-be students who this subject.
ask for information about our course before taking the A second consequence is that the instructional devel-
admission test. Comparing this population of poten- oper should be aware of all the evidence thus collected,
tial students of year 2006-2007 with the population in order to enact strategies aimed to prevent and reduce
of students already enrolled, we discovered only very students drop out rates, which tend to be rather high
small differences for what regards general personal in distance learning, especially in the case of students
data: most of them were female (66.0%; N=507), as not linked to the educational network (Lynch 2001;
it happens in actual students population (56.7%; Moshinskie 2002; Kotsiantis, Pierrakeas, & Pintelas,
N=157). The age was between 18 and 65 years old 2003). As shown in literature (Booker & Rebman, 2005;
(N=560; Mean=32.4; S.D.=8.73) in potential students ODonoghue et al., 2004), the feeling of isolation
and between 18 and 53 years old (N=157; Mean=35.2; experienced by students and the sensation of no direct
An Academic Guidance Model to Orient Distance Students
contact with groups of experts and other students may of students identities, knowledge production systems
deeply affect learners motivation, especially at the (intended as psychological and social artifacts) and
beginning of the educational process, when learners active construction of meaning.
are not well inserted in the students community. The proposed system collects information from
Third, online informative guidance has a key posi- each student, but it needs an accurate analysis of the
tion in all phases: as shown in figure 3 the informative educational structure (as a result of the integration of
guidance system is conceptualized as a dynamic inter- infrastructure, infostructure, and infoculture) in order
action between information requested and information to activate a developmental process that may (and
offered, in an integrated net that encompasses all the should) try to reach all actors involved in the educa-
educational process. tional system.
This means that information is firstly offered by
the educational organization (orienting: organization
student [section 1-5]), then information is recon- conclusIon
structed as an answering system aimed at reducing
the gap between organizational demands and students This chapter examines a critical phase in distance
skills (preparing: organization student [section educational processes and, more in general, in all orga-
6-7]), lastly, information becomes a specific answer to nizational processes of knowledge building: newbies
students questions (supporting: student organiza- entry into the system. Students can encounter many
tion [section 8-10]). obstacles to integrate themselves within the distance
Each phase is deeply connected with all the others by training processes, so the whole system has to be cus-
a structure of feedback, in which the whole educational tomized to students different needs.
organization offers guidance using both explicit and A first set of problems is linked with the technical
implicit students requests (Vanin, 2006). gap: educational and knowledge tools may represent
The primary objective of this structure is to offer an obstacle for many users (Spitzer, 2002), and orga-
information, but a key aspect of the model is that the nizations should not forget how this mismatch affects
university (or, more in general, the educational orga- students careers. Every kind of e-learning intervention
nization) should at the same time collect information should take into account the main infrastructural, info-
to gain a better understanding of its audience, in terms structural and infocultural elements that could obstacle
An Academic Guidance Model to Orient Distance Students
learning and teaching processes. A successful learning People must be put in the condition to learn and tech-
process start with an analysis of these elements, in order nology has to be taken into account also as a source A
to dissolve technological, educational, structural and of significant gap (Gervedink Nijhuis & Collis, 2005;
organizational barriers. The process of training involves Gresh & Mrozowski, 2000; Hoffman, 2002; Jones &
in-depth analyses of needs, and course design should Laffey, 2002; Moshinskie, 2002; ODonoghue et al.,
include a socio-psycho-technical study to prevent 2001; Spitzer, 2002)
subsequent dropout (Bozarth et al., 2004; Lynch, 2001; However, in academic year 2006-2007, in our Dis-
Moshinskie, 2002; ODonoghue et al., 2004). tance Degree we had a dropout rate of about 24% from
A second issue concerns all informative and guid- the first to the second year; this figure is low if compared
ance tools conceived to welcome, to orient and to with the general datum of our University (about 26%)
integrate newbies (or, more generally, students) within but it turns out to be very good if compared with the
the educational and knowledge systems. We proposed a general figure of 33% recorded among students who
three-step guidance model, in which each phase is aimed enroll late (i.e., after 20 years of age; it has to be
to help individuals to manage a variety of educational, noted that the average age of our distance students is
technical and interactive difficulties. 35.2 years). The system seems to work.
In the orienting phase, the educational system The three-step model, here described, allows
should create a knowledge network (i.e., Web sites, students to obtain a gradual and fast insertion in the
online documents, guides, and online tours) to inform didactic system by putting particular attention on stu-
would-be students about the project, the educational dents expectations and motivations. Indeed, in order
architecture and the main skills required. This phase to correctly overcome the potential difficulties, the
represents both a first self-selection of students, and model of informative guidance considers two principal
the first step of a welcoming system. factors: a detailed knowledge of students identities
A preparing phase follows, in which students are (what we called extended training profile), especially
put in condition to overcome technical and educational for what concerns their technological tools and general
barriers, become acquainted with the learning tools and skills, and the guarantee that the informative guid-
explore the online resources. In this phase students ance system works as a primary imprinting for the
are helped to overcome the gap between their previ- development of a good e-learning path. In a retroactive
ous skills and the required extended training profile perspective, the informative guidance system could
(technical skills, internet habits, general knowledge). also represent a good proposal to follow students along
This preparing phase could be implemented both by their educational pipeline, adapting the system to
e-learning and traditional classroom training blended their profiles, as well as asking participants to adapt
with online e-tivities. themselves to the educational system (Vanin, 2006;
Supporting is the last phase, and continues all along Vanin et al., in press).
the educational (or knowledge management) process. It
is aimed to solve all kinds of technical, organizational
or educational hassles. It should not be limited to a notes
first level of helpdesk functions, but rather requires
developing guides built following a bottom-up strategy *
Luca Vanin: Conceived the main focus of the chap-
(i.e., frequently asked question), or online resources ter, introduction and conclusions; Stefano Castelli:
that guarantee continuous support. conceived the general plan of the chapter, and
Our model does not claim to be the main solution wrote the organizational background, introduc-
for e-dropouts. Indeed, instructional designers, techni- tion and conclusions; Loredana Addimando and
cal developers and the educational staff must take into Alessandro Pepe: did the bibliographic research
account many other factors (Booker & Rebman, 2005; and the in-depth organizational analysis.
Bozarth et al., 2004; Chin & Benne, 1985; Kotsiantis
et al., 2003; Lynch, 2001; Moshinskie, 2002; Spitzer,
2002) to ameliorate learning processes, online interac-
tion and integration along with the entire educational
and knowledge system (Na Ubon & Kimble, 2002).
An Academic Guidance Model to Orient Distance Students
An Academic Guidance Model to Orient Distance Students
0 Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Adaptation of Cognitive Walkthrough in Response to the Mobile Challenge
Adaptation of Cognitive Walkthrough in Response to the Mobile Challenge
artifacts in the case where the evaluators do not to generate the results correspond to mobile device
have a mental model of such a none existing usage; the method should be adapted to cope with the
device (Lindroth & Nilsson, 2001). mobile contextual challenges.
c. One of the most common method used in Nielsen
and Ramsays evaluation of WAP in 2000 (Ramsay,
2000) is to let the evaluators observe themselves reFerences
and write it down at a daily basis in a diary. This
is one type of the ethnographical methods where Almeida, L. (2002). User-friendly multimodal ser-
the evaluators and the use of a mobile device are vices-A MUST for UMTS. Going the multimodal
conducted in a real world situation. Diaries will route: Making and evaluating a multimodal tourist
be used to prompt the evaluators to reflect over guide service.
their use of the device and compare to this result
with the way they actually used it in role-plays. Dahlbom, B. & Ljungberg, F. (1998). Mobile infor-
d. According to Weilenmann, Alexandra, and Lars- matics. Scandinavian Journal of Information Systems,
son (2000), the method suggested is to listen 10(1&2), 227-234.
and watch the evaluators behavior, movement Johnson, P. (1998, May 21-23). Usability and mobility;
and reaction when they are using the mobile Interactions on the move. In Proceedings of the First
device without their prior knowledge. Although Workshop on Human Computer Interaction with Mobile
this direct-observation method is intrusive and Devices (GIST Tech. Rep. G98-1), Department of Com-
concerns about ethical aspect, this will be one puting Science, University of Glasgow, Scotland.
type of situation where the device is used in the
right context and right run while interacting with Kaasinen, E. (2002, July17-18).User needs for loca-
others. tion-aware services. In Proceedings of The Third Wire-
e. According to Tarasewich (2002), increased less World Conference: The Social Shaping of Mobile
demands on users attention in dynamic envi- Futures, University of Surrey, UK.
ronments can be addressed through interfaces Lindroth, T. & Nilsson, S. (2001). Contextual usability,
that require less attention. The CWT should be rigour meets releance when usability goes mobile.
conducted with the concept of trying to minimum Laboratorium for Interaction Technology.
the user interfaces attention (Pascoe, Ryan, &
Morse, 1999) to generate the best results. Pascoe, J., Ryan, N., & Morse, D. (1999). Issues in devel-
oping context-aware computing. In H.-W. Gellwesen,
(Ed.), In Proceedings of the Handheld and Ubiquitous
conclusIon Computing, First International Symposium)HUC 99)
(pp. 20-221). Berlin, Germany: Springer Verlag.
According to Rodden, Chervest, and Davies (1998), Pascoe, J., Ryan, N. S. & Morse, D. R. (2000). Using
making use of the context of a device is important be- while moving: HCI issues in fieldwork environments.
cause it allows us to produce new applications based ACM Transactions on Computer Human Interaction,
on the special nature of the context and helps to tailor 7(3), 417-437.
standard applications for mobile devices. Interaction
is no longer solely a property of the device but rather Ramsay, M. & Nielsen, J. (2000). WAP usability Dj
is strongly dependent on the context in which the vu: 1994 all over again. Nielsen Norman Group. Cali-
device is been used. The CWT, as one of the usability fornia, USA.
inspection method starts early in the design process Rodden, T., Chervest, K., Davies, N., & Dix, A. (1998).
and giving the advantage as the earlier the critical Exploiting context in HCI design for mobile systems. In
design flaws are detected, the greater the chance that Proceedings of the First Workshop on Human Computer
the prototype can be corrected. It helps evaluators to Interaction with Mobile Devices.
take on a potential users perspective and therefore
to identify some of the problems that might arise in Sade, S. Dr. (2002, Jan). Mobile ease-of-use and
interactions with the system. However, in using CWT desirability through user-centered design. NETikos
Finland Oy.
Adaptation of Cognitive Walkthrough in Response to the Mobile Challenge
Tarasewich, P. (2002). The design of mobile commerce Field Testing: It is a type of testing that test a
applications: Whats context got to do with it? Com- product in the actual context in which it will be used, A
munications of the ACM. as opposed to laboratory testing, or testing the product
in its development environment. It is useful to identify
Vaananen-Vainio-Mattila, K. &Ruuska, S. (2000).
the interaction problems.
Designing mobile phones and communicators for
consumers needs at Nokia. In E. Berman (Ed.), Infor- Mobile Context Challenge: The impact of use
mation appliances and beyond Interaction design for context to the usability of a product is strong and it is
computer products. San Diego, CA: Academic Press. an especially important question in design of portable
or mobile products, which will be used in several
Weilenmann, A. & Larsson, C. (2000). On doing being
environments.
teenager. In Proceedings of IRIS 23, Laboratorium
for Interaction Technology. Role-Play: It is a method used when designing new
artifacts in the case where the evaluators do not have a
mental model of such a none existing device.
KeyWords
Usability Inspection: It is a generic name for a set
Cognitive Walkthrough (CWT): It is a usability of cost-effective ways of evaluating user interfaces to
inspection method which allows users to learn a sys- find usability problems.
tem by using it to achieve tasks rather than studying a
User Centered Design (UCD): It helps developers
manual or documentation. It starts with a task analysis
to find out the way users think, value and desire, thus
that specifies the sequence of steps required by the
allowing the designers to focus their development efforts
users to complete a task, and the system responses to
correctly and to identify new potential product ideas. It
those actions. The users then walkthrough the steps
aims at high-quality design and utilizes several methods
as a group and questioning themselves at each step.
to take users actual needs and desires in account.
Data and information are gathered during the CWT
and potential problems are identified.
Context Awareness: It is originated as a term from
computer science which sought to deal with linking
changes in the environment with computer systems.
It is used to design innovative user interfaces.
Section: Context ICT
IntroductIon bacKground
Adult educationinvolving planned and intentional The new economy implies a society in which infor-
learning opportunities that enable adults to acquire mation communication technology (ICT) is changing
skills and knowledge they need to participate fully in the nature of the workplace and contributing to more
the economic and social life of their communitytakes efficient and productive practices geared toward enhanc-
place in both formal and informal settings, and provides ing the equality of both products and services (Brown,
clear pathways for learners to achieve their goals and 2003). As the new economy increasingly requires
objectives (Recommendation for action, 2004). Adults people to learn new knowledge and skills in a timely
would like to learn in order to improve their qualifica- and effective manner, the advancement of computer
tions and to bring their skills up to date for a new line and networking technologies are providing a diverse
of work. Adults would also like to learn because of means to support human learning and cognition in a
the rapidity and constancy of change in society and more personalized, flexible, portable, and on-demand
because of life-long learning dealing with changes in manner (Zhang, Zhao, Zhou, & Nunamaker, 2004).
lifestyles or value systems. The new economywhich is an increasingly global
Brookfield (1995) has identified four areas as repre- economyis a term that was coined in late 1990s to
senting unique and exclusive adult learning processes: describe the evolution of the United States from an
(1) self-directed learning (which focuses on the process industrial/manufacturing-based economy into a high
by which adults take control of their own learningin technology-based economy, arising largely from new
particular, how they set their own learning goals); (2) developments in the Internet, telecommunications, and
critical reflection (which is the idea of the decade for computer sectors (Wikipedia, 2006, 1).
many adult educators who have long been searching for Adult education has emerged as an increasingly
a form and process of learning that could be claimed important component in education policy and plan-
to be distinctively adult); (3) experiential learning ning; the 1980s and the 1990s were a period of rapid
(which is based on the notion that experience is the development in adult vocational education and as a
adults continuing process of evaluating experiences); result of the structural change in industry and the labor
and (4) learning to learn (which is the ability of adults market, life-long learning has become an important
to learn how to learn to become skilled at learning in principle underpinning education policy (Ministry of
a range of different situations). Brookfield has further Education Finland, 1999). Open and online education is
noted that one of the trends in the study of adult learn- a growing force in life-long learning. Due to the rapid
ing that emerged during the 1990s, and that promises development of Web-based technologies, increasing
to exercise influences into the 21st century, might be bandwidth, decreasing costs, and widening access,
the ways in which adults learn within the systems online programs of distance education are becoming
of education (distance education, computer assisted increasingly popular teaching strategies for higher
instruction, and open learning systems, for instance) education to adopt (Townsend & Wheeler, 2004).
that are linked to technological advances. Adults learn in many waysboth in academia
and in the workplacethrough repetition and reward
(behaviorism), through the help of mentors (social
learning theory), through building upon previous ex-
periences (cognitive theory), and through meaningful
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Adult Education and Adult Learning Processes with ICT
and relevant experiences (andragogy and humanistic problems including breakdown in multimedia software
theory): Adults, for whom life-long learning is a fact and insufficient processor speed) but has advantages A
of life, are commonplace in college classroomsoften (e.g., flexibility in length and time of study, automated
bring a wealth of real-life experiences with them to assessment and feedback, and discussion between
the classroom, experiences that need to be recognized remote users, which facilitate self-directed learning)
and integrated in the learning process (Brown, 2001, (Medford, 2004).
p. 3). ICT, especially the Internet, is an indispensable Based on the notion that e-learning can empower
tool or environment to enable adult education to face adult students ownership and self-directed learning,
its new practices and challenges. The interrelationship Lim (2004) defines five stages of the inquiry-based
between knowledge and skills and its impact on what learning process: (1) Ask (learners articulate their
adult learners bring to the classroom and then what is own problems or questions); (2) Plan (learners design
added to that and taken away is what lies at the root their problem-solving strategies within a certain time
of higher education (Motteram, 2005). frame); (3) Explore (learners explore resources for solv-
ing problems using their background knowledge); (4)
Construct (learners synthesize resources and provide
neW PractIces oF adult solutions); and (5) Reflect (learners discuss the implica-
educatIon and adult learnIng tions for further refinement). An important principle of
Processes WIth Ict life-long learning is the ability for self-direction (Flores
& Flores, 2003).
A paradigm shift is taking hold in American higher
education, which includes the shift from institutions Reflective learning. One critical element in the trans-
of instruction to institutions of learning, creating formation of experience into learning is the process of
powerful learning environments, improving the quality reflection; the development of a portfolio, due to its
of the exiting students, and viewing faculty as primarily very nature, requires adult students to reflect critically
designers of learning methods and environments (Goetz, on the whats, hows, and whys of their professional
2004). The current shift towards computer-mediated and personal learning so that they may describe and
teaching and learning does place college and university explain it to faculty evaluators (Brown, 2001). As Brown
professors under enormous pressure to gain expertise further describes, the portfolio can promote holistic
not only in emerging new media, but also in the inno- learning by serving as a reflective bridge between the
vative pedagogical approaches (Creanor, 2002): The learner, the workplace, and the academy (see Figure
acquisition of empathic and pedagogically appropriate 1). Learning and knowledge acquisition occur neither
skills for the online environment must now come high solely in the classroom nor exclusively in the world of
on the list of teaching competencies (p. 57). life experiences or the workplace : Holistic learning
requires the integration of knowledge from multiple
adult learning Processes and Ict settings, and belief that knowledge is forever chang-
ing and ongoing throughout ones life. Learning from
As previously stated, self-directed learning, reflective experience requires both reflection and reflexivity
learning, experiential learning, and learning to learn are (Brown, 2001, p. 10).
major areas representing the post-war preoccupations Electronic portfolios (e-portfolios) are increasingly
of adult learning researchers; each area has its own popular now; and, an important direction for e-portfolios
internal debates, yet the concern and interest of those is that created with software tools found on computers
working within each of them overlap significantly with or Web-based storage systems generally accompanied
those of the other three (Brookfield, 1995). by data management systems that allow assessment of
portfolio data (Gibson & Barrett, 2003). Web-based
Self-directed learning. There are many synonyms assessment systems support consistent, secure storage
used for computer-mediated learning (such as distrib- and aggregate reporting of assessment information.
uted learning, e-learning, distance education, and online E-portfolios enable a powerful means for using it as a
learning). Online learning has obvious disadvantages platform for linking with future learning; and additional
(e.g., the impersonal nature of learning, and technical pages can be added (e.g., additional artifacts can be
Adult Education and Adult Learning Processes with ICT
Figure 1. Model of the portfolio as a reflective bridge Technology, as Boerner (1999) states, can benefit
connecting the learner, higher education, and the the service-learning (complements academic work but
workplace. Source: Brown, J. O. (2001) is not directly connected to a course) process in three
ways: (1) recording the experience for later reference;
Learner (2) creating a virtual community of participants
such as students; and (3) enabling new avenues for
the community to reach its goals. Communication,
especially via the Web, can be thus implemented at a
PORTFOLIO variety of levels, and a number of case studies of the
Workplace Higher Education use of technology as both a process and a product will
be disseminated and shared.
Adults enrolled in colleges are particularly interested adult literacy education and Ict
in knowing how new knowledge relates to what they
already know (Whiteman, 2002): Effective approaches Although most dictionaries define literacy as the
to helping adults learn include contributions from the ability to read and to write, the definition has been ex-
students and their involvement in what is being taught panded and currently many consider literacy to be the
and how it is being taught (p. 7). As an example of ability to locate, evaluate, use, and communicate with
effective approachesin striving to be a facilitator a wide range of resources including text, visual, audio,
rather than a teachera professor should ask basic and video sources. ICT training is often seen as a major
questions to stimulate a discussion on essential concepts motivator for adults to develop literacy, numeracy, and
that allow adult learners to achieve competency in the language skills and is an increasingly popular way to
content area (Inoue, 2002-03). acquire these and other skills. Teachers do when they
Adult Education and Adult Learning Processes with ICT
are using ICT for adult literacy and numeracy in the Future trends
following ways (NRDC, 2003): A
One challenge in adult education is that of adapting
Using ICT: The predominant pattern of activity student-centered approaches to VLEs, and the fol-
is for learners to use a desktop computer on their lowing future trends can be highlighted:
own with the teacher either talking to the whole
class, or involved in a group discussion. Life-long learning: Open and life-long learning is
Teaching ICT skills: Talking about a procedure, a frontier created by online learning communities;
demonstrating it and then asking the students to and, universities can help adults to become life-
try it on their own is the most frequent mode of long learners, recognizing that educational/learn-
teaching ICT skills, and encouraging learners to ing opportunities are available throughout their
experiment and discover for themselves how the lives. Online distance learning provides answers
software works. to the problems of availability (accessibility and
Learning styles: The visual elements of ICT cost) and the demand for flexibility (time, place,
presentation are useful to many learners; indi- and pace) of higher learning; technology-medi-
vidual work and group work are the dominant ated learning and distance learning will become
styles but small group work is encouraged in major vehicles for fulfilling the needs of life-long
some literacy and English for speakers of other learning (Beller, 1998).
languages (ESOL) classes. Constructive learning: Constructivism views
the central problem in explaining cognitive de-
A study by Snyder, Jones, and Bianco (2005) on adult velopment as one of understanding how the mind
learners digital communication practices and implica- succeeds in constructing relationships among
tions for adult literacy programs found the following: objects and events (Lefranois, 1999, p. 48).
E-mail, electronic chatting, and text messaging on Constructivism also views that human beings are
mobile phones used extensively within adult education active learners who construct their knowledge on
programs; and these modes of communication, each of experience and on their efforts to give meaning
which involves discrete literacy practices, were intrinsi- to that experience (Frank, Lavy, & Elata, 2003).
cally interesting to learners. Working collaboratively Therefore, constructive learning (thus the teach-
with communities to design programs that respond to ers role is seen as aiding students construction of
learner characteristics and labor market demands, and knowledge) might be an appropriate and relevant
that integrate the literacies needed to handle contem- theory for practice in the electronic information
porary multi-modal formats, is the ingredient for the age particularly.
success of adult literacy education. As noted by Snyder Paperless learning: Future higher education
et al. (2005), institutional ICT policies are most effec- courses, as Koepke (200) maintains, will be
tive when they are sensitive to the special needs and increasingly paperless and all course materials
difficulties of disadvantaged groups. The federal vision (syllabus and assignments) will be included on
for adult basic education learners is to ensure access to a course Web page, so that students can visit the
high-quality instructional materials and ICT resources Website that will become an open door to the
through technology applications. The National Literacy classroom. Right now, professors try to create
Act of 1991 sets forth a vision for a literate society a sense of community in the classroom; in the
to enhance the literacy and basic skills of adults, and future, the Website will create a sense of com-
to ensure that all adults in the United States acquire munity among class members, and it will become
the basic skills necessary to function effectively and a great way to inform and engage students across
achieve the greatest possible opportunity in their work the curriculum in what this class is doing.
and lives (Lovell, 1998).
Adult Education and Adult Learning Processes with ICT
Adult Education and Adult Learning Processes with ICT
Lefranois, G. R. (1999). The lifespan. Belmont, CA: Townsend, M. & Wheeler, S. (2004). Is there anybody
Wadsworth. out there? Teaching assistants experiences of online A
learning. The Quarterly Review of Distance Education,
Lim, B-R. (2004). Challenges and issues in designing
5(2), 127-138.
inquiry on the Web. British Educational Communica-
tions and Technology, 35(5), 627-643. Whiteman, J-A M. (2002). The adult learner in the
computer mediated environment. (ERIC Database
Lovell, M. (1998). Adult learning, technology, policy
#ED467889)
planning. Retrieved March 13, 2008, from www.nifl.
gov/nifl-technology/1998/subject.html Wikipedia (2006). New economy. Retrieved March
13, 2008, fromhttp://en.wikipedia.org/wiki/New_
Medford, A. (2004). Online learning. Quality in Pri-
Economy
mary Care, 12, 87-9.
Zhang, D., Zhao, J. L., Zhou, L., & Nunamaker, F.
Millwood, R. & Terrell, I. (2005). Overview: New tech-
(2004). Communications of the ACM, 47(5), 75-7.
nology, learning and assessment in higher education.
Innovations in Education and Teaching International,
42(3), 195-204. Key terMs
Ministry of Education Finland (1999). Adult education.
Adult Basic Education: A process by which
Retrieved March 13, 2008, from http://www.minedu.
adults obtain their life skills training, citizenship and
fi/minedu/education/adult_edu.html
employability skills, such as training in job readiness,
Motteram, G. (2005). Blended education and the job skills, job seeking skills, basic computer skills,
transformation of teachers: A long-term case study in and job retention activities, so that they can participate
postgraduate UK higher education. British Journal of fully in society.
Educational Technology, 37(1), 17-30.
Computer-Mediated Learning: In the context
National Institute of Adult Continuing Education of teaching and learning, the use of electronic mail,
(NIACE) (2003). ICT skill for life. Retrieved March computer conferencing, and the Internet to deliver
13, 2008, from http://www.niace.org.uk/Research/ICT/ learning material and provide learners and instructors
ICT-skillforlife.htm with opportunities for interaction. It is also called
Networked Learning.
National Research and Development Center
(NRDC) (2003). ICT and adult literacy and nu- Distance Learning/Education: It occurs when the
meracy. Retrieved March 13, 2008, from http:// instructor and the students are in physically separate
www.nrdc.org.uk locations. It can be either synchronous or asynchronous
and can include correspondence, video or satellite
Recommendation for action (2004). Ministry of broadcasts, or computer based online education.
education, building the Ontario education advantage.
Retrieved March 13, 2008, from http: www.edu.gov. Distributed Learning: It emphasizes learning
on.ca/adultedreview/appee.pdf rather than the technology used or the separation be-
tween teacher and learner; distributed learning makes
Ruiz, J. (2005). Management, administration and or- learning possible beyond the classroom and, when
ganization of e-learning projects. Retrieved March 13, combined with classroom environments, becomes
2008, from http://www.uoc.edu/rusc/dt/eng/ruiz0405. flexible learning.
html
Life-Long Learning: A conceptual framework
Snyder, I., Jones, A., & Bianco, J. L. (2004). Using within which the learning needs of people of all ages
information and communication technologies in adult and educational and occupational levels may be met,
literacy education. Retrieved March 13, 2008, from regardless of their circumstances.
http://www.ncver.edu.au/publications/1485.html
Adult Education and Adult Learning Processes with ICT
0
Section: Process ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
An Alternative Learning Platform to Facilitate Usability and Synchronization of Learning Resources
skills (Tan, Turgeon, & Jonassen, 2001); and to foster because the postings are there for everyone to read
active and independent learning (Rosenberg, 2001). so that they have to be mindful of their own opinion.
However, Alavi and Lediner (2001) did not find any Research has also found that learners consistently
conclusive evidence after reviewing pertinent literature rate communication and support from educators and
and suggested that better understanding of the role of learners as being a major influence on their learning
technology is needed. (Fredericksen, Pickett, & Shea, 2000; Sims, 2003). In
fact, a discussion forum is more than just a place for
Functionalities of learning Platforms communication; it also serves as a record of participa-
tion. However, incentives are needed to motivate full
The components of learning platforms usually include participation. The main welcoming incentive appears to
templates for content pages, discussion forums, chat, be giving marks for online discussion. Other incentives
quizzes, closed-end exercises, and control panels. include giving encouraging feedback and some forms
Most course instructors put teaching materials on the of tangible reward such as giving chocolates for good
content pages as it provides a central area for storing quality discussion and/or frequent discussants. Ideas
teaching materials systematically. The materials can and examples of what to put in a learning platform are
be Microsoft PowerPoint or other acceptable formats. shown in Table 1.
However, the discussion forum can be considered the
most important function of a learning platform as it limitations of learning Platforms
facilitates discussion. All learners have full control of
the duration and time to discuss whatever and when- Although a learning platform can assist educators in
ever they feel like it. The opportunity to participate is systematically creating and managing their teaching
invaluable to learners as it is usually impossible for material, many popular Web-based learning platforms
everyone to participate in discussion during class time, have limitations such as the lack of facilities for the
especially with larger classes. reuse of teaching material. Indeed, the educator has to
Learners are prompted to think deeply and are more upload the same file twice if she uses the same teaching
reflective when posting their messages online. This is material for two different modules, even for the same
Function Example
General announcements such as change of teaching venue and cancellation of classes
Announcements
Module syllabus
Course information
PowerPoint files
Course material Word files
Short video clips
Assignment requirements and submission deadline
Assignments Marking scheme
Assessment rubrics
Open discussion according to the topics related to the module content.
Intergroup discussion on the topics chosen, facilitated by different groups.
Discussion forum
For submitting assignments as a form of formative assessment so that comments from
peers and educators can be collected and recorded.
To share private exchange of files, information, and communication within the group
members (particularly appropriate for group projects).
Groups Formative assessment among group members such as draft of the groups work and
reflection on what they have learned from the module.
Informal information exchange among group members.
An Alternative Learning Platform to Facilitate Usability and Synchronization of Learning Resources
semester. Therefore, the educator may need to keep MaIn Focus oF the artIcle
and manage that file in his local computer in a differ- A
ent folder so that he could easily find the file for future In view of the inefficiency and inadequacy of learning
reference. This one-to-one approach also increases the platforms, this chapter will discuss a self-made learn-
necessary storage space and degrades the performance ing platform, named PILOT (Promoting Interactive
of the server. Learning in an Online environmenT). PILOT enables
At present, the popular learning platforms do not users to use and reuse the uploaded material on de-
provide multitasking functions. Students can only mand and to allow users to select certain segments of
browse the material one piece at a time. Teaching mate- the material and to synchronize different formats of
rial such as videos and slides are played independently, teaching material (Ng & Lee, 2006). It was designed to
and students might become lost when trying to map provide a resource repertoire for learners to click and
the slide pages with the video contents. Yang and Liu pick when creating learning material. The constraints
(2005) summarised the limitations of learning plat- of one-to-one relationship of different resources have
forms: (1) there is no synchronization and matching been expanded to include a many-to-many relation-
between course materials and their explanations. There ship. Resources of different formats can be mixed and
is possibility of mismatch between the explanations pro- matched to provide an alternative learning environment.
vided in the Web-based learning system and any other The platform consists of five areas, namely, material,
learning materials that learners might use; (2) there is a presentation, quiz, forum, and personal information as
lack of standards descriptions and reusability as some shown in Figure 1.
Web-based learning systems are built according to the The material section is for users to upload and
owners personal requirements; and (3) there could be manage material which can be of multimedia or Pow-
a lack of contextual understanding, instant feedback, erPoint format. Research into multimedia and related
and interactions among participants. instructional technologies over the years has indicated
positive effects on learning (Hede, 2002). Depending on
An Alternative Learning Platform to Facilitate Usability and Synchronization of Learning Resources
T e a chers / S tudents
A ct a s A ct a s
M anage the
C reators u se r a cco u n ts o f Learners
M anage A dm inistrator
(u p lo a d , cre a te , sh a re ...)
M anage
T e a ching M aterials
(V id e o s, P o w e rP o in ts, e tc) M anage
V ie w / in te ra ct w ith
S u b scrib e o w n / sh a re d
m a te ria ls t o fo rm
P resentations
the needs, users can be teachers or students as shown in due to the different emphasis and different learners
Figure 2. Any user can decide whether to share or not needs. If a user is using PILOT, she only needs to
to share the teaching material uploaded in the platform subscribe to the required video and PowerPoint and
(Figure 3). The user may subscribe her own material then specify the time intervals and the required slide
or the material that had been uploaded by other users numbers without the added effort of having to learn how
to form a new teaching material called Presentation to edit video using complicated or expensive software.
in the presentation section. For example, John wants to create a topic about small
Similarly, a user can create his own quiz or subscribe dogs. He finds that there is a video that is uploaded by
to others quizzes in the quiz section. The quiz aims to Jill about different Cats and Dogs and a PowerPoint
promote active learning and enable interactivity with that is uploaded by Jane named Pets. Since parts of
the material. Users can share their comments and raise these two files are relevant to Johns topic, he can use
questions about that Presentation at the discussion both of them to form a Presentation without having
forum section. Finally, the personal information section to edit or delete any unwanted portions. The whole
is for users to change passwords. The following sec- creation process is very simple: just search and pick
tions will illustrate how to make a presentation so that teaching material from a pool and create tailor-made
it would be easier to understand its functionalities. Presentations. The actual steps will be explained in
the next section.
Mix and Match resources
synchronization of resources
Creating multimedia learning resources takes consid-
erable time, effort, and financial commitment. It will The simple user interface of PILOT was created to
save a lot of resources if the material can be reused. facilitate synchronization of videos and slides. Al-
Sometimes, it is impossible to use the entire resource though there is a plug-in which allows users to create
An Alternative Learning Platform to Facilitate Usability and Synchronization of Learning Resources
PowerPoint with synchronized video, it is inappro- select 6 matching video sections of varied duration from
priate for educational use because the slide contents a video file to form a Presentation. The irrelevant 14
and the video are embedded together so that other slides and video sections are skipped. If John cannot
users cannot extract any section out. When creating a find a related PowerPoint, he can create a section slide
Presentation, the users are only required to input or with the Slide Editor online. He can also insert any
get the start time/end time from the video and select images or to copy and paste HTML materials into the
the appropriate PowerPoint slide for that time interval slide editor as shown in Figure 5.
(Figure 4), and a section will be created (a slide with Similarly, John can create his own quiz or subscribe
the related video interval). For example, John can select to anothers quiz in the quiz section. He can specify when
6 relevant slides from a 20-slide PowerPoint file and the quiz will be displayed anytime during the execution
An Alternative Learning Platform to Facilitate Usability and Synchronization of Learning Resources
of the Presentation (Figure 6). The related discussion logged into PILOT. Networking opens up possibilities
forum is also shown upon viewing the Presentation. for enhancing formative feedback to students through
The discussion forum is an arena for exchanging and peer review, when scripts are posted electronically for
discussing pertinent problems and to form a learning comment and review (Macdonald, Weller, & Mason,
community (Scardamalia & Bereiter, 1996; Tu & Corry, 2002, p. 10).
2002). When a new Presentation is created, a new
thread can also be opened in the forum. Learners can viewing of a Presentation
share their comments and raise questions about that
Presentation when browsing or whenever they are After a Presentation is created, learners can browse
synchronized videos and slides. They can view the
An Alternative Learning Platform to Facilitate Usability and Synchronization of Learning Resources
Presentation sequentially or randomly. When a installed so that PERL scripts can be executed (PERL is
section is selected, the corresponding video time and the main back-end programming language of PILOT).
slide contents will be shown (Figure 7). Learners can MS Structured Query Language (SQL) Server 2000 is
go backward or forward or pause at any time by click equipped to provide database manipulations to store
and pick as well. The advantages of displaying two files all teaching material, user information, and their sub-
concurrently include the complementary synergy of scriptions of different learning materials. A streaming
information and to further prompt and stimulate learners service is also required to provide streaming video and
to think while watching video content. Furthermore, audio hosting services. Furthermore, Windows Media
they are provided with additional flexibility such as in Server is also installed so that PILOT users can browse
selecting or revisiting any section of the video at any streaming media using a standard Windows Media
time. This flexible approach aims to promote active Player. On the client side, users are required to add
learning and enable interactivity with the material, as the domain of PILOT as a trusted site in Internet
an essential combination in determining the extent of Explorer so that PILOT can utilize ActiveX technolo-
learning is the actions and interaction of the learners gies through Javascripts, and PowerPoint slides can be
(Laurillard, 2002; Oliver, Omari, & Herrington, 1998). synchronized with video contents.
Thus, the learners have total control of the time, place, When there is a request from a client computer such
and pace of viewing a Presentation. as log in, view presentations, and upload videos, PERL
scripts are invoked. These connect to the database via
architecture of PIlot open database connectivity and use SQL commands
to fetch or update data in the database. When a file is
PILOT operates under a Windows 2000 environment. uploaded or downloaded, it will call the database to
Since it is still in initial usage, only one hardware store or get the file, except in the case of streaming
server is used to perform Web, streaming, and database media which are stored in the streaming area. Then
services. At the host side, three different components PERL scripts will generate a HTML output embedded
are used to handle different tasks. Internet information with Java scripts to the client. When streaming media
services (IIS) is used in order to provide Web services is required, the client computer will be connected
so that users can access it easily. ActivePERL is also to the streaming server via Microsoft Media Server
protocol.
An Alternative Learning Platform to Facilitate Usability and Synchronization of Learning Resources
Strongly
User Interface Strongly Agree Agree Disagree
Disagree
The user interface is consistent 29.17% 65.28% 5.56% 0.00%
This platform is easy to use 29.17% 62.50% 8.33% 0.00%
This platform enables users to edit and use
25.00% 68.06% 6.94% 0.00%
teaching material flexibly
An Alternative Learning Platform to Facilitate Usability and Synchronization of Learning Resources
MS WORD and
PILOT does not include Discussion forum Question bank
PowerPoint with video (72.22%,
which of the following (26.39%) (0%)
Video (1.39%) correct answer)
functions?
mov
PILOT does not support
(62.59%, correct gif wmv ppt
which of the following
answer) (18.06%) (16.67%) (2.78%)
formats?
Future trends area so that they can view and jot their own notes when
browsing the learning materials.
More and more educational institutes use learning Administration: To enhance personal administra-
platforms to complement face-to-face learning rather tion of learning, searching and indexing functions can
than replace it. Apart from providing synchronization be added to learning platforms which enable learners
and reusing learning materials like PILOT, the future to find related learning resources and information
trends would be to enhance the functionalities of learn- easier and faster. At present, the platform administra-
ing resources, interactivities, and administration. tive functions can track the time and the duration of
Learning resources: there is a need to standard- learners activities using delivery. However, it would
ize learning resources so that they could be portable be hard to know if they are active or idle when they
and reused. The IEEE working group (http://ieeeltsc. are online. Some pop up questions or messages/tips
org/wg12LOM/lomDescription) is probably one of could be added to enhance interactivities and enable
the most promising groups in developing a standard, the system to know if learners are actually using the
namely, learning object metadata (LOM) schema. The learning platform to learn.
LOM standard specifies a conceptual data schema that
defines the structure of a metadata instance, which can
adequately describe learning materials and make them conclusIon
available for searching, management, and reuse.
Interaction: There are two main areas of interaction, This chapter has described how the Internet has made
one area is interaction among people, while the other a significant impact on the mode of learning and how
one is interaction with learning materials. The learning learning platforms assist learning systematically. The
platforms can provide synchronized communication common functionalities of learning platforms were also
such as instant chat, video conferencing with educators described. Uncovering the limitations of the popular
and among learners, lecture on demand (video taped learning platforms has encouraged the author to de-
of lectures), and instant anonymous voting. Another velop a learning platform which embraces materials
perspective of interaction is between users and learn- reuse, sharing, and synchronizing. The simple mix
ing materials such as giving them a personal notes and match function of the platform has transformed
An Alternative Learning Platform to Facilitate Usability and Synchronization of Learning Resources
diverse learning resources from one-to-one relation- ics courses. Mathematics and Computer Education,
ships to many-to-many relationships. Learners also 38(2), 213-220.
have the flexibility to learn from different formats and
Coyle, K. (1997). Colyes information highway hand-
to consolidate their knowledge through online quizzes
book: A practical file on the new information order.
which can be embedded into a Presentation. They
American Library Association.
can learn according to their own time, place, and pace
preferences. Eleuterio, M. A., & Bortolozzi, F. (2004). AMANDA:
Although there are a number of self-developed An intelligent systems for meditating threaded dis-
platforms which cater better for different educators cussions. International Journal on Elearning, 3(3),
needs than commercially available ones, learning plat- 13-21.
forms merely provide a framework for learning. They
cannot address individual differences. Apart from the Fredericksen, E., Pickett, A., & Shea, P. (2000). Stu-
aforementioned possible enhancement features which dent satisfaction and perceived learning with on-line
can be implemented in the near future, the next step courses: Principles and examples from the SUNY
will be to offer different levels of learning resources learning network. Journal of Asynchronous Learning
and quizzes according to different styles and cognitive Networks, 4(2).
levels. Some open-ended questions and wider variety Freeman, M. (1997). Flexibility in access, interaction,
of quizzes such as nontext based and mix and match and assessment: The case for Web-based teaching pro-
types can also be added for variety and different needs. grams. Australian Journal for Educational Technology,
To conclude, learning platforms are merely learning 13(1), 23-39.
tools. The crucial point is that it is important to integrate
these learning tools into learning by using appropriate Hede, A. (2002). An integrated model of multimedia
pedagogy and learning style recommendations in order effects on learning. Journal of Educational Multimedia
to enhance learning effectiveness. and Hypermedia, 11(2), 177-191.
Huyng, M., Umesh, U. N., & Valacich, J. (2003). E-
learning as an emerging entrepreneurial enterprise in
acKnoWledgMent univerisities and firms. Communications of the Associa-
tion for Information Systems, 12(2), 48-68.
I would like to thank my colleagues, Dr. Kar Tin Lee
and Dr. Siu Cheung Kong, for asking their students to Macdonald, J., Weller, M., & Mason, R. (2002). Meet-
participate in this study. All participants and colleagues ing the assessment demands of networked courses.
who took part in this study are also appreciated. Very International Journal on E-learning, 1(1), 9-18.
special thanks go to my research assistant, Lap Pui Lee, Ng, E. M. W., & Lee, L. P. (2006). Mix and match to
for creating such a wonderful learning platform and create synchronized and reusable learning resources.
other research assistance, and also to John Coombes Journal of Interactive Instruction Development,
for editing effort. 19(2).
Oliver, R., Omari, A., & Herrington, J. (1998). Inves-
reFerences tigating implementation strategies for WWW-based
learning environments. International Journal of In-
Alavi, M., & Leidner, D. (2001). Research commen- structional Media, 25(2), 121-139.
tary: Technology-mediated learning: A call for greater Palloff, R., & Pratt, K. (2001). Lessons from the cy-
depth and breadth of research. Information Systems berspace classroom: The realities of online teaching.
Research, 12(1), 1-10. San Francisco: Jossey-Boss.
Alexander, S. (2001). E-learning developments and ex- Rosenberg, M. J. (2001). E-learning: Strategy for
periences. Education & Training, 4/5(43), 240-248. delivering knowledge in the digital age. New York:
Boggs, S., & Shore, M. (2004). Using e-learning plat- McGraw-Hill.
forms for mastery learning in developmental mathemat-
0
An Alternative Learning Platform to Facilitate Usability and Synchronization of Learning Resources
Section: Context ICT
Ambient Intelligence
Fortunato Sorrentino
Universit degli Studi di Firenze, Italy
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Ambient Intelligence
man and the various electronic and nonelectronic ap- States: NTT and Mitsubishi in Japan, as well as all the
pliances that surround him. Normans thesis is well major car manufacturers worldwide. A
known, that when IT (information technology) is Because of its evolutionary quality, amazing cover-
applied to objects for use, one of its key qualities age of different disciplines and representation of new
should be pleasurability (Norman, 2003). Simplic- inventions, the knowledge about AmI is mostly located
ity, versatility are also his keywords. His studies, for in the web and only very little material is available in
example his elaboration of the concept of affordance print. At the same time, the number of international
(Norman, 1988), are fundamental contributions to the research centers and research groups that deal with AmI
AmI culture. is very high, extending into most countries in the world.
The period during which Normans main works ap- An indirect list can be obtained by consulting in print the
peared, between 1999 and 2004, is also the time when projects projects presented in the very comprehensive
the mix of ideas and studies around the The Disappear- book about AmI by Aarts and Encarnaao (2006).
ing Computer arrived in Europe and began to spread
rapidly. Building Disappearing Computers (Russell,
Streitz, & Winograd, 2005) had been an American vi- aMbIent IntellIgent In the
sion, to which many high-profile scholars had applied aPPlIcatIon doMaIn
themselves. Europe followed, and since then, in the Old
Continent, the European Union has been giving ample AmI has been said to be the megatrend of ICT. Being
support to the development of AmI. The very term a global trend with a wide scope, it involves numer-
Ambient Intelligence was coined in Europe at that ous application domains and it is as pervasive as the
time and ever since has been the name of this new and technologies that underlie it. To move AmI out of the
complex field of research and development. Ambient isolation of the research field, one key step was made
Intelligence is the merging of the American advances in 1999 by ISTAG, the advisory group to the European
computer technology and design principles (Winograd, Communitys Information Society Technologies Pro-
1996) with the European leadership in communications gramme, which produced a fundamental report, giving
and Europes strong concern about lifelong and life- a strategic orientation to all future IST programs. It is
wide learning: the idea that technology should serve still current today:
knowledge and that knowledge should be accessible
by all social classes and at all ages. The vision statement agreed by ISTAG members is
The pioneer of AmI in Europe is Emile Aarts. He is to start creating an ambient intelligence landscape
senior vice-president Philips Research, senior scientist (for seamless delivery of services and applications)
and scientific program director, Philips Electronics, in Europe relying also upon testbeds and opensource
Eindhoven, Netherlands. Aarts, a real champion for software, develop user-friendliness, and develop and
AmI, in many public occasions, with his books and converge the networking infrastructure in Europe to
through his own company incessantly advocates the world-class. (ISTAG, 1999, p. 1)
AmI vision and its application in everyday life (Aarts
& Encarnaao, 2006; Aarts & Marzano, 2003). The next event was the creation, by a large group of
experts guided by the Institute for Prospective Techno-
This is our vision of ambient intelligence: people logical Studies (IPTS, 2006), of a set of model applica-
living easily in digital environments in which the elec- tion scenarios conceived to take place at the horizon of
tronics are sensitive to peoples needs, personalized the year 2010. The document ISTAG, Scenarios for
to their requirements, anticipatory of their behavior Ambient Intelligence in 2010 - Final report (Ducatel,
and responsive to their presence. (Philips Research, Bogdanowicz, Scapolo, Leijten, & Burgelman, 2001)
2006, p. 1) is a fundamental milestone for AmI and an absolute
reference for the entire AmI community.
Philips is one on the leading company investing in Ambient intelligence is understood as the sum,
AmI, but there are other leading-edge enterprises in or convergence, of three continuously developing
this area, for example, Nokia, Vodafone, and Siemens technologies:
in Europe; Intel, Microsoft, Sun and HP in the United
Ambient Intelligence
Ubiquitous computing: The integration of mi- should be called out when speaking of AmI. In this
croprocessors into everyday objects like furniture, variety, some items would fall under the ICT catego-
house applances, clothes or toys; ries (e.g., languages, middleware, ip-networking, etc.),
Ubiquitous communication: Objects are en- others under electronics (e.g., sensors, smart materials,
abled to communicate with each other and with nanodevices, etc.). Table 1 presents an approximate
the user, namely through wireless networks; classification based on the time of appearance: there
Intelligent user interfaces: The inhabitant of are several new and emerging developments, but
the AmI space is able to control and interact with many advances in the AmI direction also exists in the
the environment in a natural way (e.g., vocally, established fields.
with gestures) and in a personalized way (e.g.,
according to preferences, to the context); Key application domains
The illustration in Figure 1, depicting the interaction The AmI concept applies in many overlapping contexts,
of intelligent devices among themselves and with their and therefore the identification of application areas is
owner, illustrates one of the key aspects of the Ambient unfortunately arbitrary, though necessary if we whish
Intelligence concept. to represent the great fervor pervading this field. We
present below a certain number of domains, chosen
amI technologies because of their high rate of development and strong
leverage of collective knowledge. We also take into ac-
It is possible to speak of AmI technologies as a new count the results the SWAMI Project (Friedewald et al.,
set of technologies. What happens is that resources be- 2008), which segments the AmI global field according
longing to different branches of science are taken and to safety requirements. An in-depth presentation and
used in new applications where they become integrated, discussion of application domains can be found in a
made invisible and enabled in order to generate com- book that deals extensively with the whole subject of
munication paths for any-to-any interactions. The ambient intelligence (Sorrentino & Paganelli, 2006).
nonexhaustive list that follows may give an idea of
how much specialist knowledge and how many skills
Ambient Intelligence
Table 1.
A
AmI technologies
Web languages (XML and derivatives)
Middleware & servers
AI techniques
Established Augmented Reality
Linguistic technologies
IP-based mobile and wireless networking
Information visualization techniques, for spanning from the clinical and diagnostics sector
example, wall displays, interactive surfaces, to the wellness/wellbeing sector. To character-
indispensable tools when the information to ize it, we can choose the applications that adopt,
be processed is complex and multidimen- within the variety of AmI approaches, the one
sional. called wearable computing. Wearable comput-
ing is a kind of intelligence that is worn on
An advanced implementation in this area is rep- the body and relies on microprocessors, sophis-
resented by the SSWs, the Socially Supportive ticated sensors and body area networks (e.g.,
Workspaces of the CHIL Project (CHIL, 2006). those based on Bluetooth communications). The
The integration of information streams flowing development of biomedicine and miniaturized
between outdoor and indoor work activities is well sensors has made possible applications that can
implemented by another project, which adopts uninterruptedly monitor our bodys vital func-
very clever technologies, the WorkSPACE project tions without the inconvenience of wires or the
(WorkSPACE, 2004). need of specialized rooms. A typical solution is
Mobility. the Biomedical T-shirt (MSWebcare, 2006).
To be on-the-move, but simultaneously and A new frontier for AmI in e-Health is the field
permanently connected with the rest of the world, of clinical psychology, a research stream due to
is ubiquity, a mirage that man is pursuing since an Italian Scientist, Giuseppe Riva of Istituto
ever. AmI comes near to it with applications able Auxologico Italiano. At the basis of his approach,
to track users with GPS devices on a geographical called cybertherapy, there is the immersion of
scale or with RFID tags on a local scale. With such the patient into synthetical environments and the
means the user can move freely, surrounded, as concurrent use of Virtual Reality, Augmented
it were, by an invisible information sphere that Reality and Telemedicine (Riva, Davide, & Ijs-
follows him everywhere (also called a digital selsteijn, 2005).
aura, see Aura Project, 2000). In relation to
the e-learning theme a vigorous new stream of While those presented earlier are vertical views of
applications is developing, based on wireless AmI, it is important to note that there exists a trans-
communications and portable devices, called versal approach to applications, sponsored by a major
m-learning or mobile learning (mLearn, 2006). ongoing European initiative. In 2003, the European
Home. Commission launched what is called a Specific Sup-
Even though the smart home utopia is lasting port Action, with the name of MOSAIC AmI@
since the time of the Industrial Revolution, only Work Communities. The objective of MOSAIC is the
recently a branch of industry (sometimes called creation of Mobile Worker Support Environments
Domotics) is providing really practicable on an industrial scale. The key areas being addressed
solutions. In a smart space one of the most are Healthcare and Wellbeing; the building, construc-
important problems entrusted to the systems tion and manufacturing sectors where concurrent
intelligence is maintaining the delicate balance engineering can take place and Rural and Regional
between the ability of the user to retain control Work Environments. Simultaneously, MOSAIC is
of the environment and the initiatives of the au- managing, by means of three distinctive Communi-
tomation devices. Huge investments in research, ties, the development of three horizontal strategic
industrial prototypes and production are made in areas, named collaboration, mobility and knowledge.
this area, see for instance House-n, an amazing The structure of MOSAIC itself is one of the most ad-
MIT project (http://architecture.mit.edu/house_n) vanced examples of knowledge spaces, offering on its
and HomeLab, Philips lived-in intelligent home site a sophisticated repertoire of tools for Knowledge
(Homelab, 2003). Management and virtual cooperation across borders
E-Health and E-Care. and over distance (MOSAIC, 2006).
The AmI applications in these two areas (where
the e- in the term indicates the presence of large
ICT deployments) are numerous and very diverse,
Ambient Intelligence
state-oF-the-art and outlooK on that much change will come from the so-called NBIC
the Future sciencesNano-Bio-Info-Cogno sciences. A
We believe that knowledge and learning will be
If the European paradigm for AmI is the ambient profoundly affected, but we do not see any doom. The
society, the one of North America is the Internet of innovation injected by new technologies will slowly
things and the one of Japan is the ubiquitous network blend into the fundamental dimensions of existence
society. We observe different AmI genres and driv- and improve human life.
ers, though there is a common baseline across the world.
In North America, where AmI is driven by the large
Federal institutions (e.g., NSF) and Defence Agencies reFerences
and where extensive research is located in the leading
Universities, the focus is especially on software and Aarts, E. & Marzano, S. (Eds.). (2003). The new ev-
micro-nanoelectronics for embedded connectivity. In eryday, views on ambient intelligence. Rotterdam, The
Japan, the leading force behind AmI is the telecommu- Netherlands: 010 Publishers.
nications industry, which is set out to radically exploit
Aarts, E. & Encarnaao, J. L. (Eds.). (2006). True vi-
the countless opportunities of wireless networking and
sions The emergence of ambient intelligence. Berlin
the buying power of all its technological citizens.
Heidelberg: Springer-Verlag.
All nations see AmI as a lever of progress but are, at
the same time, aware of a dark side: the risks related Aura Project (2000). Distraction-free ubiquitous com-
to safety (encompassing security, privacy, identity, puting. Carnegie Mellon University. Retrieved March
trust, etc.). The pervasive forms of ICT implied by the 13, 2008, from http://www.cs.cmu.edu/~aura/
deployment of AmI applications put at the forefront
CHIL (2006). Computer in the human interaction loop
the threats to the private sphere of the individual. The
Services. Retrieved March 13, 2008, from http://chil.
virtual identity of an individual, an envelope of sensi-
server.de/servlet/is/106/
tive information, becomes known to many invisible
systems (Maghiros, 2006). Insufficient development of Ducatel, K., Bogdanowicz, M., Scapolo, F., Leijten
safety solutions can be a real hindrance for AmI. How- J., & Burgelman, J. C. (2001). Scenarios for ambi-
ever, since the challenge is taken not only by research ent intelligence, Final report. Retrieved March 13,
and industry, but also by the top policy-makers at the 2008, from ftp://ftp.cordis.lu/pub/ist/docs/istagsce-
Government levelas in (SWAMI, 2006)we may be narios2010.pdf
comforted that the rush for innovation will not deprive
these issues of the investments they require. HomeLab (2003). 365 days ambient intelligence re-
search in HomeLab, by Philips. Retrieved March 13,
2008, from http://www.research.philips.com/technolo-
gies/misc/homelab/downloads/homelab_365.pdf
conclusIon
IPTS (2006). Institute for prospective technological
AmI, though in different forms, is a powerful, shared, studies homepage. Retrieved March 13, 2008, from
worldwide vision. However, on a worldwide scale, its http://www.jrc.es/
presence and benefits are still allotted only to an lite
in the developed countries, and ease-of-use and user IST (2005). IST results - Offering flexible and adapt-
adoption remain permanent issues. able mobile learning. Retrieved March 13, 2008 from
The years after 2010the current horizon for AmI http://istresults.cordis.lu/index.cfm?section=news&tp
forecastswill exhibit a much higher rate of techno- l=article&BrowsingType=Features&id=77554
logical progress than in the previous decade, with the ISTAG (1999). Information society technologies advi-
end effect of driving costs down and therefore favor- sory group. Orientations for Workprogramme 2000 and
ing user adoption. Looking into the future, Europeans Beyond. Retrieved March 13, 2008, from http://www.
see the convergence of technologies as a key event ehto.org/ht_projects/messages/istagpdf/istag-99-final.
with far-reaching, perhaps unpredictable outcomes pdf
(wiring the human being?). The American view is
Ambient Intelligence
Maghiros, I. (2006). SWAMI dark scenarios. In Pro- Strauss, W., Fleischmann, M., Denziger, J., Wolf, M.
ceedings of the Conference on safeguards in a world & Li, Y. (2005). Knowledge spaces: Cultural educa-
of ambient intelligence, Brussels. Retrieved March 13, tion in the media age. Retrieved March 13, 2008,
2008, from http://is.jrc.es/pages/TFS/documents/SWA- from http://netzspannung.org/cat/servlet/CatServlet/
MIMaghiros20060322_000.ppt $files/303742/publications-2004-1-en.pdf
mLearn-2006. (2006). Across generations and cul- SWAMI (2006). Conference on safeguards in a world
tures. In Proceedings of the 5th World conference on of ambient intelligence. Retrieved March 13, 2008,
mLearning,Banff, Alberta (Canada). Retrieved March from http://publica.fraunhofer.de/eprints/urn:nbn:
13, 2008, from http://www.mlearn2006.org/ de:0011-n-434857.pdf
MOSAIC (2006). Homepage. Retrieved March 13, Weiser, M. (1991). The computer for the 21st century.
2008, from http://www.ami-communities.eu/wiki/ Scientific American, 265(3). Retrieved March 13, 2008,
MOSAIC from http://www.ubiq.com/hypertext/weiser/SciAm-
Draft3.html
MSWebCare (2006). Homepage. Retrieved March 13,
2008, from http://www.mswebcare.it Winograd, T. (Ed.) (1996). Bringing design to software.
Reading, MA: Addison-Wesley.
Norman, D. A. (1988). The psychology of everyday
things. New York: Basic Books, Inc. Later published WorkSpace (2004). Documentation of appliances &
as: (2002) The design of everyday things, New York, interaction devices, n. D16. Retrieved March 13, 2008,
NY: Basic Books, Inc. from http://www.daimi.au.dk/workspace/site/content/
deliverables/AppliancesAndInteractionDevices-D16.
Norman, D. A. (1999). The invisible computer: Why
pdf
good products can fail, the personal computer is so
complex and information appliances are the solution Wright, D., Gutwirth, S., Friedewald, M., Vildjiounaite,
(Reprint edition). Cambridge: MIT Press. E., Punie, Y. (Eds.).(2008). Safeguards in a World of
Ambient Intelligence. New York: Springer-Verlag.
Norman, D. A. (2003). Attractive things work better.
Draft Manuscript of Chapter 1 - Emotional design: Why
we love (or hate) everyday things. Retrieved March 13, Key terMs
2008, from http://www.jnd.org/dn.mss/CH01.pdf
Affordance: In a simplified way, it is a concept
Philips Research (2006). Technologies. What is ambient
related to the properties of an object, where the object
intelligence? Retrieved March 13, 2008, from http://
itself, because of its shape and design, suggests or au-
www.research.philips.com/technologies/syst_softw/
thorizes the way it should be used. The interpretation
ami/index.html
of affordance, however, is not univocal and depends on
Riva, G., Davide, F. & Ijsselsteijn, W. A. (2005). Be- the school of thought to which one makes reference.
ing there: Concepts, effects and measurement of user Since its introduction by the scholar J. J. Gibson, a
presence in synthetic environments. Amsterdam, The major variation to the set of notions surrounding this
Netherlands: IOS Press. Retrieved March 13, 2008, concept is due to D. Norman (see before), who discussed
from http://www.emergingcommunication.com/ it in the framework of industrial design and Human
Computer Interaction.
Russell, D. M., Streitz, N. A., & Winograd, T. (2005).
Building disappearing computers. In N. Streits, & P. HCI: Human computer interface or human com-
Nixon (Eds), Special issue: The disappearing computer. puter interaction. Usually names a field of science that
Communications of the ACM, 48(3). New York: ACM investigates all the aspects of the immaterial boundary
Press. Retrieved March 13, 2008, from http://www. in space that exists between a human user/actor and
vepsy.com/communication/volume5.html. a device with some computing power, not necessarily
a conventional computer. HCI is focusing more and
Sorrentino, F. & Paganelli, F. (2006). Lintelligenza
more on the interface with handheld devices and more
distribuita - Ambient intelligence: il futuro delle tec-
generally on interfaces involving all our senses and
nologie invisibili. Trento: Erickson.
Ambient Intelligence
mind (not only visual interfaces, but auditory, tactile, conventional e-learning, because of the special profile
perceptual, etc.). and requirements of the mobile user and his devices A
(interruptible connections, small screen estate, back-
Knowledge Society: In an evolutionary view, it
ward input facilities, etc.).
can be seen as the successor of a previous phase, the
information society (IS), which in turn followed RFID (also in RFID tag): Stands for radio frequency
the industrial society. IS was so called because of identification. It is the core technology of devices (tags)
the huge flow of information that was triggered by of very small size that can be stuck onto any kind of
the advent of computers, data processing systems and object and can transmit data to an RFID receiver lo-
communications. In the knowledge society, knowledge, cated in the same area. RFID is estimated to be one of
and not mere information, is the most valuable asset. It the most powerful technologies for the development
is what is in the head of people (tacit knowledge) and of AmI, notwithstanding its potential risks related to
what can materialize tangibly in the physical world, as privacy and security.
print, or human exchanges (explicit knowledge). It is
Usability: Usability is a fine and complex concept,
what drives the economy in the new millennium.
quite beyond intuition. In simple terms, usability refers
M-Learning: Means mobile learning and it to the qualities of an object related to its use or, rather,
refers to an increasingly adopted approach to learning its ease-of-use. Usability is also the science that
that assumes the learner to be distant and mobile with studies the principles and design rules to be adopted
respect to the teaching source and its resources. The in order to make usable things. Usability is notoriously
supporting technologies comprise wireless commu- a critical issue when dealing with the user interfaces
nications and handheld, portable devices. The issues of consumer electronics, computers, communication
and challenges of m-learning are quite different from tools and the Web.
0 Section: Context ICT
Don Kerr
University of the Sunshine Coast, Australia
IntroductIon bacKground
What are the impacts of the constructivist self-regulating According to Tetard and Patokrorpi (2005), the
learning approach to learning outcome(s)? constructivist learning environment is associated with
the following aspects:
In this article, we use the interview method to ex-
amine the approach for advanced level ICT students Organize a small assessment task to achieve
in an Australian public university. The first section overall learning objectives
covers the literature and theories associated with the Ownership of learning and problem solving
topic. The second section discusses the methodology Task must closely relate to real life problems
for conducting the research. The third section describes Allows different aspects or solutions to solve the
findings and results. The article concludes with discus- assessment task/problem
sions, implications and recommendations.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Applying Constructivist Self-Regulating Learning Approach for ICT Students
The learning environment should be very similar Volitional: Stressing controlled actions to regulate
to real life environment emotions and environmental conditions. A
Allows interactive learning Vygotskian: Stressing inner speech, dialogue,
Guidance should be provided and mediation acquired through a hierarchy of
Building on the students prior knowledge developmental levels.
Opportunity for social interaction Constructivist: Stressing personal theories, dis-
Communication with peers and others covery learning, and development of self-regula-
Allows alternative learning strategies tory processes based on conceptual change.
The constructivist methodology encourages a teach- Athanasou (1999) also indicates that there are several
ing and learning approach that gives the students the different theories of self-regulation. He, like Zimmer-
opportunity to participate in a learning community man and Schunk (2001) has broken these theories into
where the instructor is not the only source of informa- different views. In his case three views, the operant
tion and knowledge (Bruce, Weil, & Calhoun, 2004). or behaviorist which stresses the links between the
Technology is introduced as a tool that supports the environment and its reinforcers, the phenomenological
learning process as students seek knowledge and or humanist which stresses the self and self-regulation
understanding. and the social-cognitive models which attempt to bring
the two previously stated theories together as well as
Constructive Self-Regulating Learning stressing the cognitive aspects. Paris and Byrnes (1989)
describe the constructivist approach to self-regulated
The constructivist pedagogy according to Howe and learning by first describing the principles of a cogni-
Berv (2000) incorporates two factors, the first being that tive constructivist approach. They divide it into six
teaching must start with the knowledge, attitudes, and principles of learning whereby people have:
interests of the student in mind. The second is that the
teaching must be designed to allow students, through 1. An intrinsic motivation to seek information
their own experience, to interact with the material in 2. A desire to develop an understanding that goes
order to construct their own understanding. Other defini- beyond the information given
tions of constructivism are described by Poplin (1998) 3. Mental representations that change with a persons
as [the] process whereby new meanings are created development
by the learner within the context of her or his current 4. Levels of understanding that are progressively
knowledge. Zimmerman and Schunk (2001) provide refined at time goes by
seven theoretical views on self-regulated learning, each 5. Developmental constraints on learning
of which have their own concepts on key processes, 6. Reflect and reconstruct to stimulate learning
environmental conditions and acquired capacities.
These different views are directly quoted from Tillema These authors further suggest that the notion of
and Kremer-Hayon (2002): theory does provide a framework for self-regulated
learning and that this notion includes aspects such as
Operant: Stressing self instruction, modeling and formulating and testing hypotheses, acquiring new
shaping of behaviour; emphasizing provision of data, and solving problems.
relevant stimuli for learning Moon (1999) describes the constructivist view of
Phenomenological: Stressing self-worth, subjec- learning as emphasizing the teachers role as a facilitator
tive experiences, and development of a self-system of learning and that the learner constructs the learners
emphasizing personal identity own knowledge in a network fashion, much like build-
Information processing: Stressing transformation ing bricks in a wall. Moon (1999, p.106) describes the
of information, and self-monitoring with relatively approach as [stressing] the content and organization
little attention to environmental conditions of the curriculum as being the basis for learning and
Social cognitive: Stressing self-observation and implies that knowledge is built from ideas that the
enactive experiences, through social learning: learner gradually assembles. The constructivist ap-
emphasizing self-efficacy in learning proach stresses that the learner becomes more engaged
Applying Constructivist Self-Regulating Learning Approach for ICT Students
in meaningful learning and that the learner desires to Interviews used to evaluate the
understand the material rather than simply memorizing Ict course
it (Moon, 1999). This description of the constructivist
approach is closely aligned with the desired approach The research method used in first component of this
for course development outlined in this article. research is the interview approach (Yin, 1995). One
This literature suggests that the constructivist ap- of the key advantages of interview is that it balances
proach to self-regulated learning involves allowing stu- a purely quantitative method by allowing for integra-
dents to develop their own theories and through a series tion of researchers and practitioners perspectives in
of cycles of reflection and reconstruction to develop a a cost-effective way (Creswell, 1994; Kraemer, 1991;
solution. This interpretation is similar to the definition Marriam, 1988; Morgan, 1998). Another advantage of
of the self-regulating learning approach by (Zimmer- interviews is that it collects information without losing
man & Schunk, p. 5) as the degree that students are any significant details (Frey & Fontana, 1993; Fink,
meta-cognitively, motivationally and behaviorally 1995; Crabtree et al., 1993; Light, 1971). As well, an
active participants in their own learning process. The interview is extremely important in capturing rich in-
different views of the self-regulated learning theory are formation and to develop and confirm the context for
brought to the attention of the reader as background the theoretical model (Ericsson & Lehmann, 1996; Mal-
information. Whilst they are of concern for this study, hotra et al., 1996; Marriam, 1988; Zikmund, 2000).
we wish to concentrate mainly on the practical applica- In this research, several strategies were used to
tion and how an understanding of the basic underlying ensure the interviews were successful. An experienced
theory of self-regulation can help students with ICT interviewer was employed and this enabled a high reli-
courses. The next section of this article stresses the ability to be attained. Detailed notes were taken during
practical application of the approach. the interviews and tape recordings and transcripts of
The constructivist approach as advocated in this each interview were made.
article has been established as a useful aid for many stra- The convergence and divergence in each issue was
tegic initiatives that involve business applications, for raised, enabling the constructs of interest to evolve
example (Chermack & Van Der Merwe, 2003) describe throughout the interview process. The process required
the role of constructivist learning in scenario planning. openness to new ideas as well as ensuring that all fac-
(Chermack & Van Der Merwe, 2003, p.446) consider tors were captured (Frey & Fontana, 1993). The data
that the four critical components of a constructivist collection provided information useful for generating or
learning perspective as being the individual construc- confirming the theoretical model under question (Ham-
tion of knowledge, social influences on individual con- mersley, 1992; Neuman, 2000). Details of the methodol-
structions, the situatedness and contextual requirements ogy will be discussed in the following sections.
of knowledge construction and the social construction The communication channel was face-to-face (FtF)
of reality. These components are considered to be key semistructured interviews. The questions design for the
enablers to the desired goal of changing the mental interview was focused on open-ended questions (Crab-
models of participants in scenario planning. tree, Yanoshi, Miller & OConnor, 1993; Fink, 1995;
This research looks at using the constructivist ap- Frey & Fontana, 1993). Three independent reviewers
proach to two courses in ICT in a business school in assessed the questionnaire before the interviews. The
Australia. The constructivist approach was used to interviews were approximately 30 minutes each, and
inform the development of assessment items in both they were tape-recorded and transcribed. Interview
courses. Student opinions on the approach were obtained question design was based on the Paris and Byrness
through interview. (1989) six principles. Appendix 1 shows a copy of the
interview questions. The analysis of the interviews
transcripts followed Miles and Hubermans (1984)
Methodology recommendationa coding scheme based on the theo-
retical framework was developed, and the transcripts
The research consisted of two components; the first was were coded based on the scheme. Overall, the study
an in depth interviews of eight students involved in an aimed to focus on the constructivist self-regulatory
ICT course (information management and control) at learning approach in learning outcomes.
the postgraduate level.
Applying Constructivist Self-Regulating Learning Approach for ICT Students
assessMents WIthIn both and asked if they would do the interviews. All selected
courses that reFlected the students volunteered to do the interviews. The students A
constructIvIst aPProach were all operating at the postgraduate level in the ICT
major. Ages ranged from 20 to 39 years old. Half of the
Assessment items developed to be consistent with the interviewed students were international students with
constructivist approach in both information manage- less than two years living in Australia and the other
ment and control course was used and evaluated. These three were local students. Four students were working
assessment items are shown in the next section. or had industry working experience in IT or related
areas. Table 2 summaries the student attributes.
assessment task
the Interviews
The assessment task was designed and formulated
from Tetard and Patokorpi (2005) suggestions. Table As a warm-up, students were asked about their study
1 provides information about the learning environment progress in general. Upon completion of the warm-up,
and the assessment task. The assessment was a research a serious discussion of the main study was begun. The
assignment. Students were given seven weeks to com- following descriptions related to the constructivist learn-
plete the task. Students were required to complete the ing approach and were used throughout the interviews.
following tasks: Results are classified into five levels, namely:
In this assessment task, students could work either Students indicated that the intrinsic motivation to seek
in a group or individually. Three tutorials (one hour information was of a personal interest to them. The
each) were allocated to provide each group or individual extrinsic motivation was good marks, commitment
feedback before the submission due date. Consultations to group members, appeasing the lecturer and the
were also available outside teaching hours for those development of practical and useful skills for future
students who needed additional help for their assign- employment.
ments. E-mail and discussions board facilities were
made available to support communications between S1. For the assignment, I have selected a topic which
students and the lecturer. The final results and written Im very much interested in, i.e., ERP as Enterprise
feedback were given to the students after the comple- Integration. First, topic is about current business trends
tion of assessment/assignment. and current technology that specifically increase my
interest in seeking more and valuable information about
that, it also increases my knowledge about that topic
FIndIngs too. As Im an IT person it is important for me to go
with current trends this is also one of the reason that
The interviews for the first component of this research motivates me to seek more information.
were conducted at a public university in Australia be-
tween October and November 2005. Six students (one S2 The basic motivational source for me is
female and five male students) were randomly selected discussions, with my group mates and the preparation
Applying Constructivist Self-Regulating Learning Approach for ICT Students
of the basic rough sketch of the assignment. We then S3. Initially, the main motivation for seeking
ask the questions. What do we have to do? Who will information was to ensure that I score well in the as-
do what? Once every thing is discussed it gets down signments. But as I kept on searching for information,
to black & white issues. Second source is lecture time I found some topics interesting and so I was looking
discussions, and the feed back given by the lecturer for extra information than needed for the assignment.
helps me make changes from my original design. Last As I went in to more details, I came to realize from the
but not the least is the one-to-one discussion with the practical point of view, i.e., from a business perspec-
lecturer. tive how useful the information was. So, eventually
Applying Constructivist Self-Regulating Learning Approach for ICT Students
you could say that the main motivation for me was the Desire to Develop an Understanding
practicality and usefulness of the information after I
graduate and enter my professional life. The majority of students tend to have a desire to develop
an understanding that goes beyond the information
S4. I get the motivation to study Information given. One student (S2) had a different view on this
Management and Control as an IT student it is a part but still had a desire to want to work in a real world
of my interest and passion. The only thing constant in problem-solving environment.
this world is change and the punch line of todays era
is INFORMATION RULES and so it becomes all the S1. Yes, I am [interested in understanding beyond
more important to seek information and to secure it. the information given]. As it is not at all a good idea
to limit ourself with this infinite world of information.
S5. I generally like to learn new things, I like to And the topic, I have chosen is not going stop me
challenge myself. I think I am also very reflective so developing more advance ideas.
I like to look for better ways of doing things and this
drives me to find out information. I like to do well S2. I rather to be given a assignment which is real
and I dont particularly feel comfortable when I dont life case, because that helps students to develop their
understand something thoroughly so I tend to want to skill according to real life and real world. The case
find out more until I understand it sufficiently to feel should be more realistic, so that we can write from
comfortable. our own experience, based on what we learnt in the
course.
S6. For the assignment we found a subject that
was interesting then looked further and further into it to S3. Yes, mainly because to have proper
understand what was actually happening and then made understanding of the subject which will help me to
an assessment about where things could be improved. score highly in the assignment. Secondly and more
Part of the motivation was that there was an assignment importantly is the application and implementation in
to do and I wanted to do well, why, because I dont the business world.
really know how to do anything less, I found working
with a motivated partner an incentive to research more S4. While researching about a particular topic
and communicate that research in greater detail than I especially secured servers, monitoring, interceptions,
would have done alone. active directory, a lot of times I sit on the computer for
hours and go beyond my topic of assignment.
Applying Constructivist Self-Regulating Learning Approach for ICT Students
S5. It depends on the information I tend to glaze done previously and I enjoyed this, and it was also the
over when the information is too technical and really first essay type assignment I had done in a group and
have to force myself to understand what I needed to this was good self-development for my ability to work
know. collaboratively.
S6. if a subject catches my interest it seems only S6. The basic technical skills of writing an academic
natural to want to learn and investigate more about it. report and understanding more about academic research
Did I have the desire to learn more and develop a deeper have been most interesting lessons. The opportunity to
understanding? Absolutely and always. find a very specific problem then search and develop
a potential solution has left me far more enthusiastic
Mental Representations in about academic study than before and the general
Self-Development increase in understanding of the world around me is
satisfying. The experience of academic research has
Most students have mental representations that change been such that I am keen to do more, and have begun
with self-development. Students indicate that their my own research into other areas branching out from
thoughts on their own self-development include factors the assignment task.
such as: increased knowledge in the field, understanding
of current trends, increase in self-confidence, and get- Levels of Understanding
ting new ideas, improved skills from group members,
ability of work collaboratively, technical skills in writ- It was unclear whether all students have a level of
ing an academic report, and being able to apply skills understanding that was progressively refined as time
in other assignment task. However, it appears that one goes by. Some students seem to have developed some
student did not put enough effort on the assignment and incremental understanding (particularly S1, S3, S5,
there was no indication of self-development in mental and S6).
representations.
S1. Before doing the assignment, we had little
S1. Its very helpful in myself-development as it understanding about our ideas. As we have got more
helps me increase my knowledge about new ideas. It Information and read the new ideas coming up, it
also helps me go with current trends, moreover it helps helped us a lot in understanding the current business
in increasing self confidence for getting new ideas. and IT world.
S2. to be honest, I havent given my 100% for S2. .. to work for all of assignments (for all subjects)
this assignment, [the reason behind is it was very I am unable to give the best of my knowledge.
vague].
S3. The research done for the assignment in ad-
S3. Firstly , working as part of the group has taught ditional to the weekly tutorials and the lectures give
me that the sum of all parts is greater than the whole . much information about the subject from different
Even though my group member and we have our own perspectives. Like we get the lecturers viewpoint
set of individual skills, when we worked together we on a topic in the lecture, where as in the tutorials we
were able to compensate for each others weakness and get other peoples viewpoint on the topic during their
in the process the final result was much better than if presentation. And finally our own research and under-
we had done it individually. standing of the topics.
S4. I personally feel that the level of research I did S4. In case of information management and con-
was satisfactory for the assignment. I see my self gain- trol, the learning part depends more on the individual
ing more knowledge about the field and look forward interest rather than what is taught. If you have interest
to feedback for improvement as well. in a particular field then you would definitely like to
excel in that.
S5. It was the first for me in a number of ways it
was much more open and research focused than I had
Applying Constructivist Self-Regulating Learning Approach for ICT Students
S5. Initially we decided to work together as a S3. the topic was so vast the main constraint was
group and then looked for a topic we both wanted to to focus our teams attention and energy on one aspect A
work on and we seemed to find this in biometrics as it and research that in detail. Apart from that, stick-
had enough different aspects to interest both of us. We ing to the preset template and strict following of the
were looking at a much higher level and then as we anti-plagiarism policy by which I mean making sure
researched more we began to identify some consistent all quotes or citations are included along with proper
issues and to see patterns within the research. Those referencing.
patterns were a combination of what wasnt talked
about as much as what was. We selected one of these S4. The constraint in my learning process was
for our topic. my group member as initially we were not able to
decide the topic and later on I was the only who did
S6. Personally I find that understanding tends the majority of work as my group member had other
to be achieved in steps rather than a progressive assignments.
spectrum. There is knowledge given about a subject
and I can use and implement that knowledge without S5. For me time was a constraint, I have to juggle
really understanding it, but one day there comes a a lot of different demands, work, family and study and
point where as if out of the blue it all makes sense make trade-offs between them, I think this semester I
and I move to a deeper level of understanding. One of had taken on too much work wise and so had to trade
the things I appreciated about learning some research off study wise which disappointed me. Also I know I
skills (academic research) was that it made the steps struggle with technical detail, my mind goes blank when
and time between knowledge and understanding a I see the word algorithm or some of those diagrams and
shorter process. I really have to force myself to reread them, because
of this I tend to avoid topics where I have to deal to
Constraints on Learning extensively with them I was a bit disappointed in
that I would have enjoyed spending more time on it
The common constraint was time. Other constraints but I was really pressured in other aspects of my life
were gathering information from different sources, i.e. work that I didnt have enough energy or focus to
working in a group, learning technical concepts, apply as I would have liked.
referencing and assignment templates, the library
system and a lack of awareness of the academic research S6. Time, if there were more hours in the day and
process also impacted on student learning. less need for sleep I could learn more. Part of that time
constraint is the time it takes to find relevant informa-
S1. Its very hard to find but I think We are know- tion. The changes in the library systems were a great
ing the facts by getting the information from different hindrance in the assignment process as all searching
sources. other than in the library catalogues had to be done from
a computer lab or home.. Lack of awareness of the
S2. ..Web based and journal based searches for the process of academic research led to wasting time and
material gets more importance rather then the knowl- effort looking in some of the wrong places also.
edge of the student, Mostly students are considered
dumb but in reality they are not. They should be given Reflect and Reconstruct
more liberty to express their own views and ideas.
Students get worried because they will be having all It seems most of the students demonstrated reflective
the submission due almost at the same time or may be thinking or reconstructed their learning experience into
in the same week. It is not valid to give assignment way their future plan. Only S2 believed that the practical
before the submission date but they should be given in working experience is the most valuable to his future
a planed manner so students will not be under pressure, success.
and over stress themselves
S1. In the future I have decided to expand my
knowledge for this topic and for that I have planned
Applying Constructivist Self-Regulating Learning Approach for ICT Students
Applying Constructivist Self-Regulating Learning Approach for ICT Students
Applying Constructivist Self-Regulating Learning Approach for ICT Students
Looking at the constraints to learning, the main this article is to apply the approach and to test student
constraints were time, information gathering and group acceptance of courses developed.
members. In particular, time was a common constraint
for most of the students. constructivist self-regulating learning
S2. Students get worried always because they will The overall results suggest that personal interest is one
be having all the submission almost at the same time of the most common factors associated with learning
or may be at the same week motivation. Other motivation factors such as new and
challenging ideas, development of practical and use-
S5. I was a bit disappointed in that I would have ful skills, future employment opportunities, current
enjoyed spending more time on it but I was really pres- employment trends, marks received, and other people
sured in other aspects of my life are also important to student motivation.
S6. Time, if there were more hours in the day and learning outcomes
less need for sleep I could learn more.
Looking at all individual cases, the findings shows that
Another common constraint is information gather- students who achieved better marks were interested in
ing. the assessment task/assignment topic. They captured
new, relevant, and interesting information during the
S1. Its very hard to find [the required informa- learning process. They often enjoyed their learning
tion].. process. Learning constraints do not seem to be the
most critical factor to their learning outcomes. Ac-
S3. ..the topic was so vast the main constraint was cording to assessor feedback of the assessment item
to focus our teams attention in component one of this research, these students have
common characteristicswell written, good structure
S6. ..time it takes to find relevant informa- of the assignment, and interesting solutions. Students
tion who have good writing skills, creative and innovative
ideas are able to excel in their assessment tasks.
Almost all students reflected on their learning expe-
rience. However, only one student (S2) indicated that Implications
the practical working experience was more important
to future success. The overall results suggest that the assessment task
(research assignment) proved to be positive to teach-
S2. In my life I have learned most of the things ing and students learning experience. In particular,
with practical experience which is the key factor of students were motivated by the self-selected topic and
my so far success.will be joining soon a world the flexibility of the assignment. The interview results
renowned company for my job which proves that my also indicate that students learning process such as
way of learning is better and will definitely bring suc- mental representations and level of understanding were
cess and glory. increased. Students were able to identify problems, ap-
ply theory to practice as well as provide personal views
in the areas of the subject domain. They were also able
dIscussIon to reflect and reconstruct their learning experience for
future use. The learning outcomes (student marks and
One author of this article had developed this approach assessor comments) also consistently reflected Paris
for ICT education independently over a three year pe- and Byrnes (1989) six principles of constructive self-
riod, however it is acknowledged that the constructivist regulating learning theory. This suggests that positive
approach has been recommended for ICT education learning lead to better learning outcomes. When de-
recently (Tetard & Patokrorpi, 2005) and this article is signing an assessment task, it is very important that the
now expanding on that theme. Therefore the purpose of assignment problem appeals to the students interests.
0
Applying Constructivist Self-Regulating Learning Approach for ICT Students
Feedback on progress (before the submission) and groups became inefficient and ineffective with respect
group discussions during the tutorials (three tutorials to learning outcomes. A
and one hour each), had a positive impact on learn- Despite these issues of teamwork, there were no
ing experience and outcomes. This reflective practice complaints made to the lecturer. This is because that the
(feedback to students) is key element to self-develop- lecturer-in-charge gave the students an optioneither
ment (Lupton, 2002). work individually or in a group. Some students saw
Mayes (2000) has pointed out the need to maximize the teamwork as beneficial whereas others did not. It
peer dialogue through group discussions. The group is recommended that lecturer-in-charge should pro-
discussions could be between two or three groups who vide awareness of teamwork and group performance
share the same tasks (Hardaway & Scamell, 2003). guidelines for students to help them in selecting group
This also provides good learning atmosphere during members. These guidelines should reflect the benefits
the learning process. It is recommended that regular for student learning experience and outcomes.
feedback should be provided to ICT students. Results cleaned from the reflective diaries of students
On the other hand, time is one the major learning from the second component of this research indicated
constraints. Students had difficulties in balancing two levels with one group of students enjoying the free-
university study, work, and family commitments. For dom of being able to select their own assignment while
instance, one student complained that the majority of the other group (predominately international students)
assignments were due at about the same time and this wanted a more prescriptive assessment item.
increases students stress and reduces motivation. In
Australia universities, the normal semester runs 13 recommendations
teaching weeks. Assignments are quite often due in
week 7 or week 13. Exam runs in weeks 15-16. In In summary, the constructivist self-regulating approach
the case of Information Management & Control, the has benefits to IS teaching and students learning. To
lecturer-in-charge was asked to extend the deadline improve IS teaching and student learning, it is recom-
for two students twice. This suggests that deciding mended that
of assignment deadline is important and it should be
considered and taken into account when designing an 1. Students should be allowed to choose assignment
ICT course. On the other hand, such a luxury is not topics that they are interested in.
available in a real world work context and students 2. Regular feedback and checking students progress
should be aware of this. is important.
In comparison, most people generally believe that 3. The teacher should be a proactive listener and
their teamwork skills are improved when the groups listen to students learning problems and address
are heterogeneous. The heterogeneous group refers to these problems.
group members who have different knowledge and 4. The communication channel should not just be
skills sets (e.g., Kanet & Barut, 2003). The case at face-to-face. A good use of email and the dis-
hand shows that students who had different skills and cussion broad is important. Especially for those
knowledge are able to enhance the groups performance students who dont attend classes regularly.
and results. 5. Deciding deadlines should take into account other
On the other hand some teams spent too much time courses when designing a course outline.
on decisions such as the topic, communication methods, 6. There needs to be an awareness of teamwork
meeting times and locations, the division of labor and issues and benefits and optional teamwork is
delivery timeframes. These students set more strict recommended.
requirements for prior knowledge and experience of 7. There needs to be guidelines for selecting group
the subject matter (e.g., Dineen, 2002). members (e.g., working style, students strengths
Further, poor estimations of the amount of time and weakness)
required for research and gathering relevant informa- 8. Teachers need to manage students expecta-
tion, commitments of other courses assignments, tionsinformation such as the requirements for
amount of contributions to the assignment among the the assignment task should be provided to new
group members and poor teamwork meant that some students. This could include past student learn-
Applying Constructivist Self-Regulating Learning Approach for ICT Students
ing experience on a similar type of assignment, A challenge facing leading universities. Journal of
learning process and experience, benefits and Computer-Mediated Communication. Retrieved March
common issues such as time management and 13, 2008.
teamwork.
Bruce, J., Weil, M., & Calhoun, E. (2004). Models of
9. International students concerns about a lack of
teaching (7th ed).
structure in assessment items need to be ad-
dressed, and this can be done by providing clear Chermack, T. J. & Van Der Merwe, l. (2003). The role
guidelines and positive reinforcement as each of constructivist learning in scenario planning. Futures,
student progresses through the course. 35, 445-460.
Crabtree, B. F., Yanoshi, M. K., Miller W.L., &
OConnor, P. J. (1993). Selecting individual or group
conclusIon
interviews. In D. Morgan (Ed.), Successful focus groups:
Advancing the state of art (pp. 137-152).Newbury
The article described the importance of constructivist
Park, CA: Saga.
self-regulating learning approach. The overall aim of
this research is to improve ICT teaching and student Creswell, J. W. (1994). Research design: Qualitative and
learning. The findings suggest that a constructivist self- quantitative approaches. Thousand Oaks, CA: Sage.
regulating learning approach has positive implications
to student learning experiences. A number of recom- Day, C. (1999). Developing teachers: The challenges
mendations are suggested to improve ICT teaching and of lifelong learning. London: Falmer Press.
student learning experiences and outcomes. Ericsson, K. A. & Lehmann, A. C. (1996). Expert
It is expected that this approach would be well ac- and exceptional performance: Evidence of maximal
cepted by employers, although this was not tested and adaptation to task constraints. Psychology Review,
is an acknowledged limitation of this research. Future 47, 273-305.
research should look at determining the level of accep-
tance of this approach by employers of future students Fink, A. (1995). How to conduct interviews by telephone
and the concerns students may have with respect to the and in person. Thousand Oaks, CA: Sage.
nonprescriptive nature of assignments. This appears to Frey, J. H. & Fontana, A. (1993). The group interview
be a real concern especially with some students who in social research. In D. Morgan (Ed.), Successful
have concerns about the lack of structure that this ap- focus groups: Advancing the state of art. Newbury
proach can appear to give to the course. The authors Park, CA: Saga.
consider that the approach is worth pursuing because
it should result in a graduating student cohort who can Hammersley, M. (1992). Deconstructing the qaualita-
independently research and solve problems much in the tive-quantitative divide. In J. Brannen (Ed.), Mixing
same manner as their experienced colleagues would do methods: Qualitative and quantitative research. Ave-
in the real world work environment. bury, Aldershot.
The fact that this approach has been developed in- Hardaway, D. F. & Scamell, R. W. (2003). A course
dependently by academics in both the United States of design that features a constructivist approach to teach-
America and Australia is an indication of the perceived ing introduction to information technology. Decision,
potential of the approach in improving ICT education sciences, A journal of innovative education, 1(2),
outcomes. 321-327.
Howe, K. R. & Berv, J. (2000). Constructing con-
reFerences structivism, epistemological and pedagogical. In D. C.
Phillips (Ed.), Constructivism in education. Chicago,
Athanasou, J. A. (1999). Adult educational psychology. IL: University of Chicago Press.
Australia: Social Science Press. Marriam, S. B. (1988). Case study research in educa-
Beller, M. & Ehud, O. (1998). The crossroads be- tion: A qualitative approach. San Francisco: Jossey-
tween lifelong learning and information technology: Bass.
Applying Constructivist Self-Regulating Learning Approach for ICT Students
Miles, M. B. & Huberman, A. M. (1984). Qualitative Zikmund, W. G. (2000). Exploring marketing research
data analysis: A sourcebook of new methods. Beverly (7th ed). The Dryden, Forth Worth. A
Hill, CA: Sage.
Zimmerman, B. J. & Schunk, D. H. (2001). Self-regu-
Milne, C. & Taylor, P.C. (1995). Metaphors as global lated learning and academic achievement: theoretical
markers for teachers beliefs about the nature of science. perspectives. Mahwah, NJ: Lawrence Erlbaum As-
Research Science Education, 25, 39-49. sociates.
Morgan, D. L. (1998). Focus groups as qualitative
research: Qualitative research methods. Sage, New- Key terMs
bury Part.
Constructivist: Stressing personal theories, dis-
Moon, J. A. (1999). Reflection in learning and profes-
covery learning, and development of self-regulatory
sional development. London: Kogan Page Ltd.
processes based on conceptual change.
Mayes, T. (2000). A discussion paper for the IBM chair
Constructivist Learning: Constructivist learning
presentation. Retrieved March 13, 2008, from www.
has some basis in cognitive learning and is the result of
ipm.ucl.ac.be/chaireIBM/Mayes.pdf
the mental construction of a situation. Constructivism, in
Neuman, L. W. (2000). Social research methods: Quali- its most basic form, is piecing together new information
tative and quantitative approaches (4th ed). Boston: using information already known to the student.
Allyn and Bacon.
Constructivist Self-Regulating Learning: The
Paris, S. G. & Byrnes, J. P. (1989). The constructivist process whereby new meanings are created by the
approach to self-regulation and learning in the classroom learner within the context of her or his current knowl-
in self-regulated learning and academic achievement. edge.
In B. J. Zimmerman & D. H. Schunk (Eds.), Theory,
Operant: Stressing self instruction, modeling and
research and practice. New York: Springer-Verlag.
shaping of behavior; emphasizing provision of relevant
Poplin, M. S. (1998). Holistic/constructivist principles stimuli for learning.
of the teaching/learning process: Implications for the
Phenomenological: Self-worth, subjective experi-
field of learning disabilities. Journal of Learning Dis-
ences, and development of a self-system emphasising
abilities, 21, 401-416.
personal identity.
Sfard, A. (1998). On two metaphors for learning and the
Social Cognitive: Self-observation and enactive
dangers of choosing just one. Educational Researcher,
experiences, through social learning: emphasising
27, 4-13.
self-efficacy in learning.
Tetard, F. & Patokorpi, E. (2005). A constructivist ap-
Volitional: Controlled actions to regulate emotions
proach to information systems teaching: A case study on
and environmental conditions.
a design course for advanced-level university students.
Journal of Information Systems Education, 16(2). Vygotskian: Inner speech, dialogue, and media-
tion acquired through a hierarchy of developmental
Tillema, H. H. & Kremer-Hayon, L. (2002). Practis-
levels.
ing what we preachTeacher educators dilemmas
in promoting self-regulated learning: A cross case
comparison. Teaching and Teacher Education, 18,
593607.
Applying Constructivist Self-Regulating Learning Approach for ICT Students
Model Questions
Intrinsic motivation 1. What is your motivation to seek information?
Desire to develop an
2. Did you have a desire to develop an understanding that goes beyond the information
understanding beyond the
given? Why?
information given
Mental representations that
change with a persons 3. How would you describe your self-development from this assignment?
development
Levels of understanding that are
progressively refined at time 4. Please describe the level of understanding are progressively refined at time goes by
goes by
Developmental constraints on
5. What are constraints in your learning process?
learning
Reflect and reconstruct to
6. How did you construct and reflect this experience in your future learning?
stimulate learning
Learning outcomes 7. How would you describe your learning outcomes relative to your learning approach?
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
B2B E-Commerce Development
bacKground Interactivity
Fast response
B2C eC applies to any business that sells its Global reach
products or services to consumers over the Internet. Tailored and targeted information
It includes remote (or home) shopping, banking, Compressed marketing/sales cycle.
and stock brokerage, accompanied by (and in
On the other hand eC is also changing the paradigms
some cases, so far paid by) online advertising. The
for pricing, buying and selling to consumer. New vir-
intended audience for this market has not reached a tual companies like Virtual Vineyards and Amazon.
critical mass, although the immense potential of this com maintain zero inventories yet they successfully
segment is driving much of the interest in eC. B2C sell to consumers. They assemble a number of service
marketing is no longer driven by mass marketing pieces that are required to deliver the product to the
but rather by target marketing and interactive customers. These service parts include:
dialogues with customers (Bradley & Nolan, 1998;
Kowtha & Choon 2001). The opportunities that A Web site
B2C eC promises may be realised in the following Just in-time inventory system
broad areas of business activities: Strategic alliances and partnerships
Electronic payment options
Target customers: Obtaining a target audience Delivery methods for the physical products.
through customer information.
Buyer values: Understanding what the customers eC in developing countries
are really looking for.
Customers retention: The value of customer The business opportunities stemming from eC tech-
retention and loyalty (lifetime value of a cus- nologies are believed to be not far from reaching for
tomer). developing countries (Molla & Licker, 2005). Several
Customer equity: Placing the emphasis on cus- studies have been conducted to investigate the potential
tomer equity instead of brand equity. as well as the inhibitors of developing eC in develop-
Mass customisation: The ability to customise ing countries (Archiburgi & Pietrobelli, 2003; Enns
products on a mass basis, requiring a one-to-one & Huff, 1999; Hempel & Kwong, 2001, James, 2005;
dialogue. Kamel & Hussein, 2001; Molla & Licker, 2005; Omole
Wambogo, 2001; Oyelaran-Oyeyinka and Lal, 2005;
While companies are now required to know more Rosenbloom & Larsen, 2003; Travica, 2002). The belief
about their customers and work to retain them, there that cost reduction benefits can be realised relatively
are a number of challenges that make it even more easily leads business to consider Internet applications
difficult to win in a business to consumer sale. Those in order to offer their products and services and sup-
challenges are: port their customer. Cost reduction is the main driver
for eC in the developing countries as well. However,
The increasing number of consumers choices. studies indicate that several barriers inhibit the diffu-
Competition for attracting and retaining custom- sion of the Internet (Kiiski & Pohjola, 2002) and the
ers. full exploitation of eC potential (UNCTAD, 2003).
Consumers and businesses access to real-time Privacy issues and Communication channels (Clarke,
information requiring faster decision-making. 1999), as well as faster knowledge transmission does not
automatically imply that developing countries benefit
Also the World Wide Web has changed the market- from technological advances (Archiburgi & Pietrobelli,
ing/selling experience for businesses and their cus- 2003; James, 2006). The digital divide between devel-
tomers because of a number of unique characteristics, oped and developing countries that can be measured in
namely: terms of the inequality in access to Internet uses and
the necessary skills and resources that can be deployed
for eC development (Oyelaran-Oyeyinka & Lal, 2005)
B2B E-Commerce Development
play an important and decisive role for developing merce commented for its content validity. The research
countries in keeping up and taking advantage of the questions were developed by taking into consideration B
technological advances. In brief, while the attributes recent advances in Web technologies and customers
of the Internet enable eC, they also restrain its growth satisfaction factors (Brown, 1995; Hoffman, Novak,
for reasons such as: & Peralta, 1999) that can be potentially affected by the
information technology. In addition this chapter draws
Varied as infrastructures limitations on (Oyelaran-Oyeyinka & Lal, 2005) and considers
Lack of trust the digital divide between developed and developing
Security and authentication countries in terms of the B2C eC applications use, the
Privacy protection and personal data, as well as maturity of IS/IT planning, the skills of employees and
Taxation. the problems that companies face.
The research questions follow:
Care must be exercised not to over-regulate elec-
tronic commerce. In its present growing state, overly How Syria and Sudan approach eCommerce
restrictive regulations could suppress innovation and management?
delay growth. At the same time, measures to promote To what extend B2C eCommerce applications
confidence are needed also and some rules or principles are developed and used?
may have to be established while electronic commerce What are the problems that mostly these countries
is still limited and few vested interests have established face with regard the development of their eCom-
themselves. In conclusion, the studies identified merce portfolio?
B2B E-Commerce Development
they might have developed but it is not listed in the organizations 5%, service sector 41%, trade import /
questionnaire. Finally, a number of open and closed export 32%. The service sector includes: travel and
questions were designed for the purpose of investigating tourism, advertising, computing and Internet services,
the companies technical and social problems as well transport and finance and investment.
as the technology in used. Only 68% of the sample revealed their turnover,
which ranges between US$1 million to US$200. 32%
limitations of the study of the firms in the sample considered their total revenue
confidential and they did not disclose it. The average
This study analyses a relatively small data set from income of the 68% of the sample is $22 million. The
companies from different business sectors. Although average expenditure for the IT infrastructure of the
conclusions for the whole industry can be drawn, more 68% sample is around $1.5 million, that is, it is the 8%
specific sector oriented surveys will shed more light on of the total revenue. Again the remaining 32% of the
the actual achievements and priorities of the companies sample firms did not reveal their IT expenses.
with respect to their eC development. In addition, this The average total number of employees in the
survey investigates the current situation in Syria and companies is 176, with an average of 14 employees
Sudan. Surveys in other countries would also be use- working in the IS/ IT department. The maximum number
ful for a more comprehensive and comparable results. of IS/IT staff belongs to publishing and multimedia
Nevertheless, the results provide a useful indication of businesses, with 70 and 65 employees respectively
the eC development, its problems and technologies in and that reflects the information- intensive nature of
developing countries. their business.
The profile of the companies of the sample is sum-
Companies Profile and Management marized in Exhibit A.
approaches The management approaches adapted by the com-
panies in the sample are considered in terms of their
The countries that represent the developing world are information systems (IS) planning style and IS project
Syria and Sudan. Fifty-five percent of the sample is justification criteria. With respect to IS planning, as
from Sudan and 45% of the sample is from Syria. The Figure 1 shows, 17% of the companies engage a wider
sample of the companies represents a wide range of range of stakeholders, that is, users, business and IS
business sectors. The percentages of companies in each management in the planning process. 17% take into
business sector are: manufacturing 22%, government consideration the business plan, 26% plan for IS with-
out consultation of the business plan, and 23% have
B2B E-Commerce Development
25% 26%
23%
17%
17% 16%
no IS plan. Additionally, a total of 59% of the sample Regarding the eC justification and approval, as
use one or more methodologies to plan for their IS, shown in Figure 2, around 69% of the companies use
while 41% refrain from using one. The percentages in only financial measures, that is, cost measures and return
Figure 1 exceed the 100% as companies were allowed of investment (ROI) rations. Only 30% use organiza-
to choose more than one option, as they could adapt tional and customer-related factors. Moreover, 30% use
more than one management practices. measures that reflect the support to their business and
Regarding the involvement of business managers plans, while 26% use competitive advantage-related
in IS planning as shown in Figure 1, 25% of the re- issues. There is a strong indication that firms in the
spondents indicated that they were actively involved developing countries view IT mainly in terms of cost
in the process, while only 16% of the IS managers only. Therefore, firms seem to develop IS only if the
happened to be members of the companies executive cost is relatively low. Percentages in Figure 2 may also
team. This finding implies that the level of integration exceed 100%, as respondents were allowed to choose
of business and IT is poor in the case of the developing more than one criteria.
countries. It also suggests that these companies lack an With respect to business staff skills, 36% of the
established and effective communication link between sample reports that their employees know how IS/IT
their IS management and their business counterparts. works. 32% understand IS and its potential, while sur-
As a matter of fact 23% of these firms totally refrain prisingly, only 16% of IT staff know how the business
from developing an IS plan while only 17% of them operate. Once more, this finding strongly indicates
develop their IS with consultation of business plan. This that IT role is still considered as a merely technical
indicates a low level of IS management maturity. function.
B2B E-Commerce Development
39%
30% 30% 30%
26%
the current state of eC development of customer orientation. However, bearing in mind that
service sector, that is, information intensive businesses
Table 2 shows a number of B2C eC applications in- comprise the 41% sample, a 32% of customer oriented
vestigated in this research. As Table 2 shows, around eC applications may still be considered as low.
46% of the companies in the sample strongly use ap- Only 25% of the sample have developed and strongly
plications that provide customers with products and use applications that support on-time delivery. Not
service-related information such as prices, availability, surprisingly, since applications that support automatic
new features, and so forth. Considering the simplicity payment or supporting customers to place electronic
of developing a Web site for the information provision orders have completely been left out of the IS priorities.
and the relatively small percentage of the firms that This is not only due to the data security problem or lack
use the Web for such a purpose, this study indicates of trust (Clarke, 1999) issue but it can also be attrib-
that businesses are utterly delayed in considering the uted to the low level of IT maturity and the low level
Internet for business use. Moreover with approximately of education and computer literacy among customers
36% of the sample companies using their IS to support in these countries. Finally, building IT in products and
staff competence, this research indicates that the main services is low (25%) as well as providing customers
orientation of the businesses is to support their internal with administrative support (approximately 18%).
business processes and to educate their staff rather than Such results are more or less expected considering the
to support their customers. This finding is in line with technological state of these countries.
the companies preference of cost oriented criteria for eC
applications justification, as shown in Figure 3, instead ec development Problems
of adopting a wider view to evaluation incorporating
customer related criteria as well. Concerning the technical, social, and managerial
Around 36% of the companies in the sample use problems that firms in developing countries encounter,
strongly their IS in order to identify different market table 3 below shows to what extent organisations face
segments, which indicates that these organisations are each particular problem. An overview of the percent-
aware of the usefulness of IS in terms of identifying ages reveals that almost all the problems listed (except
new lines of businesses and future opportunities. In an the employees confidence) are highly appreciated
attempt to provide a better support to their customers, as problems by at least the 50% of the sample. These
approximately 32% of firms have developed applica- problems reflect the level of the difficulties businesses
tions that provide customer training, handle customer face and indicate the gap of the digital divide between
complaints and support customers to choose the right developed and developing counties. Technical prob-
products or services. This finding provides an indication lems, such as data security (strongly 45%), reliability
that there are companies, which may constitute the criti- (strongly 38%) and performance (strongly 35%), top
cal mass of businesses on a route to entering a new era the list of the main problems and they indicate the in-
0
B2B E-Commerce Development
Table 2. The extent to which companies use the Internet and eC for customers support
Dont
B
Internet application Not At all Little Moderate Strongly
Know
Give your customers information 3.57% 17.85% 28.57% 46.42% 3.57%
Use IS to support your staffs competence 3.57% 17.85% 32.14% 35.71% 14.28%
Use IS to identify different market segments. 21.42% 14.28% 25% 35.71% 3.57%
Allow customer to automatically place order 57.14% 10.71% 3.57% 3.57% 25%
B2B E-Commerce Development
Table 3. Technical, managerial and social problems with the B2C eC applications development
approval. They focus on realising benefits related to as well that has not only its technical side, but its social
their internal processes rather than adapting a customer one. It an international problem that holds back B2C
centred approach to developing eC. The customer eC and prevents it from reaching its full potential. It
orientation of the companies in the sample takes the is not just a characteristic of the developing countries.
form of applications that mainly provide customers It is a strong indication that customer are reluctant to
with product information. reveal their personal information over the Internet.
This chapter indicates that in order to accelerate the Security however, should be achieved with careful
development of eC, companies need to focus on design of the technological solutions and management
initiatives, such as compensation of potential losses,
Management insurance policies, customer training courses, etc. All
Infrastructure these require funding, which is also an issue as this
Knowledge and skills research indicates that spending on IS/IT is only at 8%
of the total income.
Actions should be taken in order to alleviate prob- Infrastructure problems are expressed mainly in
lems indicated by this study, but not on each issue terms of performance and reliability of eC applications.
separately, since initiatives in infrastructure improve- These issues have been reported in other studies as well
ments may follow knowledge and employees skills (Kardaras & Papathanassiou, 2000). In general regard-
development. less if there is the case of a developed or a developing
With respect to their management organisations need country the reliability of a eC application, that is, an eC
to improve their management strategies and approaches service has not been yet defined neither have standards
in systems planning, justification and approval. There been formalised.
is a need for the development and use of an extended In addition, as regards knowledge and skills, foster-
set of eC evaluation criteria that would include cus- ing staff development schemes businesses will have
tomer-oriented metrics. This will facilitate the shift of the opportunity to engage their employees into more
the merely internally focused thinking to considering customer oriented thinking as well as exploiting more
the customers as well. In turn, such a shift will pos- of the available eC technological infrastructure. The
sibly boost the confidence for development of B2C eC management should also take initiatives that improve
among management, employees and their customers customers and employees knowledge and confidence
and it will probably lead to the development of more with eC. Lack of know how, poor knowledge of the
advanced and sophisticated B2C eC applications. Data required functionality and customers reluctance to us-
security although is reported as a technical problem that ing the Internet are top priorities for lifting them from
comes on the top of the list is a management problem the list of eC development problems.
B2B E-Commerce Development
This research finally supports the findings of other Hoffman, D. L., Novak, T. P., & Peralta, M. (1999).
studies such as (Archiburgi & Pietrobelli 2003; James, Building consumer trust online. Communications of B
2006; Omole Wambogo, 2001; Oyelaran-Oyeyinka & the ACM, 42(4), 80-85.
Lal, 2005) that faster knowledge transmission does
Ives, B. & Learmonth, G. P. (1984). The information
not automatically imply that developing countries will
system as a competitive weapon. Communications of
benefit from the technology. This study supports that a
the ACM, 27(12), 1193-1201.
systemic and systematic approach towards developing
the necessary management culture will accelerate B2C James, J. (2005). Technological blending in the age
eC development, it will enable customer to participate of the Internet: A developing countries perspective.
and all engaging stakeholders to benefit. Telecommunications Policy, 29, 285-296.
James, J. (2006). The internet and poverty in developing
countries: Welfare economics versus a functioning-
reFerences
based approach. Futures, 38, 337-349.
Applegate, L., Holsapple, C., Kalakota, R., Raddem- Kamel, S., & Hussein, M. (2001). The development
acher F., & Whinston, A. (1996). Electronic commerce: of e-commerce: The emerging virtual context within
Building blocks of new business opportunities. Journal Egypt. Logistics Information Management, 14, ,
of Organisational Computing and Electronic Com- 119-126.
merce, 6(1), 1-10.
Kardaras, D. & Papathanassiou, E. (2000). The de-
Archiburgi, D. & Pietrobelli, C. (2003). The globalisa- velopment of B2C e-commerce in Greece. Internet
tion of technology and its implications for developing Research: Electronic Networking Applications and
countries. Windows of opportunity or further burden? Policy, 10(4), 284-294.
Technological Forecasting & Social Change, 70,
861-883. Kiiski, S. & Pohjola, M. (2002). Cross-country dif-
fusion of the Internet. Information Economics and
Bradley, S. & Nolan, R. (1998). Sense and respond: Policy, 14, 297-310.
Capturing value in the network era. MA: Harvard
Business School Press. Kowtha, N. R., & Choon, T. W. I. (2001). Determi-
nants of website development: A study of electronic
Brown, A. S. (1995). What customers value most. How commerce in Singapore. Information & Management,
to achieve business transformation by focusing on 39(3), 227-242.
processes that touch your customer. John Wiley and
Sons, Canada Ltd. Publishing. Lightner, N. (2004). Evaluating e-commerce functional-
ity with a focus on customer service. Communications
Clarke, R. (1999). Internet privacy concerns confirm of the ACM, 47(10), 88-92.
the case for intervention. Communication of the ACM,
42(2), 60-66. McLean-Smith, J. (2000). E-commerce on the up and
up. The Banker, 150(887), 91-103.
Enns, H. G. & Huff, S. L. (1999). Information technol-
ogy implementation in developing countries: Advent of Molla, A. & Licker, P. S. (2005). E-commerce adop-
the internet in Mongolia. Journal of Global Information tion in developing countries: A model and instrument.
Technology Management, 2(3), 5-24. Information & Management, 42(6), 877-899.
Goode, S. & Stevens, K. (2000). An analysis of the Omole Wambogo, D. (2001). Information science and
business characteristics of adopters and non adopters technology in developing countries. International In-
of WWW. Technology Information and Management, formation and Library Review, 33, 221-248.
1(1), 129-154. Oyelaran-Oyeyinka, B. & Lal, K. (2005). Internet dif-
Hempel, P. S. & Kwong, Y. K. (2001). B2B e-Com- fusion in sub-Saharan Africa: A cross-country analysis
merce in emerging economies: I-metal.coms non-fer- Telecommunications Policy, 29, 507-527.
rous metals exchange in China. Journal of Strategic
Information Systems,10(4), 335-355.
B2B E-Commerce Development
Rosenbloom, B. & Larsen, T. (2003). Communica- by a common umbrella, for example a well-known
tion in international business-to-business marketing brand may be enriched by a common granted payment
channels. Does culture matter? Industrial Marketing method. The e-malls operators may not have an interest
Management, 32(4), 309-318. in an individual business that is being hosted. Instead
the operator may seek benefits in enhanced sales of
Shaw, M., Gardner, D., & Thomas, H. (1997). Research
the supporting technologies (e.g., IBM with World
opportunities in electronic commerce. Decision Support
Avenue). Alternatively benefits are sought in services
Systems, 21(3), 149-156.
(e.g., Barclays with BarclaysSquer), or in advertis-
Teo, T. S. H. & Ranganathan, C. (2004). Adopters ing space and/or brand reinforcement or in collective
and non-adopters of business-to-business electronic benefits for the e-shops that are hosted such as traffic,
commerce in Singapore. Information & Management, with the expectation that visiting one shop on the e-mall
42(1), 89-102. will lead to visits to neighboring shops.
Timmers, P. (1999). Electronic commerce: Strategies E-Auction: Electronic auctions offer an electronic
and models for business-to-business trading. John implementation of the biding mechanism known from
Wiley & Sons. the traditional auctions. E-auctions can be accompa-
nied by multimedia presentations of the goods. They
Travica, B. (2002). Diffusion of electronic commerce also include integration of the bidding process with
in developing countries: The case of Costa Rica. Jour- contracting, payments and delivery. Benefits for sup-
nal of Global Information Technology Management, pliers and buyers are increased efficiency, timesaving,
5(1), 4-24. and global sourcing.
UNCTAD (2003). E-commerce and development report E-Procurement: This is an electronic tendering and
2003, United Nations, New York. Retrieved March 16, procurement of goods and service. Large companies
2008, from http://www.unctad.org/eCommerce or public authorities implement some form of e-pro-
curement on the Web. Benefits for the buyers include a
KeyWords wider choice of suppliers to choose from which in turn
leads to lower costs, better quality, and reduced cost
Collaboration Platforms: These models provide of procurement. The benefits for suppliers, however,
a set of tools and an information environment for col- include more tendering opportunities, lower cost of
laboration between enterprises. This model can focus submitting a tender, and tendering in parts. An example
on specific functions, such as collaborative design and is Japan airlines.
reengineering, or in providing project support with a Third Party Marketplace: This is an emerging
virtual team of consultants. Business opportunities are model that is suitable in case companies wish to leave
in managing the platform, and in selling the special- the Web marketing to a 3rd party (possibly as an add-on
ist tools. Examples are in the products and projects to their other channels). Several additional features like
spun off from the global engineering network concept branding, payment; logistics, ordering, and ultimately
(Rethfeldt, 1994). the full scale of secure transactions are added to the 3rd
E-Shop: This is a Web marketing of a company or a party marketplace. Revenues are generated on the basis
shop to promote the company and its goods or services of one-off membership fee, service fees, transaction fee,
or both. This business model is kind of incorporating or percentage on transaction value. Examples of 3rd
the traditional version of eC with eC. Both customers as party marketplace providers are Citius (Jellasi & Lai,
well as the company benefit from this model. Benefits 1996), and Tradezone (tradezone.onyx.net).
for the customer include lower prices, wider choice, Value Chain Service Provider: These specialize on
better information and 24-hour availability. Benefits a specific function for the value chain, such as electronic
for the business include increased demand, and cost payment or logistics, with the intention to make that
reduction in sales and promotion. into their distinct competitive advantage. A fees or a
E-Mall: An electronic mall, in its basic form, percentage is the basis for revenues. Examples of value
consists of a collection of e-shops, usually enhanced chain service providers are FedEx or UPS Web-based
package shipping support.
B2B E-Commerce Development
Value Chain Integrators: These focus on integrat- fees as well as advertising generate revenues. A virtual
ing multiple steps of the value chain, with the potential community can also be an important add-on to other B
to exploit the information flow between those steps as marketing operations in order to build customer loy-
further added value. Revenues come from consultancy alty and receive customer feedback. An example of a
fees or possibly transaction fees. virtual community is Amazon.com for books. Virtual
communities are also becoming an additional function
Virtual Communities: The ultimate value of virtual
to enhance the attractiveness and opportunities for new
communities is coming from the members who add
services of several of the business models (e.g., e-mall
their information into a basic environment provided
or 3rd party).
by the virtual community company. The membership
Section: Product ICT
BISER
Dimitar Christozov
American University in Bulgaria, Bulgaria
The Simons model of the decision-making process The elements we will use further are presented in
includes the phase of choosing among alternatives or Table 1:
options, designed for solving the given problem. Usu-
ally an option dominates in some of the properties and O = {Oi }, i = 1,...n is the group of options;
is less suitable according to others. Making a rational
I = {I j }, j = 1,..., k is the set of single indica-
decision in choosing an option means to balance between
tors;
different properties. There are two principle strategies
in performing this task: X = {xij }, i = 1,..., n; j = 1,...k is the informa-
tion matrix, holding the value of single indicator
To evaluate every option on the whole set of Ij for option Oi;
properties, and W = {w j }, j = 1,....,k is the vector of weights,
To apply a procedure to extract the best (the most where wj measures the value (importance, sig-
suitable) one. nificance) of the indicator Ij ;
S = {s j }, j = 1,...k is the vector of signs, where
Integration of information associated with the sj represents the direction of increasing the quality
multiple properties of competitive options into a single of options according to the change of the value
measure is presented and discussed. Options could be of given indicator: +1 indicates the higher
goods to purchase, list of products for manufacturing, value of the indicator the higher quality of the
suppliers, services, technologies, and even candidates option and -1 indicates the higher value of
for a given position. The common in all such cases the indicator, the lower quality the option. In
are: this case, when quality of the option, measured
according to indicator Ir, depends on the distance
The decision maker has to assign a value to every from a given finite value yr, and it is the high-
option in the competing group by comparing it est when x*r = y r, we may apply the following
against its alternativesthe other members of transformation x jr = abs ( x jr y r ) and set the
the same group. Further, we shall call this value sign as sr = -1.
integral quality indicator of the option.
Options in the group are described with a com-
mon list of properties or characteristics, which
Integral IndIcators
we will call further single quality indicators of
the option.
Integral indicators are functions I, which transform a
vector {xj} of real numbers into a single real number
Different measures, designed to integrate the in-
Q, where j = 1, 2, ..., k.
formation provided by single indicators, are presented
and discussed.
I : Rn R
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
BISER
Weighted average (Additive Integral Indicator) weighted sum of quantities of information provided by
is the most often used integral indicator: single indicators (see Christozov, 1997):
k
log 2 I (Oi ) = w j log 2 qij , i = 1,2,..., n.
1
w j qij , i = 1,2,..., n,
k
I (Oi ) = j =1
j=1 w j j =1
k
j =1
is selected. The correlation coefficient is used also as
a measure for the between indicators dependency. The
where {wj} are appropriately normalized, and qij has intermediate result consists of the four matrices:
the same meaning as in additive formula. Independ-
ence of single indicators is required as well. The regressions coefficients A = {aij} and B = {bij}
quantity of information (using Shannons formu- correlation coefficients C = {cij}
lae) obtained by this integral indicator is equal to the selected model M = {mij}
BISER
Integral indicators are constructed by choosing one Easy to interpret, does not set any extraordinary
of the single indicators g as an argument in all selected requirements to data, which may confuse users or
models. The normalized values qij are calculated by: which may require background and qualification
si
beyond the problem domain;
x ji Flexibility to perform simulations with comput-
q ji = , j = 1,2,...,n; i = 1,2,...,g 1, g + 1,...,k
f (aig , big , mig , xig )
ers.
reFerences
There are two special cases:
Boneva, L., Dimitrov, B., Stefanov, I., & Varbanova, M.
m=1 and {bij=0} represents the additive indica- (1986). Statistical methods for a complex estimation of
tor the quality of products. Sofia, University of Sofia St.
m=4 and {bij=0} the multiplicative one Kl. Ohridsky Press, Math 88
Christozov, D. (1997). Evaluation of the quality of an
Exploring between indicators dependency instead of
option compared to its alternatives. In Proceedings of
assuming their independence, together with automatic
the 18th IFIP TC7 Conference on System Modelling
selection of the model, based on available data, allows
and Optimisation, Detroit, Michigan.
working in the terms of problem domain preserving
both the mathematical correctness on the entire data Christozov, D., Denchev, S., & Ugarchinsky, B. (1989).
space and the interpretability of the results. Assessment of mechanical engineering technologies.
ICSTI, Moscow
conclusIon
Key terMs
The following properties of technology BISER, the
proposed integral indicator, are valuable in applying Integral Quality Indicator: A single value charac-
for comparative evaluation of options qualities: terizing a group of properties of a given option.
Option: Alternative solution of given problem.
Simplicity:
Using domain terminology in presenting data, Quality Indicator: A single value characterizing
preferences, and relations; particular property of a given option.
Section: Process ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Blended Approach Environment Shift in Higher Education
Technology:
Classroom
Infrastructure
Practices:
Materials Blended Theory:
Development & Content Training &
Delivery Environment Faculty Support
System
with traditional (stand-up) education or training (Smith, infrastructure, should be ensured before the course is
2001) or learning that employs multiple strategies, implemented. This should be backed up by techni-
methods, and delivery systems (Saunders & Werner, cal support from either the lecturer or technological
2002). Meanwhile, Troha (2002) describes the term expert. Second, in the blended teaching and learning
blended learning as combining the best features of environment, human resources should be committed
online learning with the best features of classroom to the project at an early stage and lecturers should be
instruction. The blend may be a single instructional selected based on their attitudes towards technology,
method combined with a presentation and distribution teaching style, and ability to control the technology.
method, or a combination of multiple methods. In this Finally, in the blended content environment, where
article, the blended approach is taken into consideration subject domain which material development and also
as a combination of traditional or current educational the delivery system suitable the method approach. This
technology that is provided for the educators and is a paradigm elaborated in debates about existence,
also some constituents of instructional process are significance, and causes of the shifts towards neo and
facilitated online while other constituents are offered post-Fordism in the organization of work to which ICTs
conventionally. are argued to be central (Edwards & Usher, 2000).
The critical factors for success will change with
the implementation of the blended approach; prior blended Ict environment
experience of using technology; the and technological
infrastructure. The lecturer will be the new key element E-learning systems open up new perspectives on
in the success of the learning experience. Universities knowledge transfer. Providing valuable content and
can help students achieve success by a combination elaborate interactivity structures could encourage the
of theory, technology, and practice. First, the blended learner to discover knowledge on ones own initiative
ICT environment, or the functionality of technology in a constructivist fashion. Applying Semantic Web
0
Blended Approach Environment Shift in Higher Education
technologies to e-learning systems will facilitate a 1. The communication between students and
new generation of e-learning systems (Smith, 2001). peers B
The current pioneers are introducing digital technolo- 2. The communication between lecturer and stu-
gies into the educational process at a time when the dents
technology is still quite crude in comparison to full 3. The communication between students and tech-
the bandwidth of the typical classroom (Saunders nologies
& Werner, 2002; Scott, 2001; Spodark, 2003). Dur- 4. The communication between students and subject
ing this introductory period, with little evidence of content
correct usage, instructional practice can easily be 5. The communication between students, lecturer,
dominated and directed by technology. In the context and industries
of the Malaysian universities experience, this seems
to be a reality which is examined thoroughly via the Synchronous communication tools are tools
hardware and software setup of the schools, and the that enable real time communication in a different
technological support convert in practices and policies timedifferent place mode. These tools allow people
will determine whether instructional practice can be to connect at a single point in time, at the same time
directed successfully by technology. (Kaplan & Ashley, 2003). Some features that include
When the technology of education dominates, in the synchronous communication are:
learning theory is supplanted with instructional prac-
tice, which is technology dependent. The introduction Text conversation, which can include pictorial
of poor technology into education can easily have a support.
constrictive rather than empowering effect. Technol- The ability of users to ask, answer, or comment
ogy is seen as a monster which threatens all the value on something in the Internet.
of society, a dehumanizing influence which must be The ability of users to listen and respond while
resisted (Romiszowski, 1981), and in some cases, all the group members are present in an online
Romiszowskis sarcasm gets borne out. When gov- conversation.
ernment funding of technology is lacking or poorly The ability of users to follow a conversation that
implemented, institutions must seek sponsorships and is presented in the order that the text is written,
alliances which creates a relatively new triad consist- which can appear out of sequence to viewers.
ing of education, markets, and information technology, The ability of users to manipulate files through
charity from business, rather than taxation of business, file sharing activities and the integration of Web
and puts power in the hands of business to set the agenda links, images, and sounds.
for education (Kenway et al., 1994). Most of the higher
education has responded by adopting ICTs as part of the Moreover, asynchronous communication tools are
training for academic staff and students to maximize tools that enable the users to work in their own pace or
the usage of ICT capability in their organizations. self-directed usage. More importantly, asynchronous
student-to-student and student-to-teacher interaction
blended teaching and learning have been noted as the most important forms of in-
environment teraction when build an online component to a course
(Soo & Bonk, 1998). The review also revealed that
Teaching and learning environments often tend to forget interaction is critical when maintaining a students
when the higher education more forecast on technology. level of satisfaction (Fulford & Zhang, 1993). Finally,
Higher education has embedded the ICT technology the creating of blended learning strategies can provide
as a medium of communication, either synchronous or an opportunity which utilizes the best of multiple
asynchronous (Becker, 2000). These tools are divided environments (Zenger & Uehlein, 2001) and, when
just because of their usage in the teaching and learning designed appropriately, can help improve interaction
environment. There are five pillars for synchronous and and student satisfaction.
asynchronous to take part in the ICT technology: In addition, for the realization of particular methods,
a teacher is often bound to the subject domain taught.
For example, though project-based learning is a desir-
Blended Approach Environment Shift in Higher Education
able educational goal, it is difficult to realize in a sports supervise the lesson in a peripheral manner although
lesson. Likewise, the integration of e-learning has to unable to take part physically. By using new synchro-
be seen more strongly in its relation to the particular nous and asynchronous communication tools (e.g.,
subject domain; math courses might be more strongly e-mail, chat, shared whiteboard), new opportunities
related to a usage of e-learning than might be the case for collaboration emerge.
for domains like musical education or sports. Course planning in universities involves balancing
According to Lim (2002), all individuals (teachers, multiple objectives. Through years of experience in
learners, parents) participating at a teaching and/or face-to-face teaching, faculty members have generated
learning practice come together in a learning com- a great deal of knowledge and skill, which is often
munity. Among others, the community sets standards categorized by automatic routines and tacit knowledge.
for how students interact with each other, how com- The advent of Web and the growing of multimedia
munication should look between teachers and students, technology in the education industry is transforming
and how parents are involved in learning and teaching this context. It requires new course design procedures
practice. The interaction among the several participants to represent and teach content in new contexts. It re-
represents a strong subsystem, which depending on quires the use of new tools as well as the creation and
the particular school exhibits unique rule systems and transformation of artifacts. It also poses new problems
rituals. that require new kinds of support and collaboration
Last but not least, the quality as well as the form of since the faculty members may lack the technical abil-
e-learning is crucial for a consideration of teaching and ity to create their own blended course classes (Epper
learning practice. Beneath aspects like usability and & Bates, 2001).
ease of use, for each kind of software, several teach-
ing and learning practices are possible. For example,
e-learning can be used either as a tool (e.g., writing conclusIon
and graphics programs), as a medium for communica-
tion (e-mail, chat, instant messaging), or as a means The critical factors for success will change with
to store and distribute teaching and learning materials the implementation of the blended approach; prior
(databases). experience of using technology; the technological
infrastructure; and the lecturer will be the new key
blended content environment elements in the success of learning experience (Cannon
& Newble, 2000; Chao & Stovel, 2002). Universities
In designing ICTs, programmers as stakeholders have can help students achieve success by a combination
to take particular criteria into account: software has of theory, technology, and practice. First, the blended
to meet user needs. Decision makers especially were ICT environment, or the functionality of technology
concerned about a high ease of use, cost-effective infrastructure, should be ensured before the course is
purchasing, and administration opportunities as well as implemented. This should be backed up by techni-
a high potential for integrating the particular software cal support from either the lecturer or technological
into already existing software and hardware structures. expert. Second, in the blended teaching and learning
They further recommended software, allowing for environment, human resources should be committed
student tracking and online assessment. to the project at an early stage and lecturers should be
In contrast to higher education, for school settings, selected based on their attitudes towards technology,
opportunities for student assessment are interesting, as teaching style, and ability to control the technology.
they often restrict opportunities for cheating. Further, Finally, in the blended content environment, where
software is supposed to satisfy the anytime/anywhere subject domain which material development and also
concept, especially because it allows for a variety of the delivery system suitable the method approach. This
new opportunities for teaching and learning with ICTs is a paradigm elaborated in debates about existence,
to develop. That way, absent students are enabled to significance, and causes of the shifts towards neo and
catch up with the class progress, and absent teachers post-Fordism in the organization of work to which ICTs
are enabled to provide substitute teachers with relevant are argued to be central (Edwards & Usher, 2000).
information. Further, they are enabled to continue to
Blended Approach Environment Shift in Higher Education
E-learning is made up of several methods of learn- sity course. In P.L. Rogers (Ed.), Designing instruction
ing, which are enhanced or facilitated by technology. for technology-enhanced learning (pp. 114-133). Idea B
Technology implementation often stimulates teachers to Group Publishing.
present more complex tasks and material (Romiszowski,
Edwards, R., & Usher, R. (2000). Globalisation and
2004). Furthermore, technology will tend to support
pedagogy: Space, place and identity. London: Rout-
teachers in becoming facilitators. It delineates the kind
ledge/Falmer.
of classroom interaction that will establish a comfort-
able and respectful environment to promote a culture Epper, R.M., & Bates, A.W. (2001). Teaching faculty
for each learning style in the blended environment. how to use technology: Best practices from leading
This will include managing classroom procedures and institutions. American Council on Education/Oryx
creating an environment of respect and support. At this Press.
point of knowledge, the understanding of the blended
approach flow and communication tool is needed to Fulford, C.P., & Zhang, S. (1993). Perceptions of inter-
support and deliver between the ideas and technology action: The critical predictor in distance education. The
to enhance e-learning in higher education. American Journal of Distance Education, 7(3), 8-21.
Heinze, A., & Procter, C. (2006). Online communica-
tion and information technology education. Journal of
reFerences Information Technology Education, 5, 235-249.
Bajunid, I.A. (2005). Using the mediamorphosis Laurillard, D. (1993). Rethinking university teaching.
advantage: Developing personal autonomy of mind London: Routledge.
beyond cultural spin. Paper presented at MediaMor- Laurillard, D., & Margetson, D. (1997). Introducing
phosis International Conference 2005, Subang Jaya, a flexible learning methodology: Discussion paper
Malaysia. (Occasional Papers, Publication No. 7). Queensland:
Bates, T. (2000). Managing technological change: Griffith Institute for Higher Education.
Strategies for college and university leaders. San Lim, C.H. (2002). A theoretical framework for the
Francisco: Jossey-Bass. study of ICT in schools: A proposal. British Journal
Bates, T. (2003). Effective teaching with technology in of Education Technology, 33(4), 411-421.
higher education. San Francisco: Jossey-Bass Race, P. (2001). The lecturers toolkit: A practical
Becker, H.J. (2000). Access to classroom computers. guide to learning, teaching and assessment. London:
Communication of the ACM, 43, 24-25. Kogan Page.
BECTA. (2003). A review of the research literature on Romiszowski, A.J. (1981). Designing instructional
the use of managed learning environments and virtual systems. London: Kogan Page.
learning environments in education, and a consideration Rosenberg, M.J. (2001). E-learning: Strategies for de-
of the implication for schools in the United Kingdom. livering knowledge in the digital age. McGraw-Hill.
Retrieved March 4, 2008, from http://www.becta.org.
uk/research/research.cfm?section=1&id=545 Saunders, P., & Werner, K. (2002). Finding the right
blend for effective learning. Retrieved March 4, 2008,
Bersin, J. (2004). The blended learning book: Best from http://www.wmich.edu/teachlearn/new/blended.
practices, proven methodologies and lessons learned. htm
Pfeiffer, Wiley.
Scott, C.R. (2001). Comparing traditional and hybrid
Cannon, R., & Newble, D. (2000). A handbook for teach- online learning formats: Survey data from two large
ers in universities and colleges: A guide to improving courses in communication. Retrieved March 4, 2008,
teaching method. London: Kogan Page from http://www.ipfw.edu/as/tohe/2001/Papers/scott/
Chao, T., & Stovel, B. (2002). Nothing but the blues: A sld001.htm
case study in the use of technology to enrich a univer-
Blended Approach Environment Shift in Higher Education
Smith, J.M. (2001). Blended learning: An old friend to combine the face-to-face (in physical classroom
gets a new name. Retrieved March 4, 2008, from which supplemented with other electronic media such
http://www.gwsae.org/Executiveupdate/2001/March/ as video, interactive CD, etc.) and virtual classroom
blended.htm. (Web-based approach or online system).
Soo, K.S., & Bonk, C.J. (1998). Interaction: What does Blended Content Environment: Used towards
it mean in online distance education? Paper presented the development of content to accommodate a variety
at the 10th Annual ED-MEDIA/ED-TELECOM 98 of learning styles, teaching approaches, and available
World Conference on Educational Multimedia and technology tools including ICTs.
Hypermedia & World Conference on Education Tele-
Blended ICT Environment: Using technology
communications, Freiburg, Germany.
platforms from a variety of sources, either physically
Spodark, E. (2003). Five obstacles to technology inte- or virtually. This includes the ICT technologies which
gration at a small liberal arts university. T.H.E. Journal always support higher education.
Online. Retrieved March 4, 2008, from http://www.
Blended Learning: The integration between one
thejournal.com/
or more instructional methods which is applicable in
Troha, F.J. (2002). Bulletproof instructional design: A face-to-face and also supplemented by other media such
model for blended learning. USDLA Journal, 16(5). as other e-learning tools or ICT tools for communica-
Retrieved March 4, 2008, from http://www.usdla.org/ tion, either synchronous or asynchronous.
html/journal/MAY02_Issue/article03.html
Blended Teaching and Learning Environment:
Zenger, J., & Uehlein, C. (2001). Why blended will The usage of instructional technology and pedagogical
win. Training and Development, 55(8), 54-62. methods strategies that reflect on teaching and learning
situations. It also considers the multi-agent support for
teaching and learner support.
Key terMs Synchronous Communication Tool: Consider
the physical classroom equipped with the ICT tools
Asynchronous Communication Tool: A tool for the for teaching and learning that also support the com-
event in which the students communicate at their own munications tools between educators and learners in
pace of time and anywhere. Examples are self-paced real-time. Examples are computer support workgroup
tools such as chat rooms, e-mail, discussion group, or system (CSCW) or computer-mediated communication
Web-based communication tool via Internet or short (CMC) where the students interact with the educators via
messaging system (SMS) via telecommunication. telephone or face-to-face supported by other media.
Blended Approach: Generated contextualized
guideline when teaching and learning in higher educa-
tion whereby the technology is available for educators
Section: Context ICT
Engagement, effort, pleasure, concentration, happiness The goals of the research are:
in exploring, trying and producing ideas, experience
and performance, cooperative action, all these aspects Understanding the ways in which 3 to 6 children
are very conspicuous when we observe young children use and explore new digital technologies and
using computers in educational settings. They seem interpret their meanings and functions at home
to love technology, computers, and digital networks. and in preschool settings;
How can we observe the way they approach, explore, Exploring teachers and parents ideas and repre-
discover, and use these very special cultural artifacts sentations with regard to the use of computers, at
(computers and digital networks), how can we in- home and in preschools, and to their educational
vestigate the ways in which they interact with them? roles;
We probably need a phenomenology of motivation Working out a methodological approach for the
(Lumbelli, 2000, 2001a, 2001b) aimed to develop study of these issues in early childhood settings
educational eyes capable of seeing children, who are and for eliciting and making explicit the educa-
experimenting and learning with ICT. This would pro- tional models;
vide a basis to develop and organize learning paths and Stimulating opportunities for dialogue and inter-
tools which may make the most of childrens energy pretation on issues like education and technolo-
while avoiding to waste their happiness to connect. gies, learning tools in the early years, collaborative
Today, observing and studying the way children gain learning, and so forth;
interest, explore and use computers, whether individu- Developing training materials based on this ap-
ally, with other children or with an adult, is a key issue proach. with computers in the early years;
in early childhood education, as it is connected with Outlining patterns for the development of new
adults educational ideas, and their influence on rela- media education for teachers and schools.
tions and teaching practices, as well as with the roles
children can play as mediators of shared experiences The basic assumption of our research is that in
(Bove, 2004; Ferri, 2004, 2005; Ferri & Mantovani, order for teachers and parents to promote an effective
2006; Mantovani, 1998; Mantovani & Musatti, 1996). and critical use of new technologies in the early years
The research project presented in this paper studies (especially in preschools) they need to gain a deeper
how children and adults explore the potential of new understanding of the way in which children spontane-
technologies in family and preschool settings. We took ously approach these technologies together with an
as our starting point some shots videotaped and dis- improved awareness of adults representations and
cussed through focus groups with teachers and parents, ideas (Ferri & Mantovani, 2006). Too often comput-
following the approach outlined by Joseph Tobin in ers and digital technologies are introduced in early
the study Preschool in Three Cultures: Japan, China, childhood contexts without adequate understanding of
United States (Mantovani 1998, 1996; Tobin, Wu, & their cultural meanings, cognitive, and social potentials
Davidson, 1989). or constraints, which is particularly true in preschool
settings as shown by Varisco (2002) and Albanense,
Migliorini, and Pietrocola (2000).
On these grounds, our research focuses on exploring
the way in which young children approach computers,
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Children and Computers
how they relate to theses tools (both at an individual in the work of same pioneer of this research field, Marc
level and at a social level), what they do with them Prensky (2001), Don Tapscott and Anthony Williams
and what they think about them. Along with observing (1998, 2006), Win Veen (2006). They spoke about a
children, we aimed at understanding the way in which new generation of learners identified by the metaphor
teachers and parents interpret the role of technologies of the Homo Zappiens.
in early childhood education and their educational This metaphor represents, for these scholars, a
responsibilities. generation that was born inside a digital world and a
Having among its goals a broadening of our theo- computer screen as a window to the world (Tapscott,
retical understanding and the development of training 1998). This generation has grown up with technology
materials, our research is based on the assumption that and learns through computer screens, pc-games, explo-
creating dialogue opportunities (focus groups) may ration, and show non-linear learning behaviour.
promote higher awareness and deeper understanding of The New Millennium learner are not born in the
the role played by new technologies in the early years. Gutenberg Galaxy. They are digital kids, navigate ef-
Creating this kind of dialogue may also help provide ficiently and effectively through digital information,
a sound basis to the design of a way to mediate the they know how to communicate, and how to build
introduction of technologies in early childhood (Rogoff, effectively knowledge in a network of peers. Experi-
2003, 2001; Siraj-Blatchford, 2004). encing these digital information flows, kids develop an
Observing the first natural approaches to computer exploratory learning approach trying to give meaning
and web technologies, the changes in systematic use of to the information provided (Veen, 2006). As learners
tools, the cognitive strategies and the relational patterns they adopt an exploratory approach, just like in gam-
involved is a way to clean up our minds from adults ing, they start learning without knowing the real goal
prejudices on childrens use of technologies. For exam- of tasks. They define their own goals, finding out the
ple, videotaping and observing young children in front available tools and defining the appropriate strategy to
of computers helps us understand how the solipsistic achieve their goals (Veen, 2006). Through this explora-
concerns and the social exclusion concerns associated tory approach kids develop a number of meta-cognitive
with the use of computers are only teachers, parents skills directly related to learning. They are self-directed
and scholars fears: young children always approach learners, and they adopt very often a problem solving
computers and networks in a cooperative way and get approach to learning subjects. This behavior looks like
bored of them very fast. Obviously, we are talking a consequence of the use of technologies. New Mil-
about educational software and not about videogames lennium learners have worked out new strategies that
(Ferri & Mantovani, 2006, pp. 75-121) contrast with those of the former Gutenberg learners
As early as the 1980s, Robert Taylor (1980), in his generation. They are also an open source generation;
book The Computer in the School: Tutor, Tool, Tutee, cooperation for them is better than competition. They
put forward the idea that, at school, digital technologies show a different behavior in dealing with learning
could play three different roles: tutor, tool, and tutee. and communication. What appears crucial here is
Its clear that each of these roles depends on the kind that learning has evolved from an individual activity
of dialogue established between the computer, intended of internalizing knowledge towards a social process
as a teacher, and the student. Some software thought to of externalizing knowledge. Although educational
teach, stimulates a real dialogue between children and theories have stressed this social activity of learning
computers. In the same way, on line communication soft- even before technology became predominant in the
ware mediates symmetrical and unsymmetrical com- lives of young learners, it is through technology that
munication between teacher and student and through humans have now become nodes in technical networks
specific interfaces. They moreover permit a new kind (Veen, 2006).
of technology mediated of peer-to-peer relationship. In These are fruitful hypotheses and this is a fruitful
spite of that, only a few scholars, has yet defined a way field of research, if related with an experimental field
to study how analyze the relationship between children analysis that can permit us to verify these issues.
and computers and a way to understand educational and Our research goal is to understand the role that
communicational patterns that children work out with digital technologies may play in the different learning
digital learning tools. Some suggestion can be founded phases of child cognitive development. Therefore, it
Children and Computers
will be very important to study the way children gain have done videotapes with 3-6 children and computers
interest, explore and use computers and get bored with (at home and in preschool) and we have used them not C
technologies. And it will be very important to do so, primarily as data, but as tools to stimulate a multi-vo-
observing children on their own, with other children or cal dialogue (Bove, 2004). Three municipal preschools
with adults, because this melts with adults educational have been involved in our research and others will be
ideas, with related consequences in educational relations involved in the future. (Scuola Comunale Clericetti,
and in didactics, and with the behaviours of children as Milan; Scuola Andersen, Vimercate, Scuola Costa,
mediators of shared experiences in online environments Milan; these schools are also part of the Bambino
of cooperative construction of knowledge. autore project, www.bambinoautore.org). So far,
To achieve these goals it will be necessary to consider videotapes have been discussed with teachers and the
critically and deeply investigate filmed video material discussion will be extended to parents in the second
also in order to understand some specific educational phase of our research (Bers, 2004).
aspects: We assume that the way in which children explore
and use computers (individually, with other children
a. The meaning of the expression projects for or with adults) is strictly linked to the adults ideas and
digital education, both in CMC and hyper tex- beliefs and to their educational models and representa-
tual environments, with special attention to the tions. In our study, the voices of parents and teachers
design of hardware and software interfaces. Some will therefore enrich our interpretations and extend
software propose an institutional, repetitive use the repertoire of possible educational practice with
of technology, but is there an effective way for technologies. We also assume that by studying the way
introducing computers in preschool settings and in which children approach computers will promote
for promoting user-friendly patterns of interaction higher awareness of how children can be considered
with these tools in the early years? as mediator of a broader collaborative experience of
b. The way digital tools (hardware and software) learning based on the use of digital technologies.
can be approached by children of different ages. We will also conduct some microexperiments using
Its important to analyse the role of some instru- our previous findings as the starting point for creating
ments/tools (keyboard, mouse, and screen) and it settings of semiexperimental observations; this will
is also important to study the best way to design help us create educational settings for cooperative
these output and input peripherals according to learning and e-learning with children.
childrens needs;
c. Analysing the best way to introduce children
to usage of cooperative tools for on line com- descrIPtIon oF the research
munication (LCMS for e-learning), in order to PrograM
avoid communicative autism that some e-learning
methodologies imply. Our research program includes the following phases
d. The definition of concrete learning paths with (most of them already accomplished) :
the aim to help political stakeholders teachers
and parents to be able to overcome the digital 1. Observation of children-computers interaction
divide with their children. based on an etnographic-visual dialogical
approach that considers learning situations as
social contexts, with the purpose of generating
Methodology a qualitative field of research. This phase com-
bines qualitative research tools (observations and
The core method of this study follows the approach interviews) with anthropological research tools,
taken by Tobin, Wu, and Davidson in the seminal study usage of video materials as reactor and focus
Preschool in three cultures (1989) and combines the groups (Tobin Wu, & Davidson, 1989). Direct
use of video as stimuli to provoke discussions and observation will be one of the tools used during
sharing among adults with some qualitative research the research on the field. Paths of observation
tools, such as narrative interviews and focus groups. We will be created, using narrative and descriptive
Children and Computers
modalities, together with almost experimental Francesca Bossi). The LCMS has been custom-
methods. Videos will be taken both in family and ized to be used directly by young children and
schools settings. Based on this, it will be easier teachers for discussing and sharing knowledge
to formulate the hypothesis that will lead the with other schools and with parents.
almost experimental observation, which can 6. On the basis of the results of previous phases,
be modified or improved by the observer. new operative and blended educational paths
2. Micro experiments by which it will be encour- for teachers will be built and implemented.
aged the control of some explorative behaviours
with ICT on the part of children. Field observa-
tions on the use of some tools and cooperative research results
environments of e-learning were conducted in
several schools: We outline here some of the findings that emerge from
our video ethno-dialogical observation. The use of
Scuola Comunale Clericetti, Milan; video-ethnography Tobin, Wu, and Davidson method,
Scuola Andersen, Vimercate; have permitted to create a semiobjective video mate-
Scuola Costa, Milan; rial. In order to better understand the way young child
The group of Scools that participate in the interact in the very first years with computers, and in
project Bambino Autore (www.bambinoau- order to make more affective the results of focus group
tore.it) with teachers and parents. In our view the emergent
phenomena, we observed, in the approach of young
3. Discussion of videos and observation highlights in children (K3/6) to computer:
focus groups with teachers and parents to build and
validate the first data collected through observa- New paths and new ways for cooperative learn-
tion based on a dialogic and narrative approach, ing, in the peer-to-peer relationship in the use of
with the aim of creating exchange and sharing computers and ICT
of the hypothesis formulated on the collected The adoption by the children of a cognitive mul-
material by the research group with teachers and titasking style in using computer and an intense
parents. The Video made during the first phase use of video and musical code (Veen, 2003; Veen
will be used to stimulate exchange among par- & Vrakking, 2006)
ticipants according to the method of visual and Multiple intelligence at work (Gardner, 1993)
vocal ethnography already experimented (Tobin, through multimedia devices: emphasis on video
Wu, & Davidson, 1989) and graphical and musical intelligence. Exit from
4. This phase provides for discussion of first findings only alphabetic paradigm in learning and teach-
based on field observation and research hypoth- ing (Bolter & Grusin, 1999)
esis, through interviews, research meetings and New peer to peer interaction (mostly written) and
focus groups organized by researchers, national multimedia communication, less deep personal
and international public and private research and communication, as results from the observation
teaching Institution. of the children working in the Bambino Autore
5. Design and development of supporting tools Project www.bambinoautore.it
(virtual classroom, KM tools) for children and A tricky use of grasshopper mind (Papert, 1994):
teachers communities, with the aim to create, Bite and runDistractattention.
share and manage knowledge according to the A new mediated way to construct and share
co-constructed method of introduction of ICT in the world both individually and socially through
school. This technological part of the project has media (user generated content, mobile phone
been developed as a part of the LCMS open source video, sms, vsm(Goodmann, 1978).
Docebo. This LCMS system has been designed
by the software house Docebo srl, in cooperation We can now better understand how the use of ICT
with the University of Milan-Bicocca e-learning changes the cognitive skills of children and young
team (Paolo Ferri, Andrea Garavaglia, Livia Petti, people in many ways:
Children and Computers
Stressing a multitasking use of media. Our research The digital native phenomenon (Prensky, 2001)
parents and teachers focus group strongly agree (it is not clear if this concept is exactly similar C
with this idea. Their children use a multitasking to NML) appears relatively late. It starts with
approach in gaming, playing and learning. Some- children born after the 1993, not earlier. This
times they feel this difference with fear they are probably happens because of the gap between
not able to act in this way. Italy and U.S. and Northern Europe in the spread
Promoting cooperative learning. This is the way of computers at home and in the school. The first
children adopt also when they are very young, 2-6 serious government plan for new media introduc-
years, in approaching computers and ICT. As our tion in the school in Italy was built up in 1996
observation demonstrates, they very rarely stay (PSTD - plan for the development of instructional
alone when they are using a computer al school technology).
Learning by doing the ICT and with the ICT is The use of ICT is mostly a domestic phenomenon,
strongly preferred by the children we observed. the use in the school is rare and limited to only a
Emphasizing the need of metareflexion on practi- few days per month. Theres in fact a big divide
cal experience lead by teachers. between the family, the social appropriation of
Online communication, especially instant mes- ICT and its use at school (both at primary and
saging, text messaging, and so forth, are very secondary levels).
spread pattern of ICT use (mobile phone instant There is no specific formal teachers training on
messaging) also in the 6-10 range of age. In Italy technology of education and new media education,
(i.e., the context we analyzed) the use of mobile except for the Indire PuntoEdu project. Unfortu-
phones is a tool used by nearly all children both to nately the technological culture is not an issue for
communicate with peer (mostly in a written way the Italian scholastic system. And the children and
- SMS-) and with parents (voice communication). young girls and boy use very rarely technology
Parents use mobile phone not only to communicate as creative and free tool for education.
with children but also as control/care tool. Mobile Gender issues are fundamental, particularly in
phone, in Italy has become a mediated tool for the early childhood years. Teachers in primary
parental care. In the school the mobile phone is school are mostly fifties born female (the baby
forbidden and teachers are very concerned about boomers generation). They, as our focus group
the children use of such a technological tool. In pointed out, learn technology mostly from the
the same way they are very concerned about video romantic partners. In the same way they perceive
game and video user generated content. technology as male, mechanical, and alien. Thats
Children at home, as testified from our observa- why they are very resistant to introduce ICT with
tion, learn from their parents to use a modeling kids and female world.
style, at school this style is very rarely adopted Gender issues interact also with the way female
by the teacher. baby boomers teachers (90%) use technology
In Italy, children form extraEuropean countries, with kids. They are mostly scared that computers
use intensively ICT because ICT (Skype at the can transform kids into machines.
Internet caf, e-mail, etc.) is useful to keep in touch From the point of view of educational innovation,
with their parents. It can help their integration in we point out that it is not a technical issues but a
school because they have an excellence skill to cultural issue. In training teachers to new tech it
share with pairs and teachers. is far more important to investigate which kind
In our view children often dislike educational of prejudices they have on technology than train
software because in their experience this soft- them about technological issues. Understanding
ware is worst designed and low budgeted than and sharing the meaning of resistances and preju-
video games and commercial Websites on the dice is very important for overcoming them.
Internet.
0
Children and Computers
Fabbri, L. & Grassilli B. (2003). Didattica e metodo- Papert, S. (1993). The childrens machine: Rethinking
logie qualitative. Verso una didattica narrativa, La school in the age of the computer. New York: Basic C
Scuola, Brescia Books.
Ferri, P. (2005). E-Learning. Didattica e comunicazione Papert, S. (1996). The connected family: Bridging
e tecnolgie digitali, Le Monnier, Milano the digital generation gap. Atlanta, GA: Longstreet
Press..
Ferri, P. (2004). Fine dei Mass Media. Le nuove tecno-
logie della comunicazione e le trasformazioni dellin- Papert, S. (1998). Does easy do it? Children, games, and
dustria culturale. Guerini & Associati, Milano. learning. Game Developer, Soapbox section, June.
Ferri, P. & Mantovani, S. (2006, a cura di). Bambini Papert, S. (1999). Logo philosophy and implementa-
e computer. Alla scoperta delle nuove tecnologie a tion. Logo Computer System inc., disponibile anche
scuola e in famiglia, Etas, Milano.Garavaglia A. (2006), parzialmente on-line al sito:http://www.microworlds.
Ambienti per lapprendimento in rete:gli spazi delle- com/company/philosophy.pdf
learning, Junior, Bergamo.
Prensky, M. (2001). Digital game-based learning. New
Gardner, H. (1993). Multiple intelligences: The theory York: McGraw-Hill.
in practice. New York: Basic Books.
Rogoff, B. (2003). The cultural nature of human devel-
Geertz, C. (1973). The interpretation of culture. New opment. New York: Oxford University Press.
York: Basic Books.
Rogoff, B. Goodman Turkanis, C., & Bartlett, L. (Eds.)
Goodman, N. (1978). Ways of worldmaking. Indiana- (2001). Learning together: Children and adults in
polis: Hackett Pub. Co. a school community. New York: Oxford University
Press.
Griswold, W. (1994). Cultures and societies in a chang-
ing world. Thousand Oaks, CA: Pine Forge Press. Siraj-Blatchford, J. (2004). Developing new technolo-
gies for young children. New York: Trentham Books.
Healy, J. M. (1998). Failure to connect. How comput-
ers affect our childrens minds. New York: Simon & Tapscott, D. (1998). Growing up digital, The rise of the
Schuster Net generation. New York: McGraw-Hill.
Lumbelli, L. (2000). La televisione tra ludico e lu- Tapscott. D. & Williams, D. A. (2006). Wikinomics:
diforme. CADMO. Giornale italiano di pedagogia How mass collaboration changes everything. London:
sperimentale, 22, 7-18. Penguin.
Lumbelli, L. & Zidari, C. (2001a). Televisione e multi- Taylor, R. P. (Ed) (1980). The computer in school: Tutor,
media: quale comprensione?. Ikon, 43/44, 7-20. tool, tutee. New York: Teachers College Press.
Lumbelli, L.(2001b). La comprensione di testi come Tobin, J. J., Wu, D. Y. H., & Davidson, D. H. (1989).
farsi e disfarsi del problema. In M. Bagassi, L. Preschool in three cultures. New Haven, CT: Yale
University Press.
Macchi e M. Serafini, G. (2001, a cura di), Discorsi e
pensieri. Bologna: Il Mulino. Varisco, B.M. (2002). Costruttivismo socio-culturale.
Il Mulino, Bologna.
Mantovani, S. & Musatti T. (1996). New educational
provision for young children in Italy. European Journal Veen, W. (2003). A new force for change: Homo Zap-
of Psychology of Education, 11(2). piens. The Learning Citizen, 7, 5-7.
Mantovani, S.(1998 a cura di). La ricerca sul campo Veen, W. & Vrakking, B. (2006). Homo zappiens,
in educazione: i metodi qualitativi, Milano: Bruno Growing up in a digital age. London: Network Con-
Mondadori. tinuum Ed.
Merlo, S. (2006, a cura di), Il Bambino Autore. Comu-
nicare e cooperare in Internet, Junior Bergamo
Children and Computers
Children and Computers
Alternatively it can be combined with any of one of Technology: Despite its cultural pervasiveness,
over 60 other subjects such as psychology, history, or technology is an elusive concept. It can refer to material C
sociology. objects, such as machines, hardware or utensils, but it
can also encompass broader themes, such as systems,
Education: Education is the process by which an
methods of organization, and techniques. It is an ever-
individual is encouraged and enabled to fully develop
evolving body of knowledge that both shapes and is
his or her innate potential; it may also serve the purpose
shaped by societies. The proliferation of new technolo-
of equipping the individual with what is necessary to
gies, such as computers, has left some people believing
be a productive member of society. Through teaching
that technology is a determinant force in society, or in
and learning the individual acquires and develops
other words, that it is an autonomous agent that drives
knowledge, beliefs, and skills. It is widely accepted that
change. It would be more appropriate to discard this
the process of education begins at birth and continues
reductionist approach, and regard technology as one
throughout life. Some believe that education begins
component of a multi-faceted cultural matrix, which
even earlier than this, as evidenced by some parents
includes social, political, historical, and economic
playing music or reading to the baby in the hope it will
factors that work together to spawn change. The word
influence the childs development. Education is often
technology originates in the Greek words technologia
used to refer to formal education. However, it covers a
(), techne (, which means craft), and
range of experiences, from formal learning to the build-
logia (, which is saying or ordering, in the
ing of understanding and knowledge through day to day
sense of arranging).
experiences. Ultimately, all that we experience serves
as a form of education. Individuals receive informal
education from a variety of sources. Family members,
peers, books and mass media have a strong influence
on the informal education of the individual.
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Classics Teaching
Classics Teaching
Section: Process ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Collaborative Knowledge Management (CKM)
Figure 1. Some common issues organizations have while implementing knowledge management systems
that exists in organizations, an authoring process (also and language in particular. Think about itand youll
referred to the content management process) must be think in wordsand only those that your socio-cultural
undertaken that categorizes and places important in- background gives meaning to. ... Now think about a
formation into a shared resource (often referred to as a culturally diverse, or even global, corporationand
knowledge repository) that can be assessed by all rel- its need to speed up the acquisition and mobilization
evant stakeholders. According to Plewes (2004), CKM of knowledge. (p. 12)
differs from navigational knowledge management,
which is more focused on trying to glean knowledge An organization cannot solve this problem by
(typically through using search tools) from the infor- eliminating cultural diversity because, as Dove points
mation that companies have collected. out, that would impair the important innovation po-
Collaboration should be across departments, various tential (p. 12). So, as new knowledge is added into
types of employees, and different types of projects. the repository, the authoring tools and processes must
An effective CKM system should have access points find a way to quickly and effectively transfer it into a
across the entire organization (Dove, 1999) similar format that can be utilized by multiple people within
to a matrix structure (which leads to some interesting the organization. This authoring process, if effective,
system security and access/platform issues). One of the will create a common language of knowledge or a
potential difficulties that some authors see in CKM is collaborative culture (in the words of Dove, 1999).
that knowledge does not exist in a vacuum but comes This theoretically should increase the ability to col-
loaded with various sociocultural meanings as well. In laborate together across the organization and increase
an article entitled Knowledge Management, Response the amount of common organizational knowledge
Ability, and the Agile Enterprise, Dove describes the (potentially increasing the overall corporate IQ). This
following situation: common knowledge shared in a collaborative manner
across the organization should lead to an increase in the
Think of an American product development manager competencies (e.g., knowledge, skills, and abilities) of
receiving a Chinese-language email message explaining the individual members of the firm. However, managing
a product innovation methodology rooted in the Taoist these human assets is an area that is typically outside
teachings of Lao-Tse(even though) it was translated the purview of CKM.
perfectly ... cognition is shaped by culture in general
Collaborative Knowledge Management (CKM)
Collaborative Knowledge Management (CKM)
0
Collaborative Knowledge Management (CKM)
and video connections and capturing/recording of screen content management system. The architecture should
images). In addition, there can be more integration be such that content can be accessed from distributed
between CRM systems (what customers think about sources more or less as if they all came from a single
new products), SCM systems (how many new products data store. (Smith, 2001, p. 24)
are being sold), CAD systems (suggestions of product
improvements), and so forth. Also, in the future, CKM In order to complete the future-based model, KM-
systems will gradually support more and more of the specific systems are included in the CKM area which
natural interactions between individuals and integrate can be seen in Figure 4.
this knowledge with other forms of information that Integration with applications from across the
are more easily captured (Smith, 2001, p. 24). This organization will become increasingly necessary for
system integration will bring together knowledge, CKM systems to achieve the potential that many have
information and data from potentially disparate sources, dreamed for them. The following example shows the
and present it to the user in a comprehensive fashion importance of complete integration across a variety
(Smith, 2001, p. 24). of systems:
Systems that typically have been at the heart of a
CKM system are true KM systems, learning manage- Email conversations are now commonplace in a
ment systems (LMS), electronic performance support modern office environment, and significant informa-
systems (EPSS) and knowledge databases or reposi- tion exchange and decision making takes place via
tories. In many examples, there will be: this medium. Unfortunately, however, each individual
is typically responsible for filing and extracting any
a variety of databases, document repositories and valuable information for later use, and at best, this
corporate applications that will need to be integrated takes the form of a simple folder for each project or
to form the holistic view. Databases and documents topic. In addition, e-mail conversations can take place
stores are ideally integrated through an underpinning in parallel to, for example, discussion group threads
Collaborative Knowledge Management (CKM)
Collaborative Knowledge Management (CKM)
tems is that it could ultimately lead to a companies Review of executives opinions regarding HR and its
ability to: contributions. (n.d.). SHRM. Retrieved March 5, 2008, C
from http://www.shrm.org/research/hrreview.asp
Remain competitive;
Smith, M. (2001, February). Collaborative knowledge
Adapt to a rapidly changing environment;
management as a necessary business imperative (Ver-
Be able to innovate;
sion 1.0, pp. 23-24).
Respond to the demands of e-business;
Fully capitalize and develop its people; and Tanner, M. (2004, October). Theres no such thing as
Support effective relationships with suppliers, enterprise technology. MSI Mag, p. 58.
partners, and customers (Smith, 2001).
Taylor, D. (n.d.). Human capital management. Inside
Learning Technologies. Retrieved March 5, 2008, from
http://www.learningtechnologies.co.uk/magazine/ar-
reFerences
ticle_full.cfm?articleid=105&issueid=12§ion=1
Brown, G. (n.d.). Human capital ROI study: Creating Vequist, D., & Teachout, M. (2006, May). A conceptual
shareholder value through people. Deloitte & Touche. system approach for the relationship between collabora-
Retrieved March 5, 2008, from http://www.deloitte. tive knowledge management (CKM) and human capital
com management (HCM). Paper presented at the Meeting
of the 2006 International Symposium on Collaborative
Cheese, P., Brakeley, H., & Clinton, D. (n.d.). The high-
Technologies and Systems (CTS 2006).
performance workforce study. Accenture. Retrieved
March 5, 2008, from http://www.accenture.com
Dove, R. (1999, March). Knowledge management Key terMs
response ability, and the agile enterprise. Journal of
Knowledge Management, pp. 11-16. Collaborative Knowledge Management (CKM):
This is a system to capture the information that is in
Drucker, P. (1959). Landmarks of tomorrow (p. 122). peoples heads and share it in a collaborative manner.
New York: Harper. In order to make use of the knowledge that exists in
organizations, an authoring process must be undertaken
Hayden, T. (2004). The age of collaborative knowledge
that categorizes and places important information into
management systems: A technical view. Retrieved
a shared resource (often referred to as a knowledge
March 5, 2008, from http://www.scs.org/scsarchive/
repository) that can be assessed by all relevant stake-
getDoc.cfm?id=2060
holders.
Human capital management: The CFOs perspective.
Customer Relationship Management (CRM):
(n.d.). Mercer. Retrieved March 5, 2008, from http://
This is a software solution that helps enterprise busi-
www.mercerhr.com
nesses manage customer relationships. CRM systems
Kitter, S. (2005, November/December). Mapping an are databases that may contain detailed customer infor-
Intranet strategy. KM World, pp. 1-3. mation about customers so they can be matched with
products, service requirements, and so forth.
Laise, D., Migliarese, P., & Verteramo, S. (2005).
Knowledge organization design: A diagnostic tool. Electronic Performance Support Systems
Human Systems Management, 24, 121-131. (EPSS): These systems support a worker so that they
will be more successful and productive in their work.
Newman, B. (2005). Retrieved March 5, 2008, from
It can be any type of electronic system that supports
http://www.km-forum.org/what_is.htm.
workers with flows of data and information. These
Plewes, A. (2004). Portals and knowledge manage- systems are very important in the new age of work
ment: Doors opening. Retrieved March 5, 2008, from because workers have become inundated with data and
http://www.silicon.com/research/specialreports/por- information, and it is imperative that they learn how to
tals/0,3800002620,39120265,00.htm. organize and consolidate it quickly and accurately. The
Collaborative Knowledge Management (CKM)
payback for EPSS lies in its ability to adapt, change, Learning Management Systems (LMS): This is
and evolve to meet the changing needs of workers who a software system that tracks employee training and
utilize these systems. possibly competencies. Typically, a LMS will track
individual worker progress, record scores of quizzes
Human Capital Management (HCM): This refers
and tests within an online learning program, and track
to the management of the human capital or competencies
course completions. May be integrated with a Human
that exist within the organization. Just as in KM, HCM
Resources Information System (HRIS).
is a method that if the assets (competencies residing
within employees) are not managed and utilized within Web-Based Training (WBT): This is a form of
the organization, then the organization will not derive computer-based education or training where the train-
the competitive advantages they offer. ing material resides on the Internet and is accessible
using a Web browser. This form of training typically
Knowledge Management (KM): The process by
incorporates multiple types of media elements into the
which an enterprise consciously and comprehensively
content including text, graphics, animation, audio, and
gathers, organizes, shares, and analyzes its knowledge
video. May be facilitated by a trainer or be in a self-
to further its aims. This knowledge is usually gathered
directed, asynchronous format.
and stored in a knowledge repository.
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
E-Learning EXPO Experience
2005 edition of the eventstudents and the discov- it acted as a sounding board, that e-learning is coming
ery of knowledgeare paradigmatic (Litto, 2005). closer to and interacting more and more with knowledge
He pointed out how technology and e-learning are the management, indeed the overlapping of these two areas
precursors of a totally new reality which cannot be is such that is difficult to draw a clear separating line
divorced from technology, virtual communities and between them.
multimedia knowledge, but must be considered in an It may be clearly deduced from the speakers presen-
intercultural approach. tations that, in view of the fact that this methodology
A concept, this, which is not applicable exclusively concentrates attention more heavily on the concept of
to the world of education and student training but has learning as opposed to teaching, the need to structure
the potential to become a new way of structuring and knowledge cannot be disregarded to enable profitable
sharing knowledge and the culture from which such use through the semantically and ontologically valid
knowledge derives. construction of individual if not personalised learning
The presentation given by Jeffrey Merriman of MIT paths.
(Massachusetts Institute of Technology) and Project The suggestions that emerge from a reflection on
Manager of OKI (Open Knowledge Initiative) was the topics covered in the course of this event are many
along the same lines. In a similar context he proposed a and varied, and they are determined by factors whose
paper with a title which highlights the perspective that importance is further heightened by the fact that they
this experience was intended to offer: Open Source are transversal to the areas in question, that is, that they
or Vendor Driver Solutions? Integrating the best of are to be found in worlds that, for reasons related to
breed of both worlds via Standards based Open Service both culture and tradition, appear to be distant.
Architectures. The development process that e-learning is un-
The main consideration on which the EXPO experi- dergoing is an explosive factor both in the world of
ence focused, a consideration which seems, moreover, education and in the professional training sector, as in
inevitable for the growth and integration of e-Learning the university and lifelong education. The same applies
in learning and teaching processes, derives from the to the world of business and finance, public adminis-
concept of interoperability and structuring of knowledge tration, the health sector and the world of sport all of
as a methodology for encouraging a sharing culture, as which are witnessing the development of projects of
this is the added value which e-learning can and must undeniable value, attesting to the growth of an online
offer to the society of knowledge (Poletti, 2006). and distance learning culture.
A consideration of such proportions leads to the The duality between technology and methodology
perception that e-learning is about to experience a period seems to be the driving guideline of research on e-
in which the enthusiasm typical of youth and the initial learning. EXPO has highlighted the need for the tools
phases of any innovation should not be abandoned but typically used in e-learning to be made the subject of
upheld through contemplation of its own role and the methodological reflection.
development of its own strategies which increasingly The first tool which, in this context, should be
portray it as a structural, and not a substitutive, element made the subject of reflection is the e-learning plat-
in the learning processes. form inasmuch as it embodies this constant duality
And here we have the complexity factor that emerges between technology and methodology, a duality that
in the course of this consideration: e-learning seems gives rise to a question around which a debate evolves,
to present new functions and new possibilities in all the purpose of such debate being to define which type
of the environments in which it is incorporated, at of education and which teaching methodology is be-
the same time, it cannot be structurally incorporated ing developed, which Learning Objects and for what
and interact with an environment, be it a learning or learning purpose.
a business environment, without changing and giving E-learning, and this EXPO experience is the demon-
rise to new perspectives in the setting in which it is strative proof, must get methodologists, technologists
integrated. and communication experts working together in a
It is clear from the considerations that the presenta- virtuous circle.
tions and meetings which EXPO hosted and for which
E-Learning EXPO Experience
E-Learning EXPO Experience
E-Learning EXPO Experience
possibilities. The various methods by means of which meaning of LOs but this agreement is accompanied
access may be gained to the Internet (from cell phone by a great deal of shades of meaning. One of the most C
to computer) are examples of interoperability, fruit of common definitions is that of David A. Wiley: An
the tendency to concentrate onto extremely advanced LO is any digital resource that can be re-used to sup-
technologies a wide range of services and tools. The port learning. In general, it may be said that LOs are
term interoperability has recently characterised the learning resources characterised by the fact that they
debate on Learning Objects (LO) where interoperability are available (as metadata) through semantic research,
becomes the point of focus so that LOs created in dif- reusable in various learning contexts, interoperable and
ferent contexts can be re-used in a variety of ways and modular, being aggregatable to form new LOs.
allow tracking of the students learning path. Interoper-
Lifelong Learning: A system based, of necessity, on
ability is linked to the use of protocols, one of the most
Internet technologies and on the sharing of information
important being SCORM (Shareable Content Object
with the aim of adjusting and improving professional
Reference Model), a dossier of technical specifications
skills. In particular, lifelong learning identifies a system
which enable, among other things, the exchange of e-
that guarantees people a good level of adaptability to
learning contents independently of the platform.
technological and organizational change. In general,
Learning Objects (LO): This is undoubtedly one lifelong learning is designed for those who having a
of the terms most widely used but one of the vaguest. working career that also involves professional refresher
There is a great deal of literature and agreement on the courses.
00 Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Computer Communication
0
Computer Communication
attitude and anxiety. Necessary and Parish (1996) students. Vygotsky (1978) developed the concept of
found that college students with little or no computer the zone of proximal development (ZPD) that has had
experience have more anxiety than those students that a great effect on how we regard teachers instruction
have experience. Their study revealed that increased and assessment in assisting students level of devel-
levels of computer experience and balance of weekly opment, which is reinforced by appropriate use of
computer usage were both related to reduced levels of instructional materials. This concept is defined as: the
computer related anxiety. distance between the actual developmental levels as
Agnetha Broos (2005) found that the influence determined by independent problem solving and the
of computer experience works in different ways for level of potential development as determined through
males and females. Computer experience has a positive problem solving under adult guidance or in collabora-
impact on decreasing computer anxiety for men, but tion with more capable peers (p. 86). This means that
a similar effect was not found for women. Glass and instructors help students to perform tasks that they
Knight (1988) argued that computer anxious students could not perform without guidance. Conversely, Wood,
would become less anxious after an initial trauma Bruner, and Ross (1976) use the term scaffolding
period. By working through this fearful or frustrating to describe situations in which adults help students to
stage students will gain experience, and thus reduce carry out tasks or achieve goals that students could not
anxiety. It is believed that the major factor in computer reach without this help. They qualified their statement,
attitude and anxiety is experience or rather inexperience. however, by stating that instructors need to know about
It is reasonable to assume that by increasing computer the performance qualities of their students in addition
usage one would reduce anxiety. Yet, for those who to understanding how to solve the task and before these
are computer anxious this may prove to be difficult goals can be achieved.
because there are varying degrees of anxiety and thus However, Tharp and Gallimore (1988) argue that
those who are highly anxious may completely avoid instructors also need to know how to scaffold their
computers (Orr, n.d). students. They developed a theory of scaffolding
Contrarily, a criticism of the increasing use of com- methods, which is based on the premise that a good
puters emerges in the prediction that new teaching and instructor is a master of simplification. It consists of
learning technology would replace teachers, textbooks assisting performance through the ZPD. The instruc-
and even schools. Also, it was anticipated that the major tor, trainer, or educator must be confident and capable.
method of learning by the year 2000 would involve for Any anxiety on the instructors part will have an effect
example, the use of modern technology like computers on the students. Instructors need to remain calm and
at all levels and in almost all subject areas (Borg, 1980). continue to encourage growth and exploration thereby
However, Crook (1994) found that this prediction does encouraging confidence in students and keeping the
not appear to be true. Research (e.g., Cohen, 1987; computer experience enjoyable and fun. Students (es-
Cuban, 1986) claims that the use of CM/ICT has to fit pecially those with prior negative experience) will need
into the teachers pedagogical view of teaching and to build confidence in order to change their attitude.
learning, and if introduction of computers in schools Instructors can help the student build self-confidence
is to be successful, one must start with the question of by providing successful experiences, especially in the
why they should be used and not how they should be early stages (Orr, n.d). Thus, effective teaching oc-
used. However, it appears that CC/ICTs are looked upon curs when assistance is offered at points in the ZPD at
as having a supplementary role in teaching-learning which students require it which increases their positive
(Postholm et al., 2002). Cuban (1993) maintained that attitude and lessens their anxiety about participating in
the dominant cultural norms with respect to learning, academic activities (Ololube, 2006a).
instruction and the nature of knowledge almost have a
neutralizing effect on students development. Postholm
et al. (2002) on the other hand argued that some features research Methodology and
of CC/ICTs must be seen as a potential that has to be FIndIngs
implemented in contexts of learning.
It was found that there is a significant relationship This study employed a survey research design to in-
between positive student attitudes and anxiety in the vestigate final year undergraduate students computer
use, integration and diffusion of CM/ICTs amongst
0
Computer Communication
communication and ICTs attitudes and anxiety. The Sub-Saharan African countries should not just be a
study also examined gender differentiations in relation dumping ground for technology if they are to develop. C
to their attitudes and anxiety. One hundred and twelve These requirements may sound daunting especially in
(n = 112) students were randomly selected from two view of the human and material resources needed to
public universities in Nigeria. The students were aged successfully implement them.
between 21-30 years. A self-designed questionnaire Overwhelming dependency on government has
that employed benchmarks from other similar stud- often left higher education institutions ill equipped
ies in the West was used to collect data for this study. to manage this difficult situation. CC/ICTs capacity
The instrument for data collection was made up of 20 building through managing information systems and
items. The questionnaire had a four-point Likert scale staff training are a thrust, but failure to address these
response pattern. These were: Strongly Agree, Agree, issues may lead to goal displacement, and higher edu-
Disagree, and Strongly Disagree and were weighted 4, cation institutions will be diverted from their primary
3, 2 and 1 respectively. The instrument had a reliability role of teaching and research. However, the major
coefficient of 0.79. The data collected were analyzed limitation to this article, this study, and most of the
using simple percentages of the Statistical Packages studies consulted concerning CC/ICTs is that they are
for Social Sciences (SPSS). descriptive by nature.
The research finding of this study indicates that Further examination of this subject matter will be
higher education students attitude and anxiety relates in order using a carefully stratified national survey
to the prior experience received during their early years in investigating the themes and concepts used in this
of education. The data (64.2%) suggests a correlation study. An in-depth and new perspective on CC/ICT
between the unpleasantness of prior experience and students attitudes and anxiety which not only take
their current attitude and anxiety toward computers. into consideration the unique characteristics of the
Evidence of this is the slow rate of use and integration variables used in this study, but other derivations, is
of CC/ICTs amongst Nigerian higher education stu- very much recommended. Additionally, further studies
dents. Students who have early access to CC/ICTs do could examine what specific measures are taken by
not have computer phobia. In general, female students developing countries to hasten the spread of CC/ICTs
(51%) had more negative attitudes and anxiety towards in their higher education system.
CC/ICTs than did male students (49%). The results
show a positive relationship between prior experience
with CC/ICTs and attitude and anxiety. This is in line concludIng reMarKs
with the studies of Parasuraman and Igbaria, (1990),
Agnetha Broos (2005) and Igbaria and Chakrbarti This research study focuses on computer communi-
(1990). In all, the studies revealed that experience cation and information and the attitudes and anxiety
makes it easier to use and exhibit greater proficiency toward communication technology amongst higher
in using computers. education students in a developing economy. It is
believed that CC/ICTs constitute an important force
in efforts to build an information technology society
Future trends and to join the international community in meeting the
millennium development goals. This study suggests
The disadvantaged position of developing countries that higher education the world over is a valuable ac-
including those in Africa within a global economy tor in providing students some of the resources needed
with regard to technology and information resources for their continued existence and development. This
is a situation that needs to be addressed adequately and is significant because higher education institutions
promptly (Colle, 2005; Ifinedo, 2005). Efforts toward are enduring entities that ensure and create the diffu-
transferring technology to Sub-Saharan Africa are on the sion of knowledge for national development. Society
way. However, an overhaul of the technology transfer depends upon institutions of higher education for its
process may be necessary, requiring the acquisition of growth and for the production of new knowledge, its
skills, knowledge, and abilities. In addition, making, transmission through education and training, and its
repairing and adapting CC/ICTs are equally necessary. dissemination through information and communica-
tion technologies.
0
Computer Communication
0
Computer Communication
Postholm et al. (2002). The teachers role when pu- Computer Anxiety: The state of fear or tension
pils use ICT as a mediating artefact in project work. of imminent contact with a computer that might be C
Retrieved March 13, 2008, from http://www.psy. inconsistent with the actual danger presented to com-
vu.nl/iscrat2002/postholm.pdf puter users. It has been associated with decreased use
and worse, avoidance that can seriously affect some
Sala, N. (2004). Web based teaching and learning:
students academic development. In addition, com-
Two swiss example. In Proceedings of the 2004 IRMA
puter anxiety if left untreated leads to ICTs use and
International Conference, USA.
avoidance.
Sam, H. K., Othman, A. E. A., & Nordin, Z. S. (2005).
Computer Communication (CC): The process by
Computer self-efficacy, computer anxiety, and attitudes
which people create, exchange, and perceive informa-
toward the Internet: A study among undergraduates in
tion using networked communication classifications. It
UNIMAS. Educational Technology & Society, 8(4),
also includes nonnetworked computers that facilitate
205-219.
encoding, transmitting, and decoding information.
Tharp, R. & Gallimore, R. (1998). A theory of teaching
Computer Phobia: Associated with the anxiety
as assisted performance. In D. Faulkner, K. Littleton,
about learning to use computers or not being able to
& M. Woodhead (Eds.), Learning relationships in the
learn to successfully use computers which is often used
classroom. London: Routledge & Open University
to basically mean avoidance or fear of learning the new
Press.
skills required by increasing use of computers in the
Tuomi, I. (2000). Beyond the digital divide. Retrieved school or workplace.
March 13, 2008, from http://www.cs.berkeley.edu/~jfc/
Digital Divide: The term used to explain the
hcc/retreat3/Divide.pdf
divergences between people who have and people
Vygotsky, L. S. (1978). Mind in society. The develop- who do not have the skills, knowledge and abilities in
ment of higher psychological processes. Cambridge: addition to access and resources to use new CC/ICTs
Harvard University Press. tools. This gap can exist between the educated and
uneducated, privileged and underprivileged, between
developed nations, developing nations, and those living
Key terMs in rural/urban areas.
Knowledge Society: An association of people that
Computer Attitude: The predisposition of a person have similar interests, be they social, economic, politi-
to respond positively or negatively towards computers. cal, cultural and so on and by making effective use of
It affects everything the person does with the computer their collective knowledge in their areas of interest
and in fact reflects what experience the user has and thereby contributing to further knowledge that will lead
is hence a determining factor of the users behavior to national progress and global development.
towards computers. Additionally, the users computer
attitude provides the user with a framework within
which to interpret the effect and the integration of
computer in the users life.
0
0 Section: Process ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Computer Simulations and Scientific Knowledge Construction
world can be simulated, providing that its behaviour Basically, two different technologies are used
can be described by a computer model (algorithm). to support simulations development. Multimedia C
Usually, a simulation model is an abstraction that simulations mainly use a two dimensional (2D)
behaves somewhat like the original system, thus representation to simulate the natural world, and, as a
allowing users to replicate only a small part of the consequence, they lack realism. Alternatively, virtual
actual system under investigation (e.g., its key features reality (VR) simulations constitute a realistic 3D, highly
or characteristics). interactive, multimedia environment in which the user
The common perception of a simulation is that of becomes a participant in a computer-generated virtual
an interactive computer program that replicates, within world. The key feature of VR simulations is real-time
limits, some object, phenomenon, situation, or process interactivity, where the computer is able to detect user
of the real or the imaginary world. There is a confusion inputs and instantaneously modify the virtual world
between simulations and other computer applications in accordance with user interactions. VR simulation
which have a similar-looking output like animations environments could be explorative or immersive. The
or visualisations. Simulations differ substantially latter consist of special hardware parts including head-
because they predict an output based on a series of mounted displays, motion-sensing data gloves, eye
inputs. On the other hand, computer animations do not phones, and others.
use any underlying model to calculate the behaviour
of the system while they simply display a series of
precalculated values. In conclusion, there are two key sIMulatIon desIgn
features which define a computer simulation (Thomas
& Milligan, 2004): The process of designing and building a simulation
is known also as modeling process. Modeling, in
A computer model of a real or theoretical system general, is a way of thinking and reasoning about
that contains information on how the system systems. The goal of modeling is to come up with a
behaves (formal entities, properties, and rules or representation that is easy to use in describing systems
relationships among them). in a mathematically consistent manner (Fishwick,
Experimentation can take place; for example, 1995). Moreover, modeling aims at the prediction and
the user can change the input to the model, thus understanding of the behaviour of the target system
affecting its output behaviour (Figure 1). under a range of conditions. The creation of models is
a dynamically evolving cyclic process, and, in general,
Two methods of simulation distribution are available: four main stages can be identified within it (Fishwick,
CD-ROM or Web-based format. A CD-ROM is suitable 1995; Thomas, 2003):
when the simulation material needs extensive memory
and it would be too time-consuming for the user to Conceptual model formation: This is an abstraction
download it from the Web. On the other hand, using a process whereby the designers define a simplified
Web format makes the material immediately available representation of the system. Conceptual modeling
from virtually anywhere in the world, independently of incorporates: (a) identification of the components
the computer platform used. Furthermore, material on of the systems and the boundaries or limits of the
the Web can be readily updated and easily structured corresponding model, (b) revealing and defining rules
through hyperlinking techniques, thus making clear and relationships between the various entities, and
the relationships between the various parts. (c) creation of new information in cases where there
Representation 1
Simulation model Representation 2
Input data
Representation n
0
Computer Simulations and Scientific Knowledge Construction
is no information available. During this stage, the There are two main ways of constructing computer
components of the system and their key relationships models: (a) programming languages (e.g., C, C++,
must be established (Covert et al., 2001). Finally, the Visual Basic, Java, etc.), which can be used to construct
designers must decide upon the characteristics of the simulation models from scratch, and (b) simulation
model, that is, its scope (application and people to use tools available for different types of modeling, for
it), its type (quantitative or qualitative), its structure example, dynamic systems (AgentSheets, Flexim,
(discrete, continuous, or hybrid), its behaviour (discrete Model-It, ModelMaker, PowerSim, SimQuest, Stella) or
or continuous), and its scale. For some systems, there discrete systems (Arena, Simul8). Simulation tools are
may be an analytic solution and a set of equations that usually domain-specific and therefore cannot be used to
define the model adequately; in others, the computer simulate systems of other domains in a reasonable way.
must be used to estimate a solution. Approximations Special simulation or modeling languages, like 20-sim,
or simplifications (e.g., ignoring rotation in the Dymola, Modelica, and so forth, are superior to ordinary
simulation of a projectiles motion) are introduced to programming languages since they provide particular
reduce complexity, computational requirements, and functionalities (time control, set manipulation, data
solutions time. visualisation, statistics gathering and reporting, and
Quantitative model specification: During this so forth) and rich model libraries. Supportive utilities,
phase, the appropriate mathematical equations such as multimedia authoring tools or VR tools, are
necessary to describe and model the system must also used.
be specified. These equations must be converted to Model execution and evaluation: In this stage,
an algorithm that can be executed on a computer. the simulation is executed on a computer and its
The computer model (algorithm) should accomplish performance is compared with that of the real world
three main properties (goals): (1) validity: it must be system. The simulation should be able to produce the
validated to ensure that it matches the target model and same sorts of data and input/output relationships that
its output reflects accurately the behaviour of the real were initially gathered. Once the computer model is
world system; (b) usability: to allow the researcher or constructed, the designers conduct experiments to solve
whoever will use the simulation to interpret its output problems in order to obtain a better understanding
and understand how it works; and (c) extendibility, to of the system. The model is regarded as being valid
allow designers or any future user to adapt the model as long as the simulation can accurately reproduce
for novel uses. A simulation is much more likely to be the real world data. A variety of factors can make a
extendible if it is written and documented by taking into simulation invalid quite apart from the fact that the
account this goal. Model specification is an iterative underlying equations might be inaccurate (for example,
process that is repeated until a sufficiently accurate errors in input data and programming, constraints of
model is obtained.
System Structure
Implementation Components
Redesign Scale
Model use
Conceptual model
Execution Algorithm
Evaluation Computer
Model
0
Computer Simulations and Scientific Knowledge Construction
the programming language, etc.). Techniques such as The only method for empirical investigation:
sensitivity analysis and validation of accuracy are used There are various reasons that do not allow an C
at this stage (Thomas, 2003). experiment or an observation to take place in order
Model use: Once the simulation has finally been to investigate a system (Axelrod, 1997; Feinstein
completed, it may be used as an empirical research tool & Parks, 2002). For example, simulations offer the
aiming at the understanding of the system. Thorough only possibilities for experimentation on ecosystems
research will inevitably reveal flows, deficiencies, or (Grant & Thompson, 1997; Lorek & Sonnenschein,
inadequacies of the model and will therefore lead to 1999). There are also ethical or safety concerns, for
model revision or redesign. This process may ultimately example, medical training (Gibson, Fyock, Grimson,
conclude to the development of an entirely new model. Kanade, Kikinis, Lauer, et al., 1998), car crash accident
A new modeling cycle may begin again (Figure 2), (Simpson, Johnston, & Richardson, 2003), or a nuclear
as the original system could be changed by proper war study. Finally, in many cases, there are needs for
interventions or refinements. time expansion or compression (a fast-fire starting or the
development of a new forest), spatial scale problems,
or extreme conditions not easily reached in laboratory
usIng scIentIFIc sIMulatIons settings, for example, galaxy formation (Meza et al.,
2003), climate models (Washington et al., 2000), and
Fundamentally, the role of scientific simulations is to so forth.
act as a virtual laboratory. During the last decades, they
have dynamically evolved as a new form of scientific
tool. Regarding their applications, simulations tend to educatIonal sIMulatIons
play one of the following subsidiary roles within the
framework of scientific research: Scientists create simulations on various domains, such
as technology, physics, chemistry, biology, medicine,
Complementary to empirical investigation: This environmental sciences, social and financial studies, and
can be done through experimenting or observing the so forth to facilitate their research, to express and test
natural world. There are numerous complementary their theories, and to improve their understanding about
benefits offered by simulations, especially in the cases complex systems. Scientific simulations are, usually, too
of complex systems described by many interrelated complex to be used in the various educational contexts.
variables, when the relationships between variables Educational simulations are created in order to facilitate
are nonlinear or when the underlying model contains students or trainees learning. Because of its purpose,
random variables, and so forth. Once a simulation has an educational simulation is an abstracted representation
been validated against real-world or experimental data, of the target system, which is neither as complex nor
it can be used to pose specific questions to predict the as realistic as the corresponding scientific one. De
outcomes of real experiments and provide a quantitative Jong and Joolingen (1998) have divided educational
basis of system study in order to help researchers in simulations in two main categories:
achieving qualitative understanding (Covert et al.,
2001; Hanan et al., 2002; Washington et al., 2000; a. Operational simulations: Operational
Wiechert, 2002). simulations are designed to facilitate the
Superior to empirical investigation: There are construction of practical knowledge, for example,
numerous reasons as to why simulations are considered in areas such as medical training, pilot training,
by many researchers as superior to the experimental and so forth (Gibson et al., 1998; Leemkuil et al.,
or direct observation of a system under study (Meza 2000). They are based on operational models,
et al., 2003; Washington et al., 2000); namely, which allow students to both practically and
simulations (a) allow more control, (b) allow more psychologically play the role for which they were
detailed investigation, (c) offer time compression or trained (e.g., the role of a surgeon or a pilot).
expansion, and (d) constitute a less dangerous and Operational simulations often use nonstandard
costly investigation tool. input and output mechanisms.
0
Computer Simulations and Scientific Knowledge Construction
overlay
0
Computer Simulations and Scientific Knowledge Construction
complexity increases the time required by students to Instructional design: First of all, one has to estimate
understand the simulation and so does the likelihood the learners attributes and their prior subject knowledge C
that they will become frustrated and demotivated (Bos, and also define the learning goals associated to the body
2001). By reducing simulation realism, therefore, the of domain knowledge to be learned. The following is
conceptual simulation designer can clarify complex or the design of students activities that will be performed,
difficult concepts and can tailor the simulation to the and the estimation of the didactical knowledge or any
students prior knowledge and experience. other relevant information from the didactics of the
The third component of a conceptual simulation, subject matter.
the instructional overlay, is made up of those features Learner interface: During this phase, we create the
defining the educational context and the representational simulation interface and embody the tools appropriate
forms used, the educational approach (discovery or to visualise and represent knowledge effectively
expository learning) and tasks used, and, finally, learner for the learners (graphs, tables, vector, or textual
motivation, guidance, assistance, and feedback (Hmelo representations). An educational simulation must
& Day, 1999; Lee et al., 2004; Leemkuil et al., 2000). offer different views of the underlying model from
A well-designed instructional overlay can: (a) prompt textual to graphical representations. As Ainsworth
and motivate students, (b) incorporate questions that (1999) has shown, different representations used
will direct students towards educational goals, (c) simultaneously can constrain interpretation, construct
focus students attention upon educationally important deeper understanding, or complement each other.
aspects of the simulation, and (d) progressively unfold Pedagogical strategies: In general, pedagogical
the complexity of a simulation over a series of stages strategies define how learning is approached within
in order that students not be overwhelmed by it. the system (e.g., exploratory or discovery learning; this
Creating a model of a single object or event is determines the models to be discovered or experienced
usually an easy task. However, a simulation model of an by the learners). Another issue is the instructional
entire virtual world, in which all objects and events are interventions to be incorporated (e.g., explanations,
represented in a consistent and complimentary manner, exercises, tasks, or other type interventions).
requires a great deal of mental and creative effort. Simulation model creation: This phase
Moreover, developing computer-based simulations incorporates identification and definition of
for learning is not only a technical matter; however, the underlying simulation model (parameters,
such systems should combine both modeling and relationships among them, limits, representations used,
instructional knowledge with a pedagogical strategy models type, structure and behaviour, user interface
(Joolingen & de Jong, 2003). interactions, student supporting tools, etc.)
The following interrelated parameters (phases) could Integration: All the information and the outcomes
define a consistent framework for building efficient above should be integrated to a complete system capable
education simulations: to support students meaningful learning and teachers
role as efficient facilitators (Figure 4).
Integration
Computer Simulations and Scientific Knowledge Construction
Computer Simulations and Scientific Knowledge Construction
at helping students achieve conceptual understanding. and relations in order to support their lecture or
Students active engagement with didactical models explanations C
is essential to overcome conceptual obstacles and As a virtual laboratory representing an
construct scientifically valid conceptual models. Bliss exploratory world where students can use models
(1996) has also analysed the differences between two to conduct experimentation, to create and test
types of models in educational simulations. hypotheses and, finally, construct their own
understanding
a. Exploratory models: They are constructed by As a student activity, which aims at students
experts to represent domain knowledge and/or constructing and presenting their own (expressive)
simulate complex processes and laws. These models through a meaningful learning
environments encourage students to explore experience.
and interact with them, to handle various input
parameters and, finally, to observe their results. Computer simulations have been successfully
b. Expressive models: They allow students to applied from primary and secondary schools (Davies,
express their own ideas on a domain. They 2002; Huppert et al., 1998; Jimoyiannis, Mikropoulos,
provide learners with tools to define relationships & Ravanis, 2000; Pallant & Tinker, 2004; Tao, 1997)
between concepts, explore the consequences of to university education (Granlund, Berglund, &
those student-defined relationships, and learn Eriksson, 2000; Hundhausen, Douglas, & Stasko, 2002;
through an active process of representing their Schroeder & Moore, 1993; Warner, Catterall, Gregor,
own models. & Lipson, 2000) covering various disciplines. There
are many studies providing us with supportive evidence
In this framework, we have suggested that regarding the effect of computer simulations to activate
educational simulations can be used in three different students to motivate them in order to perform at higher
ways (Jimoyiannis & Komis, 2001): cognitive levels (creative and analytic thinking, skills
development, problem solving skills and abilities)
As an artifact, which helps teachers to demonstrate and to promote conceptual change and knowledge
explicit visual representations of complex systems construction.
Figure 5. Simulation of a satellite moving around the earth through interactive physics
Computer Simulations and Scientific Knowledge Construction
Bakas and Mikropoulos (2003) have studied the Students in the experimental group have been engaged
effect of a VR simulation environment on students in tasks which demand the exploration of simulations
comprehension of planetary phenomena. In their study, through Interactive Physics. Results exhibited that
Pea and Alessi (1999) have showed that simulations students significantly improved their achievement
were equally effective to microcomputer based labs in rates in tasks regarding the concepts of velocity and
facilitating comprehension of the concepts involved in acceleration.
objects free fall. The combination of simulations and Computer simulations can effectively support
the Web can create powerful and dynamic learning students and novice programmers to achieve meaningful
environments (Lee et al., 2004). Efficient Java applets understanding of the basic algorithmic concepts and
may be found on many educational sites and are develop their programming skills (Hundhausen et
frequently used as supplements to classroom lectures al., 2002; Jimoyiannis, Tsiotakis, & Sajaniemi, 2006;
and traditional labs (e.g., JeLSIM, Physlets, Easy Java Sajaniemi & Kuittinen, 2005). PlanAni is an algorithm
Simulations, etc.). visualisation environment based on the idea of teaching
Figure 5 shows a screenshot of Interactive Physics students the roles of variables rather than the programs
presenting the simulation of a satellite moving around as a single unit (Sajaniemi, 2002). This notion is based
the earth. This simulation is a model paradigm that on the fact that variables are not used in a random or ad-
can be used according to the ways shown above, for hoc way but there are several standard use patterns that
example, as a visual representation to support teachers occur over and over again in the various algorithms.
instruction, as a virtual laboratory for students to explore PlanAni(GR) is a new version of this simulation
and study this phenomenon, and as a student activity environment adapted to the Greek secondary school
to build it from scratch. This last activity gives the needs (Jimoyiannis et al., 2006). In Greek upper
students the opportunity to think scientifically about secondary schools, an ideal programming language
the behavior of complex systems, to reflect upon their named GLOSSA is used to support introductory
own understanding, to test and refine their own mental programming lessons and students in developing their
models, and, finally, to construct valid conceptual own algorithms. Figure 6 shows a screenshot of the
models. Simulations of this type have been used to PlanAni(GR) interface animating the execution of the
support secondary school students learning in the bubble-sort algorithm. The software provides students
domain of kinematics (Jimoyiannis & Komis, 2001). with opportunities to:
Computer Simulations and Scientific Knowledge Construction
Visualise and simulate the overall execution of Zhang, Chen, Sun, and Reid (2004) proposed a
the program and the dynamic change of the values triple learning support scheme for scientific discovery C
of the variables involved learning based on computer simulations which
Input data and observe on the screen the way in involves: (a) interpretative support that helps learners
which the execution output is produced with knowledge access and activation, the generation
Achieve different representations of the variables of appropriate hypotheses, and the construction
according to their roles in the program of meaningful and coherent understanding; (b)
Isolate and visualise statements or complex experimental support that scaffolds learners in the
structures, such as conditional structures or systematic and logical design of scientific experiments,
iterations (loops) the prediction and observation of outcomes, and the
Receive explanatory messages of the effect and drawing of reasonable conclusions: (c) reflective
the role that each variable or statement has in the support that increases self-awareness of the discovery
program processes and prompts their reflective abstraction and
Use the tools embodied (start, stop, simulation knowledge integration.
speed, stepwise execution of the program) in
order to achieve meaningful understanding.
conclusIon
Despite all these advantages and possibilities
that simulations offer, teachers seem not to use them In this article, simulations exploration and modeling
extensively in their instruction (Jimoyiannis & Komis, have been considered a scientific activity, which can
2006b) while they encounter many difficulties to support help students make their mental models explicit, develop
simulation-based discovery learning and scaffold creative and flexible thinking, and achieve meaningful
students activities. De Jong and Joolingen (1998) have learning. This is not an ideal activity while students
provided an extensive overview of the main problems and teachers encounter many difficulties. There is
and indicated how simulations could be extended to still a lot to learn about simulation-based learning, for
overcome these problems. Their reasoning is anchored example:
on the basis of integrating discovery learning with
instructional support. I further argue that, despite their What type of conceptual or other difficulties do
potential, simulation-based learning environments students encounter? In what ways should students
cannot guarantee effective learning without sufficient scaffolding be addressed?
support, both for students and teachers. What prevents teachers from using simulation
However, constructing a dynamic model is a and modeling activities in their classes?
complex task, and it is reasonable that students, as novice What type of support do teachers need? Is
modelers, encounter many difficulties in accomplishing only their technological support needed or are
this. Sins, Savelsbergh, and van Joolingen (2005) have there important pedagogical issues that must be
studied students who work in dyads, on a modeling task equivalently analysed?
in the domain of physics. Their results indicate that the What types of interventions are needed in the
successful students differed from the less successful curriculum?
ones in using more prior knowledge and in showing
more inductive reasoning. They have pointed out the Many researchers assert that ICT integration in the
importance of students support and suggested that educational practice is a complex and multifaceted issue
efficient scaffolding should: (a) encourage students and teachers constitute a critical factor (Jimoyiannis
to activate their prior knowledge before and during & Komis, 2006a; Kumar & Kumar, 2003; Russell,
their modeling activities and (b) motivate deep Bebell, ODwyer, & OConnor, 2003). Teachers must
reasoning about their models by testing them against be able, not only to use ICT tools, but also to principally
multiple datasets. Students should be asked to model reorganize their instruction by using student-centered
phenomena of which they already have knowledge or activities, based on appropriate ICT applications. Their
experience. preparation and support programs must clearly articulate
specific types of effective instructional models and
Computer Simulations and Scientific Knowledge Construction
representative paradigms of ICT use for every subject of technology-supported learning environments (pp.
matter in the curriculum. It has been shown that the 25-40). Lawrence Erlbaum Associates.
functionality of computers in the class has been quite
Bos N. (2001). What do game designers know about
different for teachers of different attributes such as
scaffolding? Borrowing SimCity design principles for
gender, age, subject specialty, computer use, and
education (Technical report written for the PlaySpace
teaching experience (Jimoyiannis & Komis, 2006a,
Working Group). Center for Innovative Learning
2006b).
Technologies. Retrieved March 4, 2008, from http://
Professional and preservice development programs
www-personal.si.umich.edu/~serp/work/SimCity.pdf
should focus on changing teachers pedagogical
cultures and philosophies about the teaching and Davies, C. H. J. (2002). Student engagement with
learning processes through training them on how to simulations: A case study. Computers and Education,
use appropriate ICT tools with their students. This must 39, 271-282.
be organized in a framework of broader instructional
reforms aiming at the curriculum, the educational de Jong, T., & Joolingen, W. R. (1998). Scientific
media, and, principally, at the pedagogical practices discovery learning with computer simulations of
used. conceptual domains. Review of Educational Research,
I therefore argue that it is important to consider the 68(2), 179-202.
use of simulation-based learning environments carefully Driver, R. (1989). Students conceptions and the
and that there is a sound justification for the pedagogical learning of science. International Journal of Science
strategies used. Clearly, there is no single technology or Education, 11, 481-490.
instructional approach that can resolve all problems and
meet all pedagogical needs. To increase the likelihood Duit, R., & Treagust, D. F. (2003). Conceptual change: A
that simulations will be used in the school practice powerful framework for improving science teaching and
effectively, teachers need to be encouraged to try and learning. International Journal of Science Education,
acquire positive experiences about their effectiveness 25, 671-688.
on teaching and learning. Feinstein, A. H., & Park S. J. (2002). The use of
simulation in hospitality as an analytic tool and
instructional system: A review of the literature. Journal
reFerences of Hospitality & Tourism Research, 26(4), 396-421.
Ainsworth, S. (1999). The functions of multiple Fishwick, P. A. (1995). Simulation model design and
representations. Computers and Education, 33, 131- execution. Prentice Hall.
152. Gibson, S., Fyock, C., Grimson, E., Kanade, T., Kikinis,
Alessi, S. M. (1998). Fidelity in the design of R., Lauer, H., McKenzie, N., Mor, A., Nakajima, S.,
instructional simulations. Journal of Computer-Based Ohkami, H., Osborne, R., Samosky, J., & Sawada,
Instruction, 15(2), 40-47. A. (1998). Volumetic object modelling for surgical
simulation. Medical Image Analysis, 2(2), 121-132.
Axelrod, R. (1997). Advancing the art of simulation in
the social sciences: Obtaining, analyzing, and sharing Granlund, R., Berglund, E., & Eriksson, H. (2000).
results of computer models. Complexity, 3(2), 16-22. Designing Web-based simulation for learning. Future
Generation Computer Systems, 17, 171-185.
Bakas, C., & Mikropoulos, T. A. (2003). Design of
virtual environments for the comprehension of planetary Grant, W. E., & Thompson, P. B. (1997). Integrated
phenomena based on students ideas. International ecological models: Simulation of socio-cultural
Journal of Science Education, 25(8), 949-967. constraints on ecological dynamics. Ecological
Modelling, 100, 43-59.
Bliss, J. (1996). Externalizing thinking through
modeling: ESRC tools for exploratory learning research Hanan, J., Prusinkiewicz P., Zalucki M., & Skirvin, D.
program. In S. Vosniadou, E. de Corte, R. Glaser, & H. (2002). Simulation of insect movement with respect to
Mandl (Eds.), International perspectives on the design plant architecture and morphogenesis. Computers and
Electronics in Agriculture, 35, 255-269.
Computer Simulations and Scientific Knowledge Construction
Hestenes, D. (1992). Modeling games in the Newtonian advanced technology learning environments: Toward
world. American Journal of Physics, 60, 732-748. cost-effective adaptive, interactive, and intelligent C
educational software (pp. 1-31). Dordrecht: Kluwer.
Hmelo, C., & Day, R. (1999). Contextualized
questioning to scaffold learning from simulations. Kumar, P., & Kumar, A. (2003). Effect of a Web-based
Computers and Education, 32, 151-164. project on preservice and inservice teachers attitude
toward computers and their technology skills. Journal
Hundhausen, C. D, Douglas S. A., & Stasko, J. T. (2002).
of Computing in Teacher Education, 19(3), 87-92.
A meta-study of algorithm visualization effectiveness.
Journal of Visual Languages and Computing, 13, Lee, K. M., Nocoll, G., & Brooks, D. W. (2004). A
259-290. comparison of inquiry and worked example Web-based
instruction using Physlets. Journal of Science Education
Huppert, J., Yaakobi, J., & Lazarowitz, R. (1998).
and Technology, 13(1), 81-88.
Learning microbiology with computer simulations:
Students academic achievement by method and gender. Leemkuil, H., de Jong, T., & Ootes, S. (2000). Review
Research in Science and Technological Education, 16, of educational use of games and simulations. Retrieved
231-245. March 4, 2008, from http://kits.edte.utwente.nl/
documents/D1.pdf
Jimoyiannis, A., & Komis, V. (2001). Computer
simulations in physics teaching and learning: A case Lorek, H., & Sonnenschein, M. (1999). Modelling
study on students understanding of trajectory motion. and simulation software to support individual-based
Computers and Education, 36, 183-204. ecological modelling. Ecological Modelling, 115,
199-216.
Jimoyiannis, A., & Komis, V. (2006a). Exploring
secondary education teachers attitudes and beliefs Maier, F. H., & Grobler, A. (2000). What are we talking
towards ICT in education. THEMES in Education, about? A taxonomy of computer simulations to support
7(2), 181-204 learning. System Dynamics Review, 16(2), 135-148.
Jimoyiannis A., & Komis, V. (2006b). Factors affecting Merians, A. S., Jack, D., Boian, R., Tremaine, M.,
teachersviews and perceptions of ICT in education. In P. Burdea, G. C., Adamovich, S. V., Recce, M., & Poizner,
Isaias, M. McPherson, & F. Banister (Eds.), Proceedings H. (2002). Virtual reality-augmented rehabilitation for
of the IADIS International Conference e-Society 2006, patients following stroke. Physical Therapy, 82(9),
Dublin, Ireland (Vol. I, pp. 136-143). 898-915.
Jimoyiannis, A., Mikropoulos, T. A., & Ravanis, K. Meza, A., Navarro, J. F., Steinmetz, M., & Eke, V. R.
(2000). Students performance towards computer (2003). Simulations of galaxy formation in a CMD
simulations on kinematics. Themes in Education, 1(4), universe: The dissipative formation of the elliptical
357-372. galaxy. The Astrophysical Journal, 590, 619-635.
Jimoyiannis, A., Tsiotakis, P. & Sajaniemi, J. (2006). Pallant, A., & Tinker, R. F. (2004). Reasoning with
Investigating the role of algorithm simulations in atomic-scale molecular dynamic models. Journal of
teaching programming at secondary education level Science Education and Technology, 13(1), 51-66.
[in Greek]. In E. Stavridou & C. Solomonidou (Eds.),
Pea, C. M., & Alessi, S. M. (1999). Promoting a
Proceedings of the Pan-Hellenic Conference Digital
qualitative understanding of Physics. Journal of
Educational Media: Development, Application and
Computers in Mathematics and Science Teaching,
Evaluation Issues. (pp. 99-108), Volos, Greece.
18(4), 439-457.
Jonassen, D. H., Howland, J., Moore, J., & Marra, R.
Russell, M., Bebell, D., ODwyer, L., & OConnor, K.
M. (2003). Learning to solve problems with technology:
(2003). Examining teacher technology use: Implications
A constructivist perspective. Prentice Hall.
for preservice and inservice teacher preparation. Journal
Joolingen, W. R., & de Jong, T. (2003). SimQuest: of Teacher Education, 54(4), 297-310.
Authoring educational simulations. In T. Murray, S.
Blessing, & S. Ainsworth (Eds.), Authoring tools for
Computer Simulations and Scientific Knowledge Construction
Sajaniemi, J. (2002). An empirical analysis of roles Washington, W. M., Weatherly, J. W., Meehl, G. A.,
of variables in novice-level procedural programs. In Semtner, A. J., Bettge, T. W., Craig, A. P., Strand, W.
Proceedings of the IEEE 2002 Symposia on Human G., Arblaster, J., Wayland, V. B., James, R., & Zhang,
Centric Computing Languages and Environments, Y. (2000). Parallel climate model (PCM) control and
Arlington, Virginia (pp. 37-39). transient simulations. Climate Dynamics. 16, 755-
774.
Sajaniemi, J. & Kuittinen, M. (2005). An experiment
on using roles of variables in teaching introductory Wiechert, W. (2002). Modeling and simulation: Tools
programming. Computer Science Education, 15, 59- for metabolic engineering. Journal of Biotechnology.
82. 94, 37-63.
Schroeder, D. V., & Moore, T. A. (1993). A computer- Von Glasersfeld, E. (1987). Learning as a constructive
simulated Stern-Gerlach laboratory. American Journal activity. In C. Janvier (Ed.), Problems of representation
of Physics, 61, 798-805. in the teaching and learning of mathematics (pp. 3-17).
Hillsdale, NJ: Erlbaum.
Simpson, G., Johnston, L., & Richardson, M. (2003). Tan
investigation of road crossing in a virtual environment. Vygotsky, L. S. (1978). Mind in society: The development
Accident Analysis and Prevention, 35, 787-796. of higher psychological processes. Cambridge, MA:
Harvard University Press.
Sins, P. H. M., Savelsbergh, E. R., & van Joolingen, W.
R. (2005). The difficult process of scientific modelling: Zhang, J., Chen, Q., Sun, Y., & Reid D. J. (2004).
An analysis of novices reasoning during computer- Triple scheme of learning support design for scientific
based modelling. International Journal of Science discovery learning based on computer simulation:
Education, 27(14), 1695-1721. Experimental research. Journal of Computer Assisted
Learning, 20, 269-282.
Tao, P. K. (1997). Confronting students alternative
conceptions in mechanics with the Force and Motion Ziv, A., Small, S. D., & Wolpe, P. R. (2000). Patient
Microworld. Computers in Physics, 11(2), 199-207. safety and simulation-based medical education. Medical
Teacher. 22(5), 489-495.
Tao, P. K., & Gunstone, R. F. (1999). Conceptual
change in science through collaborative learning at the
computer. International Journal of Science Education,
21, 39-57. Key terMs
Computer Simulations and Scientific Knowledge Construction
students. They are based on conceptual models which: dents attention upon cognitively important aspects of
(a) simulate the relationships that exist between the vari- the simulation, and (d) unfold the complexity of the C
ables of a real-world system and (b) allow the students simulation over a series of stages in order that students
to manipulate those variables. There are three main not be overloaded or overwhelmed.
components in a conceptual simulation: the simulation
Mental Models: They are schemata and repre-
scenario, the mathematical model of the target system,
sentations of the real world phenomena constructed
and the instructional overlay.
by students. They contain a set of information about
Constructivism: According to the constructivist what students already know, either correct or incorrect.
view of learning, students do not passively absorb Students usually exhibit mental models, which are not
information, but rather, meaningful learning occurs consistent with the relevant scientific paradigms.
through an active construction and modification of
Operational Simulations: They are educational
their knowledge structures. When students are learning
simulations designed to facilitate the construction of
they use their existing knowledge, beliefs, interests,
practical knowledge, for example, in areas such as
and goals to interpret any new information, and this
medical training, pilot training, and so forth. They are
may result in their ideas becoming modified or revised.
based on operational models, which use nonstandard
There are two main constructivist schools: (a) cogni-
input and output mechanisms.
tive constructivism, which emphasizes on the personal
construction of knowledge; (b) social constructivism, Scientific Simulation: It is a technique of imitating
which emphasizes on knowledge construction in the behavior of an actual or theoretical system by
particular social and cultural contexts. In both cases, means of an analogous mathematical model. In the
the emphasis is on interactive environments where simplest sense, a system is a set of interacting identities.
students are given opportunities to negotiate their ideas The mathematical equations that produce the model
and meanings. According to this view, teachers have a represent the various processes taking place within
central role in providing guidance and support to their the target system. Currently, simulation uses cover a
students (scaffolding). wide range of applications within the areas of research,
analysis studies, system design, training and education,
Educational Simulation: It is a computer simulation
entertainment, and so forth.
created to facilitate learning on the part of students or
trainees. Educational simulations are abstracted or Virtual Reality (VR): It is a three-dimensional
simplified representations of a target system, which (3D), realistic and highly interactive multimedia en-
are neither as complex nor as realistic as the relevant vironment, in which the user becomes a participant in
scientific simulations. a computer-generated virtual world. The key feature
of a VR simulation is its real-time interactivity, where
Instructional Overlay: It is the component of a
the computer is able to detect user inputs and instanta-
conceptual simulation, characterized by those features
neously modify the virtual world in accordance to user
defining the educational context, the representational
interactions. VR-based simulation environments could
forms, the educational approach, and the tasks used. A
be explorative or immersive (which consist of special
well-designed instructional overlay should: (a) prompt
hardware parts including head-mounted displays, mo-
and motivate students engagement, (b) incorporate
tion-sensing data gloves, eye phones, etc.).
feedback and other tools that may assist and guide
students towards the educational goals, (c) focus stu-
Computer Simulations and Scientific Knowledge Construction
aPPendIx
Simulation-modeling
URL
environment
20-sim http://www.20sim.com
AgentSheets http://www.agentsheets.com
Arena http://www.arenasimulation.com
ChemLab http://modelscience.com
Dymola http://www.dynasim.se
Easy Java Simulations http://fem.um.es/Ejs/Ejs_en/index.html
eM_Plant http://www.emplant.de/simulation.html
Explore-It http://exploreit.com/aboutUs/overview.htm
Flexsim http://flexsim.com
Interactive Physics http://www.krev.com
JeLSIM http://www.jelsim.org/
Modelica http://www.modelica.org
Model-It http://hi-ce.org/modelit
ModellingSpace http://www.modellingspace.net
Modellus http://phoenix.sce.fct.unl.pt/modellus
ModelMaker http://www.modelmakertools.com/
Physlets http://webphysics.davidson.edu/Applets/Applets.html
PowerSim http://www.powersim.com
SimForest http://ddc.hampshire.edu/simforest/software/software.html
SimQuest http://www.simquest.com
Simul8 http://www.simul8.com/
Simulink http://www.mathworks.com/products/simulink
Stella http://www.iseesystems.com/softwares/Education/StellaSoftware.aspx
TINA http://www.tina.com
Vensim http://www.vensim.com/software.html
0
Section: Process ICT
IntroductIon bacKground
The social, relational, and affective dynamics are re- Early approaches in the study of CMC noted that the
ceiving more and more attention in the study of learn- lack of nonverbal cues (e.g., facial expression, posture,
ing processes, as cognitive, affective, and emotional gesture, proximity) would limit the richness and scope
dimensions of learning seem to be closely related. of communication (Short, Williams, & Christie, 1976).
This kind of co-origination, borne out in the context CMC was thought to be an impoverished means of
of neurosciences, artificial intelligence, cognitive psy- communication giving little chance to gather important
chology, and education, has also been recognized in the information about the context, the commonly shared
field of Web-based learning. The research framework rules of conduct and their influence on communication,
of computer supported collaborative learning (CSCL) all of which foster uninhibited speech and flaming.
has emphasized the role that a well-established social Moreover, as anonymity, which is a frequent feature
dimension plays in collaborative learning and group- of online interactions, reduces these control indicators,
based working within communities of learners. Accord- communication would be more de-individualized and
ing to the socioconstructivist model, learning always de-personalized, and that would have different and
implies a social dialogical process where individuals unpredictable consequences on the various speech
are mutually engaged in the construction and sharing contexts. Lacking nonverbal indicators, CMC was
of new knowledge (Scardamalia & Bereiter, 1994; seen to be characterized by a very low level of social
Wenger, 1998). Pedagogical approaches based on these presence, and it was thought that this feature could
assumptions combine the advantages of a learning invalidate the learning purpose.
strategy that promotes deeper level learning, critical In recent times, a number of studies have shown that
thinking, and shared understanding with those related with written communication alone, typically used in chat
to the development of social and communication skills and e-mail, it is possible to stimulate social and affec-
(Garrison & Anderson, 2003). tive presence, provided that interlocutors are allowed
What characterizes the intertwining of the educa- to manage their time freely. Other authors underlined
tional and sociopsychological dimensions in these set- the similarity between the development of relationships
tings is that they are strictly linked to the dialogues that in both face-to-face and online contexts, showing that
participants mutually construct. Most of the learning although the latter need more time to grow, they can be
experiences that occur on the Internet are characterized more socially oriented than the former (Walther, 1996).
by written and asynchronous communication (Lapadat, Users compensate for the communicative lack of writ-
2002). And the written discourse deeply influences also ten discourse with linguistic inventions and adaptations
the socio-affective dimension of learning. (e.g., emoticons, typographical marks, and other textual
The present review aims at presenting the most features, including the use of capital letters, ellipses,
recent and promising research studies that tackle the exclamation marks, as well as typing errors) in order to
linguistic nature of the emotional and affective dimen- express with appropriate orthographical strategies the
sion of learning in Web-based learning environments. aspects of nonverbal communication (Crystal, 2001). In
Its purpose is to emphasize how computer-mediated this way, a higher degree of familiarity and intimacy in
communication (CMC) may convey specific social content, style, structures, and timing of the exchanged
affordances in the expression of affective and social postings would not only be a linguistic adaptation able
domain of learning. to incorporate colloquial and informal registers, but it
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Computer-Mediated Communication Learning Environments: The Social Dimension
could also strike a balance between the features of the human communication which rely on asynchronous
medium and an acceptable level of immediacy. written discourse.
In the context of distance learning, social presence There are a number of ways in which textual indica-
has been recently redefined as the ability of partici- tors are able to manifest social presence and express
pants in a community of inquiry to project themselves representation of learners affective domain. Rourke
socially and emotionally, as real people (i.e., their full et al. (1999), for instance, identified 12 indicators of
personality), through the medium of communication social presence belonging to three categories (affec-
being used (Garrison, Anderson, & Archer, 1999, p. tive, interactive, and cohesive), based on previous
94). According to this reformulation, social presence research, literature, and analysis of transcripts, which
seems to support cognitive objectives as it encourages were applied to transcripts of online communication.
and supports meaningful critical thinking processes in a To these, Swan and Shih (2005) added new indicators
community of learners. Emotion arousal influences the that match quite well with the ones derived both from
cognitive, metacognitive, and motivational aspects of face-to-face analysis and research on previous online
the learning process, especially when socially oriented learning.
(Wosnitza & Volet, 2005) and affective objectives that Job-Sluder and Barab (2004) examined how par-
result in engaging and rewarding group interactions may ticipants in a community of practice express a shared
lead to an increase in academic, social, and institutional group identity in their discussions on the basis of the
integration and results (Rourke, Anderson, Garrison, use and frequency of singular and plural first person
& Archer, 1999). pronouns; the aim of the study was to investigate the
The studies that have adopted this new conceptual role of identity formation in learning processes in the
perspective have investigated social presence, among context of preservice and in-service teacher develop-
other characteristics, as a predictor of satisfaction and ment. Inductive methodology guided the approach of
perceived learning (Richardson & Swan, 2003) and a research study that proposes a model of engagement
as an indicator of success and quality of the learning able to capture the dynamic nature of learners inte-
experience (Swan & Shih, 2005). Others underline the raction by means of the philosophical hermeneutic
relationship between the role of the tutor/instructor circle (Ziegler, Paulus, & Woodside, 2006). These
and the affective and cognitive learning in the online studies have contributed to emphasize the importance
classroom (Baker, 2004). All of them focus on the that linguistic specificities of written communication
fundamental connection between the cognitive and have in the expression of social presence and affective
affective elements of learning processes. dimension of learning. Linguistic creativity is indeed
what distinguishes writing in CMC settings from written
language in other kinds of communicative contexts
the lInguIstIc exPressIon oF the (Crystal, 2001). Yet, the examination of specific features
socIal dIMensIon oF learnIng of language in creating an effective climate of social
presence has not been carried out adequately.
If traditional approaches to measuring social presence Only in recent times, for instance, the role that
and the affective dimension of learning used different metaphors and figurative language in facilitating the
combinations of survey instruments (e.g., scale-gradu- expression of emotions and affective domain in Web-
ated questionnaires and semistructured or unstructured based learning environments has been investigated.
interviews) and analyses of students online interac- Literature in linguistics and cognitive science state
tions through quantitative methods (e.g., frequency of that metaphoric language has a central role in every
messages, etc.), in recent times, the expression of the day discourse, because it seems to shape the ways in
social dimension has been investigated through other which we think, creating a bridge from abstract domains
means. Since the pioneering work of Henri (1992), to perceptual experience and helping to understand a
the content analysis approach has become one of the new domain of experience in terms of what is already
most valuable ones. Classifications of text features into familiar. Moreover, figurative language has a central
categories and indicators have been proposed, with the role in establishing a climate of closer intimacy between
aim of capturing the new styles and characteristics of speakers, as the power of imagery seems to facilitate the
sharing of personal experience and to create emotional
Computer-Mediated Communication Learning Environments: The Social Dimension
involvement. Studies in Web-based learning settings ment, social interaction, and personal meaningfulness.
have shown that figurative language may be a creative In CMC learning contexts, the use of narratives can C
way through which students at a distance may give improve the social dimension of online learners and
substance and concreteness to the immaterial place contribute to collaborative student learning through the
of the Web. It can allow participants to represent their sharing of personal experiences and the construction
affective domain (their emotions and feelings) and to of a common identity.
conceptualize the main learning components on the Another promising approach is based on the theory
Web (Manca & Delfino, 2007). In this study, the use of dialogical self. The relatively new concept of dia-
of figurative language, as a special communicative logical self in psychology is closely related to narrative
tool that creates that sense of closeness and intimacy psychology, constructivism, and cultural psychology. It
that literal language cannot achieve, is shown to be an explores the reciprocal influences that occur between the
original and creative way to communicate through the construction of the self and the cultural environment,
written expression of emotions and social presence. as well as the specific impact of digital environments.
In an online learning environment, self-positioning
strategically supports the creation of a virtual learn-
neW horIzons oF exPloratIon ing community and also stresses the relationship of
individual development with the sense of belonging
In an online learning community, cognitive and meta- to a community (Ligorio & Pugliese, 2004).
cognitive processes are closely linked with the social From a methodological perspective, along with
and affective dimensions. Learning always involves approaches that tackle the content analysis of written
a deepening process of participation in a community, communication, other methods are gaining further
and it is closely connected to that of construction of consideration. Among others, social network analy-
identity. Being part of a group or a community means, sis focuses more on the study of the whole learning
most of all, building a common and shared identity with community, rather than on the individual who takes
the other members. Indeed, participation especially part in it. It examines the ways in which participants
implies the reorganization of individual identities and communicate with each other by exploring the depth
the construction of a collective and shared identity of collaboration and the frequency of communication
within the community (Wenger, 1998). between participants, considering notions such as rela-
If we assume that participants are able to construct tion and structure of a network. The first applications
individual and collective identities, as well as to express of these notions to online communities have revealed
their emotional and affective horizons through writing that this method is especially helpful for understand-
processes, we need to ask how one projects oneself on ing how a community is born and grows through the
the Web and which images of self are constructed and complexity and density of the network nodes and links
proposed to others. In the context of learning settings, (e.g., Aviv, Zippy, Ravid, & Geva, 2003).
cyberspace may be a space where the narratives of
the self usually maintained in a face-to-face situation
are more readily disrupted. Hence, there is more pos- conclusIon and IMPlIcatIons
sibility of exploring modes of identity formation, both For PractIce
on the students and tutors side (Bayne, 2005).
From this perspective, narrative is being recognized The constant growth of online education is rapidly
as one of the most promising and emerging areas of changing how and when people, especially adults,
interest in digital learning environments (Dettori, Gian- choose to engage in a learning experience. Today, it
netti, Paiva, & Vaz, 2006). Narrative has been shown to is more a question of choosing the most convenient
be a powerful cognitive tool for meaning construction and personally suitable way to receive instruction
in organizing external knowledge representation and and training rather than attending a traditional physi-
as a way to structure human experience. Storytelling, cal institution. This shift of perspective is gradually
as a means through which people may communicate changing our view of the social nature of learning
their emotions and feelings, is strictly intertwined with processes, too. The latter, as we have seen, are always
those aspects of learning related to motivation, engage- deeply intertwined with the affective, emotional, and
Computer-Mediated Communication Learning Environments: The Social Dimension
relational factors that usually emerge in a community quality discussions more than using traditional materi-
of learners. In contexts of such a nature, the process of als. Online instructors could combine encouragement
learning is mostly interrelated with that of becoming, of personal storytelling with the utilization of stories
the process of sharing practices and knowledge with as a designed teaching strategy to deliver content, to
that of constructing a common and shared identity. discuss post assignments, or to tackle negative feelings
Identifying new and more suitable methods with of frustration and of being overwhelmed. A narrative
which to investigate how these relationships are con- pedagogy goes indeed beyond the information dimen-
structed is becoming an imperative in the field of ICT. sion of learning and renders apparent the social basis
More conservative views of the ways people experience of learning and knowledge.
the immaterial dimension of learning in cyberspace
should be accompanied by, if not substituted with, new
and more appropriate methods. This sort of paradigm reFerences
shift also affects how affectivity and sociability, which
influence and transform the learning dimension, should Aviv, R., Zippy, E., Ravid, G., & Geva, A. (2003).
be investigated. Becoming aware of the potentialities Network analysis of knowledge construction in asyn-
of learning communities that rely on written discourse chronous learning networks. Journal of Asynchronous
communication would enhance our exploration of these Learning Networks, 7(3), 1-23.
processes and help us to design and support more ef-
fective learning environments based on ICT use. Baker, J. D. (2004). An investigation of relationships
Previous sections have enlightened how written among instructor immediacy and affective and cogni-
communication is able to convey specific and unique tive learning in the online classroom. The Internet and
social and emotional affordances in the context of Web- Higher Education, 7(1), 1-13.
based learning. For this reason, rather than comparing Bayne, S. (2005). Deceit, desire and control: The identi-
face-to-face and online settings and seeing the latter ties of learners and teachers in cyberspace. In R. Land
as characterized by an impoverished communication, & S. Bayne (Eds.), Education in cyberspace. London:
researchers should look at how the pragmatic needs of RoutledgeFalmer.
an online setting might be satisfied thanks to the rich-
ness of written language. These considerations have Crystal, D. (2001). Language and the Internet. Cam-
profound implications for practitioners as well. The bridge, UK: Cambridge University Press.
examples shown above underline that numerous are Dettori, G., Giannetti, T., Paiva, A., & Vaz, A. (2006).
the textual indicators of social presence in Web-based Technology-mediated narrative environments for learn-
learning environments that could be adopted in the ing. Amsterdam: Sense.
design and conducting phases. The use of figurative
language (in the forms of metaphors, analogies, etc.), Garrison, D. R., & Anderson, T. (2003). E-learning
for instance, may be encouraged and adopted during in the 21st century: A framework for research and
the design and conduct of online learning courses as practice. London: RoutledgeFalmer.
a stimulus to manifest and share those personal emo- Garrison, D. R., Anderson, T., & Archer, W. (1999).
tions and feelings that are always deeply rooted in any Critical inquiry in a text-based environment: Computer
new learning experience. The adoption of metaphors conferencing in higher education. The Internet and
by tutors may foster students sense of belonging to a Higher Education, 2(2-3), 87-105.
larger community and provide a framework for role
assignment, identity, and responsibility. Along with Henri, F. (1992). Computer conferencing and content
other facilitation measures, tutors/instructors would be analysis. In A. R. Kaye (Ed.), Collaborative learning
able to use a further feature of aiming at encouraging through computer conferencing: The Najaden papers
interaction based on figurative language that would (pp. 115-136). New York: Springer.
serve as a stimulus to facilitate the intertwining of the
Job-Sluder, K., & Barab, S. A. (2004). Shared we
social dimension with learning processes.
and shared they: indicators of group identity in on-
On the narrative side, measures of this kind may
line teacher professional development. In S. A. Barab,
be adopted as a more effective means of achieving
R. Kling, & J. H. Gray (Eds.), Designing for virtual
Computer-Mediated Communication Learning Environments: The Social Dimension
Computer-Mediated Communication Learning Environments: The Social Dimension
Section: Process ICT
O. B. Ajayi
University of Agriculture, Abeokuta, Nigeria
cooPeratIve learnIng
large class oFFerIngs In strategIes
scIence educatIon
Cooperative learning, as indicated earlier, involves
A survey was conducted to determine the prevalence of group work. Groups may be organized along informal
large class offerings in science education. The survey or formal lines. Wankat and Oreovicz (1994) define
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Cooperative Learning Strategies for Effective Teaching and Learning
that informal cooperative learning groups are formed code (x, y, or z) depending upon the category they be-
on the spur of the moment for a particular short term longed to. The students were not informed as to what
task and then dissolved. Such groups are useful in the the letter code represented or how the group codes were
middle of a lecture, to assign students a task such as determined. This was done so that students do not feel
solving a problem, answering a complicated question, either superior or inferior. In one of the class periods,
or developing a question for the lecturer. Engendering in the last five minutes, students were asked to gather
a more cooperative class atmosphere, these groups in three corners of the room depending on their codes,
serve as a break when the students attention falters, and groups of three students were formed by randomly
and gives them a chance to practice team work. For selecting one student from each corner. This in itself
the instructor, informal groups are a good way to start proved to be a fun activity in the large class.
experimenting with cooperative learning. The students were assigned four group projects
After discussing a concept for about 15 to 20 minutes during the semester. Assigning three to four projects
in a class, a multiple choice question is written on the in a semester is ideal. Assigning more projects makes
board or displayed on the screen with a multimedia it difficult for students to meet often, as their schedules
projector. Students discuss an answer to the question are usually full with several activities. The projects were
in an informal setting with neighboring students. The chosen, so they can get acquainted with each other,
voice level during this one or two minute period goes recognize and appreciate their strengths and weaknesses
up, reflecting the level of interaction and collaboration in different areas, develop positive interdependence,
going on in the classroom. At the end of this period, all collaborate to achieve a common goal, learn from each
students are requested to raise a flashcard displaying a other, and also have fun. The four projects were:
letter corresponding to an answer to the multiple choice
question. The flashcard method allows active learning, Performing throws of dices targeting six and
collaborative learning, and 100% participation in large determining their percentage success rate;
classes. It also allows students to assess how much they Finding their learning styles and discussing simi-
have understood and gives an instant assessment to the larities and differences in their learning styles;
instructor about student understanding of the concepts Generating a creative item like a joke, cartoon, or
just discussed. The multiple choice questions can be poetry, and coming to a consensus about which
easily formulated to test knowledge and comprehen- is the best item from their group, and
sion aspects of student learning as defined by the tax- Designing a optimum sorting technique algo-
onomy in Bloom (1956). The taxonomy (knowledge, rithm.
comprehension, application, analysis, synthesis, and
evaluation) provides a useful structure in which to The formal groups were encouraged to study together
categorize questions. A useful handbook on designing and prepare for examinations. The group members also
and managing multiple choice questions at all levels took collaborative quizzes in the class. During such
of the taxonomy was developed at the University of a quiz, the group members discussed how to solve a
Cape Town, South Africa, and can be accessed over the given quiz problem in the first three to four minutes.
Internet (Carneson, Delpierre, & Masters, 1997). Ad- At that time, no writing was permitted. This activity
ditional details on the basic flashcard method, without greatly enhances their capabilities in problem solving,
group activities, are given in Mehta (1995). critical thinking, teamwork, and communication skills.
With the authors practical scenario experience In the next 15 minutes, they solved the quiz problem
with informal group activities, formal group activi- individually, just as in a regular quiz.
ties were introduced in a large computer class. At the
beginning of the semester, students were requested to
provide their cumulative GPA, their grade in Calculus results
I (prerequisite class), the number of course credits they
have registered for, and so forth. A composite index The students in the large computer class were asked
was determined based on the above information and for their opinion on integrating soft skills like coop-
was used to divide the class into three categories: top, erative learning (teamwork), active learning, problem
middle, and bottom. Every student was given a letter solving, and critical thinking in all their courses. The
Cooperative Learning Strategies for Effective Teaching and Learning
What is your opinion on integrating the following soft skills in your courses?
C
Soft Skills Percentage Responses
A B C D E
Cooperative learning (teamwork) 39 46 15 - -
Active learning 40 51 8 1 -
Problem solving 57 40 2 1 -
Critical thinking 59 36 4 1 -
Scale: (A) Very Useful, (B) Useful, (C) Neutral, (D) Not Useful, (E) Not Useful At All
* Number of responses = 95, Student Enrollment = 101
Please rate the following strategies in terms of learning the subject matter or fostering soft skills.
Strategies A B C D E
Informal in class group activities 42 42 15 1 -
Dice throwing 3 39 28 11 8
Creative exercises 11 36 28 18 7
Learning style exercise 9 53 23 12 3
Sorting algorithm design 54 36 7 2 1
Overall, formal group projects 11 52 26 12 -
Group discussion before the quizzes 75 23 2 - -
Scale: (A) Very Useful, (B) Useful, (C) Neutral, (D) Not Useful, (E) Not Useful At All
* Number of response = 95, Student enrollment = 101
results are shown in Table 1. They indicate that between were perceived to be very useful or useful by 84% of
8597% of the students believe that the integration of the students. On the other hand, formal group projects
soft skills into their courses is either very important or done outside the classroom were perceived to be very
important. The students considered problem solving useful or useful by only 62% of the students. Among the
(97%) and critical thinking (95%) skills to be of most four specific projects, the throwing of die and creative
importance. exercises were perceived to be very useful or useful
The students were then asked to rate the specific by only 42% and 47% of the students, respectively.
activities (done in the computer class) regarding their The optimal design of the sorting technique algorithm
usefulness in either learning the subject matter or fos- was perceived to be very useful or useful by 90% of
tering soft skills. The results, given in Table 2, show the students.
that informal group discussions inside a classroom
Cooperative Learning Strategies for Effective Teaching and Learning
0
Cooperative Learning Strategies for Effective Teaching and Learning
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Cyberspaces Ethical and Social Challenges in Knowledge Society
equipment and Internet connections, but to evaluate and is ultimately conditioned by access to the resource
and improve their uses. If we considered the contex- infrastructures. C
tual, cultural, and knowledge resources available to
individuals and groups, digital divide would therefore
be the consequence of pre-existing inequalities and understandIng dIgItal dIvIde
defines the gap between the ICTs users and those who
do not use them. It would moreover be legitimate to Digital divide is a multidimensional phenomenon. In
speak not only of digital divide but also of digital order to examine the factors influencing its evolution,
inequality referring to the social and knowledge gaps it would be useful to distinguish between two different
that influence the diffusion and adoption of technolo- levels of analyses: a macro analysis level, aimed at
gies (Sartori, 2006). globally identifying the diverse economical, social and
A third approach focuses on contents (knowledge, political conditions which characterize industrialized
information, expertise) and the services to which the and developing countries; and a microanalysis level,
ICTs give access, independently from the technologies. aimed at evaluating the individual characteristics of
Digital divide is therefore defined as the gap between Internet users (Sartori, 2006, p. 51).
those who have access to contents and services offered The comparison between the industrialized and the
by the Internet and those who do not. developing countries shows that elements like income,
More generally, according to Baker (2001): education and training, investments in the sectors of
research and development, and the costs of infrastruc-
The digital divide can be conceptualized from a tures, are crucial factors that can prevent or facilitate
user standpoint as a suboptimal condition of access the diffusion of the Internet in various countries. An
to technologies (the initial conceptualization of the effective comprehension of the phenomenon is in fact
digital divide), orientation on hardware, networking, possible only by integrating the various elements.
and access to advanced IT/Telecom services: Let us start from the first factor. The degree of de-
velopment of a country is certainly a decisive factor.
Content available, that is, what services and For example, in observing trends in the map showing
information can be accessed and the extent of the use of the Internet by countries, we can
Utility/awareness which relates to the actual value see that its coverage goes hand in hand with geographic
as well as the perceived value or awareness of development. In other words, there is a close relation-
the user/citizen/business of the use of ICTs and ship between inequality in industrial development
associated services. and inequality of access to information (Bind, 2005).
However, the wealth of a country, as fundamental as
The definition proposed by the OECD and to which it can be, is not sufficient in itself to increase the use
the most part of studies refer, includes the various ele- of the Internet (Norris, 2001).
ments highlighted up to now: the gap between indi- Besides, digital literacy is fundamental. The inter-
viduals, households, businesses and geographic areas national organizations agree that it constitutes, along
at different socioeconomic levels with regard to both with the educational background and the knowledge
their opportunities to access ICTs and to their use of of languages, a prerequisite that can positively or
the Internet for a wide variety of activities. The digital negatively influence access to the Web.
divide reflects various differences among and within In addition, the factors related to offers of new
countries. The ability of individuals and businesses technologies are to be considered. Availability of infra-
to take advantage of the Internet varies significantly structures and the costs of computers and connections
across the OECD area as well as between OECD and have a direct impact on the opportunities of individual
non-member countries (OECD, 2001, p. 5). users to access the Web. The costs are still very high
In synthesis, according to this last definition the especially in developing countries, where they are
concept of digital divide is applied on a universal higher than in developed countries (Bind, 2005).
level, goes back to various geographic dimensions Obviously, directives from local governments re-
(international and intranational) and includes two garding public policies in the ICTs sector also affect
distinct problems, that of access and use of the ICTs, costs. They can more or less be oriented towards the
Cyberspaces Ethical and Social Challenges in Knowledge Society
liberalization of services to favour greater competition barriers, and cultural and linguistics gaps (knowledge
between the providers with the consequent reduction gaps) that make the Internet an inaccessible goal for
of costs for the single user, or in support of a major those populations living at the margin of globalization
intervention of the state and international organizations processes.
in defining tariff policies. The debate on the most ef- Another factor of inequality regards asymmetry
fective policies to adopt for cost reduction is, however, between urbanized areas and rural zones. The latter,
still underway (Rallet et al., 2004). especially in developing countries, has remained ex-
An additional dimension to consider on the macro cluded from the digital revolution that has taken over
level is the relationships between politics and Internet, the urbanized areas. The nomadic technologies can
whereby some governments enact preventive censuring offer great opportunities to allow the rural zones to
measures by filtering the information resources avail- move out of their isolation but their diffusion in these
able and reducing universal access to information. areas is still insufficient.
Going on to consider the differences between indi- Ultimately, another element to be considered regards
viduals and social groups, the main factors of access individuals with disabilities. The most part of ICTs
inequality are to be traced to family and individual results to be scarcely accessible, thus producing the
income, age, degree of instruction, gender, language, exclusion of a great part of users with special needs.
residential geographic areas, professional status, and The ICTs instead could devise for these people, instru-
the physical-psychological abilities of the people in- ments which will allow them to participate in social
volved (Bind, 2005). life, continue to carry out their work activities and have
As mentioned earlier, the costs of computers, access to training experiences.
software, and connections can be discriminating for
individuals and families with low income, both on
the global and local level. Along with income, age the role oF educatIon and
can represent an obstacle when considering single us- technologIcal research
ers. The youth are often avant-garde in technological
innovation and their applications, but are also more How should digital divide be faced? What contribu-
exposed to economic and social problems. As to the tions can education and technology offer to face this
elderly people, the possibility of their education on the problem?
use of new technologies could be impossible due to the Current literature shows a wide agreement on the
lack of specific training courses. importance of interventions in the area of training and
Besides age, gender also holds a relevant impor- education, in reducing the digital gap between individu-
tance. Inequality between men and women in the als and social groups, either by offering free access to
face of new technologies constitutes another feature technological equipment or by delivering computer
of digital divide. Almost two-thirds of the worlds literacy programs. On the technological level, the
illiterate are women. In the developing countries, an adoption of open source approaches and investments
average of one out of two women, is illiterate. If in the in research geared towards enabling technologies are
industrialized countries women represent a consistent emerging as the most suitable solutions in the long
part of the Internet users, there is a very high risk that run, especially in civil society. We here present some
in the developing countries women may accumulate initiatives.
disadvantages, thus losing almost all possibilities of
access to the Net. the Internet as a Public service
Another barrier is the affirmation of English as the
language vehicle of globalization, leaving no room for The availability of public access to the network repre-
other languages in World Wide Web. Together with sents a preliminary condition in allowing economically
language, educational, and social-cultural backgrounds disadvantaged individuals to make use of the ICTs. The
play a most meaningful role in favouring or not, access Internet should be considered as a public information
to the Net. In the future, the post-industrial societies service and not only as a commercial product (Bec-
may require great investments to favour education and calli, 2004, p. 113).
training, with the objective of reducing educational
Cyberspaces Ethical and Social Challenges in Knowledge Society
Therefore, well-equipped schools and libraries can Through a modifiable technology distributed at low
play an important role. They can in every way take prices, if not free of charge, it would be possible to C
part in solving the problem also for the countries of concretely conceive policies that can limit the social
the OECD area, as already indicated in the 1995 NTIA and geographical discontinuities in their diffusion and
report. In the industrialized countries many interven- use. [...] The dream of reducing the technological gap
tions have been implemented to this end. seems to be more easily fulfilled through the diffusion
In the developing countries the experiences of the of open-source software rather than by the world-scale
Community Multimedia Centre (CMC) and the com- extension of closed-source software produced by the
munitarian telecentres, have been significant (Guttman, big monopolistic industries.
2003). The creation of the CMC was promoted in the
last years by UNESCO. The CMC combines the use As commonly known, free software is based on
of local radios with that of computers connected to the the freedom to modify the program according to ones
Internet, e-mail, faxes and photocopy engines. Besides own needs, and to distribute the modified versions so
being free of charge and allowing shared access, the that the community may profit from the improvements
CMC experience is characterized by the notion that a implemented (Stallman, 2003). Thanks to this, free
relevant contribution to solving digital divide can be software is proving to be a solution that is particularly
offered through the oldest media like books, radio or suitable to the contexts in which there is need to control
television. Old and new technologies do not substitute the technologies used, the resources are limited, and it
for one another, but are complementary. The former is necessary to find specific solutions.
effectively contributes to the diffusion of knowledge The openness philosophy and software-sharing
by facilitating access to the latter. practices are also growing in the educational field. In
The communitarian telecentres promoted for exam- the Internet there are a great variety of open source
ple by the Brazilian administration, are free-of-charge software (often free of charge) for education, that is,
public centres in which people can access computers, educational software, content management system
printers, Internet, and so forth. One of the features is (CMS) and/or learning management system (LMS) like
their location in peripheral and disadvantaged zones, for example Moodle, blog, wiki, and so forth.
and are autonomously self-managed by the commu- While the open source regards the software, the
nity. There are already a number of examples of such open content adopts its philosophy but applies it to
structures globally, especially in Latin America, the products like Websites, music, films, photographs,
Caribbean and Africa. They are often equipped with literature, and also educational contents. In this case,
free software. Besides the lowering of costs of licenses, the author preserves the works copyright, but allows
the use of free software allows the use of hardware that its use by third parties under an open content license.
is not of the last generation, recovering in this way, the There are various types of open content licenses. Usually
resources which would otherwise be lost. In addition, the users can copy, publish and redistribute the work,
the opportunity to access the source code of the soft- provided that attribution is given to the original author
ware enables technicians to intervene autonomously in and all modifications to the work are identified. The
technological problem solving and in the subsequent advocates of open content believe that the availabil-
implementation of software, thus starting off a process ity of free contents promotes collaborative work and
which will also be sustainable in the long term. contributes to increasing knowledge while reducing
individual efforts. In addition, open content in educa-
open software and content tion allows the improvement of instructional materials,
and facilitates its reuse and adaptation. One of the most
As seen in the Brazilian experience with telecentres, important initiatives is the Open Course Ware program
the adoption of open-source software may constitute promoted by the Massachusetts Institute of Technology
a crucial mean for equal opportunity to access. It (MIT). The program which began in 2002, provides
promotes a kind of digital solidarity fundamental to free online access to educational course materials and
bridging the technological gap. As observed by Berra contents. In the same year UNESCO introduced the
and Meo (2001): term open educational resources at the Forum on
Cyberspaces Ethical and Social Challenges in Knowledge Society
the Impact of Open Courseware for Higher Education The ICT skills are expressly indicated by the Council
in Developing Countries. of Lisbon as a basic skill. Coherent with this purpose, the
key competencies framework was redefined, changing
enabling technologies the number of required competencies from three to eight
and including digital competence as one of the five
An ulterior step could be the development and imple- new competencies. In the definition of this competence,
mentation of technologies aimed at satisfying the it is pointed out that, Digital competence involves the
needs of various global users, and therefore favour- confident and critical use of electronic media for work,
ing and funding researches to this end. The design leisure and communication. These competences are
and implementation of innovative technologies more related to logical and critical thinking, to high-level
oriented towards the demands of currently excluded information management skills, and to well-developed
users, formulated in their tongue and distributed at low communication skills. At the most basic level, ICT skills
costs, could moreover find a market which is ready to comprise the use of multi-media technology to retrieve,
receive them. assess, store, produce, present and exchange informa-
An example is the Simputer, a device which sup- tion, and to communicate and participate in networks
ports the functions of a PC, but in a simpler way. The via the Internet (European Union - Working Group
Simputer does not need a keyboard and allows the B Key Competences, 2004, p. 7). In other words,
user to interact with the PC by touching the screen digital competence does not only include the simple
to send commands and listening to its answers (vocal procedural skills, but also encompasses high-level
messages). abilities in logical and critical thinking, information
If the Simputer responds to the need of developing management, and communication.
technologies enabling illiterate people in developing Moreover, in the field of initiatives undertaken
countries, the project One Laptop per Child, promoted to promote online education, the European Council
by Media Lab of MIT in Boston, represents an effort Parliament started off the e-Learning program (2004-
to find enabling solutions for people living in zones 2006), to stress the need to address the problems of
without electricity, or wherever saving energy results social exclusion resulting from the inability of some
to be important or decisive. Negroponte, Director of individuals to take full advantage of the benefits of-
Media Lab, on the occasion of the second session of fered by information and communication technologies
the World Summit on Information Societies (Tunisy, (ICT) and the Internet in the knowledge society, the
2005), demonstrated the prototype of a laptop costing so-called digital divide which often affects young
$100, that could allow thousands of children in devel- people, the disabled and elderly, and social categories
oping countries to use a personal computer, thanks to who are already victims of other forms of exclusion.
expedients that reduce energy consumption and a lever The program provides as frontline action the promotion
device that can temporarily recharge the batteries. of digital literacy. Action in this field must cover both
conceptual and practical issues, from the understand-
Promoting digital competence ing of digital literacy to the identification of remedial
actions for specific target groups: Digital literacy is
Access to an education, which includes computer lit- one of the essential skills and competences needed to
eracy in the curricula, ultimately plays a crucial role. take an active part in knowledge society and the new
The European Community for example, has moved media culture. Digital literacy also relates to media
in this direction during the last five years. The Lisbon literacy and social competence, as they have in com-
European Council (2000, March 23-24) emphasized mon, objectives such as active citizenship and the
that Every citizen must be equipped with the skills responsible use of ICTs. (Decision No 2318/2003/EC
needed to live and work in this new information soci- of the European Parliament and of the Council of 5
ety and that it is therefore necessary that a European December 2003).
framework should define the new basic skills to be Two meaningful trends emerge from these recom-
provided through lifelong learning: IT skills, foreign mendations. The first regards the need to promote
languages, technological culture, entrepreneurship and educational programs on ICTs based on a wider con-
social skills. cept of computer literacy. It should include not only
Cyberspaces Ethical and Social Challenges in Knowledge Society
procedural skills (as contemplated in ECDL), but also Beccalli, A. (2004). La diversit culturale e linguisti-
and above all the critical use of ICTs in daily life. ca nella Societ dellInformazione. In J. Nardi, & C. C
This is also coherent with the concept of computer Padovani (Eds.), Diritto a comunicare e accesso ai
literacy suggested by ETS (2004), which developed saperi. La nuova frontiera dei diritti nella Societ della
a framework for ICT Literacy at international levels, Conoscenza (pp. 108-113). Modena: Yema.
commissioned by OECD.
Berra, M. & Meo, A. R. (2001). Informatica solidale.
The second concerns the currently emerging rela-
Storia e prospettive del software libero. Torino: Bollati
tionship between media/digital and social competen-
Boringhieri.
cies: if citizens are to exercise a real citizenship in
Knowledge Society, they must be enabled to read the Bind, J. (2005). Towards knowledge societies:
new alphabets, decode the new languages, and the UNESCO world report. Paris: UNESCO Publishing.
cognitive citizenship which both media and digital
competencies help to acquire ETS - Educational Testing Service (2004). Digital
transformation. A framework for ICT literacy. Retrieved
March 11, 2008, from: http://www.ets.org/Media/Re-
search/pdf/ICTREPORT.pdf
conclusIon
European Union - Working Group B Key Compe-
Digital divide is one of the most urgent challenges tences (2004). Key competences for lifelong learning.
today. In a world where information and knowledge A European reference framework. Retrieved March 11,
represent an indicator of wealth, the exclusion from 2008, from http://europa.eu.int/comm/education/poli-
electronic networks within which these goods circu- cies/2010/doc/basicframe.pdf.
late, results in evermore-dramatic forms of social and
cultural exclusions. Guttman, C. (2003). Education in and for information
Educational systems and technological researches society. Paris: UNESCO Publishing.
can contribute to facing the problem by: Hargittai, E., Di Maggio, P., Neuman, R. E. & Robinson,
J. P. (2001). The social implications of the Internet.
1. Providing public access to ICTs Annual Review of Sociology, 27, 307-336.
2. Adopting open approaches to ICTs and content
delivery Lisbon European Council (2000, March 23-24). Presi-
3. Promoting technological research, oriented to- dency conclusions. Retrieved March 11, 2008, from
wards design and implementation of enabling http://europa.eu.int/ISPO/docs/services/docs/2000/jan-
technologies march/doc_00_8_en.html#A
4. Implementing educational and training actions Norris, P. (2001). Digital divide: Civic engagement,
in order to develop digital competence. information poverty, and the Internet worldwide. New
York: Cambridge University Press.
An area of great interest in the educational field is the
designing of programs aimed at developing the ability NTIA (1995). Falling through the Net: A survey of the
to benefit ICTs in a critical way. Such a vision involves have-nots in rural and urban america. Retrieved March
the notion of digital competence, which surpasses the 11, 2008, from http:// www.ntia.doc.gov/ntiahome/fal-
traditional concept of computer literacy advocated by lingthru.html
the ECDL and certainly opens out to new challenges OECD (2001). Understanding the digital divide. Paris:
in educational research. OCSE.
Oxford English Dictionary Online (2004). New York:
reFerences Oxford University Press.
Rallet, A. (2004). La fracture numerique. Resaux.
Baker, P. M. A. (2001). Policy bridges for the digital Paris: Lavoisier.
divide: Assessing the landscape and gauging the dimen-
sions. First Monday, 6, 5.
Cyberspaces Ethical and Social Challenges in Knowledge Society
Rallet, A. & Rochelandet, F. (2004). La fracture nu- Open Content: As indicated in Wikipedia, this term
mrique: une faille sans fondement?. Resaux, Paris, describes any kind of creative work (including articles,
Lavoisier (pp. 21-54). pictures, audio, and video) or engineering work (i.e.,
open machine design) that is published in a format that
Ranieri, M. (2006). Formazione e cyberspazio. Divari
explicitly allows the copying and the modifying of the
e opportunit nel mondo della rete. Pisa: ETS.
information by anyone [] (Retrieved July 30, 2007,
Sartori, L. (2006). Il divario digitale. Bologna: il from: http://en.wikipedia.org/wiki/Open_content).
Mulino.
Open Educational Resources (OER): Refer to
Stallman, R. (2003). Sotfware libero. Roma: Stampa educational materials and resources provided freely
Alternativa. and openly for anyone to use and under some licenses
re-mix, improve and redistribute. Open educational
UN (2006). Digital divide report. Retrieved March 11, resources include learning content (i. e., course materi-
2008, from http://www.unctad.org/Templates/webflyer. als, learning object, documents etc.), tools (i.e., software
asp?docid=6994&intItemID=2068&lang=1 for creation, delivery, use and improvement of open
van Dijk, J. A. G. M. (2005). The deepening divide. learning content) and implementation resources (i.e.,
Inequality in the information society. Thousand Oaks, intellectual property licenses) (Wikipedia. Retrieved
CA: Sage Publications. July 30, 2007, from: http://en.wikipedia.org/wiki/
Open_educational_resources)
Yu P. K. (2002). Bridging the digital divide: Equality
in the information age. Cardozo Arts & Entertainment Open-Source Software: A computer software with
Law Journal, 20(1), 1-52. a source code available under a license that allows users
to change and improve the software, and to redistribute
it in modified or unmodified form. It is often developed
Key terMs in a public and collaborative way.
Digital Competence: Digital competence involves Simpute: An acronym for Simple, In-expensive,
the confident and critical use of electronic media for Multilingual, Peoples Computer. It is a small hand-
work, leisure and communication. These competencies computer, designed and implemented for use in develop-
are related to logical and critical thinking, high-level ing countries. The device was designed by the non-profit
information management skills, and well-developed organization, Simputer Trust, founded in 1999.
communication skills.
Digital Divide: The gap between individuals,
households, businesses and geographic areas at dif-
ferent socio-economic levels with regard to both their
opportunities to access ICTs and their use of the Internet
for a wide variety of activities (OECD, 2001, p. 5).
Section: Product ICT
Winnie W. Hua
CTS Inc., USA
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Data Caching Patterns
A vast majority of todays distributed applications market. The future browser versions tend to support
are developed in either Java or .NET on an n-tier archi- 8192-byte size cookies.
tecture, which consists of a series of logical/physical
layers: client, Web, application, integration, and data and DNS Resolver
enterprise resource. Accordingly, a taxonomic scheme
is defined in Figure 1 to sort various caching patterns The DNS lookup results may be cached to minimize
into appropriate layers. Furthermore, those patterns query calls to the DNS server. Popular Web browsers
that can be used in multiple layers are grouped in the implement the client DNS resolvers with cache. The
cross-layer category. Mozilla browser caches the DNS host entries for 15
minutes, whereas the DNS cache expiry time is set to
client layer 30 minutes in Internet Explorer (Microsoft Support,
2004).
AJAX
Hidden HTML Frame
Asynchronous JavaScript and XML (AJAX) is a Web
development style in which small chunks of data in Data elements may be cached in a hidden frame in an
XML format are transferred from the Web server in HTML page on the client browser, which eliminates
an asynchronous manner behind the scene. As a result, the roundtrips to the serveran inherent attribute in the
a responsive interaction on the Web page is realized hidden field pattern. Client-side scripting can be lever-
because there is no need to reload the entire Web page aged to access the data stored in a hidden frame. This
every time a user clicks a link or button on the page. method only requires the client-side resources because
In the AJAX model, the browser caches a great deal of the data elements in the hidden frame are stored and
data, and other blocks of data can be asynchronously retrieved locally from the page on a browser.
retrieved from the servers in an on-demand or proac-
tive fashion. HTML Form Field
0
Data Caching Patterns
client layer
Object pooling
cross-layer Patterns
D isk I /O
SOAP processing
C ache server C onnection pool OR m apper PreparedStatem ent
C aching utility
AD O.N ET Stored procedure Pre-fetch Stand-in C om ponent
Data Caching Patterns
Exhibit A.
<meta HTTP-EQUIV="Pragma" CONTENT="no-cache">
<meta HTTP-EQUIV="Cache-Control" CONTENT="no-cache">
Exhibit B.
<% Response.AddHeader "Pragma", "no-cache" %>
<% Response.CacheControl = "no-cache" %>
<% Response.Expires = -1 %>
Even though the cache data may be contained in an Reverse Proxy Server
Http header field for a session in some situations, it is
discouraged to take advantage of the header to store A reverse proxy serves as a front end of different back-
any data related to the business logic, following the end servers. It delivers Web contents in a single URL
Data Caching Patterns
Exhibit C.
<% response.setHeader("Pragma", "no-cache");
D
response.setHeader("Cache-Control", "no-cache");
response.setDateHeader ("Expires", 0); %>
from a group of Web servers that are implemented in Accessing EJB via Local Interface
different architectures and platforms. Be aware that an
SSL/TLS connection does not extend across a reverse In early Java EE specifications, EJBs must be accessed
proxy transparently, because the connection to the via a remote interface only. The later EJB versions
browser is terminated by the reverse proxy. Therefore, (EJB 2.0 above) allow the beans to be accessed via a
the connection is fully controlled by the reverse proxy, local interface.
including the authentication information in the header
fields. A reverse proxy can be used to balance the Entity Bean
incoming loads or replicate contents to areas that are
dispersed geographically. However, the limitation of a An entity bean is used for data persistence, while a ses-
reverse proxy is its scalability since it is not intended sion bean usually implements a use case. The caching of
for optimized caching. entity beans in an EJB container can be directly lever-
aged when the components run in a single application
Web Caching server. In a load-balanced environment for high-avail-
ability systems, however, a cached entity bean is likely
Web caching is the caching at the Web layer that ac- updated by another copy of this entity bean in another
celerates the delivery of static contents such as HTML instance. As a result, the beginning of an invocation
files, images, CSS, scripts, and multimedia contents. should always call the ejbLoad() method to ensure that
The use of the view elements generated from the ap- the current state is loaded. As compared with other
plication layer is optimized. Consequently, the delivery lightweight data persistence approaches such as the
of nondynamic contents is considerably improved. DAO pattern and Object-Relational Mapper (ORM),
the entity bean component model incurs significant
application layer overheads in the runtime. Therefore, this model is re-
placed by the Entity class in the Java Persistence API,
.NET Framework API which is part of the Java EE 5 standard.
A rich set of data caching APIs are offered in the Read-Only Entity Bean
Microsoft .NET framework, which provides an in-
memory, application-scoped, thread-safe space that Some EJB container vendors implement read-only
can hold any serializable object or object collection. entity beans, which allow caching of entity beans that
There are two data caching classes in the System.Web: are unchanged in its life cycle, indicated in the vendor-
Caching namespace: Cache, used to add and remove specific caching attribute of the deployment descriptor.
data elements in the cache, and CacheDependency, A nonstandard API to invalidate cached beans may be
used to define a cache dependency to a data element provided by vendors. Read-only entity beans are pro-
in the cache store. prietary and not portable, and they are not supported
The method Insert() has the time-based expiration in the EJB 3.0 specification (JSR-220, 2005).
built-in, either absolute or sliding time invalidation. A
callback function to a cached item can be implemented, HttpSession
which will be automatically invoked at the time that
item is deleted form the cache store. In a Java EE application, the HttpSession class (JSR-
154, 2006) contains a good number of APIs to store
Data Caching Patterns
extraordinarily complicated data structures for a par- to be cautious about is that the scalability of stateful
ticular browser session. As a matter of fact, HttpSession session beans is a challenge for large-volume systems,
is implemented via an in-memory replication or a per- and overheads of the bean management in the container
sistent database by most Servlet containers. Retrieving may become an issue.
data from the HttpSession object is much faster than
from the original data store. Be aware that there is just Web Application Frameworks
one HttpSession object that exists between a Servlet
container and a browser. The HttpSession object is a Almost every Java Web application framework, such
global container to the Servlet applications running in as Struts (Struts, 2006), JavaServer Faces (JSR-252,
the same container. Occurrence of a collision is possible 2006), and Spring (Spring, 2006), caches client session
if the same data elements are modified or retrieved by data at different levels: request, session, and application.
the user session accessing multiple Servlet applications This data caching feature can be directly leveraged for
on the same Servlet engine. the applications built on top of these frameworks. For
The default value for session timeout is usually 60 instance, the struts-config.xml file in Struts specifies
minutes. To effectively use the cache space, manual the scope of data elements in an ActionForm bean
invalidation of the session and clean the caching items declaratively.
are highly recommended, as the garbage collection by
the container takes unnecessarily longer time. Integration layer
The singleton design pattern is implemented in the A dedicated integration server or middleware like mes-
Servlet Context, where all Servlet requests can be sage queues may be used for application/business inte-
cached. The Hashtable collection class is usually used gration in distributed systems. Business process servers
for singleton cache design, which sets no limit in size usually run the process orchestration and long-lived
and is thread-safe. However, it, like HttpSession object, transactional processes. Both volatile and nonvolatile
has a similar collision issue. Another disadvantage of data may be cached in this layer. A stand-alone cache
this approach is that the Servlet container does not server is also useful, particularly in the scenarios where
manage this resource. distributed caches are implemented. A cache server
also plays a role as a stand-in to backend databases and
Attribute in ServletRequest Interface legacy systems, offering better availability.
Data Caching Patterns
are compliant with the Java EE 1.3+ all have the data disk, or cluster: EHCache, OSCache, SwarmCache,
source built-in, which should be used for database and TreeCache. D
access, rather than writing custom connection pool-
ing. Alternatively, a connection pooling component PreparedStatement
is available in the Apache Jakarta Commons package
(Apache Jakarta Commons, 2005). The JDBC prepared statements are cached in many
Java EE application servers. Instantiating Prepared-
Java EE Patterns Statement objects is a time-consuming operation, and
transactional Java EE applications usually execute the
Value Object (Alur, Crupi, & Malks, 2003), or Transfer same structuresd query language (SQL) statements
Object, is a useful pattern to minimize the get() method with different parameters repetitively. Make sure that
calls to obtain attribute values from an enterprise bean. an application takes advantage of prepared statements
A value object class is an arbitrary serializable Java whenever possible.
object with a constructor that accepts all the required
attribute values to create the value object. A value object data and enterprise resource layer
is practically read-only after its creation, as there is no
method to reset the values. Moreover, the Value Object ADO.NET
Assembler pattern provides a compound object graph
to enable chunky, rather than chatty, method calls to In the recent ADO.NET version, a new signaling fea-
reduce the overheads in remote invocations. The fast ture called Query Notifications is added for the sake of
lane reader pattern ought to be used for read-only data refreshing the cache of read-mostly lookup tables.
access, such as an online catalog. Read-only access to
large quantities of tabular data should not use entity Data Grid
beans.
A data grid deals with the controlled sharing and
JDBC Statement Object management of large amounts of distributed data.
The data grid products from leading vendors provide
Similar to the PreparedStatement object discussed highly scalable, self-managed distributed data caching
below, an application should cache and reuse other solutions for distributed applications in Java and .Net,
JDBC statement objects so that the complex statement enabling enterprises to predictably scale large-volume
objects do not need to be recreated from scratch over systems.
and over again.
Enterprise Service Bus (ESB)
Message-Driven Bean (MDB)
ESB is an architecture style that exploits Web services,
An MDB is an enterprise Javabean that enables an messaging middleware, intelligent routing, and transfor-
application to process messages asynchronously. A mation, as a ubiquitous integration backbone through
client does not call an MDB directly. Rather, the stan- which services, systems, and applications interact with
dard callback function, onMessage(), is invoked in the each other. Caching is extensively used in many ESB
same way as a JMS message listener. In some sense, implementations, such as service locators.
the incoming messages are cached in the queue to
allow for maximum throughput. Page-Centric Model
Data Caching Patterns
designed. Chunky interfaces serve better than chatty (OpenSymphony, 2005) is a tag library that supports
interfaces in Model 1. cache in the scope of session and application. It caches
postprocessed JSP fragments in the Web tier, with the
Prefetch duration specified as an attribute in the cache tag. The
OSCache tag library implements a properties file in-
Prefetch is a technique to proactively retrieve the re- stalled in the /WEB-INF/classes directory, which allows
quired data elements from the data stores by predicting a developer to set attributes for operational preferences.
what a user will most likely need in the subsequent The cache.path property points to the location where
interactions with an application. Combining this means the cache files are placed. The cache.debug property
with other asynchronous technologies like AJAX can specifies if the debugging messages will be produced,
significantly accelerate the overall application perfor- and the cache.unlimited property may be set to ensure
mance. that the cache disk space is unlimited.
Another interface is the CacheFilter, which is a
Result Set Cache Servlet 2.3 filter that caches entire responses with both
text and binary content. OSCache can be configured to
A result set from a query to the backend database man- use either memory persistence or disk caching. The lat-
agement system (DBMS) server ought to be cached ter writes the cache entries to the hard drive to survive
to avoid unnecessary subsequent hits to the database a server crash and restart.
system. The cached data content may be converted to
a different data structure from the original result set, Design Patterns
such as value objects or transfer object assemblers.
Flyweight and Faade are two powerful design patterns
Stand-In in caching implementations. For example, accessing
entity beans from a Servlet can be very inefficient
In case the backend systems go down for some reason, and difficult to maintain. Session Faade pattern is an
services to the front-end applications can be made unin- effective method to encapsulate entity bean access in
terrupted by using a stand-in, which is a temporary data a session bean that accesses the entity bean through a
store to cache the data from the backend data sources. local interface to avoid excessive remote calls. Other
This is particularly useful for read-only data, though well-known design patterns (Broemmer, 2002) may
noncritical data can also be served to minimize the be leveraged in the cache design, such as proxy, lazy
impact of the downtime in the backend systems. instantiation, and so forth.
For a complicated set of database operations, stored An application must minimize the file reads/writes
procedures may be a viable option to make use of the from the hard drive. For instance, the application meta-
optimized processing in DBMS to produce the result data, typically stored in a configuration file, should be
sets more effectively. On the other hand, the business read once at startup and cached in the application as
logic is split over two layers, the application layer and a singleton. Audit and logging data may be buffered
data persistence layer, which deems a bad practice from and written to the disk asynchronously to minimize the
the maintainability and design standpoints. I/O hits. Other template files are usually cached in the
processor, such as XSL stylesheets.
cross-layer
DNS
Caching Utility Component
The DNS entries may be cached to minimize the
There are many innovative caching utility components lookup calls to the DNS servers. A machine may also
available for data caching (Shan, 2004). OSCache take advantage of the local hosts file, which maps IP
addresses to domain names. Moreover, the IPs of the
Data Caching Patterns
most frequently used partner servers can be cached in reusable threads that can be utilized interchangeably
the application memory after the first-time lookup in in an application. D
the local hosts file or the DNS server.
Object Type
In-memory Database System
While the primitive data types in Java reside in the
In-memory database systems (IMDS) have emerged memory stack, each object instance created in an
specifically to meet the performance needs and re- execution process takes up some memory space on
source availability. IMDS resides entirely in memory. the heap. And the garbage collector is obligated to
Almost every traditional DBMS solution incorporates periodically handle every object instantiated, either
caching to keep the most recently used portions of the to determine whether the object is still referenced by
database in memory, owing to the performance drain an active process or to release it. The primitive data
caused by physical disk access. Caching logic includes types are preferred over class types in programming.
cache synchronization, which ensures that an image of A common example of this occurs when String objects
a database page in cache is consistent with the physical are used carelessly. Unlike in C, Strings in Java are
database page on disk. In contrast, IMDS eliminates objects, which consequently brings overheads. Even
caching so that a significant source of complexity and simple operations like text processing can become slow
performance overheads are slimmed down, and in the if String objects are used too much. A solution to this
process, the memory and central processing unit (CPU) is to utilize the StringBuffer class, resulting in fewer
requirements of the IMDS are reduced. objects in the logic.
Object caching is useful to complex objects that take A precompiling concept is introduced for caching
a comparatively long time to instantiate. In a Java EE purpose. All static data stored in a dynamic fashion,
application, this includes objects like the JNDI resources say in a configuration file, are plugged in at the place
such as EJB home interfaces, data sources, JMS con- where the data are used, when the deployable build is
nection factories, and LDAP. Caching can be applied constructed. This is similar to the inline function in
to complex components or objects at the application C++ applications. Alternatively, the dynamic data ele-
level that make use of other external resources that ments may be externalized in a file that is updated and
involve disk input/output (I/O), networking, marshal- cached at deployment time and runtime, while keeping
ling/unmarshalling, or other moderately expensive the keys that are static in a configuration or properties
operations. In object caching, all objects must be made file for the application to look up.
thread-safe to handle simultaneous access by multiple
callers. For example, the ThreadLocal class ought to SOAP Processing
be used for the local variables belonging to individual
threads only. Another efficient way of object caching Simple Object Access Protocol (SOAP) is an extreme
is object cloning. markup language (XML)-based object invocation
protocol. SOAP is descriptive but larger due to the
Object Pooling volume of tags. SOAP marshalling and unmarshal-
ling incur moderate overheads, which may impact
Reusable objects of the same type can be recycled via the application performance. XML-binary Optimized
an object pool to eliminate unnecessary instantiation and Packaging (XOP) provides a more efficient serializa-
garbage collection. It involves some special handling tion of XML by means of MIME encoding. Message
to deal with the pool management. Though the code Transmission Optimization Mechanism (MTOM) uses
complexity grows in this approach, the performance can XOP to encode portions of SOAP messages, while still
be improved, and better control over certain resources presenting an XML Infoset to the SOAP application.
can be gained. A thread pool, as an example, provides Another alternative is XFire (2006), which is an open
source standards-compliant SOAP framework.
Data Caching Patterns
Data Caching Patterns
0 Section: Process ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Data Flow Diagram Use
researchers attention on key planning issues and by These textbooks mention seven major components of
enabling them to identify planning errors, DFDs can a research project: D
be useful in planning empirical research projects.
The people who require knowledge of a particular
phenomenon (knowledge users);
bacKground The specific items of knowledge they need in
order to cope with that phenomenon;
DFDs were introduced in 1979 by Yourdon and Con- The analysis processes that derive the needed
stantine, De Marco, and Gane and Sarson, and there- knowledge from file data;
after were recommended by many other authors (e.g., The files that store data for analysis;
Awad, 1985; Budgen, 1994; Burch, 1992; Buxton & The collection processes that get data into the
McDermid, 1991; Coleman & Baker, 1997; Conger, files;
1994; Fairley, 1985; Hawryszkiewycz, 1991; Jeffrey & The data to be collected, and
Lawrence, 1984; Kendall & Kendall, 2002; McDermid, The sources of the data.
1990; Millet, 1999; Powers, Cheney, & Crow, 1990;
Satzinger, Jackson, & Burd, 2004; Schach, 1993; Thus, an empirical research project normally has
Sommerville, 1992; Stevens, 1981; Weinberg, 1980; the structure of Figure 3.
Whitten & Bentley, 1998; Wieringa, 1998). DFDs have Figure 4 compares Figures 2 and 3.
mostly been used to plan software packages and infor- It shows that information systems and research
mation systems by outlining their major components in projects are similar in two ways. First, they are similar
a top-level DFD, and then decomposing major processes in the interconnections of the components; second,
into more detailed lower-level DFDs. But only top DFDs they are similar in the functions of corresponding
are considered here. Yourdon and Constantine noted components.
that the major processes in the top DFDs are usually The general system theory of von Bertalanffy (1972)
afferent or efferent (this important insight has largely predicts that when two academic fields are concerned
been ignored by current textbooks). In the case of an with systems that are similar in structure or function,
information system, afferent means data collection, and that is, homologous, then some of the knowledge in
efferent means information extraction: so the top DFD the one field can be transferred to the other. That pre-
of an information system can be drawn as a series of diction was confirmed earlier by cases of homological
rows shaped like Figure 2 (Mende, 2007). knowledge transfer between the field of information
Therefore, Figure 2 serves as a structural model of systems and several related fields (Mende, 1990).
an information system. Now the prediction is confirmed further, by a case of
An empirical research project normally has a homological knowledge transfer between the field of
similar structure. This emerges from textbooks on information systems and research method.
research method (e.g., Babbie, 1989; Bailey, 1987; Figure 4 shows that information systems and re-
Breakwell, Hammond, & Fife-Shaw, 1995; Heiman, search projects are homologous. So (although the two
1995; Huysamen, 1994; Kerlinger, 1986; Leedy, 1989; systems differ in other dimensions, e.g., run frequency),
Mason & Bramble, 1978; McMillan & Schumacher, general system theory suggests that the homologies
1997; Mouton, 2001; Neuman, 1994; Robson, 1993; should allow some principles of information systems
Singleton, Straits, & Straits, 1993; Terre, Blanche, & to be transferred to the field of research method. Sub-
Durrheim, 1999; Welman & Kruger, 2001; William- sequent sections confirm that indeed one principle can
son, Karp, Dalphin, & Gray, 1982; Zikmund, 2003). be transferred, namely the DFD.
Data Flow Diagram Use
data
sources data files data knowledge users
collection analysis
data information
information sources data data info users
system collection stores extraction
Data Flow Diagram Use
confirmed
actual other
project 3 question- causes of 4 categorize classification
causes research -
managers naire BPR failure causes scheme
ers
Philosophy,
Psychology, 1 literature
History of fragments survey
Science
Computing,
Logic, system 2 system HKT
History of ideas analysis hypotheses
Science
Recent HKT
research 3 document
cases
projects analysis
HKT case
History of 4 historical 5 correlate confirmed researchers
cases conformance
Science case study hypotheses
& success
in four research steps: (1) identify causes of BPR fail- project plan has been approved by a faculty research
ure found by previous researchers; (2) allocate those committee, and the project is being carried out by the
causes to the triangle categories; (3) let practitioners author. The DFD is Figure 6.
identify unimportant listed causes and important un- This project aims to answer four questions: what
listed causes; (4) eliminate unimportant causes from kinds of principles can be transferred between academic
the categories and add important ones. The question disciplines that study homologous systems?; when
of relative importance was answered in another two and why should those principles be transferred?, and
research steps: (5) get a sample of projects and let their how should researchers proceed to transfer them? The
managers assess the degree of project failure and the questions are being answered in five research steps: (1)
extent to which the causes were present in each project integrate previous researchers ideas to get hypotheses;
and (6) correlate degree of failure with the presence of (2) refine those hypotheses by analyzing HKT as an
causes; eliminate insignificant causes; regress failure information system; (3) collect case evidence of living
against the causal categories; and rank the categories researchers HKT projects, assess the extent to which
in sequence of their regression coefficients. The third each case conforms to the hypotheses, and rate their
example is the DFD of a research project on the research success; (4) collect further evidence from cases of HKT
uses of homological knowledge transfer (HKT). The mentioned in the history of science; (5) confirm the
Data Flow Diagram Use
Figure 7. Sources and users are omitted: Data may be unavailable and knowledge unusable
sources data collection files analysis
analy
sis knowledge users
Figure 8. Knowledge and users are omitted: No useful knowledge may be produced
Figure 9. Source and data are omitted: Data collection may be infeasible
Figure 10. The second analysis process is omitted: The second knowledge may be impossible to produce
Data Flow Diagram Use
Figure 11. The second data source and collect process are omitted: The file may be impossible to obtain
sources data collection files analy
sis knowledge users
D
hypotheses by correlating success with conformance are easy to detect in a DFD, which contains core ideas
to hypothesis. In order to draw the three DFDs, the only, and their explicit connections. Therefore, by Mills
researchers had to consider each of the major planning law of agreement, DFDs can help research planners to
components and their interconnections by asking and detect errors of incomplete planning.
answering questions such as the seven in Table 1.
So, the DFDs focused the researchers attention on
the key planning issues. Therefore, by Mills law of dFd exPoses errors oF Wrong
agreement, DFDs can focus researchers attention on the PlannIng
key planning issues. The next two sections show that
DFDs can also be useful in helping researchers identify Even if all incompleteness errors have been eliminated
major planning errors. Several examples demonstrate from a research plan, it may still have errors of sub-
that a DFD readily exposes a wide variety of planning optimality or infeasibility, mainly involving wrong
errors: some resulting from incomplete planning and connections. A DFD readily exposes many such errors,
others from wrong planning. which can easily be detected by comparing adjacent
components. Figure 13 (with its four cases ad) gives
some examples.
dFd exPoses errors oF All the above planning errors are difficult to detect
IncoMPlete PlannIng in a 10-page research plan, where core ideas cannot
easily be compared because they are obscured by a
A research plan is incomplete if any of the key planning multitude of peripheral ideas. But they are easy to de-
issues has not been addressed, leaving one or more tect in a DFD. Therefore, by Mills law of Agreement,
of the major decision components undecided. Such DFDs can help research planners to detect errors of
errors of omission are not uncommon. (In fact, it was wrong planning.
the astonishing frequency of those errors in students
research plans that motivated the author to apply DFDs
to research planning.) A DFD readily exposes many conclusIon
errors of omission in the form of gaps in the columns
(the names of the components do not even have to be DFDs can focus researchers attention on the key
read). Figures 7 to 14 give examples. planning issues, and they can also help research plan-
A DFD also exposes further errors of incomplete ners detect errors of incomplete and wrong planning.
planning that can be detected by checking for vaguely Therefore, DFDs can be useful in research planning.
named components. Figure 12 (with its six cases af) They are especially useful to ICT people, who already
gives some examples from a project to confirm the know how to draw and interpret DFDs. Therefore, if
hypothesis that ICT use is correlated with user age (the ICT people have to plan empirical research projects,
symbol stands for is correlated with). they should consider using data flow diagrams.
All those planning errors are difficult to detect in a
10-page research plan (e.g., a research proposal), where
core ideas cannot easily be identified because they are
obscured by a multitude of peripheral ideas. But they
Data Flow Diagram Use
Figure 12. (a) Vague users: no one may actually need the knowledge, (b) vague knowledge: the answer may be
useless, (c) vague analysis: the statistical method may be weak, (d) unspecified files and data: attributes may
not include age and use, (e) unspecified collection: may be infeasible, (f) unspecified source: may not exist
Data Flow Diagram Use
Figure 13. (a) The file has data on age and use, but no age data are collected, (b) the analysis correlates age
with use, but the file has no data on age, (c) Delphi is inappropriate for getting data on age, (d) the t-test is a D
weak way of establishing a correlation
diagram to optimize files. Perhaps an ERD could Breakwell, G. M., Hammond, S., & Fife-Shaw, C.
also be used to optimise the files of a complex (1995). Research methods in psychology. London:
research project. Sage.
7. As empirical research projects and information
Brown, J. R. (1992). The laboratory of the mind:
systems are homologous, perhaps not only the
Thought experiments in the natural sciences. London:
DFD can be used in research projects, but also
Routledge.
other IS development aids, such as CASE tools
and object-oriented tools. Budgen, D. (1994). Software design. Reading, MA:
8. In order to turn any academic field of study into Addison-Wesley.
a science, there is a need for theoretical research
as well as empirical research (Mende, 2005). Burch, J. (1992). Systems analysis, design and imple-
The DFD might be useful in planning theoretical mentation. Boston: Boyd and Fraser.
research projects too. Buxton, J., & McDermid, J. A. (1991). Architectural
design. In J. A. McDermid (Ed.), Software engineers
reference book. London: Butterworth.
reFerences
Coleman, D. L., & Baker, A. L. (1997). Synthesizing
Awad, E. M. (1985). Systems analysis and design. Burr structured analysis and object-based formal specifica-
Ridge, IL: Richard D. Irwin. tions. Annals of Software Engineering, 3, 221-253.
Babbie, E. (1989). The practice of social research. Conger, S. (1994). The new software engineering.
Belmont, CA: Wadsworth. Belmont, CA: Wadsworth.
Bailey, K. D. (1987). Methods of social research. New De Marco, T. (1979). Structured analysis and system
York: Macmillan. specification. Englewood Cliffs, NJ: Prentice Hall.
Data Flow Diagram Use
Fairley, R. E. (1985). Software engineering concepts. Neuman, W. L. (1994). Social research methods. Bos-
New York: McGraw-Hill. ton: Allyn and Bacon.
Gane, C., & Sarson, T. (1979). Structured systems Powers, M. J., Cheney, P. H., & Crow, G. (1990).
analysis. Englewood Cliffs, NJ: Prentice Hall. Structured systems development. Boston: Boyd and
Fraser.
Hawryszkiewycz, I. T. (1991). Systems analysis and
design. Sydney: Prentice Hall. Robson, C. (1993). Real world research. Oxford:
Blackwell.
Heiman, G. A. (1995). Research methods in psychol-
ogy. Boston: Houghton Mifflin. Satzinger, J. W., Jackson, R. B., & Burd, S. D. (2004).
Systems analysis and design in a changing world.
Huysamen, G. K. (1994). Methodology for the social
Boston: Thompson Course Technology.
and behavioral sciences. Halfway House, South Africa:
Southern Book Publishers. Schach, S. R. (1993). Software engineering. Burr Ridge,
IL: Richard D. Irwin.
Jeffrey, D. R., & Lawrence, M. J. (1984). Systems
analysis and design. Sydney: Prentice Hall. Singleton, R. A., Straits, B. C., & Straits, M. M. (1993).
Approaches to social research. Oxford: Oxford Uni-
Kendall, K. E., & Kendall, J. E. (2002). Systems analysis
versity Press.
and design. Englewood Cliffs, NJ: Prentice Hall.
Sommerville, I. (1992). Software engineering. Reading,
Kerlinger, F. N. (1986). Foundations of behavioral
MA: Addison-Wesley.
research. New York: Holt Rinehart Winston.
Stevens, W. (1981). Using structured design. New
Leedy, P. D. (1989). Practical research. New York:
York: John Wiley.
Macmillan.
Terre Blanche, M., & Durrheim, K. (1999). Research
Mason, E. J., & Bramble, W. J. (1978). Understanding
in practice: Applied methods for the social sciences.
and conducting research. New York: McGraw-Hill.
Cape Town: University of Cape Town Press.
McDermid, D. C. (1990). Software engineering for
von Bertalanffy, L. (1972). The history and status of
information systems. Oxford: Blackwell Scientific.
general systems theory. In J. D. Couger & R. W. Knapp
McMillan, J. H., & Schumacher, S. (1997). Research (Eds.), Systems analysis techniques (pp. 9-26). New
in education. Reading, MA: Addison-Wesley. York: John Wiley.
Mende, J. (1990). Homological transfer: An informa- Weinberg, V. (1980). Structured analysis. Englewood
tion systems research method. South African Computer Cliffs, NJ: Prentice Hall.
Journal, 2, 6-11.
Welman, J. C., & Kruger, S. J. (2001). Research method-
Mende, J. (2005). The poverty of empiricism. Informing ology for the business and administrative sciences. Cape
Science, 8, 189-201. Retrieved March 6, 2008, from Town: Oxford University Press Southern Africa.
http://inform.nu/Articles/Vol8/v8p189-210Mende.
Whitten, J. L., & Bentley, L. D. (1998). Systems
pdf
analysis and design methods. Burr Ridge, IL: Richard
Mende, J. (2007). Data flow diagrams with functional D. Irwin.
columns. Handbook of system analysis and design.
Wieringa, R. (1998). A survey of structured and object-
Millet, I. (1999). A proposal to simplify data flow dia- oriented software specification methods and techniques.
grams. IBM Systems Journal, 38.1. Retrieved March ACM Computing Surveys, 30.4, 459-527.
6, 2008, from http://www.research.ibm.com/journal/
Williamson, J. B., Karp, D. A., Dalphin, J. R., & Gray,
sj/381/millet.html
P. S. (1982). The research craft: Introduction to social
Mouton, J. (2001). How to succeed in your masters & research methods. London: Little, Brown & Co.
doctoral studies. Pretoria: J. L. van Schaik.
Data Flow Diagram Use
Yourdon, E., & Constantine, L. L. (1979). Structured Empirical Research Project: The entities and
design. Englewood Cliffs, NJ: Prentice Hall. processes that answer a group of related research ques- D
tions or confirm a group of related research hypotheses
Zikmund, R. (2003). Business research methods. Ma-
using empirical methods of data collection and data
son, OH: South Western.
analysis.
Knowledge: Information about a class of entities,
Key terMs events, or relationships, which is likely to remain true
for a relatively long period of time.
Data Analysis Process: A combination of human
activities and computer processes that answer a research Research Hypothesis: A tentative answer to a
question or confirm a research hypotheses. It answers research question. A previous researcher may have
the question from data files, using empirical methods suggested a potential answer that could be verified
such as correlation, t-test, content analysis, or Mills empirically, or the researcher may be able to deduce
method of agreement. consequences of a previous researchers model or
theory.
Data Collection Process: A combination of human
activities and computer processes that get data from Research Problem: A phenomenon that people
sources into files. It gets the file data using empirical cope with by applying knowledge. It usually divides
methods such as questionnaire, interview, observation, into several subproblems, for example, a classification
or experiment. of the different kinds of entities and events involved;
cause-effect relationships between attributes of entities
Data Flow Diagram: A diagram of the data flow and events; and techniques for manipulating relation-
from sources through processes and files to users. A ships to achieve desired outcomes.
source or user is represented by a square; a data file is
represented by rectangles with missing righthand edges; Research Question: An unsolved subproblem of a
a process is represented by a circle or rounded rectangle; research problem, for example, a classification scheme
and a data flow is represented by an arrow. that is needed but not yet available, a classification
scheme that is not entirely comprehensive, an unknown
Data Source: An entity or group of entities from cause-effect relationship, or an unknown technique.
which data can be collected. The entities may be people,
objects, or processes.
0 Section: Context ICT
Debora Infante
University of Basilicata, Italy
Angela Pascale
University of Basilicata, Italy
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
From Distance Education to E-Learning as Integrated Training
From Distance Education to E-Learning as Integrated Training
own needs and schedules. Thus, the key-concept is cording to the needs of the individual), peer interaction
interaction, which is perceived as the opportunity and tutoring.
for students to influence the teaching process as well As has already been stated, new information and
as to be influenced by it. communication technologies go beyond the traditional
An e-tutor is fundamental in this process and has limits set by the communication mediated by the com-
multiple roles. The tutor-instructor plans and distributes puter thanks to the ability of setting up virtual commu-
material online (also on Web pages) and interacts with nities ready to establish collaborative learning forms.
the participants through various applications such as Thus, the techniques involved in e-learning achieve
mailing lists, e-mail, newsgroups, videoconferences, educational goals, too. While pursuing their common
and so forth. The tutor-facilitator organizes the ma- interest, the members of a community are involved in
terials to be published online, increases motivation several activities and discussions, helping each other,
among students and facilitates observation, support, sharing information and building up relationships that
monitoring, and integration. The e-tutor may also be allow them to learn together.
an animator and moderator with the same functions The educational and training value of virtual
of the tutor-instructor and of the tutor-facilitator in communities is underlined by the numerous learning
addition to activities such as interaction, moderation, opportunities offered by online interactions such as:
creating incentives, icebreaking, and entertainment.
Moreover, the e-tutor should be able to initiate peer Encouraging the comprehension of the materials
tutoring among the students. In this way the e-tutor can to be learned through the integration of diverse
stimulate the knowledge-building and management of viewpoints, information and ideas on the same
cooperative sharing (Rowntree, 1995). topic (Clark & Slotta, 2000; Hoadley & Linn,
2000; Linn, Davis & Bell, 2004);
Favoring the development of metacognitive abili-
toWards an Integrated traInIng ties through cooperative activities (Park, 1999);
Model Encouraging students to use new problem solving
strategies as a result of their collaboration and
The distribution of knowledge according to these dealing with authentic tasks (Herrington, Oliver,
forms causes the student to be an active protagonist & Reeves, 2003);
within the students own learning process. As a result Encouraging social competences useful in team-
of the learning by doing model, it is possible to sup- work (Edelson, 2001).
port the acquisition of specific concepts as well as the
development of general skills, such as: the ability to Even at the stage concerning the formation of the
collect information, to develop personal and critical identity, the role carried out by the mediation instru-
interpretation skills, to make a decision and assess ments used during the interaction phase is fundamental:
the results, to learn to identify and modify individual from language, considered as a mediation instrument par
interpretative models on the basis of stimuli in the excellence, to the telematics environment resources. In
surrounding environment. particular, the last generation environments (text chats,
Today, the combination of multiple approaches discussion forums, Web pages, etc.) offer specific op-
to learning is very widespread. This model is called tions that seem to support the dialogue nature and the
blended learning which blends e-learning with other social and cultural negotiation of identities.
traditional resources in order to merge the flexibility On the basis of these reflections, it is necessary to
of the new tools and the functionality of the traditional encourage e-learning as a model of integrated learn-
ones (the classroom setting and paper material) retain- ing where different forms, and numerous training
ing the best aspects of each. The main objective of this and educational instruments can be used with the goal
model is to use different resources, such as: alternat- of making the most of their potential. Thus, this new
ing face-to-face sessions (to increase motivation and educational training model is not only characterized
to share what has been learned), individual moments by the integration of classroom teaching and online
(to evaluate and strengthen what has been learned ac- activities (blended learning) but also by the following
elements:
From Distance Education to E-Learning as Integrated Training
Traditional face-to-face sessions: Especially to asynchronous interaction, the latter can also be
in the case of long and difficult courses of study used as a collaborative method. In particular, even D
such as undergraduate and postgraduate courses if forums and discussion groups do not imply the
as well as university masters. Meetings at the be- live presence of the participants, they are nonethe-
ginning and at the end of the course can stimulate less connected to the idea of training as a social
the construction of the virtual community and of process. These mechanisms are well exploited
the perception of the social meaning involved in only through synchronous interaction in which
the training process. Workshops and classroom a traditional classroom setting is created, where
sessions can be useful to reinforce mechanisms everyone can take part and be heard by everyone
developed during collaborative learning sessions else in real time, asking questions to the instructor
in the virtual environment. and addressing each other. The teaching activity
Use of the Internet as a transfer and collab- and tutorship are facilitated by the spontaneity of
orative tool: It is fundamental to consider the synchronous interaction. The relationship between
Internet as a medium through which it is possible the instructor and the student is more real in a
to access study material, essays, and articles that synchronous online context rather then in wide
concern the main course topic. It is not possible university classrooms where the instructor is not
to consider e-learning without accounting for able to reach every individual.
the use of the Internet as a collaborative means
through which it is possible to set up virtual com-
munities. For this reason, it is possible to make conclusIon
use of forums, chat rooms, discussion groups,
and audio and videoconferences. Another way of E-learning as an integrated training model implies
integrating resources is to publish the results of that all the possibilities offered by the third generation
group projects so that they can be downloaded. distance education are combined with the traditional
Use of individual and collaborative learning training model. Synchronous interaction becomes fun-
models: It is necessary that these two models are damental in setting new mechanisms similar to those
properly integrated. As with traditional training, offered by the face-to-face model. As stated before,
in e-learning there are both individual and col- cooperative learning, typical in virtual communi-
laborative learning moments. Obviously there is ties, using certain techniques such as collaboration,
a connection with the two different uses of the cooperation, peer tutoring, and so forth, emphasizes
Internet. Each individual moment utilizes the In- the e-learning value both in training processes and in
ternet as a transfer means for the downloading of educational ones.
material from the net. Of course, the collaborative Everything considered, the possibility of realizing
moment corresponds with the use of the Internet an interactive virtual environment is mainly due to the
as a tool to facilitate group interaction. Ideally, the introduction of ICTs to the teaching/learning processes.
moment of individual growth is integrated with In contrast, the face-to-face setting is still valuable
the moment of collective growth. As a result, the thanks to the advantages offered by instant feedback.
communicative revolution began thanks to the Distance education allows for widespread classrooms
third generation distance education and allows that provide qualitative, quantitative, and economical
the interaction with the e-tutor, the instructors advantages.
and the students. Traditional educational training is a one-way process
Use of synchronous and asynchronous models: which follows a well-defined time frame and which
The potential of the Internet is well-exploited by models the contents on the basis of the users results.
distance education especially when educational Moreover, instructors follow a logical path and force
training is delivered in both synchronous and asyn- the users to follow it. In the last generation of distance
chronous forms that are well integrated with the education, it is the student who constructs his/her own
various applications of the Internet and the various logical path: listening is on-demand and it is necessary
forms of learning. If it is true that the structure of to take advantage of multimedia tools. Organizing
individual learning appears to be connected mainly educational training courses by using a single learning
From Distance Education to E-Learning as Integrated Training
format means to exploit all the advantages given by environments. Australian Journal of Educational
the integration of both formats. Technology, 19(1), 59-71.
Several e-learning processes have developed, based
Hoadley, C. M. & Linn, M. C. (2000). Teaching Sci-
on a previously-existing distance learning format.
ence through on line peer discussion. A speakeasy in
However, if the course materials are simply an online
the knowledge integration environment. International
version of those used in traditional training courses, an
Journal of Science Education, 22, 839-857.
obstacle both to interaction and distance learning may
be created because the situation is not taking advantage Kearsley, G. (2000). Online education: Learning and
of the new method of learning. teaching in cyberspace. Belmont, CA: Wadsworth.
It is necessary to reorganize the traditional learning
models in order to create new ones that can exploit the Keegan, D. (1993). Theoretical principles of distance
new educational possibilities offered by the utilization education. London: Routledge.
of information and communication technologies. Koble, M. (1996). Integrating technologies in distance
education. Open Learning, 11, 41-44.
Cyrs, T. E. (1997). Teaching and learning at a distance: Park, M. J. (1999). The effect of a shared intranet science
What it takes to effectively design, deliver, and evaluate learning environment on academic behaviour. Dublin,
programs. San Francisco: Jossey-Bass. OH: Online Computer Library Center, Inc. (ERIC Docu-
ment Reproduction Service No. ED432274).
Draves, W. (2000). Teaching online. River Falls, WI:
Lern Books. Peters, O. (1998b). Learning and teaching in distance
education. London: Kogan.
Edelson, D. C. (2001). Learning-for-use: A frame-
work for the design of technology-supported inquiry Rowntree, D. (1995). The tutors role in teaching via
activities. Journal of Research in Science Teaching, computer conferencing. British Journal Technology,
38, 355-385. 3.
Garrison, G. R. (1985). Three generation of technologi- Tait, A. & Mills, R. (1999). The convergence of distance
cal innovation. Distance Education, 6, 235-241. and conventional education: patterns of flexibility for
the individual learner. London: Routledge.
Harasim, L., Hiltz, S. R., Teles, L., & Turoff, M. (1995).
Learning networks: A field guide to teaching and learn-
ing online. Cambridge, MA: The MIT Press. KeyWords
Herrington, J., Oliver, R., & Reeves, T. C. (2003). Asynchronous Learning: Learning process dur-
Patterns of engagement in authentic on line learning ing which communication among participants occurs
in deferred time.
From Distance Education to E-Learning as Integrated Training
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Distance Learning Techniques in University Courses
scientific coordinator and the area coordinator for defin- process but also in the technological and administra-
ing the specific cognitive areas of the reference subject. tive processes. D
The eexpert must be able to perform the wide range of The teaching manager, on the other hand, is required
activities listed next: to cover different responsibilities and possess differ-
ent skills. In addition to having organisational skills
Prepare teaching materials and a cognitive map of he/she is expected to develop, among other things,
the topics that he/she intends to cover. The teach- managerial skills linked to integrated and distance
ing materials will be fruit of the collaboration with multimedia teaching methodology with special empha-
the content experts, communication technology sis on collaborative and online learning. His/her job
experts and teaching experts. The materials that involves planning the course syllabus and following
are required to prepare shall be tools that, when it up, step by step, with a view to ensuring that it is
used in synergy, facilitate learning and may be taught efficiently and efficaciously. This figure is the
used as a guide for exploring and understanding main reference point for the tutors.
the cognitive areas and content transmission tools The main responsibility of the tutor, a figure that
(Learning Objects). will be described in the present paper according to
Prepare, in close collaboration with performance the various characteristics required, is to artificially
assessment experts, tests and self-tests deemed reconstruct the interaction processes with the student
suitable both in form and aims. so as to eliminate the condition of physical detachment
Interact with the system tutor in the handling of created by the distance teaching method.
organisational problems and with the content tutor The support offered by the tutor has a dual and
for the management of tools geared to stimulate circular nature: on the one hand, it aims at overcoming
dialogue and online learning in students; cognitive difficulties, and on the other, by combating
students sense of inadequacy in the face of learning
In addition to the specific subject-related skills, the tasks, it assumes a degree of emotional involvement
expert is also expected to be familiar with the e-learning which stimulates the students motivation.
platform used, both as regards constructive philosophy The tutor, therefore, has the responsibility to help
and teaching logic. the students contacting them by telephone, via fax,
Another important figure with a predominantly by meeting them directly and, first and foremost, via
methodological slant is the teaching coordinator who the internet (e-mail and forums) in order to provide
has the role of guiding the work of the teaching manag- information with regard to the activities to be carried
ers of each course held using integrated and distance out and to assist them in their learning experience. On
teaching methods. the basis of the main activity performed, two different
His/her main task to constantly monitor the effi- specialisations may be distinguished:
ciency and efficacy of the course planning by controlling
teaching organisation and management processes and Content tutor
ensuring that they comply with the procedures linked System tutor
to the teaching methodology applied. More specifically,
to successfully perform this task, he/she must be able The content tutor is an expert in a subject or subject
to gather and process the information required to be area who collaborates with the teachers; he/she is re-
able to control the quality of the teaching procedures sponsible for guiding the student along his/her chosen
applied. learning path and for facilitating the students compre-
By exercising this control, the teaching coordina- hension of the contents of each course. The content tu-
tor contributes to managing and guiding the learning tor is constantly at the disposal of the students; his/role
processes and elevating them to high quality levels, includes acting as guide, and offering advice and study
orienting his/her work towards the attainment of the support to facilitate learning and in-depth comprehen-
total satisfaction of all those involved. The teaching sion of the course contents.
coordinator is also required to guarantee the effi- This activity must be carried out, first and foremost,
ciency of the system of communication between all through the creation of asynchronous interactive virtual
the various subjects involved not only in the teaching learning spaces, such as structured forums and cognitive
Distance Learning Techniques in University Courses
maps, or wherever necessary through synchronous tools, cales. Monitoring of the learning process takes place
in order to focus attention on the topics highlighted as through continual feedback with regard to attendance
being the most important for each subject. and the number of examinations passed, on the quantity
With the supervision of the subject expert, the content and quality of online interaction and on the observance
tutor will take care of all the activities concerned with of learning-related deadlines.
both intermediate and final assessment, collaborating This reference figure represents the main interface
wherever necessary in the processing of online learning in the teacher-student relationship and is responsible
tests and examinations. for helping overcome any communication difficulties
The person covering this role must have transver- that might arise and for resolving any organisational
sal skills with particular emphasis on the capacity to or learning-related issues.
work in distance and online conditions and to handle When study courses provide for internships, the
interpersonal relationships such as group dynamics; system tutor will be responsible for finding companies
it is also important for the content tutor to possess prepared to accept students while, at the same time
good communication and negotiation skills in indirect ascertaining, through suitable tools, the type of intern-
communication and in the management of document ship that best matches the students expectations and
systems. abilities, and then following up the latters integration
The system tutor accompanies the student throughout in the company by continuous monitoring of his/her
the entire learning path, from the first contact during activities.
which he/she receives all the information relative to Within the framework of the system tutor function,
the study course that he/she intends to follow, up until the company tutor is responsible for accompanying the
the moment in which his/her learning path reaches its student throughout the internship phase and during
conclusion. that of his/her entry and integration into the profes-
The system tutor is expected to take care of orienta- sional world; his figure represents the link between
tion, that is, the distribution of the topics covered by the the company and the training body, in our case the
study courses and the teaching methods applied, and University. Together with the person appointed by the
he/she is also expected to follow the student also during company, he/she sets out the specific teaching goals
the fulfilment of the bureaucratic obligations required and the school/work alternation schedule, identifying
to enable attendance of the course selected. the activities pertinent to the professional internship.
The personalisation of the learning paths requires In order to cover this role, it is essential to have the
that research be undertaken right from the initial phases prerequisites required for the system tutor together
of course implementation with a view to gathering the with corporate business experience.
greatest possible amount of information on the personal The teaching methodology area must also include
characteristics of the students. Among his/her various a series of coordinating figures dedicated to process
duties, the system tutor is also responsible for the col- management. More precisely, the following figures
lection of data relating to personal details and academic have been outlined:
qualifications and for entering them in a computerized
database with a view to gaining knowledge on user Web-tutorial coordinator or master tutor: this
type. The system tutor is also expected to collaborate figure is responsible for coordinating online tu-
in the structuring of informative documents online toring and for dealing with matters relating to the
(such as, for example, Web pages) gathering teaching organisation and control of the teaching activities
materials and all the general information relative to the carried out by the content and system tutors with
course, and making it easy for users to consult them the aid of the appropriate software and online
via the internet. tools. This professional figure is responsible for
The system tutor constantly monitors the individual training tutors relative to online tools, monitoring
and overall progress of the students through direct and reports with regard to the data produced by
meetings, telephone calls and through the Net for the the information flows between the various players
purpose of reducing the dispersion and dropout rate involved in the e-learning training process. In ad-
typical of this kind of study course and facilitating the dition to in-depth knowledge of tutorial activities,
conclusion of the academic path within the set times- his/her skills also include specific knowledge on
Distance Learning Techniques in University Courses
the possibilities presented by interactive environ- involve the designing and editing of teaching units in
ments and ways of using them to advantage, as paper format, structured according to a precise method D
well as on methods and techniques for analysing geared to facilitate the students use, guiding the latter
document and information flows. with regard to the contextualisation and comprehen-
Assessment sector coordinator: manages a group sion of the topics covered, or in audio-graphic format,
of training process experts who deal with perfor- that is, intended to simulate the lesson through the
mance assessment research, particularly on the synchronized combination of audio recordings and
subject of distance learning. He/she also takes graphic diagrams corresponding to visual aids such
part in the planning and development of research as transparencies or blackboard, or, alternatively, in
related to the countless issues posed by a sector audiovisual format, in the form of recorded lessons,
such as distance learning and teaching innovation. or in other multimedia, hypermedia and interactive
Part of the experts making up this group must be formats. This figure is required to have skills in the
online assessment process experts or assessors. In area of indirect communication and document system
addition to consolidated experience in the perfor- management.
mance assessment area, this professional figure is The Web-editor covers the same functions as the
called upon to provide assistance to the scientific editor, specifically as regards the types of documenta-
and teaching coordinators and to the tutors on the tion that can be successfully used online. The Web-edi-
preparation of the performance assessment tools tor is therefore assignedduring the various phases
required for the internal assessment of the courses of implementation and updatingto the design and
and the final assessment geared to optimise the management of digital documents to support online
quality of the learning path. learning, that is, mainly documents produced using
mark-up languages such as HTML, XML, SVG and
The following figures complete the professional SMIL through the use of standard desktop publishing
profiles involved in the teaching methodology area: technologies, graphics and hypermedia navigation, as
well as those relative to the CMS (Content Manage-
Editor ment System) that supports the specific course. The
Web-editor Web-editor is, therefore, expected to have similar skills
Web supervisor to the editor as regards document production and to
possess specific knowledge on online communication
The editor covers functions such as the designing, and Website management, although not purely from the
editing and updating of the document systems of the software development point of view, as this latter skill
organisation responsible for providing and managing is required of other professional figures with whom the
the courses. The blended learning teaching method, Web-editor is required to collaborate.
applied and tested by CARID, is based on indirect The role of the Web supervisor, (or Web content
communication, that is, on interaction which, for the manager), defines the figure responsible for the content
most part, is not characterized by the simultaneous pres- and information aspects of the course management
ence and direct dialogue of the teachers, but managed organizations supporting Website. This figure is present
through the conveying of documents. Therefore the in all organisations, teaching-related or otherwise, whose
production of documents in the context of transmis- communication is characterized by the use of online
sion of knowledge by means of distance technology digital technologies. All other editorial and technical
becomes extremely important. Such production differs roles involved in the management of the Website report to
from the use of teaching aids during traditional teach- this figure: the skills required of this professional profile
ing inasmuch as it does not aim at in-depth analysis are those intrinsic to online communication, but from a
and supplementation of classroom communication but methodological as opposed to a technical standpoint. This
rather at its substitution (only as far as the conveying is, therefore, a person with a humanistic background,
of knowledge is concerned: educational interaction is cultural communication skills and basic knowledge of
realized through the profitable use of specific software technical language.
tools that lie outside this area). The responsibilities of
the editor, in collaboration with the content experts,
Distance Learning Techniques in University Courses
0
Distance Learning Techniques in University Courses
Distance Learning Techniques in University Courses
Section: Process ICT
Within the e-learning context, the importance of de- Concept maps, then, are used to represent cognitive
veloping concept mapsand, therefore, of developing structures in order to support the management of
software tools that support their design and utilization knowledge that is particularly significant in terms of
phasesclearly derives from their connection with the communicative and educational potential of its
the theme of the ontological structure of knowledge, content (and also to explore and exploit that content
which is founded on graph theory and which deter- collaboratively), but in order to optimize its commu-
mines, according to rules defined by Joseph Novak nicative effectiveness and efficiency (Tamayo, 2004)
(Novak & Gowin 1984), the node elements and the it is necessary to use software tools that allow for its
relationships with the arcs. However, concept maps automatic reconstruction/updating and also permit
cannot be described simply as a product of the evolu- visualization from multiple points of view through
tion of the concept of content indexing, since their role the application of rigorous, automatable, graphic rep-
encompasses not only the organizational function of resentation algorithms (Kremer, 1994), that can take
knowing but also the vehiculatory function, assuming the place of the onerous task of manual design using
that there is a specific clarificatory task within the graphic tools. Concept maps reconstructed using auto-
cognitive context that is different from, and additional mated procedures are, therefore, dynamic (Tillman &
to, the navigational support. Wissmann, 2004), meaning that they are part of a far
Research into concept maps takes its cue from the larger set of dynamic documents, which are docu-
world of education (Novak, 1998), in which their sig- ments produced in real-time at the users request and
nificance is clearly recognized. On the one hand, the which introduce information extracted from databases
characteristic representation of the tissue of relation- within formatted templates (most Websites include
ships that links the concepts together constitutes an dynamic documents generated using various technolo-
extremely interesting expressive approach in terms of giessearch engines being among the most common
its capacity to focus attention of learners, whereas on examples of dynamic content).
the other handand mainly within the framework of It is the sheer complexity and centrality of the rep-
constructivist didacticsthe environments used for the resentational aspect within the context of knowledge
ontological mapping of disciplines can be deployed as management that requires the use of tools which can
a locus for collaboration in exploring the cognitive and graphically reconstruct concept maps through auto-
negotiative context. Both of these aspects are further mated actions that based on the information contained
promoted by e-learning (Canas, Hill, & Lott, 2003; in the Knowledge Management support databases (and,
Canas, Hill, Carff, Suri, Lott, & Eskridge, 2004), which therefore, in large part, by the organizations Data
uses concept maps not only in the representation of Warehouse) and using online technologies are able to
knowledge within a range of structural Learning Ob- reproduce the schema of elements and relations in any
ject models (Information Maps, Generative Learning, situation in which this function is necessary, without
Workflow-based Learning) but also in the indexing recourse to manual operations (Pedroni, 2005).
of communication flows (Barabasi, 2004), and within Other tools, which go beyond the limits of manual
interactive environments geared towards the collabora- design, allow for the dynamic structuring of online
tive construction of knowledge. concept maps: this research has produced four models
of automatic composition for concept maps, correspond-
ing to four different reconstruction algorithms and to
four different graphical forms. Some of these models
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Dynamic Reconstruction of Concept Maps
can be reconstructed on the basis of a predefined or or didactic interaction, either in SVG format, or using a
random distribution of concepts within the documented vector graphics mark-up language derived from XML
space. Some of them feature two-dimensional graphics, and produced as standard by the W3C Consortium,
whereas others have three dimensions but, in any case, or inside a Java applet. Within the context of training
as virtual objects, they are susceptible to variations in processes, their use is linked in particular with the
the viewing angle. These models, which have online functions of content structuring and organisational
functionality, collect data from a DBMS and compose aggregation of the documents and learning objects to
images of maps that can be viewed in the browser and support the teaching activity.
are responsive to the input of information, meaning that
they are capable of supporting functions of navigation
Dynamic Reconstruction of Concept Maps
Dynamic Reconstruction of Concept Maps
Dynamic Reconstruction of Concept Maps
Figure 3-4. Proximal development three-dimensional rotable conic structure graph, and the same graph after
a rotation D
Dynamic Reconstruction of Concept Maps
Figure 5. Gravitational development three-dimensional initial random distribution rotable structure graph
Kremer, R. (1994). Concept mapping: Informal to Tillman,W. & Wissmann, J. (2004). Dynamic concept
formal. In W. Tepfenhart, J. Dick, & J. Sowa (Eds.), In maps for music. Paper presented at the 1st International
Proceedings of the Third International Conference on Conference on Concept Mapping. Pamplona, Spain.
Conceptual Structures, Knowledge Acquisition Using
Conceptual Graphs Theory Workshop (pp. 152-167).
University of Maryland College Park, Maryland. Key terMs
Novak, J. D. (1998). Learning, creating, and using
knowledge: Concept mapsas facilitative tools in schools Concept Maps: A method of document produc-
and corporations. Mahweh, NJ: Lawrence Erlbaum tion defined by J. Novak in the second half of the 20th
Associates. century and based on the expression of assertions.
These assertions are transformed into constructions of
Novak, J. D. & Gowin, D. B. (1984). Learning how to the entity/relation type, in a graphical form that recalls
learn. New York :Cambridge University Press. graph theory, in which the nodes are the concept ele-
ments (grammatically, nouns, and adjectives), the arcs
Pedroni, M. (2005). Knowledge mapping attraverso
are the relations (grammatically, verbs, and adverbs),
la ricostruzione automaticadi mappe concettuali
and both graphical symbols are always accompanied
dinamiche. Paper presented at the 10th Knowledge
by a label that displays their contents.
Management Forum. Siena, Italy.
Data Warehouse: A set of archiving systems for
Tamayo, M. F. A. (2004). El mapa conceptual: Un texto
company data in digital format, notable for its capacity
a interpretar. Paper presented at the 1st International
to store historical data relating to the organisations
Conference on Concept Mapping. Pamplona, Spain.
activities (production, marketing, administration) and
to make them available for querying for statistical or
Dynamic Reconstruction of Concept Maps
0 Section: Context ICT
Penelope Markellou
University of Patras, Greece
Aristotelis Mertis
University of Patras, Greece
Angeliki Panayiotaki
University of Patras, Greece & Hellenic Ministry of Economy & Finance, Greece
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
E-Commerce Recommendation Systems
middle of 1990s and from novelties used by a few CF is also vulnerable to attacks from vicious users for
Websites have changed to important tools incorporated example promotions of an item or nuking. E
to many e-commerce applications (e.g., Amazon.com, Another approach is content-based filtering (Sarwar,
eBay.com, CDNow.com). Specifically, these systems Karypis, Konstan, & Riedl, 2000; Jung et al., 2003)
take advantage of users and/or communities opinions/ that uses product features and recommends products
ratings in order to support individuals to identify the to users that have similar features with those they rated
information or products most likely to be interesting to highly during the past. It has some problems same with
them or relevant to their needs and preferences. CF and some of its own. As it is based on item-to-item
In this chapter, we investigate the way RSs support filtering, sometimes the recommendation results lack
e-commerce Web sites in their attempt to convert visitors diversity. The feature extraction process when it comes,
to customers. We present the background field, compare for example, to multimedia content can be rather difficult
the latest RSs and describe a general process for RSs. and a proper representation for the objects is not easy.
Finally, we illustrate the future trends and challenges The new-user problems still exist here. However,
and discuss the open issues in the field. content-based filtering can work more easily with
implicit feedback methods like keeping record of the
purchase or search history, compared with CF, which
bacKground most of the times needs explicit ratings of items.
Besides these two techniques, demographic filtering
The dilemma of how to choose the most suitable prod- employs demographic data (e.g., gender, age, education,
ucts and services is a challenging research problem. profession, etc.) to infer recommendation rules based
Various approaches have been used to produce recom- on stereotypes. However, there are issues here about
mendations. Initial efforts were limited to check-box how the user information will be obtained and about the
personalization, where portals allowed the users to privacy policy of the company towards the customers.
select the links they would like on their personal Privacy issues are common in demographic filtering
pages, for example MyYahoo! (Manber, Patel, & and CF methods. Lastly, statistics-based methods (e.g.,
Robinson, 2000). This has proved deficient since it best-sellers) provide no-personalization but their results
depends on the users knowing in advance the content can be appreciated by users while they are easy to
of their interest. Moving towards more intelligent ap- implement. Many systems incorporate them into their
proaches, collaborative filtering (CF) or social filtering recommendation strategy as a stable technique. Due
(GoldBerg, Nichols, Oki, & Terry, 1992; Jung, Na, & to the shortcomings of each recommendation method,
Lee, 2003) typically based on product ratings explicitly hybrid models (Burke, 2002) have been proposed in
defined by the users. The system recommends items order to combine the robustness and eliminate the draw-
that have been evaluated positively by similar user(s) backs of the individual techniques. In the next tables a
whose ratings are in the strongest correlation with the comparison of the most recent RSs is provided.
current user. CF tries to model the way people take
recommendations from friends, which would be the
ideal situation. Its advantages include the capability recoMMendatIon systeMs
of application in cross-domain recommenders and Process
the simplicity compared to other recommendations
techniques, as it does not need feature extraction, Even though RSs are complex applications that combine
item representation, and so forth, but only ratings. Its several models, algorithms, and heuristics, most of them
drawbacks include the so-called new-item problem perform the basic steps of the knowledge discovery in
where a new item is not recommended unless a notable databases (KDD) process. This process includes the
number of users rate it, the more common new-user following steps: data selection, data pre-processing
problem, where a new user is registered and has not and transformation, data analysis, interpretation and
rated enough items so that the recommender can make evaluation, and presentation (Geyer-Schulz & Hahsler,
accurate recommendations and the sparcity problem, 2002), as depicted in Figure 1.
where the number of available ratings are much larger
than the ratings to be predicted by the recommender.
Recommendation
Systems
Table 1. Comparison of various RSs
User-item matrix
Feature vectors
History of purchases
Demographic features
Stereotyping
Training set
Manual
IR techniques i.e. TF-IDF
Clustering
Classifiers
Explicit feedback
Implicit feedback
Semantic feedback
Domain knowledge
Weighted
Mixed
Meta-level
Cascade
Feature augmented
Switching
Feature combination
data selection interaction with the users using acquisition rules, plan
recognition, and stereotype reasoning). However, in
This step refers to the selection of the data set that will both approaches, we have to deal with different but
be used to produce recommendations and can stem from equally serious problems. In the case of explicit profil-
various sources. Collecting accurate and sufficient data ing, users are often negative about filling-in question-
comprises a crucial task of every RS. Specifically, it naires and revealing personal information online, they
can include data about the user (demographics, user comply only when required and even then the submitted
knowledge, skills, capabilities, interests, preferences, data may be poor or false. On the other hand, in implicit
goals, etc.), the usage (selective actions, ratings, usage profiling, even though our source of information is not
frequency, action correlations or sequences, etc.), and biased by the users negative attitude, the problems en-
the usage environment, hardware, software and physi- countered derive once again from the invaded privacy
cal (browser version, available plug-ins, bandwidth, concern and the loss of anonymity. Personalization is
display/input devices). These data can be collected striving to identify users, records their online behavior
either explicitly (the user is asked to provide them in as much detail as possible and extracts needs and
using questionnaires, fill-in preference forms, etc.) or preferences in a way they do not notice, understand or
implicitly (the data are derived without initiating any control (Kramer, Noronha, & Vergo, 2000; Mesquita,
E-Commerce Recommendation Systems
Barbosa, & Lucena, 2002). The most important data Transaction identification: This problem (group-
sources that a RS can use are: registration, login/pass- ing the references of each user) can be solved by
word, history file, navigation, search keywords, support, using time windows that partitions a user session
product/service evaluation, etc. based on time intervals (specified thresholds).
data Pre-Processing and transformation Then the map of the data into required structures
can be performed. These models can be either indi-
The next step in the recommendation process after data vidual or aggregate (when working with groups of
collection (a task that is in continuous execution) is users) profiles.
data preparation that involves data cleaning and data
transformation into internal representation models that data analysis
will allow for further processing and updating. Data
cleaning removes all irrelevant entries from the web Then the application of statistical and data mining
server logs in order to facilitate their manipulation. For techniques follows, in order to detect interesting pat-
instance, entries that do not reveal actual usage infor- terns in the preprocessed data. The most well known
mation are removed and missing data are completed. techniques used for data analysis include clustering,
Moreover, data compression algorithms can be used in classification and association rules mining. A more
this stage in order to reduce the size and dimension of detailed description of these techniques follows.
the data and achieve efficient mining of the patterns.
The problems that we face often during this phase in- Clustering: Clustering algorithms are used mainly
clude: user identification, session identification, path for segmentation purposes. Their aim is to detect
completion and transaction identification. natural groups in data collections (e.g., customer
profiles, product databases, transaction databases,
User identification: Registration and login/pass- etc.). They compute a measure of similarity in the
word procedures, as well as the combination of collection in order to group together items that
other heuristics, can be used for assuring the have similar characteristics. The items may either
identification of unique users. be users that demonstrate similar online behavior
Session identification: Session is a set of user or pages that are similarly utilized by users. The
clicks across one or more web servers and session produced groups (database segmentation into
identification aims to group the page accesses of clusters of similar people, e.g., customers, pros-
each individual user into sessions. Time windows pects, most valuable or profitable customers, most
can be used to identify the different sessions of a active customers, lapsed customers, etc.) can be
user. based on many different customer attributes (e.g.,
Path completion: This problem is caused from navigation behavior, buying behavior or demo-
local cashing and proxy server activities creating graphics). There are several clustering algorithms
gaps in the users access paths. Referrer log for available: hierarchical agglomerative clustering or
identifying the page that the request came from HAC, k-means clustering, self-organizing maps
and also the site topology can be used to fully (SOMs) or Kohonen (Chakrabarti, 2003).
cover this issue.
E-Commerce Recommendation Systems
read them or they are not willing to. Moreover, some The emergence of the semantic Web and the wide
customers dont recognize or understand the value of usage of other decentralized infrastructure like the grid
personalization provided by the Web sites in return for or peer-to-peer systems will also influence the develop-
the personal information. Kobsa and Teltzro (2005) ment of recommender systems. Most implementations
presents an alternative way of communicating the pri- so far are based on simple client-server architecture
vacy statements with the customer, which offers better and therefore centralized, that is a server performs all
results. The privacy policy is broken into pieces and is the computations and stores all the data. The adoption
distributed to the context that each piece refers to. Each of a decentralized model (Ziegler, 2005) has multiple
time a customer is asked to provide a bit of personal benefits. Firstly, decentralized infrastructures can give a
data, comprehensive information is given about how solution to the problem of privacy as both data storage
the data will be used and why they are needed. The and calculation can be done locally on each network
communication of privacy policy is one step towards node. Also, a central service provider is not necessary
acquiring the trust of customers. as network nodes function independently. Through
Trust is also an issue when it comes towards the their own sites or homepages, organized in a machine
results of the RS. Lots of times, recommenders suggest understandable form, information can be acquired about
unreasonable products to customers. Such situations user preferences and trust circle by means of links to
make customers lose their trust on the site and abandon other sites. Lastly, speed and scalability problems,
it. Pazzani (2005) proposes more sophisticated algo- which exist in current projects, will dissolve.
rithms than can comprehend the user goals and relate As mobile computing grows exponentially, rec-
them to a well-built common knowledge representa- ommendation techniques are evolving to take more
tion. ODonovan and Smyth (2006) give a solution to parameters into consideration. With GPS technology,
the first aspect, which promotes interactivity with the recommendations in the spatial domain can be done.
user in order to elicit the current need of the customer For instance, a restaurant recommender can use col-
instead of guessing a recommendation. A dialogue- laborative filtering and a content-based algorithm to
based recommendation can figure out whether users recommend restaurants nearest to the customer that
focus has changed context and it can assist a user lost fit his taste. Also, the time parameter can be used in
in the information, while a wrong guessing can result combination with the customers location in order to
in losing the customer. provide one-and-only items, as for instance, a gallery
Another important issue is the security of recommen- occurring in a certain time period at the customers
dation techniques. Recent work like the one presented by location. So, location-based recommenders are highly
Lam and Riedl (2004) has disclosed the vulnerabilities recommended for tourism applications. Of course, this
mainly of collaborative filtering to attacks. An attack kind of services also raises some important issues like
can either target an item promotion, called a push attack privacy concerns, especially when the profile informa-
or an item degrading, called a nuke attack. The attacker tion is stored in a central node.
can promote an item by creating fake user profiles and
providing high rating to it and most common ratings
in the other items, so that the attacked profile or the conclusIon
attacker is highly correlated with most users or user
profiles. The way the attacker chooses to interact with Recommendation systems are special personalization
the system in order to transform the systems behavior tools that help users find interesting information and
is called attack model. Burke, Mobasher, and Bhaumik services in complex online shops. Even though todays
(2005) provides a survey of the attack models and identi- e-commerce environments have drastically evolved and
fies the six dimensions in attacks; the data sources, the now incorporate techniques from various domains and
recommendation algorithms, the profiling algorithms, application areas, setting up a successful recommenda-
the detection of attacks, the response to the attacks and tion system is not a trivial or straightforward task. In
lastly the evaluation of the damage the attacks cause. this chapter, we presented the importance of RSs for
Future focus will concentrate in enhancing the robust- intelligent e-commerce web sites, compared the latest
ness of current algorithms in attack detection and the RS, explored the different steps of recommendation
invention of metrics that can evaluate the change that process and concluded by discussing some open is-
has been caused by an attack. sues in the field.
E-Commerce Recommendation Systems
E-Commerce Recommendation Systems
Melville, P., Mooney, R., & Nagarajan, R. (2002). Conjunction with the 2005 International Conference
Content-boosted collaborative filtering for improved on Intelligent User Interfaces (IUI05) (pp. 72-76).
recommendations. In Proceedings of the Eighteenth San Diego, California,.
National Conference on Artificial Intelligence (AAAI-
Smyth, B. & Cotter, P. (2000). A personalized televi-
02) (pp. 187-192).
sion listings service. Communications of the ACM,
Mesquita, C., Barbosa, S. D., & Lucena, C. J. (2002). 43(8), 107-111.
Towards the identification of concerns in personaliza-
Torres, R., McNee, S. M., Abel, M., Konstan, J. A.,
tion mechanisms via scenarios. In Proceedings of 1st
& Riedl, J. (2004). Enhancing digital libraries with
International Conference on Aspect-Oriented Software
TechLens+. In Proceedings of the Fourth ACM/IEEE
Development, Enschede, Netherlands. Retrieved March
Joint Conference on Digital Libraries (JCDL 2004)
16, 2008, from http://trese.cs.utwente.nl/AOSD-Ear-
(pp. 228-236). ACM Press.
lyAspectsWS/Papers/Mesquita.pdf
Ziegler, C. N. (2005). Towards decentralized recom-
Middleton, S. E. (2003). Capturing knowledge of user
mender systems. Unpublished doctoral thesis, Albert-
preference with recommender systems. Unpublished
Ludwigs-Universitt Freiburg, Germany.
doctoral thesis.
Middleton, S. E., De Roure, D. C., & Shadbolt, N. R.
(2004). Ontology-based recommender systems. In S. Key terMs
Staab & R. Studer (Eds.), Handbook on ontologies (pp.
477-498). Springer-Verlag. Collaborative Filtering: It is the method of making
automatic predictions (filtering) about the interests of
ODonovan, J. & Smyth, B. (2006). Is trust robust? An a user by collecting taste information from many users
analysis of trust-based reommendation. In Proceedings (collaborating).
of the 11th International Conference on Intelligent User
Interfaces. ACM Press. Content-Based Filtering: It uses product features
and recommends products to users that have similar
Pazzani, M. J. (2005). Beyond idiot savants: Recom- features with those they rated highly during the past.
mendations and common sense. In Proceeding of Be-
yond Personalization Workshop, Next Stage of Recom- Demographic Filtering: It employs demographic
mender Systems Research, in Conjunction with the 2005 data (e.g., age, profession) to infer recommendation
International Conference on Intelligent User Interfaces rules based on stereotypes.
(IUI05) (pp. 99-100). San Diego, California. Hybrid Approaches: It combines various methods
Personalization Consortium (2006). Retrieved March to produce recommendations in order to combine the
16, 2008, from http://www.personalization.org robustness and eliminate the drawbacks of the indi-
vidual techniques.
Salter, J. & Antonopoulos, N. (2006). CinemaScreen
recommender agent: Combining collaborative and Personalization: It is a set of techniques and services
content-based filtering. IEEE Intelligent Systems, that aim to solve the information overload problems
21(1), 35-41. Web users face, by providing them with what they
want or need, without having to ask (or search) for it
Sarwar, B. M., Karypis, G., Konstan, J. A., & Riedl, explicitly.
J. (2000). Analysis of recommendation algorithms for
e-commerce. In Proceedings of the 2nd ACM Electronic Recommendation System: It is a program which
Commerce Conference (EC2000) (pp. 158-167). Min- attempt to predict items (movies, music, books, news,
neapolis, MN. web pages, etc.) that a user may be interested in based
on various information, for example demographics,
Schafer, J. B. (2005). DynamicLens: A dynamic transaction history, navigation, and so forth.
user-interface for a meta-recommendation system.
In Proceeding of Beyond Personalization Workshop,
Next Stage of Recommender Systems Research, in
Section: Context ICT
Debora Infante
University of Basilicata, Italy
Angela Pascale
University of Basilicata, Italy
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Education and E-Learning Evaluation and Assessment
questionnaire to gather information referring to the process must be able to support each of the necessary
students reactions to the training experience and to practical activities (exercises, simulations, etc.). It is
produce useful feedback on what the course has meant important to verify immediately what the participants
for the students. Teaching effectiveness and the training have learnt. Assessment is also based on the observa-
process are closely linked because a deliberate teaching tion of the interaction among participants and on their
plan can be critical for the students to reach the course means of collaborating and learning together. A balance
objectives. As a result, student evaluation of learning between tests based on quantitative aspects (the number
means assessing the validity of the teaching process. and distribution of messages in diverse work areas) and
The course evaluation is divided into three phases. qualitative ones (content of messages) is fundamental.
The first is ex-ante and it refers to the identification of In analysing several online training experiences, it can
a series of indicators which are evaluated by a financial be emphasized that the best results from the learning
body on the basis of the planning prospect target of perspective are obtained when a frequent and positive
the institution that proposes the course of study. The collaboration between the instructor and the students
purpose of the other two phases, in-itinere and ex-post, (vertical interaction) is achieved in addition to frequent
is to identify the discrepancies and the conformities communication between the students (horizontal inter-
between the planning proposal and the implementation action) (Bocconi, Midoro, & Sarti, 1999).
of the plan. In particular, the formative assessment (in The interface in virtual learning environments
itinere) can be divided into learning assessment (ef- should be intuitive and friendly so that students needs
fectiveness) and process assessment (efficiency). As far are facilitated by their use. Especially in the case of
as the latter is concerned, two different kinds of data short courses, the time necessary to learn how to use
exist: the objective data are provided by the organization the system should be proportionate to the course objec-
which offers the course (obtained through the official tives. It is also important that the environment should
reports that are submitted throughout and at the end of offer a series of useful features for adequate support
the course) and the subjective data which are provided of the participant in the learning process.
by the students (gathered through questionnaires) who
express their opinion about:
tools to evaluate e-learnIng
Instruction (competence, effective timing, inter-
est in the contents, clarity and articulation of Some e-learning environments provide the possibility
topics); to track and elaborate a great quantity of information
Course structure (presentation, articulation of automatically thus making data collection easy, are very
contents, timeliness); important. Moreover, one of the most important features
Teaching material and contents (conformity to the of e-learning is the monitoring method that typically
courses general objectives and to the students includes tracking systems and e-portfolio.
background knowledge);
The e-learning platform adopted (functionality, tracking systems
clarity, and intuitiveness);
The experience (pros and cons of the course). A tracking system is usually characterized by:
Both during the interaction assessment and the The login accesses the e-learning platform which
e-learning platform assessment, it is necessary to identifies the user, tracking the connection date;
emphasize that integrated e-learning environments are The login session allows measurement of the dura-
mainly based on written and asynchronous communica- tion of the connection to the e-learning platform
tion which provides the possibility to pair collaborative by the user;
learning with learning by doing. These environments The visited areas of the platform allow monitoring
are generally used for social-constructivist learning of the areas visited by the user during the login
processes where a virtual community collaborates in session;
the development of mutual products or interaction about The testing evaluation scores the tests completed
the course topics. Technological equipment used for this by the user;
0
Education and E-Learning Evaluation and Assessment
The training course summary provides overall competences and knowledge, collaborating with the
data about the course attended by the user. others to reach the same goal. The SNA permits the E
description and analysis of the structure of interaction to
By tracking individual logins to the e-learning be considered during exchanges within a group or in a
platform, it is possible to measure the frequency dis- virtual community, evaluating the impact each has on the
tribution of contacts within a fixed time interval (per relational structure and observing the effectiveness of
week, per month, per year) and the reason for the login the role models (tutors, moderators, etc.) as they interact
(downloading material, establishing contacts with the and communicate. Moreover, the SNA can be a useful
instructor, chatting sessions, taking part in discussion instrument for the tutor to monitor while developing
forums, etc.). The information that is gained from the the process of cooperative knowledge construction. In
tracking facilities indicates whether the login trend particular, the SNA identifies some critical moments
has been constant and if it has followed the insertion of group dynamics (isolation, attention catalyzation,
of the material provided by the instructors or if there non-mutual interaction) that should trigger immediate
has been a particular concentration activity during intervention by the instructor in order to quickly make
certain periods (for instance before the final exam). It any necessary modifications to the program.
is clear from the tracking process whether the user logs Another important aspect of SNA is the option to
in only to download the course material, or to post an display the relationships and communication among the
answer to the instructors or to actively participate in different net components called knots through the use
the virtual community while developing a cooperative of diagrams, graphs and maps by using a tool such as
learning experience. NetDraw. Furthermore, it is possible to study the fac-
Through text analysis of forum discussions and tors that influence the relationships among the knots by
chats it is possible to understand the dynamics of the considering, for example, the age, the context, and the
users learning process and of the gradual progress of background of the individuals involved in the analysis.
the community. This study can be carried out by using traditional sta-
Tracking data and the analysis of the materials are tistical techniques such as the correlation, the analysis
fundamental to evaluate the project as a whole as well of variance, the factor analysis, and so on.
as the online activities of each student. Interpretative
models as well as algorithms are necessary to go beyond
the single numerical datum, in order to consider the electronIc PortFolIo
quality of online activities and data relationships, and
to integrate the quantitative analysis of online activities A portfolio is a useful instrument to evaluate learning
with the semantic analysis of written texts. At the same and there are a variety of portfolios.
time it is necessary to develop models of online interac- It is possible to describe the portfolio as a profile
tion typologies through which it is possible to establish containing a list of certificates and credits obtained
the planning and the realization of interoperating and during an individuals school years and any possible
customizable environments. One of these methods of certification of training and work experience. However,
analysis is the social network analysis (SNA). It is a it is also possible to consider the portfolio as a portfolio
quantitative-relational analysis of the interaction flow of competencies which allows the documentation of an
and, unlike traditional quantitative methods based on individuals particular learning process. This model
the characteristics of each participant (sent messages, produces a personalized interpretation of learning and
received messages, etc.), it is based on relational data: provides the opportunity to document, evaluate and
connections, contacts or links that characterize a group create awareness of the acquired competencies. From
of people or of organizations (families, associations, a didactic point of view, the interest in the portfolio is
societies, countries, etc.) (Scott, 1997; Wasserman & related to the way in which teaching is planned with an
Faust, 1994). emphasis on a personalized, learner-centered approach
As already stated, in e-learning, the construction and reflection. The way through which the portfolio de-
of knowledge is not only achieved through the activ- velops in addition to the role of the student may change
ity of the single user but through the participation of the purpose of the portfolio from an instrument used for
a virtual community with which it is possible to share the documentation and evaluation of the processes to
Education and E-Learning Evaluation and Assessment
a tool used to acquire awareness of the process (Rossi, newly synthesized materials that can be compared and
Magnoler, Blam, & Alessandri, 2004). interpreted. In this way, it is possible to personalize the
In e-learning, the portfolio is called e-portfolio process and learning increases through sharing and the
(electronic portfolio). It consists not only of the simple construction of meaning.
reproduction of a paper-based portfolio in a digital
format but also allows the user to collect digital arti-
facts, to share them and to connect them in reticular toWards an IntegratIon oF
structures. e-learnIng and e-assessMent
A standards-based e-portfolio makes use of a da-
tabase and hypertext links to identify the relationship By accounting for the socioeconomic theory according
between the appropriate goals of the course and the to which the training and assessment process is divided
final artifacts. As Barrett (2000) says it is important into different phases, Kirkpatricks (1994) four-level
to not only collect artifacts but also to document a model is a truly appreciated approach that utilizes:
process that evolves dynamically over time in order
to study its evolution. Reactions: A measurement of how well the
Many e-portfolios are based on the model first used students enjoyed a particular training program
by Danielson and Abrutyn (1997) and then revised by (customer satisfaction);
Barret (2000). This model consists of the following Learning: What competencies the students have
fundamental steps: absorbed;
Application: Students ability to transfer and
1. Collection: A description of the artifacts to be apply new competencies;
collected by students will be evaluated by the Impact: The result of training as it relates to ef-
tutor/instructor on the basis of the portfolios au- fectiveness and efficiency.
dience, purpose and future use of the artifacts.
2. Selection: A selection of the materials chosen by In e-learning, assessment needs to be re-defined
students to be included in their portfolio according according to new learning scenarios. Various scholars
to certain criteria that reflect the learning objec- have attempted to describe the quality of training experi-
tives established for the portfolio. The tutor/in- ences from a cognitive perspective. Savery and Duffy
structor directs students in making the choices so (1995) underline that the concept quality of learning
that the materials are representative of the level is possible when:
of learning achieved during the course.
3. Reflection: An overall review by the students of The student is actively involved in the learning
the collected material which allows reflection on process;
each piece in their portfolio. The self-assessment The student constructs the students own knowl-
brings added value to the review process. edge;
4. Projection/direction: Students review their The student acts at a metacognitive level;
reflections on learning and set new goals for the Social negotiation is involved in understanding.
future. They receive feedback which is useful to
direct their competencies. According to the constructivist perspective, the
5. Presentation: Students share their portfolios and importance of evaluating learning from the learners
request feedback from others. Documents are con- viewpoint has gained a new value after changes which
verted into a format which allows hyperlinks. have occurred in traditional teaching. Learning is con-
sidered the result of internal and external factors which
As already stated, if the portfolio is useful to docu- are inextricably woven together and which involve the
ment individual competencies, an e-portfolio allows learner in the training process. In this case, methods that
students to connect materials situated in different files bring instructors and evaluators closer to the learners
and retrieve any work that is considered meaningful both point of view may be required. It is also necessary to
in their own course and in those of the other students let the instructors and evaluators recognize that the
or instructors. This process results in the assembly of
Education and E-Learning Evaluation and Assessment
interpretation of the learners performance is effected membership, encouraged by the course activities and
by their own experience. by tutor messages, is a fundamental element for the E
Within a learning community, the importance of course success.
understanding learning from an internal viewpoint
is further strengthened. Some experts (Henry, 1992;
Henry, Charlier, Daele, & Pudelko, 2003) underline conclusIon
that in order to support effective training courses, it
is necessary to establish an assessment dimension, Everything considered, recently there has been an in-
negotiated by the community, which reflects the idea creasing interest in e-assessment. It is necessary to go
of assessment as a knowledge process. Thus, the pro- beyond a purely mechanical assessment of the skills
cess of assessment means truly understanding the new of a student, since the entire process of learning has
learning scenarios. been placed in a relational dimension and in a precise
Quality of learning is connected to individual environment where motivation can affect the course
and collective experiences validated by the course results.
community (instructors, designers and students). As There are different ways to control a face-to-face
a consequence, learning is the result of a group pro- training session. In contrast, it is possible to monitor,
cess where the students both as individuals and also check and evaluate the entire e-learning process thanks
as members of a group learn through the adoption of to the data generated by the virtual platform. However,
new practices. This process is not only active but also only taking into account the data concerning the standard
reflexive. Learning assessment is based on individual objective tests would mean ignoring the cooperative
and group reflections as well as on the suitability and and dynamic essence of a course.
accessibility of knowledge and materials and also on In e-learning, assessment processes are essential
the concrete realization of what has been learned. because they turn the scrutiny of the course evaluation
The significance given by each participant to the from collateral and/or final activities to ones that may
training experience emphasizes the need to focus have continued throughout the course. Additionally,
on the evaluation of its quality and the fundamental the assessment changes from being other-directed to
factors in the development of a learning community. a co- or self- managed practice. As a consequence the
Active involvement of the students in the discussion goals and the evaluation criteria are shared by all the
and in metathinking regarding the training process is actors involved in the learning process (Varisco, 2004).
fundamental to obtain a valuable review of the ongo- Thus e-assessment also incorporates the context of a
ing process. course, and is considered fundamental in an environ-
Supporting the student in becoming an effective ment constructed to facilitate learning.
thinker is a useful strategy to adopt. In this way, he/she
may evaluate the learning process by reflecting on the
online experience and focusing his/her attention on the reFerences
social interaction that facilitates the e-learning process in
group settings. Metathinking leads to a clear awareness Baron, C. (1996). Creating a digital portfolio. Indi-
of individual needs within the community structure. It anapolis: Hayden Books.
aids in the definition of a common goal and emphasizes
the possible achievements of the student as a result of Barrett, H. (2000). Create your own electronic portfolio.
his/her being a member of a community. Learning & Leading with Technology, 27, 14-21.
A metathinking approach should contain two differ- Bocconi, S., Midoro, V., & Sarti, L. (1999). Valutazio-
ent aspects of learning: learning in a virtual community ne della qualit nella formazione in rete. Tecnologie
(interaction and group activation, communication me- Didattiche, 16, 24-40.
diated by the computer, including an instructor role)
and contents learning (effectiveness of activities and Calvani, A. & Rotta, M. (2000). Fare formazione in
an ultimate satisfaction of expectations). Internet. Trento, IT: Erickson.
Without doubt, the element that influences the Danielson, C. & Abrutyn, L. (1997). An introduction
community is emotional involvement. The sense of to using portfolios in the classroom. Alexandria, VA:
Education and E-Learning Evaluation and Assessment
Association for Supervision and Curriculum Develop- Stufflebeam, D. L. (1997), A standards-based perspec-
ment. tive on evaluation. Peacock: Itasca.
Fragnito, R. (Ed.) (2002). La rete della didattica. Lecce, Varisco, B. M. (2004). Portfolio. Valutare gli appren-
IT: Edizioni Pensa Multimedia. dimenti e le competenze. Roma, IT: Carocci.
Henry, F. (1992). Computer conferencing and content Wasserman, S. & Faust, K. (1994). Social network
analysis. In A. R. Kaye (Ed.), Collaborative learning analysis. Methods and applications. Cambridge: Cam-
through computer conferencing: The Najaden papers bridge University Press.
(pp. 115-136). New York: Springer.
Henry, F., Charlier, B., Daele, A., & Pudelko, B. (2003). KeyWords
Evaluation for knowledge. In G. Davis, & E. Stacey
(Ed.), Quality education @ distance. Boston: Kluwer Assessment Item: A questionnaire, a test or any
Academic Publishers. other activity used to evaluate whether a student has
achieved the objectives that have been established.
Kirkpatrick, D. (1994). Evaluating training programs.
San Francisco: Berrett-Koehler. Chat Room: A virtual place where Internet users
meet and communicate in real-time using instant mes-
Moore, M. G. & Kearsley, G. (1996). Distance education:
saging applications.
A systems view. New York: Wadsworth.
Forum: An asynchronous online communication
Palomba, C. & Banta, T. (1999). Assessment essentials:
environment consisting of virtual message boards where
Planning, implementing, and improving assessment in
it is possible to leave messages in order to create a new
higher education. San Francisco: Jossey Bass.
discussion or to reply to a pre-existing one.
Penge, S. (2004), Valutare online. In A. Andronico, P.
Practices: Any activities that allow students to put
Frignani, & G. Poletti (Ed.), Didamatica 2004 Atti
into practice the knowledge and skills acquired through
(pp. 651-662). Ferrara, IT: Omniacom Editore.
the study material. These activities include case stud-
Rossi, P. G., Magnoler, P., Blam, M., & Alessandri, G. ies, exercises, quizzes, tests, laboratories, simulations,
(2004). E-portfolio. Caratteristiche teoriche, tecnolo- and so forth.
giche e didattiche ed analisi di una sperimentazione.
Self-Assessment: The educational process involv-
In Andronico, A., Frignani, P., & Poletti, G. (Ed.),
ing students who make judgements about their own
Didamatica 2004 Atti (pp. 887-907). Ferrara, IT:
level of knowledge and competencies.
Omniacom Editore.
Survey: The technique used to collect data useful
Savery, J. & Duffy, T. (1995). Problem based learning:
to acquire homogeneous answers to specific questions.
An instructional model and its constructivist framework.
It can be conducted by direct or telephone interviews,
Educational technology, 35(5), 31-38.
paper questionnaires, online forms, and so forth.
Scott, J. (1991). Social network analysis. A handbook.
Tracking: The process of recording the training
London: Sage.
path followed by a student in a training management
Stacey, E. (2000). Quality online participation: Estabil- system. Tracking allows the instructor to constantly
ishing social presence. Journal of Distance Education, monitor the students training activity.
14, 14-33.
Section: Context ICT
IntroductIon bacKground
The Web is going to produce a revolution in learning Current research suggest that it is not correct to assume
and teaching: the debate on the role of ICT in educa- that the introduction of ICT necessarily changes the
tional processes leads to a reconsideration of how we way students learn. We have to acknowledge that the
deal with information and knowledge. The widespread teacher plays a critical pedagogical role in creating the
use in educational contexts is also due to the ease with conditions for technology-supported learning through
which learning resources can be retrieved and shared: selecting and evaluating appropriate technological
for example, the recent introduction of learning ob- resources and designing learning activities (Galliani,
jects means that the contents which reside in different Costa, Amplatz, & Varisco, 1999). We can distinguish
e-learning platforms is easy to find and access. But between two approaches to ICT: a technology-centered
knowledge is also deeply embedded in millions of Web approach and a learner-centered approach (Mayer,
pages. Nonetheless, searching for information on the 2005). The former generally fails to lead to lasting
Web is not a simple task and the great number of docu- improvements in education: looking back at the many
ments found using search engines, such as Google, is predicted educational revolutions, in which the cur-
beyond the human cognitive capacity to deal with this rent new technology (radio, television, computer,
information overflow. Teaching information literacy multimedia, the Web) would have been the killer
skills or stimulating collaborative information filtering application for teaching and learning processes, we
that supports the discovery of resources in a way that is see that they failed to materialize (Cuban, 1986) and
responsive to the context of users may help, but there so was the case with the claims and worries, during the
is a need for more efficient cognitive tools to search, 1960s, that computers-as-tutors would replace teachers
organize, and discuss information in order to codify it (Cognition and Technology Group at Vanderbilt, 1996).
in shared knowledge structures. A learner-centered approach can, on the other hand,
In a more and more complex world we need sup- help students and teacher to learn and teach through
port to think at a high level so the technologies let us the aid of technology with a focus on how ICT can be
develop strong knowledge structures that do not have used as an aid to human cognition and consistent with
the representational problems of the old schemas. An the way the mind works solving complex tasks and
attempt in this direction is the Semantic Web: if we dealing with todays information overflow. The quantity
succeed in making the Semantic Web available and and kind of information students today need to assess
useful for education, it could revolutionize the way we has expanded exponentially in the last few years, due
think about teaching and learning with ICT. Our current mainly to the World Wide Web and improvements in
research is aimed at the development, experimentation the capabilities of search engines. In this context, it is
and evolution of an integrated learning environment important to consider both student and teacher roles
called EduOntoWiki that is backed up by a semantic using a constructivist approach that can stimulate col-
structure based on the active consent of communities laborative formalization and knowledge building.
of practice.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
The EduOntoWiki Project
seMantIc Web and ontologIes The importance of ontologies has been recognized in
different research fields, and even from an operational
The Web has arrived at an important epistemological point of view the current application areas are differ-
crossroad and there is a need to integrate the current ent: from medicine to knowledge content standardiza-
dialogic-informative model, which allows us to interact tion, from legal information systems to biological and
with people and search for documents on the Web, with geographical information systems, from e-commerce
a model based on the contextual knowledge domains to natural language processing, and finally education
within which we operate: the Semantic Web approach (Devedzic, 2004). Our current research project is aimed
(Berners-Lee et al., 2001). Both models are strongly at extending and integrating the construction and evolu-
based on a learner-centered approach so the applied tion of a semantic learning space that is backed up by
research, in particular in the field of ICT and educational ontological structures relative to educational sciences
technologies, is moving in two directions: (Petrucco, 2003) based on an active consent of com-
munities of practice.
1. The development of solutions for information ex-
change, and in general, for intelligent knowledge
management; the eduontoWiki Project
2. The development of a collaborative/cooperative
approach to knowledge building. The different training and background of those who
contribute to educational theory, the different cultures
The Semantic Web was coined by Tim Berners-Lee they belong to, and the rapid development of scien-
to refer to a vision of the next evolution of networks that tific work today require the development of a series
can add meaning to the navigational context of the cur- of shared conceptual schemas. It is important then to
rent World Wide Web. It is the new-generation Web that generate these schemas not as general principles but
makes it possible to express information in a machine- as justified, motivated, documented and finally usable
interpretable form, ready for software agents to process, schemas as control criteria of pedagogic discourse.
as well as to understand what the terms describing the As an ontology is basically a conceptual organizer
data mean both on the syntactic and semantic levels of scientific discourse, it is a formidable support to
(Hendler, 2001). An important role in the development hermeneutic work.
of the Semantic Web is played by ontologies (Gruber, Within this context we developed the idea to build
1993). The term is borrowed from philosophy but it is an ontology of education. The project takes into ac-
used in a different and more pragmatic sense: they are count the state of the art of educational research in
an explicit specification of a conceptualization, that is, Italy, France, Spain, Germany, England and Spain.
a formal description of concepts and relationships that The three thematic areas studied, at least in this first
can exist in a knowledge domain, that is intended as step of the project, are: didactic planning, educational
a knowledge base to be shared and re-used in the real communication, and assessment and evaluation. The
world. These ontological structures will, for instance, ontology is negotiated in working exchanges and
allow us to no longer surf the universe of documents dialogical moments in order to develop a circularity
on the Web through hypertext links from text to text, of information flow within the virtual community of
but from concept to concept; or even to retrieve in- the experts involved in the project and other actors
formation in a relevant way without the noise that participating.
characterizes search engines. In order to achieve this The project has been developed with the immedi-
aim, formalized languages have been created (XML, ate aim of building an integrated semantic learning
RDF) to mark texts semantically. These languages, environment called EduOntoWiki (http://multifad.
which are able to codify knowledge through domain formazione.unipd.it/eduonto), a wiki-based environ-
ontologies, can be easily understood both by humans ment where it is possible to construct, discuss, and
and by ad hoc programs such as semantic browsers contextualize ontologies suitable for describing the
(Dzbor, Domingue, & Motta, 2003) or by specific actors, processes and technologies of educational sci-
software agents. ences. A wiki was chosen because it enables easy and
immediate insertion, modification and sharing of texts
The EduOntoWiki Project
and materials by a community of users (Wikipedia is means that the contents which reside in the different
a good example) and because it gives freedom over systems used in e-learning platforms, need to become E
the knowledge creation process to users. The recent reusable, accessible and interoperable. Each object
promising research in the application of the semantic therefore needs to be described beforehand by others
Web to wiki software (Campanini, Castagna, & Tazzoli, through unambiguous formalisms (so-called LOM,
2004; Hepp, Bachlechner, & Siorpaes, 2005; Scaffert, learning objects metadata) so that people can retrieve
Gruber, & Westenthaler, 2005) confirm this decision. them more easily. But this retrieval paradigm is often
Indeed, our initial vision conceived the instrument wrong: the meaning of the metadata must be shared
as a tool to help in the creation of an ontology and the by most communities of users possible and this is not
description of a specific knowledge domain mediated the common case. The practice of describing resources
by a discussion within a community of practice. To be may at first appear to be simple and straightforward,
really useful an ontology requires the active consensus however, when a system of description is analyzed
of a committed community of practice in a knowledge deeply it becomes evident that it is actually ambigu-
domain (Domingue, 1998; Trentin, 2004) as experts of ous. The use of metadata presupposes not only a set of
do not always completely share the same categoriza- logical relations but also a specific vocabulary generally
tions, interpretations and distinctions. Often this is not agreed upon by a linguistic community (Downes, 2004).
only because of the reciprocal irreducibility of funda- Ontologies, integrated with social tagging processes
mental theoretical orders, which is both physiological (i.e., folksonomies) (Mathes, 2004), could indeed offer
and necessary, but rather because of the confusion a strong support for solving this problem because every
created by the different meanings given to key terms learning object would be embedded in the structure of
in the discipline in question. the ontology itself; in this sense there is a side-effect
If it were possible to have an ontological reference that consists of the collaborative setting up of a learn-
model with shared lexis and semantics, as regards both ing object repository that uses the ontological base for
terms and their relations, this would probably help to intelligent consultation. Learning objects have always
reduce conflicts which arise from misunderstandings existed in teaching: in their practice, educators operate
and incomprehension. Ontologies created in this way within a deconstruction and reconstruction process of
would also have a significant side-effect for all the materials and resources, but what is missing is often a
actors involved: first of all the definition of a common conceptual and disciplinary framework to go back to,
lexis (Wenger, 1998), then a strong push towards the which, in todays world, could be easily accessible and
conceptualization of tacit knowledge, and finally the consultable through the Web. It is precisely this that
sharing of a metamodel in which processes, knowledge the various domain ontologies could provide.
and relations are shared. Defining ontologies which The wiki interface of the ontologies is well suitable
support educational applications based on the Web for developing a constructivist environment, where
is therefore no simple task, above all because of the people of a learning community can add and modify
difficulty in formally conceptualising a domain which the concepts dialogically (Souzis, 2005). If we then
has always played on the idiosyncratic interpretation assume that the learning process is never confined to
of each philosophical/pedagogical approach. the materials used in an online course, but that it is also
Ontologies would be useful not only to the academic fruit of the interaction among the members of the group,
community, but as far as their didactic use is concerned, with the wiki-based ontologies we provide a scaffolding
we can think of an ontology or a series of educational (Devedzic, 2004) which will facilitate communication
ontologies, that could be used and discussed by students, and the construction of meaning among all the actors
teachers, and people interested in the real world of involved (academics, teachers, tutors, students) and
applications and training contexts. This open ontol- at the same time represent the structure and contents
ogy paradigm can offer considerable advantages. For of the discipline.
example, it could provide a medium which would foster
the sharing of the basic knowledge in a discipline and
a place where students could easily find educational
resources (learning objects) with a strong context rela-
tion to the subject. Today the learning objects paradigm
The EduOntoWiki Project
The EduOntoWiki Project
support the creation of semantically enriched content In Proceedings of the 11th Knowledge Acquisition,
using simple interfaces and by allowing domain experts Modelling and Management Workshop, KAW98, E
and novices, teachers and students to collaborate within Banff, Canada.
rich inter-cultural communities, sharing their true
Downes, S. (2004). Resource profiles. Journal of In-
life experiences. To conclude, while it is true that the
teractive Media in Education, (5).
EduOntoWiki project presents considerable challenges
both on a technical-scientific and on a theoretic-meth- Dzbor, M., Domingue, J., & Motta, E. (2003). Magpie
odological level as it attempts to integrate the most - Towards a semantic Web browser. In Proceedings 2nd
innovative instances of international research on the International Semantic Web Conference (ISWC2003),
Semantic Web and on pedagogic research, we also Lecture Notes in Computer Science 2870/2003.
believe that fast and complex contemporaneous social (Springer-Verlag), pp. 690-705.
evolution necessarily requires adequate instruments
able to interpret and manage it. Friesen, N. (2002). Semantic interoperability and com-
munities of practice. In J. Mason (Ed.), Global summit
of online learning networks: Papers. Retrieved March
13, 2008, from http://www.educationau.edu.au/global-
reFerences
summit/papers/nfriesen.htm [cited]
Bao, J. & Honavar, V. (2004). Collaborative ontology Galliani, L., Costa, R., Amplatz, C., & Varisco, B. M.
building with Wiki@nt. A multiagent based ontology (1999). Le tecnologie didattiche. Lecce, Italy: Pensa
building environment. In Proceedings of the 3rd Inter- Multimedia.
national Workshop on Evaluation of ontology-based
Tools (EON2004), Hiroshima, Japan. Gruber, T. R. (1993). A translation approach to portable
ontologies. Knowledge Acquisition, 5(2), 199-220.
Berners-Lee, T. (1998). A roadmap to the semantic Web,
W3C Consortium. Retrieved March 13, 2008, from Hendler, J. (2001). Agents and the semantic Web. IEEE
http://www.w3.org/DesignIssues/Semantic.html Intelligent Systems, 16(2), 30-37.
Bruner, J. (1996). The culture of education. Cambridge, Hepp, M., Bachlechner, D., & Siorpaes, K. (2005).
MA: Harvard University Press. OntoWiki: Community-driven ontology engineering
and ontology usage based on Wikis. In Proceedings
Campanini, S., Castagna, P., & Tazzoli, R. (2004). of the 2005.
Platypus wiki: A semantic wiki web. In Proceedings
of the 1st Italian Semantic Web Workshop Semantic Jonassen, D. H. (1995). Supporting communities of
Web Applications and Perspectives (SWAP), Ancona, learning with technology: A vision for integrating
Italy. technology with learning in schools. Educational
Technology, 35(4), 60-63.
Cognition and Technology Group at Vanderbilt (1996).
Looking at technology in context: A framework for Lave J. (1988). Cognition in practice. UK: Cambridge
understanding technology and education research. University Press.
In D. C. Berliner & R. C. Calfee (Eds.), Handbook Mathes, A. (2004). Folksonomies: Cooperative clas-
of educational psychology (pp. 807-840). New York: sification and communication through shared metadata.
Simon & Schuster Macmillan. In Proceedings of the Computer Mediated Communi-
Cuban, L. (1986). Teachers and machines: The class- cation, LIS590CMC (Doctoral Seminar), Graduate
room use o technology since 1920. New York: Teachers School of Library and Information Science, University
College Press, Columbia University. of Illinois, Urbana-Champaign.
Devedzic, V. (2004). Education and the semantic Web. Mayer, R. (2005). The Cambridge handbook of multi-
International Journal of Artificial Intelligence in Edu- media learning. Cambridge University Press.
cation, 14, 39-65. Petrucco, C. (2003). Le Prospettive Didattiche del
Domingue, J. (1998). Tadzebao and WebOnto: Dis- Semantic Web, Atti Didamatica 2003, TED 27-28
cussing, browsing, and editing ontologies on the Web. Febbraio 2003, p.168-176.
The EduOntoWiki Project
Petrucco, C. (2006). Folksonomie nella rete : costruire Learning Technology Standards Committee (LTSC)
categorie alternative, creative ed interculturali, in TD: give rise to the IEEE LOM (Learning Object Metadata)
tecnologie didattiche : quadrimestrale di tecnologie 1484.12.1-2002 standard of educational metadata.
didattiche. - 1, (2006), p. 36-48
Ontologies: An ontology is a formal representa-
Schaffert, S. Gruber, A., & Westenthaler, R. (2005). A tion of knowledge about an area of interest. The part
semantic wiki for collaborative knowledge formation. of the world conceptualized or described is called the
In Proceedings of Semantics 2005, Vienna, Austria. knowledge domain. Ontologies provide a vocabu-
lary for representing and communicating knowledge
Souzis, A. (2005). Building a semantic wiki. IEEE
domains and a set of relationships that hold among the
Intelligent Systems, 20, 87-91.
terms in that vocabulary.
Stutt, A. & Motta, E. (2004). Semantic learning webs.
Semantic Web: The Semantic Web is an extension
Journal of Interactive Media in Education, 10 [Special
of the current Web in which information is given a
Issue on the Educational Semantic Web].
well-defined meaning, better enabling computers and
Trentin, G. (2004). Apprendimento in rete e condivisione people to work in cooperation. The mix of content on
delle conoscenze. Milano: Franco Angeli. the Web has been shifting from exclusively human-
oriented content to more and more data content. The
Semantic Web brings to the Web the idea of having
Key terMs data defined and linked in a way that it can be used
for more effective discovery, automation, integration,
Communities of Practice: Communities of prac- and reuse across various applications. For the Web to
tice are groups that form to share what they know and reach its full potential, it must evolve into a Semantic
to learn from one another regarding some aspects of Web, providing a universally accessible platform that
their work. People in organizations often realize they allows data to be shared and processed by automated
could benefit from sharing their knowledge, in-sight, tools as well as by people. [W3C]
and experiences with others who have similar interests
or goals. For the most part, this process of informal Social Network: A social network is a set of people
gathering and sharing of expertise is a voluntary. or organizations or other social entities connected
by a set of social relationships, such as friendships,
Folksonomies: Folksonomies are bottom-up tax- coworking or information exchange. The connections
onomies that people create on their own, as opposed between them may show specific patterns and can be
to being created and imposed by a group or institu- represented by graphs. Recently many online social
tion such as by professional librarians using complex networking sites have begun to flourish with millions
and lengthy rule sets (e.g., Dewey decimal system or of users describing themselves in terms of who they
Library of Congress index). Synonyms include folk are, what music they listen to, what books they read,
categorization, social tagging, and ethnoclassification. and so forth, and trying to discover other people with
They are grassroots classification systems for data. The similar interests.
value in folksonomies is derived from many people
adding their own tags. The more people tagging one Wiki: A Wiki is a collaboratively-edited Website
object, the better, because it gives alternative ways of that uses a software publishing tool. The distinguishing
searching for and finding information. feature of wikis is that they typically allow all users to
edit any page, with full freedom to edit, change and
LOM (Learning Objects Metadata): We can delete the work of previous authors. Collaborative
define metadata as information about information, knowledge creation is thus a central aspect of a wiki
and a LOM is a metadata about a learning object that system. Wiki pages are accessible and usable at any
can refer to multimedia or digital educational resources. time, and the content constantly evolves. The first wiki
Sets of metadata are used to identify and meaningfully was created by Ward Cunningham, and the word wiki
describe characteristics relevant to these resources, for came from a phrase in Hawaiianwiki wikiwhich
example, the learning resource type, the intended end means quick. Its quick because the process of editing
user, difficulty level, educational goal, and so forth. The is entwined with the process of reading. Both are done
00
The EduOntoWiki Project
0
0 Section: Process ICT
Hanafizan Hussain
Multimedia University, Malaysia
IntroductIon bacKground
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
An Edutainment Framework
Lawrence (1992) studied two groups of preschool Hence, this research serves to refine the theoretical
children enrolled in a Head Start1 program. One group design framework of edutainment environment. E
followed the standard Head Start program while the This research aims to provide the design framework
other group participated in computer enrichment activi- for edutainment environment that is refined based on
ties in addition to their standard Head Start activities. the literature review, analysis of existing edutainment
The computer activities were theme-based and built products, and a case study that has been conducted
around a variety of software. Students in the computer on selected research settings. The objectives of this
or e-learning group demonstrated improvements in all research are:
academic skills tested and showed greater growth in
memory and visual perception. Chang and Osguthorpe i. To link motivation with psychological needs and
(1990) showed that kindergarten children who worked understand how edutainment can achieve these
with a computer achieved higher scores in tests of word important aspects in learning
identification and reading comprehension than children ii. To investigate current issues and problems pertain-
who received regular noncomputer teaching. ing to edutainment in the learning and teaching
However, not all of the educational software could environment as well as to examine the extent to
provide positive effects on children. Haugland assessed which edutainment reflects the goals of the cur-
the effect of developmental and nondevelopmental soft- riculum
ware on childrens cognition, creativity, and self-esteem iii. To compare the application of practices for game
(Haugland & Wright, 1997). The nondevelopmental design in the existing electronic educational games
software is the drill and practice software which con- by analysing them based on a set of parameters
sists of multiple choice questions or quizzes presented of good game design
using information technology. The result indicated that iv. To conduct a case study on selected research
nondevelopmental software had a detrimental effect subjects for the purpose of refining the theoretical
on childrens creative abilities. Developmental com- design framework
puter experiences fit young childrens style of learning v. To refine the design framework that may be
because they provide children participatory learning implemented to create an edutainment environ-
experiences that are intrinsically motivating and tend ment that reflects the goals of the curriculum
to be holistic learning experiences. In evaluating ap-
proximately 750 software programs marketed for use After the analysis has been performed on the se-
by young children, Haugland found that most of the lected edutainment products to discover the strengths
software is developmentally inappropriate. Only about and weaknesses based on several perspectives, the
20% of the software meets young childrens develop- researcher conducts an empirical study2 involving the
mental needs. same edutainment products that have been critically ana-
Children learn best by doing, interacting, and explor- lysed to further refine the theoretical design framework
ing rather than watching and/or listening. Exploring, for edutainment environment. Twenty-four preschool
manipulating, and playing with materials are the most children and one educator from a preschool, located in
effective ways to teach young children (Kantrowitz & a middle-class neighbourhood of Kajang under Cheras
Wingert, 1989). Hence, edutainment which usually ex- district in Selangor, participated in the summative evalu-
ists in the form of electronic educational games could be ation. Participating children originated from the same
the most effective e-learning material to be integrated cultural background. None of the participating children
in the classroom, as by playing games, psychological had used the four selected edutainment products before.
needs of children can be fulfilled. Electronic games are All children were able to use the computer, as attested
undoubtedly motivating, thus the intrinsically motivat- by their educator. The preschool had only one personal
ing nature of the electronic games should be utilised computer with different types of educational software
by using this medium for educational purposes as it that was demonstrated to the children and sometimes
is no secret that motivation is the key to education. used by them in different sessions. The computer was
However, there are still many issues that need to be used once a week for half an hour during the childens
addressed in the design of edutainment environment. computer lesson.
0
An Edutainment Framework
Three sources of data were used in the empirical through, but the content and the context will have to
study. These data sources include interview of children be cleverly designed to put the children in a learning
and educator, direct observation, and video recording. situation on morality subjects. Designing feedback to
All the questions that were prepared in advance were be less learning-like and more game-like is often a big
posed to the children due to the fact that when children paradigm shift and challenge for digital game-based
at this early age are involved in the research process, learning designers.
interview is the type of data collection method that is In a playful context, kids seem to have an almost
more suitable than providing them questionnaires to infinite capacity for learning. It is very easy, it is effort-
be completed. In some cases, instead of asking chil- less, and it is exciting. If you put them in some kind
dren one direct question, the researcher posed several of game situation (a computer game or video game),
questions asking about an issue from different perspec- they will pick up skills very quickly and learn how to
tives. Childrens related responses and reactions were do things at an amazing rate.
combined to make a more robust overall measure of Motivation plays a central role in any learning
each issue. For instance, to assess childrens affective activity. By playing educational games that are de-
responses towards the overall design of the game, velopmentally appropriate, childrens psychological
several questions in the interview together with their needs can be fulfilled as these games can provide a
spontaneous reactions were used to provide an affec- fun and play experience as discovered through the
tive index. These questions dealt with whether children childrens responses in the interview and reactions
liked the program and its features, and whether they observed through observation and video recording,
enjoyed their learning experience in an edutainment thus can be motivating for the children to learn the
environment. For the educator, the types of questions embedded learning content. The framework has been
posed were more towards obtaining information on made based on the difficulty in helping children learn
a certain set of criteria in educational game from her in two domains:
perspective. It is to be noted that although the questions
were prepared beforehand, the educator was given Motivation: To motivate them to want to spend
much opportunity to express herself in issues that are time and engage in learning activities
not restricted by the questions prepared beforehand. Psychological needs: To aid them in cognitively
Although the nondirective interview was implemented, constructing knowledge
the researcher is satisfied that the information is suf-
ficient for the case being studied. On the other hand, the best practices for game design
also have the influence in assisting children in their
learning. Initially, in the researchers opinion, the best
FraMeWorK For edutaInMent practices for game design are meaningful storytelling
and use of interactivity as a cognitive artifact as they
As a sort of play for children, digital game-based learn- are the focus of game design. However, attractive or
ing from very humble beginnings, has quickly inserted nice interface and challenge driven mainly by a goal
itself at all levels of childhood and studenthood, from are also found to be the best practices for game design
lap kids to grab students (Prensky, 2001). Sure, it is drawn from the results of this study. The advantages of
possible to criticize the design, methods, means, and information technologies such as multimedia applica-
even the motivation of its creation, as many do. The tions that are used extensively in games development
point is, though, that this is how 21st-century kids grow can be utilized to perform the edutainment environment.
up. Kids love that they can control what happens on the The edutainment products can be designed in one screen
screen. They quickly learn to turn on the computer by that hides incredible programming behind a simple
themselves, point the mouse, and use the computer. faade for educators to customize different aspects of
Digital game-based learning, currently, is being used the games to better fit curriculum requirements.
to teach mathematics, music, and so forth. The idea is Within the framework, game designers should ap-
to combine storytelling and computer games together to ply the best practices for game design in developing
build a moral educative environment. The game should edutainment products that enable the users (educators)
feel like a video game or a computer game, all the way to create their own games for the children. Accord-
0
An Edutainment Framework
ing to Prensky (2001), tools can be included in games 5. Producer/designer: By having such a tool for game
either as an integral part of the game play (to build own creation, educators can be producers or designers. E
environment) or as supplements (design own characters This is the most crucial role for an educator and an
or new levels). As such, game designers need not be important aspect in preparing todays educators.
concerned about the storytelling but could focus on other It is contended that they have the ability of being
best practices for game design, namely, interactivity, a motivator, content structurer, debriefer and tu-
interface, and challenge. By having the tool for this tor, but to be a producer or designer, they must be
purpose, the users (educators) could put the content or trained and provided with a tool.
storytelling element in whichever way they like without
requiring them to have good programming background Hence, the design framework for edutainment
or technical knowledge. It is believed that it could environment can be illustrated as in Figure 1 (Zarina,
resolve the problems faced with existing edutainment 2005).
products, especially with regard to the incomplete or
unsuitable content area. In this edutainment environ-
ment, educators will play these roles: conclusIon
1. Motivator: The educator as a motivator is one There are several potential advantages in the design
of the main factors that can contribute towards a framework for edutainment environment that has been
different style of learning. The environment can refined in this research:
be used to focus the students attention on what
needs to be learned. Hence, the educator should 1. It addresses the difficulty for the children to learn
have an idea or incentive to motivate the student a subject matter by fulfilling their psychological
to learn. needs. Hence, it can increase motivation, known
2. Content structurer (integrator/reformulator): as the key towards successful education.
The best-organized material makes the informa- 2. The best practices for game design to be addressed
tion meaningful to the students. One method of by game designers include content or storytelling,
organization includes relating new tasks to those interactivity, interface, and challenge. However,
that they have already known. Other ways to re- within this framework, they need to focus on
lay meaning is to determine whether the student creating a tool instead of the actual game and
understands the final outcome desired and instruct therefore need not be concerned of the learning
them to compare and contrast ideas. Educators content or storytelling element which they are
should focus on the creation of the content struc- not familiar with.
ture so that they can tailor towards the goal, which 3. The educators can acquire the five new roles,
should be realistic towards the students readiness namely, motivator, content structurer, debriefer,
or progress towards the goal. tutor, and designer (Prensky, 2001) by imple-
3. Debriefer: Educators should help students reflect menting this framework. This will increase their
on what is being learned, which forms part of skills and creativity in an effective edutainment
the learning process. In this part, the questions environment.
of how do you accomplish this?, what are the
steps to get into the next level?, and so on will By implementing this framework, there will be no
have not be answered by them. They will act more concern of having to purchase whichever edutainment
of a facilitator than purveyor of knowledge. products might be suitable for the childrens learning
4. Tutor (individualiser, steerer, selector, adjuster, capacities. It will be more cost effective as well as ben-
guide, facilitator): An educator should act as a eficial to the educational institution at large. Merging
tutor, to be able to customise and individualise technology in education for the cognitive development
learning to each students diverse learning style. especially in subjects like mathematics is not a simple
In this new style of learning, it is one of the great task. The implementation of this framework requires a
opportunities offered through the combination of long-term study and takes time to accumulate results.
education and entertainment technology. The future works will involve pilot project with the
0
An Edutainment Framework
Difficulty to learn
Psychological needs
Motivation
Interactivity
Educator
Game designer
Educator
Storytelling
Challenge
Interface
- input
- output
prototype to be developed and tested on the targeted playing together is better than playing alone. The
users. framework can be enhanced to include this factor if
it contributes towards a more effective edutainment
environment.
Future trends The development of a tool prototype for the imple-
mentation for this framework is a direction in future
Future work is needed to overcome the limitations of research to test the overall effectiveness on specific
this research and verify the results to address a wider issues: to determine which activities promote concept
scope of research subjects and settings. Issues on col- development for different topics, to develop guidelines
laborative learning can be investigated thoroughly in on how to minimise childrens focus on the game ac-
future research. It is important to determine whether tivity (gradually shift it towards the subject activity),
0
An Edutainment Framework
and to determine the types of interface, interactivity, Goldmacher, R.L., & Lawrence, R.L. (1992). An ex-
and challenge that can enhance childrens enjoyment periment: Computer literacy and self esteem for Head E
of the activity without distracting them from the learn- Start preschoolers: Can we Leapfrog? Paper presented
ing outcome expected from the storytelling of a game. at the Annual Conference of National Association for
The prototype should also be tested in primary and the Education of Young Children, Roswell, GA.
secondary schools to determine the applicability of
Haugland, S., & Wright, J. (1997). Young children and
this framework as well as to determine a suitable age
technology: A world of discovery. Allyn and Bacon.
group for its implementation.
Future research is needed to investigate how to Kantrowitz, B., & Wingert, P. (1989). How kids learn.
increase the coupling between the game module and Newsweek, 113(16), 50-57.
the instructional module that is much lacking in exist-
ing edutainment products. Research is also needed McFarlane, A., Sparrowhawk, A., & Heald, Y. (2002).
to investigate how to encourage children to use the Report on the educational use of games. Retrieved
instructional module more often without feeling bored March 6, 2008, from http://www.teem.org.uk/, retrieved
or giving up on it. on 10/03/07
Although much has been done by researchers in Prensky, M. (2001). Digital game-based learning. New
the area of computer-supported cooperative learning, York: McGraw-Hill.
further research of the effect of technology is needed.
Most of the studies of cooperative learning on computer Sanger, J. (1997). Young children, videos and computer
tasks emphasize the way the educator can structure games. London: Falmer Press.
cooperative tasks and group compositions to maximise Zarina, C.E. (2005). A case study on the implementation
academic and social benefits using existing technol- of framework for edutainment environment. Masters
ogy. It is important to investigate whether some of dissertation, Multimedia University.
the benefits of cooperative learning may be enhanced
by changes in the computer hardware, the software,
or the choice of user interfaces. There is also a need Key terMs
for further research in multi-input systems and other
shared-screen issues. Computer Games: Computer games are digital
games that are developed for computer such as a
personal computer. It also reflects on games that are
reFerences played online by using a personal computer to interact
with other game players on the Internet.
Buckingham, D., & Scanlon, M. (2000). That is edutain-
Educational Software: Educational software is the
ment: Media, pedagogy and the market place. Paper
developmental and non-developmental software which
presented to the International Forum of Researchers on
are specifically used for education. It also reflects on the
Young People and the Media, Sydney, Australia.
technical and also instructional design for developing
Carlson, S.L., & White, S.H. (1998). The effectiveness the courseware or educational application.
of a computer program in helping kindergarten students
Edutainment: Edutainment refers to a combination
learn the concepts of left and right. Journal of Comput-
of the two areas namely education and entertainment
ing in Childhood Education, 9, 133-147.
whereby the terms player and learner are occasion-
Chang, L.L., & Osguthorpe, R.T. (1990). The effects ally treated as the same although player means the game
of computerized picture: Word processing on kinder- player while learner means the edutainment user.
gartners language development. Journal of Research
Edutainment Environment: Edutainment environ-
in Childhood Education, 5, 73-83.
ment refers to the coupling between the game module
Druin, A., & Solomon, C. (1996). Designing multime- and the instructional module, but not to leave out the
dia environments for children. New York: John Wiley area of computer-supported co-operative work for
& Sons. teaching and learning. Thus, most of the studies of
0
An Edutainment Framework
0
Section: Context ICT 0
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
E-Government Growth Barriers in Sub-Saharan Africa
ing parts of the world including Africa. Another piece growth in Sub-Saharan Africa. As briefly noted earlier,
of good news is that many countries in Sub-Saharan this chapter considers perspectives from Nigeria. The
Africa have started to make efforts to catch-up in framework draws from developmental reports of notable
terms of adopting and using ICT products (Kaaya, bodies such as the G8 DOT Force (2001), UN ICT Task
2003; Lal, 1999; Thomas, LeBlanc, Mbarika, & Meso, Force (2004), and UNPAN (2005) that have described
2004; UNECA, 2004; UNPAN, 2005). This wind of the barriers to ICT use in developing societies. These
change may be attributable to the fact that many African foregoing reports identified three broad categories of
governments are beginning to accept the notion that factors believed to be hampering the efforts of develop-
ICT use in general and for governance in particular ing societies in making the most of ICT products for
could hasten socioeconomic and political development social and economic development. The three categories
(see, Heeks, 2002; Ifinedo, 2005a, 2005b; Thomas et include the following: (1) infrastructural problems, that
al., 2004). That said, while development reports and is, poor information and telecommunication technolo-
research studies have discussed the poor showings of gies facilities; (2) institutional problems; and (3) hu-
Sub-Saharan African region with regard to e-govern- man capital problems. For example, UNPAN (2005)
ment readiness, the study of the literature indicates listed poverty, low levels of literacy, lack of adequate
that few commentators have written about the sorts of infrastructure, high cost of ICT services, lack of invest-
factors negating the growth of e-government initiatives ments, and poor institutional structures as some of the
in the region. This article aims at contributing to the challenges for developing countries with respect to ICT
literature in that respect as it develops a conceptual use and adoption.
model that highlights the barriers to the growth of
e-government in Sub-Saharan Africa. Nigeria, the Institutional Problems
most populous country in the region was chosen for
illustration purposes. Additionally, Ifinedo (2005a, Organizational Problems
2005b) and Ifinedo and Uwadia (2005) have discussed
e-government progress in the country, and this present Effective communication and organizational skills are
work serves to complement these previous efforts. Next, needed to maintain the vision, values, and aspirations of
the conceptual framework is presented. all stakeholders in an e-government initiative (Sharma
& Gupta, 2003). This calls the role of government
functionaries in Nigeria into question. Would they
the barrIers to the groWth oF be sincere in implementing and managing the values
e-governMent InItIatIves of e-government properly? Do they understand the
prerequisites for e-government? Will these function-
The conceptual model illustrated by Figure 1 will guide aries not use ICTs for their own ends? The reality is
the discourse regarding the barriers to e-government that government agencies and officials in developing
Figure 1. The conceptual model of the barriers facing e-government growth in Nigeria (Adapted from: G8 DOT
Force, 2001; UNPAN, 2005)
0
E-Government Growth Barriers in Sub-Saharan Africa
countries might perceive e-government as a potential sabotage it. Evidence from Nigeria seems to affirm this
threat to their power, and as a consequence may show proposition (see, e.g., Ifidon, 1996; Ifinedo & Uwadia, E
reluctance in promoting the objectives of e-government 2005; Ojo, 1996).
(Heeks, 2002; Kaaya, 2003; Sanchez et al., 2003). Heeks
(2002) recounts examples where e-government efforts human capital Problems
in Africa totally or partially failed due to people
factors. For example, due to a lack of organizational Nigeria is poor and indebted (CIA: World Factbook,
skills and/or commitment, Nigeria has previously 2005; World Bank Group, 2004). The economic situ-
witnessed failures with committees mandated with ation is dire for both the country and its population.
developing and managing its national ICT polices; in The Nigerian government does not have the capability
fact, no sooner was a body formed was it disbanded to adopt and implement sophisticated e-government
for another (Ifinedo, 2005a). Prior to NITDA (Nige- services (even the basic ones) partly due to inadequate
rian IT Development Agency), the current body that resources that often have to compete with other pressing
administers the national ICT policy and e-government issues like reducing poverty among the population and
projects in Nigeria (NITDA, 2001); there was Central the foreign debts servicing (Ogwumike, 2002). Further,
Computer Committee (CCC) before it. Even after the illiteracy is rife in Nigeriait is at about 40% (Ifinedo,
formation of NITDA in 2001, the former head of the 2005b; Oyebisi & Agboola, 2003; CIA: World Factbook,
body openly expressed disappointment in 2003 when he 2005), and secondary education enrolment is low (Dutta,
asked why several keys issues in the policy statement Lanvin, & Paua, 2003; Ifinedo, 2005b). In addition to
have not been addressed (Ajayi, 2003b). In brief, one the generally low literacy level in the country, Nigeria
could argue that establishing e-government and related also lacks qualified IT professionals (Dutta et al., 2003;
initiatives in a developing society such as Nigeria will Odedra et al., 1993; Ojo, 1996). Needless to say that
continue to be challenging given the prevailing lack of these inadequacies hamper the growth of e-government
organizational vision and commitment. as skilled hands needed to develop such services may
not be readily available. Nigerian universities do not
Cultural and Attitudinal Problems produce sufficient skilled IS professionals to match its
current ICT needs (Oyebisi & Agboola, 2003; Ifinedo,
West (2004) notes that individual behavior and cultural 2005a, 2005b). Oyebisi and Agboola (2003) assert that
norms may impact upon the way technology is used by the highest enrolment in the University for Science and
citizens and policy makers of a country. In fact, Ojo Technology in Nigeria between 1991 and 1998 per 1000
(1996) asserts that ICT and similar products will thrive inhabitants was 0.31, with only 0.05 per 1000 students
better in cultures that have a mechanistic view of the earning a postgraduate degree during the same period.
world, unlike in Africa where informality thrives. The It is difficult to see how e-government can thrive under
impact of culture on ICT adoption in the developing such unfavorable conditions.
countries has been a topic of interest in information
systems (IS) literature (e.g., Anandarajan, Igbaria, & Infrastructural and technical constraints
Anakwe, 2002; Straub, Loch, & Hill, 2001). Findings
from Straub et al. (2001) study indicates that sociocul- As with the rest of Sub-Saharan Africa, Nigerias In-
tural factors are vitally important for the diffusion of ternet access is poor (ITU 2005; Internet World Stats,
ICT-enabled projects in developing societies. Further, 2004). There are about 3 million Internet users in a
the attitude or culture of self-motivation among gov- country of 140 million inhabitantsthis is less than 1%
ernment functionaries is rife in Nigeria (Ifidon, 1996; of the population (CIA: World Factbook, 2005). Access
Ojo, 1996). There is a tendency to over-politicize to the Internet is crucial for e-government services. In
decision-making, indulge in shoddy practices, and the same vein, insufficient bandwidth is yet another
institute complex bureaucratic procedures in order to problem. Only recently did a few countries in Africa
gain personal advantages. In the context of develop- procure bandwidths greater than 10 million bps (Anony-
ing societies in Sub-Saharan African, it can be argued mous, 2002). Previously, many countries in Africa had
that those with an interest to protect may choose to bandwidths between 64,000 bps and 256,000 bits per
downplay the benefits of e-government or simply second (bps) due to high international tariffs and lack
E-Government Growth Barriers in Sub-Saharan Africa
of circuit capacity in the region (Anonymous, 2002; others in comparable countries in the region could pay
Internet World Stats, 2004). The investmentslocal and more attention to the highlighted problems in order to
foreignin such facilities are low on the African con- improve their e-government readiness scores. Owing to
tinent (Anonymous, 2002; ITU, 2005; Ifinedo, 2005b). the similarity in the socioeconomic and cultural condi-
The cost of subscribing to a telephone line or owning tions in many of the Sub-Saharan African countries, it
one is beyond the reach of an average citizen. The same is likely that the same sorts of problems seen in Nigeria
is true with procuring Internet access in Nigeria. Thus, may be hampering the growth of e-government services
ordinary citizens cannot afford such services (Ajakaye in these comparable countries (Ifinedo, 2005b).
& Kanu, 2004; Dutta et al., 2003). The cost of a PC in It is important to mention that there are ongoing
Nigeria is six times the monthly wage of an average efforts to redress some of the barriers discussed herein.
worker. Computers and Internet access are two vital For example, there is a partnership formed between
facilities required for any e-government engagements, the Nigerian government and private stakeholders
but when such facilities are lacking, as is the case in to tackle the barriers to e-government in the country
Nigeria, it remains to be seen how the populace can (Ifinedo, 2005a). Furthermore, it appears the leader-
benefit from such initiatives. ship in Nigeria is turning a new leaf as it now realizes
Under the military dictatorships in Nigeria, the that more attention is needed to grow e-government
country witnessed poor inflow of investments. The services in the country (Ifinedo, 2005a; Ifinedo and
telecoms sector was adversely affected by that situ- Uwadia, 2005). The importance of e-government for
ation (Ndukwe, 2005), and was worsened because developing societies in Sub-Saharan Africa cannot be
many states in Africa, including Nigeria, often provide overemphasized (InfoDev, 2003). Ifinedo (2005b) cites
telephone services to their citizens (Ifinedo, 2005). As Late F. Houphouet-Boigny (the long time President of
would be expected, inefficiency and poor quality were Ivory Coast) where he commented that after, having
often associated with such services. Another major in- missed the industrial revolution, Africa should not once
frastructural constraint in Nigeria is inadequate power more miss the computer revolution. He continues:
generation and supply in the country (CIA: World countries that neglect this domain in their develop-
Factbook, 2005). Constant supply of power is required ment process are increasingly widening the gap between
to operate effective e-government services; it is sad to themselves and the developed countries, who will find
note that such is not the case in Nigeria where there are in this a new reason to exercise more monopoly over
endless power outages. Government functionaries in power. Future study on e-government in Nigeria and
the country are now coming to the realization that any comparable countries may add to this present work by
meaningful e-government service will need a steady investigating how commitments from state leadership
supply of electric power (Ifinedo and Uwadia, 2005). could enhance e-government initiatives. Researchers
could examine the perceptions of Nigerians vis--vis
e-government services. To sum, insights from this
conclusIon and Future study chapter could serve as a base for future works.
E-Government Growth Barriers in Sub-Saharan Africa
Retrieved March 12, 2008, from http://enigeria. data analysis. International Journal of Education and
org/2003/10029003/index.html. Development using ICT, 1(1), 53-71. E
Ajayi, G. O. (2003b). E-Government in Nigerias Ifinedo, P. & Uwadia, C. (2005). Towards e-government
e-Strategy. In Proceedings of the The Fifth Annual in Nigeria: Shortcomings, successes, swish or sink. In
African Computing and Telecommunications Summit, Proceedings of the 8th. International Federation of
2003, Abuja, Nigeria. Information Processing (IFIP) WG 9.4 Conference (
pp. 75 86), Abuja, Nigeria.
Anandarajan, M., Igbaria, M., & Anakwe, U. (2002). IT
acceptance in a less-developed country: A motivational InfoDev (2003). E-government handbook for develop-
factor perspective. International Journal of Information ing countries. Retrieved March 12, 2008, from http://
Management, 22, 47-65. unpan1.un.org/intradoc/groups/public/documents/AP-
CITY/UNPAN007462.pdf
Anonymous (2002). The African Internet - A status
report. Retrieved March 12, 2008, from http://www3. Internet World Stats (2004). African countries reports.
sn.apc.org/africa/afstat.htm Retrieved March 12, 2008, from http://www.internet-
worldstats.com/africa.htm
Breen, J. (2000). At the dawn of e-government: The
citizen as customer. Government Finance Review, 16, Kaaya, J. (2003). Implementing e-government ser-
5, 15-20. vices in East Africa: Assessing status through content
analysis of government websites. Electronic Journal
Dutta, S., Lanvin, B., & Paua, F. (Eds.) (2003). Global
of e-Government, 2(1), 39-54.
information technology report 2002-2003. New York:
Oxford University Press. Lal, B. (1999). Information and communication tech-
nologies for improved governance. In Proceedings
G8 DOT Force (2001). Issue objectives for the Genoa
of the African Development Forum ADF 99, Addis
summit meeting 2001: DOT force. Retrieved March
Ababa, Ethiopia.
12, 2008, from http://www.g8.utoronto.ca/
Moon, J. M. (2002). The evolution of e-government
Heeks, R. (1999). Reinventing government in the
among municipalities: Rhetoric or reality? Public
information age: International practice in IT-enabled
Administration Review, 62(4), 424-433.
public sector reform. New York: Routledge.
Ndukwe, E. (2005). Nigeria, gateway to West African
Heeks, R. (2001). Understanding e-governance for
market. Retrieved March 12, 2008, from http://www.
development. i-Government Working Paper Series,
techtimesnews.net/industry.asp?id=446
Institute for Development Policy and Management,
University of Manchester, UK. NITDA (2001). NITDA begins strategic action plan
for the implementation of Nigeria IT policy. Retrieved
Heeks, R. (2002). E-government in Africa: Promise
March 12, 2008, from http://www.nitda.gov.ng
and practice. Institute for Development Policy and
Management, Paper No. 13, University of Manchester, Odwumfo (2004). Zinox technologies CEO Emelonye
the UK. - Nigerian PC market is only 100,000 sales a year but
growing. Retrieved March 12, 2008, from http://listserv.
Ifidon, A. F. (1996). Citizenship, statehood and the
media.mit.edu/pipermail/odwumfo/2004-May/000367.
problem of democratisation in Nigeria, Africa Devel-
html
opment, 4(21), 93-107.
Ojo, S. O. (1996). Socio-cultural and organizational is-
Ifinedo, P. (2005a). E-government initiative in a de-
sues in IT application in Nigeria. In M. Odedra-Straub,
veloping country: Strategies and implementation in
(Ed.), Global information technology and socio-eco-
Nigeria. In Proceedings of the 26th McMaster World
nomic development (pp. 99-109). New Hampshire: Ivy
Congress on Electronic Business, Hamilton, Ontario,
League Publishing.
Canada.
Oyebisi, T. O. & Agboola, A. A. (2003). The impact
Ifinedo, P. (2005b). Measuring Africas e-readiness
of the environment on the growth of the Nigerian IT
in the global networked economy: A nine-country
E-Government Growth Barriers in Sub-Saharan Africa
Section: Context ICT
E-Knowledge E
Fortunato Sorrentino
Universit degli Studi di Firenze, Italy
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
E-Knowledge
How individuals and organizations needed dramati- data information knowledge wisdom
cally to enhance their capacity to acquire, assimilate,
and share knowledge, given the constant pressure of Data, large unshaped heaps of items of different
disruptive change. (Norris, Mason, Robson, Lefrere, sorts, are the resource that we use to communicate.
& Collier, 2003b, p. 26) However, as Shedroff remarks (ibid., p. 3), data are
boring because they have no consequentiality and, if
NM&L's kind of answer is a very valuable one: left to themselves, have neither interest nor value.
a programmatic document, with strong propositions. Data to which an organization has been applied,
Beyond the wealth of facts, references and intuitions, or which are the object of a presentation, or in which
the answer we find in Transforming e-Knowledge is: a pattern has been identified, acquire meaning and
use the new technologies, they are essential in order become information.
to innovate and share. There is also the incitement We arrive at knowledge though experience, so-
to demystify the complexity of knowledge and to cial interaction and with the help of our intuition.
overcome the provincialism of academic knowledge Knowledge is not transmitted (it is information that is
(aggressively defined a cottage industry, the purview transmitted). Applying a constructivist paradigm, then,
of isolated craftspeople and professional guilds). Knowledge is information that is presented within a
NM&L have a sharp perception of the role of particular context, yielding insight on application in
technology: that context, by members of a community (Norris et
al., 2003a, p. 2).
Mobile, ambient technology is changing the dynamics Wisdom, at the far right in our representation, can
of how we will live, work, and learn. Such technology be interpreted as a sublimation of knowledge, a kind
environments will revolutionize everything about the of metaknowledge (Shedroff, 1994), and a deep per-
knowledge experience: place, use of time, nature of sonal insight. It cannot be shared and one reaches it
interfaces, intensity of engagement, reliance on just- substantially only though oneself.
in-time knowledge and agents, ability to multi-task, At the moment when, metaphorically, the digital
and the amenity of the knowledge experience. These revolution strikes, there is an effect (see Figure 1) that
new experiences will shape behaviors, practices, and starts from the data side: data become digitalized and
social groupings for knowledge sharing. (Norris et the effect propagates forward. Information now takes on
al., 2003a, p. 1) a more meaningful connotation, becoming content,
with reference to the many multimedia formats now
possible. The passage from information/content to
aPProachIng e-KnoWledge what we now label e-knowledge becomes enriched
by numerous paths and acquires a great flexibility.
How does knowledge get to us? To address this ques- The entire knowledge ecosystem (thus we call the
tion, open since the Sophists time, we shall answer set of balancing entities and intervening paths in the
here but with an essential schema. illustration) becomes animated with reactions and
In line with NM&Ls thinking, with Brown and counteractions.
Duguids elegant and profound work The social life of Many of the action-verbs in the illustration are
information (Brown & Duguid, 2003) and with strate- common, but their newness and special power in this
gist Shedroffs key essays (Shedroff, 1994), we shall context should not go unnoticed, for instance:
put knowledge and e-knowledge next to each other and
show the transition from one concept to the other. Correlate: It is the principle on which are built
those intriguing visual representations called
Knowledge vs. e-Knowledge knowledge maps (see the one at Netzspannung.org,
2005); it is the foundation of the most advanced
Using a conceptual schema we can think of knowledge digital repositories;
as an intermediate ring, or node, in a representation of Share: It is the fundamental equation ruling the
a value chain, that involves other concepts: Web and the world of virtual communities;
Scan: The mechanism at the heart of search en-
gines, irreplaceable prostheses for our memory;
E-Knowledge
Atomize, repurpose, recombine: Some of the New concepts and methodologies for the dis-
main activities performed when implementing semination of learning content, promoted by
technology-enhanced learning. international bodies: IMS (instructional manage-
ment systems project); ADL (advance distributed
technologies supporting e-Knowledge learning initiative);
New disciplines derived from pedagogy, informa-
The dynamic features of e-knowledge are the result of tion technology and HCI: instructional design,
many technologies, but some of them, that we can name interaction design.
knowledge technologies, are particularly powerful,
even disruptive, because they overcome old barriers Librarianship and Architecture of
and open totally unforeseen possibilities. Some of the Information
fields where the impact is greatest are:
The development of a new science concerning metadata
Education (structured data about data) is giving an extraordinary
contribution to knowledge intelligence. Although
There is a fundamental relationship between knowledge it presents itself as a niche for specialized scholars,
and learning, therefore in this sector technology-en- metadata science is a fundamental building block of
hanced learning is developing quickly, with: the knowledge economy. It supports many popular and
widely used applications: not only e-learning (Fini &
New ways for packaging digital content, based Vanni, 2004), but also all the range of digital reposito-
on Learning Objects theory and practice (Horton ries, real arks of knowledge accessible without restric-
& Horton, 2003); tions and at no cost, as DSpace (Smith, Barton, Bass,
A new generation of systems that combine sophis- Branschofsky, McClellan, Stuve, 2003). Metadata are
ticated software and hardware: LCMSs (learning the core of great variety of online library systems,
and content management systems), collaboration from one personal library system such as MITs
platforms, VLEs (virtual learning environments) Uplib (Janssen & Popat, 2003), up to one of the most
(Dillembourg, 2000); hyperbolic knowledge-oriented tasks of our time, the
E-Knowledge
Library Project, (by books.google.com, an effort to which are alluring, but at the target, which is the mind
make the knowledge contained in library books dis- of man. We surmise that a transformation is in progress
coverable by everyone). Furthermore, the automated precisely there, driven by the effort to manage the great
sharing of metadata across applications is an important flow of messages that the dense information aura
part of realizing the goal of the Semantic Web, another surrounding us, is sending.
renowned scientific effort of our times.
Wireless communications tremendously improve access We do not believe that ICTs, assessed over the entirety
to information, by enabling it for the mobile user. Local of the human population, can be a barrier to knowledge,
wireless services (wi-fi and successors) have enhanced as suggested by the dystopic view of a digital divide
it to an ever-greater degree. The possibility for anytime- that would be increasing with time.
anywhere informal exchanges by people in dynamic A good sign is the democratization of some of the
contexts, the flexibility of the new, no longer static main fruits of the technological progress: the steady
collaboration systems, the advent of location-based worldwide growth of cellular devices, PCs and Internet
services and locative media, demonstrate that wireless links, which are vital tools in support of knowledge.
communications are an extremely powerful enabler of Their adoption takes place either autonomously or
knowledge. The Book of Visions of the Wireless World thanks to courageous undertakings, like Nicolas
Research Forum (Tafazolli, 2004) tells us what will Negropontes education project OLPC (One Laptop
happen in the future. Per Child) (Figure 2). Founded at MIT, an open shrine
of technical knowledge, the program will benefit a huge
number of have-nots of the digital world (OLPC,
beyond e-KnoWledge 2006).
Since its launch, the role of e-knowledge as a power large-scale and small-scale change
word has been clear. We find it, for example, in project
names as eTieto (eknowledge in Finnish) dealing There is a high risk of proposing the abundance of
with the eco-information society (Heinonen, 2006), digital information and communication as the exclusive
or in research papers, like a thesis about knowledge means to realize knowledge, substituting them to the
networks (Raghavan, 2004). However, the constant variegated direct experience of the world. It is what
pressure of disruptive change did not stop in 2003, Brown and Duguid, in their cited book, flag as dangerous
when NM&L took notice of it. It is now the time to make information fetishism (Brown & Duguid, 2003).
the e- disappear, now that the concept of knowledge
indissolubly implies the presence of the ICT ingredi-
ent, without which dissemination and sharing would Figure 2. The OLPC device (concept image) (Source
immediately stop. Design Continuum (OLPC, 2006) licensed under CCA
Thus, as a conclusion drawn by those very authors, 2.5)
beyond e-knowledge, there is, just knowledge.
Nevertheless, the attempt to record and give an
interpretation to something that is either a change, or a
jump, or a paradigm shift felt by all, continues. Some
propose knowledge 2.0, along with a popular naming
fad (Stumpel, 2006). People are bedazzled by the speed
and power of reach afforded by modern media channels
and fall perhaps into a trap, to mistake information for
knowledge. But to unravel what is inside the new and
future modes of knowledge, one should not look only
at the sources, which are abundant, or at the media,
E-Knowledge
After e-knowledge and knowledge 2.0, we should the power of thought (MIT Tech Review, 2006)with
ask ourselves what yet more change could mean the vision of a renowned scientist, inventor and thinker, E
in the domain of knowledge. There are two streams Ray Kurzweil, who presents in an unbelievable book the
of technological and conceptual innovation that we astounding effects on intelligence of merging biology
choose for an answer: ambient intelligence and bio- with future computing (Kurzweil, 2005). We would
engineering. find that reality and vision are well aligned.
If the mind/brain term of the aforementioned rela-
Ambient Intelligence (AmI) tion changes then the other term, that is, the whole set
of concepts we hold around the notion of knowledge,
Named a true vision by one the founders (Aarts & will change, but in some yet unknown way.
Encarnao, 2006), on the basis, today, of numerous The nature of knowledge is that it makes itself
fully developed application fields, AmI provides a obsolete says renowned economist Drucker (2000).
paradigm for user-centric computing, where human Although we say we live in a Knowledge Society,
beings are placed at the center of future developments we keep struggling with an elusive notion. It will be
of the knowledge-based society. good to keep in mind that in our times the shelf life
AmI, among other directions, proposes the redefini- of knowledge is very short, unless we renovate it con-
tion of the environments where knowledge is gener- tinuously by blending it and sharing it with our fellow
ated (work spaces and learning spaces) introducing humans (ready to do it with machines).
harmonized multimedia channels, high-immediacy
communication tools and intelligent software agents.
The richness of such multisensorial experiences is hard reFerences
to convey in words, but not in images. A clever webcast
by a major wireless telecom operator, presenting its Aarts, E. H. L. & Encarnao, J. L. (Eds.) (2006).
futures, can be taken as a proof (Vodafone Future True visions: The emergence of ambient intelligence.
Site, 2006). In this video one can verify the attractive- Berlin: Springer.
ness of applying sonic technology, positioning services,
Brown, J. S. & Duguid, P. (2003). The social life of
electronic paper, visualization devices, microsensors,
information. Boston, MA: Harvard Business School
all siding with wireless networking, to the everyday
Press.
life of working people and families. AmI will effect
large-scale changes in the knowledge experience Dillembourg, P. (2000). Virtual learning environ-
of people. ments. EUN Conference. Retrieved March 10, 2008,
from http://tecfa.unige.ch/tecfa/publicat/dil-papers-
Bioengineering 2/Dil.7.5.18.pdf
Drucker, P. (2000). Need to know: Integrating e-
This area would need a better name than just bioen-
learning with high velocity value chains, A Delphi
gineering. What we address here is at the frontier of
paper. Retrieved March 10, 2008, from http://www.
artificial intelligence, machine learning, neuroprosthet-
delphigroup.com/research/whitepaper_descriptions.
ics, and robotics, with (human) bioengineering. It could
htm#elearn%20WP/
be dismissed as ground just for futurists, but although
its effects may be initially small, namely benefiting Fini, A. & Vanni, L. (2004). Learning object e meta-
individuals with certain reduced capabilities, its un- dati. Trento (I): Erickson.
derlying rationale has a wide bearing.
When we focus on the relation mind/brain Fox Keller, E. (1996). Refiguring life. New York: Co-
knowledge as supported by technology, we cannot avoid lumbia University Press.
noticing that humans become more and more technolo- Heinonen, S. (2006). To b-e or not to be? - That is
gized and technologies (i.e., machines) become more the question of the e-knowledge society. Retrieved
and more humanized. It is useful to put side by side the March 10, 2008, from http://www.tukkk.fi/tutu/eti-
recent results of applying neuroprosthetics to a quad- eto/to_b_e.htm
riplegica individual who can now open e-mail with
E-Knowledge
Horton, W. & Horton, K. (2003). E-learning tools and Institute of Technology, Engineering Systems Division,
technologies: A consumers guide for trainers, teachers, Technology and Policy Program, Cambridge, MA.
educators, and instructional designers. Hoboken, NJ: Retrieved March 10, 2008, from http://hdl.handle.
John Wiley & Sons. net/1721.1/17661
Janssen, W. C. & Popat, K. (2003). UpLib: A universal SCUP, Society for College & University Planning
personal digital library system. In Proceedings of the (2006). Executive summary. Retrieved March 10,
2003 ACM Symposium on Document Engineering; 2003 2008, from http://www.scup.org/eknowledge/mem-
November 20-22; Grenoble; France. (pp. 234-242). bers/exec_summary2.pdf
New York: ACM. Retrieved March 10, 2008, from:
Shedroff, N. (1994). Information interaction design:
http://www2.parc.com/isl/members/janssen/pubs/TR-
A unified field theory of design. Retrieved March 10,
03-16.pdf
2008, from http://www.nathan.com/thoughts/unified/
Kurzweil, R. (2005). The singularity is near: When unified.pdf
humans transcend biology. New York: Viking Adult.
Smith, M., Barton, M., Bass, M., Branschofsky, M.,
Laurillard, D. (2003). Foreword. In D. Norris, J. Ma- McClellan, G., Stuve, D., Tansley, R. & Walker J.
son & P. Lefrere (Eds.), Transforming e-knowledge: H. (2003). DSpace: An open source dynamic digital
A revolution in the sharing of knowledge. Ann Arbor, repository. D-Lib Magazine, 9(1). Retrieved March
MI: The Society for College & University Planning. 10, 2008, from http://www.dlib.org/dlib/january03/
Retrieved March 10, 2008, from http://www.scup. smith/01smith.html
org/eknowledge/
Stumpel, B. (2006). Everything 2.0 16 July 2006
MIT Technology Review (2006, July 13). Brain chips blog, Knowledge 2.0. Retrieved March 10, 2008, from
give paralyzed patients new powers. Retrieved March http://bobstumpel.blogspot.com/2006/07/knowledge-
10, 2008, from http://www.technologyreview.com/ 20.html
read_article.aspx?id=17163&ch=biotech
Tafazolli, R. (Ed.) (2004). Technologies for the wireless
Netzspannung.org (2005). A knowledge space for digital future: Wireless world research forum (WWRF Book
culture. Retrieved March 08, from http://netzspannung. of Visions). Chichester: Wiley.
org/about/?lang=en
Vodafone Future Site (2006). Flash video. Retrieved
Nonaka, I., Toyama, R. & Konno, N. (2001). SECI, Ba March 10, 2008, from http://www.vodafone.com/flash/
and leadership: A unified model of dynamic knowledge future/application/index.html
creation. In I. Nonaka & D. Teece (Eds.), Managing
industrial knowledge. London: Sage Publications.
Key terMs
Norris, D., Mason, J. & Lefrere, P. (2003a). Trans-
forming e-knowledge: A revolution in the sharing of Constructivism: Is at the same time a theory of
knowledge. Ann Arbor, MI: The Society for College knowledge, a theory of learning and an educational
& University Planning. methodology. It is, therefore, an ample space for
debate and controversy. In our context a constructiv-
Norris, D. M., Mason, J., Robson, R., Lefrere, P. &
ist approach to knowledge means that we ourselves
Collier, G. (2003b). A revolution in knowledge sharing.
build an interpretation of the reality surrounding us,
Educause Review, Sept.-Oct. 2003. Retrieved March
through experience. Rather than a knowledge transfer
10, 2008, from http://www.educause.edu/ir/library/
from source to sink, we gain knowledge by an active
pdf/erm0350.pdf
engagement in its construction, by giving to and tak-
OLPC - One Laptop per Child (2006). Homepage. ing from others.
Retrieved March 10, 2008, from http://www.laptop.
Digital Revolution: An expression used to denote
org/download.en_US.html
the extraordinary transition in media, communications,
Raghavan, A. (2004). Re-engineering knowledge net- devices (and ultimately economics and society), from
works for development. Masters thesis, Massachusetts an analogue form (i.e., continuous, linear signals rep-
0
E-Knowledge
resenting information) to a form expressed in discrete radiofrequency sensitive devices). LBSs are able to
digits (actually: bits). This started in the early 1980s. detect and react to the (geo)location of the user and E
accordingly trigger a service of some kind.
Learning and Content Management System
(LCMS): Fundamental computer systems for imple- Virtual Learning Environment (VLE): Is often
menting technology-enhanced learning, often called a used in lieu of LCMS. However, the term VLE has a
platform. It involves many digital components and wider connotation than just a single platform. This
tools of a very specific nature. It is exploited both by the interpretation of VLE says that the virtuality of the
end-users (learners, usually in distant locations) and by learning environment is constituted by a combination
the authors, teachers and tutors who prepare and manage of tools with different, though complementary, purposes
educational content and curricula (courseware). (e.g. one LCMS plus one project development platform
plus one digital repository at a central site, plus a set
Location-Based Services (LBSs): A new genera-
of knowledge management tools at the users work-
tion of telematic services based on the capabilities of
station). In parallel, also a set of different educational
wireless networks, or of the global positioning system
and management human skills have to coexist and
(GPS), and mobile communication devices (or other
harmonize in a VLE.
Section: Process ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
E-Learning Function Integration with Corona 2
E-Learning Function Integration with Corona 2
think of the tracking report function, which requires is, requests such as is there a function in the system
information originating from all the other functions). that performs this task or that is able to supply this
This problem, or rather the solution outlined for it, information? and transmit the reply in WSDL to the
characterizes the development from Corona to Corona requesting module, containing the data necessary for a
2, and falls perfectly in line with standardization of direct contact between the two functional modules. The
methods for managing online information flows: the two can then interact using a communication method
transfer of data between the various functional modules (i.e., question and answer) formulated in the SOAP
and between the latter and the organizations database (Simple Object Access Protocol) protocol.
actually takes place through the well-known and well- This method of exchanging data between modules
consolidated technology of the Web-Services. implies that the modules themselves, and the manage-
ment of the database, implement and utilize WSDL and
the second step SOAP standards: such instruments may be used both
for the management of data flows within a platform and
In brief, as illustrated in the next figure, Corona 2 acts for the aggregation of modules from different sources
like an information broker with regard to the pos- in the context of a composite interactive environment,
sibilities and capacities of the single modules that it normally based on a platform based on a specific
connects (a UDDIUniversal Description, Discovery teaching methodologysuch as the case of platforms
and Integrationbroker, for those who are familiar implementing tools geared to support constructive
with the specific Web-Services protocols), receiving collaborationbut with the capacity also to aggregate,
notices regarding such possibilities, from the single for the operators, modules deriving from specific and
modules, through messages using the WSDL (Web customized development activities, or from open-source
Services Definition Language) protocol. Thus informed, environments, or from other platforms that render their
Corona 2 can receive, still through WSDL messages, functions compatible with Web-Services standards, in
the operational requests of the functional modules, that a structured and largely transparent fashion.
E-Learning Function Integration with Corona 2
Section: Process ICT
Dimitris K. Kardaras
Athens University of Economics and Business, Greece
Eleutherios A. Papathanassiou
Athens University of Economics and Business, Greece
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Communication Among Students and Lecturers
of having to be physically present at a conference or animations, simulations, audio and video sequences,
on the university or college campus. E-learning offers peer and expert discussion groups, online mentoring, E
many distinct advantages to individuals who may find links to material on a corporate intranet or the Web,
it inconvenient or even impossible to attend traditional and communications with corporate education records.
educational institutions because of location, work Finally, from a corporate e-learning perspective, the
schedules, and/or increasing family obligations. Also, term e-training is also used to describe corporate train-
as e-learning class attendance is not required, there is ing conducted via e-learning.
a significant reduction in costs. E-learning is coming
to fill the gaps left from conventional learning. In our Benefits of e-learning
days, more and more universities and organizations
offer e-learning courses (Sanderson, 2002). Cheong (2002) and Scanlon, Jones, Butcher, Greenberg,
Ross, Murphy, and Tosunoglou (1996) refer to the most
important e-learning benefits that are listed below:
bacKground
Reduction of the educational expenses, which
e-learning terminology are mostly achieved from the minimization of
the personnel commuting and traveling.
A wide range of terms can be found in the literature that Establishment of a dynamic educational con-
are used interchangeably for e-learning. Nichols (2003) text.
discusses terms such as online learning, mixed-mode Possibility of adjusting the parameters of the
learning, blended learning, resource-based learning, educational material to the idiosyncrasy of the
Web-based, Web-distributed, or Web-capable. Accord- educating groups.
ing to Sun Microsystems (2002), e-learning spreads Content is fully up-to-date and reliable.
across two worlds, namely, the world of information Nowadays learning is continuously available on a
technology and the world of education and training. In (24/7/365) basis, i.e. availability from anywhere
general, as the world of e-learning evolves, terms like at anytime.
e-learning, technology-based learning, and Web-based No delays in the start of the courses.
learning are constantly changing and used differently Courses are universal. This factor is quite impor-
by different organizations and user groups. tant, especially in multinational companies.
According to Urban and Weggen (2000), the term Creation of virtual communities and communities
e-learning can be seen from the technology-based learn- of practice is supported.
ing perspective, where e-learning covers a wide set of Scalability is also supported, as far as it concerns
applications and processes, including computer-based the number of the participants.
learning, Web-based learning, virtual classrooms, and Leverage of a companys investment in the in-
digital collaboration. E-learning can be defined as the formation technology field is achieved.
delivery of content via all electronic media, including Increase of value added to customers service.
the Internet, Intranets, Extranets, satellite broadcast- Brings dynamic role changes in stakeholders (i.e.,
ing, audio/video tape, interactive TV, and CD-ROM. lecturers, students, parents, etc.).
Yet, e-learning is defined more narrowly than distance
learning, which would include text-based learning and Zhang, Zhao, Zhou, and Nunamaker (2004) dis-
courses conducted via written correspondence. From cussed the advantages and disadvantages of both
the Web-based learning perspective, the term online traditional learning and e-learning, which are shown
learning constitutes just one part of technology-based in the following tables.
learning and describes learning via Internet, intranet, Communication in the form of either of class discus-
and extranet. Levels of sophistication of online learn- sion or of immediate feedback is presented in Tables
ing vary. A basic online learning program includes the 1 and 2 as distinguishing factors between traditional
text and graphics of the course, exercises, testing, and learning and e-learning. This article focuses on the
recordkeeping, such as test scores and bookmarks. communication issue and investigates if e-learning can
A sophisticated online learning program includes contribute towards effective communication.
Communication Among Students and Lecturers
Advantages of Advantages of
Traditional Classroom Learning E-Learning
Learner centered and self-paced.
Immediate feedback.
Time and location flexibility.
Being familiar to both (teacher and
Cost effective for learners.
learner).
Potentially available to global audience.
Textbook and reading list.
Unlimited access to knowledge.
Class discussion.
Rich multimedia and interactive content.
Disadvantages of Disadvantages of
Traditional Classroom Learning E-Learning
Lack of immediate feedback in asynchronous
Instructor oriented.
e-learning.
Location and time constrains.
Increased preparation time for the instructors.
More expensive to deliver.
Not comfortable to some people.
Communication Among Students and Lecturers
Time Place
Same place Different place
Same time Traditional educational system Synchronous communication
Different time Without meaning Asynchronous communication
among students and their lecturers, the latter should particular industrial role. One way in which students
allow for short breaks during lectures so that students can experience this and become active participants in
would have the opportunity to reflect on the taught the learning process is by the use of virtual environ-
material and ask questions. Communication has also ments, which simulate the real working environment.
been identified as a success factor by Parkinson and Different technologies are developed and used in order
Hudson (2002) because it contributes not only during to minimize the distance between teacher and learner.
the learning process but also during the design decision The lack of contact and consequently, the lack of a
making for an e-learning system as they investigate high degree of interaction between those involved in
the development of an educational multimedia system. the educational process constitutes the negative
During the learning process of engineering courses, point of distance education (Panagiotakopoulos et al.,
Parkinson and Hudson (2002) found that students need 2005).
to be aware of the necessity and importance of com-
municating with working colleagues as experts in their
Communication Among Students and Lecturers
This study aims at investigating the role of e-learning in reliability analysis of the questionnaire
supporting communication among students and lectur-
ers. The research was carried out between March 2006 The reliability of the questionnaire was tested with the
and April 2006 in the Athens University of Economics Cronbachs alpha (a) coefficient. The resulting Alpha =
and Business (AUEB). These students are between 18 .857 indicates the reliability of the instrument.
and 25 years of age and their studies follow, so far,
traditional learning strategies (lectures in classrooms, Students Profile
assessment after every semester). A questionnaire was
developed and delivered to 430 students. 412 of them Of the sample, 58.5% are female and 41.5% are male.
returned valid questionnaires returning a response rate As regards class attendance, 15.3%, of the students
of 95.8%, much higher that the average for such stud- in the sample attend their classes with a frequency of
ies of 20%. The high response rate can be attributed 12 days per week. 37.9% of the sample attends their
to the fact that student had been beforehand informed classes no more than 34 days per week while 45.1% of
of the study, and they had agreed to participate and fill the sample attends their lectures every day. This means
in the questionnaire. The questionnaire consists of two that most of the students attend the lectures regularly.
sections. The first refers to issues related to students Figure 2 shows the students distribution based on their
profile, and the second section includes questions that year of studies.
pertain to the role of e-learning in improving com- The majority of the students have their own PC
munication. The many facets of communication that (93%). By consulting Table 5 and taking into consider-
a thorough literature review revealed where used in ation that the majority of the respondents (93%) have a
order to form the questions of the questionnaire. Con- PC and that they use their PC very often (every day or
tent validity was tested with students and experts in 24 times per week), the study indicates that students
e-learning who have gone through the early versions of the sample are familiar with the use of computing.
of the questionnaire. A 5-point Likert scale [Strongly As regards Internet surfing, 26.9% of the sample
negative (- -), Negative (-), Neutral (0), Positive (+), surfs every day, 54.9% searches the Internet 24 times
Strongly positive (++)] was used in order to allow per week, and 11.7% of the students surfs more than
students to express themselves in the most effective 4 times per week. Further, as Figure 3 shows, 68% of
way. The research framework of the current study is the sample is not concerned about viruses when surfing
shown in the Figure 1. on the Internet.
The data analysis was performed with the SPSS Despite the fact that security is a main concern of
15.0. Internet users and fraud is a main issue in Internet busi-
ness, this study indicates that students in the sample
0
Communication Among Students and Lecturers
Own a PC Total
Frequency of Using a PC
Yes No
Count 178 1 179
Every Day
% 99,40 0,60 100,00
Count 160 24 184
24 times per week
% 87,00 13,00 100,00
More than 4 times Count 42 0 42
per week % 100,00 0,00 100,00
Count 380 25 405
Total
% 93,80 6,20 100,00
Communication Among Students and Lecturers
are prepared to undertake any potential risks; they are Availability of direct personal communication,
prepared to protect their PC, and they go on with the Immediacy of communication,
technology and its applications. This may be an issue for Availability of a supervisor during the important
further investigation that future generations will have a project works
much different attitude towards technology away from Encouragement from lecturer
any justifiable or unjustifiable threats. Bearing in mind Immediacy effectiveness
the students profile, this study suggests that there exists
the students critical mass and students self-motivation Of the sample, 56.9% believes that e-learning
in using e-learning platforms. contributes positively or strongly positively to the con-
tinuous guidance from lecturer to student. Electronic
contribution of e-learning to media can be used in order to follow students perfor-
communication mance and allow the lecturers to be better informed
and appropriately lead their students to the solution
This section discusses the potential contribution of they mostly need.
e-learning to the communication during the learning As Figure 4 shows with regard to the feedback from
process. Although the communication is an issue that lecturers, most of the students answered that e-learn-
can be examined from many different perspectives, ing has positive contribution to immediate feedback
this study focuses on: (61.8%). A question expressed by a student can be
quickly answered with no need for following a tight
a. The contribution of e-learning to communication schedule of contact hours or for arranging meetings
between lecturer and students that suit both lecturers and students.
b. The contribution of e-learning to communication Drawing on findings shown in Figures 9 and 10,
among fellow students the answers indicate that e-learning contributes direct
personal communication (53%) as well as improves
With respect to the contribution of e-learning to the immediacy of communication (49.4%). The sample
communication between lecturers and students, this seems indecisive to accept that e-learning contributes
study after thorough analysis of the relevant literature to direct communication. From one point of view, e-
investigates the extent of e-learnings contribution to learning supports communication through electronic
each one of the following aspects that imply facets of media, but from another angle, e-learning thorough
communication between lecturers and students: e-mails could possibly contribute to arranging direct
meetings. This study suggests that the latter is not the
Availability of continuous guidance on behalf of point of view that students had in mind when answer-
the lecturer, ing the questionnaire. Their positive expectations with
Responsiveness of feedback from the lecturer, respect to e-learning should have been completed with
Negative ,%
Neutral ,0%
Positive ,%
Communication Among Students and Lecturers
Negative ,%
Neutral ,%
Positive ,%
0,0% ,0% 0,0% ,0% 0,0% ,0% 0,0% ,0% 0,0% ,0% 0,0%
Negative ,%
Neutral ,%
Positive ,%
0,0% ,0% 0,0% ,0% 0,0% ,0% 0,0% ,0% 0,0% ,0%
Negative ,0%
Neutral ,%
Positive ,%
Communication Among Students and Lecturers
Availiability of a supervisor
Negative ,%
Neutral ,%
Positive ,%
Negative ,%
Neutral ,%
Positive ,%
0,0% ,0% 0,0% ,0% 0,0% ,0% 0,0% ,0% 0,0% ,0% 0,0%
e-learnings contribution to guidance and feedback as that e-learning do not affect instructors immediacy
discussed earlier in this section. (40.4%). Effectiveness in communication needs direct
Figure 7 shows that 49.5% of students share the communication. Electronic means can be seen as a
opinion that e-learning enables students to communicate valuable supplement to effective communication.
with lecturers through the Internet and approach their With respect to the contribution of e-learning to
supervisor during the development of a project or any communication among students, this study after thor-
other assignment. This is not a very strong positive ough analysis of the relevant literature investigates the
stance in favor of e-learning, since slightly more than extent of e-learnings contribution to each one of the
half of the sample does not endorse e-learning value. following aspects that imply facets of communication
Figure 8 shows that only 39.6% of students in the among students:
sample express the belief that e-learning improves lec-
turers encouragement to students. Instead, 43.1% do not Working in groups
accept that e-learning can have a positive impact. This Cooperation
study indicates that students rather perceive encourage- Improvement of communication
ment as a matter of a direct in-person communication. Exchanging opinions
E-learning provides the means of communication in Immediacy in problem solving
case of well-structured and more regular issues. Security in communication
The percentage of students, as shown in Figure
9, who believe that e-learning is a positive factor for Of the sample, 49.3% believe that e-learning con-
effective instructors immediacy (40.9%) is almost tributes to working in groups. In this case, students
the same to the percentage of students who believe appear indecisive. Those who answered positively are
Communication Among Students and Lecturers
Negative ,%
Neutral 0,%
Positive ,%
0,0% ,0% 0,0% ,0% 0,0% ,0% 0,0% ,0% 0,0% ,0%
Working in groups
Negative ,%
Neutral ,%
Positive ,%
Negative ,0%
Neutral ,%
Positive ,%
0,0% ,0% 0,0% ,0% 0,0% ,0% 0,0% ,0% 0,0% ,0%
Communication Among Students and Lecturers
Figure 13. Can e-learning provide the means for improving communication among students?
Negative ,%
Neutral ,%
Positive ,%
Negative ,%
Neutral ,%
Positive ,%
Negative ,%
Neutral ,%
Positive ,%
Communication Among Students and Lecturers
Negative ,0%
Neutral ,0%
Positive ,0%
0,0% ,0% 0,0% ,0% 0,0% ,0% 0,0% ,0% 0,0% ,0%
almost as many as those students who are negative contributor to the secure communication among the
toward accepting the value of e-learning. students community, the university, and among fel-
This finding needs further investigation in order low students.
to examine whether the responses are dependent to Thus, it means that they trust their communication
students previous experience with group work. If they through e-learning platforms.
are not used to or if they have had indications of poor
collaboration, they would have been reluctant to accept
group work. A mediocre 46.7% of the sample, as shown hyPothesIs testIng
in Figure 12, indicates that students are also reluctant
with respect to e-learning contribution to cooperation Further, this section investigates in particular the dif-
among students. This finding is in line with the previous ferent views that students may hold when distinguish-
one, not surprisingly, since group work implies some ing them by their beliefs of the importance of e-mail
kind of student cooperation. in communication during the learning process. The
Students are even less positive regarding e-learnings e-mail based communication was chosen because it
contribution to communication among students since is widespread as a communication tool and does not
only a 45.0% would believe so. Students prefer to form imply any complex technical knowledge and skills
their lively groups and communicate in person. when using it. The questionnaire investigates the extent
Students seem to be more in favor of using e-learn- to which students regard e-mail based communication
ing as a platform for exchanging opinions. This study as a critical success factor (CSF) in learning, not only
indicates that the development of virtual communities in e-learning. The study then separates the sample into
as part of an e-learning platform for supporting students the following two parts:
would be a good strategy.
Another issue that students with a 50.5% of the The part (A) that represents students who believe
sample feel positive about is the expectation that e- that e-mail based communication is a CSF for
learning can contribute toward creating an environment learning.
that provides solutions immediately. This finding is in The part (B) that represents students who do not
line with previous results that indicate students belief believe that e-mail based communication is a
for responsive feedback on behalf of a lecturer as well CSF for learning.
as indicate their willingness to exchanging opinions
through the technology of e-learning. Quick feedback The answers of part (A) subset then were considered
and opinions sharing at least contribute towards prob- in order to further investigate their views with respect
lem solving. to the perceived particular importance of e-learning in
Finally, Figure 15 shows that most of the stu- the communication among lecturers and students. First,
dents (60.8%) answered that e-learning is a positive Table 6 shows the percentages of students who believe
Communication Among Students and Lecturers
Table 6. E-learning and its contribution to effective communication: The views of students who consider lec-
turerstudent communication via e-mail a CSF to learning
positively or strongly positively that lecturerstu- couragement from the lecturer, communication among
dent communication via e-mail is a success factor for fellow students, and opinions exchanging, which are
learning quality, and they also believe that e-learning highlighted in Table 7. However, this study indicates
contributes positively or strongly positively to each of that there is statistically significant dependence between
the communication factors in Table 7. Effective contri- e-learning and communication that would support
bution to communication factors is defined by student aspects of H1 hypothesis.
responses as positively or strongly positively.
A first indication is that most of the students with
positive rates in lecturerstudent communication Future research
via e-mail also rated positively the contribution of
e-learning to both types of communication. The only This study investigates the contribution of e-learning
exception to this conclusion is the contribution to the to communication. However, this topic has been in-
encouragement from lecturer where the percentage is vestigated in an exploratory manner. Communication
lower than 50% of the sample. The study in order to may differ among different cultures, among mature
further investigate the above indication continues with students, and it depends on many other factors that are
chi-square tests (in Table 7) and examines the following not studied in this research work. For future research,
type of hypothesis. the development and validation of a model that captures
the interrelationships between learning quality factors
H1: Does e learning contributes toward effective com- and their contribution to communications in different
munication? organizational, cultural, and educational level settings
may shed more light into this topic. Furthermore, the
Effective communication is considered in terms of development of customizable e-learning environments
the communication factors shown in Table 7. may also become the necessary infrastructure for en-
This study indicates that there is no statistical sig- hancing communication among all members involved
nificance to assume that e-learning contributes to en- in the learning process.
Communication Among Students and Lecturers
Communication Among Students and Lecturers
Cronin, J. J., & Taylor, S. A. (1992). Measuring service Lee, J., Hong, N., & Ling, N. (2002). An analysis of stu-
quality: a re-examination and extension. Journal of dents preparation for the virtual learning environment.
Marketing, 58, 55-68. The Internet and Higher Education, 4, 231-242.
Cronin, J. J., & Taylor, S. A. (1994). SERVPERF vs. Li, O. (2002). Exploration of collaborative learning and
SERVQUAL: Reconciling performance-based and per- communication in an educational environment using
ceptions-minus-expectations measurement of service computer-mediated communication. Journal of Re-
quality. Journal of Marketing, 58, 125-131. search on Technology in Education, 34(4), 503-516.
Driver, M. (2002). Exploring student perceptions of Liaw, S. S., Huang, H.-M., & Chen, G.-D. (1996). An
group interaction and class satisfaction in the Web- activity-theoretical approach to investigate learners
enhanced classroom. The Internet and Higher Educa- factors toward e-learning systems. Computers in Hu-
tion, 5, 35-45. man Behavior, 23(4), 1906-1920.
Dunken, M. (1983). A review of research on lectur- Lthje, C., & Prgl, R. (2006). Preparing business stu-
ing. Higher Education Research and Development, dents for co-operation in multi-disciplinary new venture
2, 63-78. teams: Empirical insights from a business-planning
course. Technovation, 26(2), 211-219.
Garrison & Shale. (1987). Mapping the boundaries of
distance education: Problems in defining the field. The Messina, B. A. (2002). Distance learning: An option
American Journal of Distance Education, 1(1), 4-13. for your future? Journal of PeriAnesthesia Nursing,
17(5), 304-309.
Govindasamy. (2001). Successful implementation of
e-learning: Pedagogical considerations. The Internet Miller & Padgett. (1998). Redesigning the learning en-
and Higher Education, 4(3), 287-299. vironment for distance education: An integrative model
of technologically supported learning environments.
Grant, M. (2004). Learning to teach with the Web: Fac-
Online Journal of Distance Learning Administration,
tors influencing teacher education faculty. The Internet
1(1). Retrieved March 6, 2008, from http://www.westga.
and Higher Education, 7(4), 329-341.
edu/_distance/miller11.html
Helmi, A. (2002). An analysis on impetus of online
Milliken, J., & Barnes, L. (2002). Teaching and tech-
education Curtin University of Technology, Western
nology in higher education: Student perceptions and
Australia. The Internet and Higher Education, 4,
personal reflections. Computers & Education, 39,
243-253.
223-235.
Ingram, H., Biermann, K., Cannon, J., Neil, J., & Wad-
Nichols, M. (2003). A theory for elearning. Educational
dle, C. (2000). Internalizing action learning: A company
Technology & Society, 6(2), 1-10. Retrieved March 6,
perspective. Establishing critical success factors for
2008, from http://ifets.ieee.org/periodical/6-2/1.html.
action learning courses. International Journal of Con-
ISSN: 1436-4522.
temporary Hospitality Management, 12, 107-113.
Offir, B., Barth, I., Lev, Y., & Shteinbok, A. (2003).
Khadra, A., Liu, X., & Shen, X. (2005). Impulsively
Teacherstudent interactions and learning outcomes
synchronizing chaotic systems with delay and appli-
in a distance learning environment. The Internet and
cations to secure communication. Automatica, 41(9),
Higher Education, 6, 65-75.
1491-1502.
Oliver, R. (1981). Measurement and evaluation of
Kroksmark, . (1995). Teaching and Teachers Dida-
satisfaction processes in retail settings. Journal of
ktik: Outlines for a phenomenographic description of
Retailing, 57(3), 25-48.
teachers teaching competence. Studies in Philosophy
and Education, 14, 187-382. Oliver, R., & Omari, A. (2001). Student responses to
collaborating and learning in a Web-based environment.
Larsen, K., & McInerney, C. (2002). Preparing to work
Journal of Computer Assisted Learning, 17, 34-47.
in the virtual organization. Information & Management,
39(6), 445-456.
0
Communication Among Students and Lecturers
Parasuraman, A., Zeithaml, V. A., & Berry, L. L. Vergidis & Panagiotakopoulos. (2002). Student drop-
(1985). A conceptual model of service quality and its out at the Hellenic Open University: Evaluation of the E
implications for future research. Journal of Marketing, graduate program. International Review of Research in
49, 41-50. Open and Distance Learning, 3(2). Studies in Education
Hellenic Open University Greece. ISSN: 1492-3831.
Parasuraman, A., Zeithaml, V. A., & Berry, L. L. (1988).
SERVQUAL: A multiple-item scale for measuring Volery, T., & Lord, D. (2000). Critical success fac-
consumer perceptions of service quality. Journal of tors in online education. The International Journal of
Retailing, 64, 12-37. Educational Management, 14, 216-223.
Parkinson & Hudson. (2002). Extending the learning Vrasidas, R. (1999). Factors influencing interaction
experience using the Web and a knowledge-based in an online course. American Journal of Distance
virtual environment. Computers & Education, 38(1- Education, 13, 22-36.
3), 95-102.
Wiesner, P. (2002). E-learning in 2001. In Proceedings
Phillips, M., & Peters, M. (1999). Targeting rural stu- of the 25th Annual International Computer Software
dents with distance learning courses: A comparative and Applications (COMPSAC01). IEEE.
study of determinant attributes and satisfaction levels.
Zhang, D., Zhao, L., Zhou, L., & Nunamaker, J., Jr.
Journal of Education for Business, 74, 351-356.
(2004, May). Can e-learning replace classroom learn-
Ritchie, H., & Newby, T. (1989). Classroom lecture/dis- ing? Communication of the ACM, 47(5).
cussion vs. live television instruction: A comparison of
effects on student performance, attitude, and interaction.
American Journal of Distance Education, 3, 36-45. Key terMs
Rosenberg, M. J. (2001). E-learning: Strategies for Communication: The process of exchanging infor-
delivering knowledge in the digital age. New York: mation and ideas. It involves encoding, transmitting,
McGraw-Hill. and decoding intended messages.
Sanderson, P. (2002). E-learning: Strategies for deliv- E-Learning: The acquisition and the use of knowl-
ering knowledge in the digital age. The Internet and edge distributed and facilitated primarily by electronic
Higher Education, 5(2), 185-188. means. This form of learning currently depends on
networks and computers but will likely evolve into
Scanlon, E., Jones, A., Butcher, P., Greenberg, J., Ross,
systems consisting of a variety of channels (e.g., wire-
S., Murphy, P., & Tosunoglou, C. (1996). Evaluation
less, satellite) and technologies (e.g., cellular phones,
of computer assisted learning and the open university:
PDAs) as they are developed and adopted. E-learning
Fifteen years on. Computers and Education, 26, 1-3.
can take the forms of courses as well as modules and
Singh, G. (2002). Educational consumers or educational smaller learning objects. E-learning may incorporate
partners: A critical theory analysis. Critical Perspec- synchronous or asynchronous access and may be dis-
tives on Accounting, 13(5-6), 681-700. tributed geographically with varied limits of time.
Soong, M. H. B., Chan, H. C., Chua, B. C., & Loh, K. E-Training: The corporate training conducted via
F. (2001). Critical success factors for on-line course e-learning.
resources. Computer and Education, 36, 101-120.
Online Learning: Constitutes just one part of
Tuckman, B. (2002). Evaluating ADAPT: A hybrid in- technology-based learning and describes learning via
structional model combining Web-based and classroom Internet, intranet, and extranet.
components. Computers & Education, 39, 261-269.
Problem Solving: A systematic approach utilizing
U r b a n , T. , & We g g e n , C . ( 2 0 0 0 ) . C o r- multiple perspectives to uncover the issues related to
porate e-learning: Exploring a new frontier. a particular problem, design an intervention plan, and
Retrieved March 6, 2008, from http://www.wrhambre- evaluate the outcome.
cht.com/research/coverage/elearning/ir_expoler.pdf
Communication Among Students and Lecturers
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
E-Learning is What Kind of Learning?
classIcal Models For teachIng, Constructivist perspectives, on the other hand, study
learnIngand e-learnIng? the adaptive features which regulate the development
of knowledge based on the actions and interactions of
In technology, constructivism appears to be particularly the subject in the world. In doing so, while not neglect-
effective when associated with a social as well as cultural ing the role played by the social context in knowledge
interpretation of knowledge. Though these two points of construction, they focus on the relation of productive
view have traditionally been kept quite distinct, integra- interaction between self and the environment and the
tion of these two strands of research now seems likely reciprocal transformative potential implied in this re-
to be opening up interesting interpretative multiplicities. lation (Gros, 2002). The subject, then, is an explorer
This integration makes synergic reconsideration pos- of pathways of guided discovery, planning strategies,
sible on the part of the learner (Table 1) leading to the itineraries, learning environments and the adaptive
development of learning pathways orientated towards mode to interact. Besides considering the subject as
concrete learning supported by a social vision of the generally interactive, which lies at the basis of the
construction of the learning environment. historical-social matrix, it tends towards the idea that
each subject will interact with others, with the sym-
toward a socioconstructivist approach bolic systems and tools of knowing, shifting from
a biological to a socio-cultural metaphor of knowing
In actual fact, sociocultural theories and constructivist (Sternberg, 1990).
perspectives on learning diverge not only in episte- In an interactivist perspective (Gottlieb, 1996;
mological termswith different interpretations of Lerner, 1998), however, the two metaphors are not
knowledgebut also in ontological termsas far as the necessarily contradictory, far from it; it is precisely
known world/world to know and the knowing subject from a pedagogic standpoint that approaches such as
are concerned (Packer & Goicoechea, 2000). bioeducational sciences (Frauenfelder, Santoianni,
From an epistemological point of view, sociocultural 2003) promote a global and synergic vision.
theories highlight the role of social participation in Conversely, the possible complementary nature of
learning. At the forefront is the educational and training sociocultural and constructivist approaches recently
relationship itselfno longer merely who is doing the identified is basedfrom an ontological perspec-
teaching (teacher-centred approaches) or who is do- tiveon the idea that the constructivist dualism be-
ing the learning (student-centred approaches). It is an tween the knower and the known is no longer justified,
embedded, dynamic educational and training relation- insofar as knowledge itself cannot be considered as a
ship, in which trainers are considered experts, skilled world in itself but a world coconstructed by several
in managing historical change and organising social individuals. These individuals, recognizing themselves
activity. In this framework cognitive responsibility is as a part of that world, are both transformers of it and
given to learners, whoin a process of apprenticeship transformed by it.
and collaborationmust search for their own identity It is precisely through this contact with the learn-
in the learning community through constant reference ing communitya necessary step towards a feeling of
to the models that are available within. belongingthat the learner rediscovers his or her sense
of individuality, often taken for granted in sociocultural
approaches tout court and often exclusive in construc-
tivist approaches tout court. As these tendencies are
Table 1. The learner from a socio-constructivist point
negotiated, new ideas emerge along with fresh modes
of view
of interpretation and innovative operative pointers for
The socio-constructivistic
the design of socioconstructivist virtual and nonvirtual
learner may be considered as: learning environments.
The socioconstructivist approach highlights the
planner dynamics of mutual interaction between:
explorer
apprentice
meta-reflective thinker Culture: Meaning a set of symbolic systems,
member of a community cognitive artefacts, expressions of knowing, and
so forth.
E-Learning is What Kind of Learning?
E-Learning is What Kind of Learning?
E-Learning is What Kind of Learning?
E-Learning is What Kind of Learning?
educational perspectives on shared focuses to deal artefacts, coconstructed cultural products, domain
with the problem of mind education in epigenesis. At specific and relative to the contexts from which they
the heart of bioeducational sciences lies the study of emerge and in which they are formed.
mind development from an educational point of view.
Educability: Educability may be considered as
Bioeducational sciences aim to develop integrated re-
a complex process concerning individual adaptive
search approaches to find out what kind of constraints
learning potential to cope with environments, explicit
may influence individual modifiability and relative
and/or implicit conditions of interaction in designed
plasticity in educational development.
or nondesigned learning environments, and the role
Constructivism: The concept of construction of personal history in these experiential dynamics.
implies transformative working on knowledge; an Educability is the process which concerns the criteria
active and reactive task of acquiring, processing and whereby it is possible to form the mind in epigenesis
producing knowledge which puts the learner in a key by activating paths which may regulate and transform
position in the learning processin other words aware learning. Management and transformation activities
of how the process itself works; capable of managing, are therefore hypothesized, designed, and developed
proposing, and being creative. In the technological keeping in mind the potential variables of adaptive
field the constructivist viewpoint is particularly effec- systems and of their development processes.
tive precisely because of its interpretative multiplicity,
Embodied Mind: Knowledge is embodied, within
which lends itself to a reconsideration of the learner
the body and organismicity of the learner and of the
as designer, metareflective thinker and community
environment in which the learner is synergically in-
memberleading to an integrated vision of learning
cluded, within a correlative vision of the interdependent
environments design.
relationships between mind and brain.
Distributed Mind: Knowledge is distributed
Situated Mind: Knowledge is embedded in space-
among minds, in the intersubjectivity of thought; among
time situativity and within the contingency of the vari-
the peripheral devices that represent the extensions
ous learning situations, where experiential interaction
of the mind, like technology; among the cognitive
is regulated by evolving and adaptive criteria.
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
E-Learning Methodological Models and Typologies
a. Students having to meet at the same time; meaning The greatest strength of this approach may consist
that there would be just one session for students in the opportunity to combine a variety of instructional
who may have the most diverse needs; units and components to support individual instruc-
b. Limited time available for discussions; meaning tional goals.
that not all may have the opportunity to inter- The learning objects philosophy involves a similar
act. view. It aims at providing small instructional compo-
nents that can be reused a number of times in different
The Content + Support model foreshadows the learning contexts. The notion of small, reusable chunks
so-called t-learning solutions based on digital TV. of instructional media, which can be reassembled in
However, even if interactive television could be used, different ways, suggests an arguable interpretation
interaction will be limited to just a few people because of the nature of knowledge as being auto-consistent.
of the typical inherent limits of synchronous delivery This is a very critical issue contrasting with the real
systems. nature of learning and knowledge. As research points
There are some cases where the delivery of a live out, learning is a situated process and knowledge does
session during a course could be useful with the purpose not consist at all of a composition of auto-consistent
of animating a communitya class or a groupwhich objects (Fini & Vanni, 2004).
demonstrates socialization problems. The growing interest in learning object philosophy
It would be possible to obtain positive results by comes along with a growing attention for tracking
integrating live events with asynchronous communica- systems which have received too much attention in
tion tools system: for example, an e-tutor launches a the last years.
discussion in a Web forum; the students pose questions As noted previously, the Content + Support model
that are collected, and then in a live event an expert an- is oriented towards instructional materials. They should
swers the questions and eventually the students achieve be adequately comprehensive in order to reduce the
their tasks (producing a paper, creating a product, and human actors support. Therefore the Content + Support
so on) working in an asynchronous way. approach could provide economic benefits in a course
with numerous students by reducing the e-tutoring
B Asynchronous Delivery costs. In this case, the e-tutors role is of the pull
kind, the e-tutor intervenes on-demand, like a call
This kind of delivery system is characterized by the center operator. In addition the e-tutor normally applies
supplying of instructional, structured units of learning. techniques and devices for the efficient management
In this case, the main issue is to provide learners with of messages (e.g., FAQs).
something other than printed materials. But at the same
time, the production of instructional content with high Wrap around Model
multimedia and interactivity levels is very expensive.
Moreover, this type of instructional material often Whereas the Content + Support model is that which
encounters accessibility problems, and at times can common sense normally envisions when thinking of
only be used off-line. e-learning, practitioners coming from the educational
However, as in the case of multimedia contents, it field demonstrate a strong reluctance toward this model.
is essential to follow the methods and the recommen- It is content oriented and presupposes that teaching
dations of the multimedia learning in order to ensure consists in transmitting knowledge and learning or,
good instructional communication (Clark & Mayer, otherwise stated, in merely memorizing and processing
2003; Mayer, 2001). Even if this aspect has been widely information. Hence there is no attention to the crucial
investigated, it continues to be a critical issue. A casual dimensions of learning such as critical thinking and
and linear relationship does not exist between interac- metacognitive skills.
tivity and learning in that more interactivity entails a Instead, from Piagets theory on the more recent
higher level of learning. In certain cases, a superfluous constructivism, learning is seen as an active process by
use of multimedia can produce cognitive overload, thus which learners construct new ideas or concepts based
interfering with the learning process. on their present and past knowledge and experiences.
As Cunningham and Duffy outline (1996, p. 172), all
0
E-Learning Methodological Models and Typologies
constructivist theories share the principle that learning The theoretical framework involved in the Inte-
is an active process of constructing rather than acquiring grated model is related to contructivism, just like the E
knowledge and instruction is a process of supporting Wrap Around model. In particular, it refers to social
that construction rather than communicating knowl- constructivism theories of learning which emphasize
edge. According to constructivism, in an authentic the social nature of learning and knowledge and the
environment learners assume the responsibilities of value of collaboration and social negotiation among
their own learning and develop metacognitive abilities learners.
in order to monitor and direct their own learning and The course contents are typically ill defined and
performance. Therefore an authentic environment is an dynamic. There is no distinction between contents
open and flexible learning space where learning goals and support because contents emerge just from the
may be defined in itinere (including new resources, interaction and negotiation among e-tutor and learn-
concepts and reflections). ers or among the community of learners. The e-tutor
In this perspective the Web enables to shift atten- plays the role of moderator and animator of the learn-
tion from contents to contents wrap around aspects. ing community.
Rather than delivering teaching materials, the focus is In some cases the groups work can be based on
on learning activities. The Web may play the role of collaborative and/or cooperatives activities in a strict
a trigger factor, raising problems as well as provid- sense. Although the word collaboration is often used
ing resources and support for their solutions. The abusively to refer to any kind of teamwork, scholars
instructional contents may have differents formats, usually distinguish between collaboration and coop-
from traditional (such as books) to new ones (such as eration. Both collaboration and cooperation involve a
digital resources). They cannot be defined from the team-based working process with a common goal, but
beginning, because they can be expanded and enriched collaboration takes place through continuously mutual
by the Web, which is a very large repository of docu- and shared interaction and negotiation, while coopera-
ments and resources. tion can be accomplished by the division of labour
The e-tutor can present problems to solve or dem- among participants and each person is responsible for
onstrate how to solve problems, providing informa- a portion of the work (Strijbos & Martens, 2001).
tion, resources, and adding new ongoing elements and Therefore collaboration is really difficult and online
suggestions. collaborative work even more. Just to demonstrate
Among the asynchronous communication tools, some critical issues, as reference literature points out
the Web Forum becomes crucial as a common space (Calvani, 2005; Dillenbourg, Baker, Blaye, & OMalley,
where learners can work collaboratively and share their 1996; Jonassen, 2000), online collaboration endures
reflections and products of learning. the mediatization of the interaction context, has to
The Wrap Around model is the more suitable solution afford the problems of trust and reputation, requires
for academic courses, especially (but not exclusively) in group culture development and social grounding, and
the field of humanistic studies. The starting investment so forth. Hence, online collaboration is complex and
may be really low. Anyway it is important for the role challenging and requires the achievement of many
of the e-tutor to be proactive, able to manage communi- conditions to make it efficient.
cation tools, moderate interaction, add documents and Briefly, the differences between the three e-learning
resources, and animate the virtual classroom. models can be synthesized as in Table 1.
E-Learning Methodological Models and Typologies
This perspective, based on the assumption that the and allows the integration of both informal and formal
Web is the platform and referred to as e-learning experiences (Bonaiuti, 2006).
2.0 (Downes, 2005), improves personal informal Moving from the analysis of Wilson, Liber,
relationships and a flexible integration of new web Johnson, Beauvoir, Sharples, and Milligan (2007,
tools. It suggests a kind of migration from traditional pp. 31-34), some of the main differences between
Learning Management System (LMS) to Personal a traditional virtual learning environment (VLE)
Learning Environment (Tosh & Werdmuller 2004; or LMS and a PLE can be synthesized as below:
Wilson et al. 2007).
A Personal Learning Environment (PLE) can be de- Focus on coordinating connections between the
fined as a single users e-learning system that provides user and services: while a VLE aims at integrating
access to a variety of learning resources, and that may tools in a single context, PLE focuses on connect-
provide access to learners and teachers who use other ing the user with a wide range of services provided
PLEs and/or VLEs (van Harmelen, 2006, p. 1). by different organizations and individuals;
The interest in PLE is motivated by differents fac- Symmetric relationship: the user becomes both
tors, such as (van Harmelen, 2006, p. 1): consumer and producer of resources;
Individual context: the user can choose informa-
The needs of life-long learners for a system tion and resources, and reorganize them in the
that provides a standard interface to different context;
institutions e-learning systems, and that allows Open content and remix culture: the PLE is
portfolio information to be maintained across oriented towards sharing resources and using
institutions. creative common licenses which allows editing,
A response to pedagogic approaches which require modifying, and republishing resources;
that learners e-learning systems need to be under Personal and global scope: while a VLE is linked
the control of the learners themselves. to an organizational context, the PLE operates both
The needs of learners who sometimes perform at personal and global level, coordinating services
learning activities offline, for example via mobile and information directly related to its user and
system in a wireless-free hospital, or on a remote not being bounded to a particular organization;
mountainside.
Briefly, the PLE approach prefigures a gradual shift
Unlike LMS, which supposes a course-centred toward a personalized and individual-centred environ-
vision of learning, a PLE enables students to manage ment, focused on the interests of learners and their own
and control their learning processes and objectives, formal and informal learning relationships.
E-Learning Methodological Models and Typologies
conclusIon reFerences
E
The three e-learning models analyzed above are the Anderson, T. & Elloumi, F. (Eds.) (2004). Theory and
most current in the e-learning formal contexts. Because practice of online learning. Athabasca University. Re-
of the emphasis on learning objects, LMS and course- trieved March 11, 2008, from: http://cde.athabascau.
centred vision are increasingly diminishing (Downes, ca/online_book/
2005; Bonaiuti, 2006), it is possible to suppose that the
Bellier, S. (2001). Le e-learning. Paris: Editions
integrated model based on collaborative and coopera-
Liaisons.
tive learning is a really promising matter for e-learn-
ing in the future. Even if some critical issues remain, Bonaiuti, G. (2006). E-learning 2.0. Il futuro dellap-
online collaborative learning represents an interchange prendimento in rete tra formale e informale. Trento:
area between e-learning and knowledge management Erickson.
viewed as capitalized knowledge systems for learning
communities. Calvani, A. (2005). Rete, comunit e conoscenza.
In these perspectives, the new research area in Trento: Erickson.
informal e-learning and PLE can play a fruitful and Calvani, A. & Rotta, M. (2000). Fare formazione in
positive role. E-learning and knowledge management Internet. Manuale di didattica online. Trento: Erick-
can derive a significant boost from social networking son.
attitudes and practices growing in the Web 2.0 (Pette-
nati & Ranieri, 2006). In this case, new challenges CEDEFOP Glossary (2000). Making learning visible.
need to be addressed. Among these, some of the main Thessaloniki: CEDEFOP.
issues are: Clark, R. C. & Mayer, R. E. (2003). E-learning and
The Science of Instruction. Pfeiffer.
The integration of formal and informal learning
systems and experiences: Compared with formal Cunningham, D. J. & Duffy, T. M. (1996). Constructiv-
learning system, social systems used in informal ism: Implications for the design and delivery of instruc-
learning have soft boundaries. Since it entails tion. In D. H. Jonassen (Ed.). Handbook of research
such informal contexts, members can vary their for educational communications and technology. New
levels of commitment and visibility, making it York: Macmillan Library Reference USA.
difficult to establish the actual boundary of a Dillenbourg, P., Baker, M., Blaye, A. & OMalley, C.
context (Wilson et al., 2007). This involves either (1996). The evolution of research on collaborative
technical problems or institutional ones. learning. In P. Reinmann & H. Spada (Eds.), Learning
Management and coordination of groups and in humans and machines: Towards an interdisciplinary
teams working in an informal learning system learning science (pp. 189-205). Oxford: Pergamon.
as a PLE. As noted by Wilson et al. (2007, p.
36), While social software in general has been Downes, S. (2005). E-learning 2.0. eLearn Magazine,
widespread popularity [], it remains unclear October 17, 2005. Retrieved March 11, 2008, from:
what mechanisms can underpin the coordination http://elearnmag.org/subpage.cfm?section=articles&
of collective actions by groups and teams within article=29-1
a PLE.
Fini, A. & Vanni, L. (2005). Learning Object e metadati.
Trento: Erickson.
However, although the research on informal e-
learning and PLE is just starting, we believe that the Granieri, G. (2005). Blog generation. Bari: Laterza.
affordances of Web 2.0 technologies and their influence
Harasim, L. (1990). Online education: Perspectives
on online social practices (Granieri, 2005) would have
on a new environment. New York: Praeger.
a great impact on the theory and practice of e-learning
in the next years. Harasim, L. (1995). Learning networks: A field guide to
teaching on learning online. Cambridge: MIT Press.
E-Learning Methodological Models and Typologies
E-Learning Methodological Models and Typologies
to certification. Informal learning may be intentional Even if a universal definition of this term still does
but in most cases, it is non-intentional (or incidental/ not exist, it can be defined as a social network with a E
random) (CEDEFOP GLOSSARY, 2000). common interest or goal that interacts in a virtual space
across time and geographical boundaries and is capable
Integrated Model: Refers to an e-learning model
of developing personal relationships.
in which the distinction between content and support
vanishes because the course content is largely stated by Wrap-Around Model: It is an e-learning mixed
individual and group activity. It relies on collaborative model consisting of partly online activities and partly
activities and meaning negotiation. The e-tutors role predefined and structured content. It encourages a re-
is that of community moderator and animator. sources-based approach to learning and provides the
learners with more freedom and responsibility. The
Virtual/Online Community: Refers to a group of
tutors role is of the pull kind because only a small
people that primarily interact via a computer network.
part of the content course is predefined.
The term is attributed to Howard Rheingold (1993).
Section: Process ICT
Immacolata Scancarello
Catholic University of the Sacred Heart, Italy
IntroductIon
bacKground
This article provides an evaluation of the impact of a
specific e-learning platform (www.blackboard.com) The advent of multimedia and Web technology has
upon pass rates, in particular on the MidTerm tests pass become the major focus of activities at the university,
rate of Calculus I, a math course held at the Catholic which is usually considered the place of excellence in
University of Milan. terms of cultural as well as experimental trials. More
An ICT project for a basic math course was devel- specifically, the potential that these tools provide as op-
oped and introduced in 2001 at the Catholic University, tions to improve and supplement the traditional teaching
Faculty of Economics. Designed for freshmen, the methodologies have been amply debated. Maybe, this
course currently involves as many as 1,200 students, is the result of the tremendous need for compliance to
which is quite an achievement when compared with European productive standards.
other e-learning blended courses available at the same In effect, if the ratio between the number of gradu-
university. The chief objective of the course is to ates and the number of university students can be
supplement face-to-face lessons with the online learn- regarded as a significant indicator of the universitys
ing activities implemented inside and/or outside the productivity, Italy is performing poorly compared
traditional classroom. The innovation of this project with its European counterparts. Approximately 38%
consists not only in its technological features but also of Italian students achieve a university degree after
in its tracking facilities. In fact, student online activities an academic careeron averagelonger than that of
can be tracked down and teachers are provided with their foreign peers.
continuous feedback for the same to be redesigned. In Such a low performance of Italian universities can
addition, students can widen their knowledge of the be undoubtedly upgraded by mixing emerging teach-
subject matter through additional learning materials ing patterns with traditional methods. In so doing,
such as interactive self-assessment tests, guided as- modern technologies can be exploited efficiently and
signments, and so forth. can lead to the prevalence of new teaching styles and
The course is based on four macro-areas: an in- techniques. In Italy distance university courses are
formation area, a content area, a grading area, and a growing incredibly fast and most universities provide
student-to-teacher communication area. courses, either entirely or partially, on line. The latter
Thanks to Blackboard tracking facilities it was pos- are so called because they combine traditional with
sible to include in this article details on the most visited distance learning. According to a survey carried out by
areas by students. The results of a survey conducted the Italian Association of Electronic Publishers (ANEE)
about students satisfaction rating of Blackboard are in 2005, approximately 85% of Italian faculties were
also reported. found to be delivering online courses.
It is noteworthy to point out that the results are quite These findings provide the framework for the ICT
encouraging and a close correlation between online e-learning project course.
active students and their pass rate exists: as a matter
of fact, evidence was found that students access rates
and pass rates on MidTerm tests are related.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
An E-Learning Project for a Basic Mathematics Course at the University
descrIPtIon oF the Project The course allows for either synchronous teach-
ingprovided by the teacher mostly through a variety E
Calculus I is a Math basic course compulsory for some of mediaor asynchronous teaching, in discussion
1,200 students in the first year of a three-year degree at forums where flexibility in terms of access time is
the Faculty of Economics of the Catholic University of guaranteed. Instructors, with the help of assistants,
Milan. As a matter of fact, a growing number of students manage the online course on Bb, by making available
from secondary schools face problems in understanding to the students charts, material, and relevant documenta-
the course content because of their poor knowledge tion prepared by the teaching staff. In addition, virtual
of the subject matter. It is a well-known fact that the classroom facilities, group tests, self-assessment tests,
relevant math exam represents a major obstacle for and so forth, are also utilized.
the students of this faculty and has not only the high- This platform gives the instructors the possibility
est failure rate, but many dropouts and considerable of monitoring the performance of their students in real
delays in completing the university degree. time through extremely accurate access datatime of
The Calculus I project course utilizes Web-based the day, day of the week, performance rates; a notable
functions provided by a learning management sys- advantage over other learning management systems.
temBlackboard (Bb)(http://blackboard.unicatt.it) Each of the four macroareas identified within the
that has been selected after a careful evaluation of the math course on Bb, namely Information area, Content
most popular course management platforms available. area, Grading area, and Communication area, corre-
Access to the online course is granted with a password sponds to menu links in the left-hand column of the
which is reserved for students enrolled in the official course home page (Figure 1).
university course. The course is subdivided into six On entry the course is displayed as is shown.
parallel sections because of the high numbernearly Table 1 shows the location of the areas in the
1,200of participants, and this subdivision is main- menu.
tained in the online course, with the exception of some
shared areas that serve to encourage collaboration Announcements. This is where course-related and
between the groups of students and optimize teaching other announcements are posted, including exam results,
collaborative activities. extra lessons, and newly published materials.
An E-Learning Project for a Basic Mathematics Course at the University
Table 1.
Bacheca (Announcements)
Information area Docenti (Teaching Staff)
Informazioni (Course Information)
Precorso (Math Prep Course)
Content area Materiale (Course Material)
Link Utili (Links)
Esami (Exams)
Grading area
Materiale (Course Material)
Forum (Forum)
Communication area Gruppi (Groups)
E-mail (E-mail)
Teachers. Under this label, the student will find for a guaranteed higher performance as far as learning
addresses and other information regarding lecturers is concerned. The exercises proposed in this section
in charge of the courses. are entirely solved and fully explained by the instruc-
Information. This area is comprised of: tors.
An E-Learning Project for a Basic Mathematics Course at the University
students can find out their score and evaluate their E-Mail. From this area e-mails can be sent to all
degree of knowledge. the students enrolled in the same course, to instructors
only, or to a single user.
Useful Links. It contains the list of Websites related Groups. Mailing list of the six student groups.
to the course topics for more in-depth study. Online Help. This Web page is managed by the
Exams. Provides access to the tests of the previ- University Center for Permanent and Distance Educa-
ous years and to the pass/fail rates of MidTerm tests tion of the Universit Cattolica (CEPaD) and includes
and exams. technical information for students that are not familiar
Forum. In this area (Figure 4) theme forum discus- with the Internet and/or Blackboard.
sions are created, one for each of the six course-teaching
units. Students can post any queries they may have and
responses to them will come from another student or statIstIcs and analysIs
an instructor. This asynchronous communication tool
can be combined with face-to-face (student-to-student Thanks to its tracking facilities, Blackboard allows
and/or student-to-instructor) communication. for a feedback on the most visited areas, and identifies
An E-Learning Project for a Basic Mathematics Course at the University
gaps for improvement, or removal, as well areas where Secondas could be expectedis the above-men-
enhancement is required. tioned Content area. Visits increase in the areas where
For access rates to be analyzed, filtering criteria course materials and assignments can be found.
have been established as follows: Regarding Communication areas, it has been ob-
served thatdespite a 12% access ratethe Forum
A. Time-based filter: area contained only a limited number of messagesa
total of 23. This suggests poor participation by the
Filter 1: from Sept. 26, 20005 to Nov. 12, 2005 students who access the site.
(date of the first MidTerm test). On the basis of a content-area filter only, access
Filter 2: from Nov. 13, 2005 to Jan. 14, 2006 (date rates are detailed in Table 3.
of the second MidTerm test). As previously highlighted, the most successful
area is Course Material, immediately followed by
B. Area-based filter: the Exams link.
Filter 1: on the basis of the all course areas. Regarding the second period of time from Nov.
Filter 2: on the basis of the specific course con- 13, 2005 to Jan. 14, 2006, access rates are shown in
tent. Tables 4 and 5 and concern all of the course areas and
the content areas respectively.
Access rates were first analyzed after combining the In the second time frame, an increase by approxi-
two filters. In the period of time from Sept. 26, 2005 mately 7% was recorded in the access rate to Content
to Nov. 12, 2005, the most visited areas are shown in areas, and access rate to the Exams area was even
Table 2. higherabout 17%compared to the previous period
The area with the highest access rate is Announce- of time. This can be ascribed to the fact that the dates of
ments because it is the entry point of the course. the exam session and of the second MidTerm test were
Table 2. Course access rates from Sept. 26, 2005 to Nov. 12, 2005
0
An E-Learning Project for a Basic Mathematics Course at the University
Table 3. Access rate to content area from Sept. 26, 2005 to Nov. 12, 2005
E
Table 4. Course access rates from Nov. 13, 2005 to Jan. 14, 2006
An E-Learning Project for a Basic Mathematics Course at the University
Table 5. Access rates to content area from Nov. 13, 2005 to Jan. 14, 2006
drawing closer. Conversely, Communication areas ei- Figure 5 details the percentage rates of the students
ther student-to-student or student-to-instructorwere who passed both MidTerm tests according to the above
found to be less accessed. The blended nature of the categories based on the use of a traditional or virtual
course may provide an explanation for that. classroom.
In order to assess the impact of Bb upon the pass As perhaps expected, the category with the highest
rate on MidTerm tests, a group of 209 students was pass rate is that of attending students who accessed Bb,
monitored by recording their physical presence in followed at considerable distance by attending students
classrooms and their access to the online courses. who did not access Bb and finally, by not attending
The findings are quite revealing. There is a cor- students who accessed Bb.
relation between attendance at live lessons, online A comparison of AB with NAB showed a 49%
participation and the pass rate on MidTerm tests. decrease in AB pass rates. Consequently, attendance
The sample of students being monitored was cat- at live lessons seems to represent a crucial factor in
egorized as follows: passing MidTerm tests.
When compared to AB, the ANB profile shows a
1. Attending students who accessed Blackboard 40% reduction in the number of students who passed
(AB): 92 students the exams after the two MidTerm tests. This is a smaller
2. Not attending students who accessed Blackboard reduction than that observed in the previous comparison
(NAB): 79 students between AB and NAB.
3. Attending students who did not access Blackboard Attendance appears to be more of a relevant factor
(ANB): 17 students in pass rates than online participation. This is further
4. Not attending students who did not access Black- confirmed when comparing NAB with ANB. The cat-
board (NANB): 21 students egory profiling ANB students is better than NAB.
An E-Learning Project for a Basic Mathematics Course at the University
60%
50%
AB P rofile
40% NAB Profile
10%
0%
0%
25%
22%
20%
17%
AB Profile
15%
NAB Profile
ANB Profile
10%
NANB Profile
5%
0% 0%
0%
In fact the increase at the end of the the two MidTerm Conversely, a change of trend was observed in the
tests was a mere 9%. NAB and in AB categories. Despite the high number
Compared to NANB an overall failure rate was re- of students in the ANB category who passed the exam,
corded on the two MidTerm tests. This seems to show no student belonging to one of those two groups was
that, if lessons in traditional classrooms are lacking and given a final grade higher than 28/30.
the online course is not accessed, the students ability The NAB group has a 17% rate of grades higher than
to pass their tests is greatly reduced. 28/30, suggesting that personal motivation to educa-
Regarding the excellence data with respect to the tion is a crucial factor. Students who wish to pass their
grading criteria, the greatest number of students who exams and cannot follow live lessons find Blackboard
were given top gradeshigher than 28/30was re- a very useful educational tool.
corded within the AB category.
An E-Learning Project for a Basic Mathematics Course at the University
An E-Learning Project for a Basic Mathematics Course at the University
Table 9.
E
Data Chart
l
ai
s
p
se tion
rs
am
ks
up
m
ru
el
fo e
Te ts
ts
he
In rs
8. Forum: 14,14%
E-
in
H
Fo
en
ro
Ex
en
a
ou
lL
ac
rm
e
G
m
um
in
C
fu
ce
nl
9. Groups: 19,19%
h
oc
un
O
at
U
D
M
no
e
ep
An
rs
Pr
C
A greater emphasis should be placed on the most The results from the questionnaire and an analysis
difficult topics of the program; of the statistics indicate experts should attach greater
Course materials should be made available to importance to the objectives of experimental trials.
students at the beginning of the course, as well Quite significantly, it was found that online courses
as, during the course; are mainly accessed for content areas. Therefore, an
A greater variety of keyed assignments of varying enhancement of the communication areas is highly
difficulty should be made available for download- recommended as these can impact on the process of
ing; generating a more collaborative learning experience
Precise indications should be provided for the by students who cannot follow live lessons in class-
software required to display files and alsoif pos- rooms.
siblea folder containing the links to download Regarding the online course content, learning ob-
the necessary players. jects design will be a top priority. In particular, strict
An E-Learning Project for a Basic Mathematics Course at the University
compliance with standards of educational content in- ematics. In M. Craig, V. Jarmo (Eds.), In Proceedings
teroperability and also reusability, such as the Shared of ED-MEDIA 2001- World Conference on Educational
Content Reference Model (SCORM. See http://www. Multimedia, Hypermedia & Telecommunications, (pp.
adlnet.org/) will be implemented. In addition, course 1128-1130.). Norfolk: AACE.
content will be redesigned for upgraded multimedia
Osservatorio ANEE/ASSINFORM (2005). E-learning
functionalityincluding audio/videofor the benefit
in Italia: una strategia per linnovazione. Retrieved
of the students in the NAB category who will access
March 9, 2008, from http://www.anee.it/ricerche/os-
the course in a self-paced learning mode.
servatorio05/
Palloff, R. M. & Pratt, K. (1993). Building learning
conclusIon communities in cyberspace. San Fransisco: Jossey-
Bass.
The Calculus I project course led us to some conclusive
Ragin, C. (1994). Constructing social research. The
findings. Calculus I students are enrolled in the first
unity and diversity of method. Thousand Oaks: Pine
year of a university course and, therefore, they are not
Forge Press.
familiar with an entirely autonomous learning method.
This is the reason face-to-face lessons actually support Robinson, B. & Latchem, C. (Eds.) (2002). Teacher
students when they study at home and the online course education through open and distance learning. How
is found to be instrumental in their learning process. can open and distance learning and information com-
Students pass rate on MidTerm tests depends on these munication technology (ICT) provide us with more- and
two factors combined concurrently with a strong mo- better teachers? London: Routledge.
tivation to study. Consequently, teachers have to take
these factors in due consideration and motivate their Van Dijk, J. (1999). The network society. An Introduction
students as much as possible. The Web-based course to the social aspects of new media. London: Sage.
can make a remarkable contribution by providing Wiley, D. A. (2000). Connecting learning objects to
enhanced instructional materials in terms of content instructional design theory: A definition, a metaphor,
and electronic format, up-to-date information and by and a taxonomy. In D. A. Wiley (Ed.), The instructional
encouraging their students participation in online use of learning objects: Online version. Retrieved
activities (the forum, for instance) that becomes a key March 9, 2008, from http://reusability.org/read/ar-
to their successful learning. If these requirements are ticles/wiley.doc
met, an efficient educational method will be achieved
and a better performance will follow. Wilson, B. G. (1996). Constructivist learning environ-
ment. Case studies in instructional design, educational
technology publications. Englewood Cliffs, NJ:
reFerences
Key terMs
Aldeman, F. L. & Barritt, C. (2004). Creating a reus-
able learning objects strategy: Leveraging information Blended Learning: Is a learning method that com-
and learning in a knowledge economy. Pfeiffer, San bines the use of different teaching methods and com-
Francisco. munication means such as: live lessons (in the classroom
Blackboard Inc. (2005). Blackboard academic suite. or via teleconferences), self-learning (learning objects,
Instructor manual. Retrieved March 9, 2008, from educational texts) and collaborative learning (based on
http://www.blackboard.com/docs/r6/6_3/en_US/in- synchronous or asynchronous interaction, either live or
structor/bbas_r6_3_instructor/. virtual via chat-rooms, forums, and e-mail).
Knight, P. (2002). Being a teacher in higher education. Calculus I: First year Economics Faculty course
London: Open University Press. with a syllabus that includes linear algebra and elements
of basic analysis such as, one or two variable functions,
Limongiello, G., Stefani, S., & Torriero, A. (2001). TE- and differential and integral calculus.
OREMA-Teaching online project for economic math-
An E-Learning Project for a Basic Mathematics Course at the University
Course Access Statistics: Method of tracking on- Learning Management System: Platform applica-
line activity of students incorporated in the e-learning tion that manages the delivery of e-learning courses, E
software. The details provided in these access statistics and within these, the publication of contents, student
allow the teacher to generate reports regarding the registrations, online statistics, and an evaluation of
way the course is used and the online activity of the knowledge acquired.
students (number of accesses for each student, areas
Learning Object: Modular digital resources,
most visited, average time on-line, number of daily
uniquely identified, and metatagged, that can be used
visitors, etc.).
to support learning (Wiley, 2000).
E-Learning Standards: A set of rules that allow
Mailing List: A list of e-mail addresses identified
for a high level of interoperability, reusability, adapt-
by a single name. When an e-mail message is sent to
ability, and durability of e-learning and learning object
the mailing list name, it is automatically forwarded to
systems. The most common e-learning standards are
all the addresses in the list without the need to know
ADL, AICC, IEEE, and IMS, which are designed
all members individual e-mail addresses.
for content interoperability of a shared metadata and
statistics system. Questionnaire: Quantative analysis tool used to
collect information. It consists of the categories of
Forum: Asynchronous communication tool that
responses desired by the developer of the question-
allows the user to post messages in a space shared with
naire. Depending on the format, users can respond by
other users. Each post may be followed by a series of
choosing from a predefined multiple-choice list (close-
replies to the topic of the original post. Forums differ
ended questionnaire), or may be allowed to respond
from synchronous communication tools such as chat
spontaneously (open-ended questionnaire).
rooms, because in forums the messages may be posted
at different times by users who are not necessarily con-
nected all at the same time.
Section: Process ICT
Mark Stansfield
University of the West of Scotland, UK
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
From E-Learning to Games-Based E-Learning
uninspiring learning experience. On the other hand, and flexibility offered by the (asynchronous) anytime,
modern computer games are recognized as the industry anywhere, any pace and the individualized and learner E
standard for the design of engagement, interactivity, focused approaches enabled by the innovative use of
immersion, and collaboration, and give educators an e-learning technologies. However, e-learning is not
insight into how e-learning can be enhanced to provide a without its disadvantages; for example:
more engaging and challenging learning experience.
In this article, we describe a teaching approach Costs may initially exceed more traditional meth-
motivated by principles found in the constructivist ods;
epistemology and a particular form of constructivist More responsibility is placed on the learner who
learning environment based on computer games. Many has to be self-disciplined and motivated (this is
researchers have expressed their hope that constructiv- particularly true for e-learning that consists simply
ism will lead to better educational software and better of repurposed face-to-face material, with minimal
learning (for example, Jonassen, 1994). They emphasize or no interactivity, which can be unengaging);
the need for open-ended exploratory authentic learning Some learners lack access to a PC/Internet or
environments in which learners can develop personally have difficulty with the technology;
meaningful and transferable knowledge and under- Increased workload (Connolly et al., 2007);
standing. Games-based e-learning is a constructivist Non-involvement in the virtual community may
learning environment in which learners are invited to lead to feelings of loneliness, low self-esteem,
actively solve problems (Leemkuil, de Jong, de Hoog, isolation, and low motivation to learn, which in
& Christoph, 2003). turn can lead to low achievement and drop-out
(Rovai, 2002);
It has developed a reputation for being boring
e-learnIng and gaMes-based and mindless; games have developed the reputa-
e-learnIng tion for being engaging and challenging (Aldrich,
2003).
What is e-learning? Drop-out rates tend to be higher in e-learning pro-
grams than in traditional face-to-face programs,
The term e-learning has been used to describe an edu- often 10 to 20 percentage points higher (Carr,
cational setting in which teaching and learning take 2000).
place within an Internet-based environment (Berge &
Collins, 1995) and as the use of digital technologies Perhaps one of the most damaging criticisms is that
and media to deliver, support and enhance teaching, some e-learning simply replicates the social organi-
learning, assessment and evaluation (LTSN, 2003, zation of traditional education and that the potential
p. 6). Some authors also distinguish between online benefits of e-learning (that is, of personalized and ac-
learning and e-learning, where online learning is used cessible learning experiences) are missed. For many
to represent any class that offers its entire curriculum years, the technology (the e part of e-learning) seemed
via the Internet, thereby allowing learners to participate to dominate the development of e-learning, and it is
regardless of geographic location (place-independent), only recently that there has been a wider recognition
theoretically 24 hours a day (time-independent). This that the learning is more important: creating technol-
is in contrast to the traditional classroom instruction, ogy-enhanced experiences designed to change future
which is time and place bound, face-to-face, typically understanding and performance (Squire, 2005). There
conducted in an educational setting and consisting is also significant debate about whether online learners
primarily of a lecture/note-taking model and blended perform as well as traditional face-to-face learners with
learning, which is a combination of online learning and some researchers suggesting that much of the media
traditional classroom instruction. The term e-learning comparison studies are flawed in a variety of ways that
can be used as a generic term to encompass both (fully) render establishing cause-and-effect relationships or
online learning and blended learning. generalizations questionable (Joy & Garcia, 2000).
The research literature cites many advantages of an
e-learning environment, particularly the convenience
From E-Learning to Games-Based E-Learning
0
From E-Learning to Games-Based E-Learning
of his/her life. Pleasure, challenge/achievement, and community-written manuals, walkthroughs, tips, hints,
control came out as distinct factors in an analysis of FAQs, and cheats. E
reasons for playing computer games. Challenge was MUDs (multi-user dungeons) and MOOs (object-
the most frequently selected reason for continuing to oriented MUDs) are text-based online environments
play games as they get increasingly difficult, and was where users can collaborate in groups to complete
also rated as the feature of games that might be most quests, solve puzzles, or slay villains. These systems
useful in learning in higher education. 85% of students peaked in the 1990s and have evolved into massive
thought that computer games are potentially useful for multiplayer online games (MMOG) in which hundreds
learning in HE. of thousands of players can simultaneously interact
In addition to these areas of learning and instruc- in graphically rendered immersive worlds. MMOGs
tion, there is also a growing recognition that learning generally create a persistent universe where the game
is an inherently social process, and in this section, we continues playing regardless of whether or not anyone
examine some of the social aspects of computer games else is. The most popular of these games to date are
that may lead to enhanced learning. Communities of World of Warcraft and Lineage, the former of which
practice (Lave & Wenger, 1991) in a professional is reported to have over 10 million players worldwide.
context, and communities of learners in an education These games are not games in the traditional rules-
context (Brown & Campione, 1994) have focused on based sense, but rather persistent social and material
how individual development occurs within the context worlds, loosely structured by open-ended (fantasy)
of the norms and activities of a community. Commu- narratives, where players are largely free to do as they
nities of practice are groups of people who share a please (Steinkuehler, 2004). Generally the game play
concern, a set of problems, or a passion about a topic, mechanics are such that true mastery of the game can
and who deepen their knowledge and expertise in this often only be achieved by working collaboratively
area by interacting on an ongoing basis (Wenger, with other players, which contributes to a substantial
McDermott, & Snyder, 2002, p. 4). Learning occurs sense of community.
through participation in the practices of a community, For example, the MMOG EverQuest lets players
as individuals develop ways of thinking and reframe create and control characters, or avatars, within a fantasy
their identities and interests in relation to the commu- world called Norrath. Characters gain skills and posses-
nity. A desirable feature of online learning communities sions that they can then trade with other players using
is that there exists varying demands and expertise at the games currency of platinum pieces. However,
different levels of competency where participants can many EverQuest players have found this process too
scaffold one another through the sharing of informa- complicated and have instead opted to sell their assets
tion and abilities (Wenger, 1998). Strong community is for real money though trading Web sites such as eBay.
important as it has been shown to lead to deep learning It was found that Norraths GNP per capita is $2,266,
(Chapman, Ramondt, & Smiley, 2005). that if Norrath was a country, it would be the seventy
The above concepts of community and social activ- seventh wealthiest in the world just behind Russia, and
ity do not immediately seem applicable to computer that Norraths virtual currency was more valuable in
games. However, while the stereotypical perception the U.S. than the yen (Castronova, 2001). Research in
of a gamer is someone who is young (probably male), MMOGs covers disciplines as diverse as economics,
somewhat nerdy, unable to communicate, introverted, politics, sociology, philosophy, and education. MMOGs
and lacking in basic social skills, this is now far from such as Ultima Online, which boasts real, player-driven
the truth. The last decade has seen the rise of multi- economies where virtual community members gener-
player games and online (virtual) gaming communities. ate wealth, negotiate prices, accumulate capital, and
Not only do gamers play these games together, but in form trade alliances, have emerged as important sites
some cases, they help extend and improve the games for economic exploration and experimentation with
through tools that the games developers provide or social systems (Bradley & Froomkin, 2003).
even tools that the community develops. There are Such games represent an entirely new kind of so-
now countless gaming community Web sites that host cial learning experience and understanding the social
discussion forums and blogs and where game reviews, practices and constructivist ecologies being created
around open source and massively multiplayer games
From E-Learning to Games-Based E-Learning
will provide a glimpse into new kinds of innovation greater academic, social, and computer literacy
ecologies and some of the ways that meaning is created skills (Natale, 2002).
for these kidsages 10 to 40. Perhaps our genera- Within an organizational setting, it can be an ideal
tion focused on information, but these kids focus on learning environment for the training of social,
meaninghow does information take on meaning? management, and leadership skills in which par-
(Brown, 2004) ticipating staff can use their own organization as
a reference system for understanding the culture,
advantages and disadvantages of structure, and processes.
games-based e-learning Use of metacognition and mental models; im-
proved strategic thinking and insight; better
In the above discussion, we have covered a number of psychomotor skills, and development of analytical
advantages of the use of games-based e-learning, such and spatial skills, iconic skills, and visual selective
as increased motivation and engagement, an enhanced attention (Kirriemuir & McFarlane, 2004).
learning experience, and improved student achievement
and student retention. The computer games approach However, there are a number of disadvantages
can be useful in situations or events that would be too associated with games-based e-learning. The most
costly, difficult, or hazardous in real life. For example, frequently cited concerns are around the long-term
in medical education, games-based e-learning provides effects of violence on game players, although there is
risk-free training without real life consequences that no agreed consensus. For example, Provenzo (1991)
might normally result in serious injury or loss of life. As claims that computer games: (a) can lead to violent,
Kriz (2003) points out, simulation games are mistake- aggressive behavior; (b) employ destructive gender
friendly learning environments that allow learning by stereotyping; (c) promote unhealthy rugged individu-
trial and error and provide immediate feedback about the alist attitudes, and stifle creative play. On the other
consequences of decisions to aid the learning process. hand, catharsis theory states that games playing may
The instant feedback and risk-free environment invite be a useful means of coping with, or releasing, pent-up
exploration and experimentation, stimulating curiosity, aggression (Emes, 1997). Squire (2003) suggests recent
discovery learning, and perseverance. It is also useful developments in computer games design are beginning
where access to human expertise or knowledge may be to change the ideas of a link between violent games and
scarce or very expensive, providing a viable substitute social maladjustment: thematically, video games are
that can be available at all times and organized to suit increasing in complexity, incorporating story, character
the user. Games-based e-learning is at its most powerful development, and collaboration in the game design.
when it is personally meaningful, experimental, social, Shaffer et al. (2004) make the point that most edu-
and epistemological all at the same time (Shaffer et al., cational games have been produced in the absence of
2004, p. 3). In addition, other advantages of games-based any coherent theory of learning or underlying body
e-learning are cited in the literature such as: of research, although Prensky (2001) points out that
computer games can incorporate as many as 36 im-
It may encourage learners who lack interest or portant learning principles such as effective decision
confidence (Klawe, 1994) and enhance their making, challenges, and experimentation in learning
self-esteem (Dempsey, Rasmussen, & Lucassen, and thinking. There are concerns of a negative impact
1994). on learning as gamers may concentrate on scoring
In training and educational settings, it can reduce and winning rather than the actual learning objectives
training time and instructor load, for example, and concerns that games may be pitched at the wrong
affording opportunities for drill and practice, level of challenge and interest. There are also concerns
thereby enhancing knowledge, acquisition, and that some games have a high learning curve and take
retention (Ricci, 1994). a significant amount of time to work through, which
Complex games have the potential to support may make them unsuitable for short modular educa-
cognitive processing and the development of tional systems.
strategic skills; they can increase users learn- Generally speaking, there is usually a high start-up
ing and recollection capabilities and encourage cost associated with the planning, design, and develop-
From E-Learning to Games-Based E-Learning
ment of a games-based e-learning environment. This of games-based e-learning, and given the fact that
means that while certain corporate organizations may many faculty members have still not fully embraced E
be able to afford such costs, they may be out of reach e-learning, in the short to medium term games-based
for higher education institutions with limited budgets. e-learning will only occupy a small section of the HE
Further, many games-based e-learning environments e-learning market. This has given rise to the opinion
are still at the early prototype stages because of the long that within a HE context where resources are gener-
development times, and fully functioning games-based ally scarcer than found in the corporate world, a less
environments may take years to create. sophisticated virtual games environment that is easier
to adapt as well as being scaleable while at the same
time being less resource intensive to develop might be
the Future oF gaMes-based a more realistic aim for the academic community to
e-learnIng consider. A secondary route may be the development
of games-based e-learning in partnership with com-
There is a significant revolution underway in approaches mercial games companies.
to pedagogy and student learning across education as a
whole towards more individualized and learner focused
approaches enabled by the innovative use of e-learn- reFerences
ing technologies. Within this context, we believe that
interactive technologies have the potential to enhance Aldrich, C. (2003). Simulations and the future of
the development of knowledge and skills. If e-learning learning: An innovative (and perhaps revolutionary)
has developed a reputation for being boring and mind- approach to e-learning. New York: Pfeiffer.
less, games have developed the reputation for being
Berge, Z.L., & Collins, M. (Eds.). (1995). Computer-
engaging and challenging. Interactive technologies can
mediated communication and the online classroom.
provide this engagement, but our students were also
Cresskill, NJ: Hampton Press.
looking for a variety of computer-based interactions,
rather than a standard look-and-feel to all interactiv- Bradley, C., & Froomkin, M. (2003). Virtual worlds,
ity. It is accepted that games-based e-learning will not real rules. New York Law Review, 49(1).
be for all learners, and it is accepted that there may be
Brown, J.S. (2004). Growing up digital: How the Web
issues surrounding development costs.
changes work, education and the ways people learn
The success of games-based e-learning is not a pre-
change. Retrieved March 4, 2008, from http://www.
cise science, and there have been a dearth of empirical
johnseelybrown.com/speeches.html
studies analyzing their usage. Two recent publications
that provide some empirical evidence of the success of Brown, A.L., & Campione, J.C. (1994). Guided discov-
this approach are de Freitas (2007) and a special issue ery in a community of learners. In K. McGilly (Ed.),
of the Journal of Advanced Technology for Learn- Classroom lessons: Integrating cognitive theory and
ing on games-based e-learning (Connolly, 2007). As classroom practice (pp. 229-270). Cambridge, MA:
empirical evidence is limited, and, in particular, lon- Massachusetts Institute of Technology.
gitudinal studies are extremely scarce, further work is
required on various aspects of games-based e-learning Caillois, R. (1961). Man, play, and games. New York:
to more fully understand their potential and limitations. Free Press.
For example, learning through community has been Carr, S. (2000). As distance education comes of age:
demonstrated to be successful in games communities. The challenge in keeping students. Chronicle of Higher
This is an area that needs further research to identify Education, 46(13), A39-A41.
more fully how learning takes place in these informal
environments and to identify how, or even whether it Castronova, E. (2001, December). Virtual worlds:
is possible, to transfer this process into formal learning A first-hand account of market and society on the
environments. cyberian frontier (CESifo Working Paper Series No.
Given the perceived link between violence and 618). California State University, Center for Economic
social maladjustment and the high development costs Studies and IFO Institute for Economic Research,
Fullerton, CA.
From E-Learning to Games-Based E-Learning
Chapman, C., Ramondt, L., & Smiley, G. (2005, Emes, C.E. (1997). Is Mr Pac Man eating our children?
August). Strong community, deep learning: Explor- A review of the impact of video games on children.
ing the link. Innovations in Education and Teaching Canadian Journal of Psychiatry, 42(4), 409-414.
International, 42(3), 217-230.
Garris, R., Ahlers, R., & Driskell, J.E. (2002). Games,
Connolly, T.M. (2007). Editorial to special issue on motivation, and learning: A research and practice model.
games-based learning. Journal of Advanced Technol- Simulation and Gaming, 33(4), 441-467.
ogy for Learning 4(1).
Greenblat, C. (1981). Teaching with simulation games:
Connolly, T.M., Boyle, E., Stansfield, M.H., & Hainey, A review of claims and evidence. In R.E. Duke & C.
T. (2006, September 5-7). Can computer games help Greenblat (Eds.), Principles of practice of gaming-
next generation learners: A survey of students reasons simulation. London: Sage Publications.
for playing computer games. In Proceedings of the 13th
Jonassen, D.H. (1994). Thinking technology: Toward a
International Conference of the Association of Learn-
constructivist design model. Educational Technology,
ing and Teaching ALT-C 2006: The Next Generation,
34(3), 34-37.
Scotland.
Joy, E.H., & Garcia, F.E. (2000). Measuring learning
Connolly, T.M., Stansfield, M.H., MacArthur, E., &
effectiveness: A new look at no-significant-difference
McLellen, E. (2007). A quasi-experimental study of
findings. Journal of Asynchronous Learning Networks,
three online learning courses in computing. Journal
4(1), 33-39.
of Computers and Education, 49(2), 345-359.
Kirriemuir, J., & McFarlane, A. (2004). Literature
Connolly, T.M., Stansfield, M.H, McLellan, E., Ramsay,
review in games and learning. Bristol: NESTA Fu-
J., & Sutherland J. (2004, November). Applying com-
turelab.
puter games concepts to teaching database analysis and
design. International Conference on Computer Games, Klawe, M.M. (1994). The educational potential of
AI, Design and Education, Reading, UK. electronic games and the E-GEMS project. In Proceed-
ings of the AACE ED-MEDIA 94 World Conference on
Crookall, D., Oxford, R.L., & Saunders, D. (1987).
Educational Multimedia and Hypermedia, Charlot-
Towards a reconceptualization of simulation: From
tesville, VA.
representation to reality. Simulation/Games for Learn-
ing, 17, 147-171. Kriz, W.C. (2003). Creating effective learning envi-
ronments and learning organizations through gam-
Crookall, D., & Saunders, D. (1989). Towards an
ing simulation design. Simulation & Gaming, 34(4),
integration of communication and simulation. In D.
495-511.
Crookall & D. Saunders (Eds.), Communication and
simulation: From two fields to one of them, Multilingual Lave, J., & Wenger, E. (1991). Situated learning:
Matters, Clevedon, UK. Legitimate peripheral participation. Cambridge, UK:
Cambridge University Press.
Cruickshank, D.R. (1980). Classroom games and simu-
lations. Theory into Practice, 19(1), 75-80. Leemkuil, H., de Jong, T., de Hoog, R., & Christoph,
N. (2003). KM QUEST: A collaborative Internet-
de Freitas, S. (2007). Learning in immersive worlds:
based simulation game. Simulation & Gaming, 34(1),
A review of the literature. Joint Information Systems
89-111.
Committee (JISC). Retrieved March 4, 2008, from
http://www.jisc.ac.uk/media/documents/programmes/ LTSN. (2003). A guide for learning technologists:
elearning_innovation/gaming%20report_v3.3.pdf Learning and teaching support network (E-Learning
Series 4). LTSN Generic Centre.
Dempsey, J.V, Rasmussen, K., & Lucassen, B. (1994,
February 16-20). Instructional gaming: Implications Natale, M.J. (2002). The effect of a male-oriented
for instructional technology. Paper presented at the computer gaming culture on careers in the computer
Annual Meeting of the Association for Educational industry. Computers and Society, 32(2), 24-31.
Communications and Technology, Nashville, TN.
From E-Learning to Games-Based E-Learning
Section: Product ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
From E-Learning to T-Learning
(PJB Associates, 2004). However, where there is need that will be produced for interactive television. And if
to target people who would not normally participate in forms of e-learning are planned for the new medium, E
further education, interactivity becomes very important they should be redesigned for the new technology. A
in transforming them from passive viewers to active new technological medium requires new visions and
participants. A new medium will require a new way of utilizations, new ways of learning. The interface used
learning, as the learning setting, users, time, and goals by television is very different from that used by the
will be vastly different from those of e-learning. Internet. Table 1 highlights some major differences.
Due to these differences, it is not desirable to trans-
Interactive television fer the same formats offered in e-learning to digital
television. In general, however, the attitude towards
Television is a medium central to peoples everyday interactive television as demonstrated in the USA are
lives. It has developed its own grammar and structure, only moderately encouraging for educators, as it seems
and the audience has established specific, well-defined those exclusively using television do not necessarily
interaction patterns unique to this medium. However, find many services (other than games) attractive. Those
a literature review has revealed that the approach fol- who find the other services attractive are computer
lowed by most scientific publications is principally users, and it would then beg the question of why we
PC-centric and usually implicitly focused on the work should invest in another technology (for work or train-
environment (Chorianopoulos, 2003). New interactive ing) when users probably already have access to the
television makes two cultures converge, two cultures Internet (Berry, Kelso, & Lamshed, 2000).
that have thus far traveled on separate tracks: television At the start, there was some skepticism about inter-
and the Internet. On the one hand, we have television, active educational television. There was a feeling that
with its entertainment characteristics, its ability to tell work completed to date had consisted of reusing old
stories, to offer richly visual programs; on the other computer-based learning techniques unimaginatively
hand, we have the Internet with its democratic culture in a new interactive medium (Luckin, Coultas, Under-
allowing diffuse participation by community members wood, du Boulay, Mateer, Mudge, et al., 2003). So far,
with the important role accorded the individual in different methods of program enhancement through
choosing what to access. interactive television have been experimented. Program
Some learning forms of ICT (information com- enhancement can take a number of forms: picture only,
munication technology), in particular those relative picture with prompts for additional information, picture
to edutainment, will greatly influence the programs with overlaid information, information with inserted
picture, and information only (Berry et al., 2000).
Table 1.
From E-Learning to T-Learning
a. Video with prompts for additional information: fered Chaos Media Networks are examples of different
A button is provided on the screen that when forms that digital television might take, namely:
selected by remote control will link to further
program information. This additional material Linear broadcasts, from those scheduled daily to
is broadcast simultaneously in real time with the programs on demand.
video. The additional information may be text, During each program, users can ask questions
images, or even another video. using the remote and receive answers in the form
This information is not retrievable when the of 30-90 second video clips providing a quick
broadcast is over. presentation of the topic on which the questions
b. Video with overlaid information: In this case, were based.
additional information is screened at the same time Nonlinear interactivity, by means of a menu. The
as the video broadcast and laid over the picture. menu offers different segments of programs ac-
However, the text needs to be fairly large, color- cording to user or target audience interests. For
ful, and limited in quantity because the screen is example, in the case of a language program, only
viewed at a distance of 2 meters or more. Con- the in-depth parts at the users level will be shown
sequently, concise information is effective. This on the screen.
function may be useful when a specific point or Episodic programs, mini-series tailored to specta-
issue needs to be highlighted at the same time as tor interests.
the video transmission. In interrupted modality, programs that offer the
c. Information with inserted video: In this case, spectator, with no previous notice, a long or short
text needs to be sufficiently large for clear read- program (for example a quiz).
ing at a distance of 2-3 meters. This function is Collaborative programs, which may have different
effective when there is a large amount of content spectators participating at the same time (e.g., a
to be presented. debate on local problems).
d. Information only: This function is currently
broadcast as teletext on analog television.
MaIn Focus oF the artIcle
Among the programs that have established a stan-
dard as far as interactive television is concerned are TV has perhaps most often been seen as an entertain-
two natural science BBC productions: Walking with ment medium with a complex identity. Its use moves
Beasts and Blue Planet. Users can choose whether along an axis ranging from passivity to escape and
to watch the additional text or extra video documents, entertainment, and finally, in the best of cases, to a
and they can also choose among commentaries focusing type of engagement (Ling & Thrane, 2002). Possible
on various scientific aspects. The additional material forms of learning fall into two main areas:
is made available for a span of time longer than that
of the broadcast itself. Another historical program by Formal learning
the BBC was Pyramids. For every episode, online Informal learning
quizzes and competitions based on solving mysteries
were proposed. For younger audiences, the BBC has The main difference between the two is that informal
produced elementary interactive games, like those learning typically lacks the administrative attributes
associated with the programs Bob the Builder and of formal learning, such as external evaluation, the
Teletubbies. None of these programs was planned as awarding of credits, a prescribed learning framework,
a deliberate form of learning, but rather as a reaction and so on (Smith, 1999).
to the broadcast program (reactive learning). According to Masthoff and Pemberton (2003), the
One of the television networks with a consolidated potential of T-Learning may best be realized by con-
tradition in digital programs is Chaos Media Networks centrating on informal rather than formal provisions.
(http://www.chaosmedianetworks.com/), which offers Eraut (2000) also suggests that we need to explore the
daily a series of interactive programs according to the full range of learning processes or modes falling within
preferences of different target users. The programs of- the domain of nonformal learning. Eraut creates a
From E-Learning to T-Learning
continuum with, at one end, implicit learningthe of learning. The back-channel will allow users to have
acquisition of knowledge independently of conscious immediate feedback to their answers. E
attempts to learn and the absence of explicit knowledge In informal learning, learning objectives are defined
about what was learned. At the other end is deliberative by the user: it is the user who decides what to watch,
learning, where time is specifically set aside for learning. for how long, and up to what point. It is accordingly
Between the two lies reactive learning, when learning necessary for t-learning educational programs aimed
is explicit but takes place nearly spontaneously and in at informal learning to help users in their choices, first
response to recent, current, or imminent situations but presenting all the objectives that users might expect
without any time being set aside for it. to achieve with the content offered, along with their
In the case of t-learning, we can think of forms forms of presentation. It has already been stated that
of reactive learning connected with the viewing of traditional forms of assessment, present in more for-
normal television programs. Before, during, and after mal formats where it is required to certify the level of
the program, through the apparition of in-depth icons, knowledge and ability achieved, cannot be proposed
users are allowed to move to short learning paths that in informal learning. This is due to the fact that the
are absorbing and exciting. Because they are chosen on user is free to skip around and watch the parts that
the spot, these programs must necessarily be complete momentarily interest him the most. Nonetheless, quick
in themselves, condensed, and modular at varying forms of assessment of the competencies acquired might
levels. The user must always have the possibility of be conceived to be administered after short learning
choosing, according to her momentary needs, the level sequences, as well as evaluation methods regarding
and in-depth section and whether or not to utilize them, progress satisfaction levels, either through the number
along with the modality of choice. of users or user satisfaction levels, to be determined
In designing t-learning programs, particular atten- by means of short questionnaires.
tion should be paid to the TV audience. A definition of One of the most meaningful limits of informal learn-
the interactive television audience is a rather complex ing is the short attention span. This is due to the fact
problem. Educational programs on digital television that although there might be the desire to achieve the
need to adapt to viewer interests and viewing habits. objectives established, at the same time program view-
The difficulty in defining viewer learning conditions ing is bound to be interrupted, as there are other things
is due to the fact that watching TV is basically a so- to do at the same time (children, need to socialize with
cial phenomenon involving groups of viewers at the other people in the same room, etc.). Another aspect
same time. More formal ways of learning do not fall connected with the limited time available is that instead
naturally into how we normally use television, like of looking for specialized services on the topic among
watching TV while we are engaged in other activities, those offered, an informal user is likely to choose the
zapping from one channel to another or watching TV first available source. One way to increase attention
with other people. After all, television is considered span is to involve the user in a story or ask her to take
a medium oriented towards entertainment rather than part in a simulation (Driscoll & Carliner, 2005).
one promoting activities. Electronic games are generally seen as pastimes, but
From all this, it follows that the aim of t-learning they might have useful educational applications. As far
should be above all to offer informal learning programs as possible, games should be connected to both formal
rather than formal ones. More formalized learning pro- and informal in-depth paths. A racing car simulation
grams will be offered to users that are more motivated game could have links to:
and more used to e-learning interaction, targeted us-
ers within institutions such as schools or universities. a. A quick test consisting of 10 true/false or multiple
However, the majority of learning programs should choice questions
be based on so-called lazy interactivity. Viewers b. A short animation or educational simulation
will be asked to cast their vote on a current topic, to
take part in a survey, a quiz, on their own or together Both of these examples focus on how a car engine
with other viewers. The habit of watching quiz shows works.
could be the starting point for promoting other forms
From E-Learning to T-Learning
Market research on the first digital television programs In the emerging era of lifelong learning, learning will
have highlighted how supplementary channels are gen- take place in a wide variety of contexts and locations
erally appreciated much more than interactive functions in which informal and nonformal learning will be as
within the programs themselves. Games were the most important as formal learning (Bates, 2003). There is
frequently requested service. The main reason why some evidence to suggest that nearly one-third of adults
consumers do not use interactive services has been say they have not participated in any formal learning
identified in a lack of familiarity with the medium and since leaving compulsory schooling. Lifelong learn-
with educational training. It is expected that viewers ing initiatives should therefore not only encourage
will access interactive services much more frequently increased participation of those already engaged in
as they become more familiar with the technological learning, but encourage wider participation of those
tools available. not actively involved in it.
An important feature of interactive television will be Approximately 99% of households have a TV
to favor forms of lifelong learning. This new television as compared to around 50% of households with an
should not only encourage the participation of those Internet-enabled computer. Research suggests that
already involved in forms of self-study, but also encour- Internet-enabled computers are unlikely to reach more
age broader participation in bettering their education than 60% of households and that digital TV will in-
after the end of formal academic training. Considering creasingly become the dominant means for accessing
that, for a variety of reasons, the utilization of comput- structured information and interactive services. Most
ers does not involve the whole population, television, children spend at least two and a half hours per day
with its almost universal presence in every home, might watching TV. In many homes, the television is on when
be an alternative solution to face the emerging digital they come home from school and is still on when they
divide and offer opportunities for educating population go to bed.
groups not involved in lifelong learning. The success Working class children are far more likely to have
of this solution will depend on finding solutions and their own television (and spend more time watching it),
tools that the targeted population is familiar with and while they are far less likely to have access to a PC. The
can use in their own homes. potential for education via television is clear. Interac-
tive television could bring some form of instruction
into peoples living rooms and childrens bedrooms.
For instruction to be effective, the system (television in
this case) needs to adapt its broadcasts to the interests,
Figure 1.
0
From E-Learning to T-Learning
capabilities, and knowledge of the individual student. Berry, M., Kelso, R., & Lamshed, R. (2000). Digital
In the case of television, this is even more important TV and data-casting: Opportunities for education and E
than in a classroom, as television competes with other training. Retrieved March 3, 2008, from http://www.
entertainment forms (Masthoff, 2002). This means binaryblue.com.au/docs/final.pdf
looking towards solutions and devices that people are
Chorianopoulos, K. (2003). Understanding interactive
familiar with and feel comfortable using, either in their
television. Retrieved March 3, 2008, from http://itv.
own homes or on the move. Opportunities for informal
eltrun.aueb.gr/about/
learning will also increasingly be a means to encour-
age and draw people into active, engaged learning that Digital TV in Europe. (2004, November). Emarketer.
might lead to learning of a more formal type.
Television is a familiar and reliable consumer device Draves, W.A. (2000). Teaching online. River Falls,
with around 95-99% penetration in European house- WI: LEARN Books.
holds. It is also perceived as a learning tool. However, Driscoll, M., & Carliner, S. (2005). Advanced Web-
in its more traditional role, it has tended to be used in a based training strategies. San Francisco: Pfeiffer.
passive viewing mode. The problem is how televisions
educational potentialities can be exploited to the full- Ekman, I., & Lankoski, P. (2004). Integrating a game
est. Based on the nature and habits of television audi- with a story: Lessons from interactive television con-
ences, t-learning should be most of all designed so as cept design. Retrieved March 3, 2008, from http://uitv.
to engage viewers in forms of reactive learning, that info/papers/ekman04/
is, forms of explicit learning that take place spontane- Eraut, M. (2000). Non-formal learning, implicit learn-
ously in answer to recent or current situations without ing and tacit knowledge in professional work. In F.
any time being specifically set aside for it. Coffield (Eds.), The necessity of informal learning.
Along with reactive learning, a major share of users Bristol: The Policy Press.
preferences will be for games. What is essential is to
shift from a PC-centric vision of learning to one based Ling, R., & Thrane, K. (2002). The leisure use of TV
on the limits and potentialities of the new medium. and the Internet. Peer-Reviewed Journal of the Internet.
Television is present in the majority of homes in most Retrieved March 3, 2008, from http://www.firstmonday.
countries and, as e-learning is backed by years of re- dk/issues/issue7_1/ling/index.html
search and improvements, the main factor in the success Livingstone, S., & Bovill, M. (2002). Young people,
of t-learning is to continue e-learning research activi- new media. Retrieved March 3, 2008, from http://www.
ties, to determine how the Internet and this new media lse.ac.uk/collections/media@lse/pdf/young_peo-
form may converge. Further research is also needed to ple_report.pdf
explore this medium through large-scale trials in order
to better understand the sociological, socioeconomic, Luckin, R., Coultas, J., Underwood, J., du Boulay, B.,
cultural, and motivational factors enabling individu- Mateer, J., Mudge, R., Sharples, M., & Tongue, R.
als to move from participating in informal learning to (2003, April). Report from the Interactive Educational
more active and engaged formalized learning in their Content Forum CSRP 561. Retrieved March 3, 2008,
own homes (Bates, 2003). from http://www.cogs.susx.ac.uk/users/bend/papers/
csrp561.pdf
Ling, R., & Thrane, K. (2002, January). I dont watch
reFerences TV to like learn anything: The leisure use of TV and
the Internet. First Monday, 7(1). Retrieved March
Atwere, D., & Bates, P. (2003). Interactive TV: A 3, 2008, from http://www.firstmonday.org/issues/is-
learning platform with potential. Retrieved March 3, sue7_1/ling/
2008, from http://www.lsda.org.uk/files/pdf/1443.pdf
Masthoff, J. (2002). Modeling a group of television
Bates, P.J. (2003). Learning through iDTV: Results viewers. Retrieved March 3, 2008, from http://www.
of t-learning study. Retrieved March 3, 2008, from csd.abdn.ac.uk/~jmasthof/FutureTV02paper.pdf
http://www.brighton.ac.uk/interactive/euroitv/eu-
roitv03/Practitioner/prac5.pdf
From E-Learning to T-Learning
Masthoff, J., & Pemberton, L. (2003). Adaptive learn- Implicit Learning: The acquisition of knowledge
ing via interactive television. Retrieved March 3, 2008, independently of conscious attempts to learn and the ab-
from http://www.csd.abdn.ac.uk/~jmasthof/JudithPub- sence of explicit knowledge about what was learned.
lications.html
Informal Learning: Learning resulting from
Pemberton, L. (2002). The potential of interactive tele- daily activities, often related to experiential learning
vision for delivering individualised language learning. and often considered accidental learning; it may be
Retrieved March 3, 2008, from http://www.it.bton. intentional but is generally mostly non-intentional from
ac.uk/staff/lp22/Pemberton.pdf the learners point of view.
PJB Associates. (2004). Development of satellite and Interactive Television: Interactive television
terrestrial digital broadcasting systems and services describes technology allowing viewers to interact
and implications for education and training. Retrieved with television content while viewing. To be truly in-
March 3, 2008, from http://www.pjb.co.uk/Pres.htm teractive, the viewer must be able to alter the viewing
Quesenbery, W., & Reichart, T. (1996). Designing for experience or return information to the broadcaster.
interactive television. Retrieved March 3, 2008, from This back channel can be by telephone, mobile SMS
http://www.wqusability.com/articles/itv-design.html (text messages), or cable.
Santos, D.T., Vale, D.T., & Meloni, L.G.P. (2006). Lazy Interactivity: The ability of users to flick
Digital TV and distance learning: Potentials and limita- directly from a TV program to datacasting services as
tions. Retrieved March 3, 2008, from http://fie.engrng. opposed to going from one system into another or using
pitt.edu/fie2006/papers/1586.pdf a relatively complex medium such as the Internet.
Smith, M.K. (1999). Informal learning. Retrieved Lifelong Learning: In a European Commission
March 3, 2008, from http://www.infed.org/biblio/inf- memorandum, the definition is all purposeful learning
lrn.htm activity undertaken on an ongoing basis with the aim
of improving knowledge, skills, and competences. A
broader definition would also include lifelong learn-
Key terMs ing as a means of reintegrating the alienated back into
society and promoting active citizenship. It should also
Back-Channel: A means of communication be- embrace the possibilities of using lifelong learning to
tween users and content providers. A simple type of promote peoples personal development and value as
back-channel is an Internet connection using a modem. human beings. A broader definition would then stress
Viewers and listeners can use a back-channel to provide lifelong learning as learning over the entire lifespan,
feedback, request additional information, and purchase including all learning activity, whether formal or in-
goods and services. formal with the aim of improving knowledge, skills,
and promoting personal fulfillment.
Edutainment: Edutainment is a form of enter-
tainment designed to educate as well as to amuse. Nonformal Learning: Learning embedded in
Edutainment typically seeks to instruct its audience planned activities not explicitly designed as learning but
by embedding lessons in some familiar form of en- containing an important learning element, intentional
tertainment: television programs, computer and video from the learners point of view.
games, multimedia software, and so forth. Most often,
edutainment seeks either to tutor in one or more specific Reactive Learning: A form of learning that is
subjects or to change behavior by engendering specific explicit but takes place almost spontaneously and in
sociocultural attitudes. response to recent, current, or imminent situations but
without any time being specifically set aside for it.
Formal Learning: Learning taking place within
T-Learning: T-Learning refers to the offering of
an organized, structured context like formal education
e-learning services using digital TV technologies. T-
or company training, which is intentional from the
learning, a shorthand meaning for TV-based interactive
learners perspective and may lead to formal recogni-
learning, is about having interactive access to video-
tion (diploma, certificate).
From E-Learning to T-Learning
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Is Electronic Knowledge a Plural Thought?
function, considered as an endogenous function of to be warmed up and eaten by consumers), and those
nonimmediate social utility or use. We are talking about who greet it as bearer of a benefic rain of widespread E
a threefold tool: hermeneutics (the ability to understand culture (because of the easy access to it).
and interpret knowledge), investigation (the ability The truth is that the technological cloud is already
to discover and generate knowledge) and heuristics present in our life and everybody can feel it. The only
(the ability to invent and create new knowledge). A thing we can do is to regulate, qualify, and evenly
widespread higher educationmono and meta-cog- share out this abundant rain, but we definitely have
nitiveis needed, if we want our future generations to deal with it.
to be able to navigate in the modern sea, full of mass
and personal media, and to reach the shores of human
resource called singularity of the subject-person: reFerences
noncliccable, not easily influenced and nonuseful.
In our opinion, the macroset of knowledge is fun- Frabboni, F. (2005). Societ della conoscenza e scuola.
damental and we need to defend it as much as we can. Trento: Erickson.
It is the logical and formal command of endogenous
nature, able to keep watch of communication, which is Frabboni,F.(2006). Educareincitt.Roma:Editori Riuniti
more and more hostage of a symbolic language (online Frabboni, F. (2003). Emergenza educazione. Torino:
and iconic). A prefabricated symbolic-world: frozen, Utet Libreria.
metallic, without any soul. Frabboni, F. & Pinto Minerva, F. (2001). Manuale di
Men and women risk to lose their direct contact pedagogia generale. Bari: Laterza.
with reality. Image and the informatics code (mail
or chat) could exclude both oral and body lan-
guage, and this could lead to the repression of those
languages in everyday life: yet the formative potential KeyWords
of languages lies exactly in the plurality of their codes
and functions. Knowledge: An immaterial good needed by any
Many languages are therefore at risk in their func- complex and changing society. Its a capital with three
tions of social communication (talking with others), faces: economic, social, and human.
cognitive communication (thinking and representing Metacognitive Function: It is an endogenous
the world in symbols), and expressive communication ability. It is a threefold tool: hermeneutic (to understand
(expressing feelings and personal emotions). and interpret knowledge), investigative (to discover and
The multiple intelligences suggested by Gardner generate knowledge), and heuristic (to create new
are therefore fundamental for the people living in a knowledge).
semiological century. Men and women need to be able
to grasp and connect together by using all the scattered Monocognitive Function: It is the ability of stor-
links in this gigantic cognitive chain. But this will ing (assimilating), and selecting (by eliminating and/or
not happen if European politics makers will decide memorizing) the floating knowledge found in the
to abandon their citizensdazed and helplessin Internet which is basically exogenous.
a world full of ambivalent signs, often difficult to
understand and sometimes impossible to be used for
communicating.
A self-service market of cultural goods seems to us
a boundless mass-media and an electronic sea, with a
huge long-wave able to wrap the consumer upthe
children as well as the old peoplein a nonstop cloud
(24 hours a day), full of iconic and computerized alpha-
bets. This cloud is currently in the middle of a fierce
battle between those who avoid technology because of
its cognitive toxicity (a vehicle of frozen knowledge
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Electronic Loyalty Programs Comparative Survey
become more experienced with online shopping. Using com, and eLoyalty.com. With over 10 million partner-
a survey data, Devaraj, Fan & Kohli (2003) find that ships around the world, LinkShare.com manages the E
customer loyalty toward online stores is significantly largest affiliate marketing network on the Internet. It
higher than their loyalty toward conventional brick- also provides merchant firms with services to create
and-mortar stores. They argue that the state-of-the-art and manage their own affiliate marketing programs.
Web technologies implemented by e-commerce firms Both Performics.com and CommissionJunction.com
are among the major factors reinforcing e-loyalty more offer their customer firms performance-based affiliate
than their traditional counterparts. marketing services supported by e-mail marketing
programs. Lastly, eLoyalty.com offers e-commerce
firms consulting services related to affiliate and targeted
a survey oF e-loyalty PrograMs marketing to reinforce e-loyalty.
Electronic Loyalty Programs Comparative Survey
not be as strong as that of company executives, firms the financial intermediary can help firms handle stock
can reinforce customer incentives by requiring that a transactions of customers and maintain their accounts
certain amount of equity be collected by the customers online. Indeed, such partnerships have been a usual
before converting them to cash. practice among the pioneer companies conducting eq-
Another difference between cash-back rewards uity-based e-loyalty programs. For example, UPromise.
and equity-based e-loyalty programs stems from their com has established strategic alliances with the Van-
technical requirements. Since equity-based e-loyalty guard Group (www.vanguard.com) and the Sallie Mae
programs involve stock transactions and firms con- Corporation (www.salliemae.com), while Stockback.
ducting such programs may not have the necessary com has partnered with the Share Builder Securities
expertise in this area, an operational partnership with Corporation (www.sharebuilder.com). Table 1 summa-
a financial intermediary is necessary. By using several rizes main characteristics of the most popular e-loyalty
forms of information technology (IT) such as customer programs currently conducted on the Internet.
databases, data warehouses and information exchange
services similar to electronic data interchange (EDI),
Figure 1. Worldwide B2C e-commerce revenue ( 2007, Yasin Ozcelik. Used with permission.)
0
00
billion $
0
B2C Revenue
00
0
0
000 00 00 00 00 00
Source: Gartner 2005
Electronic Loyalty Programs Comparative Survey
Electronic Loyalty Programs Comparative Survey
companies are Amazon.com, Dell.com, Apple.com, It is described as an evolution from the traditional
Expedia.com, and Etrade.com. marketer-controlled concept towards a consumer-con-
trolled and technology-facilitated concept. Among the
Data Warehouse: A large database that collects an
factors creating e-loyalty are quality customer support,
organizations transactional and customer-related data
on-time delivery, comprehensive product information,
in a single logical repository for analysis and manage-
reasonable shipping and handling prices, and clear and
rial decision making purposes. The data can originate
trustworthy online privacy policies. There are several
from many operational areas of the organization, such
metrics used to measure the level of e-loyalty for a
as Website transaction logs of customers, online shop-
specific e-commerce site such as the frequency of single
ping carts, point-of-sale terminals in stores, warehouse
user visits, and percentage of customers who return
inventory, and field sales reports. Through the use of
to the site to make additional purchases in a specific
data mining tools, complex algorithms and filtering
period of time.
techniques on the data collected in a data warehouse,
organizations can track their customers behavior on- Online Surveillance Technologies: A generic name
line, and identify their needs and common problems. for a technology that can track and monitor online ac-
Data warehouses can provide managers with a more tivities of visitors to a specific website through the use
complete and accurate profile of their customers, which of special software. Surveillance technologies can be
can be used to tailor product and service offerings in used either with or without the consent of visitors, and
line with customer expectations. they range from Internet Protocol (IP) tracking utilities
to the analysis of server logs and network monitor-
Electronic Data Interchange (EDI): A computer-
ing. The question of whether the implementation of
to-computer communications standard for exchang-
surveillance technologies by e-commerce companies
ing digital business documents among firms, such as
to better serve visitors is a security or privacy issue is
invoices, purchase orders, price lists, and shipping
still under discussion.
bills. EDI standards were first developed in late 1970s
and have been evolved since then. The main goal of Shopbot: Short for shopping robot, an intelligent
EDI is to reduce errors, delays, and cost of document software agent that can automatically search a large
exchanges by digitizing and standardizing documents. number of online stores for a specific product. Shopbots
EDI messages are organized with distinct fields for each enable consumers to make a comparison shopping by
of the important pieces of information in a commercial displaying on a single page the prices and features of
transaction such as date, product specifications, amount, a product offered by different vendors. Among the
addresses, and names. EDI has become an important well-known e-commerce companies utilizing shopbots
industrial network technology standard by enabling are www.bizrate.com, www.mysimon.com, and www.
faster communications among a small set of strategic pricegrabber.com. As the cost of searching on the
partners and establishing long-term relationships. The Internet increases, the value of shopbots is expected
technical infrastructure of EDI systems has significantly to increase in the near future.
evolved from mainframes to personal computers and
Switching Cost: The broad term used for the
wireless devices. Moreover, the telecommunications
cost of inconvenience imposed on a customer due to
environment is changing from private dedicated net-
switching from a product, service, brand, or a firm to
works to the Internet.
another. Since switching costs are more psychological
Electronic Loyalty (E-Loyalty): Repeated satis- and less financial, it is difficult to quantify them. There
faction of a customer with purchases of products or is a strong relationship between switching costs and
services from a specific e-commerce Website. The customer loyalty. If the level of the switching cost of a
notion of e-loyalty extends the traditional definition customer for a specific brand is higher than a threshold,
of brand loyalty concept to online consumer behavior. then the customer does not have an incentive to switch
to another brand, and hence remains loyal.
0
Section: Product ICT
Farook Sattar
Nanyang Technological University, Singapore
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Enhancement of Recorded Respiratory Sound
breath signal and two preprocessed wheeze signals Step 1: Heartbeat Removal Using Notch Filter
from (Lehrer, 2002)(Tilkian et al, 2001)(Wilkins et al, The first stage of enhancement scheme involves
2004) are used together with the recorded data to test removing the heartbeat from the respiratory sound
the automatic segmentation method. signal. Heart sounds falls in the low frequency range
of a few Hertz to over 200 Hz, but with predominant
acquisition of respiratory sounds range below 100Hz. It has been suggested in (Sovijarvi
et al, 2000) that a low-order highpass filter would be
The recording environment and equipments are chosen sufficient to remove heartbeat from the respiratory
based on the standard given by (Rossi et al, 2000). Short- sounds. However, it also removes some of the important
term recordings are done in sitting position in audio signals which may fall in the same frequency as the
laboratory which provides a quiet environment. One heartbeat. In order to avoid the loss of useful informa-
electret condenser microphone (ECM-77, Sony, Inc., tion, notch filter is applied here to solve the problem.
Tokyo, Japan) is inserted into a hemispherical rubber The frequency response of a notch filter provides deep
chamber 2cm in diameter, and placed at suprasternal notches, which are useful to eliminate/attenuate some
notch of the test subjects to record the tracheal breath specific undesired frequency components of a signal
sounds. Recording software WAVEPAD (V3.05, NCH (Haykin et al, 1988). The notches are made as deep
Swift Sound Software) is used and the signal clips as possible, so that ideally the undesired frequencies
are recorded and saved as monochannel *.wav file are totally eliminated. It is implemented using a sec-
at sampling frequency of 44.1 kHz. Test subjects are ond order (N=2) Butterworth filter. The stop band is
asked to breathe normally, and 20-second recording is
saved each time. defined in this case to be f stop = [ f1 f 2 ] / Fs where
f1 = 10Hz and f 2 = 300Hz with sampling frequency
the Proposed enhancement Method F = 44.1kHz.
s
The proposed enhancement scheme is to remove back- Step 2: Spike Removal Using Nonlinear Energy
ground noise (BN) while keeping the useful information Operator
unaffected. This has been realized by staging through Spike refers to both a localized high frequency and an
three steps: The first step is to remove the heartbeat increase in instantaneous energy in the signal process-
using notch filtering. The signal would then be passed ing point of view. The quantitative descriptions of the
through the nonlinear onergy operator to detect and amplitude and spectrum of spikes vary from signal to
remove spikes. The last step would be to remove very signal, subject to subject; it even varies from time to
high frequency/small detail components in the signal, time for the same subject. For this reason, detection
so as to preserve the underlying signal structures which and pathological implications of spikes become dif-
might be corrupted by noise. A block diagram of the ficult. As the width of the spikes increases, energy is
proposed enhancement technique is depicted in Figure concentrated more in the low-frequency band where
1. The scheme is realized in the following steps: the energy of the background signal is also located.
Step 1: Step 2 :
Recorded Step 3 :
Heartbeat Spike Removal Enhanced
Breath Wavelet
Removal using using Non-linear Sound Signals
Sounds De-noising
Notch Filter Energy Operator
Decomposition
using Detail Coefficients
Reconstruction
Discrete Wavelet Thresholding
Transform
Enhancement of Recorded Respiratory Sound
Also, detection becomes more difficult in the frequency Step 3: Wavelet Denoising
domain. And therefore an energy-based spike detector One of the major difficulties faced in the analysis of E
known as the nonlinear energy operator, also known tracheal sounds is the presence of environmental noise
as the Teager operator, has been suggested to improve in the signal. Noise from instruments such as ventila-
the spike detection (Kim et al, 2000). It estimates the tor, air-conditioner, or ambient noise may contaminate
square of the instantaneous product of amplitude and the signal (Kandaswamy et al, 2004) and severely
frequency of a sufficiently sampled signal. In this degrades the sound recognition system which we wish
respect, the NEO is considered to be superior to other to develop. For noise removal, we have considered to
energy estimators that simply average the signal energy use wavelet techniques since they are more suitable for
and are independent of frequency. transient analysis. (Here, we assume that noise is not a
In the proposed scheme, input signal is resampled continuous or periodic signal, but a transient signal.)
at a lower frequency of 16 kHz to reduce the compu- Wavelet denoising of the respiratory sound is performed
tational load. The nonlinear energy operator is defined to remove high frequency/small detail components. It
in (1) as preserves the underlying signal structures which may
be obscured by noise while performing the denoising.
[ x ( n )] = x 2 ( n ) x ( n + 1) x ( n 1) (1) Another feature of wavelet denoising is to improve the
perceptual quality of sound in order to reduce listeners
where x(n) is the input audio signal with heart sound fatigue (Soon et al, 1997).
removed. It is then convolved, as indicated in (2), with The underlying basic model for the noisy signal is
a 6-point Barlett window, w(n). It is chosen to keep the described in (4).
complexity of the algorithm as low as possible and at
the same achieve sufficient reduction of interference s(n ) = f (n ) + e( n ) (4)
without losing resolution.
where f(n) is the clean signal, s is the noise level, and
s [ x ( n )] = [ x ( n )] w( n ) (2) e(n) is a Gaussian white noise N (0,1). Noise removal
using wavelet transformation is based on thresholding
Once filtering in (2) is done, the peaks can be identi- techniques and derived mainly from the early work of
fied by the output of the filter compared to a threshold. Donoho and Johnstone (Donoho, 1995), in which both
In this enhancement scheme, the threshold is taken as signal and noise coefficients are distinguished using a
a scaled version of the mean of the filter output. This selected threshold.
modification makes the detection algorithm robust. The basic idea of wavelet denoising is to compare
The threshold, T is chosen as given by the wavelet coefficients to a given threshold and is
set to zero if its magnitude is less than the threshold;
1 N
otherwise it is kept and modified (depending on the
T =C
N
n =1
s [ x ( n )] (3) threshold rule)(Chang et al, 2000). The denoised sig-
nal is finally obtained by the inverse discrete wavelet
transform (IDWT). This wavelet thresholding procedure
where N is the number of samples and C is the scaling removes noise by thresholding only the detail wavelet
factor. It is selected experimentally as C = 35 to achieve coefficients, while keeping the low resolution coef-
the best result in spike detection within respiratory ficients unaltered.
sound. The values at the spike locations are assigned DWT coefficients are thresholded here by heuristic
to be 1 for the detected spikes. This is done iteratively SURE thresholding (Donoho et al, 1995) strategy which
for several loops (e.g., 3 loops) to ensure that adjacent depends on the energy of the particular subband. Soft
spikes which may miss when the algorithm is run for thresholding is chosen as in practice especially when
the first time will be detected in the subsequent trials. noise energy is significant, it provides no abrupt artifacts
After spike detection, an averaging method is applied in the denoised signal as it is not discontinuous as hard
for the spike removal. A global mean of the input signal thresholding. A suitable wavelet type, for example, sym8
x(n) is used to replace the spike instead of imposing wavelet, is selected by considering its noise removal
a silence (i.e., a zero-value), which can be considered ability for our recorded sound clips. Last, a denoised
as artifact for respiratory sound signals.
Enhancement of Recorded Respiratory Sound
signal is reconstructed by IDWT using the thresholded difference sequence d(n) is then passed through a 1-bit
detail coefficients. quantizer/comparator:
In the next stage of preprocessing method, the enhanced where y(n) is the output of the 1-bit quantizer and Th
signal will be segmented into its inspiratory and expira- is the threshold.
tory phases. The steps for segmentation are illustrated in The maximum (max) and minimum (min) values of
Figure 2. Our proposed segmentation method is based d(n) is used to set a threshold. In this article, we found
on initial idea of change point detection. Two adjacent that the suitable threshold value to be (max + min)/3.
windows of equal length of M are passed through the Using the mean difference d(n) calculated earlier, any
data sequence. The width of the windows should not value that lies above the threshold is considered as in-
be allowed to exceed the length of the smallest seg- spiration phase (set to be +1) and values that fall below
ment. Window of length M=64 samples is used in our the threshold are considered as expiration phase (set to
case. At each time sample, the values of the mean dif- be -1). In order to estimate the phase duration of each
ference is calculated by comparing the absolute mean cycle, the output y(n) is passed through an integrator,
of the second window to that of the first window; it is which is a low-pass filter designed in the frequency
known as mean difference measurement. This mean domain. Then the distances of the zero-crossing points
between the zero-axis and the lowpass filtered output
estimate the durations of the inspiration and expiration
phases of each cycle.
Figure 2. (1) Block diagram of the automatic segmentation method; (2) segmentation of wheeze sample clip;
(a) mean difference measure; (b) localization of intersection point; (c) segmentation results
Enhanced Sound
Signals
(a)
Mean Difference
Calculation
(b)
Localization of
points of
intersection
(c)
Segmentation
(1) (2)
Enhancement of Recorded Respiratory Sound
Figure 3. Processed signals after (a) highpass filtering; (b) notch filtering superimposed on the original
sample
Enhancement of Recorded Respiratory Sound
Figure 4. Processed signals after notch filtering; (b) smoothed nonlinear energy operator (SNEO); (c) spike
detected using SNEO
(a)
(b)
(c)
Sample
by the signal mean as shown Figure 5. It is clearly seen subjective test results
that the majority of the spikes are removed/reduced
by the averaging methods. If the input signal has too Subjective testing is done on the preprocessed signals.
many outliers, the output signal sounds distorted in A group of 20 subjects took part in this testing. They
subjective hearing test, while for the LPC method, consisted of 11 males and 9 females ranging from 19
the spikes are removed using the LPC algorithm which years old to 27 years old. The test is conducted at the
estimates a value for the spike as depicted in Figure 6. Media Resource Laboratory to ensure consistency in
The removal of spikes is just as good as the averaging testing as the amount of surrounding noise may af-
method; however, the quality of the signal is decreased fect the judgment of the evaluators. The test samples
due to the resampling of the signal at 8000Hz. The consist of five different recordings chosen randomly
averaging method is chosen due to its much faster for 20 different subjects. Each recording consists of
computational speed. Furthermore, it does not alter three inhalation and exhalation cycles and the subject
the quality of the signal by resampling the signal to a is asked to judge the overall degree of improvement
much lower sampling rate. for each of the five processed samples over the original
ones. The rate of improvement is evaluated by a -9 to
Noise Removal Using Wavelet Denoising 9 scale whereby -9 represents a much worse sample
and 9 represents a much better sample after process-
The signal undergoes the denoising algorithm as the ing. Table 1 shows the average results obtained from
last preprocessing stage. Figure 7 shows the expanded the 20 evaluators.
version of the first 2 seconds of the signal after pro- It is observed that there is only a small variation in
cessed by the algorithm. It could be seen that the output the rating, 0.77, between the best and worst samples.
signal is smoother as the high frequency components This shows that the algorithms work well for various
are removed. Also, by doing subjective hearing test, samples. The results obtained are encouraging. From
the background noise is clearly attenuated but not the 20 subjects who took the test, only 2 felt that the
totally removed.
Enhancement of Recorded Respiratory Sound
Figure 5. Processed signals (a) after notch filtering; (b) after spike removal using averaging method
E
(a)
(b)
Sample
Figure 6. Processed signals (a) after notch filtering; (b) after spike removal using LPC method
(a)
(b)
Sample
Enhancement of Recorded Respiratory Sound
Figure 7. Time expanded signal: (a) before (b) after wavelet denoising
(a)
(b)
Table 1. Subjective test rating obtained from a sample (such as speech), fine details of the biomedical signals
pool of 20 people are required to be preserved for analysis. And usually,
this desired information is covered by more prominent
Subjects Mean Opinion Score signals which are produced by other body parts. There-
9 Females 4.2 fore, the input respiratory signals are required to have
good quality in the sense that high SNR is necessary.
11 Males 6.2
Thus, a good recording environment and equipment
Total 5.08
are crucial to the preprocessing process by means of
providing high SNR input signals.
Enhancement of Recorded Respiratory Sound
This proposed respiratory sound enhancement Neural classification of lung sounds using wavelet
scheme can be used as a part of sophisticated health coefficients. Computers in Biology and Medicine, E
care information system in the pulmonary rehabilita- 34(6), 523-537.
tion clinics. It could work as an information storage
Kim, K.H., & Kim, S.J. (2000). Neural spike sorting
and retrieval system in medical care. It would provide
under nearly 0-dB signal-to-noise ratio using nonlinear
medical information based on the recorded observed
energy operator and artificial neural-network classi-
data and helps the respiratory experts (doctors, thera-
fier. IEEE Transactions on Biomedical Engineering,
pists) in decision making for the patients with breathing
47(10), 1406-1411.
disorders and chronic lung problems, such as asthma,
bronchitis, and emphysema based on reliable prepro- Lehrer, S. (2002). Understanding lung sounds (Audio
cessed respiratory data. The system can also help in CD). Philadelphia, PA: Saunders.
pulmonary education and home monitoring of chronic
pulmonary disease such as asthma. Rossi, M., Sovijarvi, A.R.A., Pirila, P., Vannuccini, L.,
Dalmasso, F., & Vanderschoot, J. (2000). Environmental
and subject conditions and breathing manoeuvres for
acKnoWledgMent respiratory sound recordings. European Respiratory
Review, 10(77), 611-615.
The authors would like to thank Dr. Daniel Y. T. Goh, Soon, I.Y., Koh, S.N., & Yeo, C.K. (1997, December).
National University Hospital (NUH), for his suggestions Wavelet for speech denoising. In Proceedings of the
for the verification of the recorded tracheal sounds. IEEE 10th TENCON Conference, 2, 479-482.
Sovijarvi, A.R.A., Vanderschoot, J., & Eavis, J.R.
reFerences (2000). Standardization of computerized respiratory
sound analysis. European Respiratory Review, 10(77),
Chang, S.G., Yu, B., & Vetterli, M. (2000). Adaptive 585.
wavelet thresholding for image denoising and compres-
Taplidou, S.A., & Hadjileontiadis, L.J. (2007). Non-
sion. IEEE Transactions on Image Processing, 9(9).
linear analysis of wheezes using wavelet bicoherence.
Corts, S., Jan, R., Fiz, J.A., & Morera, J. (2005, Computers in Biology and Medicine, 37, 563-570.
September). Monitoring of wheeze duration during
Tilkian, A.G., & Conover, M.B. (2001). Understanding
spontaneous respiration in asthmatic patients. In IEEE
heart sounds and murmurs: With an introduction to lung
Proceedings of the Eng. in Med. and Bio., China (pp.
sounds (Audio CD). Philadelphia, PA: Saunders.
6141-6144).
Wilkins, R.L., Hodgkin, J.E., & Lopez, B. (2004).
Donoho, D.L. (1992). Denoising by soft-thresholding
Fundamentals of lung and heart sounds (Audio CD).
(Tech. Rep. No. 709). Stanford University, Department
Mosby.
of Statistics.
Donoho, D.L. (1995, May). Denoising by soft-thresh-
olding. IEEE Transactions on Information Theory, 41, Key terMs
613-627.
Background Noise (BN): Any sound not directly in-
Dononho, D.L., & Johnstone, I.M. (1995, December). duced by breathing is regarded as background noise.
Adapting to unknown smoothness via wavelet shrink-
age. Journal of the American Statistical Association, Denoising: Denoising is any signal processing
90(432), 1200-1224. method which reconstruct a signal from a noisy one.
Its goal is to remove noise and preserve useful infor-
Haykin, S. (1988). Digital communications. John Wiley mation.
& Sons Inc.
Heartbeat Removal: A signal processing technique
Kandaswamy, A., Kumar, C.S., Ramanathan, R.P., to remove the heart sound as acquired during sound
Jayaraman, S., & Malmurugan, N. (2004, September). recording, resulting a continuous pure respiratory
sound stream.
Enhancement of Recorded Respiratory Sound
Respiratory Sound: All sounds related to respi- Spike Removal: A signal processing method used
ration including breath sounds, adventitious sounds, to remove noise of impulsive type. It involves the
cough sounds, snoring sounds, sneezing sounds, and recognition and localization of spikes, which are short
sounds from the respiratory muscles. time broadband in nature.
Segmentation: Segmentation means audio seg- Subjective Test: A subjective test session is a
mentation which is partitioning an audio stream into sequence of trials where different implementations
its homogeneous units. It refers to partition respiratory of the proposed method are compared. Each trial
sound stream into individual inspiratory and expira- provides several audio files. Each one is the result of
tory phases. the processing of a compared method on a reference-
nondegraded file.
00
Section: Process ICT 0
Asli Y. Akbulut
Grand Valley State University, USA
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
ERP Integration into Existing Courses
Author(s) Findings
(year)
Gibbon and Aisbett Recommend that ERP systems be taught through understanding the history of business
(1999) information requirements.
Hawking et al. (1999) Provide a mechanism to integrate ERP teaching in the information systems (IS) curriculum
model across 11 levels of knowledge relating to fundamentals of IS.
Ongkasuwan (1999) Proposes a cost-effective approach for incorporating SAP R/3 into the management
information systems (MIS) curriculum of MBA and BBA programs.
Quinton (1999) Provides recommendations and guidelines concerning the inclusion of SAP R/3 into a
business curriculum in the context of a strategic alliance with an ERP vendor.
Rivetti et al. (1999) Consider the ERP educational strategy as a curriculum integration mechanism to re-adjust
the educational delivery that focuses on standard functional areas towards a more integrated
business process approach.
Watson and Schneider Recommend the concept of a multi-layered approach to ERP concepts and education
(1999)
Becerra-Fernandez et al. (2000) Explores specific methodologies to teaching ERP in the undergraduate curriculum.
Wagner et al. (2000) Discusses how business schools are using ERP software as an integrative teaching tool.
Stewart and Rosemann Propose the use of case study and action research approaches in researching and teaching
(2001) aspects of postgraduate ERP related programs.
Bradford et al. (2003) Highlight the reasons for adopting or not adopting ERP for classroom use based on
a business school survey.
Selen (2001) Proposes the inclusion of basic business skills as part of ERP education.
Joseph and George Suggest the use of learning community to instruct students in ERP systems.
(2002)
Cannon et al. (2004) Suggest an alternative integrative case approach for integrating ERP in the business
curriculum.
Davis and Comeau Provide a good example of how to design, deliver and measure the outcome of a course
(2004) on enterprise integration at the undergraduate level.
Fedorowicz et al. (2004) Describe 12 tips for successfully integrating ERP across the curriculum.
Grenci and Hull (2004) Provide a framework for using traditional systems analysis and design concepts with ERP-
specific concepts.
Johnson et al. (2004) Recommend a customized ERP/SAP model for business curriculum integration.
0
ERP Integration into Existing Courses
a varying number of business classes and disciplines in IntegratIng erP Into the
the undergraduate and graduate curriculum (Becerra- currIculuM E
Fernandez, Murphy, & Simon, 2000; Cannon, Klein,
Koste, & Magal, 2004; Corbitt & Mensching, 2000; In this article, we propose the following three-step
Hawking, Shackleton, & Ramp, 1999; Ongkasuwan, process to integrating ERP into an existing course: es-
1999; Peslak, 2005; Quinton, 1999; Stewart & Rose- sential knowledge, integrative knowledge, and expert
mann, 2001; Wagner, Najdawi, & Otto, 2000). Table knowledge. Typically, these stages should be imple-
1 provides a summary of the ERP literature pertaining mented in progression. However, we recommend that
to the business curriculum. educators select the stage with which they are most
Even though integrating ERP into curriculum pro- comfortable with in terms of knowledge, time, and
vides extensive benefits to students, there are certain available resources. In the essential knowledge stage,
barriers that influence the success of these initiatives. we believe that all students need to be exposed to:
According to several researchers (Fedorowicz, Ge-
linas, Usoff, & Hachey, 2005; Johnson et al., 2004; An overview of business processes and ERP
Michaelsen, 1999; Still & Petty, 2000), the challenges systems. A detailed PowerPoint presentation that
that business schools are facing in integrating ERP discusses ERP systems, business processes, and
into the curriculum include: (1) very time consuming, ERP software such as SAP is essential. We would
(2) resource drain, (3) alteration of course content, (4) also encourage the faculty to discuss employment
pedagogical challenges, (5) faculty resistance, (6) fac- opportunities in this field and provide Web sites
ulty reward structure (teaching load issue), (7) faculty that students can refer to for more information.
members lack of understanding of other disciplines, This practice usually seems to be an eye-opener
(8) difficulty in accommodating part-time students and and a great motivator for students. Typically,
transfer students, and (9) student resistance to limita- short essay questions or multiple choice questions
tions in schedule flexibility, among others. on an exam can be used to assess the students
Based on our experience with ERP, we recommend knowledge.
the following: First, identifying and motivating the fac- A practical hands-on demonstration of ERP
ulty who would be instrumental in leading this initiative; software. The purpose of this demonstration is
second, forming an official faculty team/committee and to educate the students on the basic business
giving them the responsibility to incorporating ERP in processes and the integrative capabilities of the
the curriculum, including the sequencing of courses; ERP software. By assigning an exercise or several
third, acquiring adequate funding to support all of exercises in which the students can see how a
the resources needed to implement a system of this transaction/process affects other functional areas
magnitude, including funding for equipment, faculty is extremely beneficial. When planning exercises,
training, new teaching facilities, and so forth; fourth, make sure that each exercise addresses a specific
setting up a technical infrastructure and a correspond- issue and limit the number of exercises to about
ing support team to install, monitor, and administrate five. For example, in our operations management
the ERP systems; fifth, identifying and getting support core course, we usually focus on the product
from local companies that have implemented ERP; and manufacturing and planning module. Typically,
sixth, we spent our time on developing fictitious and/or this type of knowledge can be imparted in 3 to 6
real cases and other related material to customize our hours of class time. To test and ensure learning,
ERP efforts. All the above steps need to be addressed students are required to do at least one graded
in the first year of implementation. Once our ERP was exercise on their own and several graded team
successfully launched, we focused our efforts on: (1) exercises.
marketing our programs, (2) expanding our course Ideal course/courses for this type of overview
and content offerings, (3) working closely with local would be an Introduction to Business and/or
companies and other partners, and (4) expanding our Introduction to Operations Management and/or
faculty pool. Introduction to MIS. At our school, the essential
knowledge of ERP is imparted in the introductory
operations management and information system
0
ERP Integration into Existing Courses
courses. Most of our students get excited when courses that cover the extended model of the fictitious
we cover the ERP component. Several of our case include a human resources management and a
students then take other courses that focus more strategic management course. Overall, we receive very
on ERP. positive comments regarding the ERP coverage.
The third stage of ERP integration is referred to as
In addition to the above, if faculty want to incorpo- expert knowledge. At this stage, one goes beyond the
rate more ERP coverage, we recommend the integra- knowledge of the faculty and allows students to have
tive knowledge phase. In this phase, not only are the a direct access to consultants and practitioners who
students required to do more integrative and detailed are knowledgeable and working on a day-to-day basis
exercises, but are also required to do at least one case with ERP. Not too many schools, including ours, have
analysis. Several of our faculty members teach SAP reached this level. A classic example of this stage would
configuration and integration using a fictitious skate- be the new graduate Harnessing Enterprise Technology
board case company which was developed in-house. and Innovation course introduced at the University of
Through this case dealing with very few products, North Carolina at Chapel Hill. In this course, students:
students are guided through the configuration and (1) explore a live case example of strategic planning
creation of organizational structures, master data, and for an ERP system with Rick McWhorter, Boston
transaction rules for the company. By the end of the Scientifics vice president of operations, (2) participate
case analysis, students gain a high level understanding in an ERP audit with IBM, (3) learn firsthand about
of functionality and integration of the following core the role of data, business intelligence, and integrated
SAP modules: financial accounting, internal control- analytics from Jared Schrieber, senior supply-chain
ling, procurement and inventory management, product and global industry consultant with NCR Teradata, and
manufacturing and planning, and sales and distribution. (4) participate in a custom-designed simulation that
Students also see the reality of how different types of demonstrates the impact of business process changes
flows (materials, data, information, and financials) take due to the ERP implementation. This simulation was
place within an integrated system. In other words, they developed by Steve Desirey, business planning manager
not only see how transactions/processes go through the for SAP implementation at DuPont (Roth, 2005). To do
various stages but also how they impact the various this right, we recommend a full course be devoted to the
disciplines/areas. real world project and audit. Otherwise, we recommend
In addition to this fictitious case, some of our this methodology be adopted in the upper-level courses
faculty members require students to discuss and ana- and/or capstone information systems and operations
lyze a real-world ERP implementation case of a local management course. Students should be assessed on
company. This case was also written by our faculty the quality of their projects, simulation results, and the
for teaching purposes. This case highlights the critical interaction they have with the business executives.
factors that facilitated and/or inhibited the success of
the ERP implementation at the case study company.
When teaching this case, the chief executive officer or conclusIon and Future
chief information officer of the case study company is dIrectIons
usually invited to the class to be a part of the discussion.
Typically, faculty members who teach these two cases We strongly believe that in todays competitive global
spend 9 to 15 hours on ERP topics. As far as student environment, every business student should graduate
learning and assessment is concerned, about 30-40% with an understanding of basic business processes in
of the course grade is assigned to the fictitious and/or an integrated environment. By integrating ERP systems
real-world case analysis. At our school, we have several into business curriculum, this objective can be achieved.
courses in our operations management (e.g., quality Several universities (The University of Idaho, Babson
management, strategic operations management, and College, University of Idaho, University of California
manufacturing planning and control) and information at Chico, Grand Valley State University, among others)
emphasis (e.g., introduction to enterprise information have made systematic changes across their entire busi-
systems, business process reengineering, and project ness core with an intention to achieve a higher level of
management) that cover the above material. Other integration. Other integration efforts have focused on a
0
ERP Integration into Existing Courses
Figure 1.
E
0
ERP Integration into Existing Courses
0
ERP Integration into Existing Courses
Wagner, W., Najdawi, M., & Otto, J. (2000). An em- Enterprise Resources Planning (ERP): A software
pirical investigation into the impact of ERP training on application that integrates (or attempts to integrate) E
cross-functional education. Proceedings of the Academy all data and processes of an organization into a single
of Business Education, 1. unified system. A key ingredient of most ERP systems
is the use of a single, centralized database to store data
Watson, E., & Schneider, H. (1999, February). Using
for the various system modules.
ERP systems in education. Communications of the
Association for Information Systems, 1. SAP: The largest business application and ERP
solution software provider in the world in terms of
revenue.
Key terMs SAP R/3: The worlds most-used standard business
software for client/server computing. It is based on vari-
Business Process: A collection of related activities ous hardware and software architectures, running on
that produce something of value to the organization, most types of UNIX, on Windows NT and OS/400.
its stakeholders, or its customers. Software that repro-
duces these business processes, therefore, can be both Virtual Classroom: An electronic classroom where
internal (ERP system) as well as external (e-commerce instruction involves the synchronous or asynchronous
software). use of electronic learning tools such as video-confer-
encing, online classrooms, whiteboards, chat rooms,
Core Curriculum: A set of courses that are deemed document cameras, and so forth.
necessary and usually made mandatory for all students
of a school or school system.
0
0 Section: Context ICT
E-Tutor
Maria Ranieri
University of Florence, Italy
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
E-Tutor
model (learning-team-centered approach). Compared to First of all, we agree with Daniel et al. (2004) who
instructor or facilitator, the e-tutor moderator/animator stress that there are confused ideas regarding the defini- E
plays a proactive role even if in the context of more tion of the e-tutor roles. This confusion partly depends
advanced courses where students have more control on on the different expressions used to define the same
learning process, his/her role is no longer central, being role/function. For example, the expression e-tutor or
inclined to operate back stage and leaving greater e-teacher is often used to indicate a figure that plays
space for interaction between the students (Palloff & the same roles of a facilitator. In other cases, the same
Pratt, 1999, 2003). It is evident that an e-tutor modera- expression is used to indicate figures that carry out dif-
tor/animator carries out functions of mediation in the ferent roles or functions especially in situations where
management of relational and communication proc- the expression online tutor is used to indicate both
esses. As Berge (1995) specifies, the e-tutor moderator an instructor and a facilitator.
is a central subject in the teaching/learning process and Secondly, we agree with the idea that the role and
possesses characteristics similar to those of the anima- functions of e-tutor depend on the pedagogical model
tor of virtual communities. The same value as Berges which characterises the course where his/her action
is given by Salmon (2000), with the term moderator is performed. If we generalized, and did not consider
used to mean a tutortypically distinguished from the pedagogical model, we would risk making a mis-
expert/guide of contentswho stimulates and guides take.
the interaction between a group of students engaged In this chapter, we focus on the functions and
in sharing knowledge and comparing points of views competencies of an e-tutor who operates in a learner
in the virtual learning environment. In both cases, the and/or team-centered pedagogical model, and therefore
scenario is one in which participants in the learning on functions and competencies of an e-tutor facilita-
community should develop curiosity, accept feedbacks tor/moderator.
on their own performance, diagnose their learning needs, How can we represent these functions? One of the
formulate objectives adequate to their capabilities and most renowned analysis goes back to Berge (1995),
aspirations, identify human and experiential resources, who proposed a model widely taken up again by sub-
and work out a personal or collective project. Such sequent studies (Bocconi & Pozzi, 1999; Rowntree,
situations would not be sustainable without the support 1995; Salmon, 2000; Shepherd, 1999; Trentin, 1999).
of a specific figurethat is, the e-tutorable to guide According to this perspective, the four main areas
learners and to use appropriate strategies in order to crucial for effective e-tutoring are:
manage such complex educational processes.
Just the same, Trentin (2004) defines the e-tutor Technical, assuring the correct functioning of
as a professional figure which is not a simple assist- the technical system and helping the participants
ant/counsellor, but rather a manager of collaborative resolve technical troubles
learning processes, based on the intensive use of the Pedagogical, supplying intellectual stimulus,
net (p. 32). This figure acts mainly in virtual spaces defining the subjects of discussion or activity,
based on computer-mediated communication, and fa- offering support for the comprehension of con-
vours network learning processes. The e-tutor therefore tents
is a tutor of a network of individuals cooperating Managerial, intervening in the procedures and
to reach a common learning objective and as such management, and in work planning (e.g. sched-
is the propulsion motor of all the network learning ules, deadlines, etc.)
processes (p.34). Social, promoting the creation of a cohesive at-
mosphere of mutual trust within the discussion
group, or collaborating in observing and monitor-
e-tutor roles and FunctIons ing interpersonal dynamics while trying to solve
possible conflicts and misunderstandings
What ideas have emerged from the above analysis?
Is it possible to identify a single and coherent e-tutor In developing the analysis of Berge, Daniel et al.
profile? (2004) propose a more analytical distinction between
0
E-Tutor
central and peripheral roles of e-tutors, highlighting Many scholars agree that a good e-tutor should
the following as central roles: possess a range of competencies, that are technical,
pedagogical and methodological, managerial and com-
Content facilitator (the e-tutor intervenes some- municative-relational (Kemshal-Bell, 2001).
times as an expert on the subject, or as interpreter By technical competencies we refer to the ability
and guide through the concepts of study, etc.); to use (at intermediate or advanced levels) the asyn-
Metacognitive facilitator (supports reflection on chronous and synchronous communication tools (i.e.,
learning activities and outcomes, study skills e-mail, forums, chat lines, audio or videoconferences,
development, etc.); process page editing HTML, etc.) and the tools available in
Facilitator (supports learning strategies, time the virtual learning environment adopted in the course.
management, etc.); In addition, the ability to supply technical help (help
Advisor/counsellor (provides pastoral support, desk) and the knowledge of Netiquette principles. This
doorway to institutional/local support systems, means that the e-tutor must not only teach Netiquette to
etc.); the students, but also make the students observe these
Assessor (gives feedback on task achievement principles in order to guarantee a good communica-
and performance, assignment development, is tion ecology.
sometimes also examiner, and so forth; Going on to competencies, even if an e-tutor may
Technologist (stands as a guide, first-post support not necessarily be a subject matter expert, he/she must
with technologies and tools for learning, etc.); be able to indicate meaningful resources to the students
And finally, resource provider (identifies and lo- (Denis et al., 2004). This entails the possession of basic
cates, develops and produces resources to provide domain knowledge which must not be less than the
just in case or just in time learning support, knowledge learners have (Lentell, 2003).
etc.) (Daniel et al., 2004). Pedagogical/methodological competencies in-
clude the ability to design and manage meaningful
Two of the peripheral roles are those of manager/ learning activities, noted as e-tivities (Salmon, 2002),
administrator and e-designer. As manager, the e-tu- moderate group interactions, encourage participation,
tor supports the management of the course, keeping motivate students, stimulate them intellectually, sustain
records and checking enrolments. As e-designer, he them in managing schedules and organizing learning
intervenes sometime to help design the course or the activities, monitor the learning process, and evaluate the
lesson itself, the tasks to be done, etc.). students performance. As to monitoring and evaluating
In the analysis of Daniel et al. (2004), attention is processes, it must be observed that analyzing a process
hardly given to the function of community manager, carried out in a virtual learning environment is other
which appears to us as very central since the e-learn- than banal. The virtual learning environment stores a
ing scenarios are always more oriented towards the lot of data on the users activities. This data can be an
integration of active learning and professional online important source of information on the quality of the
communities for continuing education (Rotta & Ran- works going on. However, precisely because of the
ieri, 2005). abundance of available data one needs to know how to
In synthesis, starting off from the Berges model make use of support tools at times incorporated in the
integrated with suggestions emerging from recent same virtual learning environment. On the basic level,
literature (Denis et. al., 2004; Rivoltella, 2006; Rotta such tools allow, for example, to verify who, among
& Ranieri, 2005), we propose the following table of the students, have (or have not) read a certain message
e-tutor facilitator/moderator tasks (Table 1). as well as those who have (or have not) downloaded
a specific document and so on. There are also more
complex tools able to restore data in aggregate form
e-tutor coMPetencIes on the groups interaction. Knowing how to make use
of them becomes essential to effective monitoring of
From the Table 1, it appears to be evident that the the learning process.
competencies an e-tutor should possess are situated The sphere of communication skills and relational
on various multiple levels. competencies entails a deep knowledge of computer-
0
E-Tutor
mediated communication and of its implications on their emotions. This area of competencies is one of
the emotional and socio-relational experiences of the the most complex, but at the same time holds a crucial
individual and of the group. Moreover, it implies the importance up to the point of becoming the core of
capacity to listen and dialogue, observe and continually effective e-tutoring (Ardizzone & Rivoltella, 2003;
monitor the relational dynamics, promote constructive De Luca & Friendenthal, 2006; Fata, 2004; Rizzi &
interaction among the students, moderate discussions, Tassalini, 2006; Rotta & Ranieri, 2005).
produce appropriate messages, and also identify the Finally, as far as the areas of managerial compe-
context and decode the messages by reading between tencies are concerned, the tasks include the ability to
the lines, facilitate personal expression, and reassure organize work spaces, manage time, plan activities
or encourage the students by helping them manage (deadlines, rules, roles) or define objectives, thus
E-Tutor
E-TUTORS
DESCRIPTION
COMPETENCIES
Use synchronous and asynchronous communication
tools
Technical
Possess knowledge of Netiquette principles
Time management
Plan and monitor activities
Managerial Mediate between different needs from the students, the
staff and the institutional organization
mediating between emerging needs along the way on to a whole set of functions that can be distributed to
behalf of students, staff or the educational institutions the whole educational system and be carried out by a
themselves. team composed partly of people already operating in
The e-tutor competencies framework can be briefly the educational institution, and whose competencies
synthesized (see Table 2). are only to be updated, and partly carried out by people
coming from outside?
This is quite a complex problem which research
conclusIon is investigating (Rivoltella, 2006). The solution is not
simple since questions of various nature come into
As we have seen, in online education the e-tutor can play (organizational, administrative, labour related).
hold various roles which are a set of whole and complex However, in online education the e-tutor, as compared
tasks and functions not strictly pedagogical. It would to the traditional tutoring, is gaining a more central role
be rightful to ask if each of these identified roles is in instruction (support for educational content provision,
to be played by different people or by an only figure management of interactions, evaluation).
who must/may assume more roles. Is the figure of the It is therefore urgent to recognize the specific role
e-tutor, in other terms, a specific professional profile of this figure within the institutional context, which is
to be introduced as new within the educational system, both necessary and auspicious in guaranteeing quality in
able to play the various roles we indicated? Or should any educational activity carried out on the network.
it be more correct to speak of e-tutoring when referring
E-Tutor
E-Tutor
Section: Context ICT
Debora Infante
University of Basilicata, Italy
Angela Pascale
University of Basilicata, Italy
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Evaluating Usability to Improve Efficiency in E-Learning Programs
ISO/IEC 9126 standard (Information technologySoft- There are several methods to evaluate the usability of
ware product evaluationQuality characteristics software and each one has specific characteristics that
and guidelines for their use) defines usability as the make it suitable to particular products during the initial,
capability of the software product to be understood, in itinere and final phases depending on the specific
learned, used and attractive to the user, when used goals of the evaluation.
under specified conditions. On the other hand, ISO Usability tests need to be administered when the
9241-11 standard (Ergonomic requirements for office interface is in the planning stage. Evaluating once is
work with visual display terminalsGuidance on us- not enough, however. Thus, it is advisable to repeat and
ability) defines it as the extent to which a product can integrate tests during all the process. Nielsen (1993)
be used by specified users to achieve specified goals says that it is better to deliver a usability test with five
with effectiveness, efficiency and satisfaction in a people from time to time rather than only once with
specified context of use. 20 users.
Researchers have struggled to clarify the concept of As stated before, usability is meaningful only when
usability. According to Shneiderman (1992), usability there is interaction with a user. Thus, in order to evalu-
includes factors such as efficiency of use, learnability, ate usability it is necessary to involve a user who is
memorability and satisfaction. Moreover, Nielsen interested in interaction. As a consequence, to improve
(1993), one of the leading experts in this field, defines interactivity, studies of usability involve two major
usability as a measure of the quality of a persons ex- categories of analysis. The first is speculative and more
perience in interacting with a product or a system. As economical: various experts analyze the software or an
a consequence in his opinion, a product is usable when interface prototype on the basis of certain propositions
it can be learned quickly and effectively, and enables in order to identify problems, ultimately providing a
a user to accurately complete a task, is memorable, series of observations and suggestions for improvement.
allows only few and noncatastrophic errors and is The second is more expensive but more precise: it is
satisfying to use. based on the direct observation of a typical user who
In short, a product is usable when: tries to use the software during development. On the
basis of the different tasks performed by the user and
It fits the users needs and expectations of the difficulties he/she meets, some suggestions may
It is easy to understand, learn, use and is attrac- be made in order to facilitate planning.
tive The first category utilizes the following analytic
It allows the user to work correctly, quickly and methods for evaluating usability:
with satisfaction
Task analysis
Besides synthesizing various definitions of usability, Cognitive walkthrough
these elements highlight the steps to follow during Heuristic evaluation
the product development cycle in order to ensure the
usability of a product. In order to achieve this goal, While these methods are all different, each of them
it is necessary to know the users characteristics, the utilizes expert evaluation. It is important to emphasize
activities that they perform and their environment. As that this analysis is carried out on a subjective basis
for the ease with which users can understand and em- according to the analysts preference or to general
ploy the product, today several usability principles and experience. Analysis is then carried out according to
guidelines are available. They are mainly based on the certain principles that are set on an empirical basis.
cognitive and behavioural aspects of human-computer Task analysis concerns the examination of task
interactions. However, these aspects are not sufficient. components, estimating the steps necessary to develop a
To ensure usability, it is fundamental to interact regularly specific procedure. In the case of cognitive walkthrough,
with future users. In this way it is possible to verify, the cognitive features of users should be taken into ac-
evaluate and, if necessary, measure the project choices count, checking the existence of any problems on the
in terms of user satisfaction. interface/prototype. Heuristic evaluation evaluates the
Evaluating Usability to Improve Efficiency in E-Learning Programs
Technologies: They allow the implementation of difficult to select the sample, to gather financial aid to
complex software applications such as moving train the users and to simulate the actual scenario.
images, audio and video files, simulations, and On the other hand, UIM is a class of techniques
so forth. When designing them it is necessary to involving trained evaluators, rather than real users,
consider the students Internet access bandwidth for examining a user interface. This method has been
that needs to be broad enough to allow the students successfully adopted in the last few years although it
to use the material. The designer should allow for has two main shortfalls:
all of these aspects in order to produce usable study
material. To gather this information, it is possible Most experts only evaluate the characteristics
to construct tests for implementation both before of graphical interfaces, without examining the
and during e-learning courses. In this way, it is structure of the application, the organization of
possible to know the type of student involved and information and its contents or the navigation
the students expectations. Moreover, the personal process;
experience of instructors and e-tutors should also Results depend exclusively on the experts knowl-
be considered. edge, experience and principles.
Planning a learning environment that is sensi- John, B. E. & Marks, S. J. (1997). Tracking the effec-
tive to the current situation and independent of tiveness of usability evaluation methods. Behaviour E
restrictions caused by limited access to certain and Information Technology, 4(5), 188-202.
technologies. As a matter of fact, there are sev-
Jordan, P. W. (1998). An introduction to usability.
eral learning situations that might benefit from a
London: Taylor and Francis.
variety of access channels. However, because of
the variety of options available, it is essential that Kunkel, K., Bannert, M., & Fach, P. W. (1995). The
numerous methods of analysis are employed in influence of design decisions on the usability of direct
addition to evaluating the assessment instruments. manipulation user interface. Behaviour and Information
In order to build an enjoyable access experience, Technology, 2, 93-106
it is advisable to avoid duplication of facilities
and functionalities on all access channels. Only Macleod, M. (1992). An introduction to usability evalu-
a careful analysis of user behaviour will provide ation. Teddington National Physical Laboratory.
information about the actual advantages of each Nielsen, J. (1993). Usability engineering. Boston:
channel. Academic Press.
Planning an interactive learning environment that
offers the possibility of providing simulations Nielsen, J. & Loranger, H. (2006). Prioritizing Web
and training. It is well known that if a student is usability. Berkeley, CA: New Riders Press.
emotionally involved in elaborating information, Nielsen, J. & Mack, R. L. (Ed.). (1994). Usability in-
the student is more inclined to collaborate within spection methods. New York: John Wiley & Sons.
the community.
Norman, D. A. (1988). The psychology of everyday
To conclude, within e-learning settings the target things. New York: Basic Books.
user is represented by the student, whose needs and Norman, D. A. & Draper, S. W. (Ed.) (1986). User
expectations should direct the product development centered system design: New perspectives on human-
process in order to allow the student to learn quickly computer interaction. Hillsdale, NJ: Lawrence Erlbaum
and successfully. Associates.
Shneiderman, B. (1992). Designing the user interface.
reFerences Reading, MA: Addison-Wesley.
Smith, P. A., Newman, I. A., & Parks, L. M. (1997).
Baecker, R. M. & Buxton, W. A. (Ed.). (1987). Read- Virtual hierarchies and virtual networks, some lessons
ings in human-computer interaction: A multidiscipli- from the hypermedia usability research applied to the
nary approach. Los Altos, CA: Morgan-Kaufmann World Wide Web. International Journal of Human-
Publishers. Computer Studies, 4, 67-95.
Card, S. K., Moran, T. P., & Newell, A. (1983). The Visciola, M. (2000). Usabilit dei siti Web. Milano,
psychology of human-computer interaction. Hillsdale, IT: Apogeo.
NJ: Lawrence Erlbaum Associates.
Conti, A., Guelfi, M. R., Genuini, G. F., Masoni, M., &
KeyWords
Shehaj, E. (2005). Usabilit di un corso e-learning. In
P. Frignani, L. Galliani, M. Giacomantonio, G. Poletti
Effectiveness: Degree of achievement of a goal. Its
(Ed.), Atti del convegno Expo e-learning 2005. Ferrara,
measurement makes a connection between the fixed
IT: Omniacom Editore.
goals and the precision of the achieved goals. The
Dix, A., Finlay, J., Abowd, G., & Beale, R. (1993). simplest effectiveness index addresses the achievement
Human-computer interaction. Hillsdale, NJ: Prentice of a goal: a product is effective when it allows the
Hall. accomplishment of a task. If the goal is not achieved,
effectiveness can be measured in terms of the number
Evaluating Usability to Improve Efficiency in E-Learning Programs
of operations necessary to accomplish the task. Another usability field sometimes as a synonym of usability.
way to measure effectiveness involves the quality of It is fundamental to make the distinction between the
the achieved results. usability of a product as it is being used for the first
time and usability when referring to more or less ex-
Efficiency: Relationship between the effectiveness
pert users.
level and the use of resources. It can be measured ei-
ther by the number of errors made by the user before Satisfaction: Utility of an entire system as per-
completing a task or by the time used to reach the goal. ceived by users and the comfort level felt by them in
Efficiency can also be defined as the rate of effort used using a product. It is a subjective aspect of usability.
to successfully complete a task. It is difficult to measure and can be impacted by both
effectiveness and efficiency level. In many cases it
Ergonomics: Discipline that deals with the plan
can be considered the most important measurement of
and the design of facilities and environments for hu-
usability. Satisfaction can easily be measured by ask-
man use. In the computer science field, it concerns
ing questions of target users through a questionnaire
the planning of keyboards, mice, screens, and of the
or an interview or by making notes of the comments
workstation (chairs, tables, lamps, etc.).
made by target users while they are using the system.
Human-Computer Interaction: Discipline that A qualitative analysis of user satisfaction is also a
deals with planning, evaluating and implementing good indicator. However, it can be most useful if their
interactive systems by human beings. Moreover, it attitude towards a product can be quantified.
deals with the study of the most important phenomena
User Experience: Experience gained by a target
related to it.
user while interacting with an interface that provides
Intuitivity: Degree of the effort rate required by access to a website or another technological product.
a user in using a product for the first time. The less The user triggers a series of cognitive processes that
time and effort used, the more intuitive the product. let the user understand the investigated reality. It is
This factor is very important in those products which obvious that more the user has a positive experience,
involve occasional target users. It loses importance in the more the user will wish to experience it again. The
those products which imply long learning sessions. main factors that determine the quality of the user
An intuitive design makes comprehension of an object experience are: waiting time, orientation while surfing
easy and improves information storage and recovery and surfing comprehension.
from memory.
User-Centered Design: Process that implies the
Learnability: Degree of effort employed to achieve involvement of the target user during the planning and
a level of competence in completing a task. A system developing cycle. It is composed of several activities
is considered easy to learn if competencies required and it is based on the interaction of various instruments
to use it are acquired after only a few repetitions of for analyzing, observing, planning, and assessing.
the task. The term learnability is widely used in the
0
Section: Context ICT
Even though educational policy directives have Why ICT failed to induce a major impact in the
articulated clear and unambiguous statements about schools compared to other disciplines in our
encouraging the use of ICT in the schools, the applica- modern society (administration, business, labor,
tion of ICT in educational settings is rather peripheral research, etc.)?
acting, in most cases, as an add on effect to regular What factors support or prevent teachers from
classroom work. Despite that home access to ICT has using ICT in their instruction?
been growing rapidly, both for students and teachers, What type of educational directives and orienta-
and ICT resources in the schools (computer labs, edu- tions could be encouraging for the schools and the
cational software disposal, connection with the Internet, teachers to integrate ICT in everyday practice?
etc.) have improved substantially over the last years,
teachers do not appear to make effective use of ICT in In this article the factors involved in the uptake of
their instruction (Becta, 2004a; Cuban, 2001; Russel, ICT by the teachers and the schools are examined. The
Bebell, ODwyer, & OConnor, 2003; Waite, 2004). focus of our argumentation is that teachers constitute
The outcomes of the initiatives concerning ICT in edu- a critical factor in the attempt to integrate technol-
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Factors Determining Teachers Beliefs and Perceptions of ICT in Education
ogy in the classroom but they are not appropriately The pedagogical aspect: ICT integration in the
prepared for that undertaking. An extensive review of school practice is not restricted to a simple improvement
the literature associated with teachers views and per- of the traditional instruction but rather it is associated
ceptions of ICT in education is presented. Finally, we to fundamental changes in the learning process. In
conclude debating on the demand of a new curriculum other words, ICT is widely perceived as a catalyst for
and a new pedagogical framework, both based on and school change, since it could bring major benefits to
enhanced by the new environments and tolls ICT offer the learners and the teachers, such as:
in education.
New educational materials
Shared learning resources and environments
What Ict brIngs In educatIon Promoting active and collaborative learning
Shift towards autonomous and lifelong learn-
It is widely accepted that ICT would lead to significant ing.
educational and pedagogical outcomes in the schools,
beneficial for both students and teachers (EC, 2004; The societal aspect: Societal pressures have been
ICTL, 2004; OFSTED, 2002). A great amount of re- present since the launch of ICT into schools. Parents,
search has shown that proper use of ICT in education can television advertisements, industry, and commerce
increase students motivation and deepen understand- aspects, the Internet have all provided pressure for
ing, promote active, collaborative and lifelong learning, pushing ICT into education. Possession of a computer
offer shared working resources and better access to in- and an Internet connection line at home is a recent form
formation, and help students to think and communicate of social culture. Several researchers have found that
creatively (Jonassen, 2000; Webb, 2005). home computers were mainly used for games playing
Nowadays, ICT is perceived to be inherent to and the Internet as a leisure activity. This is usually
the educational reform efforts necessary for the 21st not of positive benefit to school learning. For exam-
century society, since it has changed the key aspects ple, it can pose a problem if teachers feel threatened
of the nature of knowledge and the way we access it. by pupils superior knowledge of ICT (Jimoyiannis &
Moreover, ICT appears to change the very nature of Komis 2004) or if school hardware and software is far
teaching and learning, since the teaching profession is less up-to-date than that being used at homes.
evolving from an emphasis on teacher-centred instruc- In the field surrounding the design, application and
tion to student-centred learning environments (Webb integration of ICT in education, many myths and mis-
& Cox, 2004). conceptions have been developed and promoted across
There are three main aspects inherent to the role of countries, educational institutions, policy makers, and
ICT and its impact in the schools: educational planners. Attempting to analyze the critical
issues related to ICT in education and the low impact in
The vocational aspect: ICT has lead to changes in schooling produced till now, we present an outline of
the way people access and manipulate information, the myths and realities regarding the current influence
solve problems and organize their work. The required of ICT into the schools. Following we analyze the key
skills and competencies are therefore changing for both factors determining teachers views and perceptions of
students and teachers. Gaining in importance are the ICT in education.
following skills and capabilities:
Myth 1: Putting computers into the schools will
Critical and analytical thinking directly improve learning; more computers will result
Decision making in greater improvements in education.
Handling dynamic situations
Team working Reality 1: Till now, education has been affected by
Effective communication ICT only marginally.
ICT competencies.
Myth 2: Once teachers learn the basics of using
computers and the Internet, they are ready to effectively
use ICT in their instruction.
Factors Determining Teachers Beliefs and Perceptions of ICT in Education
Reality 2: Teachers are not convinced of the po- to measure teachers attitudes toward computers in
tential of ICT to improve learning. Moreover, they are education revealing four correlated dimensions (i.e., F
poorly prepared to effectively integrate ICT in their Evans-Jennings & Okwuegbuzie, 2001; Levine &
instruction. Donitsa-Schmidt, 1998; Ropp, 1999; Rosen & Weil,
1995):
Myth 3: There are agreed-upon goals and best
practices that define how ICT should be used in the Anxiety, fear or cautiousness of using computers
classroom. and ICT tools
Self-efficacy and confidence in the ability to use
Reality 3: Radical pedagogical reforms are required ICT
to take full advantage of the potentialities that ICT Liking to use computers and ICT tools
brings in education (e.g., shift from teaching to learning, Perceptions about the value and usefulness of
active and collaborative learning practices, new roles using ICT in education.
for the teacher, new classroom organizations, flexible
curriculum, etc.). It seems that the teachers, in general, have a con-
sistent network of beliefs and perceptions concerning
the many aspects of ICT in education (Jimoyiannis &
Factors aFFectIng teachers Komis, 2006). Goodwyn, Clarke, and Adams (1997)
adoPtIon oF Ict In educatIon divided the English teachers participated in their survey
into three groups according to their beliefs and ratio-
It is widely recognized that teachers educational beliefs nales about ICT in the curriculum: (a) the optimists,
are strong indicators of their planning, instructional (b) the fearful teachers and (c) the unresolved teachers.
decisions and classroom practices (Bandura, 1986; Similarly, in a survey administered in Greek schools,
Pajares, 1992). Van Driel et al. (2001) argue that reform three cohesive groups of teachers have been identified
efforts in the past have often been unsuccessful because according to their views and beliefs towards ICT in
of their top-down approach, which failed to take teach- education: (a) the positive teachers, (b) the negative
ers existing knowledge, beliefs, and perceptions into teachers, and (c) the neutral (undecided) teachers,
account. Teachers attitudes and beliefs towards ICT in which vacillate between positive and negative beliefs
education have a significant influence on ICT adoption (Jimoyiannis & Komis, 2007).
and their implementation behaviors in the classroom. The findings of the research, examining the factors
Therefore, a thorough analysis of their conceptions relating to the uptake of ICT by schools, suggest that
towards ICT in education can provide insights on the ICT integration in the school practice needs time and
prerequisites for teachers successful preparation, in systematic efforts. The adoption of ICT by teachers
order to effectively apply ICT in their classroom. and schools should not be considered as a linear and
Teachers, in general, agree that computers constitute spontaneous outcome of the decisions taken by policy
a valuable tool and are positive about students devel- authorities and the funds invested by the government.
opment in ICT knowledge and skills (Jimoyiannis & Despite the great funding by national and EU authori-
Komis, 2006). In most cases, they perceive ICT as a ties, it seems that the lack of
new area (subject-matter) in the schools rather than a
new way of teaching and interaction between learn- a. A realistic pedagogical framework of using ICT
ers and knowledge (Loveless, 2003;Williams et al., across the curriculum
2000). It appears that, even though they recognize the b. An effective system for supporting-guiding teach-
importance of introducing ICT in education, teachers ers professional development
tend to be less positive about their extensive use in the
classroom and far less convinced about their potential does not work in a supportive way, as far as the integra-
to improve instruction (Russel et al., 2003; Zhao & tion of ICT in everyday school practice concerns.
Cziko, 2001). Helping teaches to develop positive attitudes to-
Teachers attitudes toward ICT constitute a mul- wards ICT in education is a complex task, determined
tifaced variable. Many instruments have been used by many interrelated factors affecting the network of
Factors Determining Teachers Beliefs and Perceptions of ICT in Education
beliefs, ideas, educational priorities and decisions they that female teachers had a greater degree of computer
held. In this article we propose an integrated framework anxiety (Brandley & Russel, 1997; Rosen & Weil,
of factors, influencing teachers perceptions of ICT in 1995) and were less confident computer users than
the schools, which is determined by four interrelated males (Lee, 1997). A recent report (EC, 2003) noted
axes, namely personal factors, technical barriers, that gender is an issue which determines the use of ICT
school factors, and pedagogical factors (Figure 1). by teachers, and the gap between males and females
The multidimensional nature of this framework is is even wider as far as the use of the Internet is con-
influenced by the many factors, internal or external cerned. Shapka and Ferrari (2003) claim that gender
to the teachers, which are analytically discussed in the differences about computers seem to be diminishing.
next section of the chapter. Similarly, it has been found that, in general, the males
are positive about ICT in education while the females
Personal Factors are neutral or negative (Jimoyiannis & Komis, 2006a).
The findings of the survey indicate that gender is still
Personal factors refer to the teachers atomic charac- a critical factor inducing positive beliefs about ICT in
teristics, perceptions, or choices which determine their education despite that its importance is falling relative
ICT profile and influence their beliefs towards ICT to previous studies in Greece (Emvalotis & Jimoyian-
in education. A number of studies have investigated nis, 1999; Jimoyiannis & Komis, 2004).
teachers attitudes toward computers in education and
revealed correlations to various variables such as gender, Age differences: A number of surveys suggested that
age, subject specialty, ICT competence and teaching the age of the teachers is a factor creating barriers to
experience (Christensen, 1997; Evans-Jennings & Ok- the use of ICT. A European Commission report (EC,
wuegbuzie, 2001; Jimoyiannis & Komis, 2006a; Levine 2003) found that the percentages of teachers using
& Donitsa-Schmidt, 1998; Ropp, 1999; Rosen & Weil, computers and the Internet fall as their age increases,
1995; Yaghi & Abu-Saba, 1998; Yildirim 2000). while the importance of this factor is falling. Presum-
ably, the younger teachers have been more exposed to
Gender differences: Research has shown that there technology than their predecessors. This could result
are gender differences in teachers beliefs about ICT in higher confidence levels and more positive views of
and their engagement with ICT. Earlier studies reported ICT in education but it does not guarantee, by itself,
Factors Determining Teachers Beliefs and Perceptions of ICT in Education
higher levels of ICT use in the classroom (Jimoyiannis available, there is little evidence of the barriers which
& Komis, 2007). exist in specific subject areas (Becta, 2004a). Our F
findings indicate a close relationship between subject
ICT competence: Teachers competence and confi- matter and teachers attitudes about ICT in education
dence with ICT is a principal determinant of effective (Jimoyiannis & Komis, 2006b, 2007). Generally, the
classroom use by the students. It seems that providing business, technology and science teachers are positive
opportunities to the teachers to acquire ICT skills is while mathematics, Greek language, history, and social
critical in order to strengthen their beliefs about the studies teachers are negative about ICT in education.
value of ICT in teaching and learning (Becta, 2004a; Overall, our results confirm previous findings in the
Kumar & Kumar, 2003). Research also indicates that USA that the functionality of computers in the class
many teachers have positive attitudes toward technol- has been quite different for the teachers of different
ogy but they do not consider themselves qualified to subjects (Becker, 2001). It has been found in Beckers
effectively integrate ICT into their instruction (Ropp, study that business education and elementary teachers
1999). On the other hand, most findings suggest that reported that computer use occurred frequently during
teachers with ICT knowledge have a more positive at- their classes, while mathematics and arts teachers did
titude toward the potential of ICT in education (Cox, not use computers that often.
Preston, & Cox, 1999; Luan, Fung, Nawawi, & Hong,
2005; Jimoyiannis & Komis, 2006b). Lack of appropri- Grade level: Previous research findings indicate
ate training and experience is considered one of the main that teachers grade level is a factor of importance. It
reasons why teachers have negative attitudes toward appears that teachers teaching at the secondary level
computers and do not use technology in their teaching had higher self-efficacy than elementary teachers and
(Becta, 2004; Yildirim, 2000). The impact of effective were less likely to predict that they would give up or
teacher training on ICT could be measured in terms of avoid a challenging ICT-based task (Rosen & Weil,
changes in attitudes on the part of the teachers (Kumar 1995; Shapka & Ferrari, 2003). Primary school teach-
& Kumar, 2003; Galanouli, Murphy, & Garder, 2004) ers tend to have higher levels of computer-phobia and
and of their students as well (Christensen, 1998). were more likely to avoid ICT than high school teach-
ers. In contrast, secondary teachers were more likely
Teaching experience: The effect of teaching experi- to use computers in the classroom, but were also more
ence on teachers attitudes toward ICT has not been likely to exhibit gender-stereotypical attitudes (Whitley,
extensively studied. Significant differences have been 1997). Contradicting to the results discussed earlier, it
recorded in Greek teachers beliefs and ICT skills ac- has been found that Greek primary teachers were par-
cording to their teaching experience (Jimoyiannis & ticularly positive about ICT in education (Jimoyiannis
Komis, 2006b). The teachers in the middle of their & Komis 2006a, 2007), especially in comparison with
carrier (having 10-20 years of teaching experience) are some of the secondary core specialties, for example,
positive to adopt ICT in their instruction while highly mathematics, Greek language, history, and social stud-
experienced teachers (having teaching experience ies teachers.
greater than 20 years) are negative in general. Low
experienced teachers (teaching experience less than Perceptions of the potential of ICT: Cox et al.
10 years), though they have higher level of ICT skills, (1999) have analyzed the role of perceived usefulness
are skeptical of the role of ICT in education. Similar and perceived ease of using ICT in teachers views
results have also been found in a study concerning about ICT in education. Recent studies (Hu, Clark,
French teachers (Baron & Bruillard, 1997). Presumably, & Ma, 2003; Ma, Andersoon, & Streith, 2005) have
ICT adds extra efforts to the young teachers in their found that teachers perceived usefulness of ICT is a
attempt to organize the core elements of their subject significant factor in determining intention to use ICT in
content, their instruction and the practices followed their instruction. Teachers seem to ignore the pedagogi-
in the classroom. cal characteristics and the potential of ICT to engage
students with learning in ways that otherwise were not
Teaching subject: Although a fair amount of litera- possible. Moreover, they need more convincing reasons
ture on teachers perceptions of ICT in education is about the usefulness and the effectiveness of ICT in
Factors Determining Teachers Beliefs and Perceptions of ICT in Education
learning and instruction (Jimoyiannis & Komis, 2007). limited opportunities for the other subjects. Similarly,
It is striking that 92% of the teachers participated in data logging systems, available in science laboratories,
this survey considered ICT as a necessity in our modern constitute a characteristic paradigm of underused equip-
society, exhibiting a consumer-like approach about its ment (Siorenta, 2005). Possession of a personal com-
contribution in education. puter at home does not guarantee, by itself, enhanced
willingness from the part of the teachers to use ICT in
Teachersresistance to change: Fullan (2001) stated their instruction. A survey concerning Greek teachers
that the most fundamental problem in education reform has shown that only a small percentage (11.1%) used
is that people do not have a clear and coherent sense of routinely ICT to support their conventional instruction,
the reasons for educational change, what it is and how despite that 6 out of 10 teachers reported ownership
to proceed. Previous research (Munby, Cunningham, of personal computer at home (Jimoyiannis & Komis,
& Lock, 2000; van Driel et al., 2001) has shown that 2006a). On the other hand, only 1.7% of the teachers
teachers, in general, resist to fundamental changes in in the sample used ICT tools so often, mainly, as short
their everyday classroom choices or teaching activi- episodes incorporated into the existing curricula and
ties (the model of knowledge transfer to the students teaching practices.
minds, the conventional problem solving approaches,
the accurate coverage of the content according to the Lack of appropriate software: In general, there is a
curriculum or the textbooks, etc.). Veen (1993) de- lack of appropriate educational software in the schools.
scribes this situation as the persistence of beliefs, for Although various educational software titles may be
example, teachers hold views which persist and induce available for both teachers and students, most of those
obstacles during the infusion of educational innova- titles are not appropriate or cannot actually help in en-
tions. This justifies why the educational uptake of ICT hancing learning. Apart from poorly designed software,
by the schools is a slow process, with teachers needing which disengages students from the intended learning
time and support to gain experience and redirect their process, there is one more factor; educational software,
instructional practices by taking advantage of ICT as in general, is poorly related to the curriculum, its goals
an efficient tool for learning (Mumtaz, 2001). and philosophy, and the content to be covered. On the
other hand, teachers need time and knowledge to evalu-
technical barriers ate the software and the learning activities to be used,
to prepare new ICT-based activities and worksheets for
Into this category are classified technical and other their students etc. The software available in the schools
external factors, related to the school and social envi- should be accompanied by a complete teacher guide
ronment, which inhibit teachers to get involved in ICT and a plethora of appropriate examples to be used in
integration efforts. Following are presented the most the classroom.
important technical barriers teachers faced with.
Lack of time: Lack of time produces negative at-
Lack of resources: Lack of sufficient numbers of titudes to the teachers and does not help them to get
computers and appropriate software can seriously limit involved in ICT-based activities. Integrating ICT into
what teachers can do in the classroom (Pelgrum, 2001). classrooms requires much more effort and time than
The quality of the hardware available constitutes also a regular teaching. Teachers need more time to plan their
problem for the teachers. Mumtaz (2001) has pointed instructional choices and behaviors in the classroom,
out that evidence of good practice in the use of ICT is to design learning activities based on ICT, to locate
invariably found in those schools that have high qual- information in the Internet, to prepare accurate ICT
ity ICT resources. Cuban (2001), on the other hand, materials for their students, to explore and practice the
claimed that resources available in the schools are, in resources needed etc. (Becta, 2004a). In general, they
most cases, underused. In some cases, poor organiza- have little time left after school to experiment with tech-
tion will also cause barriers to the teachers interested nology, share experiences with colleagues, and attend
to use ICT in their instruction. In Greek secondary in-service training programs. As Cuban, Kirkpatrick,
schools, for example, computer labs are predominantly and Peck (2001) found, the lack of time problem did
used by the computer science teachers providing thus not only apply to those teachers who made little use of
Factors Determining Teachers Beliefs and Perceptions of ICT in Education
ICT in their lessons. Similar complaints were made by that the school culture and the general framework of
those teachers who were attempting to make full use of schooling do not support teachers to integrate ICT in F
ICT in their lessons, as they had to work longer hours their teaching. Teachers beliefs and perceptions are
in order to achieve successful use of ICT. influenced by the many aspects of school practice and
culture, which constitute a strong reason to reserve their
Lack of technical support: Preparing efficient learn- traditional teaching practices (Munby et al., 2000; van
ing activities based on ICT tools demands that teachers Driel et al., 2001).
have the proper level of technical skills and knowledge. Research has shown that teachers with interest
In most cases, technical problems are time-consuming and motivation to learn about ICT use computers in a
and have a direct impact on teachers confidence of us- narrow range of applications, mainly, for personal pur-
ing ICT in their instruction. Many teachers certainly poses. Most of them continue to use ICT for low-level
agree that technical support is needed in the schools supplemental tasks, such as word processing (lesson
(Becta, 2004), especially when things go wrong during plans, worksheets, assessment tests, registration of
their lessons. Lack of continuous technical support and grades, etc.) or getting information from the Internet
fear about the breakdown of equipment inhibits teach- (Becker, 2000; OFSTED, 2004; Jimoyiannis & Komis,
ers of using ICT in their instruction (Jimoyiannis & 2006a; Russel et al., 2003; Waite, 2004; Williams et
Komis, 2004). al., 2000). Relatively few teachers use ICT routinely
for instructional purposes and even fewer are integrat-
school Factors ing ICT into subject teaching in a way that motivates
pupils, enriches learning and stimulates higher-order
Most teachers agree that computers constitute a valuable thinking and reasoning (Becta, 2004a).
tool and are positive about students achievement on As van Driel et al. (2001) pointed out teachers do
ICT skills. On the other hand, although they recognize not tend to risk changing their own practice which
the importance of introducing ICT in education, they is rooted in practical knowledge built up over their
tend to be less positive about extensive use of ICT in teaching career. The concept of practical knowledge
their classroom and far less convinced about its poten- refers to the integrated set of knowledge, conceptions,
tial to improve instruction (Russel et al., 2003; Waite, beliefs and values teachers develop in the context of
2004). Stetson and Bagwell (1999) have analyzed the their teaching. It is influenced by various parameters,
resistance of many schools, colleges, and departments such as the profile of the teachers, the disciplinary
of education to embrace technological applications into background, the students, the school environment,
their methods of coursework. and so forth. Consequently, practical knowledge con-
Based on the results of their study, Sugar, Crawley, stitutes the core of teachers professionality, guides
and Fine (2004) have outlined ICT adoption as a personal their actions in the classroom and, reasonably, acts as
decision uninfluenced by other people and the presence a negative factor to adopt ICT in their school practice.
of resources or impediments in the local school/district. Teachers, in general, feel confident by using their
Secondary education teachers considered partnership practical knowledge which works in their everyday
and collaboration with specialty colleagues and the instruction very well, and are unwilling to change
other teachers in their school as a factor influencing practices, teaching methods, habits or roles. Snoeyink
their professional development towards integrating & Ertmer (2001) have presented a teacher, not skilled
ICT in their instruction (Jimoyiannis & Komis, 2004). on ICT, explaining her negative views of ICT on the
Granger, Morbey, Lotherington, Owston, and Wide- basis that she wished to remain comfortable with her
man (2002) suggested structured collaboration and teaching. Similar results have also found in Greece
continuous communication among teachers as a factor where physics teachers seem to be unwilling to leave
contributing to the successful implementation of ICT their comfort context of conventional subject practice
in the schools. activities (Siorenta, 2005).
Cuban et al. (2001) claimed the school itself, as Most of the teachers using ICT in their instruction
an institute, is resistant to the changes needed for suc- are tentative to adapt new tools to their traditional
cessful ICT integration and reorganisation in order to teaching philosophies in such a way that makes them
facilitate innovative practices involving ICT. It seems feel secure and confident. For example, they prefer
Factors Determining Teachers Beliefs and Perceptions of ICT in Education
demonstrating of computer simulations to support their to organize and manage students ICT-based learning
lecture instead of engaging their students to pertinent activities (Jimoyiannis & Komis, 2007).
ICT-based activities. Demetriadis et al. (2003) have Teachers pedagogical cultures shape their rep-
found that teachers are interested in using ICT to take resentations of ICT use in the classroom (Ruthven,
advantage of any possible learning benefits offered by Hennessy, & Brindley, 2004), while they are likely to
ICT, but they appeared to cautiously adapt ICT usage adopt practices with computers that reflect their beliefs
to the traditional teacher-centered mode of teaching. about teaching and learning (Drenoyianni & Selwood,
There is also a perceived tension between using 1998). It has been shown that teachers with the most
ICT and the need to conform teaching to the external constructivist teaching philosophies regarded the role
requirements of traditional examinations (Henessy et of computers in their instruction as very important
al., 2005). As far as the case of Greek schools concerns, (Becker, 2001; Ravitz, Becker, & Wong, 1999). Hig-
there is another intervening factor which strongly in- gins and Moseley (2001) argued that the most effective
fluences teachers attitudes towards ICT in education; teachers not only had a positive attitude towards ICT,
the pressure from the national university entrance but had also good ICT skills and used computers as
exams and the need to cover the set content of the core a part of a stimulating environment favoring pupils
subjects (language and literature, history, mathemat- inquiry and collaboration.
ics, physics, chemistry, biology) prevail in teachers It is commonly accepted that ICT can support stu-
instruction culture as well as in the students learning dents and teachers in accessing, organising, manipu-
culture. The following factors shape the negative im- lating and displaying information in a totally different
pact that school culture induces on science teachers way. In practice, however, established curricula and
perceptions about ICT in their instruction (Jimoyiannis teaching approaches still remain essentially unchanged,
& Siorenta, 2007): while technology is usually underused and poorly in-
tegrated into the classroom (Cuban, 2001; OFSTED,
The traditional view of teaching as a process of 2004). For example, applications such as simulations
knowledge transfer and modelling software, which have the potential to
The need to cover the content set by the curricu- fundamentally change instruction and learning, are
lum largely ignored because they are relevant to only a
The restrictions posed by the science textbooks small part of the existing curricula.
The need to practice their students on conventional Webb and Cox (2004) suggested that the use of
(paper and pencil) problem solving tasks ICT in the classroom is associated with a decrease in
The requirement to prepare students for the final teacher direction and an increase in student control, self-
exams. regulation, and collaboration. The role of the teacher
in classroom interactions does change alongside the
Ict Pedagogical Framework integration of ICT in the curriculum. Consequently,
teachers need be aware of the changing nature of teach-
Teachers thinking and beliefs about teaching and ing and learning associated with the introduction of
learning are linked to what they do in their classroom ICT in the schools. Their efficient preparation should
and the choices they made in selecting how to integrate be addressed at adopting a new pedagogy and changing
ICT into their instruction. A series of independent stud- their behaviours and practices in the classroom. They
ies indicate that both teachers personal theories and need to shift from traditional lesson formats, based on
perceptions about teaching and learning and the level transmitting information philosophies, towards student-
of competence with ICT play a major role in how they centred approaches that promote active engagement,
implement ICT and how they motivate themselves to help students to control their learning, and support col-
use ICT tools in the classroom (Gobbo & Girardi, 2001; laborative learning and meaningful understanding.
Niederhauser & Stoddart, 2001; Webb & Cox, 2004). To increase the likelihood that computers will be
Research findings also suggested that the majority of used in the school practice, teachers need to be encour-
the teachers are aware of the ICT-related pedagogical aged to try and acquire convincing experiences about
perspectives and are skeptical about the difficulties the effectiveness of ICT on teaching and learning. It
they will face at in the classroom practice, for example is critical that ICT should not be treated as a special
Factors Determining Teachers Beliefs and Perceptions of ICT in Education
Factors Determining Teachers Beliefs and Perceptions of ICT in Education
event or an extra tool to the traditional instruction. This specific pedagogical dimensions rather than a single
means that ICT integration should be implemented in technological dimension. ICT integration plans and
the context of broader instructional reforms aiming at programs should be developed in a wider context of
the curriculum, the educational media and, principally, school improvement, curriculum reform and teachers
at the pedagogical practices used. Professional and professional development. Top-down imposed policy
preservice teacher development programs should focus decisions and technocentric models for ICT adoption
on coupling changes in teachers pedagogical cultures appear to be unresponsive to the teachers perspectives,
and philosophies with their training on how to use ap- priorities, and their classroom or professional needs
propriate ICT tools with their students. also (Jimoyiannis & Komis, 2006a). Future policies
Table 1 incorporates a brief presentation of the concerning ICT in education should principally be
many factors affecting teachers views and perceptions addressed to an integrated framework, where the fol-
of ICT in education. lowing issues are of great importance (Jimoyiannis &
Komis, 2007):
suMMary and dIscussIon Helping teachers to adopt ICT not as a trend in our
modern technological society but as an efficient
ICT integration in the classroom practice is a complex teaching and learning tool.
and multifaceted issue. Marginal use of ICT will ob- Encouraging teachers to develop a new educa-
viously cause no outcome for the students. Teachers tional culture by integrating self-development on
should be confident and competent with a range of ICT in education into their professional develop-
ICT applications to support their teaching and their ment planning.
students learning. Moreover, they should become Creating and supporting powerful teacher com-
more aware of the value and the potential of ICT as munities of knowledge and practice by providing
a tool for lifelong learning, for their students as well continuous training, support, communication, and
as themselves. They need to understand how ICT can knowledge interchange, on both pedagogical and
be integrated into everyday practices and how their technological issues.
students should be engaged into appropriate ICT-based
learning activities. There are still a lot of parameters to be identified
This suggests that teachers should be able not only about the way teachers perceive ICT in education and
to use ICT for personal purposes or to support their the practices followed when they use computers in
traditional instruction, but also mainly to reorganize their classrooms. Future research should be addressed
their instruction by using ICT. Effective programs aim- at investigating:
ing at teachers ICT preparation and support should be
flexible, continuous, and focused on the subject-mat- The best practices that influence teachersadoption
ter pedagogy (Jimoyiannis & Komis, 2006a). They of and students achievement through ICT-based
should clearly articulate specific types of efficient learning environments
instructional models and representative ICT paradigms How and why subject cultures differentially af-
for every subject in the curriculum. Appropriate teach- fect students perceptions and uses of ICT as a
ers support and guidance should take account of their learning tool
different levels of ICT skills, their subject (curriculum The educational policy factors that affect the con-
and educational recourses), and also their professional tinuation and institutionalization of the changes
development targets. induced in the schools by the integration of
Teacher advances in technology integration occur ICT.
slowly and proceed through distinctive stages (Liu
& Huang, 2005; Rogers, 1995; Russel, 1995; Sherry,
1998), where the highest stages require changes in reFerences
attitudes more so than skills (Knezek & Christensen,
2000). The critical point for the educational authori- Bandura, A. (1986). Social foundations of thought and
ties is to conceive ICT use in education in terms of action: a social cognitive theory. Englewood Cliffs,
NJ: Prentice-Hall.
0
Factors Determining Teachers Beliefs and Perceptions of ICT in Education
Baron, G. L. & Bruillard, E. (1997). Information tech- Dexter, S. L., Anderson, R. E. & Becker, H. J. (1999).
nology in French education: Implications for teacher Teachers views of computers as catalysts for changes F
education. Journal of Information Technology for in their teaching practice. Journal of Research on
Teacher Education, 6(3), 241-253. Computing in Education, 31(3), 221-239.
Becker, H. J. (2000). Findings from the teaching, Dexter, S. & Riedel, E. (2003). Why improving pre-
learning, and computing survey: Is Larry Cuban right? service teacher educational technology preparation
Educational Policy Analysis Archives, 8(51). must go beyond the colleges walls. Journal of Teacher
Education, 54(4), 334-346.
Becker, H. J. (2001). How are teachers using comput-
ers in instruction? Paper presented at the 2001 Annual Drenoyianni, H. & Selwood, I. D. (1998). Conceptions
Meeting of the American Educational Research Asso- or misconceptions? Primary teachers perceptions and
ciation, Seattle. Retrieved March 13, 2008, from use of computers in the classroom. Education and
Information Technologies, 3(2), 87-99.
http://www.crito.uci.edu/tlc/findings/conferences-pdf/
how_are_teachers_using.pdf Emvalotis, A. & Jimoyiannis, A. (1999). Teachers at-
titudes towards new technologies in upper secondary
Becta (2004a). A review of the research literature on
education. In Proceedings of the 1st Panhellenic Con-
barriers to the uptake of ICT by Teachers. British Edu-
ference ICT in Education (pp. 203-212), Ioannina,
cational Communications and Technology Agency.
Greece (in Greek).
Becta (2004b). Enabling teachers to make successful
EC (2002). eEurope 2002: An information society
use of ICT. British Educational Communications and
for all. Brussels: Commission of the European Com-
Technology Agency.
munities.
Bradley, G. & Russel, G. (2000). Computer experience,
EC (2003). eEurope 2002 Benchmarking: European
school support and computer anxieties. Educational
youth into the digital age. Brussels: Commission of
Psychology, 17(3), 267-284.
the European Communities.
Christensen, R. (1998). Effect of technology integra-
EC (2004). eLearning. Retrieved March 13, 2008,
tion education on the attitudes of teachers and their
from http://www.europa.eu.int/comm/education/pro-
students. Unpublished doctoral dissertation, Denton,
grammes/elearning/programme_en.html
University of North Texas.
Evans-Jennings, S. & Okwuegbuzie, A. (2001). Com-
Cox, M., Preston, C., & Cox, K. (1999) What factors
puter attitudes as a function of age, gender, math atti-
support or prevent teachers from using ICT in their
tude, and developmental status. Journal of Educational
classrooms? Paper presented at the British Educational
Computing Research, 25(4), 367-384.
Research Association Annual Conference, University of
Sussex at Brighton. Retrieved March 13, 2008, from Fullan (2001). The new meaning of educational
change. New York: Teachers College Press, Columbia
http://www.leeds.ac.uk/educol/documents/00001304.
University.
htm
Galanouli, D., Murphy, C. & Garder, J. (2004). Teach-
Cuban, L. (2001). Oversold and underused: Computers
ers perceptions of the effectiveness of ICT-competence
in the classroom. Cambridge, MA: Harvard University
training. Computers & Education, 43, 63-79.
Press.
Gobbo, C. & Girardi, M. (2001). Teachers beliefs
Cuban, L., Kirkpatrick, H. & Peck, C. (2001). High
and integration of information and communications
access and low use of technologies in high school
technology in Italian schools. Journal of Information
classrooms: explaining an apparent paradox. American
Technology for Teacher Education, 10(1&2), 63-85.
Educational Research Journal, 38(4), 813-834.
Granger, C. A., Morbey, M. L., Lotherington, H.,
Davis, N. (2003). Technology in teacher education in
Owston, R. D. & Wideman, H. H. (2002). Factors
the USA: What makes for sustainable good practice.
contributing to teachers successful implementation
Technology, Pedagogy & Education, 12(1), 59-84.
Factors Determining Teachers Beliefs and Perceptions of ICT in Education
of ICT. Journal of Computer Assisted Learning, 18(4), and New Technologies in Education, 939-949, Ioan-
480-488. nina, Greece.
Goodwyn, A., Clarke, S., & Adams, A. (1997). The Jonassen, D. H. (2000). Computers as mind tools for
future curriculum in English and IT: How teachers schools. NJ: Prentice Hall.
and student-teachers view the relationship. Journal of
Knezek, G. & Christensen, R. (2002). Impact of new
Information Technology for Teacher Education, 6(3),
information technologies on teachers and students. Edu-
227-240.
cation and Information Technologies, 7(4), 369-376.
Hennessy, S., Ruthven, K., & Brindley, S. (2005).
Kumar, P. & Kumar, A. (2003). Effect of a Web-base
Teacher perspectives on integrating ICT into subject
project on preservice and inservise teacher attitude
teaching: Commitment, constrains, caution, and change.
toward computers and their technology skills. Journal
Journal of Curriculum Studies, 37(2), 155-192.
of Computing in Teacher Education, 19(3), 87-92.
Higgins, S. & Moseley, D. (2001). Teachers thinking
Lang, M. (2000). Teacher development of computer use
about Information and Communications and Learning:
in education in Germany. Education and Information
Beliefs and outcomes. Teacher Development, 5(2),
Technology, 5(1), 39-48.
191-210.
Lee, K. (1997). Impediments to good computing prac-
Hu, P. J., Clark, T. H. K. & Ma, W. W. (2003). Examining
tice: some gender issues. Computers & Education,
technology acceptance by school teachers: A longitu-
28(4), 251-259.
dinal study. Info. & Management, 41, 227-241.
Levine, T. & Donitsa-Schmidt, S. (1998). Computer use,
ICTL (2004). ICTs for learning. The State of
confidence, attitudes, and knowledge: A causal analysis.
Queensland, Department of Education and the Arts.
Computers in Human Behavior, 14, 125-146.
Retrieved March 13, 2008, from http://www.education.
qld.gov.au/ictsforlearning Liu, Y. & Huang, C. (2005). Concerns of teachers about
technology integration in the USA. European Journal
Jimoyiannis, A. & Komis, V. (2004). Secondary edu-
of Teacher Education, 28(1), 35-47.
cation teachers attitudes and beliefs towards apply-
ing ICT in their instruction. In Proceedings of the 4th Loveless, A. M. (2003). The interaction between
Panhellenic Conference ICT in Education(Vol. A, primary teachers perceptions of ICT and their peda-
pp. 165-176), Athens, Greece. gogy. Education and Information Technologies, 8(4),
313-326.
Jimoyiannis, A. & Komis, V. (2006a). Factors affecting
teachers views and perceptions of ICT in education. Luan, W. S., Fung, N. S., Nawawi, M., & Hong, T. S.
In P. Isaias, M. McPherson, & F. Banister (Eds.), In (2005). Experienced and inexperienced Internet users
Proceedings of the IADIS International Conference among pre-service teachers: Their use and attitudes
e-Society 2006 (Vol. I, pp. 136-143), Dublin, Ireland. toward the Internet. Educational Technology and So-
ciety, 8(1), 90-103.
Jimoyiannis, A. & Komis, V. (2006b). Exploring
secondary education teachers attitudes and beliefs Ma, W. W., Andersoon, R. & Streith, K. O. (2005).
towards ICT in education. THEMES in Education, Examining user acceptance of computer technology:
7(2), 181-204. An empirical study of student teachers. Journal of
Computer Assisted Learning, 21, 387-395.
Jimoyiannis, A. & Komis, V. (2007). Examining teach-
ers beliefs about ICT in education: Implications of a Mumtaz, S. (2000). Factors affecting teachers use of
teacher preparation programme. Teacher Development, information and communications technology: A review
11(2), 149-173. of the literature. Journal of Information Technology for
Teacher Education, 9(3), 319-341.
Jimoyiannis, A. & Siorenta, A. (2007). Factors de-
termining science teachers attitudes towards ICT in Munby, H., Cunningham, M., & Lock, C. (2000). School
their instruction. In G. Tsaparlis (Ed.), In Proceedings science culture: A case study of barriers to developing
of the 5th Panhellenic Conference Science Education professional knowledge. Science Teacher Education,
84, 193-211.
Factors Determining Teachers Beliefs and Perceptions of ICT in Education
Niederhauser, S. D. & Stoddart, T. (2001). Teachers in- Ruthven, K., Hennessy, S. & Brindley, S. (2004).
structional perspectives and use of educational software. Teacher representations of the successful use of com- F
Teaching and Teacher Education, 17(1), 15-31. puter-based tools and resources in secondary-school
english, mathematics and science. Teaching and Teacher
Niemi, H. (2003). Towards a learning society in Fin-
Education, 20, 259-275.
land: Information and communications technology in
teacher education. Technology, Pedagogy & Education, Shapka, J. D. & Ferrari, M. (2003). Computer-related
12(1), 85-103. attitudes and actions of teacher candidates. Computers
in Human Behavior, 19, 319-334.
OFSTED (2002). ICT in schools: Effect of government
initiatives. London: Office for Standards in Educa- Sherry, L. (1998). An integrated technology adoption
tion. and diffusion model. International Journal of Educa-
tional Telecommunications, 4(2), 113-145.
OFSTED (2004). ICT in schools: The impact of gov-
ernment initiatives five years on. London: Office for Siorenta, A. (2005). Physics teachers perceptions
Standards in Education toward relations between physics curriculum, instruc-
tion and ICT. Unpublished master thesis, University
Pajares, M. F. (1992). Teacher beliefs and educational
of Ioannina (in Greek).
research: Cleaning up a messy construct. Review of
Educational Research, 62, 307-332. Snoeyink, R., Ertmer, P. (2001). Thrust into technology:
How veteran teachers respond. Journal of Educational
Pearson, J. (2003). Information and communications
Technology Systems, 30(1), 85-111.
technologies and teacher education in Australia. Tech-
nology, Pedagogy & Education, 12(1), 39-58. Stetson, R. & Bagwell, T. (1999). Technology and
teacher preparation: An oxymoron? Journal of Technol-
Pelgrum, W. J. (2001). Obstacles to the integration of
ogy and Teacher Education, 7(2), 145-152.
ICT in education: Results from a worldwide educational
assessment. Computers & Education, 37, 163-178. Sugar, W., Crawley, F. & Fine, B. (2004). Examining
teachers decisions to adopt new technology. Educa-
PT3 (1999). Preparing tomorrows teachers to use
tional Technology and Society, 7(4), 201-213.
technology. Retrieved March 13, 2008, from http://
www.pt3.org TTICTE (2005). Teachers training on ICT in educa-
tion, greek ministry of education. Retrieved March
Ravitz, J., Becker, H., & Wong, Y. (2000). Constructivist
13, 2008, from
compatible beliefs and practices among U.S. teachers
(Rep. No.4). Irvine: Center for Research on Information http://www.eye-ypepth.gr/epimorfosi_B/index.
Technology and Services. Retrieved March 13, 2008, php?m=55&p=0
from http://www.crito.uci.edu/tlc/findings/report4
Unesco (2002). Information and communication tech-
Rogers, E. (1995). Diffusion of innovators. New York: nologies in teacher education. Paris: Unesco.
Free Press.
Van Driel, J. H., Beijaard, D., & Verloop, N. (2001).
Ropp, M. M. (1999). Exploring individual charac- Professional development and reform in science educa-
teristics associated with learning to use computers in tion: The role of teachers practical knowledge. Journal
preservice teacher preparation. Journal of Research on of Research in Science Teaching, 38(2), 137-158.
Computing in Education, 31(4), 402-423.
Veen, W. (1993). The role of beliefs in the use of infor-
Rosen, L. &Weil, M. M. (1995). Computer availability, com- mation technology: Implications for teacher education,
puter experience, and technophobia among public school or teaching the right thing at the right time. Journal of
teachers. Computers in Human Behavior, 11, 9-31. Information Technology for Teacher Education, 2(2),
139-153.
Russell, M., Bebell, D., ODwyer, L. & OConnor, K.
(2003). Examining teacher technology use. Implica- Vosniadou, S. & Kollias, V. (2001). Information and
tions for preservice and inservice teacher preparation. communication technology and the problem of teacher
Journal of Teacher Education, 54(4), 297-310. training: Myths, dreams, and the harsh reality. Themes
in Education, 2(4), 341-365.
Factors Determining Teachers Beliefs and Perceptions of ICT in Education
Section: Process ICT
Francesca Pozzi
Institute for Educational Technology, National Research Council, Italy
Luigi Sarti
Institute for Educational Technology, National Research Council, Italy
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Fostering Collaboration in CSCL
requires team members to play distinct roles (Persico students task, the group composition, how the task is
& Sarti, 2005). distributed within the group and sometimes between
groups, the type of interaction both in and outside the
groups, and the schedule of phases, if any.
strategIes and technIques to Even if every technique is different, they do have
Foster collaboratIon some features in common. For example, most of them
are based on a learning by doing approach, where
The terms strategy and technique are sometimes the exchange of opinions among peers is favoured by
used to indicate explicit and complete procedures. At proposing tasks in which the final aim is either the crea-
other times, they identify mere expedients. In any case, tion of an authentic product (artefact) or the solution
they serve the purpose to organize and guide students of a real problem. The underlying idea is that the need
collaborative activities in order to help them meet the to attain a common and tangible objective activates
desired objectives. As far as our study is concerned, concentration and is a catalyst for the participants ef-
the two terms are practically synonyms: the former forts. Of course, students will need to fully understand
emphasises the importance of the organisation and man- the techniques adopted, and, to achieve such mastery,
agement of the learning activity, and the latter stresses procedures and instructions should be stated very
the procedural nature of the method. Each technique is clearly (Brush, 1998).
generally described in terms of the steps of a procedure Most strategies to support online collaborative
and the behaviours that students are supposed to put learning feature two or more stages in order to allow
into practice. Some examples are Jigsaw, peer review, participants to collaborate at different levels and dif-
brainstorming, case study, and role play. Although they ferentiate among roles, thus favouring the adoption of
have been borrowed from in-presence collaborative multiple perspectives. Groups are generally small (57
contexts, these techniques have also proved effective people) although some strategies feature multilevel
in online learning. Indeed, virtual environments have grouping: for example, small groups in the first stage
features that often enhance the pedagogical potential and the whole cohort in the second stage. A useful rule
offered by such techniques: for example, the possibil- of thumb is that small groups are preferable for more
ity of interaction independent of time and space and structured activities, while brainstorming and free
the chance to reflect on contributions to the discussion discussion are more effective in larger groups. Small
thanks to the permanent nature of computer mediated groups have the following advantages: individual
dialogues. The above mentioned strategies have been participants have more opportunities to contribute to
given different names by different authors: cooperative the discussion, decision making is faster, people get
and competitive learning structures (Kagan, 1990), to know each other better and reach agreement more
instructional methods (Kanuka & Anderson, 1999), easily. Larger groups, on the other hand, bring in more
techniques (Aronson, Blaney, Stephin, Sikes, & people to accomplish a task, more ideas, and a broader
Snapp, 1978), and collaborative learning flow pattern range of skills. They also provide more opportunities
(Hernandez-Leo, Asensio-Prez, Dimitriadis, Bote- for participants to refer to what has been said by oth-
Lorenzo, Jorrn-Abelln, & Villasclaras-Fernndez, ers. In any case, the possibility to alternate different
2005). Dillenbourg (2002) introduces the expression kinds of grouping allows instructional designers to
CSCL scripts and states: A script is a story or take advantage of the strengths of both small and large
scenario that the students and tutors have to play as teams. Table 1 compares the above-mentioned strate-
actors play a movie script. Unlike cinema, however, gies, reporting some critical aspects that usually inform
the designer is like a director who has only a rough idea decision making in instructional design.
of event sequencing and leaves to the creativity of the Studies concerning the adoption of group techniques
actors (learners and tutors) not only the details but also in CSCL show that there are conditions to their effec-
some important decisions regarding the script, the ac- tiveness (Blocher, 2005; Hinze, Bischoff, & Blakowski,
tors roles, and often even the aims of the performance. 2002; Lebaron & Miller, 2005; Renner, 1997). One
Each phase of the script specifies how students should important prerequisite for all collaborative techniques
interact to solve a given problem through a collaborative is that they should promote reciprocal interdependency
activity. Hence, the script includes five elements: the of participants. This means that teamwork should rely
Structure of communication
Target population Time Comments
environment
Time consuming: both phases need time. Allows a cooperative approach,
It is not advisable to use it for the first that is, based on task share-out. As
Does not lend itself to the management of big Each group needs two discussion
activity of a course: people need a good a consequence, it does not always
groups of students, due to the complexity of forums, one for the first phase and one
degree of familiarization with their peers, obtain a fully fledged collaborative
Jigsaw
the approach. for the second.
the learning environment, and mediated process, where people work together
communication to achieve a common aim.
Allows for large student numbers, as each
Fostering Collaboration in CSCL
Peer Review
for each artifact produced in the first Another crucial aspect is related to
need a certain degree of familiarization with
phase. the capacity of people to positively
their peers to provide feedback without
interpret criticism by others.
embarrassment.
Table 1. Comparison of some well known strategies
Role Play
them choose. together with the case study.
themselves with other perspectives. channel.
Case Study
competence and background. Particularly
those elaborated by the participants.
suitable for adult education
Brainstorming
activity.
F
Fostering Collaboration in CSCL
heavily on the contributions of all the members. Inter- conclusIon and Future
dependence of participants can be achieved in different develoPMents
ways, usually by exploiting the nature of the task and of
the content. This happens, for example, when the final The strategies and techniques addressed in this article
product of the learning activity is like a puzzle whose allow designers to organise authentic and meaningful
pieces are the products of individual or small group activities, manage the complexity of the topics at hand,
work and need to be integrated with the other pieces and solve problems related to the number and heteroge-
to come up with something that makes sense. Another neity of participants in a learning community. Similarly
way to promote a fruitful reciprocal interdependency to what happens in face-to-face contexts, appropriately
is when there is a common motivation (e.g., a prize) or designed strategies and their social structures can be
even a competition against other teams. Alternatively, the trigger to fruitful learning dynamics, provided that
role play strategies can be used to encourage partici- they succeed in taking advantage of individual diversity,
pants to analyse a problem from different, and possibly of the wealth of didactic materials, and of the negotia-
complementary, viewpoints (Renner, 1997). tion of meanings, which are the typical ingredients of
Hinze et al. (2002) experimented with the Jigsaw socioconstructivist learning processes. Decisions about
method in the CSCL context and claim that this method what strategy best suits a given context are based on
inherently enforces the interdependence of group mem- heuristic considerations that take into account the dif-
bers, favours the adoption of multiple perspectives, and ferent features of the various techniques, as summarised
fosters team teaching. However, they also pointed out in Table 1. To make the instructional design process
three important conditions that should be fulfilled for as systematic as possible, formalisms that explicitly
this technique to be effective. The first condition is a represent the structure, the organisation, the planning,
good degree of group cohesion that can be achieved and, in general, the strategic decisions taken by the e-
either face-to-face or with suitable getting-to-know learning designer have been investigated (Koper, 2001;
games/activities at the beginning of the learning proc- Koper & Tattersall, 2005). This field of study, called
ess. The second is a reasonably high level of individual learning design, has led to the definition of models and
self-regulation and a full awareness of the tasks to be languages which can support the description and design
carried out: this points to the need to strike a balance of the typical dynamics of a learning process. These
between leaving students free to organise their own also allow the best design practices to be represented,
learning and providing them with guidance. When indi- saved, transferred, shared, and reused, thus promoting
vidual skills and competences are very heterogeneous, awareness of the importance of organizational aspects,
some students might need more tutoring and virtually both at a temporal level (duration, sequence, alternative,
on demand support while others might appreciate the or optional paths) and at a social level (group formation,
freedom to decide how to organise their own learning. role differentiation, learning workflow).
The third condition has to do with the time framework
required for communication, cooperation, and coor-
dination online. Trainers who are used to facilitating reFerences
face-to-face learning may easily underestimate the time
needed to achieve online collaboration. It is believed Aronson, E., Blaney, N., Stephin, C., Sikes, J., & Snapp,
that online techniques often generate deeper learning M. (1978). The Jigsaw classroom. Beverly Hills, CA:
processes, but there is simply no comparison between Sage Publishing Company.
the time needed for a discussion online and a similar
one face-to-face, especially where asynchronous com- Blocher, J. M. (2005). Increasing learner interaction:
munication is concerned. Although these considerations Using Jigsaw online. Educational Media International,
emerged from a study of Jigsaw online, they appear 42(3), 269-278.
to suit most of the techniques that can be used online. Brown, J. S., Collins, A., & Duguid, P. (1989). Situ-
However, more research should be carried out to pro- ated cognition and the culture of learning. Educational
vide instructional designers with solid and systematic Researcher, 18(1), 32-42.
methodological guidelines for the implementation of
collaborative learning techniques online.
Fostering Collaboration in CSCL
Brush, T. A. (1998). Embedding cooperative learning Persico, D., & Sarti, L. (2005). Social structures for
into the design of integrated learning systems: Rationale online learning: A design perspective. In G. Chiazzese, F
and guidelines. Educational Technology Research & M. Allegra, A. Chifari, & S. Ottaviano (Eds.), Methods
Development, 46(3), 5-18. and Technologies for Learning: Proceedings of the
International Conference on Methods and Technologies
Dillenbourg, P. (Ed.). (1999). Collaborative learning:
for Learning. Southampton/Boston: WIT Press.
Cognitive and computational approaches. Pergamon
Press. Renner, P. (1997). The art of teaching adults: How
to become an exceptional instructor and facilitator.
Dillenbourg, P. (2002). Over-scripting CSCL: The risks
Vancouver, BC: The Training Associates.
of blending collaborative learning with instructional
design. In P. A. Kirschner (Ed.), Three worlds of CSCL: Scardamalia, M., & Bereiter, C. (1994). Computer sup-
Can we support CSCL? (pp. 61-91). Heerlen, The port for knowledge-building communities. The Journal
Netherlands: Open Universiteit Nederland. of the Learning Sciences, 3(3), 265-283.
Hernndez-Leo, D., Asensio-Prez, J. I., Dimitriadis, Vanderbilt (Cognition and Technology Group). (1991).
Y., Bote-Lorenzo, M. L., Jorrn-Abelln, I. M., & Vil- Some thoughts about constructivism and instructional
lasclaras-Fernndez, E. D. (2005). Reusing IMS-LD design. Educational Technology, 31(10), 16-18.
formalized best practices in collaborative learning
Vygotsky, L. (1962). Thought and language (E. Hanf-
structuring. Advanced Technology for Learning, 2(3),
man & G. Backer, Trans.). Cambridge, MA.: MIT Press.
223-232.
(Original work published 1934)
Hinze, U., Bischoff, M., & Blakowski, G. (2002). Jigsaw
method in the context of CSCL. World Conference on
Educational Multimedia, Hypermedia and Telecom- Key terMs
munications 2002, 1, 789-794. Retrieved March 3,
2008, from http://dl.aace.org/10212 Brainstorming: A group technique aimed at
enhancing the creativity and the production of new
Kagan, S. (1990). The structural approach to cooperative ideas; it is very useful for finding solutions to problems
learning. Educational Leadership, 47(4), 2-15. when the traditional approach seems to be unsatisfac-
tory. Participants start talking about a topic or a real
Kanuka, H., & Anderson, T. (1999). Using construc-
problem and they are asked to share their opinions
tivism in technology-mediated learning: constructing
freely so that everyone is able to express ideas linked
order out of the chaos in the literature. Radical Peda-
to those already stated. Brainstorming can be carried
gogy, 1(2).
out orally or in a written form, face-to face or online,
Koper, E. J. R. (2001). Modelling units of study from a and is usually moderated. The technique includes two
pedagogical perspective: The pedagogical metamodel phases; the first one is divergent, where the produc-
behind EML. Heerlen, The Netherlands: Open Univer- tion of new ideas is stimulated for a fixed period of
siteit Nederland. Retrieved March 3, 2008, from http:// time; the moderator invites the participants not to pass
eml.ou.nl/introduction/docs/ped-metamodel.pdf judgment or to criticise and tries to enhance the discus-
sion flow. The second phase, the so-called convergent
Koper, R., & Tattersall, C. (Eds.). (2005). Learning
phase, is aimed at selecting and evaluating ideas so as
design: A handbook on modelling and delivering net-
to identify and share the most interesting ones.
worked education and training. Berlin: Springer.
Case Study: A technique based on a problem-based
Lebaron, J., & Miller, D. (2005). The potential of
approach. During a case study, students are provided
Jigsaw role-playing to promote the social construction
with materials describing a concrete, authentic experi-
of knowledge in an online graduate education course.
ence and are asked to critically analyze the case. Often,
Teachers College Record, 107(8), 1652-1674.
learners are asked to propose or collaboratively define
Palloff, R. M., & Pratt, K. (1999). Building learning a possible solution for the examined case, describing
communities in cyberspace. San Francisco: Jossey- the reasons for their choices, and afterwards, they have
Bass Publishers. the possibility to compare their solution to the one
Fostering Collaboration in CSCL
adopted in the real case by experts. As case studies feedback. During the peer review, a reciprocal teaching
are based on real problems, they represent a strong approach is stressed, where ones own interpretation of
link between theory and practice. Furthermore, case reality is to be compared with that of others. Unlike the
studies are narrative forms of thinking as opposed to Jigsaw technique, peer review is not associated with a
abstraction and generalization. For these reasons, case specific social structure per se and can be orchestrated
studies are particularly suitable for adult education, or in different ways so that the reciprocal feedback can be
in any situation where the ability to critically reflect provided either at the individual level or by pairs or even
upon experience is highly developed. among groups. Furthermore, the review process may be
organized in several ways: networked (any entity may
Jigsaw: Suitable when the subject matter is particu-
provide feedback to any other entity), cyclical (entity
larly complex but easily fragmented or analyzed from
A provides feedback to entity B, B to C, C to D, etc.),
different perspectives. It envisages two phases: during
or reciprocal (entity A provides feedback to entity B,
the first phase each of the so-called expert groups
which in turns provides feedback to A).
have to investigate a different aspect of the complex
topic. In the second phase, new groups are formed, Role Play: This technique allows learners to play
called jigsaw groups, each of them composed of one a role in order to assume a particular point of view
representative from each of the expert groups. Within during discussion with colleagues. In online courses,
the jigsaw group, each student is asked to contribute the students are usually asked to analyze materials or
his/her experience to the rest of the group, so that at documents from a particular perspective and to have a
the end all groups get a complete overview of the topic. discussion with other members of the group and reach
Usually, jigsaw groups have to produce an oral or writ- an agreement, maintaining all the while the standpoint
ten presentation, but any other artifact can be chosen if of their assigned role. Role play allows responsibil-
it is able to provide an overall view of the topic. ity to be distributed between the participants and to
take advantage of their individual attitudes, while
Peer Review: Based on a critical analysis by learners
promoting reciprocal interdependence. Authors from
of a product previously realized by peers. Usually the
the radical constructivist approach claim that the role
process includes three phases: during the first stage,
play technique can be used to insert a slice of life
learners are in charge of producing an artifact (a docu-
into the classroom, connect theory with everyday
ment, map, hypertext, etc.); in the second stage, they
practice, practice unfamiliar skills in a safe setting,
are asked to provide feedback to the work done by their
and learn to appreciate contradictory viewpoints
colleagues; during the third phase, learners are asked to
(Renner, 1997).
revise their original product on the basis of the received
0
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
GIS Use in Landscape Archaeology
geographical context of southern Europe, and to try to elements can be examined in their spatial distribu-
evaluate, in an objective way, which are the pros and tion, related and overlapped to environmental fac-
cons, and the problems involved. Instead of presenting tors, such as soil type and quality, land suitability
just one case study, we prefer to refer to a selection of for agriculture and stock raising, micro-climate
good examples and some personal experience. aspects, and so forth, in order to determine which
environmental factors most influenced human occu-
pation patterns, and to develop a diachronic model
bacKground of habitat for each phase.
The archaeological map production within a GIS
The first historical accounts for the use of GIS in environment has enormous potential for combining
archaeology date back to the early 1990s, but ex- disparate data sources: archaeological data, topographic
perimental applications of GIS in archaeology were information and historical cartography, satellite images,
undertaken already in the mid-1980s in the USA (Al- aerial photographs, orthophotomaps, administrative
len, Green, & Zubrow, 1990; Harris, 1986; Kvamme, boundaries and cadastral maps, urbanization areas,
1983; Lock & Stani, 1995), with a dominant inter- soil type and geological maps, hydrology and water
est for Cultural Resources Management, while some resources. This is the crucial pointa GIS differs radi-
of the first European experiences in the late 1980s cally from a computer-aided cartography production
were already approaching landscape analysis (Lock, system (CAM = computer-aided mapping), because it
2003; Lock & Stani, 1995). Over the last few years stores information thematically (Wheatley & Gillings,
the applications have developed spectacularly, both 2002, pp. 25-28). By way of comparison, a geographical
in the availability and capabilities of software, and or topographical map contains a wide range of data re-
in the quantity of relevant projects and case studies lated to many different aspects of the present landscape,
(Berger, Bertoncello, Braemer, Davtian, & Gazenbeek, and links elements of the natural morphology (slope,
2005; Forte, 2005; Gillings & Alii, 1999; Lock, 2000; hydrology, soil quality and geology) to the elements
Petrie, Johnson, Cullen, & Kvamme, 1995; Slapszak connected with the human presence (road-networks,
& Stani, 2000). waterways, buildings, agricultural land-use, political
As stated earlier, this increasing importance is boundaries, etc.). Instead, GIS stores different levels of
partially due to the development of the concept of information in different layers, that can be overlapped
cultural heritage, extended now to include cultural selectivelythey can be turned on or off, according
landscapes, and to the more widespread interdisci- to the query being pursued. Thematic maps are then
plinary approach that landscape archaeology has produced without the problems normally connected
embraced, adopting methods and instruments from with the many different scales and projections of the
geography, geology, earth sciences, information tech- data sources (Cowen, 1987).
nologies, topography, remote sensing, geo-physics, The research undertaken by the University of
spatial analysis, and so forth. Nowadays it seems Cassino (Italy) and the University of Ghent (Belgium)
almost impossible, and surely outdated, to tackle in Corsica, in and around the Roman town of Mariana,
archaeological matters without the support of a GIS, is a case study for some of the possibilities that such an
but unfortunately the growth in availability of GIS integrated work can offer for field archaeology. Here
technologies has not always been associated with the historical and archive data, historical maps, old and
a parallel increase in the knowledge and technical present day cadastral maps, old site plans and early
skills of archaeologists. aerial photographs are integrated with data from recent
field survey, geomorphologic observations, geological
and soil maps, oblique aerial photography, geophysical
gIs In archaeology research and excavations (Corsi & Vermeulen, 2007).
The overlaying of all these data, spatially referenced
The innovation and the power of GIS lie in the capac- in the GIS, allows us to deeply evaluate the stratig-
ity to link mapped objects to a database, combining raphy of rural and urban landscape, to identify much
the graphical display of archaeological records with information on the monumental setting of the town
database query and analysis tools. Archaeological and its street network, to recover many elements of the
GIS Use in Landscape Archaeology
ancient land division and location of Roman farms, to ancient Caere, in Italy, just north of Rome, remains a
detect the role of landmarks and to answer the main very good example of integration between scientific G
research questions. The first of these is concerned research and GIS Web presentation. The main focus of
with a reconstruction of the ancient landscape around the Caere Project is to enable user interaction through
Mariana. The second question is more specific and the Internet, by offering the possibility of querying the
concerns the precise location and especially the extent excavation plans at any scale, starting either from the
of the Roman town, while the study of the intra-mural cartographic data or the textual information contained
urban patterns, such as roads, public space, location in the excavation diaries. The system has a client-server
and character of housing, is the subject of the third architecture that also requires middlewarea program
theme of research. that sends the processed data from the server to a
As elaborated applications of GIS in the field of client for whom no processing is necessary. Initially
archaeology date back more than 15 years, the ap- developed for use on an intranet, with access provided
proaches vary considerably. In most of the projects, only to specialists working on the project, the system
GIS are applied using existing products, selected from has been transformed into an online GIS, by mean of
among the wide variety available, on the basis of the the use of the software package MapGuide 5 (Au-
characteristics and specificities of the softwaremainly todesk) (Kvamme, 1998; Moscati, 2002; Moscati &
the ODBC data sources to link databasesand the Tagliamonte, 2002).
methodology and scientific approach of the project. In The introduction of GIS integrated technologies has
a few cases, GIS software is specifically elaborated for also radically affected the methodology of landscape
archaeological mapping (Evans & Daly, 2006; Lock, archaeology in the different stages of a research project.
2000). Integration of methodologies guarantees in all In fact, some aspects of these research activities are now
these products the essential link between the database requested to be more objectively, almost mathemati-
with different formats of information (text, image, mul- cally based, primarily in the selection of the areas that
timedia) and the different types of spatially referenced will be surveyed as relevant samples, and essentially
cartographies, stored both in raster or vector format. during the process of field data recording (Johnson &
The most classical application of a GIS is therefore MacLaren North, 1997; Wheatley & Gillings, 2002).
its use as an instrument to store and manage a huge Starting from the most basic operations, the location
amount of data, spread over large geographical areas, of the archaeological record on the terrain has to be
where rapid queries, sorting and presentation of results very accurately registered and spatially referenced with
are easily accessible, keeping the option of zooming and coordinates in the agreed projection system, in most
scanning across the map to a particular area of interest. cases with a GPS instrument (Vermeulen, De Dapper,
This use is essential in cultural resource management & Brackman, 1998).
(CRM), a society-based application that needs to know Even more drastically, the manipulation and analysis
what archaeology is where (Lock, 1998). GIS will also tools for spatial data that constitute the defining char-
supply specialists with a wide array of tools for the acteristics of a GIS have affected the methodology for
documentation and analysis of archaeological excava- investigating spatial distribution of phenomena and
tions. Computer technologies can be of great help in have generated a dramatic change in the traditional
mapping archaeological features or artifacts distribution approaches to exploring spatial patterns and relation-
and in combining disparate data-recording systems, ships. In practice, with GIS, the evaluation of certain
such as detailed trench plans and architectural draw- historical aspects and trends relies not only upon dis-
ings. Therefore all the institutions devoted to cultural tribution maps elaborated just by sorting information
heritage preservation ought to acquire efficient systems from the database or with the support of mathematic
that are easy to handle, implement, and interrogate. and statistical methods for spatial analysis, but implies
This approach allows procedures for analysis as well computer-aided data processing that can integrate
as for presentation of scientific results, both at the spe- many more levels of information (Ebert, Camilli, &
cialist level and for the wider audience (Djindjian, 1998; Berman, 1996).
Garca Sanjun & Weatheley, 2002). In this respect, ICTs are being employed to make archaeology
the GIS application performed in the Caere Project, accessible to the general public and the possibility
focused around the Etruscan town and necropolis of of performing interactive queries and making use of
GIS Use in Landscape Archaeology
multimedia databases has been exploited to sensibly available in GIS software, and their use is more and
increase the effectiveness of communication and to more feasible. This possibility of visually and virtually
deepen the understanding process (Lock, 2003, pp. 219- recreating a rural or an urban landscape or a monumen-
230). For instance, 3D digital terrain models (DTM) tal scene can be exploited in the CRM contexts as in
and digital elevation models (DEM) of the landscape the scientific analysis process, better evidencing and
can be created by digitalizing the map contour lines. displaying the complexity of different matrix factors
These more immediate models can be very helpful in and the interactions of levels, but it is mostly used to
understanding the topography of a region and in its explore the relationships of visibility and intervisibility
evolution through the ages, for specialists as well as among selected archaeological locations in the land-
non-specialists (Johnson & MacLaren North, 1997; scape (Loots, 1997, for a case study of this application
Raper & Kelk, 1991), making it possible to correlate in Sagalassos, Turkey).
site locations with the environmental variables and
facilitating further analyses. archaeological site Modeling
GIS Use in Landscape Archaeology
GIS Use in Landscape Archaeology
limits, have often been constructions of computer-based of local communitiesthese are only some aspects of
systems that are not historically based and that cannot the crucial challenge that will hopefully see cultural
be used either in understanding or in preserving cul- landscapes at the centre of any future planning for a
tural landscapes because of their poorly documented sustainable development.
resources and misleading conclusions (Wheatley & GIS and the wider family of Information and Com-
Gillings, 2002). munications Technologies have also given more dy-
With Conolly and Lake (2006), we can admit the namism to the world of archaeologists, who can much
study of GIS has now matured to the point where non- more easily interact with each other and hence can more
specialists can take advantage of relatively user-friendly easily enter into scholarly debates and controversies.
software to help them solve real archaeological prob- The large number of Web sites dedicated to fora for
lems... Nevertheless, the widespread adoption of GIS discussion of matters connected with GIS applications
brings with it several dangers. The most problematic in the field (e.g., www.gisarch.com; www.esri.com/
is that modern GIS packages offer users a variety of industries/archaeology/index.html), the availability
powerful tools that are easily applied, without providing of readily-accessible documents with suggestions for
much guidance on their appropriateness for the data or enhancement or expansion of the software and the real-
the question at hand. time scientific debate on the Internet have given rise to
Once again, the error could be identified in the a new community of research (Weatley & Gillings,
misunderstanding of qualifying instruments of research 2006), where finally the Sciences of Antiquity are no
as the final objective of the research. In Landscape longer confined to a marginal role.
Archaeology, as well as in many other disciplines,
computer-based applications should be used to acquire,
process, present and transfer knowledge, in our case reFerences
history-based knowledge, but they cannot replace the
solidity of individual experience, correctness of the Allen, K. M. S., Green, S. W., & Zubrow, E. B. W
methodology and tightness in the critical principles of (Eds.) (1990). Interpreting space: GIS and archaeol-
the research. The basic value of this methodology should ogy. London: Taylor & Francis.
not be called into question, however, as the introduc-
tion of GIS has given us an extraordinary instrument Atkinson, P. (2002). Surface modelling: Whats the
to understand past processes comprehensively and, in point? Transaction in GIS, 6, 1-4.
time, to explain them better (Vermeulen, 2000). Bailey, T. C. & Gatrell, A. C. (1995). Interactive spa-
All the projects selected in this presentation and so tial data analysis. Harlow: Longman Scientific and
briefly framed above have this in common: GIS has Technical.
been treated as just one toolalbeit one very power-
ful oneamong the many that may be deployed for Berger, J.-F., Bertoncello, F., Braemer, F., Davtian, G.,
archaeological purposes (Conolly & Lake, 2006), and & Gazenbeek, M. (Eds.) (2005). Temps et Espaces de
it will now be clear that this is our position too. lHomme en Socit. Actes des rencontres. Antibes,
The introduction of GIS in landscape archaeol- France. Antibes: ditions APDCA.
ogy, as in other fields, has created opportunities and Binford, L. R. (1989). The New Archaeology then
posed obstacles. Increasing costs of equipment vs. less and now. In C. C. Lamberg-Karlovsky (Ed.), Archaeo-
resources for active research, more technical skills re- logical thought in America (pp. 50-62). Cambridge:
quired versus a solid classic formation, more attention Cambridge University Press.
paid to the theoretical elaboration vs. the urgency of the
rescue activity in the field, more visibility for special- Binford, L. R. & Binford, S. R. (Eds.). (1968). New
ists work vs. the traditional isolation of the scientific perspectives in archaeology. Chicago: Aldine.
world, the dangers of automation of data processing Campbell, E. (1995). The development of a CAL mul-
vs. the possibility of managing a wealth of informa- timedia tutorial system for archaeology undergraduate
tion, the seeking for spectacular results vs. the critical teaching. In J. Wilcock & K. Lockyear (Eds.), Computer
processing of the data, the simplification in knowledge applications in archaeology (pp. 217-220). Oxford:
transferred to the public vs. a much deeper involvement Tempus Reparatum.
GIS Use in Landscape Archaeology
Clarke, D. L. (1968). Analytical archaeology. London: Gillings, M., Mattingly, D., & van Dalen, J. (1999).
Methuen. Geographical information systems and landscape G
archaeology. Oxford: Oxbow books.
Clarke, D. L. (Ed.). (1977). Spatial archaeology. Lon-
don: Academic Press. Hansen, D. T. (2006). Describing GIS applications:
Spatial statistics and weights of evidence extension to
Conolly, J. & Lake, M. (2006). Geographical informa-
ArcView in the analysis of the distribution of archaeol-
tion systems in archaeology. Cambridge: Cambridge
ogy sites in the landscape. Retrieved March 16, 2008,
University Press.
from http://www01.giscafe.com/technical_papers/Pa-
Corsi, C. & Vermeulen, F. (2007). Digital vs. historical pers/paper054/
cartography for studying archaeological sites: A case
Harris, T. M. (1986). In Proceedings of Computer
study from Corsica. In W. Brner (Ed.), In Proceed-
applications in Archaeology 1986. Computer Centre:
ings of the 11th Workshop Archologie und Computer.
Birmingham University.
Kulturelles Erbe und Neue Technologien.
Johnson, I. & MacLaren North (Eds.). (1997). Ar-
Cowen, D. (1987). GIS versus CAD versus DBMS:
chaeological applications of GIS. In Proceedings of
What are the differences? Photogrammetric Engineer-
Colloquium II, UISPP XIIIth Congress, Forli Italy
ing and Remote Sensing, 54, 1551-1555.
September 1996. Sydney: University of Sidney.
Djindjian, F. (1998). GIS usage in worldwide archae-
Kvamme, K. L. (1983). Computer processing techniques
ology. In P. Moscati (Ed.), Methodological trends
for regional modelling of archaeological site locations.
and future perspectives in the application of GIS in
Advances in Computer Archaeology, 1, 26-52.
archaeology (pp. 19-30). (Archeologia e Calcolatori
9). Firenze: AllInsegna del Giglio. Kvamme, K. L. (1990). The fundamental principles and
practice of predictive archaeological modelling. In A.
Douglas, D. H. & Boyle, A. R. (Eds.). (1982). Com-
Voorips (Ed.), Mathematics and information sciences
puter assisted cartography and information processing:
in archaeology: A flexible framework (pp. 257-295).
Hope and realism. Ottawa: Canadian Cartographic
Studies in modern archaeology. Bonn: Holos-Verlag.
Association.
Kvamme, K. L. (1998). GIS in North American archae-
Ebert, J. I., Camilli, E. L., & Berman, M. J. (1996).
ology: A summary of activity for the caere project. In
GIS in the analysis of distributional archaeological
P. Moscati (Ed.), Methodological trends and future
data. In H. D. G. Mascher (Ed.), New methods, old
perspectives in the application of GIS in archaeology
problems: Geographic information systems in modern
(pp. 27-146). (Archeologia e Calcolatori 9). Firenze:
archaeological research (pp. 25-37). Carbondale, IL:
AllInsegna del Giglio.
Centre for Archaeological Investigations, Southern
Illinois University at Carbondale. Lafkin, S. & van Leusen, M. (Eds.) (1999). Archaeol-
ogy in the age of the internet: Computer applications
Evans, T. L. & Daly, P. (Eds.) (2006). Digital archae-
and quantitative methods in archaeology 1997. (BAR
ology. Bridging method and theory. Oxon-New York:
International Series S750). Oxford: Archeopress.
Routledge.
Lock, G. (1998). The past, present and future of GIS-
Forte, M. (Ed.). (2005). Archaeological landscapes
based cultural landscape research. In J. Peterson (Ed.),
through digital technologies. In Proceedings of the 2nd
The use of geographic information systems in the study
Italy-United States Workshop (Rome, Italy, November
of ancient landscapes and features related to ancient
2003 Berkeley, USA, May 2005). BAR International
land use (pp. 31-36). Workshop proceedings, Ljubljana,
Series 1379. Oxford: Archaeopress.
27 April 1996. Luxembourg.
Garfield, G. M. & McDonough, S. (1997). Dig that site.
Lock, G. R. (Ed.), (2000). Beyond the map: Archaeol-
Exploring archaeology, history and civilization on the
ogy and spatial technologies. NATO sciences series A:
internet. Englewood: Libraries Unlimited Inc.
Life sciences. Amsterdam: IOS Press.
GIS Use in Landscape Archaeology
Lock, G. (2003). Using computers in archaeology. Lon- Raper, J. F. & Kelk, B. (1991). Three-dimensional
don: Routledge (Taylor & Francis group). GIS. In D.J. Maguire, M.F. Goodchild, & D.W. Rhind
(Eds.), Geographical information systems: Principles
Lock, G. (2006). Computers, learning and teaching in
and applications Volume I (pp. 299-317). London:
archaeology: Life past and present on the screen. In T. L.
Longman.
Evans & P. Daly (Eds.), Digital archaeology. Bridging
method and theory (pp. 226-235). Oxon-New York: Richards, J. D. (2006). Electronic publication in ar-
Routledge. chaeology. In T.L. Evans & P. Daly (Eds.), Digital
archaeology. Bridging method and theory (pp. 213-
Lock, G. & Stani, Z. (Eds.). (1995). Archaeology
225). Oxon-New York: Routledge.
and geographical information systems: A European
perspective. London: Taylor and Francis. Sanders, J. C. & Sanders, M. P. (2000). Archaeological
site modelling. (The Oriental Institute of The University
Madry, S. & Rakos, L. (1996). Line-of-sight and cost
of Chicago) University of Chicago. Retrieved March 16,
surface techniques for regional archaeological research
2008, from http://oi.uchicago.edu/OI/DEPT/COMP/
in the Arroux River Valley. In H. D. G. Maschner (Ed.),
Site_Modelling.html
New methods, old problems: Geographic information
systems in modern archaeological research (pp. 104- Slapszak, B. & Stani, Z. (Eds.) (2000). On the good
126). Center for Archaeological Investigations, Oc- use of GIS in ancient landscapes studies. In Proceed-
casional Paper No. 23. Carbondale: Southern Illinois ings of International Workshop Ljublijana 1998.
University at Carbondale. Luxemburg: OOPEC.
Moscati, P. (Ed.) (1998). Methodological trends and Veljanovski, T. & Z, Stani (2006). Predictive model-
future perspectives in the application of GIS in ar- ing in archaeological location analysis and archaeologi-
chaeology. (Archeologia e Calcolatori 9). Firenze: cal resource management: Principles and applications.
AllInsegna del Giglio. In M. W. Mehrer & K. L. Wescott (Eds.), GIS and
archaeological site location modeling (pp. 393-411).
Moscati, P. (2002). From an Etruscan town to modern
Boca Raton: Taylor and Francis.
technologies: New advancements in the Caere Project.
In F. Djindjian & P. Moscati (Eds.), XIV congress of Vermeulen, F. (2000). The potential of GIS in landscape
the UISPP, Commission IV data management and archaeology. In B. Slapszak & Z. Stani (Eds.), On
mathematical methods in archaeology. In Proceedin- the good use of GIS in ancient landscapes studies. In
gs of Symposia 1.3, 1.5, 1.8, 1.10 (Lige 2001) (pp. Proceedings of International Workshop Ljublijana 1998
135-149). (Archeologia e Calcolatori, 13). Firenze: (pp. 9-16). Luxemburg: OOPEC.
AllInsegna del Giglio.
Vermeulen, F., De Dapper, M., & Brackman, P. (1998).
Moscati, P. & Tagliamonte, G. (2002). GIS applications A GIS-based geo-archaeological approach to survey
in Italian archaeology: The results of a survey and in a central-Anatolian landscape. In J. Peterson (Ed.),
the development of the Caere Project. In L. Garca The use of geographic information systems in the study
Sanjun & D.W. Weathley (Eds.), Mapping the future of ancient landscapes and features related to ancient
of the past. Managing the spatial dimension of the land use. In Proceedings of Workshop proceedings
European archaeological resource. In Proceedings of Ljubljana 1996 (pp. 63-80). Luxembourg.
the European Workshop (Sevilla 1999) (pp. 75-83).
Voorrips, A. (1997). Archaeological theory and GIS:
Sevilla: Universities of Sevilla and Southampton and
Any relationship? In I. Johnson & N. MacLaren
Andalusian Institute of the Historical Heritage.
(Eds.), 1997. Archaeological applications of GIS. In
Petrie, L., Johnson, I., Cullen, B., & Kvamme, K. (Eds.) Proceedings of Colloquium II, UISPP XIIIth Congress,
(1995). GIS in archaeology, An annotated bibliography. Forli Italy September 1996. Sydney: University of
Sydney University Archaeological Methods Series 1. Sydney.
Retrieved March 16, 2008, http://www.esri.com/indus-
Westcott, K. L. & Brandon, R. J. (Eds.) (2000). Practi-
tries/archaeology/papers.html)
cal applications of GIS for archaeologists: A predictive
modelling kit. London: Taylor and Francis.
GIS Use in Landscape Archaeology
Wheatley, D. (2003/2004). Making space for an archae- GIS: A geographic information system or geo-
ology of place. Internet Archaeology, 15. graphical information system (GIS) is, in the strictest G
sense, a computer-based technology for acquisition,
Wheatley, D. & Gillings, M. (2002). Spatial technology
storage, integration, manipulation and analysis of
and archaeology. The archaeological applications of
spatial data and associated attributes. In a more ge-
GIS. London: Taylor and Francis.
neric sense, GIS is not only a system that presents
information about geographic space, but mostly a tool
KeyWords that allows users to create interactive queries (user
created searches), analyze the spatial information,
CAD (Computer Aided/Assisted Design/Draw- and edit data.
ing): Vector-based software that assembles data consist-
GPS: The global positioning system (GPS) is a
ing in points, lines, volumes and instructions. Images
worldwide radio-navigation system formed from a
(plans, maps, drawings, axonometric views, etc.) are
constellation of 24 orbiting satellites (US Department
built within a referencing coordinates system and data
of Defense) and their ground stations. GPS receivers,
are usually displayed in layers. That permits rotation,
nowadays sufficiently reliable, easily transportable
inversion, panning, zooming and navigation thought
and reasonably priced, exchange radio signals with the
the structures. As since the late 1980s CAD has de-
satellites that are orbiting above the area concerned,
veloped three-dimension functionalities, the mark-line
and estimate the coordinates position whose accuracy
between Computer Design and other three-dimensional
varies of the orders of meters or even centimeters.
modeling programs has started to blur.
Landscape Archaeology: Branch of archaeology
Cultural Resource Management (CRM): The
that aims at the historical reconstruction of settlement
entire set of operations involved in investigating, record-
dynamics and settlement patterns, resources exploita-
ing, handling and protecting the Cultural Heritage by a
tion modalities and ecological transformation in the
series of institutions, agencies, associations, adminis-
course of time, and traces sequences of interactions
trators and individuals. CRM is nowadays intended in
between human occupation and environmental phe-
a wider meaning, as it includes not only artifacts and
nomena.
monumental structures but also all the traces that the
past has left in and around the human habitat. Spatial Data Analysis: A set of techniques, rang-
ing from those of the statistics to those of locational
DEM/DTM: Digital elevation and digital terrain
modeling, that allows statistical tests of spatial data
models of the earth surface, that take into account not
and analyzes their patterns of distribution.
only the topographic height of the terrain (normally
expressed in meters above sea level) but also any varia- Survey and Sampling: archaeological practice aim-
tion over the land surface. Most of DEM and DTM are ing at systematically recording archaeological sites and
produced extracting and processing the contour and elements that are still perceptible on the terrain, under
height information in topographical maps and aerial the form of still visible structural remains, earthworks
photography, but any measurable landform and any or scattered artifacts. Survey is a fundamental inves-
physical characteristic of a landscape can be elaborated tigative method of Landscape Archaeology, aiming to
in a DTM (e.g., pottery distributions or land-division collect data about ancient settlement distribution and
elements). to locate unknown archaeological sites and features
without recourse to excavation. Given the usual exten-
sion of the area to cover, only few sectors of it could
be sampled or selected by means of random choice or
a complex statistical analysis.
0 Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Higher Educations New Frontier
Table 1. Participation of the Italian university system Figure 1. Percentage of the universities reporting the
in the survey presence of an e-learning policy H
Universities %
Universities which filled in the
59 76.6
questionnaire
Universities which didnt fill in
18 23.4
the questionnaire
Total 77 100.0
Absolute
The results of the investigation were published in Number of e-learning centers %
value
2006 and are available online on the Website of the
One 26 33.77
CRUI (2006).
In what follows some data on the participation in Two 14 18.18
the survey of the Italian universities is reported and More than three 19 24.68
the information considered relevant for what follows
is discussed.
In Table 1 the percentage in the distribution of Ital-
ian universities in the survey is shown. The only remark on the data in Table 2 is the lack
When limiting to the universities participating in of completeness of the same data, because it cannot
the survey (59 on 77) it emerged that only 64% among be automatically deduced that universities which did
them (i.e., 49% of total number of universities) stated not answer to the survey did not have one or more e-
that they had an e-learning policy. Figure 1 depicts the learning centre (they could have them in the faculties
percentage of universities reporting the presence of an or in other structures).
e-learning policy. At last when asked to indicate if research activity
It has to be noted that assuming 51% of the univer- was made on e-learning and ICT use in the university
sities without an e-learning policy is realistic because only 49% among them declared they had this activity
the lack of an answer to the survey is widely synonym in their agenda (i.e., 37,55% of the universities).
of a lack of policy on e-learning. Figure 3 reports how universities make or plan to
Furthermore the presence of ICT centres has been make research on e-learning and ICT use in education in
investigated and 84% of the universities answering to the Italian universities which answered to the survey.
the survey declared the existence of at least one structure It is clear from the data reported until now how
of this kind (i.e. 64,37% of the Italian universities). complex is the context of the e-learning presence
In Figure 2 is reported the graphic of the distribution. in Italian traditional universities where e-learning is
This datum has to be completed with the number of present in single structures and is object of study and
ICT centers in the Italian universities as reported in research but is not an integral part of the university
Table 2. management strategies in teaching.
Higher Educations New Frontier
Figure 2. Percentage of the universities reporting the c. Whatever distance education strategy the Univer-
presence of an ICT center sity uses for its courses it has to guarantee and
verify the presence of the students at the ending
examinations (both in single courses and final
theses).
e-learnIng In euroPean
unIversItIes and the euroPean
coMMIssIon InItIatIves
Higher Educations New Frontier
for evaluation, validation and recognition of the The starting point for the revision work has been the
acquired competences (on a national basis), set of the projects funded from the Education, Audiovi- H
Large scale experiences on virtual mobility to- sual & Culture Executive Agency (EACEA). The list
gether with the physical mobility, of the projects as they were approved and funded in
The development of innovative study curricula three different years is reported in Table 3.
based both on traditional learning methods and It has to be noted that in the 2006 call for proposals
on line methods. within the eLearning Programme, the EACEA stated
that two priorities had been retained for the call:
To the whole set of the above aspects in the context
of the e-learning program the European Commission 1. Systematic critical review of existing virtual
gave the name of European Virtual Campuses (not- campus projects or experiences, including their
withstanding the absence of a well settled definition valorisation in terms of sharing and transfer of
of virtual campus). know-how, with an eye to supporting deployment
In what follows the reports from the European strategies at a European level,
Commission on virtual campuses will be analyzed in 2. Support for the dissemination or replicable solu-
a great detail due to the relevance they have on the tions to help set up virtual campuses at European
e-learning development plan. level and to establish a community of decision-
In the consultation workshop held in Brussels on makers.
23 November 2004 (EC, 2005a) three definitions
rd
emphasising different aspects of a virtual campus The above list does not exhaust the e-learning initia-
were proposed: tives in Europe and, whats more, do not include the
many e-learning experiences all over the world. It is
Collaborative perspective, denoting ICT-based beyond the aims of this work the detailed analysis of
collaboration of different partners supporting both all the e-learning experiences and of the great deal of
learning and research in a distributed setting, virtual campuses projects, but the following examples
Enterprise (economic) perspective, denoting can help in better understanding the e-learning impact
an ICT-based distributed learning and research on education:
enterprise.
Networked organization perspective, denoting an Virtual campuses involving universities in regions
environment which augments and/or integrates which had no or less contacts for a long time have
learning and research services offered by different been planned and carried out (like the Baltic Sea
partners. Virtual Campus where universities from Poland,
Estonia, Latvia, Russia, Finland, and so forth coop-
At the workshop held in Brussels on 11th October erate in the development of master programs)
2005 (EC, 2005b) to explore the issues associated with Virtual campuses based on the use of virtual re-
Virtual Campuses (VCs), one of the four key themes of ality environments are available on the Net (the
the EUs eLearning Programme, the need for a critical Nanyang University in Singapore is one of the
review of existing projects in this area was identified. most interesting examples on this regard),
The workshop identified a range of issues that affected International scientific institutions like ESA (Eu-
the successful implementation and deployment of VCs ropean Space Agency) and NASA (USA Space
and their long-term sustainability. Agency) created virtual campuses for employers
Among the conclusions of the European commission training and for cooperation among scientists all
is that if e-learning and VC initiatives are to be sustain- over the world.
able within the EU, then it is vital that stakeholders
understand how new models of teaching and learning
transform the institution and how they can be used to
enhance the flexibility and inclusiveness of the Euro-
pean education system.
Higher Educations New Frontier
Table 3. List of EACEA virtual campuses projects in 2004, 2005 and 2006
conclusIon and Future trends Deep organizational changes are needed to face
the requirements for high quality continuous
The experiences reported in the former paragraphs education,
give a snapshot of the changes induced from ICT in Digital literacy is a need for actual and future
High Education and confirm (whenever the need for a generations.
demonstration was required) that:
Until now it can only be deduced that a lot of
Times and spaces of high education are rapidly experiences, involving at different levels e-learning
changing, instruments and strategies, are available and they are
Higher Educations New Frontier
well summarized in the image from P.C. Rivoltella Galliani, L., Costa, R., Amplatz, C., & Varisco, B.
(2004) in figure 4. M. (1999). Le tecnologie didattiche. Lecce: Pensa
Multimedia.
Rivoltella, P. C. (2004). E-learning e didattica, tra
reFerences
tradizione e cambiamento. Unpublished presentation
in the workshop Tecnologie dellinformazione e della
CRUI (2006). University towards e-learning: A focus on
comunicazione e nuovi orientamenti pedagogici, held
Finland, France and Italy. Retrieved March 17, 2008
in Cassino (Italy), Jan 13, 2004.
from http://www.crui.it//data/allegati/links/3143/E-
LUE%202006%20ita.pdf
CUN (2005). Document on telematics universities ap- Key terMs
proved on Oct 27, 2005. Retrieved March 17, 2008, from
http://www.med.unifi.it/SEGRETERIA/notiziario/al- Blended Learning: The combination of at least two
legati/universita_telematiche.rtf different approaches to learning. It can be accomplished
through the use of virtual and physical resources, i.e.,
European Commission - DGEC (2005a). The e for
a combination of technology-based materials and face-
our universities Virtual campus, organisational
to-face sessions used together to deliver instruction.
changes and economic models. In Proceedings of the
Report on the Consultation workshop held in Brussels Bologna Process: European reform process aiming
on 23rd Nov 2004. Retrieved March 17, 2008, from at the creation of an High Education European Space
http://ec.europa.eu/education/archive/elearning/doc/ within 2010. Actually it includes 45 countries and many
workshops/virtual%20campuses/report_en.pdf international organizations. It pursuit the organization
of the national High Education Institutions so that: (a)
European Commission - EC (2005b). Virtual campuses.
curricula and degrees are transparent and readable, (b)
In Proceedings of the Report on the Consultation
students can make their studies wherever they want in
workshop held in Brussels on 11th Oct 2005, retrieved
Europe, (c) European High Education can attract extra-
March 17, 2008 from http://ec.europa.eu/education/ar-
European students and (d) an high quality knowledge
chive/elearning/doc/workshops/virtual%20campuses/
base for the social and economic development of Europe
report_2005_en.pdf
is made available.
Higher Educations New Frontier
Brick and Click University: A definition of univer- Virtual Learning Environment (VLE): A software
sity which is derived from a business model (bricks-and- system designed to help teachers in the management
clicks). In that model both offline (bricks) and online of educational courses. The system can often track and
(clicks) activities and presences are integrated. monitor the students operations and progress. It is often
used to supplement face-to-face classroom activities.
Instructional Technology: A growing field of
study based on the use of technology as a means to Virtual University: Sometimes called telemat-
solve educational challenges, both in the classroom ics university is an organization that provides higher
and in distance learning environments. Resistance from education on the Internet. Among these organizations
faculty and administrators to this technology is usually there are truly virtual institutions, existing only as
due to the fear in the reduction of human presence in aggregations of universities, institutes or departments
education it is hypothesized to induce. providing courses over the Internet and organizations
with a legal framework, yet named virtual because they
Lisbon Conference: Held in January 2000 (in Lis-
appear only on the Internet.
bon) and underlined the aim of making the European
Union the most competitive and dynamic society of the
world, based on innovation and knowledge.
Section: Context ICT
bacKground all over the world and take part in collective cultural
processes. The Internet is made up of interconnected
In Italy, as in other European countries such as Germany nodes without a centre. It encourages the growth of new
and France, the words multicultural and intercul- trans-national communities on various levels, ranging
tural have distinct meanings1. In some ways the pas- from the political and professional to the scientific. It
sage the one from the other indicates the evolution of produced some elements of standardization, such as
a concept that, when examined in detail, forces us to the use of a single language, English and has lead to
re-examine educational political, and cultural choices uncommon social contacts on a worldwide level. At
in a society. the same time however, these new communication
In Italy, especially in the field of pedagogy, the technologies can also be viewed as a further cause of
term multicultural indicates a situation where cultures the divide between those who can access information
co-exist side by side but as yet, have not found a means and participate in the creation of knowledge and those
of comparison and relating to each other . <>. The who cannot.
term intercultural, which originated in France and then
spread to other European countries, on another hand,
describes a situation of interaction between different Focus
cultures, often describing a prospect, a possible point
of arrival or an objective to strive for; a situation in The concept of freedom of access to information is
which the people of different cultures begin to open up an integral part of the philosophy and history of the
to reciprocal relationships, thereby bringing about the Internet. It is also guaranteed by the characteristics of
possibility of integration, characterised by a political computer mediated communication and tools such as
and cultural pluralism which aims at reciprocal respect e-mail, forums, mailing lists, blogs and portals. CMC
and appreciation between the respective cultures2. With has changed the concept of communication itself.
Multiculturalism, people accept to live with those from Leaving behind the one-way logic of communicator-
other cultures with tolerance but without promoting receiver (typical of traditional mass media) the situa-
forms of exchange and democratic co-existence. The tion has become one where individuals are nodes in a
form of social organization that derives from this is that network, part of an interconnected environment. The
of the melting pot which encourages the development individual has the active role of social participant in
of ghettos or Little Italy and China towns. However communication rather than being a passive consumer
the Intercultural approach is reciprocal. It is for those (as in the case of television).
who accept and listen, those who are tolerant, those In addition to this, there are a number of new op-
who are not afraid of contamination but constantly portunities available for the user. It is now possible to
seek to mediate between different points of view and influence the information circuit significantly. People
backgrounds. can provide information as well as obtain it, they can
Among various other factors, it is globalization, teach as well as learn and participate not only as an
encouraged by new communication and information individual, but as part of a group. From the moment
technologies, that has contributed to the transformation a person becomes aware of this new communicative
of contemporary world-wide society into a multicultural reality and has the possibility of taking part in it, he or
society. These technologies have made it possible to she possesses new rights and also responsibilities. The
communicate easily and at low cost with every corner of rights include the opportunity to access the Web and its
the planet. We can observe events which are taking place contents independently of limits (economic, time, and
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
ICT and Interculture Opportunities Offered by the Web
movement) and diversity (cultural, social, cognitive, or very universities that finance the research and believe
physical). To this we can add the right to learning. This in the principle of free access to information, they are
must take into consideration, not only the acquisition potentially useful to everyone from college students in
of technical and procedural knowledge but also cogni- America to the doctor in a hospital in Tanzania
tive, emotive and social competences which are needed Thus we can state the Internets contribution to
in order to participate with full awareness in a form interculturalism has manifested itself in three ways:
of communication which is also building knowledge. the creation of a cyber-culture; in a new concept of
There also the ever present problem of standardized knowledge; and in the participation from below in
positions, so the individual must be aware of personal the building of learning:
expectations and needs, and adopt a critical, construc-
tive attitude and be able to question, make hypotheses, Internet as a place of communicative interaction
choices and checks. Moreover, it is necessary to do this and universal culture.
in a social setting which requires emotional control and
an ability to collaborate, mediate and negotiate. For Lvy, what is interesting about cyber-culture is the
The communicative environment is that of the Web coming together of all differences and heterogeneity.
where the passage between the exchange of informa- He believes in the ability of cyberspace to bring out
tion and the building of knowledge is potentially fast, the best of human intelligence in every person through
thanks to the network that allows for an exchange rather communicative relationships which create a collective
than a one-way flow of information. This environment intelligence and a cyber-culture. In this sense we can
is one of democratic co-existence based on mutual assert that cyber-culture is both a transculture and an
respect. It appreciates individuality and cultural and inteculture, since it is universal without being oppres-
social diversity. At the same time the right to access is sively uniform.
also accompanied by certain responsibilities towards If we take cyberspace to be the location, then com-
others. Anyone who takes part in this communicative munication is the means that permits the creation of
process becomes an adherent of the philosophy of this collective intelligence and cyber-culture. Computer
Internet. As a direct consequence of its genesis and users can communicate with each other in a novel way
evolution, it appears to be more closely associated on the Internet since they can be more than mere passive
with the technology of freedom rather than that of users and isolated consumers like todays television
control, and with democratic relationships rather than viewers. Communication is not limited to one to one
ideological imperialism. exchange. In cyber culture it is reciprocal, interactive
There are various types of free information on the and communitarian. Moreover it is universal as anyone
web today. They can be placed into two categories: new can be an active communicator. The expansion of inter-
forms of news agencies and new forms of publishing. connections displays the fact that there is one general
Both fit into to the intercultural and democratic view humanity. This is what Levy means by universal: the
which requires free information, originating from idea of universality in the Enlightenment sense of the
below that is, from all the links in the network, com- word, where our goal is the unity of human kind and
bined with fast transmission speeds and a high level the affirmation of universal principles such as the rights
of diffusion. Examples of the first category are blogs of Man. All human beings can come into reciprocal
and more organised agencies such as Misna, an interna- contact virtually and become conscious collectively
tional press agency run by congregational missionaries of their existence. The more we add links, the more
in Africa, Asia, Latin America and Oceania. Though diverse and heterogenic material is circulated on the
possessing few resources it can boast many successes net. Humanity is becoming aware of itself (universal-
and has earned recognition after only a brief period of ity) but this awareness has no one meaning. It does
activity including the award of the St Vincent 2002 not pass through one central point and is not bound
journalism prize3. by any set of laws unlike science where, for example,
The archives of scientific literature (papers, journal universal gravitation is the same everywhere. What is
articles, addresses made at conferences) are another interesting in cyber-culture is the bringing together of
important example of freely available information on the all differences and heterogeneity
Net. Offered in an electronic format at no cost, by the
ICT and Interculture Opportunities Offered by the Web
Internet as a location for new knowledge which Internet as a place for forming an opinion, ex-
is open, complex, multidisciplined, individual, and pressing a critical judgement, and participating in I
collective at the same time. the building of knowledge.
Morin (2000) has highlighted the problem of the inad- A surprising example of the impact of the Internet on
equacy of knowledge (which is divided by the boundar- the power of the individual and thus of the group, is the
ies between disciplines while the reality of the world is increase in public access to health information. This is
increasingly global and interconnected) and the chal- not just another step in the spread of knowledge, but
lenge of complexity. Complexity is a method and a form a political change which introduces a new balance of
of knowledge which requires a dialogical approach. power. More and more patients arrive at their doctors
Gregory Bateson also spent his life demonstrating the with information they have found on the Web. It may
interdependence between elements and the intercon- be incomplete or taken from dubious sites, but they
nections between different worlds and disciplines. He begin their treatment in a more knowledgeable and
theorises about the ecology of ideas, an ecosystem in participative way. Even though there are limits and the
which there is a plurality of levels of application of information is certainly not enough to provide specialist
ideas, using a systematic approach which, from the knowledge, it is enough to modify the power/knowledge
point of view of learning means giving importance to rapport in the doctor/patient relationship.
contexts, relationships and functions. The potential for forming opinions, and thereby
So the new idea of knowledge, does not only refer to expressing judgements and making demands aided by
concepts that are to be transmitted but, above all, to the the Web, is becoming more apparent in the political
itineraries and the network of individual and collective development of citizens. People can participate in public
experiences which are in a state of perpetual change. debates as they once did in the classical agora. They
This is the challenge that the individual can take up, can inform themselves and take up positions through
not withstanding the risks of cognitive standardisation blogs, messaging systems and online journalism.
on one hand, and fragmentation or individualism on If we say that technology is not neutral and the
the other. Morins tte bien faite requires the full choice of technology produces profound effects, the
use of intelligence in the organisation of ideas, in the most evident effect of the Internet is the transition from
search for links, routes and new itineraries, knowing vertical to horizontal communication. The first has an
full well that it is not possible to attain totality but that undeniably authoritarian nature, even if the intentions
we must put into practice collective and individual of those using it are democratic, since it requires a
cognitive practices at the same time because they ex- silent, passive viewing. The second however, permits
ploit the power of connectivity. If a document is put active participation, and while this alone is not enough
on the World Wide Web you are doing two things at to confer unquestionably democratic credentials, it
the same time: firstly, you are increasing the amount certainly transforms the quality of communication. In
of information that is available, but secondly, you are general, the passage from one-way communication to
doing another thing with the links between your docu- interactivity does not automatically guarantee a growth
ment and the others: you offer the surfer who finds your in democracy. On the contrary it can increase the use
document your point of view. So you are not merely of extorted consensus to legitimise solutions taken
offering information but a point of view in a collec- without the effective participation of citizens.
tion of information. The World Wide Web is not only The key question is thus the following: Can the In-
an enormous mass of information, it is the expression ternet be used to manipulate consensus? Is there a social
of thousands of different points of view. It should be use of new technologies? Up to now citizens have been
viewed from this aspect (Levy, 1995). There is space subjected exclusively to vertical information offered
for every diversity and every point of view on the Web by television, which creates passivity in viewer. The
which doesnt have to become individualism, if you condition of citizens using the web, benefiting from
allow yourself to become enchanted by hyper-textual horizontal communication which blurs the distinction
logic, by the links and maps and if you allow yourself between producers and consumers and the supremacy
to feel part of a whole, a collective intelligence and a of the former over the later, is totally different. Every-
universal culture. one becomes a supplier of information, and as such, an
ICT and Interculture Opportunities Offered by the Web
active player in communication. The most marginal- avoid reflecting on the responsibilities of those who
ized of Internet users can have word power equal to use it and the need for user-education. Whilst there is a
that of a government, especially when the news they great potential for helping humanity, we face a number
wish to communicate is information that others want of new questions. A critical analysis can reveal both
to suppress at any cost. Censorship becomes much positive and negative aspects, opportunities and risks,
more difficult, but with one condition: that there is a and a possible direction to take in order to achieve a
real mass internet information literacy program and a democratic use for the civic education of the citizen.
true universal service. Without this there is the risk that The key question is that posed by Stefano Rodot: Are
an information apartheid emerges. Moreover, there is we using the technology of freedom or the technology
also the danger of hyper-information, where citizens of control? Can the use of technology be free from
are unable to pick out the important information and rules? Is it necessary to reflect on which direction we
check its validity due the potentially unlimited quantity should be striving for?
of information available. It is for this reason too that We need to free ourselves from some vices of form
the role of education in permitting a social use of new and clichs that linger, such as technological arrogance
technologies is increasing. It has an important part (and the idea that technology does not need rules),
to play in training active, knowledgeable citizens, to the optimism of the market (which in reality favours
guarentee an adequate command of the tools necessary economic interests over social equality) and the politi-
for developing the competences required by society. cal-ideological simplification which sees technology as
According to Rifkin, cultural production is the first a cure for all evils (in reality technology is not neutral
level where the economic life of a country is played but requires careful use)
out. In consequence of this, there is a strong move to
control such production in the direction of a standardised the digital divide
predetermined models (Rifkin, 2000).
But if it is true that the Internet is disliked by gov- Regarding access to the new communication technolo-
ernments because it cannot be censored or controlled gies and the internet in particular, there are no equal
easily, it can also become a tool in the democratic edu- opportunities between the technologically advanced
cation of citizens, if the move towards liberty prevails rich countries and countries which are technologically
over that towards standardisation. A conscious citizen behind. In a message of 2002, the secretary general of
is a person who participates in the building of a free, the United Nations Kofi Annan underlined the impor-
universal society which is constantly developing and tance of communication technologies and exhorted poor
changing. The process of building knowledge that can countries on the African continent to unite to create a
come about through the use of the network of ideas and digital revolution which had become indispensable.
information available on the Internet produces social In collaboration with the ITU International telecom-
progress. This is what Dewey calls social efficiency: munications union the UN organised the first World
everything that makes an experience valid for the com- Summit on the Information Society, WSIS with the aim
munity, as well as oneself; everything that makes it of building a common vision of the information society
communicable and useful in the demolition of social and adopt a plan of action to bring it about4.
barriers. The same efficiency that he considers to be The first principle of the Geneva declaration
the final aim of education in a democratic society. states:
0
ICT and Interculture Opportunities Offered by the Web
It is not enough to be connected to resolve the fun- Castells, M. (2002b). Galassia Internet. Milano: Fel-
damental problems of underdevelopment and to ensure trinelli.
that the Information Society becomes a vehicle for Castells, M. (2002c). Rivoluzione tecnologica e identit,
democracy, justice, equality and respect for individu- intervista a Mediamente, Rai Educational, URL:
als and their personal and social development. Beyond http://www.mediamente.rai.it/articoli/20020530b.
the mere physical availability of a computer, other asp.
factors such as economic/social resources and levels
of literacy, influence the successful use technology. It Corte, M. (2006). Comunicazione e giornalismo inter-
is the development of the necessary competences and culturale. Pedagogia e ruolo dei mass media in una
a fruitful, informed use of the internet that is the chal- societ pluralistica. Padova, Cedam.
lenge for the current Information Society and lifelong Dewey, J. (1992). Democrazia e educazione, Firenze,
learning in particular. La Nuova Italia. Democracy and education: An in-
troduction to the philosophy of education. New York:
Macmillan.
conclusIon
Dewey, J. (1967). Scuola e societ, Firenze, La Nuova
In conclusion Internet is a wonderful opportunity Italia. The school and the society. Chicago: The Uni-
(comparable with the impact on culture of the inven- versity of Chicago Press.
tion of the printing press) not only when we consider Dewey, J. (1954). Il mio credo pedagogico. Antologia
the technical changes in the exchange of information di scritti sulleducazione, trad. it. a cura di Lamberto
and the spread of knowledge, but also for the political, Borghi, Firenze, La Nuova Italia.
social and educational implications. In substance we
have to start to conceive and use new democratic en- Genovese A. (2003). Per una pedagogia intercul-
vironments for the production of culture, new forms of turale. Dalla stereotipia dei pregiudizi allimpegno
diffusion which offer efficient tools for communication dellincontro, Bologna, BUP.
between individuals, disciplines and political and social Harnad, S. (2003). For whom the gate tolls? In D. Law
points of view. To use a more traditional pedagogical & J. Andrews (Eds.), Digital libraries: Policy planning
language, what emerges from the analysis of the spon- and practice. Ashgate.
taneous (and in some cases experimental) use of the
internet is the necessity to use the great potential for Lvy, P. (1999). Cybercultura. Gli usi sociali delle
communicative and didactic renewal which is begin- nuove tecnologie. Milano, Feltrinelli.
ning to manifest itself, in order to produce a culture
Lvy, P. (1996). Lintelligenza collettiva. Per
that overcomes individualism and is oriented towards
unantropologia del cyberspazio. Milano, Feltrinelli.
forms of collaboration which widen the opportunities for
democratic participation in the information/knowledge Lvy, P. (1995a). Lintelligenza collettiva, intervista a
process. By moving in this direction perhaps we can Mediamente, Parigi - European IT Forum, 4 settem-
cement the relationships between individuals, groups, bre, URL: http://www.mediamente.rai.it/HOME/bib-
states, and political organisations providing a glimpse liote/intervis/l/levy.htm
of the added value of cooperation, reciprocity, peace
Morin, E. (1985). Le vie della complessit, in G. Boc-
,and thus interculture.
chi e M. Ceruti (a cura di), La sfida della complessit,
Milano, Feltrinelli.
Morin, E. (2000). La testa ben fatta. Riforma
dellinsegnamento e riforma del pensiero, Milano,
Cortina.
ICT and Interculture Opportunities Offered by the Web
Pinto Minerva, F. (2002). Lintercultura, Roma-Bari, As a result, the Open Archives Initiative is currently
Laterza. an organization and an effort explicitly in transition,
and is committed to exploring and enabling this new
Rodot, S. (2001). Tecnologia e democrazia, intervista
and broader range of applications. As we gain greater
a: Enciclopedia multimediale delle scienze filoso-
knowledge of the scope of applicability of the under-
fiche. Il Grillo, prodotto da Rai Educational, puntata
lying technology and standards being developed, and
del 08/01/2001, URL: http://www.emsf.rai.it/grillo/
begin to understand the structure and culture of the
trasmissioni.asp?d=742
various adopter communities, we expect that we will
Rodot, S. (2004). Tecnopolitica (2d ed.), Roma, have to make continued evolutionary changes to both
Laterza. the mission and organization of the Open Archives
Initiative.
Rodot, S. (2006). Sviluppo telematico e democrazia,
intervista a:MediaMente, Roma, 13 gennaio, URL:
Public Library of Science, http://www.plos.org/
http://www.mediamente.rai.it/home/bibliote/intervis/
PLoS, a nonprofit organization of scientists and
r/rodota02.htm#link001.
physicians committed to making the worlds scien-
Willinsky, J. (2005). Scientific research in a democratic tific and medical literature a freely available public
culture: Or whats a social science for? Teachers Col- resource. As of 2006 it publishes PLoS Biology, PLoS
lege Record, 107(1), 38-51. Medicine, PLoS Computational Biology, PLoS Genet-
ics and PLoS Pathogens. PLoS ONE is a new journal
Willinsky, J. (2003). Democracy and education: The
to be launched soon.
missing link may be ours. Harvard Educational Re-
Our goals are (1) to open the doors to the worlds
view, 72(3), 40.
library of scientific knowledge by giving any scien-
Willinsky, J. (2003). The nine flavours of open access tist, physician, patient, or studentanywhere in the
scholarly publishing. Journal of Postgraduate Medi- worldunlimited access to the latest scientific research.
cine, 49(3), 263-267. (2) Facilitate research, informed medical practice, and
education by making it possible to freely search the full
text of every published article to locate specific ideas,
Web sItes methods experimental results, and observations. (3)
Enable scientists, librarians, publishers, and entrepre-
Misna, www.misna.org neurs to develop innovative ways to explore and use the
Misna, (Missionary International Service News worlds treasury of scientific ideas and discoveries.
Agency) provides daily news from for and about the
South of the World. PubMed Central (PMC), http://www.pubmed-
central.nih.gov/
Open Archives Iniziative, http://www.openar- PubMed is a free search engine offering access to
chives.org the MEDLINE database of citations and abstracts of
The Open Archives Initiative develops and promotes biomedical research articles. It is offered by the United
interoperability standards that aim to facilitate the ef- States National Library of Medicine as part of the En-
ficient dissemination of content. The Open Archives trez information retrieval system. MEDLINE covers
Initiative has its roots in an effort to enhance access to over 4,800 journals published in the United States and
e-print archives as a means of increasing the availability more than 70 other countries primarily from 1966 to
of scholarly communication. Continued support of this the present.
work remains a cornerstone of the Open Archives pro-
gram. The fundamental technological framework and Ricerche di Pedagogia e Didattica, http://rpd.
standards that are developing to support this work are, cib.unibo.it
however, independent of the both the type of content Freely accessible journal of the university of Bologna
offered and the economic mechanisms surrounding that on pedagogical and didactic topics
content, and promise to have much broader relevance
in opening up access to a range of digital materials.
ICT and Interculture Opportunities Offered by the Web
ICT and Interculture Opportunities Offered by the Web
Section: Process ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
ICT and the Virtual Organisation
participants and their real value to the final product nism of coordination the cooperation amongst different
or service. This can be a key success factor to sustain activities. As the firm transfers some of its activities to
competitive advantages through time (Goldman, Nagel, the value system, some elements for the integration of
& Preiss, 1995; Nikolenko & Kleiner, 1996). processes can be of crucial importance, as it is the case
of information and communication technologies.
Virtual System Definition
2. Information and Communication Technologies
Davidow and Malone (1992) cite for the first time the
term virtual as an expression of a very agile and A key element in the virtual system is the capacity of
flexible organisation that is quite customer centred. acquiring and integrating a massive flow of information
Later on, Travica (1997) proposes a definition of virtual and being able to exploit it cleverly. For that reason,
organisation as a temporal or permanent collection of the success in a virtual system is going to depend on
individuals geographically dispersed, groups, or or- the ability to develop with efficiency the process of
ganisational units that depend on electronic linkages to managing the information. Information and commu-
complement a process of production. From our perspec- nication technologies used in the last years as main
tive, the virtual system appears as an alternative way of assets in the corporate strategy play an important role
designing the structure of an organisation containing in the process of virtualisation in the organisations in
the basic characteristics of high levels of cooperation two aspects (Rayport & Sviokla, 1995):
amongst the different agents implied in the system of
value creation in the company, a high use of informa- They allow the breaking of activities in the value
tion and communication technologies and high levels chain by maintaining the firms differential com-
of flexibility and time response to contingencies in the petence in their coordination.
market. This is the reason why we propose a definition A transfer of activities from the tangible to the
of virtual organisation as: virtual value chain is produced.
An organisational structure that, including compo-
nents of one or various firms they are shaped around This way, the technological context makes the
a group of core competencies by promoting the inter- virtual model easier. The ICTs allow the development
firm co-operation by an adequate use of information of a typical virtual organisational environment. They
and communication technologies and with the main permit the maintenance of innovative applications that
objective of the achievement of business processes allow a decrease in costs, improvement of the internal
oriented to the creation of value for all and any of the coordination, and better customer service. Some authors
partners. (De Pablos, 2006) such as Travica (1997) established types of virtual
systems by using, as almost exclusive criteria, the use
virtual systems elements of information and communication technologies.
Now we describe the main elements of the virtual 3. Flexibility: A Main Element in the Virtual Or-
system as we have already stated. ganisation
ICT and the Virtual Organisation
Table 1. Original approaches to virtual systems ( 2007, Carlos de Pablos. Used with permission)
I
Co-operation
Author Focus Main objectives Space ICT role
agents
Value chains
Davidow and Independent Integration of
External interlinked by a
Malone (1992) firms knowledge
central agent
Value chains
Byrne (1993);
Independent interlinked Integration of
Byrne et al. External
firms without a central knowledge
(1993)
agent
Goldman et al. Independent Common Integration of
External
(1995) firms objectives knowledge
Organisational Integrate
Preiss et al. Integration of
Internal units in a same complementary
(1996) knowledge
firm knowledge
Individuals,
work groups Geographic Integration of
Travica (1997) Mix
and independent dispersion knowledge
firms
Small
Interlinked value Integration of
Schertler (1998) External independent
chains knowledge
firms
DeSanctis and Organisational Geographic Integration of
Monge (1999) entities dispersion knowledge
Value chains
Hedberg et al. Independent Geographic Integration of
External interrelated by a
(2001) firms dispersion knowledge
central agent
Saabeel et al. Independent Interrelated Geographic
External
(2002) firms value chains dispersion
Fernndez Independent Interlinked value Geographic Integration of
External
Monroy (2003) firms chains dispersion knowledge
Individuals,
Integration of
De Pablos Work groups
Mix Main objectives production and
(2006) and Independent
knowledge
firms
1 offers a summary of some original approaches to the ing part in the virtual system offers to the value chain
concept of virtual systems. specialised knowledge. This way any agent is centred
in those aspects from the productive processes that
constitute their core competencies (Prahalad & Hamel,
the creatIon oF value through 1990). The competitive advantages derived from this
vIrtual systeMs definition are mainly based in two main aspects:
From a strategic point of view, the creation of value is The flexibility in the market response (Byrd &
related with the achievement and sustaining of competi- Marshall, 1997)
tive advantages. That it is the reason why in this work The main levels of organisational efficiency that
the influence of virtual systems over these elements of can be translated into less costs of production
the value creation is analysed. Any of the agents tak- (Goldman et al., 1995).
ICT and the Virtual Organisation
Table 2. Effects of the different dimensions of a virtual system on the creation of value ( 2007, Carmen de
Pablos. Used with permission)
The high levels of dynamism and technology inten- activity. First, we try to find a scientific explanation
sity in the environments in which the virtual production for the existence of this kind of system in the theories
systems operate are especially interesting and justify coming from the strategic management field. From
at a great level the benefits deriving from a high spe- the agency theory up to the evolution of the resourced
cialisation in the participants of the network. based view, there are many different theories where
The benefits arising from virtual organisations are the value systems can be scientifically explained. Af-
stressed by an increase in the use of ICT, especially on ter that, we try to find a proper definition for a virtual
networks that group quite dispersed agents. That is the system in the context we analyse it. Some elements
reason why the geographic proximity is no longer a main such as the need for firms cooperation, the massive
element for the final success in the cooperation agree- use of information and communication technologies,
ments. Information and communication technologies and the advantages of being more flexible are, from our
allow a fast and efficient transmission and exploitation view, key elements in the concept for virtual systems.
of the codified knowledge that is useful for different Last, we show a basic model trying to group the dif-
members in the network (Crossan & Berdrow, 2003; ferent theoretical debates around virtual systems and
De Pablos, 2006). Thus, higher levels of virtual systems the creation of value. We promote the approach of the
derived of an increase in the number of cooperation influence of the virtual systems on the creation and
agreements in the participant agents, a decrease in sustainability of a competitive advantage. The design
their relative size, and an intensive use of information of models for managing knowledge can be a very in-
and communication technologies will produce better teresting trend when trying to find a proper explanation
competitive positions. Table 2 summarises the main to the development, storing, transfer, and exploitation
effects of each of the dimensions of a virtual system of shared intangible assets.
on the creation of value.
reFerences
conclusIon
Aldrich, H.E., & Pfeffer, J. (1976). A metric
Virtual systems are working as an alternative organiza- for measuring knowledge codification in or-
tional mechanism to provide some businesses economic ganisational learning. Technovation, 21, 413-422.
ICT and the Virtual Organisation
Brian, J., Doorley, T., & Paquette, P. (1990, Winter). Hedberg, B., Dahlgren, G., Hansonn, J., & Olven, N.
Technology in services: Rethinking strategic focus. (2001). Virtual organizations and beyond: Discovering I
Sloan Management Review, pp. 79-87. imaginaring systems. New York: John Wiley.
Byrd, T.A., & Marshall, T.E. (1997). Relating in- Jensen, M., & Meckling, W. (1976). Theory of the
formation technology investment to organizational firm: Managerial behaviour, agency costs, and capital
performance: A causal model analysis. Omega, 25(1), structure. Journal of Financial Economics.
43-56.
Khalil, O., & Wang, S. (2002). Information technology
Byrne, J.A. (1993, February). The futurist who fathered enabled meta-management for virtual organizations.
the ideas. Business Week, 8, 41. International Journal of Production Economics, 75,
127-134.
Byrne, J.A., Brandt, R., & Port, O. (1993, February).
The virtual corporation. Business Week, 8, 36-40. Lipnack, J., & Stamps, J. (1997). Virtual teams. New
York: John Wiley & Sons.
Crossan, M.M., & Berdrow, I. (2003). Organizational
learning and strategic renewal. Strategic Management Nikolenko, A., & Kleiner, M.B. (1996). Global trends
Journal, 24, 1087-1105. in organizational design. Work Study, 45(7), 23-26.
David, R.J., & Han, S.K. (2004). A systematic assess- Nonaka, I., & Takeuchi, H. (1995). The knowledge
ment of the empirical support for transaction cost eco- creating company. Oxford: Oxford University Press.
nomics. Strategic Management Journal, 25, 39-58.
Peteraf, M.A. (1993). The cornerstones of competitive
Davidow, T.H., & Malone, M.S. (1992). The virtual advantage: A resource-based view. Strategic Manage-
corporations: Structuring and revitalizing the corpora- ment Journal, 14(3), 179-191.
tion for the 21st centrury. New York: HarperCollins.
Peteraf, J., & Salancick, G.R. (1978). The external
De Pablos, C. (2006). Ilustraciones de la aplicacin de control of organizations: A resource dependence per-
las tecnologas de informacin a la empresa espaola. spective. New York: Harper and Row.
Madrid: ESIC.
Prahalad, C.K., & Hamel, G. (1990, May-June). The
De Sanctis, G., & Monge, P. (1999). Introduction to core competence of the corporation. Harvard Business
the special issue: Communication processes for virtual Review, pp. 45-53.
organizations. Organization Science, 10(6), 693-703.
Preiss, K., Goldman, S.L., & Nagel, R.N. (1996).
Fama, E.F., & Jensen, M.C. (1983). Agency problems Cooperate to compete. New York: Van Nostrand
and residual claims. Journal of Law and Economics, Reinhold.
26, 327-349.
Rayport, J., & Sviokla, J. (1995). Exploiting the vir-
Faucheaux, C. (1997). How virtual organizing is trans- tual value chain. Harvard Business Review, 73(16),
forming management science. Communications of the 75-85.
ACM, 40(9), 50-55.
Saabeel, W., Verduijn, T.M., Hagdom, L., & Kumar, K.
Fernndez Monroy, M. (2003). Modelo de compor- (2002). A model of virtual organisations: A structure
tamiento de la organizacin virtual: Una aplicacin and process perspective. Electronic Journal of Orga-
emprica a los sistemas de franquicia. Doctoral dis- nizational Virtualness, 4(1), 1-6.
sertation, University of Gran Canaria, Spain.
Schertler, W. (1998). Virtual enterprises in tourism:
Goldman, S.L., Nagel, R.N., & Preiss, K. (1995). Folklore and facts: Conceptual challenges for academic
Agile competitors and virtual organisations: Strategy research. In D. Buhalis, A.M. Tjoa, & J. Jafari (Eds.),
for enriching the customer. New York: Van Nostram Information and communication technologies in tour-
Reinhold. ism. Springer-Verlag.
Greiner, R., & Metes, G. (1995). Going virtual: Mov- Shin, Y. (2004). A person-environment fit model for
ing your organisation into the 21st century. Englewood virtual organisations. Journal of Management, 30,
Cliffs, NJ: Prentice Hall. 725-743.
ICT and the Virtual Organisation
Teece, D.J. (1998). Capturing value from knowledge Dynamic Capabilities: Organizational actions that
assets: The new econonomy markets for know-how use resources to integrate and reconfigure actions in
and intangible assets. California Management Review, order to match and create changes in the market.
40(3), 55-79.
Information and Communication Technology
Travica, B. (1997). The design of the virtual organiza- (ICT): A wide term that includes any communication
tion: A research model. Paper presented at the 1997 device or application, for example, Internet, radio,
American Conference on Information Systems of As- television, cellular phones, computer and network
sociation for Information Systems, Indianapolis, IN. hardware and software, satellite systems, and so on, as
well as the various software services and applications
Walker, G., & Weber, D. (1984). Supplier competition,
associated with them, for example, the ERP systems,
uncertainty and make-or-buy decisions. Academy of
data warehouses, and so forth.
Management Journal, 39, 589-596.
Intangible Assets: Those resources that cannot be
seen, touched, or physically measured in a firm and
Key terMs which are created through time and/or effort.
Business Process Redesign: A systematic way of Tacit Knowledge: It is knowledge that people carry
improvement that drastically evaluates, rethinks, and in their minds and is therefore difficult to access. The
implements the change of processes of an organization. transfer of tacit knowledge is difficult and generally
The main goal of this orientation is to achieve dramatic requires extensive personal contact and trust.
improvements in performance in processes.
Virtual System Management: It is the process
Core Competencies: The principal distinctive of managing the allocation and use of remote located
capabilities possessed by a company. resources capabilities.
0
Section: Context ICT
Yu-An Huang
National Chi Nan University, Taiwan
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
ICT Investment Evaluation Practices in Large Organizations
This is because that the nature of electronic commerce ICT as well as to deal with the extended investment
technology makes it harder for organizations to al- time frame (Stamoulis, Kanellis, & Martakos, 2002);
locate and assign costs and benefits to ICT projects, (4) working with new technology introduces higher
further blurring the lines of capital investment and levels of risk, which affects timing, costs and delivery
return from ICT spending in the B2B channel (Kleist, deadlines (Peacock & Tanniru, 2005); and (5) it is very
2003; Subramani, 2004; Tsao, Lin, & Lin, 2004). The difficult to evaluate intangibles and make relationship
less precisely bounded environment of B2B electronic between ICT and profitability explicit (Murphy &
commerce technology adds more complexity to the Simon, 2002).
ICT measurement problem as this type of investment is Furthermore, ICT investment evaluations alone are
physically distributed between suppliers and customers insufficient in terms of ensuring that the benefits iden-
(Torkzadeh & Dhillon, 2002). tified and expected by organizations are realized and
Moreover, many organizations have found that delivered (Ward & Daniel, 2006). This is because ICT
these ICT project costs and benefits can be difficult is just one enabler of process change (Grover, Teng,
to estimate and control (Lin & Pervan, 2003; Love, Segar, & Fiedler, 1998) and it only enables or creates
Irani, Standing, Lin, & Burn, 2005). For instance, a capability to derive benefits. The essence of benefits
many organizations face a challenge of measuring and realization process is to organize and manage so that
monitoring the performance of the specific contribution the potential benefits arising from the use of ICT can
of inputs in generating outputs as well as its associ- actually be realized (Ward & Elvin, 1999). Benefits may
ated Internet channels (Kim & Umanath, 2005; Lin, be considered as the effect of the changes, the differ-
Pervan, & McDermid, 2005b). Other less quantifiable ence between the current and proposed way that work
items such as loyalty, trust, knowledge, relationships, is done. Indeed, good management of organizational
value creation and customer satisfaction all makes the change is important to ensure successful ICT investment
evaluation even more difficult (Straub, Rai, & Klein, evaluation and benefits realization processes (Dhillon,
2004). Efforts to identify the relationships between 2005). Finally, effective use of ICT benefits realization
the evaluation practices and the organizational con- processes also allows organizations to constantly focus
straints and benefits and to develop measures for B2B on the planned ICT benefits and by making sure that
electronic commerce initiatives have been hindered ICT investments remain aligned with business goals
by the lack of necessary conceptual bases (Torkzadeh as well as to make strategic adjustments in resources
& Dhillon, 2002). in a changing environment.
For example, investigation by Sohal and Ng (1998)
found that in large Australian organizations the potential
of ICT has not been utilized to meet the competitive research hyPotheses and
challenges due to inadequate and inappropriate apprais- MethodologIes
als/evaluation of the proposed ICT investment projects.
Moreover, they reported that 45% of the responding As mentioned earlier, the current practices of the Aus-
organizations did not evaluate whether ICT systems tralian organizations to manage and evaluate their ICT
were still consistent with business objectives and 59% investments and their ability to realize the benefits from
did not determine whether expected benefits were being these investments in an increasingly competitive market
achieved. Some of the major problems associated with are of interests to the researchers and senior executives.
ICT investment evaluation are: (1) there is a lack of Therefore, there is a pressing need for undertaking a
understanding of the impact of the proper ICT invest- survey research to investigate the relationship between
ments evaluation and benefits realization processes the B2BEC and the use of ICT investment evaluation
in most of the organizations (Ward & Daniel, 2006; and benefits realization methodologies or processes.
Willcocks & Lester, 1997); (2) traditional financially The following four hypotheses are proposed:
oriented evaluation methods (e.g., ROI, NPV) can be
problematic in measuring ICT investments and quanti- H1: Organizations with higher levels of usage of ICT
fying relevant benefits and costs (Bardhan, Bagchi, & investment evaluation methodologies will lead to higher
Sougstad, 2004); (3) organizations often have neglected levels of usage of ICT benefits realization processes.
to devote appropriate evaluation time and effort to
ICT Investment Evaluation Practices in Large Organizations
H2: Organizations with higher levels of B2BEC benefits the rest were created by the researcher. These scales
will lead to higher levels of usage of ICT investment measured the organizations levels of B2BEC benefits, I
evaluation methodologies. resources, and readiness.
The ICT investment evaluation methodology and
H3: Organizations with higher levels of B2BEC benefits realization process scales were derived from
resources will lead to higher levels of usage of ICT Ward, Taylor, & Bond (1996). These scales measured
investment evaluation methodologies. the organizations usage, wide use and effective use
of ICT investment evaluation methodology and ICT
H4: Organizations with higher levels of B2BEC readi- benefits realization process.
ness will lead to higher levels of usage of ICT investment
evaluation methodologies.
data analysIs and results
Questionnaires were sent to ICT managers/CIOs of
900 Australian organizations randomly selected from In the following discussion of results the percentages
top 2000 Australian organizations (Dun and Bradstreet referred to normally represent the proportion of valid
mailing list) in 2005. The survey was conducted to in- (answered) cases only and did not indicate missing val-
vestigate many aspects of ICT investments evaluation ues. SPSS (v11) and LISREL VIII (Jreskog & Srbom,
and benefits realization practices in large Australian 1993) were used to analyze the data collected.
organizations. In total, 176 responses were received, The results indicated a reasonably high adoption of
representing a response rate of 19.6%. In addition, late methodologies for ICT investment evaluation (63.1%)
returns were compared with other response received and processes for ICT benefits realization (40.4%). In
earlier in order to check for nonresponse bias (Arm- addition, respondents indicated that ICT investment
strong & Overton, 1977). No significant differences evaluation methodologies were widely used (selected
were detected between two samples. 4 or 5 out of a five-point scale ranging from totally
Respondents were asked to indicate their agreement disagree to totally agree) in only 50.5% of cases.
on a 5-point scale (1 for strongly disagree and 5 for However, this percentage is a lot higher than the surveys
strongly agree) with statements concerning five main conducted in large Taiwanese organizations (22.6%)
constructs: (1) B2BEC benefits; (2) B2BEC resources; (Lin, Pervan, Lin, Tsao, 2004) and in large UK organiza-
(3) B2BEC readiness; (4) ICT investment evaluation tions (36%) (Ward et al., 1996). Moreover, respondents
methodology; and (5) ICT benefits realization process. indicated that ICT benefits realization processes were
The reliability analysis was conducted on these con- widely used in only 28.1% of cases. This result is mostly
structs (see Table 1). consistent with findings of two SMEs Australian stud-
Measurement items used in the B2BEC effectiveness, ies by Jensen (2003) and Marshall and McKay (2002)
B2BEC resources, and B2BEC support scales were where the ICT benefits realization processes were not
partly derived from scales used by Chan and Swatman widely used by virtually all respondents.
(2000) and Eid, Trueman, and Ahmed (2002), and LISREL VIII was then used to analyse the model
shown in Figure 1. Each construct in the model was
analysed separately and the fit of indicators to the
construct as well as construct validity were evaluated
Table 1. Scale reliabilities for the five main con- to achieve a acceptable fit. The model achieved an
structs acceptable level of fit: 2(222) = 485.86, p=0.000,
Constructs Scale reliability RMSEA=0.083, GFI=0.804, and AGFI=0.756. The
B2BEC benefits 0.83 analysis revealed that B2BEC benefits and B2BEC
B2BEC resources 0.72
readiness did not have a significant and positive impact
on the use of ICT investment evaluation methodology
B2BEC readiness 0.69
( = 0.06, t = 0.77 and = -0.08, t = 78, respectively).
ICT investment evaluation
0.84 Therefore, H2 and H4 were rejected. However, the
methodology
analysis indicated that the path from B2BEC resources
ICT benefits realization process 0.85 to ICT investment evaluation methodology was positive
ICT Investment Evaluation Practices in Large Organizations
B2BEC
Benefits
H2
ICT Benefits
B2BEC Realization
Readines s Proces s
Bus ines s needs Mgmt Res is tance Govt Us age W ide Us e Effective Us e
0.44 0.41 0.63 0.69 0.28 0.16 0.40
Copyright 2007, Chad Lin and Yu-An Huang. Used with permission.
and significant ( = 0.30, t = 3.29), suggesting that the or processes by large Australian organizations. Howev-
provision of more B2BEC resources to the responding er, these methodologies were generally not used widely
organizations had led to higher usage of ICT investment and effectively within the responding organizations.
evaluation methodology. Furthermore, there was also a Most ICT evaluations were carried out to ensure that
positive relationship between ICT investment evalua- the expected benefits/objectives were met and the qual-
tion methodology and ICT benefits realization process ity of their ICT investments improved. In addition, the
( = 0.81, t = 7.85), indicating that the evaluation of structure equation modeling (SEM) analysis revealed
B2BEC would lead to a higher level of ICT benefits that there was a direct positive relationship between
realization activities by the responding organizations. the use of ICT investment evaluation methodologies
Thus, H1 and H3 were supported. and benefits realization processes or activities.
Moreover, most respondents were not satisfied with
their use of B2BEC. The results demonstrated that
dIscussIon and conclusIon there was a significant positive relationship between
the use of ICT investment evaluation methodologies
The results showed relatively high usage of ICT invest- and the B2BEC resources held by the respondents.
ment evaluation and benefits realization methodologies However, it was also found that the level of B2BEC
ICT Investment Evaluation Practices in Large Organizations
effectiveness and supports did not have a significant Dhillon, G. (2005). Gaining benefits from IS/IT
relationship with the use of ICT investment evaluation implementation: Interpretations from case studies. I
methodologies. International Journal of Information Management,
Finally, this study took place at a particular point in 25(6), 502-515.
time. Further research can be conducted to determine
Eid, R., Trueman, M., & Ahmed, A. M. (2002). A
whether or not there are relationships between other
cross-industry review of B2B critical success factors.
factors related to the adoption of B2BEC (e.g., degree
Internet Research: Electronic Networking Applications
of satisfaction), the usage of ICT investment evalua-
and Policy, 12(2), 110-123.
tion methodologies, and benefits realization processes
or activities. Grover, V., Teng, J., Segar, A. H., & Fiedler, K. (1998).
The influence of information technology diffusion and
business process change on perceived productivity: The
Future trends IS executives perspective. Information and Manage-
ment, 34, 141-159.
More recent evidence suggests that many organizations
Hu, Q. & Quan, J. J. (2005). Evaluating the impact of
simply got carried away with ICT and spent money
IT investments on productivity: A causal analysis at
unwisely in the last few decades. The future trend is
industry level. International Journal of Information
that more successful organizations will analyze and
Management, 5(1), 39-53.
evaluate their economics carefully and continue to ex-
plore new ICT applications in order to gain competitive Jensen, J. (2003). Issues facing SMEs in their adoption
advantage. These organizations will spend on only those of electronic commerce. In Proceedings of the 2003
ICT applications that would deliver productivity gains Communication Research Forum. Canberra, Australia:
and evaluate their ICT investments carefully through Old Parliament House.
a disciplined approach with innovative management
practices. Jreskog, K. G. & Srbom, D. (1993). LISREL 8: A guide
to the program and applications. Chicago: SPSS.
Kim, K. K. & Umanath, N. S. (in press). Information
reFerences transfer in B2B procurement: An empirical analysis and
measurement. Information and Management.
Armstrong, J. S. & Overton, T. (1977). Estimating
nonresponse bias in mail surveys. Journal of Market- Kleist, V. F. (2003). An approach to evaluating e-busi-
ing Research, 14(August), 396-402. ness information systems projects. Information Systems
Frontiers, 5(3), 249-263.
Bardhan, I., Bagchi, S., & Sougstad, R. (2004). Priori-
tizing a portfolio of information technology investment Laudon, K. & Laudon, J. (2004). Management informa-
projects. Journal of Management Information Systems, tion systems: Managing the digital firm. New Jersey:
21(2), 33-60. Pearson Education, Inc.
Barua, A., Konana, P., & Whinston, A. B. (2004). An Lewis, B. R. & Byrd, T. A. (2003). Development of a
empirical investigation of net-enabled business value. measure for the information technology infrastructure
MIS Quarterly, 28(4), 85-620. construct. European Journal of Information Systems,
12, 93-109.
Brynjolfsson, E. & Hitt, L. M. (2003). Computing
productivity: Firm-level evidence. The Review of Lin, C. & Pervan, G. (2003). The practice of IS/IT
Economics and Statistics, 85(4), 793-808. benefits management in large Australian organizations.
Information and Management, 41(1), 13-24.
Chan, C. & Swatman, P. (2002). Management and busi-
ness issues for B2B eCommerce implementation. In Lin, K., Lin, C., & Tsao, H. (2005a). IS/IT investment
Proceedings of 35th Hawaii International Conference evaluation and benefit realization practices in Taiwanese
on Information System. SMEs. Journal of Information Science and Technol-
ogy, 2(4), 44-71.
ICT Investment Evaluation Practices in Large Organizations
Lin, C., Pervan, G., & McDermid, D. (2005b) IS/IT business impact of digital supply networks. Journal of
investment evaluation and benefits realization issues Management Information Systems, 21(1), 83-114.
in Australia. Journal of Research and Practices in
Subramani, M. (2004). How do suppliers benefit from
Information Technology, 37(3), 235-251.
information technology use in supply chain relation-
Lin, C., Pervan, G., Lin, H-C, & Tsao, H. (2004). A ships. MIS Quarterly, 28(1), 45-73.
survey on evaluating and realizing IS/IT benefits in
Sugumaran, V. & Arogyaswamy, B. (2004). Measuring
Taiwanese B2BEC companies. In Prceedings of the
IT performance: Contingency variables and value
12th European Conference on Information Systems
modes. The Journal of Computer Information Systems,
(ECIS2004), Turku, Finland.
44(2), 79-86.
Love, P.E.D., Irani, Z., Standing, C., Lin, C., & Burn,
Thatcher, M. D. & Pingry, D. E. (2004). Understanding
J. (2005). The enigma of evaluation: Benefits, costs
the business value of information technology invest-
and risks of IT in small-medium sized enterprises.
ments: Theoretical evidence from alternative market
Information and Management, 42(7), 947-964.
and cost structure. Journal of Management Information
Luftman, J. & McLean, E. R. (2004). Key issues for IT Systems, 21(2), 61-85.
executives. MIS Quarterly Executive, 3(2), 89- 104.
Torkzadeh, G. & Dhillon, G. (2002). Measuring fac-
McKay, J., & Marshall, P. (2004). Strategic manage- tors that influence the success of internet commerce>
ment of eBusiness. Queensland, Australia: John Wiley Information Systems Research, 13(2), 187-204.
& Sons.
Tsao, H., Lin, K. H., & Lin, C. (2004). An investigation
Murphy, K. E. & Simon, S. J. (2002). Intangible ben- of critical success factors in the adoption of B2BEC
efits valuation in ERP projects. Information Systems by Taiwanese companies. The Journal of American
Journal, 12, 301-320. Academy of Business, Cambridge, 5(1/2), 198-202.
Peacock, E. & Tanniru, M. (2005). Activity-based Ward, J. & Daniel, E. (2006). Benefits management:
justification of IT investments. Information and Man- Delivering value from IS & IT investments. Chichester,
agement, 42(3), 415-424. UK: John Wiley & Sons Ltd.
Pearce, J. (2002). Australias Rosy outlook for B2B Ward, J. & Elvin, R. (1999). A new framework for
e-commerce. ZDNet Australia. Retrieved March 16, managing IT-enabled business change. Information
2008, from http://www.zdnet.com.au/newstech/ebusi- Systems Journal, 9(3), 197-222.
ness/story/0,2000048590,20263951,00.htm
Ward, J., Taylor, P., & Bond, P. (1996). Evaluation
Pires, G. D. & Aisbett, J. (2003). The relationship be- and realization of IS/IT benefits: An empirical study
tween technology adoption and strategy in business-to- of current practice. European Journal of Information
business markets: The case of e-commerce. Industrial Systems, 4, 214-225.
Marketing Management, 32, 291-300.
Willcocks, L. & Lester, S. (1997). Assessing IT produc-
Sohal, A. S. & Ng, L. (1998). The role and impact of tivity: Any way out of the Labyrinth? In L. Willcocks,
information technology in Australian business. Journal L., D. F. Feeny, & G. Islei (Eds.), Managing IT as a
of Information Technology, 13, 201-217. strategic resource (pp. 64-93). London: The McGraw-
Hill Company.
Stamoulis, D., Kanellis, P., & Martakos, D. (2002).
An approach and model for assessing the business Zhu, K. (2004). The complementarity of information
value of e-banking distribution channels: Evaluation as technology infrastructure and e-commerce capability:
communication. International Journal of Information A resource-based assessment of their business value.
Management, 22, 247-261. Journal of Management Information Systems, 21(1),
167-202.
Straub, D. Rai, A., & Klein, R. (2004). Measuring firm
performance at the network level: A nomology of the
ICT Investment Evaluation Practices in Large Organizations
Section: Context ICT
The development of homosapien man can be classified A useful starting point is to consider the European
into ages. These ages fundamentally affect the patterns Computer Driving Licence (ECDL, 2004) initiative.
of how humans work, play and interact. Some social This originated in Finland and has become somewhat
anthropologists (e.g., Toffler & Toffler, 1994) have of an icon for the idea of ICT literacy. This framework
identified three such ages: agricultural, industrial, and has a clearly defined scope and the learning is fairly
information. Definitions of these ages are complex, prescriptive. It emphasises the attainment of specific
and a detailed discussion of them lies outside the scope knowledge points associated with (pre)specified tasks
of this chapter, however, they can usefully be typified and goals.
as follows: Reid (1992) appropriately contextualizes the
ECDLs perspective of ICT literacy within the wider
The agricultural age affected us through systems idea of ICT literacy when writing:
geared to processing and distributing food.
The industrial age affected us through systems An old definition of computer literacy is the ability to
geared to processing and distributing energy; write computer programs. But this is not very relevant
energy that is harnessed to provide large-scale today, in the era of packaged application software.
travel and automation.
The information age affects us through systems One common view of IT literacy is to say that com-
for processing and distributing information. puter literate people are those who can use a few
standard (or widely used) application packages (such
Therefore, in the Information Age many people as a word-processor and a spreadsheet), know how to
will work and play exclusively using ICT systems and manage their data, and know how to find out more if
use this technology as a primary means of interacting they need to. But this is a very mechanical definition,
with other people. in which we are judging a persons literacy by what
According to Castells (1996) we are presently in they commonly do, rather than by the special abilities
a transitory period, which he terms industrial-infor- they may possess.
mational whereby we are integrating the new (ICT)
technology of the information age into systems that The use of the term computer literacy, or IT
were conceived in the industrial age. It is this integra- literacy, begs a comparison with conventional, or
tion that gave rise to for example, computer integrated reading literacy. Here we are not so much con-
manufacturing (CIM), fly by wire aircraft, and smart cerned with whether a person does much reading, but
bombs. However, present patterns of human behaviour whether they can, when the need arisesand they are
remain generally similar to that of the industrial age sufficiently familiar with the advantages of reading,
and these will only shift significantly as we complete
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
ICT Literacy in the Information Age
that they can make sensible decisions about whether will need to learn in advance. Existing knowledge will
to read something or not. become redundant with increasing frequency (Lucas & I
Greany, 2000). Therefore, it is easy to conclude that, if
The most useful definition then is that an IT literate individuals are to achieve social inclusion in this new
person is one who knows when to use which IT for what age, it will require them to engage in lifelong learn-
purpose, and knows where and how to find out more ing. Further, learners will increasingly need to identify
about areas where their competence is inadequate. and realise their own learning requirements, and this
Thus they may not, in fact, be regular users of IT, but will often need to take place in a contingent manner
they have sufficient perception about the various ITs (Thimbleby, 1999). Therefore, the generic ability to
that exist to be able to make sensible decisions about learn is becoming more important than the subject
whether to use IT in a given situation or not. matter, or content of what is learned. This is an idea
termed learnacy by Claxton (1999).
Here, Reid demonstrates how the definition of ICT Based on these discussions, initiatives such as the
literacy depends upon the commentators perspective ECDL would seem to fit better with the needs of the
and the time when the commentary is made. Reid also industrial age than with those of the information age.
argues that the idea of ICT literacy is (necessarily) As such, this author argues that new(er) initiatives to
becoming much more one of a general transferable engender ICT literacy must begin with the rationale
skill. In other words, ICT literacy should be seen as that ICT literacy is more of a general transferable skill,
an ability that has application across disparate contexts whereby individuals are equipped with the ability to
and (technological) devices. learn new ICT efficiently and autonomously, and in a
In keeping with this perspective, this article ex- contingent manner.
plains new thinking as to how we might (re)define Researchers within the SEUSISS (2003) project
and better engender ICT literacy for the needs of the seem to support this idea. They found that only a small
Information Age. minority of employers regarded the ECDL as useful
recruitment criteria, instead, they preferred the more
generic ICT skills.
bacKground to Ict lIteracy In
the InForMatIon age
a neW aPProach to Ict lIteracy:
The industrial age reflects a period in which the economi- the adaPtIve Ict learner
cally driven goals were, in general, fairly prescribed,
predicable and persistent. This meant that job roles had The adaptive ICT learner model was designed by Mace-
a considerable life span. In turn, this gave rise to the field (2005) to engender ICT skills for the information
idea of training individuals for lifelong job roles. In age. In keeping with the comparison Reed (1991) made
contrast, the information age reflects a period in which between ICT literacy and general literacy, it began with
the goals will be a far more dynamic, ephemeral, and the idea that an ICT system interface can be modeled
unpredictable. within the same framework we use to model a natural
This aspect of the information age means that it language.
will become increasingly difficult to predict what we
ICT Literacy in the Information Age
Table 2. Written English and MS Windows within the natural language grammar (Derived from Macefield,
2005)
Interfaces Modelled as Pseudo natural of understanding ICT systems. If learners can acquire a
languages usefully complete and accurate PNL model of a GUI then
this might help them when learning and utilising any
All natural languages can be modeled within a application software that uses that particular GUI.
metaframework known as the natural language gram- In some ways, this is analogous to the idea of very
mar. This is shown in Table 1 with the lowest, or most traditional teaching whereby we assume, or develop
fundamental, level at the bottom (therefore, the table a good standard of literacy skills then expect students
is best read from bottom to top). to be able to learn a lot of subject matter in a largely
An ICT system interface can be mapped into this self-organized manner.
grammar. An example of this is shown in Table 2, which In developing these literacy skills, learners are gen-
uses the examples of written English and the Microsoft erally taught to read and write within, what the author
Windows graphical user interface (GUI). terms, a literacy acquisition framework that has the
Here, the Microsoft Windows GUI has effectively natural language grammar at its core. This framework
been modelled in terms of a pseudo natural language is shown in Table 3, where specific elements of literacy
(PNL). In other words, the GUI is perceived as a com- education are associated with, or targeted at, specific
munication device that is modelled within the natural levels in this framework. Importantly, Table 4 shows
language grammar. how this literacy acquisition framework can also be
Although, this modeling approach is novel, it does applied to the learning of a modern GUI.
have some research history. Moran (1981) demonstrated Of course, literacy education does not happen in a
how such an approach was beneficial although; how- linear manner through this framework. In other words, a
ever, his work was concerned more with text based learner need not acquire the entire lexicon of a particular
command line interpreters where the mapping of a natural language before they learn how to put some of
natural language to an interface is far more obvious these elements together into a phrase or sentence, that
than with a GUI. Alty (1997) also advocates that mul- is, use the syntax. Rather, the teaching and learning
timedia interfaces can be modelled within the natural involves multiple and overlapping iterations through
language grammar; however, Alty does not appear to the levels of the framework.
offer us any examples of this mapping. Grounded in this theory, it was hypothesized that
It is not suggested that this analogy between natural the literacy acquisition framework may be used as an
languages and ICT system interfaces is totally con- ICT literacy teaching and learning device that lever-
sistent; however, it is argued that there is sufficient ages a learners innate natural language capabilities.
overlap that this modeling may have benefits in terms To test this hypothesis, a proof of concept study was
conducted at a UK university.
0
ICT Literacy in the Information Age
Proof of concept study of the adaptive mouse and keyboard inputs could be made concurrently
Ict learner Model to deliver more advanced selection functions.
Another important feature of sessions two through
The study utilised a foundation level undergraduate seven was that considerable time was spent developing
course designed to develop basic skills in Microsoft skills in using the online help facilities. In terms of a
Word, PowerPoint and Excel, which from hereon will comparison with literacy, it is difficult to draw analo-
be referred to as the applications. Ordinarily, these gies here; however, the ability to exploit online help
students would have followed a fairly prescriptive facilities is clearly critical in developing the idea of an
training type course similar to that associated with adaptive ICT learner.
the ECDL, a whereby standard (Word) letters, (Power- In sessions eight through ten the participants under-
Point) presentations and (Excel) expenses spreadsheets took an exercise with concrete goals. Unlike traditional
would be the expected outcomes. training approaches such as those found in the ECDL,
The course was 10 weeks long with a single three- the participants defined their own goals (sometimes
hour session per week. The first session was dedicated with advice from the author, or one of his assistants).
to motivational issues; in particular, expressing the For example, one participant wanted to organise a pool
importance of ICT skills within the information age. tournament for the class, which involved the produc-
Sessions two through seven took place within the tion of mail merged letters, posters, and devices for
literacy acquisition framework described in Table 4. recording results and issuing certificates. Other than
These sessions included some formative exercises and being very tangible to the participants, these exercises
assessments related to the learners abilities at each level had two important characteristics. Firstly, none of the
of the framework; beginning first with the sensory mo- participants had previously achieved similar goals.
tor level. Interestingly, the participants were generally Secondly, they were given no instruction as to how to
surprised at how little they knew about keyboard and go about the exercises; indeed, they were not even told
mouse manipulation of the Microsoft Windows 2000 what applications(s) they might use in pursuit of these
GUI; as compared with what they thought they knew. goals. Further, participants were encouraged to ask for
For example, many participants had either no concept, assistance only as a last resort and, in these cases, the
or only a fuzzy concept, of what the right mouse button author and his assistants deliberately minimized the
was for. Similarly, few participants were aware that help provided.
ICT Literacy in the Information Age
Three outcomes of this study were notable: The literacy acquisition framework can also be used
as a taxonomy by which we can define the idea of ICT
The adaptive ICT learner model was clearly literacy. In keeping with this, it can also be used as an
more attractive to some learners than others. assessment device. For example, it is easy to imagine
The resistance or scepticism in some participants how individuals mouse and keyboard manipulation
might well be explained by the fact that we in- skills for a particular GUI might be (objectively) as-
evitably carry with us a legacy of industrial age sessed, as well as their ability to identify and use par-
type learning (training). This might be expected ticular aspects of the lexicon, syntax, and semantics.
since we have not yet completed the transition We might also (more subjectively) assess how creative
into the Information Age. Task and goal specific a learner has been in their application of ICT.
learning still has both relevance and resonance In summary, the adaptive ICT learner allows us to
for many learners. Hence, their concerns about define, teach and assess ICT literacy in a similar way
newer, different, models of learning are legitimate to how we define, teach and assess literacy. Further,
and we will have to work hard to overcome these although some learners may have legitimate concerns
barriers in many instances. about this model, it is argued that this model is well
Evidence that learners had acquired a mental suited for our transition into the Information Age.
PLN model of the windows GUI was negligible;
however, this outcome was unsurprising since
many studies have demonstrated the difficulty in reFerences
eliciting an individuals mental model within a
human computer interaction (HCI) context (e.g., Aitchison, J. (1999). General linguistics. London:
Sasse, 1997). Hodder & Stoughton.
All of the participants (eventually) achieved their
goals for the exercise set in weeks eight through Alty, J. L. (1997). Multimedia. In A. B. Tucker (Ed.),
ten. Further, many of the participants solutions The computer science and engineering handbook. Boca
involved outcomes, strategies, and features that Raton, FL.: CRC Press.
were unfamiliar to the author. This is despite the Castells, M. (1996). The rise of the network society,
fact that he would be considered a power user The information age: Economy, society and culture,
of these applications and has run numerous ad- Vol. I. Cambridge: Blackwell.
vanced courses on these technologies.
Claxton, G. L. (1999). Wise up: The challenge of life-
long learning. London: Bloomsbury.
suMMary and conclusIon ECDL (2004). European computer driving licence
foundation. Retrieved March 11, 2008, from European
The adaptive ICT learner model has two key, and Computer Driving Licence Foundation Web site: www.
related, attributes: ecdl.com/main/index.php
It proposes that ICT literacy should be viewed as Lucas, B. & Greany, T. (2000). Learning to learn: Set-
a general transferable skill. As such, it focuses ting the agenda for schools in the 21st century. London:
exclusively on the GUI rather than any specific Campaign for Learning.
application software with the aim that learners Macefield, R. C. P. (2005). A literal approach to IT
acquire a usefully complete and accurate model literacy: The adaptive IT learner. Computer Educa-
of the GUI that aids them when learning and tion, 108, 15-23.
utilizing any associated application software.
The teaching and learning is based around the Moran, T. P. (1981). The command language grammar:
literacy acquisition framework, with the idea be- A representation for the user interface of interactive
ing to leverage a learners innate natural language systems. International Journal of Man-Machine stud-
capabilities in order to make the learning more ies, 15(1), 3-50.
efficient and effective.
ICT Literacy in the Information Age
Section: Context ICT
Stella E. Igun
Delta State University Library, Nigeria
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
ICT Policies in Africa
Even when promulgated as distinct policy statement, countries. Since that time, all African capital cities and
ICT policies must take into account other policy areas, several secondary towns have received connectivity I
such as education policies, information policies, trade (United Nations Economic Commission for Africa,
and investment policies, and cultural and linguistic 2001). The key policy challenges for Africa now are
policies. The mere establishment of written national (United Nations Economics Commission for Africa,
ICT policy, however, has value in itself. It conveys, at 2001):
a minimum, the message that the government is for-
wardlooking and intends to pursue the utilization of 1. Extending access
ICT in society. Governments should aspire, of course, to 2. Applying the technologies to solve development
more by putting the policy content into actual practice problems
and becoming a role model in applying ICT in their 3. Collaborating to build market size and exploit
administration and services (UNESCAP, 2007). economics of scale
An ICT policy framework is recognized as an im- 4. Articulating an Africa vision in international
portant step in order to create an enabling environment negotiation on information society issues
for the deployment of ICTs and their uses to social out-
comes. The lack of an ICT policy has been attributed as The policy process must:
a key factor behind the poor infrastructure and of ICTs
in many developing countries in Africa. While many 1. Involve broad groups of stakeholders including
developing countries in Africa have moved ahead and representatives of user communities and civil
formulated an ICT policy, very little progress has been society
recorded in policy implementation (Njuguna, 2006). 2. Identify issues that can best be addressed beyond
ICT policies and strategies are essential tools to national borders
define Africas response to the challenges of global- 3. Recognize the need for a stronger African voice
ization and to nurture the emergence of an African in global negotiation
information society. This is especially important given
the rapidly growing international focus on ICTs and AISI gives strong support to the development of
development (United Nations Economic Commission national ICT policies and strategies through its National
for Africa, 2001). Information and Communication Infrastructure (NICI)
plan, which helps nations link to national, regional, and
global development goalsincluding the Millennium
aFrIcan and Ict PolIcy Development Goals (Sesan, 2004).
ForMatIon Through the active support and encouragement
received from ASISI, several African countries have
The Organization of African Unity (OAU) in 1996 formulated ICT policies. For instances in 2000, 13 of
adopted the African Information Society Initiative the 54 African countries had ICT policies; however,
(AISI) as the guiding framework for ICT efforts in the number increased to 16 in 2002. Essentially the
Africa (Mutume, n.d.). AISI was adopted in May number of countries without ICT polices was reduced
1996 at the United Nations Economic Commission for from 21 to 16 within the same period (AISI, 2003,
Africa (ECA) Conference of Ministers. It has, since cited by Sesan, 2004).
then, provided the framework for ECAs programs on Examples of some African countries with ICT
Harnessing Information for Development (Bounemia policies are:
and Soltane, 2001). AISI was to provide the framework
for the African information technology renaissance Ghana Ghana ICT4D National Policy: http://
and to be African information society by the year 2010 www.comminit.com/ict/policies/ictpolicies-
(Yau, n.d.). 2.html
At the time ECA launched/adopted AISI in 1996, Ethiopia Ethiopian Science and Technology,
the main constraint to African information society National ICT Policy: http://www.telecom.net.
developments was the lack of infrastructure to support et/-estc/_policy/index.htm
communication and access to information within the
ICT Policies in Africa
Malawi The Malawi ICt Policy: www.malawi. sectoral applications of the Nigeria national ICT policy
gov.mw/finance/DISTMS/TheMalawaICTPo- document for example, include (Federal Republic of
licy.pdf Nigeria, 2001).
Nigeria National Policy for Information Technol-
ogy (IT): http://www.nitda.gov.ng/nigeriaitpolicy. Human resource development
pdf. Infrastructure
Research and development
objective of african Ict Policies Health
Agriculture
Though ICT policies of the different African countries Urban and rural development
may not be exactly the same in structure and contents, Fiscal measures
the following are some objectives their policy frame- Government and private sector partnerships.
works are out to achieve (Federal Republic of Nigeria, Arts, culture and tourism
2001;UNESCAP, 2007; Republic of Ghana, 2006, National security and law enforcement
Sarkar De, 2005): Legislation
Global consideration
Increasing the benefits from ICT. IT popularization and awareness
Ensuring that ICT resources are readily available
to promote efficient national development. The Ghanaian ICT for Development policy docu-
Creating the necessary enabling environment to ment (Republic of Ghana, 2006) highlights how the
facilitate the deployment, utilization and exploita- ICT4D policy objectives can be achieved in the areas
tion of ICTS within the economy and society. of:
Assisting people and organizations to adapt to new
circumstances and providing tools and models to Agriculture
respond rationally to challenges posed by ICT. Education
Facilitating the development, expansion, re- Health sectors
habilitation and continuous modernization of
the countrys information and communication By specifying the sectoral applications of the policy
infrastructure. document, it will be possible to implement the policy
Encouraging local production and manufacture statement to the advantage of the different sectors of
of ICT components in a competitive manner. the country.
Providing individuals and organizations with a
minimum level of knowledge and the ability to
keep it up to date. IMPleMentatIon oF Ict PolIcIes
Supporting the concept of lifelong learning.
Identifying areas of priority for ICT develop- Adam (n.d.) notes that the up take of polices and their
ment. implementation, by and large, vary from one country
Promoting legislation and policies for the protec- to other based on the extent to which they:
tion of online, business transaction, privacy, and
security. Integrated or subordinated ICTs to national aspira-
Enhancing the quality of services and products. tions and development plans
Involved champions (experts) and secured com-
sectoral application of african mitment from the highest level (who initiated and
Ict Policies drove the process)
Addressed telecommunications and broadcasting
An African national ICT policy normally specifies sector reforms
the areas of the country the policy will be applied to. Involved key stakeholders, especially civil society
The policy gives direction on the strategies for using organizations and the private sector in the defini-
ICTs to improve on each sector of the country. The tion, elaboration and implementation
ICT Policies in Africa
Undertook assessment to inform policy develop- Various studies have revealed that peoples aware-
ment ness and knowledge of the benefits of ICT is very I
Paid attention to the capacities of government low and needs to be enhanced
and other instrument to implement the policies Inability of the countries to keep pace with the
and carry on with the iterative process continuous and rapid speed of ICT innovation
and development
These factors determine the extent to which African
countries can adopt and implement ICT policies.
Policy implementation remains one of the key issues Future trends
in many developing countries in Africa particularly
given the fact that while many countries have a na- There is steady growth in the number of African coun-
tional ICT policy in place, very little progress has, in tries that have formulated ICT policies. It is hoped
most cases, been achieved in policy implementation. before long that all 54 countries in African will have
African countries are generally faced by dichotomy national ICT polices. An ICT framework is generally
in ICT policy in that while national ICT policy are recognized as a necessary step in order to create an
aimed to deliver broader social-economic outcomes enabling environment for the development of ICTs and
for the entire country, sectoral reforms are primarily their uses to enhance economic development and bet-
aimed at ensuring particular objectives of a sector ter social outcome (Njuguna, 2006). As more African
primarily driven by minority business interest and countries developed ICT polices, the economic, social,
this creates a situation of potentially conflicting goals and other sectors of the continents are sure to improve
for policy makers and thus resulting into an impasse tremendously. Research on how African countries can
when it comes to policy implementation. This helps adequately implement ICT polices in needed to enable
to explain the situation where a majority of African the continent reap the benefits of ICT policies. Research
countries that have completed an ICT policy have not on attitudes of government officials towards ICT policy
made any progress on its implementation even when formulation and implementation could be conducted,
the policy has been in place for more than three years the outcome of which could help to assists different
(Njuguna, 2006). African counties to improve their policy status.
This impasse in formulation and implementation of
ICT policy can be traced to the unique situation faced
by developing countries where developing countries conclusIon
in African have to address wide social-economical
development objectives such as those outlined in the ICT policies enable countries to articulate measures that
millennium report on one hand and the ICT sector is- can enable them use ICTs to enhance the development
sues such as privatization, liberalization, and regulatory of the different sectors of the society. Several African
concerns on the other (Njuguna, 2006). countries have already formulated national ICT poli-
Sarkar De (2005) identifies the problems associ- cies. However effective steps have not yet been taken
ated with the adequate implementation of ICT policies, in most cases towards implementation of the policies.
particularly in developing countries (including African Concerted efforts should be made by countries that
countries) as follows: are yet to devise policy to formulate one. All African
countries that have formulated ICT policy must take
The government identifies ICT as tool for de- concrete steps to implement them. One of such steps
velopments, but most of the polices result in could be for the governments to establish an agency
sectoral development of ICT in software rather which should be responsible for planning for and
than focusing on social induced development monitoring ICT policy implementation strategies.
Most countries do not have definitive national The governments can also set a time frame for the
ICT development master plan actualization of the statements of intensions expressed
There is a lack of availability as well as unbalanced in the policies. ICTs are always evolving, so there is
distribution of information and telecommunica- need for periodic revision of formulated ICT policies
tion infrastructure in most of the countries in order to take care of new developments and meet
new realities of life.
ICT Policies in Africa
ICT Policies in Africa
0 Section: Process ICT
Wendy R. Carroll
Acadia University, Canada
In recent years, there has been increasing interest understanding virtual teams
among managerial researchers in the phenomenon of
virtual teams. The growth of the Internet along with Advances in information technology over the past
other forms of information communications technol- decades have increased the number of teams in vari-
ogy (ICT) have resulted in the adoption of geographi- ous settings working across time and space. This new
cally dispersed networks by businesses in an effort to organizational formation has heightened interest by
maximize the utilization of expertise within organiza- both academics and practitioners to explore virtual
tions. Academics have been quick to notice this trend. work teams. Although there is an increasing emphasis
Thus, a large number of written articles examine the in the literature relating to the study of virtual teams, the
impacts of these new teams on organizational structure, work is still in its early stages of development (Powell,
technology utilization, and team processes. However, Piccoli, & Ives, 2004). The most prominent theme in
academics have been slower to notice the changes that the literature to date has focused on the challenges
ICT have had on the way research is performed. While experienced by virtual teams, especially as relates
some work has been done describing the emergence of to media richness and information communication
large formalized electronic networks of international technology tools (Andres, 2002; Maznevski & DiS-
scholars, these studies tend to dismiss the formation tefano, 2000; Powell et al., 2004). Specifically, this
of small groups of scholars as irrelevant (Milliman & research has focused on the ways in which a business
Glinow, 1998a, 1998b; Teagarden, Von Glinow, Bowen, deals with the opportunities and challenges that are
Frayne, et al., 1995). associated with the development of virtual teams and
The purpose of this chapter is to bring these smaller its effective use of information mediated technology.
self-forming, informal academic research teams into Studies have provided insights regarding the use of
focus to understand the effects of ICT and associated various communication channels from collaborative
processes which have emerged to support such forma- such as face to face, telephone, video conferencing, and
tions. In addition, the identification of different traits instant messaging to asynchronous such as letters and
within the small teams will be noted. This chapter will e-mail (Majchrzak, Rice, Malhotra, King, & Ba, 2000;
provide insight about virtual academic research teams Pauleen, 2003; Townsend, DeMarie, & Hendrickson,
(VART) based on the literature to date in this area as 1996; Watson-Manheim, Chudoba, & Crowston, 2002).
well as some insights about VARTs from two recent More recent works have begun to focus on areas such
exploratory empirical studies (Carroll & Lecoure, as team design, culture, training, relationship building,
2005; Lecoure & Carroll, 2004). Specifically, it will trust, communication, coordination, and task/technol-
address questions relating to the ways in which these ogy structure fit.
teams come about, the different types of virtual research Numerous definitions of a virtual team have been
teams that exist, and the possible practices which result posited in the literature to date. Although variations
in the success these teams. exist between the definitions, most researchers agree
in general terms that a virtual team is a group that is
distributed and works across time and space using
information communication technology (see Ahuja,
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
ICT Processes for Virtual Academic Research Teams (VART) in Academia
Galletta, & Carley, 2003; Bell & Kozlowski, 2002; virtual academic research team (Milliman & Glinow,
Jarvenpaa & Leidner, 1999; Lipnack & Stamps, 1999; 1998a; Nason & Pillutla, 1998). I
Manzevski & Chudoba, 2000; Powell et al., 2004; Wong
& Burton, 2000). One issue that has arisen with respect
to definitions and terms in this area is the semantics dynaMIcs oF varts
concerning the words team and group. Both terms
are used interchangeably. However, it has been noted It must be acknowledged that an emerging stream of
by some researchers that the term team should be literature focuses on the academic international re-
reserved for those groups that display high levels of search team (AIRT). Current published works around
interdependency and integration among members AIRT are limited and are aimed mainly at issues sur-
(Powell et al., 2004). Considering this distinction, this rounding the planning and development of a model
article will define a virtual team as a group of people for large, organized, and funded consortiums (Nason
who interact through interdependent tasks guided by & Pillutla, 1998; Teagarden et al., 1995). A review of
a common purpose that work across space, time and the literature identified that most work was theoretical,
organizational boundaries with links strengthened by case based, and speculative. Furthermore, in current
webs of communication technologies (Lipnack & research, the terms used to describe this phenomenon
Stamps, 1997, p. 7). have not been consistent among authors in either
description and/or definition. The overall review of
academic research teams the literature also identified that the individual virtual
academic researchers have not been observed or studied
For the most part, past research on the academic re- to provide more general insights with respect to the
search process predominantly focused on areas such VART experience.
as individual author, multiple authorship, interdis- A recent study attempted to address some of these
ciplinary research, academic/practitioner research, gaps to provide more insights about VARTs. The fol-
academic journal, and topics. It has been speculated lowing is an overview of the findings relating to both
that the number of authors on a per article basis has the increase in VARTs since the early 1990s as well as
increased in recent times due to the enablement of ICT characteristics of VARTs identified through a qualitative
and the development of associated processes (Milliman case study with virtual academic researchers.
& Glinow, 1998a, 1998b; Nason & Pillutla, 1998).
However, while it is generally believed that academics vart trends
have begun to work virtually with colleagues using
various forms of ICT, there is to date limited empirical The rising trend in authors per article is unsurprising
evidence to support this assumption. Further, a closer in light of the technological advances adopted within
examination of the effects of ICT on the academic business and society over the last several decades.
research process is driven by two trends. First, with Even for researchers that work in single university
the globalization of business, the challenge in manage- teams, the ability to communicate outside of traditional
ment research has become heightened to create a more office hours while having the use of asynchronous
international focus when addressing research questions communication technologies allows for an even closer
around cross-cultural dimensions, team effectiveness, coordination of team tasks and the inclusion of addi-
and other new topics as they emerge (Turati, Usai, tional researchers.
& Ravagnani, 1998). Second, the vast developments In a recent study of five leading academic organi-
in information communication technology have also zational studies journals1 (Lecoure & Carroll, 2004),
changed the ways in which academics exchange, access, there was a clear indication that multi-authorship has
and compute information (Koku, Nazer, & Wellman, increased during the period between 19922001 (Fig-
2001). These two factors combined have provided both ure 1). The rise in VART ratio appears to cut across
the ability and need for academics to work virtually. both theoretical and quantitative works (see Figure 2).
Although some academics have worked in distributed Significant trends in VART ratios were found in both
groups in the past, there are few studies examining the the Academy of Management Review, which publishes
theory pieces almost exclusively, and the Academy of
ICT Processes for Virtual Academic Research Teams (VART) in Academia
Figure 1. VRT ratio increase by year ( 2007, Wendy R. Carroll. Used with permission)
Figure 2. VRT ratios by journal ( 2007, Wendy R. Carroll. Used with permission)
Note:
1 = Administrative Science Quarterly
2 = Academy of Management Review
3 = Academy of Management Journal
4 = Strategic Management Journal
5 = Personnel Psychology
ICT Processes for Virtual Academic Research Teams (VART) in Academia
Management Journal, which has a quantitative focus. Mentoring teams which are the continuance of
Strategic Management, which publishes both types of the natural and traditional relationship of the I
articles, was also found to have a significant trend in thesis advisor and student beyond graduation.
VART ratio. The analysis of the trend in VART ratio This relationship, when it continues, tends to be
between journals provided one surprising result that rather robust and long lasting.
is difficult to explain in light of other findings in this Expertise based team which is typified by the
study. Personal Psychology had the highest mean author requirement of adding additional authors to fill
count (M=2.68, SD 1.32), but in the post-hoc analysis, skills gaps in the team. Typical expertise based
the VART ratio was not found to change significantly teams are usually a fusion of strong theorists
over time. and writers with those who have strong statisti-
While the measure of whether the authors of each cal and analytical skills or teams that require an
individual article were working in a virtual team is experienced manager due to their complexity.
simplistic and inclusive (it cannot discriminate on work Common interest teams which differ from ex-
done on sabbatical, vacation studies, or universities pertise based teams because the relationships
in close geographical proximity), the change in VART are formed due to similar research interests. As
ratios over the decade from 1992 to 2001 suggests that expected, the majority of these types of teams
there has been a slight, but significant, change in the begin at academic conferences or through mutual
way academics conduct their research. There are two acquaintances. Very few of these teams form
possibilities that may help to explain the results of through the published work of one researcher be-
the data supported by another study described below ing read by another, who cold-calls the author
(Carroll & Lecoure, 2005). The first possibility is that to see if they would like to work together. Ac-
the recent and rapid proliferation of ICT has resulted cording to our interviewees, these types of teams
in new research dyads and triads being formed, and it are the most susceptible to breakdown. While
is based upon exposure to a wider group of academics research interest may be similar, methodologies
for coworker selection purposes. A second possibility and approaches often differ substantially. These
is that researchers who were co-located at one time in relationships also suffer greatly from attrition
their careers are now able to continue their collegial because commitment and motivation to pursue
relationships even after one or the other has moved on the project differ between members.
to a new institution. Also, mentor relationships may be Collegial teams which like the mentor teams are
extended temporally as mentors and their former gradu- fairly robust. The researchers have either worked
ate students are easily able to communicate through together before or have long lasting personal or
ICT technologies. professional association. These teams often have
a fixed and expected approach to how the research
characteristics of varts will be conducted. Unlike the common interest
team, collegial teams have worked through their
An exploratory qualitative study suggested that VARTs methodological differences through successful
have varying types of team formations and adoption negotiations in previous team formations.
of certain practices which further compliment ICT
use and contribute to the overall success of a research The collegial teams and mentor teams appear to
project (Carroll & Lecoure, 2005). A case study of a provide a strong cohesive nucleus. Additional research-
single university was conducted to further explore this ers can be added to form new expert teams or common
phenomenon. Two emerging themes developed from interest teams. However, the success of this new team
the study relating to VART formation and critical suc- seems dependent on the same variables discussed in re-
cess factors which are described below. lation to the success factors of newly formed teams.
Four types of VART formations were described by the Several behavioral practices that may relate to VART
participants in the study: success have been posited based on this recent study
ICT Processes for Virtual Academic Research Teams (VART) in Academia
(Carroll & Lecoure, 2005). These practices apply pri- choose research partners from all corners of the world.
marily to research conducted by new virtual research However, future research must continue to work towards
teams or existing virtual research teams to which new understanding how and why these self-forming teams
members have been added: achieve successful outcomes.
ICT Processes for Virtual Academic Research Teams (VART) in Academia
Lipnack, J., & Stamps, J. (1999). Virtual teams: The Watson-Manheim, M. B., Chudoba, K. M., & Crowston,
new way to work. Strategy & Leadership, 27(1), 14. K. (2002). Discontinuities and continuities: A new way I
to understand virtual work. Information Technology &
Majchrzak, A., Rice, R. E., Malhotra, A., King, N., &
People, 15(3), 191.
Ba, S. (2000). Technology adaptation: The case of a
computer-supported inter-organizational virtual team. Wong, S.-S., & Burton, R. M. (2000). Virtual teams:
MIS Quarterly, 24(4), 569. What are their characteristics, and impact on team
performance? Computational and Mathematical Or-
Manzevski, M. L., & Chudoba, K. M. (2000). Bridging
ganization Theory, 6(4), 339.
space over time: Global virtual team dynamics and ef-
fectiveness. Organization Science, 11(5), 473.
Maznevski, M. L., & DiStefano, J. J. (2000). Global Key terMs
leaders are team players: Developing global leaders
through membership on global teams. Human Resource AIRT: Academic International Research Teams are
Management, 39(2,3), 195. normally formally established and work on research ini-
tiatives which involve several countries and cultures.
Milliman, J., & Glinow, M. A. V. (1998a). The academic
international research team Small world after all. Jour- Distributed Groups: Refers to a group formation
nal of Managerial Psychology, 13(3/4), 150. when members are y located in different geographic
areas.
Milliman, J., & Glinow, M. A. V. (1998b). Research and
publishing issues in large scale cross-national studies. Media Richness: Refers to the amount of informa-
Journal of Managerial Psychology, 13(3/4), 137. tion which can be exchanged and transmitted through
a specific communications channel such as telephone,
Nason, S. W., & Pillutla, M. M. (1998). Towards a model
email and face to face. Some channels provide for a
of international research teams. Journal of Managerial
stronger capability for exchanging information ef-
Psychology, 13(3/4), 156.
fectively.
Pauleen, D. J. (2003). Lessons learned crossing bound-
VART: Virtual Academic Research Teams are both
aries in an ICT-supported distributed team. Journal of
formally and informally establish teams that work in
Global Information Management, 11(4), 1.
separate geographic locations and communicate with
Powell, A., Piccoli, G., & Ives, B. (2004). Virtual team members using information communication
teams: A review of current literature and directions for technologies.
future research. Database for Advances in Information
VART Team Formations: Four types of team for-
Systems, 35(1), 6.
mations for VARTs as identified through an exploratory
Teagarden, M. B., Von Glinow, M. A., Bowen, D. study which include mentor, expert, common interest
E., Frayne, C. A., et al. (1995). Toward a theory of and collegial.
comparative management research: An idiographic
Virtual Team: A group of people who interact
case study of the best international human resources
through interdependent tasks guided by a common
management project. Academy of Management Journal,
purpose that work across space, time and organiza-
38(5), 1261.
tional boundaries with links strengthened by webs of
Townsend, A. M., DeMarie, S. M., & Hendrickson, A. communication technologies (Lipnack & Stamps,
R. (1996). Are you ready for virtual teams? HRMaga- 1997, p. 7).
zine, 41(9), 122.
Turati, C., Usai, A., & Ravagnani, R. (1998). Ante-
cedents of co-ordination in academic international
project research. Journal of Managerial Psychology,
13(3/4), 188.
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
ICTs and Distance Education in Nigeria
between the development of ICTs penetration and use and benefit from ICT developments. Nigeria was ranked
in distance education programs and its diffusion into 90th out of the 115 countries surveyed. United States I
the programs in higher education is dependent upon a of America topped the list, followed by Singapore,
number of factors. Denmark, Iceland, Finland, Canada, Taiwan, Sweden,
Switzerland and the United Kingdom, etc. Likewise,
Nigeria was ranked 86th out of 104 countries surveyed
bacKground in 2004 which still shows a decline in Nigerias pre-
paredness to participate in and from ICT developments.
Regardless of the fact that there are relatively abundant Similarly, a study by Nigerian Information Technology
researches on distance teaching and learning, studies Professionals in America in 2002 indicated that given
on the impact of information and communication tech- current ICT penetration it may take Nigeria 50 years
nologies (ICTs) on distance education in Nigeria are to catch up with America on the aspect of Pc count per
sparse. However, the use of ICTs by higher education households (Iromanto in Yusuf, 2006).
institutions across the world is beginning to emerge Information and communication technologies
fast over the last decade. Higher education institutions (ICTs) are indispensable and have been accepted as
across the world have been adopting ICT teaching and part of the contemporary world especially in the in-
learning technologies in an effort to create an environ- dustrialized societies. In fact, cultures and societies
ment for both students and their instructors to engage are adjusted to meet the challenges of the knowledge
in collaborative learning environment and gain access age. The pervasiveness of ICT has brought about rapid
to information (Ifinedo, 2006). changes in technology, social, political, and global
As such, every nation invests in education because economic transformation. However, the domain of
it can produce unquantifiable benefits for individuals, distance education has not been unaffected by the pen-
organizations and the society as a whole. Education is etrating influence of information and communication
provided through formal and informal means. In formal technology. Unquestionably, ICTs has impacted on the
settings the conventional (face-to-face school instruc- quality and quantity of teaching, learning, and research
tion) and distance education (offered with separation in in distance education. Therefore, ICT provides oppor-
terms of physical location of instructors and students) tunities for distance education students, academic and
have been used to provide educational opportunities non-academic staff to communicate with one another
to recipients. Open and distance education though not more effectively during formal and informal teaching
new in Nigeria has been given much prominence of and learning (Yusuf, 2005). For this reason, distance
recent. Many Nigerians benefited through the open education programs in Nigeria need to integrate ICTs
education (correspondence) of Rapid Result College, into their agendas, because the quality of teaching using
and Exam Success Correspondence College, among ICTs to gain access to information is known in virtually
others. It is also a means of providing access to basic all countries to be a key predictor of quality student
information and tertiary education for Nigerians (Yusuf, learning. Therefore, effective manpower training is
2006). Notwithstanding the keenness by the federal crucial using ICTs, because ICTs are tools that on the
and state governments to guarantee open and distance one hand can facilitates human resources development,
education in Nigeria, the use and penetration of ICTs and on the other hand, helps us to take full advantage of
in distance education teaching and learning has been a the potential of technology to enhance quality student
major obstacle that may impede proper implementation learning via distance education (UNESCO, 2003).
of the program by institutions of higher learning. The
evidence seem glaring that Nigeria is not yet ready in
her preparedness to integrate ICTs in all spheres of her the natIonal oPen and dIstance
national economy. educatIon unIversIty oF nIgerIa
For example, a recent study conducted by the Global
Information Technology (2005), the report used the The National Open and Distance Education University
Networked Readiness Index (NRI), covering a total of of Nigeria (NODEUN) first began in 1983 but was
115 economies in 2005-2006, to measure the degree of suspended in 1985 by the then military government.
preparation of a nation or community to participate in The resuscitation of NODEUN is part of the commit-
ICTs and Distance Education in Nigeria
ment of the present government towards Universal education in Nigeria. The key assertion of this paper
Basic Education. The justifications for the establish- is that the effective use of ICTs for distance education
ment of the Open University are clear because there addresses both the problem and solution to technology
are approximately 1.5 million applications per year based learning, seeking synergistic results that benefit
who fight for a place to attend university. However, the distance education students as they graduate and carry
University system can only accommodate 20% of this out their duties.
number. The course delivery of the Open University Despite the keenness by institutions of higher learn-
will be through a combination of web-based mod- ing to establish distance education programs, they are
ules, textual materials, audio and video tapes as well confronted with enormous problems that may impede
as CD ROMs. The university currently has 18 study proper implementation. Some of these problems are:
centers and plans to have at least one study center in Poor ICTs penetration and usage among Nigerian dis-
each of the 774 local governments of Nigeria. It runs tance education practitioners. Approximately almost
programs in education, arts and humanities, business all African countries basic ICTs infrastructures are
and human resource management and science and inadequate; this is as a result of problem of electricity
technology (Mac-Ikemenjima, 2005). Prior to the Open to power the ICTs materials, poor telecommunication
University, the National Teachers Institute (NTI) was facilities, poor postal system and lacks of access to
the first institution specifically established by Federal the needed infrastructures is made awkward because
Government to provide distance education courses of insufficient funds.
designed to upgrade under-qualified and unqualified According to Yusuf (2006), since successful distance
teachers. NTI also introduced the Nigerian Certificate education cannot be assured without the use of commu-
in Education (NCE) by distance learning in 1990 (COL nication and technological tools (e-mail, fax, Internet,
International, 2001). television, radio, etc.). Several cities and rural areas in
In the same vein, given that the demand for access to Nigeria are yet to have or have fluctuation in electric-
higher education and university education in particular ity supply. Just like electricity most Nigerians do not
are higher than can be accommodated effectively. The have access to telephone and other telecommunication
existing institutions are presently operating beyond facilities. Even, telephone lines in the urban centres are
their capacities. The University of Abuja, which is not adequate to serve the teeming population. Services
centrally located in the Federal Capital Territory, was for those who have access are in most cases epileptic.
mandated by law to offer distance learning through- These may make the integration of telecommunica-
out the country. It was originally intended to operate tion in the delivery of distance education difficult. In
as an Open University. As a first step to this end, the addition, poor state of telephone has led to increase in
University set up a Center for Distance and Continu- dial-up cost for most Nigerians. Even with the recent
ing Education (CDLCE). An assessment conducted in introduction of GSM in August, 2001, access is still
August 1999 of the available resources for delivering limited and services are yet to be perfect and service
distance education at the CDLCE indicated that the charge may make GSM unattractive for distant learn-
available facilities are inadequate for both present and ers. Poor economic situations and its effects on middle
future needs (Moja, 2000). level manpower, stands as the major obstacle towards
the implementation of ICTs in distance education.
Even an average middle income earner cannot afford
PurPose oF the study basic technological and communication gadgets. Thus,
computer related telecommunication facilities might
In Nigeria, we acknowledge that more than a few not be useful for most Nigerians, as computer is still
factors affect the integration and approach to suc- a luxury in institutions, offices and homes. This has
cessful improvement of distance education programs. made the integration of necessary on-line resources (e-
Since this is the case, it was reasonably impossible mail, newsgroups, World Wide Web, etc.) into distance
to consider all the factors. Therefore, the purpose of education in Nigeria most difficult.
this study is not to look into such several factors but
to address the impact of ICTs in relation to distance
education, and relate it to sustainable development of
ICTs and Distance Education in Nigeria
ICTs and Distance Education in Nigeria
Ololube, N. P. (2006). Teachers instructional material ICT: Information and communication technolo-
utilization competencies in secondary schools in sub- gies (ICTs) are advances in technologies that provide
Saharan Africa: Professional and non-professional a rich global resource and collaborative environment
teachers perspective. In Proceedings of the 6th Inter- for dissemination of ICT literacy materials, interactive
national Educational Technology Conference EMU, discussions, research information, and international
19-21 April 2006, North Cyprus. exchange of ideas, which are critical for advancing
meaningful educational initiatives, training high
UNESCO (2002). Information and communication
skilled labor force, and understanding issues related
technologies in teacher education: A planning guide.
to economic development. ICTs highlight innovative
Paris: UNESCO.
efforts and partnerships and promote ICTs literacy, and
UNESCO (2003). Manual for pilot testing the use of facilitate interaction between all sectors of a national
indicators to assess impact of ICT use in education. economy including external spheres.
Retrieved March 12, 2008, from http://www.unescobkk.
ICT Competencies: Involves but not restricted to
org/education/ict/resource
the use an online catalogue to identify and locate re-
UNESCO (2005). United Nations decade of education sources for a specific information need, keyword search
for sustainable development 2005-2014. Retrieved strategies to refine operational situations, browser and
March 12, 2008, from http://portal.unesco.org/edu- search engine to locate and retrieve appropriate informa-
cation/en/ev.php-URL_ID=27234&URL_DO=DO_ tion and the use of other ICTs instructional materials
TOPIC&URL_SECTION=201.html that aid teaching and learning situations
Yusuf, M. O. (2005). Information and communication ICT Literacy: The capability (knowledge, skills,
technologies and education: Analyzing the Nigerian and aptitude) of a person to identify, search effec-
national policy for information technology. Interna- tively and present specific information in order to build
tional Education Journal, 6(3), 316-321. knowledge and develop critical and creative thinking
pertinent to a field of study.
Yusuf, M. O. (2006). Problems and prospects of open
and distance education in Nigeria. Turkish Online Open and Distance Education: Distance educa-
Journal of Distance Education, 7(1), 22-29. tion, also called open or distance learning is a form
of education in which there is normally a separation
Zajda, J. (1995). Defining excellence and quality in between teachers and learners. Thus, it includes one
education. In J. Zajda, K. Bacchus, & N. Kach (Eds), which others may refer to as a means of the printed
Excellence and quality in education (pp. i-xiii). Albert and written word, the telephone, computer conferenc-
Park: James Nicholas Publishers. ing or teleconferencing used to bridge the physical
gap between the instructor and the learner. Distance
KeyWords education equally involves the provision of whatever
educational opportunities that are needed by anyone,
Access of Information through ICTs: The amount anywhere, at any time for those who otherwise would
of information accessible to individuals to support them have been denied.
in trying new strategies, thinking and creativity that are Standard: Standard in this context is the degree
reflective in practice aimed at engaging them to new of excellence required for a particular purpose; it is
innovations through the use of ICTs. an accepted or approved example against which phe-
Excellence: Excellence in this paradigm is a gener- nomenon are judged or measured.
ally accepted best ways of doing things in education
in search of distinction in teaching and learning situ-
ations. It is an essential component of best practice
that creates quality teaching strategies that produces
improved scholarship.
00
Section: Process ICT 0
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Impact of Technological Frames on Knowledge Management Procedures
0
The Impact of Technological Frames on Knowledge Management Procedures
that can create global strategic competitive advantage shaping how organisations develop strategies and plans
(Tucker, Meyer, & Westerman, 1996). It is facilitated for the future. Many researchers believe that successful I
by the development of a learning organisation that organisations that forge ahead in a rapidly changing
processes the ability to manage its knowledge assets business environment will do so through creating
and transfer that knowledge quickly and efficiently and sharing the new knowledge. Thus, organisational
(Garvin, 1993). Organisational learning relies upon learning from a knowledge management perspective
sharing knowledge and insights by building on past provides the opportunity for the goals and objectives
knowledge, experience, and learning of its people of the organisation to be cultivated simultaneously
(Stata, 1989). The functional role of knowledge man- with the goals and objectives of the individuals (COIL,
agement is to bring formality to these concepts through 1999). Specifically, individuals are important to the
an interactive process. learning process within the organisation, but organisa-
tional learning cannot be reduced to individual learning
(Levine, 2001).
technologIcal FraMes FroM an Within an organisational learning context, an eco-
organIsatIonal PersPectIve logical approach to knowledge management has been
explored by Davenports (1997) research on informa-
An overview of studies conducted to identify the fac- tion ecology, which calls for communities of practice
tors leading to information technologys successful to be involved in the establishment of an ecological
implementation and use in organisations usually makes model that is holistically managed within an organi-
reference to top management directives concerning sation. The human-centred information management
technology, alignment of the business strategic plan model described by Davenport (1997) focuses on the
to IT plan, market strategies development using in- information environment, the organisational environ-
formation technology, frequency of technology use, ment that surrounds it, and the external environment of
and process improvement by computer science, which the marketplace. In this model, primary importance is
involves an understanding of the business linked to placed on the people within the organisation, in terms of
information technology. their strategic use of information, information politics,
While this IT vision is a sine qua non condition and the culture and behaviour of individuals within an
to develop new options in the organisational business organisation (Davenport, 1997).
context, it is also an essential part of an individuals According to COIL (1999), an ecological approach
perspective vision about technology (Cano, 2000) be- to knowledge management is based on the assump-
cause through information technology, the actions and tion that the accumulation of data is influenced by the
possibilities usually advised and planned by top man- core values of organisations, and that through some
agement will be made easy. Therefore, an individuals process of human interaction and context, including
vision about technological phenomenon provides the the use of computers to access and review the data,
strategies devised by organisational top management these data then take on significance and importance
with meaning. Each individual establishes some way as information. Next, through the process of context,
to observe, understand, and use technology, and each accumulation of data, sense making, synthesis, and
way has been recreated in literature as a technological reflection, this information is transformed and converted
frame. This term comes from a revision of technologi- to knowledge that is relevant to decision making within
cal phenomenon in the social scope whereby the com- the organisation, which then may or may not produce
mon perspective and technology social construction an action step but does influence the next round of
is analysed. data accumulation (Brown, Collins, & Duguid, 1989;
COIL, 1999; Johnson, 1996). For instance, it might be
that use of information may change the organisation in
KnoWledge ManageMent FroM an terms of producing more effective decision making, or
organIsatIonal PersPectIve that a transformation occurs within the organisational
structure in the process of using the information itself
The evolution from data to information and from in- (COIL, 1999).
formation to knowledge has played a leading role in
0
The Impact of Technological Frames on Knowledge Management Procedures
Another ecological model, the knowledge ecology are divisions main functions. Leveraging knowledge
model, has at its core an active, interdependent, and by sharing was a very common objective for consult-
complex adaptive system that adds an innately systemic ing firms. For example, case C shared knowledge in
dimension to the knowledge and learning that occurs order to speed up deliveries to customers and develop
within the organisation (Brown, 2000; COIL, 1999; management through leadership. In addition, case
Sveiby, 1997). Within a knowledge ecology perspec- C sought to provide high quality business results to
tive is the accumulated expertise and learning within clients and increase profits by enhancing knowledge
the ecosystem, where ideas are exchanged, innovation sharing and leveraging environment. Knowledge and
blossoms, and value is added to information, thus pro- expertise were the most important assets for case C
ducing new knowledge to test and apply in the internal and therefore how to capture and leverage knowledge
and external environment, predominantly through the were critical issues. Many consulting firms began by
use of information systems (COIL, 1999). collecting experiences and the best knowledge man-
agement practices.
For companies in the high-technology industry,
brIeF descrIPtIons oF Four the stimulus for a knowledge management campaign
cases was diverse. Case B focused on managing intellectual
capital and wanted to improve knowledge utilisation
The cases collected include two IT-related firms, one more efficiently and effectively. More precisely, case
consulting firm and one division within a local city B attempted to link intellectual capital with strategies
council. All cases are highly knowledge-intensive. Table and to leverage technology for global collaboration and
1 provides a brief description of each case, in terms of knowledge sharing. Differing from case B, case A held
its business type, stimulus for knowledge management a series of workshops to understand the current status
strategies, and objectives of this research related to of knowledge management within its business units and
each case. Three of the four cases were stimulated by built an expert network and provided the appropriate
competition to begin a knowledge management cam- experts for their clients who called for help.
paign. Case D is a division within a local city council.
Providing information to the public and utilising the
knowledge management system within the city council
0
The Impact of Technological Frames on Knowledge Management Procedures
Once knowledge management was initiated, cases Four cases identified knowledge management topics and
created an environment to facilitate direct knowledge issues by setting up a pilot program (or its equivalent),
management activities. This might involve creating as a most popular solution. Cases B, C, and D all chose
0
The Impact of Technological Frames on Knowledge Management Procedures
this method in order to produce an incremental process customer focus, of intimacy, loyalty and enhanced
in the initiation stage. Case A had several independent relationships with customers. The criteria adopted by
knowledge management projects within each branch, case A included finding the topic that had the most im-
such as a corporate education organisation (CEO) in mediate, tangible result. It should be noticed that this
its personnel division, product processes organisation exploration was based upon a corporate strategy.
(PPO), and computer product organisation (CPO) in the
development division. All of these sub-organisations generation
functioned as a pusher in its knowledge management
strategy. This stage was concerned with the generation of
Topic objectives used to launch the knowledge knowledge, and the practices of all cases can be dis-
management campaign could be: to improve product cussed from two points of view: team and knowledge
development and anticipate customer needs; to boost identified issues, which are identified from the four
creative problem solving; to reach a new level of firms practices. The first issue was the type of team
0
The Impact of Technological Frames on Knowledge Management Procedures
responsible for the knowledge management projects. to create expert profiles. Case D developed a
The second issue was how and where firms identify knowledge architecture and taxonomyusing I
knowledge. a developed expertise search engine to ensure the
effort on knowledge management was kept in the
1. Teams: Of all of the cases, case D was the only firm.
one to organise a formal knowledge network for
each key domain of knowledge and knowledge Modeling
focus groups for specific topics such as shared
corporate services in Taiwan practices. The This stage was concerned with the method of justify-
learning community, a Web-based forum dis- ing and organising the generated knowledge. Due to
cussing any issues within firm for all personnel, the absence of justification criteria for these cases, the
was another form of a team used to gather and analysis focused on how each organisation structured
generate knowledge, as for cases A, B, and C. their knowledge.
These groups or teams regularly set up a virtual Methodologies are quite diverse. Any organisation
meeting via an online information system. For may establish its own methods to classify knowledge.
example, the corporate education organisation For example, case D developed knowledge architec-
at case A built an online discussion database in ture to specify the categories and terms for searching
which the instructors delivered the value of the database and document files, while case B preferred
course materials to employees. to organise knowledge following the thesaurus ap-
2. Identifying knowledge: Each case had different proach and search using the keyword approach rather
approaches to identifying knowledge. Case A de- than categories. Organisations which established a
veloped a structure of competencies to assess each learning community to capture feedback from fellow
employees ability by competing with each other staff included case C. Case A built up a database into
to leverage the potential expertise of employees. business categories by developing practice content and
Case B used multiple forums, such as professional diagnose tools.
forums, competency network forums, software
asset forums, and project profile forums. The pur- storage
pose of these forums was brainstorming to capture
the point of each conversation. Case C drew a Storage stage involves holding much diverse informa-
knowledge map, which was a firmwide database tion as discussion results, employee skills/expertise, and
Cases Method
Organising calls to the database into business categories
A
Developing best practices content and diagnostic tools
Organising knowledge using the thesaurus approach and search by
keyword
B
Providing standardisation and methodology to capture and retrieve
information
0
The Impact of Technological Frames on Knowledge Management Procedures
Best Skill/
Cases Discussion FAQ Others Maintenance
practice Expertise
Expert Community
A Yes Yes Yes No
profiles members
Research
General database
intellectual Knowledge
B Yes Yes Yes Market &
capital engineers
repository customer
information
Qualification
Sales
Consultant
C Yes Yes Yes presentation IT staff
skill
Proposal
template
best practices. Skills and expertise are the most popular transfer. Some specific terms appear in the Table 6 in
content stored, and selected cases all had their own the system and platform columns, and these refer
expertise profiles. Best practice was another popular to software packages and integrated systems.
content; cases A, B, and C all created their own storage. Lotus Notes is a groupware application developed
In addition, the storage maintenance became routine, by Lotus, now part of IBM. Notes was one of the first
except that case D used outsourcing for storage, while applications to support a distributed database of docu-
other cases were maintained by internal staff. Other than ments that could be accessed by users across a local
the main approaches to knowledge storage, all cases area network or wide area network. Its sophisticated
had their own daily discussions regarding practical replication features enable users to work with local
issues and then developed a set of frequently asked copies of documents and have their modifications
questions (FAQ) for general inquiries. The other form of propagated throughout an entire corporate network.
storage such as a research database, proposal template, Exchange Server, the Microsoft messaging and
and library of best thinking were also adopted among collaboration server, is software that runs on servers
cases except case A. The maintenance of storage was that enables personnel to send and receive electronic
mainly conducted by internal staff, while case D was mail and other forms of interactive communication
outsourced. through computer networks. Designed to interoperate
with a software client application, such as Microsoft
transfer Outlook, Exchange Server also interoperates with
Outlook Express and other e-mail client applications.
The fundamental method for leveraging knowledge
was to share knowledge through distribution and
0
The Impact of Technological Frames on Knowledge Management Procedures
0
The Impact of Technological Frames on Knowledge Management Procedures
intentionally and unknowingly in misaligned expecta- Brown, J.S., Collins, A., & Duguid, P. (1989, Janu-
tions (such as technologists intending improvements ary-February). Situated cognition and the culture of
in group work while users perceive improvements in learning. Educational Researcher, pp. 32-42.
individual productivity), opposing actions (such as
Cano, J.J. (2000). Technological frames recursive con-
technologists installing and operating a technology
struction approach: A systemic theory for information
while users wait for training and applications), and
technology incorporation in organisations. Doctoral
unanticipated organisational consequences (such as
thesis (in progress), School of Business Administration,
resistance, scepticism, and irregular adoption).
Newport University.
By articulating the interaction between shared in-
terpretations, social action, and technological artefacts COIL. (1999). Knowledge ecology. Community intel-
within an organisational context, technological frames ligence labs. Retrived March 4, 2008, from http://www.
offer a number of theoretical and practical contribu- knowledgeecology.com
tions. It is believed that the concept of technological
frames and the broad domains of technological frames Davenport, T.H. (1997, June 15). Known evils: Common
proposed are useful for examining key members in- pitfalls of knowledge management. CIO, pp. 34-36.
terpretations of technology and the nature and extent Davenport, T.H., De Long, D.W., & Beers, M.C. (1998).
of differences among them. It is also argued that the Successful knowledge management projects. Sloan
framework of technological frames has utility for the Management Review, 39(2), 43-57.
diagnosis, explanation, and anticipation of outcomes
around technological change in organisations, and Davenport, T.H., Jarvenpaa, S.J., & Beers, M.C. (1996).
hence may be particularly useful to implementers Improving knowledge work processes. Sloan Manage-
and practitioners attempting to manage such change ment Review, 37(4), 53-65.
processes. Davenport, T.H., & Prusak, L. (1998). Working knowl-
edge: How organisations manage what they know.
Harvard Business School Press.
reFerences Davidson, E.J. (2002). Technology frames and fram-
ing: A socio-cognitive investigation of requirement
Alavi, M., & Leidner, D. (1999). Knowledge manage- determination. MIS Quarterly, 26(4), 329-358.
ment systems: Emerging views and practices from the
field. In Proceedings of the 32nd Hawaii International Dougherty, D. (1992). Interpretative barriers to suc-
Conference on System Sciences. cessful product innovation in large firms. Organisation
Science, 3(2), 179-202.
Allee, V. (1977). The knowledge evolution: Expanding
organisational intelligence. Butterworth-Heinemann. Dilnutt, R.P. (2000). Knowledge management as
practiced in Australian organisations: A case research
Bassie, L.J. (1997). Harnessing the power of intellectual approach. DBA thesis, Southern Cross University,
capital. Training and Development, 51(12), 25-30. Australia.
Boland, R.J., Jr. (1979). Control, causality and informa- Drucker, P. (1985). Innovation and entrepreneurship.
tion systems requirements. Accounting, Organisation Oxford: Butterworth Heinemann.
and Science, 4(4), 259-272.
Drucker, P. (1995). Managing in a time of great change.
Brancheau, J.C., & Wetherbe, J.C. (1990). The New York: Truman Alley Books.
adoption of spreadsheet software: Testing innovation
diffusion theory in the context of end-user computing. El Sawy, O., & Pauchant, T. (1988). Triggers, templates
Information Systems Research, 1(2), 115-143. and twitches in the tracking of emerging strategic issues.
Strategic Management Journal, 9(5), 455-473.
Brown, J.S. (2000, March-April). Growing up digital.
Change, pp. 11-20. Garvin, D.A. (1993). Building a learning organisation.
Harvard Business Review, 71(4), 78-91.
0
The Impact of Technological Frames on Knowledge Management Procedures
Gash, D.C., & Orlikowski, W.J. (1991). Changing organisations. ACM Transactions on Information
frames: Towards an understanding of information Systems, 12(2), 174-107. I
technology and organisational change. In Academy of
Pinch, T., & Bijker, W. (1987). The social construction
Management Best Papers Proceedings, 51st Annual
of facts and artifacts. In The Social Construction of
Meeting, Academy of Management (pp. 189-193).
Technological Systems (pp. 17-50). Cambridge, MA:
Ginzberg, M.J. (1981). Early diagnosis of MIS imple- MIT Press.
mentation failure: Promising result and unanswered
Stata, R. (1989). Organisational learning: The key to
questions. Management Science, 27(4), 459-478.
management innovation. Sloan Management Review,
Grant, R.M. (1996). Prospering in dynamically-com- 30(3), 63-74.
petitive environments: Organisational capability as
Sveiby, K.E. (1997). The new organisational wealth:
knowledge integration. Organisation Science, 7(4),
Managing and measuring knowledge based assets. San
375-387.
Francisco: Berrett Koehler.
Hirschheim, R., & Klein, H. (1989). Four paradigms of
Tucker, M.L., Meyer, G.D., & Westerman, J.W. (1996).
IS development. Communications of the ACM, 32(10),
Organisational communication: Development of inter-
1199-1216.
nal strategic competitive advantage. Journal of Business
Johnson, R. (1996). Setting our sights. Los Angeles: Communication, 33(1), 51-69.
The Achievement Council.
Lai, H.G., & Chu, T.H. (2002). Knowledge manage-
ment: A review of industrial cases. The Journal of
Computer Information Systems, 42(5), 26. Key terMs
Levine, L. (2001). Integrating knowledge and processes
in a learning organisation. Information Systems Man- Frames: Generally referred to as frames of refer-
agement, 18(1), 21-33. ence or cognitive structures in the field of psychol-
ogy. Krippendorff (1986) defines them as the context,
Malhotra, Y. (1998). Tools at work: Deciphering the point of view, set of presuppositions, assumptions,
knowledge management hype. Journal of Quality & evaluative criteria form a cognitive system with which
Participation, 21(4), 58-60. a person perceives, judges or selectively constrains a
course of actions or outcome thereof or with which
Mayo, A. (1998). Memory Bankers. People Manage-
a scientific observer delineates the subject matter of
ment, 4(2), 35-38.
his theory.
Murray, P., & Myers, A. (1997). The facts about knowl-
Knowledge Management (KM): Malhotra (1998)
edge. Information Strategy Online.
stated KM caters to the critical issues of organisational
Noble, D. (1986). Forces of production: A social adoption, survival, and competence in face of increas-
history of industrial automation. New York: Oxford ingly discontinuous environmental change. Essentially,
University Press. it embodies organisational processes that seek syner-
gistic combination of data and information processing
Nonaka, I. (1991). The knowledge creating company.
capacity of information technologies and the creative
Harvard Business Review, 6(8), 96-104.
and innovative capacity of human beings.
Nonaka, I., & Takeuchi, H. (1995). The knowledge
Knowledge Management Procedures: Refers
creating company. Oxford University Press.
to the process in knowledge management and can be
Orlikowski, W.J. (1992). The duality of technology: summarized as creation, acquisition, storage, sharing,
Rethinking the concept of technology in organisations. and transfer (Bassie, 1997; Davenport, Jarvenpaa, &
Organisation Science, 3(3), 398-427. Beers, 1996; Davenport & Prusak, 1998; Dilnutt, 2000;
Drucker, 1985; Mayo, 1998; Murray & Myers, 1997;
Orlikowski, W.J., & Gash, D.C. (1994). Technology Nonaka & Takeuchi, 1995; Sveiby, 1997).
frames: Making sense of information technology in
The Impact of Technological Frames on Knowledge Management Procedures
Organisational Learning: Huber (1991) defined Technological Frames: Orlikowski and Gash
as a change in the range of an organisations potential (1994) use technological frame to identify the subset
behaviors, which may or may not contribute to enhance of members organizational frames that concern the
effectiveness. assumptions, expectations, and knowledge they use to
understand technology in organizations. This includes
Stakeholders: Refers to a large group of individuals
not only the nature and role of technology itself, but also
in organizations. Orlikowski and Gash (1994) briefly
the specific conditions, applications, and consequences
divided stakeholders into managers, technologists,
of that technology in particular contexts.
and users.
Section: Process ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Implementation of Practices with ICT as a New Teaching-Learning Paradigm
of a master course for in-service teachers (or people As regards the communities working around the
temporarily in this job), where the ICT and the reform information systems, it has to be remarked that every
of the school system were used to plan teaching ac- group (i.e., the students, the scholars, and the researchers
tivities. In the first case, some dynamic Web sites for working on every project) had all the features of a com-
the management of bibliographical information were munity of practice (Wenger, 1998, 2004). In the case of
introduced in paleographic teaching and research, and the master course Teacher and Tutor in the Renewed
students were authorized to access them and to work School, which is the more complex and articulated
together with librarians, archivists, paleographers, and answer of the pedagogical community in the university
so forth. The observation of the students behaviors and of Cassino, Italy, to the schools requests for in-service
the scores they had at the ending examinations resulted training courses for teachers, two information systems
in the following deductions: were used for the management of the courses:
1. The suitable use of online information systems The first one was an e-learning platform for the
(i.e., special Web sites) had a great part in the management of the materials and of the discus-
creation of constructivist learning environments sions among students, tutors, and lecturers;
and in helping the students to develop cognitive otherwise stated, it was used as a content manage-
apprenticeship strategies (i.e., the systems helped ment system (CSM) and a computer supported
students in improving learning and performanc- collaborative learning system (CSCLS).
es). The second one, called TETIS (Teaching Trans-
2. The careful analysis of the groups of students parency Information System), implemented the
led to the detection of the features of communi- practices of every day teaching as required from
ties of learners for those groups; in other words, the reform laws and supported people attending
Web technologies integrated traditional learn- the course in the simulation of everyday teaching
ing strategies and contributed in the creation of experiences.
communities of learners where they were never
observed before. At the end of the course, a survey has been proposed
3. At last, the same results from Scardamalia and to the 54 people (nearly 50% of the persons attending
Bereiter (1996) on the impact of virtual envi- the course) who chose to intensively use TETIS plat-
ronments and simulations on students features form for simulating everyday schoolwork. In Table 1,
and skills and the ones from Lave and Wenger their synthetic answers with respect to the perception
(1991) on legitimate peripheral participation were of the support that TETIS can give to teaching work
observed. is reported.
Table 1.
The Implementation of Practices with ICT as a New Teaching-Learning Paradigm
The Implementation of Practices with ICT as a New Teaching-Learning Paradigm
and definite role for online information systems in the of ICT cannot be considered an occasional event or
induction of modifications in the structure of the SECI a starting procedure; it is a new element in the model
model proposed by Nonaka and Takeuchi (1995). The describing knowledge construction and evolution in
implementation of practices by means of ICT appears organizations together with the well known elements
as a new element in the cycle before socialization and of the SECI cycle. Figure 1 reports the revised model
after internalization: for knowledge construction and evolution after the
introduction of the new element (Cartelli, 2007a).
a. Its presence induces the creation of communities
of learners and of practices also where they never
existed before (i.e., the communication instru- conclusIon and Future trends
ments within it create a network of relations and
help people in developing common instruments, To conclude the discussion on the features of the new
identifying in a common project, etc.). The so- teaching paradigm, a comparison among pedagogi-
cialization of tacit knowledge is then possible cal issues, learning theories, and teaching methods is
only after its introduction. needed to see if and how they fit the paradigm. Among
b. Once the SECI cycle is completed and explicit the different philosophical paradigms, the most rel-
knowledge is internalized, people operating on evant for the analysis of the features of the method
the information system are conscious of informa- are (Cartelli, 2007b):
tion management and flow within the context and
develop strategies for the amelioration of their The liberal tradition, associated with Aristotle
work; these strategies can be compared with and Rousseau, which emphasizes the develop-
the tacit knowledge to be socialized in the next ment of the intellect via a broad well rounded
step of the old SECI model. At this moment, it education
is important to collect all the ideas, suggestions, Realism emphasizes intellectual development,
and elements emerging from people activities and reality being considered primarily in terms of
plan an intervention on the information system by empirically proven facts
implementing the new practices within it (i.e., a The progressive tradition hypothesizes the pres-
new implementation of practices with the ICT ence of strong connections between education
is needed after the internalization for the success and society, the links developed on the basis of
of the method). community-relevant practical and vocational
skills,
As a conclusion of the above remarks, this cycle is Behaviorism looks at the notions of control,
periodic: the implementation of practices by means behavior modification, and compliance with
Figure 1. The hypothesis of new model for knowledge construction and evolution in organizations
The Implementation of Practices with ICT as a New Teaching-Learning Paradigm
The Implementation of Practices with ICT as a New Teaching-Learning Paradigm
intelligence of the whole population in a community). Content Management System (CMS): A soft-
It appears in a wide variety of forms of consensus in ware system devoted to the management of teaching
decision making. materials. Lecturers presentations, texts, images, and
every kind of teaching document is made available to
Computer Assisted Instruction (CAI): The teach-
the students attending a given course by identification
ing process in which a computer is used for educational
of a code and password.
purposes with students or more generally in lifelong
learning. It can be used to directly propose contents Connective Intelligence: The intelligence mani-
on given topics or to present drills, practice exercises, fested from people when staying connected on the
and tutorial sequences to the students. Internet (i.e., a social network). For its feature of being
a personal quality of the subjects and for some practi-
Computer Assisted Learning (CAL): The use
cal aspects, like the presence of a connecting medium
of instructional tools presented and managed by a
and the need of being connected, it is different from
computer. Instructional computers either present in-
collective intelligence.
formation or fill a tutorial role, testing the student for
comprehension, giving the student the feedback for Virtual Learning Environment (VLE): The
overcoming difficulties, guiding the student in recovery environment created by a software system designed
actions when errors and/or mistakes appear. to help teachers in facilitating the management of
educational activities for their students, especially by
Computer Supported Collaborative Learning
helping teachers in administrating their courses. The
System: The instruments and the strategies engaging
system can, among other things, monitor both teachers
students in common tasks such that each subject de-
and learners activities.
pends on and is accountable to each other. The instru-
ments supporting the collaboration are both hardware
(LAN, Internet, etc.) and software (e-learning platform,
software for synchronous and asynchronous com-
munication, etc.). The learning activities are usually
coordinated from teachers and tutors.
Section: Product ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Inference Tree Use to Design Arguments in Expository Reports
0
Inference Tree Use to Design Arguments in Expository Reports
if no validation, then bad data we are blamed if bad decisions, then we are
if bad data, then bad info blamed + bad decisions I
if bad info, then bad decisions bad decisions if bad info, then bad decisions +
if bad decisions, then we are blamed. bad info
bad info if bad data, then bad info + bad data
Forward chaining lets the computer generate in- bad data if no validation, then bad data + no
ferences from premises through intermediates to the validation
conclusion. The computer inputs the fact no valida- no validation confirms the initial hypothesis we are
tion, and then repeatedly matches facts with rules to blamed.
get new facts, until a conclusion emerges.
Conceptually, the forward and backward chain-
no validation + if no validation, then bad data ing algorithms are quite simple. They can easily be
bad data converted into human procedures, either separately or
bad data + if bad data, then bad info bad info jointly (recommended by Croy, 2000). Then, writers
bad info + if bad info, then bad decisions bad can use them as techniques for designing the argument
decisions of Figure 1, as well as many other simple arguments
bad decisions + if bad decisions, then we are blamed premised on if-then rules. Writers can even extend
we are blamed. the chaining techniques to design the inference trees
of more complicated arguments, which are premised
Alternatively, backward chaining lets the computer on knowledge that is not expressed in the form of if-
generate inferences from a hypothesis of the conclusion then rules. For example, FC and BC have been used to
through intermediates to premises. The computer selects generate Figure 2, which outlines an argument about
the hypothesis we are blamed and then repeatedly the feedback control cycle (FCC).
matches hypotheses with rules to get new hypotheses,
until it reaches facts:
Inference Tree Use to Design Arguments in Expository Reports
Inference Tree Use to Design Arguments in Expository Reports
5. an inference tree helps users of an expert system 6. users of expert 7. writers of expository
to identify implications of if-then rules systems should use reports should use
inference trees inference trees
1. People use short-term memory for 2. People can only think of a few ideas
thinking simultaneously
leap from many inputs to the output and could be Omitted inference: The inference output is not
replaced with a series of smaller, simpler inferences stated explicitly. This error can be detected by
that are easier to understand. For example, the infer- noticing that adjacent boxes have no emergent
ence tree of Figure 6 has a hugely overloaded inference inference arrows.
from premises 1-6 to conclusion 7. Belated inference: Inputs the core idea of a prior
This error could escape notice in a written report, paragraph that is unnecessarily far removed from
where core ideas are interspersed with many peripheral the paragraphs that contain the output. This error
ideas; but it would be glaringly obvious in the inference can be detected by noticing long inference arrows
tree. A second efficiency error is superfluous inputs. that could be shortened.
When an inference has several inputs, all of them might Premature inference: Instead of an input ap-
seem necessary to justify the output, but on closer pearing far before the output, it is placed far after.
inspection, only some may be found to be necessary, This error can again be detected by noticing long
whereas others are unnecessary. For example, Figure inference arrows that could be shortened.
7 focuses on an inference that has two superfluous Incoherence: Paragraphs with similar core ideas
inputs (3 and 4). are grouped together in the same section of an
A third efficiency error is redundancy. A premise argument; yet inferences connect those core ideas
of argument is redundant if no inference connects it not to one another but to core ideas of paragraphs
to an intermediate or to the conclusion; similarly an in other sections. This error can be detected by
intermediate is redundant if no inference connects it noticing that several arrows cross unnecessar-
to other intermediates or to the conclusion (so that ily.
the entire sub-argument behind that intermediate is Inconclusive argument: Either there is no con-
redundant). For example, the inference tree in Figure clusion whatsoever, or an inane conclusion is
8 contains two redundant premises (1 and 5) and a attached as an afterthought, for example, much
redundant sub-argument (2-4). has been written about this topic.
Inference trees also enable writers to detect another
four reasoning efficiency errors:
Inference Tree Use to Design Arguments in Expository Reports
4. Weakest-link effect
5. An argument consists of
cores & inferences
7. Clearly, writers
6. Trees help focus on cores should draw
and inferences inferences trees
Many reports contain an argument that is much more An inference tree is a diagrammatic outline of an
complex than the above, and the inference tree spreads argument that spreads over many paragraphs in a
over several A4 pages. Such a tree would be difficult written report. Boxes represent the core ideas of the
to draw and to check if the writer continually has to paragraphs, and arrows represent inferences connect-
flip back and forth among the different pages. This ing the core ideas.
difficulty can be eliminated by applying the principle Premises are core ideas that are not inferred from
of modularity (Mende, 2005b). Simply decompose the other core ideas.
argument into several self-contained sub-arguments: a Intermediates are inferred from other cores, and
concluding sub-argument (which will appear at the end other cores are inferred from them.
of the report), and several supporting sub-arguments The conclusion is inferred from other cores, but no
(which will appear in the middle of the report). Low- other cores are inferred from it.
level inference trees then outline supporting sub-argu- Writers can draw an inference tree using the
ments to intermediate conclusions A, B, C, and so forth, techniques of forward or backward chaining. With
and a high-level inference tree outlines the concluding forward chaining, they first match related premises
sub-argument from A, B, C, and so on, to a final conclu- to get intermediates; then they match premises with
sion Z. Figure 9 sketches the arrangement. related intermediates to get further intermediates until
Inference Tree Use to Design Arguments in Expository Reports
Figure 8. Redundancies
1. Computers have a large
I
long-term memory
9. An argument consists of
cores + inferences obscured by 10. Significant risk of
peripherals reasoning error
a conclusion emerges. Alternatively, with backward superfluous inputs, omitted inference, belated infer-
chaining, they start with a hypothesis of the desired ence, premature inference, incoherence, redundancy,
conclusion, match it with related premise to get a new and inconclusive argument.
hypothesis, then match it with other premises to get If an argument is very large, writers can outline it
further hypotheses, until they reach premises. When all by means of a modular inference tree. This consists
hypotheses match premises, the concluding hypothesis of a high-level concluding tree together with several
is confirmed. low-level supporting trees. The low-level trees are
Writers can readily use an inference tree to detect self-contained and can be drawn (and checked) in-
reasoning errors that would otherwise be difficult to dependently. Thus, inference trees are not difficult to
find in a written report, where core ideas are obscured draw and are useful both for outlining an argument
by a multitude of peripheral ideas. The tree reveals and for debugging the outline before detailed writing.
several kinds of effectiveness errors that raise doubts Therefore, if writers need to devise reports that contain
in readers minds: illusory relevance, irrelevance, in- arguments towards intelligent conclusions, they should
sufficient reasons, hasty generalization, begging the use inference trees.
question, circular reasoning, and missing the point. An
inference tree also reveals several kinds of efficiency
errors that waste readers time: overloaded inference,
Inference Tree Use to Design Arguments in Expository Reports
Croy, M. J. (2000). Problem solving, working back- Mende, J. (2005a). Two logic tools for expository
wards, and graphic proof representation. Teaching reports. Paper presented at the Teaching & Learning
Philosophy, 23.2, 169-187. Symposium, University of the Witwatersrand. Retrieved
February 28, 2008, from http://www.wits.ac.za/depts/
Dykeman, T. B. (1974). The physics of rhetoric. College cult/academic/teachsymposium.html
Composition and Communication, 25(5), 382-387.
Mende, J. (2005b). Modular inference trees for exposi-
Engel, S. M. (1999). With good reason: An introduction tory reports. Informing Science, 8, 173-187. Retrieved
to informal fallacies. New York: St. Martins Press.
Inference Tree Use to Design Arguments in Expository Reports
Inference Tree Use to Design Arguments in Expository Reports
Section: Product ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
ICT Tools
trate on verifying the correct implementation of Scrutiny can be used in the formal review process,
requirement, specifications, and designs. and it supports multi-users review but does not support
To offer various forms of knowledge about the for rules and checklists. It provides a petri-net based
code being inspected (reviewed), including process modeling language that allows the system to
domain and environment knowledge, and infor- implement alternative software review methods, such as
mation from various forms of analysis such as a shared preparation phase in which reviewers have
cross-referencing. access to each others preliminary findings (Gintell
To allow code inspectors (reviewers) to easily et al., 1993; MacDonald et al., 1995). However, in
traverse source code in a windowed environment comparison with the ICICLE, the Scrutiny usage can
instead of riffling through hard copy from many depart radically from manual software review processes,
different files. such as geographically distributed software reviews
To render the code inspection (review) meeting (MacDonald et al., 1995).
paperless through a shared window interface
which enables the code inspectors (reviewers) collaborate software Inspection (csI)
to fulfill their roles electronically.
Collaborate software inspection (CSI) was built and
The ICICLE tool consists of two phases in the re- used in a case study to compare online distributed
view process: the individual review and group review computer-mediated software review meetings vs. face-
meeting. The group review meeting takes in the same to-face software review meetings at the University of
location/venue, usually a reviewers seat at nearby Minnesota (Mashayekhi, Feulner, & Riedl, 1994). As
computers. An individual reviewer allows entering with other software review tools, the CSI provides the
comments on each line of code. According to Mac- similar process characteristics of Humphreys software
Donald, Miller, Brooks, Roper, and Wood (1995), the review method with hypertext capability. CSI is devel-
researcher found that the computer supported meeting oped for group review meetings in the (1) same time
format appeared to cause substantial changes in the and place, (2) same time and place, (3) same time and
dynamics of the code inspection (review) meeting. different place, and (4) different time and same place.
In other words, the procedures of the code review CSI supports both asynchronous and synchronous ac-
meeting using ICICLE can enable roles during the tivities that include materials distribution, individual
group meeting process (Brothers et al., 1990). For ex- preparation/individual review, group review meeting,
ample, the additional duty of a moderator is to record recording, and reporting (Mashayekhi et al., 1994).
statistics relating to coding defects discovered during
code review. The reader can direct the attention of the Inspeq
other reviewers to areas of interest in the source code.
The scribes records must be agreed on by the review InspeQ was developed to support the phased software
team. The author should present in the code review review process (Knight & Myers, 1993). The InspeQ
meeting and answer the reviewers question. Any ad- was executed on Sun 3, Sun 4, and IBM RS/6000
ditional reviewers can participate and share meeting computers running various forms of Unix and the X-
discussions. window display system and the OSF/Motif widget set
(Knight & Myers, 1993). Although the InspeQ achieves
scrutiny the goals of efficiency and rigor in the phased review
process, it is not viewed as essential to the phased in-
Scrutiny is an online collaborative software review spection method (MacDonald et al., 1995). Similar to
tool, which was developed at Bull HN Information other software review tools, InspeQ provides numbers
Systems in conjunction with the University of Illinois of facilities to support software review process. These
(Gintell, Houde, & Mckenney, 1993). It is a synchro- include work product display (views the documents),
nous meeting review tool. It is one of the early com- checklist display (allows the status of each checklist to
prehensive collaborative process software review tools be displayed and modified), standard display (review
(MacDonald et al., 1995). Scrutiny currently supports rational and a detailed descriptions), highlight display
text documents only. (helps locating particular aspects of the documents),
0
ICT Tools
and comments display (comments on the documents) Web Inspection Prototype (WiP)
(Knight & Myers, 1993). I
Web inspection prototype (WiP) is another Web-based
csrs tool, which provides a set of functions for distributing
the requirement documents to be reviewed (Harjumaa
CSRS is developed to support computer-mediated com- & Tervonen, 1998). The WiP is developed to support
munication formal software review process (Johnson, distributed software review processes. It utilizes the
1994). The CSRS is heavily used in academic research WWW to distribute the review document, tailors
and laboratory experiments studies. The goals of CSRS the software review process model according to the
is to reduce the human effort in review process by development environment, can assign roles, adds or
conducting software review incrementally during the removes a checklist, allows reviewers to add, modify,
development and provide online capabilities to collect and remove comments, has searching, cross-referenc-
metrics (Stein, Riedl, Harner, & Mashayekhi, 1997). ing, e-mail notification, combining comments/ annota-
The CSRS is similar to Scrutiny; it provides an internal tions using hypertext and reporting capabilities, and
process modeling mechanism to support a variety of generates metrics and statistics summary (Harjumaa
review methods. CSRSs primary method is FTArm, & Tervonen, 1998).
which is unique among methods by being designed
explicitly to support properties of computer-mediated Inspecta
communication and review (Johnson, 1994). CSRS
automatically collects data (e.g., number of defects/is- InspectA is a completed automation tool, which allows
sues found, comments made, time spent on software the whole software review process to be automated
review, starting time, finishing time, event logs, etc.). (Murphy & Miller, 1997) from planing, such as select-
Another feature of CSRS is that it supports a variety ing a moderator and communications between software
of software review processes and handles several types review team, through follow-up stage, where the mod-
of documents and languages. erator verified and finalized that all the defects raised
during the software review have been resolved.
requirement traceability tool (radIx) InspectA is an e-mail-based and asynchronous tool
for software review (Murphy, Ferguson, & Miller,
Requirement traceability refers to the ability to describe 1999). The tool is not based on the World Wide Web
and follow the life of a requirement, in both a forwards approach (all reviewers can view other individual re-
and backward direction (Gotel & Finkelstein, 1994). viewer comments). The argument is when reviewers
The requirement traceability tool (RADIX) is designed can view other reviewers members defect lists during
for verifying software requirements (Yu, 1994; Yu, the individual preparation that they may discourage
Smith, & Huang, 1990). A requirement tracing method (Murphy et al., 1999). Another reason is that reviewers
is a systematic method to assist 5ESS Switch scientist may focus or discuss other reviewers comments rather
and engineers to deliver quality software (Yu, 1994). than focus their own individual reviews (Murphy et al.,
1999). Miller and their team believed that e-mail-based
asynchronous Inspector of software tools provide a number of advantages. These include
artefacts (aIsa) (Stein et al., 1997, p. 108):
Asynchronous Inspector of Software Artefacts (AISA) Sharing information: Allow exchange and shar-
was the early Web-based software review tool (Stein et ing information via e-mail tool
al., 1997). AISA supports asynchronous and distribution Threads of discussion: Allow individual review-
software review as well as reviewing both textual and ers to contribute and free feel to comments during
graphical documents (e.g., entity-relationship diagram the individual preparation
or class diagram) (Stein et al., 1997). The AISA Web- Visual cues: Easy to format in the document such
based tools can be built using existing structures and as bold or italics
were reasonably easy to develop. Train of thought: Offer other reviewers to re-
sponse and reply
ICT Tools
Reaching a consensus: Voting can be sent via Process Definition Language (RPDL) and a flexible
e-mail tool document type system to allow support of any software
Coordination: Moderator can easily send infor- review process (MacDonald & Miller, 1999). ASSIST is
mation to all reviewers a client/server architecture, where the server is a central
History: Allow reviewers to keep a record of database to store documents and data. Table 1 shows
their comments details of four features of the ASSIST tool.
ICT Tools
Enable the inspection (review) to perform inspec- Voting is anonymous; the final decision is more
tion (review) according to their schedules. This likely to be objective and based on merit I
aims to reduce the inspection (review) interval,
and thus reducing the turn around time for obtain-
ing inspection (review) results Future
Provide as much assistance to the inspector (re-
viewer) as possible during preparation A number of computer support tools have been devel-
Maximize the number of major faults found while oped to support the software review meeting process.
keeping the time costs of the process low Many tools provide documentation facilities that allow
software review documents to be shared across net-
works, browsed online, and edited by reviewers. The
Internet-based InsPectIon current trend of software review is for using software
systeM (IbIs) review tools to the support software review process.
Past research has shown a spectrum of advantages of
Internet-based inspection system (IBIS) is developed to using software review tools supporting technical review.
support geographically distributed software review (La- First, a computer-support tools review environment can
nubile & Mallardo, 2002). IBIS was originally designed reduce paper work and clerical costs, decrease error rates
by Cavivano, Lanubile, and Visaggio (2001). This tool of recording review meeting and comments, and allow
is another Web-based application which is based on computerised data collection and data analysis. Soft-
a lightweight architecture to achieve the maximum of ware review tools can integrate the review method with
simplicity of use and deployment (Lanubile & Mal- other components of the specific software development
lardo, 2002). The IBIS can support Fagans Software method such as asynchronous review and facilitating
Review Process. There are a several advantages of both metrics collection. Companies will adopt software
deploying IBIS (Lanubile & Mallardo, 2002): review tools simply because of such potential benefits
over manual software review techniques.
IBIS is Web-based software review tool; it allows
reviewers access from their desktop. This could
improve the chance of reviewers participating in conclusIon
software review
It allows the software review to be performed in In summary, this article described modern software
different places, even in different countries review tools and techniques and the different types of
Allow different experts participate in the software software review tools and how they work. To achieve
review process. Those experts could from outside better software review performance, it is important
the organization or different department. to understand use of inputs and the software review
process.
visionquest
reFerences
VisionQuest aims to support the experimentation formal
anonymity technical review (Vitharana & Ramaurthy, Anderson, P., Reps, T., & Teitelbaum, T. (2003). Design
2003). The advantages of anonymity in group collabo- and implementation of a fine-grained software inspec-
ration are (Er & Ng, 1995): tion tool. IEEE Transaction on Software Engineering,
721-733.
Each reviewers has equal weight Bates, S., & Horwitz, S. (1993). Incremental program
Avoid the dominance group or status effect during testing using program dependence graphs. In Proceed-
the review process ings of the Symposium on Principles of Programming
Since the comments are made by an anonymous Language (pp. 384-396).
person, criticisms are the issues rather than
people
ICT Tools
Brothers, L., Sembugamoorthy, V., & Muller, M. (1990, Horwitz, & Reps, T. (1992, May). The use of program
October). ICICLE: Groupware for code inspection. In dependence graphs in software engineering. In Proceed-
Proceedings of the 1990 ACM Conference on Computer ings of the 14th International Conference on Software
Supported Cooperative Work (pp. 169-181). Engineering (pp. 392-411).
Burke, M., & Cytron, R. (1986). Inter-procedural de- Johnson, P. M. (1994, May). An instrumented approach
pendence analysis and parallelization. In Proceedings to improving software quality through formal technical
of SIGPLAN 86 Symposium Complier Construction review. In Proceedings of the 16th International Confer-
(pp. 162-175). ence on Software Engineering, Sorrento, Italy.
Cavivano, D., Lanubile, F., & Visaggio, G. (2001). Scal- Knight, J. C., & Myers, A. E. (1993, November). An
ing up distributed software inspections. In Proceedings improved inspection technique. Communications of
of 4th ICSE Workshop on Software Engineering over the ACM, 36(11), 50-69.
the Internet, Toronto, Canada.
Lanubile, L., & Mallardo, T. (2002). Preliminary evalu-
Chan, K. (2001, August 27-28). An agent-based ap- ation of tool-based support for distributed inspection.
proach to computer assisted code inspections. In In Proceedings of the ICSE International Workshop on
Proceedings of Australian Software Engineering Global Software Development, Orlando, FL.
Conference (pp. 147-152).
MacDonald, F., & Miller, J. (1997). A comparison of
Chechik, M., & Gannon, J. (2001, July). Automatic tool-based and paperbased software inspection (EfoCS-
analysis of consistency between requirement and 25-97, RR/97/203). University of Strathclyde, Depart-
design. IEEE Transactions on Software Engineering, ment of Computer Science, Empirical Foundations of
27(7), 651-672. Computer Science (EFoCS).
Er, M., & Ng, A. (1995). The anonymity and proximity MacDonald, F., & Miller, J. (1999). ASSIST: A tool to
factors in group decision support systems. Decision support software inspection. Information and Software
Support Systems, 14(1), 75-83. Technology, 41, 1045-1057.
Fagan, M. E. (1976). Design and code inspections to MacDonald, F., Miller, J., Brooks, A., Roper, M., &
reduce errors in program development. IBM System Wood, M. (1995, July 10-14). A review of tool sup-
Journal, 15(3), 182-211. port for oftware inspection. In Proceedings of the 7th
International Workshop on Computer-Aided Software
Ferrante, J., Ottenstein, K., & Warren J. (1987). The
Engineering, Toronto, Canada (pp. 340-349).
program dependence graph and its use in optimization.
Transaction Programming Languages and System, Mashayekhi, V., Feulner, C., & Riedl, J. (1994). CAIS:
3(9), 319-349. Collaborative asynchronous inspection of software. In
Proceedings of the 2nd ACM SIGSOFT Symposium on
Gintell, J. W., Houde, M. B., & Mckenney, R. F. (1993,
Foundations of Software Engineering, 19(5), 21-34.
July 10-14). Lessons learned by building and using
New York.
scrutiny: A collaborative software inspection systems. In
Proceedings of the 7th International Workshop on Com- Murphy, P., Ferguson, J. D., & Miller, J. (1999).
puter-Aided Software Engineering (pp. 350-357). Groupware support asynchronous document review. In
Proceedings of the 17th Annual International Confer-
Gotel, O. C. Z., & Finkelstein, C. W. (1994, 18-22 April).
ence on Computer Documentation, New Orleans, LA
An analysis of the requirements traceability problem.
(pp. 185-192).
In Proceedings of the 1st International Conference on
Requirement Engineering (pp. 94-101). Murphy, P., & Miller, J. (1997). A process for asynchro-
nous software inspection. In Proceedings of the 18th
Harjumaa, L., & Tervonen, I. (1998, January 6-9). A
IEEE International Workshop on Software Technology
WWW-based tool for software inspection. In Proceed-
and Engineering (pp. 96-104).
ings of the 31st Hawaii InternationalConference on
System Sciences (pp. 379-388). Perpich, J. M., Perry, E. D., Porter, A. A., Votta, L. G., &
Wade, M. W. (1997). Anywhere, anytime code inspec-
ICT Tools
tions: Using the Web to remove inspection bottlenecks Fagan Inspection: Software review was origi-
in large-scale software development. In Proceedings of nally proposed by Michael Fagan at IBM in the early I
the International Conference on Software Engineering, 1970s. Fagans software review and forms of review
ICSE (pp. 14-21). structures. Fagans software review includes six-step
review processes: planning, overview, preparation,
Perry, D. E., Porter, A., Wade, M. W., Votta, L. G., &
group meeting, re-review, and follow up.
Perpich, J. (2002, July). Reducing inspection interval in
large-scale software development. IEEE Transactions Information Communication Technology (ICT)
on Software Engineering, 28(7), 695-705. Review Tools: Tools provide documentation facilities
that allow software review documents to be shared
Stein, M. V., Riedl, J., Harner, S. J., & Mashayekhi,
across networks, browsed online, and edited by re-
V. (1997). A case study of distributed, asynchronous
viewers. The current trend of software review is for
software inspection. In Proceedings of the 19th Inter-
using software review tools to support the software
national Conference on Software Engineering (pp.
review process.
107-117).
Online Software Review: Online software review
Yu, W. D. (1994, February). Verifying software re-
tools support some major functions: document support,
quirement: A requirement tracing methodology and
individual preparation, and meeting support. It can meet
its software tools: RADIX. IEEE Journal on Selected
online and share data and documents in flexible time,
Areas in Communications, 12(2).
thus it may reduce time of review.
Yu, W. D., Smith, D. P., & Huang, S. T. (1990, May/
Software Review: Software review or inspection
June). Software productivity measurements. AT&T
is one of the techniques for improving software qual-
Technology Journal, 69(3), 110-120.
ity. Software review is an industry-proven process for
eliminating defects. It has been defined as a non-execu-
tion-based technique for scrutinizing software products
Key terMs for defects, deviations from development standards.
Asynchronous Review: The review activities can Software Verification: Aims to find and remove
be performed at the same time. Asynchronous review defects during the software development cycle.
must rely on the ICT tools supported. Synchronous Review: All review activities in
Defects: The term defect is defined as any issue the synchronous software review happen in a linear
or problem that does not meet the requirements. fashion, and the meetings are located in same place
at the same time.
Section: Process ICT
Jouni Hautala
Turku University of Applied Sciences, Finland
Mauri Kantola
Turku University of Applied Sciences, Finland
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Information Environments of Middle Managers in Higher Education
The department of support services includes support & Grnroos, 2000; Sthle & Hong, 2002; Sthle, Sthle,
service units such as international relations, library, & Pyhnen, 2003). According to the IE approach, the I
and human resources management. organisation can be described as a knowledge creating
In the last decade, when the structural reform of system arising as a result of interaction between indi-
the universities of applied sciences was introduced, a viduals and groups. The characteristics of the networks
reform in their operating environment took place. New define the different IEs. The know-how, relationships,
constructivist ideas about learning turned increasing information flow, and management are the dimensions
attention to students and their progress. These new to analyse the IEs. Management has a remarkable role
ideas can be called a service paradigm or a customer in creating these environments.
paradigm in Finnish vocational higher education. At According to this approach, there are different
the same time, there occurred a major change in the kinds of IEs:
technical environment and information systems, which
modified the traditional ways of learning, teaching, Mechanical
and management. Organic
An important group in the organisational and func- Dynamic
tional development of institutions is that of the middle
managers. The middle managers of matrix organisations These environments are the results of management
in the Finnish universities of applied sciences can be actions and have different kinds of know-how and
classified into three main groups: degree programme knowledge structures. They have different kinds of
managers, research and development managers, and relationships and information flows within and outside
support service managers. It is emphasised that the the organisation. Riihimaa (2004) emphasises that a
strategic management of these middle managers can taxonomy can be an essential element to create theory
be crucial for organisational success in an HEI. This is and analyse information technology.
important, if the education and business environments Mechanical IEs are strictly documented and deter-
of departments are distinct from each other. Especially mined. The information systems in these IEs include
in larger organisations, a greater degree of responsibil- accounting systems and the student and study registers.
ity has been assigned to subunits. Typically, the input is strictly controlled, information
The programme managers may typically be responsi- flows one way, top-down, and the system produces
ble for one large or several smaller degree programmes. certain kinds of reports. Automation is important be-
The middle managers of the support services, such as cause these information systems have been planned to
the development manager, quality manager, financial increase the efficiency of routine tasks. The creative
manager, and manager of international relations, are human contribution can be directed to more important
responsible for a specific sector in the whole institu- functions.
tion. Many other expert positions belong to the group Organic IEs emphasise communication and dia-
of middle managers in a broad sense, even though logue. The information systems in this environment
these people do not have a managers title. Floyd have been designed for making course implementa-
and Wooldridge (1996) point out that the roles of the tion plans and collecting feedback from students. The
middle managers are to champion innovative initiatives, management information system based on the balanced
facilitate adaptability to new behaviour, synthesise scorecard approach also belongs to this environment
information within and outside the organisation, and (Kettunen, 2005; Kettunen & Kantola, 2005). The
implement strategy. members of the organisation share their experience-
based tacit knowledge (Kim, Chaudhury, & Rao,
2002; Nonaka & Takeuchi, 1995; Takeuchi & Nonaka,
MaIn Focus oF the artIcle 2004), try to make it explicit, combine knowledge,
and develop the internal processes. The organic IEs
Information environments require development-oriented management, in which
middle managers have an important role. Management
The information environment approach was introduced includes power sharing, development of feedback
by Sthle and is described in several articles (e.g., Sthle systems, and fostering of efficient communication in
the organisation.
Information Environments of Middle Managers in Higher Education
Dynamic IEs aim to continuously produce innova- Figure 1 presents the spiral of knowledge conversion
tions. The wide and fast information flow is a charac- in information environments and how an information
teristic of this environment. Many of the innovations system can be developed in a learning process. The
are based on the weak signals of the environment. four modes of knowledge conversion were introduced
Networking with other individuals and organisations by Nonaka and Takeuchi (1995): (1) from tacit knowl-
requires dynamic IEs. Management is not strictly con- edge to tacit knowledge, which is called socialization;
trolled because the purpose is that innovations emerge (2) from tacit knowledge to explicit knowledge, or
from self-organisation. The innovation process is led externalization; (3) from explicit knowledge to ex-
by the person who is best suited for the task. plicit knowledge, or combination; and (4) from explicit
knowledge to tacit knowledge, or internalization. This
Information systems model (SECI) of knowledge creations is applied in this
study to the IEs and the development of new informa-
Table 1 describes the three-dimensional IEs by the or- tion systems.
ganisational levels at the TUAS. The tick x indicates In the socialization mode, the middle manage-
frequent use of information systems belonging to the ment or any other members of the creative class share
certain IE and organisational level. It can be seen that experiences with the directors, teachers, and other
the mechanical information systems are mainly used professionals in a dynamic IE. In the externalization
by the middle managers, teachers, and other personnel. process, the tacit knowledge is of the creative class
The organic information systems are used by all organi- if transformed to explicit knowledge. In a successful
sational levels. The dynamic information systems are case, information system innovations or new concepts
mainly used by the middle managers and teachers. emerge. The combination mode involves combining dif-
The most valued workers are what Richard Florida ferent bodies of explicit knowledge. The management
(2002) calls the creative class. He argues that invest- information system can be a valuable tool to make new
ment in technology and a civic culture of tolerance ideas and knowledge visible. The management informa-
are the key ingredients to attracting and maintaining tion system also makes it possible to connect separate
a local creative class. Table 1 shows that the creative degree programmes and organisational units and build
class at the TUAS mainly consist of middle managers. cross-functional teams and expertice groups. Finally in
This definition gives a only broad description and is the internalization mode, the experience in using the
not strictly correct because there are certainly creative information systems helps the users to transform the
people among the teachers, rectors, and other person- explicit knowldete into tacit knowledge.
nel.
Information Environments of Middle Managers in Higher Education
Socialization Externalization
Explicit knowledge
Tacit knowledge
Explicit knowledge
Internalization Combination
Tacit knowledge
Information Environments of Middle Managers in Higher Education
Figure 2. The annual use of the information systems of degree programme managers
After the curricula planning in January and February, carefully aligned with the budget to ensure balanced
the course implementation plans are on the agenda. The economy. The external funding is allocated mainly to
implementation plans must be prepared at least twice research, development, and continuing education. An
a year. The courses are first planned in the study reg- electronic project management system (Projektori) is
ister (Winha). Then the teachers are advised to prepare used for project management.
detailed course implementation plans using specific In August, the course planning and course implemen-
software (Totsu). The implementation plans include tation plans have a similar procedure as at the beginning
the anticipated time resources of students and teachers of the year. The course implementation plans must be
for each course in every period and the reservation of prepared for the autumn term. The degree programme
classrooms and other facilities. managers also arrange meetings for the teachers and
The next milestone is in April and May, when the other personnel to discuss the outlines of the budget
degree programme managers and teachers check and and personal and action plans of the next year.
finalise the course implementation plans in the infor- In November and December, the budget for the
mation system (Totsu). They also check the teacher next year is finalised and the teacher workload plans
workload plans using the workload information system can be prepared for the next year using the workload
(Tilipussi), which is linked to the human resources information system. The middle managers also prepare
information system (Fortime) and the accounting in- the action plans and human resource plans with the rec-
formation system (Web Hansa). The workload plans tors and directors of education using the management
of tenured teachers must be checked twice a year to information system. Internal strategic negotiations are
define the exact salary. carried out to evaluate the objectives achieved and to
In June, the budget for the next year must be planned set new targets for the planning period.
using the management information system (4T) which An important finding of the analysis is that the
is linked to the accounting system. The funding from most important information systems for the degree
central government is primarily allocated to the costs programme managers are in the mechanical IEs and
of education in degree programmes and administration partly in the organic IEs, but only a minor part of the
costs. The education and teacher workload plans are information systems are in the dynamic IE. This is
0
Information Environments of Middle Managers in Higher Education
striking because the innovations and competitive ad- Gold, A. (1998). Principles in practice: Head of de-
vantage of higher education institutions can typically partment. London: Cassell. I
be found in the dynamic IEs of subunits in contact with
Kettunen, J. (2002). Competitive strategies in higher
external partners, stakeholders of the HEI, students,
education. Journal of Institutional Research, 11(2),
and customers.
38-47.
The customer relationship management (CRM)
system can be one way to open the information systems Kettunen, J. (2005). Implementation of strategies in
to the networks of the environment. Another way is to continuing education. International Journal of Edu-
develop the mechanical and organic environments to be cational Management, 19(3), 207-217.
more dynamic by adding interactive elements to them.
The third possible way is that the dynamic areas could Kettunen, J., & Kantola, I. (2005). Management in-
be managed and used with the development and support formation system based on the balanced scorecard.
service managers by developing the social networks Campus-Wide Information Systems, 22(5), 263-274.
of the large organisation by developing coordinating Kim, Y.J., Chaudhury, A., & Rao, H.R. (2002). A
activities across units with the help of the management knowledge management perspective to evaluation of
information system using the group work Web and enterprise information portals. Knowledge and Process
mobile applications. Management, 9(2), 57-71.
Lyytinen, K., & Rose, G.M. (2003a). Disruptive infor-
conclusIon mation system innovation: The case of internet comput-
ing. Information Systems Journal, 13(4), 301-330.
The role of middle managers has become more important Lyytinen, K., & Rose, G.M. (2003b). The disruptive
as the autonomy of HEIs has increased. The information nature of information technology innovations: The
intensive processes have attained a remarkable role, as case of Internet computing in systems development
the competition in education has increased. Clearly, organisations. MIS Quarterly, 27(4), 557-595.
there is a need for dynamic IEs, where innovations
emerge with the connection to working life. Dynamic Nonaka, I., & Takeuchi, H. (1995). The knowledge-cre-
IE is a platform where we could expect new innovation ating company. New York: Oxford University Press.
in information and communication technology. Riihimaa, J. (2004). Taxonomy of information and
This study identified the creative class in the TUAS. communication technology system innovations adopted
The creative class is a group of personnel who work in by small and medium sized enterprises (Rep. No.
dynamic information environments and use information A-2006-6). University of Tampere, Department of
and communication technology in a creative way. It Computer Science.
turned out that mainly the middle managers belong to
this creative class. They use and develop the informa- Sthle, P., & Grnroos, M. (2000). Dynamic intellec-
tion systems in an innovative way. There are also many tual capital: Knowledge management in theory and
other people who spontaneously take the responsibility practice. Vantaa: WSOY.
for developing the information systems and whose Sthle, P., & Hong, J. (2002). Managing dynamic intel-
expertise is best suited to these projects. lectual capital in world wide fast changing industries.
Journal of Knowledge Management, 6(2), 177-189.
Information Environments of Middle Managers in Higher Education
Section: Product ICT
Jeffrey Kantor
Bar-Ilan University, Israel
University of Windsor, Canada
Liran Edelist
Bar-Ilan University, Israel
IntroductIon also defined by the PMI as one of the nine core areas
of project management; but there is also no integration
Currently, there is no integration among CASE tools between PM tools and SE tools in light of the need for
(computer aided software engineering, also named risk management.
AMD tools, analysis modeling and design), costing According to Maciaszek and Liong (2005), suc-
tools, and project management (PM) tools. Not only are cess of a software project depends on five software
there no integrated tools, but there is also no conceptual engineering areas that are related to each other: the
integration among software engineering (SE) aspects development of the life cycle of the software, processes
and accounting-costing aspects of software projects management, the models configuration and language,
within PM tools. PM tools, as well as costing tools are and SE tools and project planning. The combining
used not only for tracking and controlling an ongoing between formal tools of SE and PM processes in the
software project, but also at the very beginning stages different stages has been proved by research as holding
of the project, in which critical estimations concerning a positive contribution to the efficacy of the project
budget and time frame are made. In order to have a firm, and as an improver of the adherence to costs, technical
robust, and accurate planning, project planning should requirements, and the schedules that were allocated to
be based directly upon raw SE components-objects, that the project (Barker & Verma, 2003).
is, upon analysis and design components-objects. This study proposes and prototypes a model that
According to the Standish Group CHAOS Report integrates these three aspects of software projects by au-
2003, each year in the USA there are approximately tomatically mapping SE objects and accountingcosting
175,000 projects in IT Application Development which objects into PM objects. To validate the feasibility of the
spends $250 billion. Among these, 31.1% of projects model and without loss of generality, it is demonstrated
will be cancelled, 52.7% of projects will cost 189% of using former research platform focused on conversion
their original estimates, only 52% of required features of data flow diagrams (DFD), which are actually full
and functions make it to the released product, and Time enterprise set of use cases diagrams reflecting entire
overruns 82%. In financial terms $55 Billion dollars is system-software project into Gantt charts.
wasted in these projects (Madpat, 2005).
Budget overrun indicates cost management prob-
lems, although this area is defined by the project
management integration (PMI), as one of the nine core
bacKground
activities of projects management. Costing difficulties
result from both implementation limitations of costing case and PM tools
solutions in complex and changing requirements as well
as the technological environment. Risk management is CASE/AMD tools support the analysis, design, con-
struction, and implementation stages of the information
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Integrating Software Engineering and Costing Aspects
system life cycle (ISLC) (Barker & Longman, 1992; In contrast, the following two commercial CASE
Pendharkar, Subramanian, & Rodger, 2005; Sommer- software packages demonstrate the heterogeneity of
ville, 2004). Commercial tools, such as IBMRational tools in the area of software engineering. Oracles
XDE, are covering main stages of ISLC; the Requi- Designer supports functional hierarchy analysis based
site-Pro module, for instance, is designated to the on Barker and Longman (1992) methodology, and
stage of requirement definition, Rose module to the IBM-Rational offers XDE-Rose, a modeling tool based
analysis and design stage, and Test-Studio module on the unified modeling language (UML) only. PM
to the testing stage. tools thus seem more standardized and mature than
Although PM tools support management and control CASE tools. This could be the reason why 71% of 397
along the ISLC, there is hardly any integration between software engineers surveyed in 20 European countries
CASE tools and PM tools. Thus, ISLC modeling ap- employ PM tools while only about 26% utilize CASE
proaches, such as the functional approach (e.g., DFD, tools, despite similar levels of training (Domges &
ERD, STD), as well the object-oriented approach Pohl, 1998).
(e.g., use cases, activity diagrams, STD), even when Although CASE tools, including those mentioned
automated, are used mainly in the early analysis stage above, support teamwork, none contain elements
primarily for visual documentation. The database that take into consideration teamwork planning, time
of specifications, laboriously elicited and gathered planning, dependencies, resources allocation, cost
during the creation of modeling diagrams, is hardly estimation, or risk management. Moreover, none in-
ever applied again for project management purposes, clude Gantt or Pert models or offer built-in interfaces
even though this information is valuable for project to PM tools. Methodologies and models for managing
managers who are involved in the construction and software projects have yet to make it from the idea to
implementation stages. In fact, due to lack of integra- the product phase, despite persistent improvements in
tion along the ISLC, the specifications database is automated tools for requirement definition, systems
often either overlooked altogether or collected again modeling, and software engineering. The failure to
as if their creation earlier never took place. Moreover, transform project management theory to practice in the
standard methods for system analysis and development context of software development is especially troubling
usually make no reference to methods for project man- since more than 50% of such projects do not succeed
agement. Accounting and costing parameters, which (Madpat, 2005; Reel, 1999). In addition to the lack of
are reviewed at the next chapter, are not represented integration between SE tools and PM tools managers in
not at SE tools or at PM tools, and handled in totally charge of software projects usually refrain from basing
separated systems. managerial judgement on data about requirements and
One conclusion that emerges from a thorough review functional characteristics of the specific development
of software engineering and project management areas project (Reel, 1999).
is that SE tools are much more heterogeneous than PM With decades of systems development behind us,
tools. Gantt and Pert charts have become dominant there is quite a consensus today with respect to the
project management modeling tools (Fox & Spence, critical success factors (CSF) of system development
1998; Hughes & Cotterell, 2002) and are currently projects and agile methodologies, there is still a need to
included in standard PM software such as Microsoft introduce effective concepts, methods, measures, and
Project, PS-Next, and others. A survey of 1,000 project tools for better control of software projects. All these
managers has found that 48.4% use MS Project, 8.5% observations lead one to conclude that assembling a
use MS Excel, and the rest use Gantt/Pert-based tools repository of system requirements and system com-
from other vendors. The average satisfaction from ponents, complete as it might be, does not guarantee
PM tools in this survey was 3.7 on a scale of 1 to 5. effective planning of teamwork, scheduling of tasks,
Another survey reveals that only 10% of 240 project and controlling deviations between planned milestones
managers do not use PM tools at all, down from 33% and actual progress.
in 1996. Moreover, more than 50% use Gantt/Pert- Against this background, the questions to consider
based project management software to manage every are:
project, independently of its application domain and
characteristics.
Integrating Software Engineering and Costing Aspects
I. Is the gap between SE tools, costing methods, ity areas, and more for the purpose of forming an ac-
and PM tools is bridgeable? counting system that facilitates planning, improvement I
II. Can SE components, collected by CASE tools, and control, analysis and regulation of resources, and
become directly available for the use of cost esti- enhancement of profitability. Such a system is based
mation, risk management, and directly integrated on integrative information from a number of systems
within PM without being subjectively interpreted or from the arrays DW (data warehouse), BI (business
or biased? intelligent) in five areas: costs, assets, quality/service,
III. Is there a way to improve software modeling and time, and outputs. The pioneers of the combining of
engineering by introducing a managerial perspec- financial and operational information are Cooper and
tive in addition to the technical perspectives? Kaplan who developed the method of activity based
costing (ABC) at the end of the 1980s. Cooper and
Our preliminary answers to those questions are Kaplan (1998) suggest in light of the technological
yes. This study proposes and prototypes a model development of information systems to define the in-
that integrates these three aspects of software projects tegration between operational and financial systems for
by automatically mapping SE objects and account- the purpose of building an accurate costing model.
ingcosting objects into PM objects. We have engaged In light of the above, establishment of integration
in symmetryisomorphism research with respect to conception required the definition not only of an enter-
distinct methodologies for software engineering and prise costing model but also the definition of interfacing
project management. Since Gantt chart is a technique between the different areas and systems, that is, interface
for visual description of networks, the ability to convert between SE aspects tools, financial aspects tools, and
DFD model or hierarchical use-case model to a network PM tools. Cost management is a term used for a wide
format is at the basis of our symmetryisomorphism description of short-term and long-term managerial
research. It is our intention in this article to demonstrate, activities involved in planning and controlling of costs
based on this research, a possible integration scheme (Horngren, Foster, & Datar, 2000). Table 1 presents
and provide more robust answers to the above ques- variety aspects of costing model in a technological
tions. Given the wealth of CASE and PM tools, this projects environment.
work refrains from developing yet another one, but Costs analysis within the framework of technological
prototyping an integrated platform built-up of common environment must be carried out with the understand-
CASE tool, costing models, and common PM tools. ing of the project life cycle. Kerzner (2000) portrays
We show that combining these sets of capabilities can the distribution of the projects cost over the projects
create the desired synergy where the whole is greater life cycle:
than the sum of its parts.
5% - Conceptualization
costing aspects and Methods 10% - Feasibility study
15% - Preliminary planning
Detailed costing information is expected to include 20% - Detail planning
all types of costs that are required for manufacturing a 40% - Execution
product-software or providing a service. Data based on 10% - Testing and commissioning
financial systems, which contain costs, derived from the
income statement and the estimation of the companys Tasks in each of these stages are described under the
capital and assets, enclosed the historical execution work breakdown structure (WBS). The WBS represents
data and future estimations and forecasts (Roztocki & the required activities for the projects management
Needy, 1999). Williams (2004) supports the integration in a hierarchical structure. For each component of the
approach according to the conception that a modern WBS, an evaluation of direct and indirect (overhead)
accounting system is supposed to supply a framework costs must be included. Direct costs are divided to
for strategic management of the companys resources. works cost (usually work hours multiple hourly rate)
In order to realize this conception, Williams proposes and direct costs that are not work payment such as
a multidimensional construct that clusters information travel, materials, and so forth. It is recommended that
from the companys systems on customers base, activ- these costs will include managerial reserve as well
(Jurison, 1999).
Integrating Software Engineering and Costing Aspects
The understanding of the profit that derives The inclusion of all the cost factors in the
Profitability model
8. from each of the projects and the whole projects
Analysis
portfolio
A reinforcement of the need to include the projects ing decisions (Horngren et al., 2000). These costs are
tasks (or the WBS components) in a costing model is described as one of the major headaches (Kerzner,
intensified in the light of the cost estimations that are 2000). However, in this context, it has been argued that
founded on work hours evaluation. It has been argued the ability to control costs is largely dependent on the
(Ooi & Soh, 2003) that according to traditional ap- monitoring of these costs.
proaches of software costing (time-based estimations), Table 2 summarizes costing methods according
there may be a bending towards time planning without to financial and engineering literature. The table also
linking it to the specific task and the role player that presents the common evaluation of model compatibility
performs it. Therefore, it is suggested to include the in light of entire costing aspects.
detailing of the tasks (Ooi & Soh, 2003) and/or an
elaborate planning of the various projects resources
Analogy: Cost estimation based on previous
as part of the costing model. The advantages of the
experience, using case-based reasoning (CBR)
resources cost analysis throughout activities/tasks are
techniques. The accuracy of this method ranges
more detailed information for managers, monitoring
from 10% to +25% (Kerzner, 2000).
abilities, analysis of resources cost and allocation,
Parametric: Cost estimation based on heuristics
and a more accurate ability of overhead allocation
and thumbs rules (Jahangir, 2003). Similar to
(Jahangir, 2003; Kinsella, 2002; Ooi & Soh, 2003; Raz
the analogy estimation method, a parametrical
& Elnathan, 1999).
model is also based on accumulation of historical
Indirect costs (overhead costs) include all types
data of project costs. On the basis of these data, a
of costs that cannot be attributed directly to a specific
mathematical model is defined for the prediction
task in the project marketing and sales expenses, office
of costs (Kinsella, 2002). The level of accuracy
supplies, buildings cost, professional services, informa-
of a parametrical model ranges on a wide scope
tion systems, computerization infrastructure, and the
of 25% to +75% (Kerzner, 2000).
like. These costs are only occasionally incorporated in
Function points: A method that was first intro-
the project planning, but they carry great influence on
duced in 1979 by Albrecht. Its objective is to
the profitability of the portfolio and the projects pric-
Integrating Software Engineering and Costing Aspects
Management
Profitability
controlling
resolution
allocation
scenarios
time line
overhead
Planning
analysis
task
risk
Analogy * P* X X P* X X X
Top Down
software Parametric * P* X X P* P* X
eng. Bottom Function Points X X P* * X
Up COCOMO II P X P* X
Target Costing P P P* P X P
costing Standard Costing P * * P X P
ABC P P* X X
assess the software systems size while using the the development rather than the developments
users requirements without direct dependence outcome.
on the technological realization (Hale & Smith, Standard costing: Ascertains the cost frame-
2001). The function points method is calculated work while employing the amount of direct cost
in three steps using the quantity and complexity components and a standard price that was set for
of the functional components and the system at- this unit. We shall formulate it concisely as:
tributes (Kemerer, 1993).
TotalCost = Qty * StdPi .
COCOMO (constructive cost model): The n
Integrating Software Engineering and Costing Aspects
method. These studies include the description of be included within basic process characteristics,
the method for software developing and assimila- thus maintaining mapping completeness.
tion (Ooi & Soh, 2003), the portrayal of the mode 6. A general process is represented by means of a
in which ABC can be taken on in projects (Raz summary task, that is, a grouping of activities and
& Elnathan, 1999), the implementation of ABC flows under a general name.
in favor of IT cost analysis in the organization, 7. General flows are those that connect between
and a recommendation to include this model in summary tasks.
the project management body of knowledge, or
PMBOK (Kinsella, 2002). Example: Mapping of Hierarchical DFD
Integrating Software Engineering and Costing Aspects
Figure 1. DFD-0
I
D a ta S to re
6
4
5 7
E1 1 PP 11 2 P2 3 E1
D ata Sto re
4
5
E1 1 P 1 .1 8 P 1 .2 2 P2
D ata Sto re
6
7
4 5
P2 3 E1
E1 1 P 1 .1 8 P 1 .2
Integrating Software Engineering and Costing Aspects
Figure 4. The Label input box used to insert costing aspects and values
0
Integrating Software Engineering and Costing Aspects
Integrating Software Engineering and Costing Aspects
Figure 7. The P1 Summary Task has a distinct symbol General Process P1, while subtasks of P1 are represented
with emphases at the edges. only in Figure 9. The P1 Summary Task has a distinct
Double clicking on line 10 blows up the summary background with + sign beside it.
task and displays its subtasks. Lines 11, 12, and 13 in Risk was assigned separately to time, budget, and
the Gantt chart of Figure 6 are hidden because they are functional aspects of each SE component-object. Direct
related to a lower level in the DFD hierarchy, DFD-1 costs are presented in units of months. Further calcula-
(Figure 2). Lines 11, 12, and 13 in Figure 7 represent tion can be made according to parameters of salary rates
the DFD objects that are shown in DFD-1 (Figure 2). and overheads, presented in the costing sheet.
Double clicking on the + sign beside line 13 blows
costing outputs up the summary task and displays its subtasks. Lines
14 and 15, in the Excel spreadsheet of Figure 8, are
Costing aspects of risk and direct costs where con- hidden because they are related to a lower level in the
structed by using the Label input box (see Figure DFD hierarchy, DFD-1 (Figure 2). Lines 14 and 15 in
4). A parser, while running over the CASE repository, Figure 9 represent the DFD objects that are shown in
inserts accordingly the relevant records to the integrated DFD-1 (Figure 2).
database schema and then activates the Visual Basic
Excel module, which has created a project summation
accordingly. Hierarchical presentations were applied dIscussIon and conclusIon
using built-in features of MS Excel.
Figures 8 and 9 illustrate hierarchical presentations Current research demonstrates the derivation of PM
of the same DFD models shown in Figures 1, 2, and objects and project risk and costing evaluation, directly
3. Figure 8 displays the summation corresponding to on the basis of raw SE components-objects. By this, we
DFD-0 in Figure 1, and Figure 9 displays the summa- provide an integrating layer, which combines standard
tion of the composite DFD in Figure 3. The Summary PM tools with common system analysis and design
Task P1 in Figures 8 and 9 (line 13) corresponds to tools and costing aspects and models. Applying such
Integrating Software Engineering and Costing Aspects
Integrating Software Engineering and Costing Aspects
Geri, N., & Ronen, B. (2005, April). Relevance lost: Pendharkar, P.C., Subramanian, G.H., & Rodger, J.A.
The rise and fall of activity-based costing. Human (2005). A probabilistic model for predicting software I
Systems Management, pp. 1-12 development effort. IEEE Transactins on Software
Engineering, 31(7), 615-624.
Grady, R.B. (1994). Successfully applying software
metrics. Computer, 27(9), 18-25. Rajkumar, R., & Rush, C. (2000). Analysis of cost
estimating processes used within a concurrent engineer-
Hale, J., & Smith, R. (2001). An empir-
ing environment throughout a product life cycle. In
ical study using task assignment patterns to
Proceedings of the 7th ISPE International Conference
improve the accuracy of software effort estimation.
on Concurrent Engineering (pp. 58-67).
IEEE Transactions on Software Engineering, 27(3),
264-271. Raz, T., & Elnathan, D. (1999). Activity based costing
for projects. International Journal of Project Manage-
Horngren, C., Foster, G., & Datar, S. (2000). Cost ac-
ment, 17(1), 61-67.
counting. Prentice Hall.
Reel, J.S. (1999, May/June). Critical success factors in
Hughes, B., & Cotterell, M. (2002). Software project
software projects. IEEE Software, pp. 18-23.
management (3rd ed.). McGraw-Hill.
Roztocki, N., & Needy, K.L. (1999). Integrating
Jahangir, M. (2003). Costing R&D projects: A bottom-
activity-based costing and economic value added in
up framework. Cost Engineering, 45(2), 12-20.
manufacturing. Engineering Management Journal,
Jurison, J. (1999). Software project management: The 11(2), 17-22.
managers view. Communications of the AIS, 2(17).
Sommerville, I. (2004). Software engineering (7th ed.).
Kaindle, H., & Carroll, J.M. (1999). Symbolic model- Addison-Wesley.
ing in practice. Communications of the ACM, 42(1),
Wouters, M., & Davila, A. (2004). Designing cost-com-
28-30.
petitive technology products through cost management.
Kao, J., & Lee, T. (2001). Application of simulation Accounting Horizons, 18(1), 13-26.
technique to activity-based costing of agricultural sys-
tems: A case study. Agricultural Systems, 67, 71-82.
Key terMs
Kemerer, C.F. (1993). Reliability of function points
measurement: A field experiment. Communications Activity Based Costing (ABC): A cost prediction
of the ACM, 36(2), 85-98. model that has greatly improved the ability to predict a
proper allocation of indirect costs among several activi-
Kerzner, H. (2000). Project management (7th ed.). John
ties and thereafter between many products. Before using
Wiley & Sons.
this model, one has to appreciate and understand the
Kinsella, S.M. (2002). Activity-based costing: Does it overall business (including its production and market-
warrant inclusion in a guide to the PMBOK? Project ing). The model is not always applicable: a cost-benefit
Management Journal, 33(2), 49-56. analysis is necessary before a final decision is made.
Maciaszek, L.A., & Liong, B.L. (2005). Practical CASE/AMD Tools: Software tools (Computer
software engineering: A case-study approach. Ad- Aided Software Engineering), also named AMD tools
dison-Wesley. (Analysis Modeling and Design), to assist entire System
Life Cycle (SLC), including analysis phase, design
Madpat, S. (2005). Bridging organizational strategy phase, testing phase, and even maintenance phase.
and projects: An OPM3 insiders perspective. PMI CASE/AMD tools support the fuctional analysis phase
Journal, 5(10), 16-20. using visual modeling notations, which can automati-
Ooi, G., & Soh, C. (2003). Developing an activity- cally convert into code.
based costing approach for system development and COCOMO (Constructive Cost Model): An estima-
implementation. The DATA BASE for Advances in tion method used to assess the human effort required for
Information Systems, 34(3), 54-71.
Section: Product ICT
software development, which was first introduced in 1981, Modeling Languages: Visual-graphical notations
and since then several modifications were made in order used to express functionality, processes, structures,
to suit fourth generation languages, decrease in hardware behavior, as well as technical aspects of a system.
costs, increase in QA levels, and advanced and agile Modeling languages are defined by a consistent set of
development methods. The current version, COCOMO rules, which are used for interpretation of those graphical
2.0 (Boehm et al., 1995), is not based upon line of codes symbols. Among modeling languages, in the software
but on four submodels that match a spiral approach of domain, there are data flow diagrams, used for hierar-
software system development that are applied according chical functionality decomposing; process diagrams,
to the stage of system life cycle. used for business processes modeling; entity relation
diagrams, used for data structure modeling; and state
Function Points: An estimation method used to as-
transition diagrams, used for behavior modeling.
sess the human effort required for software development,
which was first introduced in 1979. Method objective is Target Costing: A cost prediction model that suits
to assess the software systems size while using the users an engineering framework in which there are several
requirements without direct dependence on the techno- engineering activities which take place simultaneously.
logical realization. It is calculated in three steps using the It is utilized as a means for costs strategic manage-
quantity and complexity of the functional components ment. The idea behind the method is that a products
and the system attributes. cost must be based on the sum that can be received
for it in the market. It is therefore the development
Gantt Chart: A popular type of bar chart that
costs which should be the basis for the quantity and
illustrates a project schedule. Gantt charts illustrate
mode of investment in the development rather then the
the start and finish dates (ES, EF, LS, LF) of entire
developments outcome.
project elements. Project elements comprise the work
breakdown structure (WBS) of the project. Gantt charts UML (Unified Modeling Language): A standard-
also show the dependency (i.e., precedence network) ized visual-graphical notation gathering together diverse
relationships between activities. Gantt charts can be modeling diagrams, which are required in order to define
used to show current schedule status using percent- entire software system aspects. UML is officially defined
complete shadings and a vertical Today line. at the Object Management Group (OMG) by the UML
metamodel, a meta-object facility metamodel (MOF).
Section: Product ICT
IntroductIon the principles that operate in all four domains with the
domains functioning as different levels of representa-
As we are witnessing an increase in multifunctional- tion and interpretation of interactive reality.
ity of interactive devices, two problems are taking The integration of the levels is driven by the economy
shape in user interface (UI) design: first, the problem principle, the principle of information structuring,
of complexity, and second, the problem of fragmenta- and the relevance principle. The proposed cognitive
tion (Kljajevic, in press). The former is reflected in principles are derived from many domains of cogni-
the fact that multipurpose interactive devices usually tive research. Each of the principles operates at each
have interfaces that do not allow easy access to new of the levels. Thus, the basic principles of cognition
functions and features, rendering the increased func- are extended to theorizing about interactive reality to
tionality useless. The second problem is related to the the construction of methodological tools for its theo-
fragmentation in the current research paradigms and ries (e.g., modeling) and design of specific products
testing trends that inform UI design. These paradigms interfaces.
and trends stem mostly from psychological theories that It might seem that UI designers should deal with
focus on only some specific aspects of user-interface the principles at the level of design only. Although the
interaction. While it is important to investigate such level of design is necessary, taken in isolation, it is in-
topics in detail, it is even more important to look at the sufficient for a well-designed interface. This is because
totality of the interaction and determine the principles (a) cognition is the crucial element of human-computer
that operate in it. An integrative approach to UI design interaction; that is, designers need to understand the
has the potential to solve both problems. Such an ap- cognitive processes involved in it (Peschl & Stary,
proach has two components: a top-down and a bottom- 1998); (b) without a theory of cognition, any model
up component. Its top-down component deals with a of dynamic, interactive behavior, be it verbal or com-
small set of basic cognitive principles that operate in putational, is random, theoretically unconstrained, and
interactive reality and therefore need to be recognized as such scientifically not valid; and (c) iterative design
at the level of UI design. The principles are built into a could only benefit from the models that fully employ
cognitive architecturea wide theoretical framework insights from cognitive science.
that corresponds to the human cognitive systemwhose
constraints prevent proliferation of implausible theories,
which solves the fragmentation problem. the InteractIve realIty
Since the principles within a top-down approach to
UI design are too general and hard to quantify (Zacks I will use the term interactive reality to refer to the
& Tversky, 2003), its bottom-up component enables context of interactive behavior emerging from a user-
accurate specifications of each case of UI design. This is task-artifact triad. A specific case of interactive behavior
done via computational cognitive models. The models depends on (1) the elements of the triad, (2) complex-
are used for rapid prototyping and evaluation, as well ity of the structural relations among the elements, and
as for other requirements of iterative user-centered (3) the environment in which a task takes place. Thus,
design. Thus, the integrative approach to UI design is a the term interactive reality implies that no matter how
model-based design approach that unifies the domains complex the dynamic interplay of users cognition,
of cognition, theory, methodology, and design in a perception, and motor actions is, it is the totality of the
principled way. The integrative approach emphasizes relations that emerge from the triad in each particular
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
An Integrative Approach to User Interface Design
case and the triads interaction with the environment phenomena (attention, vision, working memory, deci-
that determines the quality of the users experience. sion making, problem solving, learning), which makes
Given the complexity of interactive reality and that them (and cognitive science in general) perfectly aligned
of the human cognitive system, it is confusing that UI with a major desideratum of scienceunification of
design often assumes that the rationality principle is the seemingly disparate events.
only relevant principle that affects this reality. Indeed, A cognitive architecture is a theoretical framework
cognitive scientists have long realized that rationality which hypothesizes about those aspects of the human
does not determine behavior (Simon, 1947, p. 241) and mind that are relatively constant over time and across
that the rational decision theory put forth by neoclassical tasks (Sun, 2004). More specifically, a particular CA
economics is too idealized to be applied to everyday is characterized by specific constraints that prevent
human life (Boden, 2006; Gardner, 1985). proliferation of implausible theories, while its model
As an example of irrational interactive behavior, provides the architecture with the knowledge required
consider the paradox of the active user. The paradox for accomplishment of a certain task (Langley, Laird,
consists in the users preference of inefficient general & Rogers, 2006). Computational cognitive models
procedures to the recommended specialized ones. Thus, are runnable, and can be used to test parameters and
the users decisions on the steps in accomplishing a sequences of human behavior that otherwise could not
task are neither optimal nor rational choices. What is be tested, such as prohibitive costs or impracticality due
puzzling here is the users persistence in employing to time limits (Byrne, 2002). They also enable making
the inefficient strategies even though in the long run quantitative predictions about users performance (such
these require more effort (Fu & Gray, 2004). More as error and learning rates, or transfer of knowledge),
importantly, such behavior is guided by an inadequately which makes them a valuable tool in UI design and
designed UI. If the principle of rationality does not usability testing.
figure prominently in interactive behavior, then what In addition to CAs, the integrative approach to UI
are the principles that determine it? Here I outline three design also relies on the unification of the levels of
principles that appear to influence interactive behavior interpretation and representation of interactive reality
more than the principle of rationality. (cognition, theory, methodology, design) via basic
cognitive principles. This type of unification reflects
the general trend towards minimalism that is currently
desIgn as aPPlIed scIence present in science and in design. However, minimalism
itself is only a by-product while the main indicators of a
In a way, UI design seems to close the gap between well designed interface are usability and quality in use.
theory and practice, which has been open for millennia The latter two concepts result from a complex process
(Ohlsson, 2007). The distinction neatly emphasizes the of user-centered design (Schneiderman & Plaisant,
divide between the two types of knowledge: theoretical 2005). It is generally assumed that usability, together
type, or knowledge that, and the practical type, or with functionality, reliability, efficiency, portability, and
knowledge how. UI design has the potential to become maintainability, determines quality of a software prod-
a mechanism for interfacing thought and action, bridg- uct. Note that there exists another conceptthe quality
ing the big divide between theory and practice. in usethat refers to a users view of the quality of the
Card, Moran, and Newell (1983) have pointed out system containing the software (ISO 9126-4). Quality
that knowledge of human behavior does not translate in use may be influenced by any of the six software
easily into guidelines on how to design interactive quality characteristics, but at the same time, it heavily
computer systems. In order to enable an easy transfer of depends on a user, task, and the context of use. Thus,
knowledge from theoretical psychology to the practice the user-task-artifact triad and the interactive behavior
of design, they proposed building an applied psychol- within it directly determine the quality in use. Given
ogy that includes theory, data, and knowledge (p. vii). the complexity of the human cognitive system on the
Within this applied approach, the key concept is cogni- one side, and that of interactive behavior, on the other,
tive architecture (CA), that is, a construct that attempts one could claim that usable interfaces cannot stem from
to explain the overall structure of the human cognition. the single principle of rational reasoning. Instead, they
CAs integrate the broadest range of human cognitive incorporate other, perhaps more relevant principles of
interactive reality.
An Integrative Approach to User Interface Design
the IntegratIve aPProach be multiplied beyond necessity, which was put forth
by a 14th century English philosopher and theologian, I
The integrative approach to UI design extends the basic Ockham, has been adapted and widely used in science
cognitive principles, such as the principle of economy, ever since as a principle according to which the best
information structuring, and relevance to UI design. theory is always the one with the smaller number of
The approach implies that designers need to consider assumptions and hypotheses (Blackburn, 1996, p. 268).
these principles at each of the following levels: Since a CA imposes constraints on theories developed
within it, preventing proliferation of implausible
The level of human cognition, theories, it is reasonable to assume that the theories
The theoretical level, developed within these wide frameworks would be
The methodological level, inherently constrained and as such more aligned with
The level of interface design. the principle than the non-CA theories.
At the level of methodology, computational cogni-
A dynamic interplay of the principles as well as the tive modeling seems to provide the most economical
extrapolated levels are to be considered only through the solutions. In addition to their capacity to make quan-
prism of interactive reality. In other words, the purpose titative predictions about users performance, includ-
of a user-artifact interface is to enable communication ing those aspects of interactive reality that would be
between the two representation systems (user and impractical or impossible to test by the traditional
device) and trigger an optimal cognitive dynamics in methods, these models significantly reduce testing
the user so that the task at hand can be accomplished costs and time. One could object that building such
by using minimal efforts for maximal benefits. This models and becoming proficient in a CA are far from
can be achieved by first constructing and then testing being effortless. However, the accuracy of distinctions
computational cognitive models of such interfaces. and predictions, subtlety of concepts, and parsimony
of models developed within a CA outweigh the efforts
the Principle of economy of learning how to build and use them.
When applied to the level of design, the economy
The most basic principle of human cognition is the principle translates into minimalism which in turn
principle of economy or the least effort principle. translates into efficiencyone of the usability subchar-
It requires that the benefits of a particular action be acteristics according to ISO 9126-4. For example, note
maximized while keeping the costs or efforts required that the economy principle might explain the paradox
for its successful completion minimal. There is grow- of the active user. As Fue and Gray (2004) have pointed
ing evidence indicating that this principle operates at out, users choose general and inefficient procedures
different domains of cognition both in neurologically possibly because such decisions require less cognitive
intact and impaired brains. As an example, consider effort as mental look-ahead can be off-loaded to the
the human conceptual system. Rosch (1978) has found external display (p. 905). Thus, although users follow
that the principle of cognitive economy prohibits an the economy principle (i.e., they choose the less difficult
endless creation of highly informative concepts. Since interactive actions that lead to incremental change), in
informativeness is cognitively costly, objects with the long run, they will invest more effort and time in the
similar features are grouped into the same category. ineffective procedures. On the other hand, interfaces
So, instead of creating an infinite number of the most whose design incorporates the economy principle at all
informative concepts, the human conceptual system levels do not allow the paradox of the active user. Table
categorizes the concepts according to their features into 1 lists the principles and the levels of representation/
basic, superordinate, and subordinate concepts. Since interpretation of interactive reality.
basic concepts are more informative and distinctive
than subordinate or superordinate concepts, our general the Principle of Information structuring
preference is for the basic concepts.
The economy principle operates at the level of Cognition arises in response to the structure of external
theory as well. At this level, it is known as Occams world (Anderson & Lebiere, 2003). Since human cogni-
razor. The general principle that entities are not to tion is limited with regard to the amount of information
An Integrative Approach to User Interface Design
that it can process at a time, finding a structure in a Bothell, Byrne, Douglass, Lebiere, & Qin, 2004) in its
stimulus facilitates its processing and remembering most recent versions, model a wide range of human
(Chater & Vitnyi, 2003). Thus, the human cogni- cognitive and perceptual-motor abilities (St. Amant
tive system is always looking for patterns. Examples & Riedl, 2000; Taatgen, Lebiere, & Anderson, 2006).
indicating that this principle holds abound both at low ACT-R/PM is equipped for modeling of dynamic
and high levels of cognition. For example, perception behavior such as interaction within the user-task-arti-
is extraction of patterns from sensory input. Language fact triad. Indeed, ACT-R has been used for modeling
comprehension is extraction of patterns from language situations such as driving and dialing a number on a
input for the purposes of communication. Learning, as variety of cellular phone interfaces (Salvucci, 2001;
well as conceptualization, categorization, inferencing, Salvucci & Macuga, 2001; St. Amant, Horton, & Ritter,
and other forms of higher cognition, are also based on 2006), proving that it is capable of providing valuable
search for patterns. data in the iterative design process. Thus, information
At the same time, human behavior is sequential structuring is crucial not only in our representation and
and goal-driven. Its sequentiality is not obvious, since interpretation of the incoming information (via finding
most activities in our daily lives leave the impression patterns in input data), but also in our production
of continuity. The activities consist of more basic of outgoing information (sequencing of actions in
structural elementsactions, which are discrete, goal everyday activities, establishing dependency and other
oriented, and hierarchically ordered elements of be- relations within our mental representations). At the level
havior (Zacks & Tversky, 2001). Actions are crucial of theory and methodology, the approach based on the
at the level of interface design because they align the concepts of cognitive architecture and computational
goal structure of an activity with the interface structure modeling (like ACT-R) makes this important principle
(Zack & Tversky, 2003). Thus, the goal of a UI designer more visible.
should be the alignment of the two structures, and the
instructions to users should reflect the hierarchical the relevance Principle
nature of actions.
The concept of decomposition of human behavior Given the economy principle, we would expect that
into activities and goal-directed actions was first used finding patterns takes place with the least processing
for computer modeling by Newell and Simon (1972). effort. On the other hand, the fact is that an infinity of
While their cognitive model, General Problem Solver, patterns are in principle compatible with any finite set
modeled only problem-solving for planning, the current of data (e.g., an infinity of curves pass through a given
cognitive architectures, such as ACT-R/PM (Anderson, set of points; an infinity of grammars are compatible
0
An Integrative Approach to User Interface Design
with any finite set of sentences). Yet, the brain is looking If the principles described above hold, that is, if the
for the simplest patterns as the ones that are the most human cognitive system indeed tends to automatically I
natural to human cognition (Boden, 2006; Chater minimize effort, maximize relevance, extract optimal
& Vitnyi, 2003). Since finding the simplest pattern patterns form data, and choose optimal goals and sub-
may in principle take more time and effort than find- goals for its actions, then it is possible, at least to some
ing a complex pattern, it seems that something else in extent, to predict and manipulate the mental states of
addition to simplicity and economy drives the minds others. In other words, designers have an opportunity
search for patterns. to drive users attention in a way that would prompt
When choosing the most natural among the infinity exactly the choices that would cause an intended ac-
of patterns that are compatible with any specific set of tion. After all, the purpose of a user interface is to
data, the human cognitive system is not searching for enable communication between a user and a device.
the simplest patterns only, but also for the most relevant The reason pop-ups are so annoying is that they break
among them. Providing the most relevant pattern maxi- the communication between the user and device. The
mizes positive cognitive effects in data processing users relevance expectations are not met (hence an-
(Sperber & Wilson, 1995) and optimizes the usefulness noyance), which affects the users attention and slows
of information. This principle is also reflected in the fact down his information processing. If the principles are
that pattern recognition both in humans and machines is indeed inherent to the human cognitive system, UI
driven by elimination of redundancy (Chater & Vitnyi, design needs to (1) make sure not to interfere with
2003). The principle has figured prominently in many their working (producing the paradox of the active
domains of research: communication (Grice, 1989), user) and (2) prompt the user to keep applying them
inference, category-based induction, and relational automatically. That would lead to the optimal design
reasoning, among others (Van der Henst & Sperber, of user interfaces, that is, usability and quality in use
2004). Thus, UI design needs to acknowledge that the with minimal cognitive effort.
human cognitive system in its optimal state is geared
towards efficiencyit automatically chooses to invest
the least effort in picking the most relevant pattern reFerences
from the stimuli, or in retrieving the most relevant
information from memory. Although the principles are Anderson, J. R., Bothell, D., Byrne, M. D., Douglass, S.,
constant, each instance of UI design needs to reconcile Lebiere, C., & Qin, Y. (2004). An integrated theory of
them with the fact that interactive reality often assumes the mind. Psychological Review, 111(4), 1036-1060.
non-optimal cognitive states. Namely, factors such as
fatigue, stress, illness, advanced age, and the contextual Anderson, J. R., & Lebiere, C. L. (2003). The Newell
factors such as noise, movement, and multitaskingall test for a theory of cognition. Behavioral and Brain
affect the optimal state. Thus, UI design needs to apply Sciences, 26, 587-637.
the principles and be flexible at the same time. Blackburn, S. (1996). The Oxford dictionary of phi-
losophy. Oxford: Oxford University Press.
Fu, W. T., & Gray, W. D. (2004). Resolving the paradox St. Amant, R., & Riedl, M. O. (2000). A percep-
of the active user: Stable suboptimal performance in tion/action substrate for cognitive modeling in HCI.
interactive tasks. Cognitive Science, 28, 901-935. International Journal of Human-Computer Studies,
55, 15-39.
Gardner, H. (1985). The minds new science: A history
of the cognitive revolution. BasicBooks. Sun, R. (2004). Desiderata for cognitive architectures.
Philosophical Psychology, 17(3), 341-373.
Grice, H. P. (1989). Studies in the way of words. Cam-
bridge, MA: Harvard University Press. Taatgen, N. A., Lebiere, C., & Anderson, J. R. (2006).
Modeling paradigms in ACT-R. In R. Sun (Ed.), Cog-
ISO 9126-4 . (2003). Software EngineeringProduct
nition and multi-agent interaction: From cognitive
QualityPart 4: Quality in Use Metrics.
modeling to social simulation (pp. 29-52). Cambridge
ISO/IEC TR 9126-1. Software EngineeringProduct University Press.
QualityPart 1: Quality Model.
Van der Henst & Sperber (2004). Testing the cognitive
Kljajevic, V. (in press). Cognitive models as usabil- and communicative principles of relevance. In I. A.
ity testing tools. In Jo Lumsden (Ed.), Handbook of Noveck & D. Sperber (Eds.), Experimental pragmat-
research on user interface design and evaluation for ics. Basingstoke: Palgrave.
mobile technology. Hershey, PA: IGI Global.
Wilson, D., & Sperber, D. (2004). Relevance theory.
Langley, P., Laird, J.E., & Rogers, S. (2006). Cognitive In G. Ward & L. Horn (Eds.), Handbook of pragmatics
architectures: Research issues and challenges (Techni- (pp. 607-632). Oxford: Blackwell.
cal Report). Palo Alto, CA: Institute for the Study of
Zacks, J. M., & Tversky, B. (2001). Event structure
Learning and Expertise.
in perception and conception. Psychological Bulletin,
Ohlsson, S. (2007). The separation of thought and 127, 3-21.
action in Western tradition. In A. Brook (Ed.), The
Zacks, J. M., & Tversky, B. (2003). Structuring infor-
prehistory of cognitive science. New York: Palgrave
mation interfaces for procedural learning. Journal of
Macmillan.
Experimental Psychology: Applied, 9, 88-100.
Peschl, M.F., & Stary, C. (1998). The role of cognitive
modeling for user interface design representation: An
Key terMs
epistemological analysis of knowledge engineering in
the context of human-computer interaction. Mind and
Cognition: A complex system enabled by the
Machines, 8(2), 203-236.
functioning of the brain. It comprises processes and
Salvucci, D. D. (2001). Predicting the effects of in-car states that include for example vision, language com-
interface use on driver performance: An integrated prehension and use, memory subsystems, executive
model approach. International Journal of Human- functions (planning, problem solving, self-monitoring),
Computer Studies, 55, 85-107. and so forth.
Salvucci, D. D., & Macuga, K. L. (2001). Predicting the Cognitive Architecture: An underlying infrastruc-
effects of cellular-phone dialing on driver performance ture of a cognitive agent that remains constant over
[Special issue]. Cognitive Systems Research. time and across tasks. Cognitive architectures attempt
to model the mind. Examples of cognitive architectures
Schneiderman, B., & Plaisant, C. (2005). Designing the
are SOAR, EPIC, ACT-R, and so forth.
user interface: Strategies for effective human-computer
interaction (4th ed.). Boston: Pearson. Cognitive Principles: The principles that guide and
restrict cognitive operations. They operate within and
St. Amant, R., Horton, T. E., & Ritter, F. E. (2006).
across different cognitive modules (vision, language,
Model-based evaluation of expert cell phone menu
etc.). The most basic among these principles is the
interaction. In Proceedings of the ACM Conference
principle of economy, which requires that maximal
on Human Factors in Computing Systems (CHI 04),
benefits be obtained by the least cognitive efforts.
Vienna, Austria.
An Integrative Approach to User Interface Design
Section: Product ICT
Milan Stankovic
University of Belgrade, Serbia
Vitomir Kovanovic
University of Belgrade, Serbia
Jelena Jovanovic
University of Belgrade, Serbia
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Intelligent Multi-Agent Systems
to represent the decentralized nature of the problem, the agents behavior, whereas the agent program is a
multiple perspectives, or competing interests. Sys- concrete implementation of that formalism. I
tems composed of multiple autonomous components As Russell and Norvig (1995) stipulate, one of the
(agents) are considered multi-agent systems (MAS) most desirable properties of an agent is its rationality.
and historically belong to distributed artificial intel- We say that an agent is rational if it always does the
ligence (Bond & Gasser, 1998). MAS can be defined action that will cause the agent to be the most suc-
as a loosely coupled network of problem solvers that cessful. The rationality of an agent depends on the
work together to solve problems that are beyond the performance measure that defines what is a good ac-
individual capabilities or knowledge of each problem tion and what is a bad action, the agents knowledge
solver (Durfee & Lesser, 1989). The characteristics of about the environment, the agents available actions,
MAS are (Jennings et al., 1998): and also the agents percept history. One of the most
cited definitions of a rational agent is: for each pos-
Each agent has incomplete information or capa- sible percept sequence, a rational agent should select
bilities for solving the problem, thus each agent an action that is expected to maximize its performance
has a limited viewpoint; measure, given the evidence provided by the percept
There is no global system control; sequence and whatever built-in knowledge the agent
Data are decentralized; and has (Russell & Norvig, 1995, p. 36).
Computation is asynchronous. The main challenge in the field of intelligent software
agents is to develop an agent program that implements
In addition to MAS, there is also the concept of the desired functionalities. Since it is a computer pro-
a multi-agent environment, which can be seen as an gram, we need to have some computing device with
environment that includes more than one agent. Thus, appropriate sensors and actuators on which the agent
it can be cooperative, competitive, or both. program will run. We call this agent architecture. Thus,
an agent is essentially made of two components: the
agent architecture and the agent program.
agent-based soFtWare and Another important concept in the field is the so-
MultI-agent systeMs called belief-desire-intention (BDI) model (Bratman,
Israel, & Pollack, 1988). BDI agents are characterized
agents and environments by a mental state with three components: beliefs,
desires, and intentions. Beliefs correspond to informa-
Dominant researchers in the field mostly refer to agents tion that the agent has about its environment. Desires
as software entities that perceive their environment represent options available to the agentdifferent
through sensors and act upon that environment through possible states of affairs that the agent may choose to
actuators (Russell & Norvig, 1995). There is an obvi- commit to. Intentions represent states of affairs that
ous analogy with a human agent who has ears, eyes, the agent has chosen and has committed resources
and other organs as sensors, and arms, legs and other to. An agents practical reasoning includes constantly
organs as actuators. Information about the state of the updating beliefs from information in the environment,
environment that the agent acquires through sensors is deciding what options are available (i.e., recognizing
called agents percept. An agent typically collects its its desires), filtering these options to determine new
percepts during the time, so its action in any moment intentions, and acting on the basis of these intentions
generally depends on the whole sequence of percepts (Jennings et al., 1998).
up to that moment. If we could generate a decision tree
for every possible percept sequence of an agent, we Multi-agent Interactions
could completely define the agents behavior. Strictly
speaking, we would say that we have defined the agent In MAS and multi-agent environments, the individual
function that maps any sequence of percepts to the con- agents need to interact with one another, either to
crete action. The program that defines the agent function achieve their individual objectives or to manage the
is called the agent program. These two concepts are dependencies that ensue from being situated in a com-
different; the agent function is a formal description of mon environment. These interactions range from simple
Intelligent Multi-Agent Systems
Intelligent Multi-Agent Systems
of conflicting goals. Such an approach is applicable exposure, based on the expected audience composition.
to trading systems, where agents act on behalf of buy- These agents compete in an auction to gain advertis- I
ers and sellers. Financial markets, as well as meeting ing space, ensuring that the most suitable advertising
scheduling and travel arrangement composing, also content is selected (Paine, David, Jennings, & Sharifi,
represent prominent fields for agent application. 2006). B l u S c r e e n uses the concept of agents
Intelligent tutoring systems often include pedagogi- socialization to achieve context aware, intelligent be-
cal agents, which represent software entities constructed havior of the system as a whole, relying on particular
to present the learning content in a user-friendly fashion agents autonomy to act on behalf of stakeholders and
and monitor the users progress through the learning maximize their satisfaction.
process. These agents are responsible for guiding the
user and suggesting additional learning topics related talaria
to the users needs (Devedzic, 2006). In the design of
user interfaces, agent technology may be used to cre- T a l a r i a System (The Autonomous Lookup and
ate adaptable interfaces where an agent or an agent Report Internet Agent System), named after the Greek
system tries to register the user characteristics and Messenger God Hermess winged sandals, is a multi-
behavioral tendencies and to adapt the user interface agent system developed for academic purposes at the
to these observations (i.e., perceived requirements) School of Business Administration, the University of
by making interface more usable (Shneiderman & Belgrade, Serbia (http://goodoldai.org.yu/talaria/). It
Plaisant, 2005). offers a solution to the common problem of gathering
information from diverse Web sites that do not provide
bluscreen RSS feeds for news tracking. T a l a r i a integrates
information gathering and filtering in the context of
B l u S c r e e n is a research project at the University supporting a user to manage Web interests. The system
of Southampton (http://www.iam.ecs.soton.ac.uk/proj- provides each user with a personal agent, which peri-
ects/BluScreen.html), the main aim of which is to create odically monitors the Web sites that the user expressed
an intelligent public display able to adapt the selection interest in. The agent informs its user about relevant
of adverts for display to the present audience detected changes, filtered by assumed user preferences and de-
by Bluetooth technology. Customization of content is fault relevance factors. Human-agent communication
achieved by using history information of past users is implemented via e-mail so that a user can converse
exposure to certain sets of adverts in order to predict with the agent in natural language, whereas the agent
which advert is likely to gain the highest attention. heuristically interprets concrete instructions from the
This multi-agent system employs an auction-based mail text (e.g., change site list or kill yourself).
negotiation model. Each agent represents a stakeholder Human-like interaction, autonomy-related aspects of
wishing to advertise, and it is provided with a bidding this system, and acting on behalf of the user emphasize
strategy that utilizes heuristics to predict future advert the usability advantages of this agent-based software.
Intelligent Multi-Agent Systems
The system was implemented using the JADE model- remained in the agent-based world, among which we
ing framework (http://jade.tilab.com/). emphasize the lack of sophisticated software tools,
techniques, and methodologies that would support the
specification, development, integration, and manage-
Future trends ment of agent systems.
Intelligent Multi-Agent Systems
Champion, M., Ferris, C., & Orchard, D. (2004, Febru- Sycara, K., Decker, K., & Williamson, M. (1997).
ary). Web services architecture. W3C working group Middle-agents for the Internet. In M. E. Pollack (Ed.), I
note 11. Retrieved March 2, 2008, from http://www. Proceedings of the 15th International Joint Confer-
w3.org/TR/ws-arch/. ence on Artificial Intelligence (pp. 578-584). Morgan
Kaufmann Publishers.
Bratman, M. E., Israel, D. J., & Pollack, M. E. (1988).
Plans and resource-bounded practical reasoning. Com- Wooldridge, M., & Jennings, N. R. (1995). Intelligent
putational Intelligence, 4, 349-355. agents: Theory and practice. The Knowledge Engineer-
ing Review, 10(2), 115-152.
Devedzic, V. (2006). Semantic Web and education.
Springer. Wooldridge, M., & Jennings, N. R. (1998). Pitfalls
of agent-oriented development. In K. P. Sycara & M.
Durfee, E. H., & Lesser, V. (1989). Negotiating task
Wooldridge (Eds.), Proceedings of the 2nd International
decomposition and allocation using partial global
Conference on Autonomous Agents (pp. 385-391).
planning. In L. Gasser & M. Huhns (Eds.), Distributed
ACM Press.
artificial intelligence (vol. II, pp. 229-244). London: Pit-
man Publishing/San Mateo, CA: Morgan Kaufmann.
Key terMs
FIPA. (1997). Part 2 of the FIPA 97 specifications:
Agent communication language. Retrieved March
Agent Communication Language (ACL): Lan-
2, 2008, from http://www.fipa.org/specs/fipa00003/
guage used by agents in exchange of messages and
OC00003A.html
defining common syntax for cooperation between
Jennings, N. R., Sycara, K., & Wooldridge, M. (1998). heterogeneous agents.
A roadmap of agent research and development. Autono-
Agent Negotiation: A model of communication
mous Agents and Multi-Agent Systems, 1(1), 7-38.
among agents that may have conflicting interests but
Luck, M., McBurney, P., Shehory, O., & Willmott, S. tries to find a compromise solution so that agents mutu-
(2005). Agent technology: Computing as interaction. ally benefit from reaching agreement.
Retrieved March 2, 2008, from http://www.agentlink.
Cooperative Multi-Agent Interactions: Interac-
org/roadmap/al3rm.pdf
tions among agents that share common goals in order
Maes, P. (1994) Agents that reduce work and informa- to achieve improved collective performance.
tion overload. Communications of the ACM, 37(7),
Intelligent Software Agent: An encapsulated
3140.
computer system that is situated in some environment
Payne, T. R., David, E., Jennings, N. R., & Sharifi, M. and that is capable of flexible, autonomous action in
(2006). Auction mechanisms for efficient advertisement that environment in order to meet its design objectives
selection on public displays. In B. Dunin-Keplicz, A. (Wooldridge & Jennings, 1995).
Omicini, & J. Padget (Eds.), Proceedings of the 4th
Middle-Agents: Agents that facilitate coopera-
European Workshop on Multi-Agent Systems.
tion among other agents and typically connect service
Russel, S. J., & Norvig, P. (1995). Artificial intelligence: providers with service requestors.
A modern approach. Prentice Hall.
Multi-Agent System (MAS): A software system
Shneiderman, B., & Plaisant, C. (2004). Designing composed of several agents that interact in order to
the user interface (4th ed.). Boston: Pearson/Addison- find solutions of complex problems.
Wesley.
Self-Interested Multi-Agent Interactions: Interac-
Singh, R., Sycara, K., & Payne, T. (2002). Distributed tions among agents that do not share common goals.
AI, schedules and the Semantic Web. The XML Journal, These interactions often include competition and rely
3(11), 40-45. on negotiation.
0 Section: Process ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Intelligent User Preference Mining
tifiable attributes. This represents a more complex not be able to cover all the attributes, as they need to
problem as attributes are highly subjective with no classify them into the ontology. I
discrete metric to measure their values. Different users
give different values to a particular attribute. MARI
(Multi-Attribute Resource Intermediary) (MARI, 2007) descrIPtIon oF IntellIgent user
proposed a word-of-mouth approach to solving this PreFerence detectIon
problem. The project split up users into general groups
and estimated their preference to a specific set of attri- The proposed approach attempts to capture user
butes through the group each user belongs to. Another preference based on two quantifiable accounted at-
approach to handling nonquantifiable attributes involves tributes, price and quality. It learns incrementally any
requesting the user for preferred attributes. Shearin and unaccounted attribute that affects a users preference.
Liberman (2001) provided a learning tool for users to If any unaccounted attribute is suspected, the system
explore their preferences before requesting them to comes up with a list of candidate attributes and verifies
suggest desirable attributes. their importance through a genetic algorithm (Haupt &
The problems in related work lie in the handling Haupt, 1998). Thus, attributes that were unaccounted
of nonquantifiable attributes, as the approaches are too for previously will be considered. The unaccounted
general. Most work so far only attempted to catch user attributes are derived from the general descriptions
preference through generalization and stereotyping field of a product. The approach is therefore adaptive in
instead of understanding specific user needs. Another nature, as the system is not restricted by the attributes
problem is that most works are only able to handle a it is designed to cater to.
specific set of attributes. The attributes to be handled The overall procedure is shown in Figure 1. The
are hard-coded into the system design, and the conse- system first retrieves any captured information regard-
quence is that it is not able to handle attributes that are ing the user from previous feedback and generates a
unaccounted. However, the list of product attributes is list of products from the product database for the user
often large. The approach used in related research may to rank and investigates the presence of any unac-
Start
Create feedback to
clear controversy
Get user preference from
previous feedback
Yes
No Any
Generate user controversy?
feedback
No
Yes
Any Yes Create a suspect list of
unaccounted unaccounted attributes Form a generic
group for
quantifiable
attributes
No
Recommend
products
Intelligent User Preference Mining
counted attribute affecting the users preference. The Modification Score for Detected
system then compiles a list of possible attributes that attributes
are unaccounted for by analyzing the user feedback
and rank these attributes according to their suspicion The modification score is the score assigned to all
levels. The most suspicious attributes and any informa- detected attributes by the system. These detected at-
tion captured from previous feedback are then verified tributes were previously unaccounted for but had been
using a genetic algorithm. If two cycles of feedback detected by the system to be an attribute in the users
are completed, the system attempts to generalize any preference. These include all other attributes
quantifiable attributes to form a generic group of at-
tributes. The system finally optimizes the information
NoOfAttrib utes
collected by the genetic algorithm and recommends a Modificati on Score = (K i 1) * TangibleSc ore
i =1
list of products from the product database to the user
according to the preference captured. (4)
Intelligent User Preference Mining
1
1
Agent assigns
score to each Score Product N <
product N = N+1 N = 10?
Score Product N+1?
0 0
N=1
Logical ranking
Intelligent User Preference Mining
Confirmation of Attributes the PrefWeight while 5 bits are used to represent the
various K values.
The attributes captured in previous feedbacks may be
relevant in the current feedback as the user may choose Incremental detection system
to provide more than one set of feedback. The system
thus makes a conjecture that the users preference is The system takes an incremental detection approach
influenced by certain attributes affecting him in previous in understanding user preference, and the results
feedbacks if available and eight other new attributes show success in analyzing complex user preference.
with the highest confidence score. The effect of these The system acknowledges that not all vital attributes
attributes on the users preference is verified next. may be captured within one set of feedback and thus
Each agent in the system will estimate the users considers refinement of the results of previous sets.
preference by randomly assigning a modification factor The attributes that affect a users preference in one
(K value) for each of the eight attributes with high feedback become the prime candidates in the next set
confidence score. Attributes identified to be positive are of feedback. In this way, the attributes that are detected
given K values greater than 1.0 while negative attributes are preserved and verified while new unaccounted at-
would have K values less than 1.0. The PrefWeight tributes are being detected allowing the agents to learn
and K values are optimized by a genetic algorithm to incrementally about the attributes that affect the users
improve the fitness level of the agents. preference. However, some of the information captured
by the system may be no longer valid as the number
optimization using genetic algorithm of feedback cycles increase. This creates a problem
in the incremental detection system, as the informa-
The status of detected attributes perceived by the tion may not be relevant. To solve this problem, the
agents and the most suspicious attributes will be veri- system checks the validity of past attributes affecting
fied here. The PrefWeight and various K values will the users preference and delete attributes that are no
be optimized to produce maximum agent fitness. As longer relevant in the current feedback. Each set of
this is a multidimensional problem (Osyczka, 2001) feedback contains two feedback cycles.
with each new K value introducing a new dimension, Both feedback cycles attempt to detect the presence
we use a genetic algorithm to convert the attributes of any unaccounted attributes. In addition, the first
into binary strings. The agents are evolved under the cycle will delete any attributes that are passed from
genetic algorithm to optimize the fitness of each agent. previous feedbacks and no longer relevant. These at-
The attributes of each agent are converted into a binary tributes should have a K value of 1.0 after we apply
string as shown in Figure 3, and each bit represents a the genetic algorithm. Any controversial attributes
chromosome. In the design, 10 bits are used to represent detected by the first cycle will be clarified under the
second feedback cycle.
Intelligent User Preference Mining
Intelligent User Preference Mining
Sheth, B., & Maes, P. (1993). Evolving agents for per- Genetic Algorithms: Search technique used in
sonalized information filtering. In Proceedings of the 9th computer science to find approximate solutions to op-
Conference on Artificial Intelligence for Applications timization and search problems. Genetic algorithms are
(pp. 345-352). IEEE Press. a particular class of evolutionary algorithm that uses
techniques inspired by evolutionary biology such as
Wang, T., Guan, S.-U., & Chan, T.K. (2002). Integrity
inheritance, mutation, natural selection, and recombi-
protection for code-on-demand mobile agents in e-
nation (or crossover).
commerce. Journal of Systems and Software, 60(3),
211-221. M-Commerce: M-commerce, or mobile commerce,
stands for electronic commerce made through mobile
Zhu, F.M., & Guan, S.-U. (2001). Evolving software
devices.
agents in e-commerce with gp operators and knowledge
exchange. In Proceedings of the 2001 IEEE Systems, Ontology: Studies being or existence and their
Man and Cybernetics Conference. basic categories and relationships, to determine what
entities and what types of entities exist.
Key terMs Product Brokering: A broker is a party that medi-
ates between a buyer and a seller.
Accounted Attribute: A quality, feature, or char- Software Agent: An abstraction, a program that
acteristic that is listed in product specifications of describes software that acts for a user or other program
a specific product. in a relationship of agency.
Attribute: A quality, feature, or characteristic Tokenize: The process of converting a sequence of
that some product has. characters into a sequence of tokens or symbols.
E-Commerce: Consists primarily of the distrib-
uting, buying, selling, marketing, and servicing of
products or services over electronic systems such as
the Internet and other computer networks.
Section: Product ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Interactive Television Accessibility and Usability
caution in an interactive television context. According the only problem might be one of hearing, possibly to
to Gauntlett and Hill (1999) and Masthoff (2002), the be overcome with captions or a cochlear implant, the
major differences are: handicap is much more severe than expected. Having
acquired reading and speaking skills as a deaf person,
Physical characteristics of interaction: Viewers he can generally recognise words that have been
watch television at some distance from the screen, taught to him during speech training. All other terms
typically in an environment oriented toward will have to be inferred from context. In other words,
relaxation and comfort. Resolution is much lower in some forms of disability, the main problem lies
than computer display screens, and color behaves in integrating different inputs into a comprehensible
differently. Detailed information is presented via piece of information without being overwhelmed by
audio. All interactions are carried out via a handset the task.
(combined in some cases with a keyboard).
Multiple information channels are mediated dyslexia
via the same device: There is conflict between
watching the broadcast stream and manipulation of Approximately 4% of the population is severely
any interactive components; viewers must divide dyslexic
their cognitive resources between watching and
interacting, and this may be reflected in design A further 6% have mild to moderate problems connected
through allocation of screen real-estate. with dyslexia
The optional status of television viewing:
Television tends to mean leisure and entertainment (Tiresias Organization, http://www.tiresias.org/
rather than work or other serious pursuits. Thus, guidelines/dyslexia.htm)
the task-oriented approach most often adopted
by usability evaluators may be inappropriate. Developmental dyslexia is a condition or learning
Social characteristics of interaction: The disability causing difficulty in reading and writing
domestic setting in which TV is utilised is and present despite normal intellectual, cognitive,
complex, and its numerous facets make evaluation and sensory development. People are often identified
difficult. as dyslexic when their reading or writing problems
cannot be explained by a lack of intellectual ability,
inadequate instruction, or sensory problems such as
bacKground poor eyesight.
Dyslexia is not limited to reversing the order of
Abilities may vary from person to person, and, in the letters in reading or writing. Nor is it a visual perception
course of time, in different people with the same type deficit involving reading letters or words backwards or
of disability. People may have combinations of different upside down, as often implied in popular culture.
disabilities and combinations of varying severity The most frequent symptoms of dyslexia are:
levels. The number and severity of limitations tend
to increase as people age and may include changes Difficulty in learning through language alone
in vision, hearing, memory, or motor function. Many Difficulty in processing information
accessibility solutions described in this document sequentially
contribute to universal design (also called design
for all) by benefiting nondisabled users as well as Dyslexics are visual thinkers and use all their
people with disabilities. In this article, three different senses. As they tend to think in images, they find it
disabilities will be focused on: sight, visual impairment, difficult at times to understand letters, symbols, or
and dyslexia. written words.
What a person with specific impairment experiences A dyslexic person has difficulty reading the words in
is often an impediment due to overloading input on a line and starting again on the next line and frequently
different abilities at the same time. A typical case is skips whole words or whole lines. She might also add
a prelingual deaf person. Although one might think extra syllables to words due to difficulty in reading
Interactive Television Accessibility and Usability
from left to right. Dyslexics tend to favour inferring affected unless optimally amplified.
processes rather than decoding ones. Although this Moderate/Severe 51-70 dB. Conversation must I
is a valid instrument in itself, it might be a source of be very loud to be heard without amplification. A
error. They tend to start decoding the first part of the 55dB loss can mean 100% of the speech signal
word and then make up the rest of it (Shaywitz & is lost.
Shaywitz, 2001). Severe 71-90 dB. If loss is prelingual,
spoken language and speech may not develop
deafness spontaneously or be severely delayed in absence
of modification or intervention.
There are more than 80 million Europeans with hearing Profound 91 dB or greater. Aware of vibrations
loss more than tonal pattern. Many rely on vision
rather than hearing as the primary avenue for
(Hear It Organization, http://www.hear-it.org/page. communication and learning.
dsp?page=2569)
The above degrees of deafness affect speaking and
There are several types of deafness, some of them reading skills in different ways. In mild hearing loss,
overlapping: there are no comprehension problems, but omission or
alteration of certain phonemes; for example, /b/, can be
Unilateral: The inability to perceive sounds with confused with /p/. In moderate hearing loss, damage
one ear. involves both significants (the letters in words) and
Prelingual: Deafness acquired before normal their meaning. In severe or profound loss, there is no
speech developed, not usually allowing normal perception of the spoken word.
development of speaking skills.
Perilingual: Deafness acquired while the first visual disabilities
language was still being learned, often causing
incomplete development of speaking skills. In Europe there are 2.7 million totally blind people,
Postlingual: Deafness acquired after speaking 12.8 million with low vision and 15.5 million with
skills had completely developed visual impairment.
Partial: A decrease in ones ability to perceive
sounds without causing total hearing loss. (World Health Organization, http://www.who.int/
Profound: A severe decrease in ones ability to mediacentre/factsheets/fs282/en/index.html)
perceive sounds, rendering him completely unable
to hear sounds of normal (or any) intensity. There are many types of low vision, for instance poor
acuity (vision that is not sharp), tunnel vision (seeing
An individuals hearing loss is assessed using only the middle of the visual field), central field loss
audiometry, which measures loss in decibels (dB) at (seeing only the edges of the visual field) and clouded
different frequencies. The different levels of hearing vision. Visual limitations tend to increase as people
loss are classified as: age. An ever-increasing number of people are at risk
of visual impairment as populations grow and older
MILD 1635 dB. May have difficulty hearing age groups predominate.
faint or distant speech, losing up to 10% of the
speech signal when the speaker is at a distance Important differences between
greater than three feet or if the environment is television and the Web
noisy.
Moderate 3650 dB. Understands conversational When working for iTV, there are some areas that
speech at a distance of 35 feet. Amplification designers accustomed to creating normal Web sites
may enable the listener to hear and discriminate should take into account (Johansson, 2005):
all sounds. Without amplification, 50% to 100%
of the speech signal may be lost. Speech may be
Interactive Television Accessibility and Usability
1. Screen size: Television screens are often larger thing multiple times, and you will be very motivated
than computer screens, but their resolution is to go back to the drawing board and redesign the site
lower. to eliminate the usability problems. After the fifth
2. Color and contrast: Limited to a smaller range user, you are wasting your time by observing the same
of colors on a TV. Fully saturated colors and some findings repeatedly but not learning much new.
color combinations tend to bleed. The picture is
generally much fuzzier than the one on a computer The usability test was organised as follows:
screen.
3. Fonts and readability: Because of greater Step 1: Planning the usability test
viewing distance, the designer needs to use larger
text on TV than on a computer screen. You will It was decided to have one subject (the visually
also want to increase line height a bit and add impaired one) add her comments while performing each
a little letter spacing to avoid individual letters task (think aloud) and the other three after finishing all
bleeding into each other. tasks (retrospectively). The first subject was also asked to
4. Viewing distance: The normal viewing distance complete the questionnaire retrospectively. When using
is much greater for television than for computers, the think aloud method, participants report on incidents
as soon as they happen. When using the retrospective
which makes the image reaching the eye smaller.
approach, participants perform all tasks uninterruptedly,
Designers need to make text and important and then report any observations (critical incidents). Studies
graphics larger than if the application were viewed have reported no significant difference between the think
on a computer screen. aloud vs. retrospective approaches in terms of the number
5. Navigation: The main navigation tool for iTV is of useful incident reports given by participants. The test was
the remote control. set to be a task-oriented activity, where users had to follow
6. Sound: Web sites rarely use sound, while precise instructions and interact with the additional services
television uses it continuously. Speech therefore of interactive television.
needs to be made available to people who cannot
hear. Step 2: Defining the audience and goals of usability
testing
MaIn Focus oF the artIcle The goals of usability testing should be focused on
determining whether the interface is usable and whether
This document is based on an iTV usability test carried the intended audience, and anyone else who might
out on the following small group of disabled people: come into contact with it, can use it. The study set
reasonable goals to be achieved with a limited amount
1. A dyslexic child of time and subjects.
2. A severe hearing-impaired teenager with bilateral
neurosensorial hypoacusia having a cochlear Step 3: Choosing subjects and evaluators
implant.
3. A moderately-severe teenager with bilateral The subjects chosen for this usability test were
neurosensorial hypoacusia having a cochlear volunteers in contact with a local support center for
implant. young people with impairments. They were:
4. A low-vision teenager
1 visually impaired
The number of subjects was reduced to the minimum, 2 hearing impaired
as suggested by Nielsen (2000) when he states: 1 reading impaired (dyslexic)
as you add more and more users, you learn less and less The evaluators were a psychologist working in a
because you will keep seeing the same things again and public center for disabled people and a multimedia
again. There is no real need to keep observing the same consultant. The psychologist acted as the facilitator,
giving feedback and helping subjects carry out their
0
Interactive Television Accessibility and Usability
tasks. According to Spool (2005), a good facilitator Let the participant make mistakes. This will
knows how to draw out exactly the right information reveal aspects of the interface that may need I
from the participant without giving away the store. improvement.
He knows how to use the very limited test time to Answer questions with questions, forcing the user
focus on those elements that are most important for to give more feedback.
the team. The other member of the team stood apart, Do not tell the participant what to do, but you can
taking notes without interfering with the experiment. suggest and discuss design solutions that might
Both evaluators took notes on verbal and nonverbal solve a usability issue.
messages conveyed by subjects. Do not explain the interface. Doing so prevents
you from getting their unbiased perception of the
Step 4: Providing a pretest questionnaire site.
Interactive Television Accessibility and Usability
First Part
1. Press button #2 on the remote in order to select channel #2
2. Press the red button on the remote to load interactive elements
3. Once they are loaded, choose the NEWS menu
4. Choose the second piece of news among those listed using the arrows
5. Press on OK to read the news
6. Read the news aloud in all its parts (it will take more than one page)
7. Go back to the initial menu, pressing EXIT
8. Now choose the option SURVEY
9. Cast your vote on one of the options presented
Second Part
Third Part
Interactive Television Accessibility and Usability
Interactive Television Accessibility and Usability
Interactive Television Accessibility and Usability
Table 1.
I
general Main Difficulties suggestions
disability
category
Hearing impairment In reading due to: Increase contrast between text and background
a) low contrast with background Increase space between letters, words, and lines
b) little space between letters, words and lines Use short texts with a clear structure and
highlighted keywords.
c) texts overly long
Increase contrast and visibility of all elements on
In finding the required information on the screen due to: the screen (arrows, etc.)
Input reduction
a) input overload
Move all useful information inside the central area
b) inattention to visuals at the edges of the main
of the screen
central area
Introduce arrows to show the sequence of events
c) drop-down menus not user friendly
to be followed
In comprehension of information, due to: Introduce an interactive glossary for all words not
frequently used
a) texts being written in an elaborate style
Create a demo showing the use of specific
b) not having a clearly understandable structure
functions
c) not highlighting the most relevant pieces of
information
Table 2.
Interactive Television Accessibility and Usability
Table 3.
is made up of disabled and elderly people, it be useful for everyone. Smart cards could provide a
seems surprising that broadcasters and equipment viable method of customising iTV and other systems.
manufacturers have not given more thought to Users preferences are stored on the smart card, so
providing access for this group of people. There is when it is inserted into the system, it will reconfigure
no question, however, that even the healthiest of older the display appropriately according to the code on the
people suffers from some impairments, both physical card. Smart cards have advantages over other methods
and mental, and it makes good sense for those designing of adapting systems because they can be transferable
television-based equipment to take them into account if between systems and require less time and input. In the
they want to maximise the potential market for digital future, one card may suffice for use on many devices:
services such as home shopping. a multi-service prepayment card (Gill, 1994).
As stated by the Tiresias Organization, people over On interactive digital television, smart cards could
50 years of age naturally have worse vision than when be used to control text size, content layout, speech
they were younger. Bifocals are common, more light is output, color combinations, subtitles, audio description,
needed to see fine details, and reflective glare is often signing, timeouts, reminders and alerts, mode-changing
more problematic than for younger people. These visual capabilities according to level of expertise, and so
disadvantages apply to the vast majority of ordinary forth (Gill, 2002). If people are able to alter the
people who would not consider themselves as being presentation of information, it will render it more
blind or partially sighted, but it is worth noting that in accessible. Visual impairment does not lead to a
addition to all these people, there are some 11 million homogeneous population where one solution will
people throughout Europe classified as having low benefit everyone, as is evident even from such a
vision, defined as an ability to utilise some aspects small subject sample. Customisation of settings
of visual perception, but with greater dependency on could enable increased accessibility and usability.
information received from other sources. If the controls Further detailed work is thought to be necessary
and displays on digital TV systems could be designed into navigation, the use of columns colors and their
to suit people who have difficulty in seeing clearly, combination, and content density. At what point does
the market for interactive-type TV services would be the screen become too crowded?
greatly expanded at little cost.
Customisation is the opportunity for the user to
specify the configuration. An option displaying a
system specifically suited to any users needs would
Interactive Television Accessibility and Usability
Interactive Television Accessibility and Usability
Drucker, S.M., Glatzer, De Mar, S., & Wong, C. Instruction in Your Living Room Workshop. Re-
(2002). SmartSkip: Consumer level browsing and trieved March 3, 2008, from http://www.csd.abdn.
skipping of digital video content. In Proceedings of ac.uk/~jmasthof/FutureTV02paper.pdf
the SIGCHI Conference on Human Factors in Com-
Nielsen, J. (1993). Usability engineering. Boston:
puting Systems (pp. 219-226). Retrieved March 3,
Academic Press.
2008, from http://doi.acm.org/10.1145/503376.503416
Freeman, J. (2001). The publics perception of the ease Nielsen, J. (2000). Why you only need to test
of use of domestic digital TV equipment. Retrieved with 5 users. Retrieved March 3, 2008, from
March 3, 2008, from http://www.ofcom.org.uk/re- http://www.useit.com/alertbox/20000319.html
search/tv/reports/usability/dtvu.pdf
Pemberton, L., & Griffiths, R.N. (n.d.). Usability evalu-
Gauntlett, D., & Hill, A. (1999). TV living: TV, culture ation techniques for interactive television. Retrieved
and everyday life. London: Routledge March 3, 2008, from http://www.it.bton.ac.uk/staff/
lp22/HCIInt.doc
Gill, J.M. (1994). Text display preferences on self-ser-
vice terminals by visually disabled people. Retrieved Pheasant, S. (1991). Ergonomics work and health.
March 3, 2008, from http://www.tiresias.org/reports/ Macmillan Press.
atm.htm
Quigley, G., & Tweed, C. (1999). Added-value services
Gill, J.M. (1996). Smart cards: Interfaces for people from the installation of assistive technologies for the
with disabilities. Retrieved March 3, 2008, from http:// elderly. Retrieved March 3, 2008, from http://www.qub.
www.tiresias.org/reports/urcai.htm ac.uk/arc/research/projects/papers/AddedValue.pdf
Gill, J.M. (2002). Tiresias - Guidelines: Television. Rice, M.D. Television and visual impairment:
Retrieved March 3, 2008, from www.tiresias.org/guide- Prospects for the accessibility of interactive
lines/television.htm television. Retrieved March 3, 2008, from
http://www.computing.dundee.ac.uk/staff/mrice/Tele-
Gill, J M., & Perera, S.A. Accessible universal design of
vision_and_visual_impairment.doc.pdf
interactive digital television. Retrieved March 3, 2008,
from http://www.tiresias.org/reports/brighton.htm Shaywitz, S.E., & Shaywitz, B.A. (2001, August).
The neurobiology of reading and dyslexia. Focus on
Higham, N. (2001). Designing TV for gran-
Basics, 5(A).
n y. R e t r i e v e d M a r c h 3 , 2 0 0 8 , f r o m
news.bbc.co.uk/hi/english/entertainment/tv_and_ra- Slatin, J.M., & Rush, S. (2003). Maximum accessibility.
dio/newsid_1689000/1689552.stm Boston: Addison-Wesley.
Johansson, R. (2005). Accessibility and usability for Spool, J.M. (2005). Seven common usability testing
interactive television. Retrieved March 3, 2008, from mistakes. Retrieved March 3, 2008, from http://www.
http://www.456bereastreet.com/archive/200512/acces- uie.com/articles/usability_testing_mistakes/
sibility_and_usability_for_interactive_television/
Stallard, G. (2003). Standardisation requirements
K a y, J . ( 2 0 0 0 ) . W h y i n t e r a c t i v e w i l l for access to digital TV and interactive services
mean active. Retrieved March 3, 2008, from by disabled people (Final report to CENELEC
h t t p : / / w w w. g u a r d i a n . c o . u k / A r c h i v e / A r t i - on TV for All). Retrieved March 3, 2008, from
cle/0,4273,4051721,00.htm http://194.7.149.242/NR/rdonlyres/5C6E5124-6034-
422A-A1CC-62B2229746C3/664/FinalreportTV-
Klein, J.A., Karger, A.S., & Sinclair, K.A. (2003). Digi-
forAll.pdf
tal television for all. Retrieved March 3, 2008, from
Sullivan, T. (1996). User testing techniques: A reader-
http://www.digitaltelevision.gov.uk/pdf_documents/
friendliness checklist. Retrieved March 3, 2008, from
publications/Digital_TV_for_all.pdf
http://www.pantos.org/atw/35317.html
Masthoff, J. (2002). Modeling a group of television
viewers. In Proceedings of the Future TV: Adaptive
Interactive Television Accessibility and Usability
0 Section: Context ICT
Police and prosecutors are fashioning a new weapon in of misuse of the computer or system, one may employ
their arsenal against criminals: digital evidence. The techniques of procedures of computer forensics. The
sigh of hard drives, Internet files and emails as court aim of this chapter is to introduce to the information
room evidence is increasingly common. technology community, a conceptual overview of in-
Michael Coren, CNN Correspondent formation computer forensics and investigations and
to discuss some of its problems and concerns.
IntroductIon
bacKground
The rapid expansion and dramatic advances in infor-
mation technology in recent years have without ques- Current literature of computer forensics (Nelson,
tion generated tremendous benefits to business and Phillips, Enfinger, & Steurt, 2004; Noblett, Pollitt &
organizations. At the same time, this expansion has Presely, 2000; Weise & Powell, 2005; Whitman & Mat-
created significant, unprecedented risks to organization tord, 2003) state that the roots of computer forensics
operations. Computer security has, in turn, become start with the first time a system administrator had to
much more important as organizations utilize infor- figure out how and what a hacker had done to gain
mation systems and security measures to avoid data unauthorized access to explore the system. This was
tampering, fraud, disruptions in critical operations, and mainly a matter of discovering the incursion, stopping
inappropriate disclosure of sensitive information. Such the incursion if it was still in progress, hunting down the
use of computer security is essential in minimizing the hacker to chastise the attacker, and fixing the problem
risk of malicious attacks from individuals and groups. allowing the unauthorized access to begin with. In the
To be effective in ensuring accountability, management beginning, the classic hackers breaking into computer
and information technology security personnel must systems were more interested in how things work than
be able to evaluate information systems security and actually being malicious. So, collecting evidence for
offer recommendations for reducing security risks to a hearing was not a process a system administrator
an acceptable level. To do so, they must possess the needed to worry about. Just plug the hole, and often
appropriate resources, skills, and knowledge. get back to personal hacking projects.
With the growing perverseness of information sys- As computers evolved out of academia to businesses
tems and the technologies used to support such tools, and government, there was more data and resources
the growing need to keep the integrity of both the data at risk. Hacker incursions became an issue handled
and the system used to manage that data, will become through legal channels (Ferbrache & Sturt, 1997). Also,
a major priority. Therefore, it is important for security as computer technology advanced, it became more af-
personnel and management to keep abreast of the issues fordable. This allowed computers to be put not only on
and trends in information systems, security and the tools each employees desk of even small business, but in
and techniques used to secure systems and data. peoples homes. More people looking for uses for the
In order to determine if information safe and systems computers lead to the increase in supply of programs.
secured from outside attacks from computer criminals, More programs made more types of information col-
information systems security assessments must be con- lected as possible evidence. Evidence derived from
ducted on a regular and on going basis to insure system computers has been used in court for almost 30 years.
security integrity. If there is suspicion of wrongdoing or This is consistent with the research conducted by Ra-
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Introduction to Computer Forensics in the Age of Information Warfare
num (1997). Initially, judges accepted the evidence as began when people in those industries saw a way to
no different from forms of evidence they were already make money by manipulating computer data. I
seeing. As computer technology advanced, the accepted One of the most well-known and documented crimes
similarities to traditional evidential material became of the mainframe era was the one cent crime. It was
ambiguous. In 1976, the U.S. Federal Rules of Evidence common for banks to rack monies in account to the
was passed to address some of the ambiguities. third decimal place or more. Banks used and still use
A great deal has evolved with computers since the rounding up method when paying interest. If the
1976. One item of significance is the Internet. This interest applied to an account resulted in a fraction of
information superhighway has become a major pas- a cent, that fraction would be used in the calculation
sage of items that fall under legal scrutiny (Nelson et for the next account until the total resulted in a whole
al., 2004). Another item is the amount of data an indi- cent. It was assumed that sooner or later every customer
vidual computer can hold. Personal computers of the would benefit. This method was corrupted on more than
early 1980s had no internal storage and the removable one occasion by computer programmers who would
storage only held 360-kilobytes per diskette. Today, an open an account for themselves and write program so
average personal computer bought for teenager game all the fractional monies went into their accounts. In
playing and Internet cruising holds internally 40 billion smaller banks, this could amount to one a few hundred
bytes of data and removable disks hold from 2 million dollars a month. In larger banks with branch offices, the
bytes to 2 billion bytes. Large server computers used amount reached hundreds of thousands of dollars.
by academia, government, and business are starting In the 1970s and early 1980s, when computer crimes
with internal storage averaging 100 billion bytes and such as the one half cent crime were being committed,
have the expandability to use storage devices holding most law enforcement officers did not know enough
trillions of bytes of data. about computers to ask the right questions or how
This explosion of technology, while providing to preserve electronic or digital evidence for a trial.
many times the computing power of the building size Many attended the Federal Law Enforcement Train-
computers of the beginning, have made the field of ing Center programs that were designed to train law
computer forensics exponentially more complicated enforcement in recovering digital data (Department
from the relativity simple tasks of evidence gathering of Justice, 2002).
only five years ago. As personal computers gained popularity and
replaced mainframes as the source of computing, dif-
ferent operating systems emerged. Apple released the
exPlorIng brIeF hIstory oF Apple 2E in 1982 and then launched the Macintosh
coMPuter ForensIcs in 1984. The disk operating system (DOS) was avail-
able in many varieties, including PC DOS, QDOS,
Thirty years ago, most people did not image that com- DR-DOS, IBM-DOS, and MS-DOS. Forensic tools
puters would be an integral part of everyday life. Now at the time were simple and most were generated by
computer technical is a common place and a hot bed government agencies such as the Royal Canadian
for criminal activity. Mounted Police in Ottawa and the Internal Revenue
In the 1970s electronic or computer evidence did Service. At this time most of the tools were written in
not hold up in court due to the fact that the fields of C and assembly language and were not available to
computing and computer forensics were new. Yet, com- the general public.
puter crimes were being committed by those involved By the mid 1980s, tools such as X Tree Gold ap-
in white collared crimes. According to Nelson (2004), peared. It recognized files types and retrieved lost or
most computers in this era were mainframes, and they deleted files. Norton Disk Edit soon followed and
were sued by an exclusive realm of highly education became one of the leading tools in file recovery.
and specialized professionals. Professionals who used By the early 1990s specialized tools for computer
such computer systems worked in banks, business, and forensic appeared. The International Association of
in other markets where the free exchange of many and Computer Investigative Specialist (IACIS) introduced
information was readily available. White-collar fraud training on the software available for forensic investiga-
Introduction to Computer Forensics in the Age of Information Warfare
tions, while the IRS created search warrant programs. understandIng coMPuter
However, no commercial software for computer fo- ForensIcs
rensics was available until ASR Data created Expert
Witness for the Macintosh. This particular software Over the years the concept of computer forensics has
was able to recover deleted files and fragments of changed, but at this core the fundamental meaning has
deleted files. yet remained. With the examination of current literature
As computer technology continued to grow, so did (Ferbrache & Sturt, 1997; Noblett, Pollitt & Presely,
the computer forensic software (Nelson et al., 2004; 2000; Whitman & Mattord, 2003; Nelson et al., 2004;
Noblett, Pollitt, & Presely, 2000; Whitman & Mattord, Nolan et al., 2005; Weise & Powell, 2005) computer
2003; Weise & Powell, 2005). The introduction of forensics involves the preservation, identification, ex-
large hard disk posed new problems for investigators. traction, documentation and interpretation of computer
Most DOS-based software does not recognize a hard data. It is often more of an art than a science, but as in any
disk large than 8 GB. Because modern computers have discipline, computer forensic specialists follow clear,
hard disk space of 20 to 80 GB, new forensics software well-defined methodologies and procedures, and flex-
tools are needed. Of the modern software packages ibility is expected and encouraged when encountering
available, iLook, a software maintained by the IRS the unusual. It is unfortunate that computer forensics is
Criminal Investigation Division and is limited only sometimes misunderstood as being somehow different
to law enforcement, can analyze and read special data from other types of investigations.
files that are copied to disk. Another popular software According to Nelson, Phillips, Enfinger, and Steuart
package used by commercial and civilian markets is (2004), computer forensics involves obtaining and
Access Data Forensics Took Kit. This particular soft- analyzing digital information for use as evidence in
ware contains everything needed to investigate, secure civil, criminal, or administrative cases. Until recently,
and analyze computer or digital data. legal professional course do not use digital evidence in
As we move into the 21st century, we see more course because it was not considered tangible evidence.
sophisticated forms of computer and digital forensics. Many court cases in state and federal courts and appel-
According to Nolan, OSullivan, Branson, and Waits late decisions that were challenged and argued that the
(2005) the first is the ability to intercept a Palm Pilot United State Supreme Court set precedents for using
PDA password either by monitoring the traffic between digital evidence.
the PDA and a workstation with a Palm Pilot cradle Until 1988, investigators needed a separate search
or by initiating a synchronization update between the warrant to search for and seize computer evidence. The
password protected PDA and a second PDA. Also, case described in the following summary was one that
modern computer and digital forensics have the ability established a different precedent so that separate search
to analyze image files to detect if a message is hidden warrants may not be necessary.
in the file using steganography. Niels Provos and Peter It is important to understand that when preparing
Honeyman at the University of Michigan have devel- a search for evidence in a criminal case, many inves-
oped a process using statistically analysis of a JPEG tigators still include the suspects computer and its
image to detect if there is a steganographic item stored components in the search warrant to avoid problem
in the JPEG. Further to add, Neil Johnson, a researcher (Nelson et al., 2004). To illustrate this point, the case
at George Mason University, is working on being able to Commonwealth v. Copenhefer 555 PA 285, 719 A.2d
identify steganographic items in BMP and GIF images 242, discusses a case where such measures were used.
files as well as .wav and .au sound files. As software When the detectives summarized the case, he recog-
companies become savvier about computer forensics nized that it established the legal foundation for the
and investigation, they are publishing more forensic seizure and subsequent search of computer used in a
tools to keep pace with the technology. crime. The detectives investigated a homicide where
the defendant saved incriminating evidence on his
business computer. The defendants attorney appealed
to the Supreme course to prevent the prosecution from
using the evidence on his computer because the detec-
tives did no obtain a separate search warrant to search
Introduction to Computer Forensics in the Age of Information Warfare
the computer. Unfortunately the courts sided with the network forensics investigator tried so determine which
prosecution (Department of Justice, 2002). Uniform Resource Locator (URL) a user accessed, how I
According to the Department of Justice (2002), they accessed or logged on to the network and from
another case to that examines the legal precedents of what locations (Noblett, Pollitt, & Presley, 2000).
computer forensics deals with a case of a kidnapped In order to understand the basics of computer fo-
woman who was found dead, presumably murdered. rensics, one must understand the fundamental differ-
Initial investigators by the Federal Bureau of investiga- ence between computer forensics and data recovery.
tions (FBI), state police, and local police resulted in Computer forensics involves scientifically examining
the discovery of a series of hidden computer generated and analyzing data from computer storage media so
notes and instructions, each leading to another. The that the data can be used as evidence in court where as
investigation also produced several possible suspects, data recovery involves recovering information from a
include on who owned a nearby bookstore and had a computer that the user deleted by mistake or lost during
history of hostile encounters with the victim and the some type of power outage or natural disaster (Nelson
husband. In addition to finding physical evidence, et al., 2004; Stair & Reynolds, 2006). To illustrate this
investigators also examined a computer used by the point, computer forensics tires to recover data that the
victims husband. They discovered a series of drafts user has hidden or deleted in that it can be allowed to
and amendments to the text of a phone call the husband be used as evidence in an investigation. The evidence
received, a ransom note, a series of other notes, and a can be incriminating or exculpatory (Department of
detailed plan for kidnapping the victim. On direct ap- Justice, 2002; Nelson et al., 2004; Weiss & Powell,
peal, the Supreme Court concluded that the physical 2005). Investigators often examine a computer disk not
evidence, especially the computer forensics evidence, knowing whether it contains evidence or not. In addi-
was sufficient to support the conviction of the bookstore tion to the hard disk investigation, computer forensic
owner. From each of the cases described, we can see investigators also investigate storage media as well
the legal precedent for the use of computer forensics and should they find any data, they piece it together
in the criminal investigation process. to produce evidence.
According to Nelson et al. (2004) working with
computer forensics investigator often involves a col-
coMParIng deFInItIons oF laborative team effort to make computer and network
coMPuter ForensIcs systems secure in an organization. In his discussion,
he states that computer investigations and forensics is
According to DIBS USA, Inc., computer forensics in- one of three functions a triad that makes up computing
volves scientifically examining and analyzing data from security. In the enterprise network environment, the
computer storage media so that the data can be used triad consists of the following parts:
as evidence in court. Investigating computers typically
includes securely collecting the computerized or digital Vulnerability assessment and risk management
data, examining the suspect data to determine details Network intrusion detection and incident re-
such as origin and content, presenting the computer sponse
or digital information to the courts, and then applying Computing investigation
laws to computer and information practice.
For the most part, computer forensics investigates Based on his research he has concluded that each of
data that can be retrieved from the hard disk or other the three parts listed, work together as whole to ensure
disks of a computer or computing device. As an archae- maximum computer and information security.
ologist excavates a site, computer investigators retrieve As we focus the discussion to computer forensics,
information form the computer or its components and we will look at the computing investigation portion of
parts. In contrast, network forensics yields information the triad. The computing investigations group manages
about ports used to access a computer or ports accessed investigations and conducts forensic analysis of systems
by a computer to commit a crime. Network forensics suspected of containing evidence or compromised ma-
uses log files to determine when someone logged on terial relating to an incident or crime (Department of
or last used their login ID to access the system. The Justice, 2002). For complex casework, the computing
Introduction to Computer Forensics in the Age of Information Warfare
investigations group draws on resources from those to life. Servers falling into this category are ones for
involved in vulnerability assessment, risk management, large service companies like at banks or the servers of
and network intrusion detection and incident response. a hospital. In this case, the files suspected of having
In addition, it is important to note that the computing evidential value are copied from the server to media the
investigations group completes all cases investigation investigators can take with them (Potaczala, 2001).
and delivers their results to organization management The ideal situation is one where full control of a
and to the proper law enforcement agencies. computer system is handed over to the investigator.
The first step before scouring for possible evidence is
to make a byte for byte copy of the media being inves-
ForMs oF exaMInatIons tigated. If the computer has a 20-gigabyte hard drive,
a hard drive of at least equivalent size, if not brand,
According to Potaczala (2001) when examining a is used to copy the data from the suspect computer.
computer setup, there are two general categories the In some cases, software will make a copy of a hard
examination falls into: live/real-time examination or drive by moving the data from the suspect hard drive
an off-line duplication. Of the types used depends on to burnable CD-ROMs (Potaczala, 2001). The idea
the situation. When dealing with a network intrusion behind this is to leave the suspect system as unaltered
or a server and network setup, which cannot be made as possible. This leaves evidential information such
unavailable, live examination is the route taken. If total as time-date stamps on files, file ownership, and last
control can be taken of the computer to be examined, access information available to the investigator.
then off-line duplication is the path used. Once the copy of the suspect media is made, an array
Potaczala (2001) states that in a live or real-time of methods can be used to carry out the examination.
examination, often the goal is to trace and trap network The method used often depends on the examiner and
activities of a system compromise. This involves ini- the shop employing him or her. However done, the
tially verifying if an intrusion has actually taken place, goal of the exam is to search the medias files, unal-
and if so, determining how and when the intrusion located space, unused space, and media formatting for
happened. An additional goal, which can prove to be information of probative value.
more difficult, is to pinpoint the location of the intruder.
The primary difficulty of achieving this goal based in the scope of the Field
the fact the intruder could be anywhere on the planet.
If the intruder is not someone part of the compromised The scope of computer forensics covers a wide field,
network system, tracking him or her will likely require which continues to grow as computer technology
the cooperation of multiple organizations connected to proliferates its way into every aspect of modern life.
the Internet as well as navigating any legal barriers as The base of computer forensics is recovering data
the search for the intruder crosses state and national from floppy disks, hard drives, and removable drive
borders. Due to the legal and human complexities of cartridges. Recovering data can be just finding it among
tracking down a network intruder, often they go untraced the active files. Often, it will also include searching the
unless the network system broken into compromises a media for files that have been deleted and been listed as
nations security, or the intruder was able to access or unallocated space. When dealing with someone, who
destroy items of substantial monetary value (Ranum, is actively attempting to hide information, scouring
1997). As supporting evidence of an intrusion, the audit media space the operating system has registered as
log files of each machine compromised or an attempt free or corrupted.
at compromise, will be examined. Depending on the Within the files found on the media, the scope of
operating system and the settings on each system, audit what can be found continues to grow. Files early in
log files can vary from being worthless to showing the discipline were mostly limited to text documents,
everything that was done on and to a machine. spreadsheets, and bulky images. Studies conducted
The other situation when a live examination often by Potaczala (2001), Department of Justice (2002),
takes place is when data of evidential value are stored and Nelson et al. (2004), indicate the next level of
on a network server, which cannot be taken out of computer forensics involves, forensic complications
service due to either significant monetary loss or risk of compression, encryption, password protection, and
Introduction to Computer Forensics in the Age of Information Warfare
steganography have been added to the mix. The type email used for threats, harassment, and stalking, extor-
of data being found in files has increased also. The tion, gambling, identify theft, narcotics, prostitution, I
operating systems now have configuration files and and piracy of software, music, images, and video.
memory swap files. Now, practically program has its
own set of temporary files. Printing is now done mainly
via a queue-based system, so there are spool files with Future trends
possible evidential value. The average web browser has
a history file, cookie file, a file of user saved web page The items addressed thus far have been for traditional
addresses, and a cache of images and texts viewed. computer setupsdesktop workstations and servers
On the hardware side recent additions include smart with networking interconnecting them. With the min-
cards with 4 to 64 kilobytes of data space to current USB iaturization of electronic components down to near
dongles with up to 64 megabytes of data space. Hand- the size of a couple of atoms, the number of computer
held devices like electronic organizers and personal systems that can become part of an investigation is
digital assistants can have megabytes of data. Some blossoming.
currently found includes address books, appointment According to Potaczala (2001), Department of Jus-
calendars, documents, e-mail, handwriting, passwords, tice (2002), and Nelson et al. (2004) laptop computers,
phone book, text messages, voice messages, and Web while not new, are seeing increasing popularity as a
browsing associated files. Some even contain Global supplement to a desktop computer, if not a replace-
Positioning System connections leaving behind a trail ment. They often have the same computing power as
where the PDA has been (Potaczala, 2001). a desktop computer and can have just as much storage
Another place evidential data has the possibility of capacity. Due to the compact format of the computer,
being recovered is on the printers now available. Some opening the console physically has the potential to be
have large caches of memory from which documents more destructive than with desktop models, therefore
have the potential of being retrievable. Printers intended special hardware adapters are needed to access the hard
for large network setups occasionally also have hard drive media from a laptop with a desktop computer.
drive type media on board for storage of files queued to As we look at the rate of our communication technol-
print. The printer head, toner cartridge, or ink cartridge ogy, the item probably in circulation the most at present
may also prove useful as physical evidence to show a is the Personal Digital Assistant (PDA) and the cell
printout came from a specific printer. phone. A number of companies make these devices. In
A branch of computer hardware, which grew out of many cases, the operating system on the PDA and cell
the need to share data more quickly and the want for phones varies company to company, and in some cases
centralized servers to store data, is the computer net- model to model. The type of potential evidence on these
work. As these networks grew and interconnected, the devices includes address books, appointment calendars,
Internet evolved (Ranum, 1997). The interconnection of documents, e-mail, phone books, test messages, and
all these computers opened up new routes for people to phone messages. Most of these devices can restrict
attempt to access and destroy the information stored on access with a password. Since much of digital media
them. This created the need to have utilities to monitor stored on PDAs and cell phones is on a memory chip
network traffic and the people to understand what the continually powered by batteries, being able to bypass
utilities are showing them. Additional challenges are password restrictions to the device and on individual
coming on-line as large wireless networks are being files is a challenge in progress (Potaczala, 2001).
brought into service. In some cases, entire college Another challenge currently making itself a sig-
campuses are being outfitted with a wireless network nificant speed bump in computer investigations is the
grid and some metropolitan areas are considering and amounts of data modern media can hold. Only 5 years
quietly testing citywide wireless networking to offer ago, the largest hard drive available was 1 gigabyte.
to their populations. Currently, 100-gigabyte hard drives are available to the
The intersecting scope tree is where computers are public. Reports indicate 400-gigabyte hard drives will
being used so evidence is left behind. These include be available soon (Potaczala, 2001). For removable
auction fraud, child exploitation, computer intrusion, media, floppy disks of 720-kilobytes or 1.4-megabytes
death investigation, domestic violence, counterfeiting, were the bane of computer forensics a few short years
Introduction to Computer Forensics in the Age of Information Warfare
Introduction to Computer Forensics in the Age of Information Warfare
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
IT-Enabled Reengineering: Productivity Impacts
tionship between IT investment and firm productivity including IT and workplace reorganization.
can be measured and analyzed (Anderson, Banker, & In outlining future research directions in this field, I
Ravindran, 2003). Devaraj and Kohli (2000) commented:
Compared to the general effects of IT investments on
productivity, however, much less is known about how the literature in BPR implementation is rife with
value is actually created within the firm. In search for anecdotal evidence and short on rigorous empirical
an answer, Kohli and Devaraj (2003) recommend that evidence of performance impacts of BPR. There is a
academic studies explicitly report which complemen- definite need to better measure BPR implementations
tary changes in business practices have accompanied IT through objective measures, and to relate BPR to or-
investments, including IT-enabled BPR and Enterprise ganizational performance
Resource Planning (ERP). Such analyses are believed to
isolate and identify the effectiveness of complementary All of the studies briefly surveyed in this section
changes leading to IT payoffs. collectively suggest that there are substantial benefits
for firms if they can successfully manage the associated
Payoff from It-enabled business structural transformations during Business Process Re-
Process reengineering engineering implementations. In order to achieve this,
firms can employ several established methodologies,
The literature on the impact of IT-enabled BPR on including but not limited to, change management, risk
productivity is small but growing. Brynjolfsson and management, and knowledge management.
Hitt (2000) argued that a significant component of
the value of an IT investment is its ability to enable
complementary changes in business processes and notable exPerIences WIth
work practices of firms, which may eventually lead to It-enabled reengIneerIng
productivity increases by reducing costs or improving
intangible aspects of existing products, such as timeli- Firms have been implementing numerous IT-enabled
ness, quality, and variety. reengineering projects since the use of mainframes and
Researchers using historical data from banking personal computers became popular in many industries.
industry found that the impact of IT investment on While some of these projects are enterprise-wide (e.g.,
bank performance was realized after a certain time reorganization or focusing on core competencies),
lag, and the level of impact depended on the extent others are more restricted in their scope and directed
to which firms supported their IT investments with toward a specific business function (e.g., accounting
organizational redesign (Murnane, Levy, & Autor, or manufacturing).
1999). Additionally, Devaraj and Kohli (2000) showed Anecdotal business experience shows that the ben-
that IT investment contributes to higher revenue after efits of investments in IT may be more than outweighed
certain time lags, and the effect is more pronounced by negative interactions with existing organizational
when combined with Business Process Reengineering practices. Moreover, investments in IT and reengineer-
initiatives. Bresnahan, Brynjolfsson, and Hitt (2002) ing cannot succeed in isolation. As a result, the main
studied the effect of three related innovations (informa- driver of the most of IT-enabled BPR projects during
tion technology, workplace reorganization, and new the 1990s was the belief that firms needed to adopt
products and services) on demand for skilled labor. IT in their business units as part of an organizational
They found firm-level evidence that the demand for change. Therefore, earlier applications of IT-enabled
skilled labor is positively correlated with all the three BPR were directed toward significant process changes
innovations. Bertschek and Kaiser (2004) analyzed accompanied by a reduction of personnel costs in labor-
a cross-sectional data set to investigate the possible intensive operations of firms including accounting, pur-
relationship between investment in IT, non-IT invest- chasing, and payroll. Such organizational changes cost
ment, labor productivity, and workplace reorganization. firms nearly $1.6 trillion in IT-related intangible assets
They found that workplace reorganization induces during the 1990s as opposed to a total of $167 billion
an increase in labor productivity that is attributable spending in IT equipment (Brynjolfsson & Yang, 1997).
to complementarities between various input factors, Since then, the use of IT as a supporting tool for BPR
IT-Enabled Reengineering: Productivity Impacts
projects has affected all functions of firms, gradually those related with the non-core operations of firms. In
displacing traditional labor and capital inputs because this regard, countries including Canada, India, Ireland,
of the superior price and performance improvements and Israel may emerge as the new outsourcing service
in IT equipment relative to these inputs. providers for IT-enabled BPR projects, and contribute
Most firms have indeed realized benefits from IT- to overall productivity increases in the world.
enabled BPR projects, ranging from tangible financial
benefits to intangible customer satisfaction and growth
sustenance. The CIGNA Corporation, for example, reFerences
has successfully completed a number of IT-enabled
BPR projects and realized savings of $100 million by Anderson, M. C., Banker, R. D., & Ravindran, S. (2003).
improving customer service and quality while reducing The new productivity paradox. Communications of the
operating expenses (Caron, Jarvenpaa, & Stoddard, ACM, 46(3), 91-94.
1994). Similarly, a famous reengineering of the ac-
counts payable process at the Ford Motor Company Barua, A., Kriebel, C., & Mukhopadhyay, T. (1995).
has increased the speed and accuracy of payments, and Information technologies and business value: An ana-
certainly improved company relations with its long-term lytic and empirical investigation. Information Systems
suppliers (Hammer & Champy, 1993). Research, 6(1), 3-23.
Nevertheless, not all of the BPR projects are reported Barua, A., Lee, B., & Winston, A. (1996). The calculus
to finish successfully. Given the scale of BPR projects, of reengineering. Information Systems Research, 7(4),
the major organizational changes they entail, and the 409-428.
potential of internal instability, it is fairly reasonable
to expect failures in BPR projects. Anecdotal evidence Bashein, B., Markus, L., & Riley, P. (1994). Precondi-
suggests that the payoff from reengineering efforts and tions for BPR success. Information Systems Manage-
IT investments in the United States is mixed at best ment, 11(2), 27-38.
(Barua, Lee, & Winston, 1996). Bashein, Markus, Bertschek, I. & Kaiser, U. (2004). Productivity effects
and Riley (1994) estimated a failure rate of up to 70 of organizational change: Microeconometric evidence.
percent. Based on interviews with 350 executives from Management Science, 50(3), 394-404.
14 industries, a survey study conducted by the Arthur
D. Little consulting company found that 85% of the Bharadwaj, A. S., Bharadwaj, S. G., & Konsynski,
executives surveyed were dissatisfied to some extent B. R. (1999). Information technology effects on firm
with their reengineering activities (Rock & Yu, 1994). performance as measured by Tobins q. Management
Reengineering experts argue that such poor outcomes Science, 45(6), 1008-1024.
are due to (1) expecting too much too soon, (2) a lack Bresnahan, T. F., Brynjolfsson, E., & Hitt, L. M. (2002).
of partnership between IT and business, (3) undertaking Information technology, workplace reorganization, and
projects without a complete understanding of costs and the demand for skilled labor: Firm-level evidence. The
benefits, and (4) not exactly knowing how to redesign Quarterly Journal of Economics, 117(1), 339-376.
a set of related business processes.
Brynjolfsson, E. & Hitt, L. M. (1996). Paradox lost?
Firm-level evidence on the returns to information
Future trends systems spending. Management Science, 42(4), 541-
558.
Proliferation of the Internet and diffusion of IT promises Brynjolfsson, E. & Hitt, L. M. (2000). Beyond com-
a bright future for IT-enabled BPR initiatives. Continu- putation: Information technology, organizational
ous advances made in these technologies may not only transformation and business performance. Journal of
decrease the cost of executing IT-enabled BPR projects, Economic Perspectives, 14(4), 23-48.
but also increase their success rates. Furthermore,
as firms become more digitized and fully connected Brynjolfsson, E., Malone, T. W., Gurbaxani, V., &
with the rest of the world, outsourcing may ease the Kambil, A. (1994). Does information technology
execution of most IT-enabled BPR projects, especially lead to smaller firms? Management Science, 40(12),
1628-1644.
00
IT-Enabled Reengineering: Productivity Impacts
Rock, D. & Yu, D. (1994). Improving business process Outsourcing: In its most succinct form, outsourcing
reengineering. AI Expert, 26(10), 27-34. is defined as the process of hiring another person or
organization to perform a service. In the Information
Systems field, it refers to the practice of contracting
computer center operations, telecommunications
0
IT-Enabled Reengineering: Productivity Impacts
networks, or software applications development to input level (e.g., reflecting the use of resources in the
external vendors. Goals of outsourcing are to decrease production of goods and services that add the most
costs and free up management time by focusing on value).
core competencies.
Risk Management: Refers to a continuous process
Productivity: A measure of a firms efficiency in of identifying, assessing, and reducing a risk factor
converting inputs into outputs. Essentially, it refers to to an acceptable level, and implementing the right
the rate at which outputs are produced per unit of input mechanisms to maintain that level of risk. Established
(labor and capital). Productivity can be considered as risk management strategies include avoiding the risk,
either minimizing the use of inputs for a given output reducing the negative effect of the risk, accepting some
level (e.g., reflecting efficient production processes or all of the consequences of the risk, or transferring
that minimize waste) or maximizing output for a given the risk to another party through insurance.
0
Section: Process ICT 0
Mauri Kantola
Turku University of Applied Sciences, Finland
Jouni Hautala
Turku University of Applied Sciences, Finland
IntroductIon bacKground
There are great challenges of the management in creative dynamic Information and operational
knowledge work, where individuals and information environments
systems have a considerable role when the organisa-
tion is striving to achieve its strategic objectives. It is The approach of IEs is used in this article as a back-
shown in this article that analysing the information ground to describe the different kinds of information
and operational environments helps management in systems in various operational environments. The ap-
knowledge management and activates the organisations proach of IEs was developed by Sthle and has been
awareness about the development needs of informa- applied in several studies (Sthle & Grnroos, 2000,
tion systems. Sthle & Hong, 2002; Sthle, Sthle, & Pyhnen,
The purpose of this article is to analyse the interac- 2003). An organisation is described in these studies
tion between the dynamic information environment as a knowledge creating system, where management
(IE) and the operational environment to promote the and information systems influence the activities of
cooperation of the higher education institution with individuals in various IEs. The classification includes
business life and enhance the external impact of the mechanical, organic, and dynamic IEs.
institution on its environment. The dynamic IEs are Mechanical IEs increase the efficiency of internal
analysed to manage the information systems and in- processes and include thoroughly controlled informa-
ternal processes in an educational institution and their tion systems such as accounting and logistics systems,
cooperating partners. which are tied to the processes and structures of an
This article is organised as follows: The article organisation. The nature of information is mainly of
introduces the approach of IEs and operational envi- the input-output type, where the functions of the in-
ronments. Then the concept of a dynamic IE is used formation systems are to automate, steer, and report.
to analyse the information systems used in the core Typically, time-consuming routine tasks are performed
internal processes of the higher education institution. cost-efficiently using mechanical IEs.
The study also describes the partnership in a dynamic Organic IEs emphasise dialogue, communication,
IE. Thereafter, a short case study is presented about and sharing of experience-based tacit knowledge (Kim,
partnership using the electronic Optima platform at Chaudhury, & Rao, 2002; Nonaka & Takeuchi, 1995;
the Turku University of Applied Sciences (TUAS). Takeuchi & Nonaka, 2004). Organic IEs include, for
Finally, the results of the study are summarised in the example, feedback systems, management informa-
concluding section. tion systems, and library systems. The management
information system is a tool which emphasises the
communication and implementation of strategic plans.
Two-way and open dialogue within the organisation is
important. The system can be planned and constructed
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Knowledge Management with Partners in a Dynamic Information Environment
to facilitate strategic management and the balanced reinforce the intellectual capital and the ability for in-
scorecard approach (Kettunen & Kantola, 2005; Ket- novations (Sthle & Grnroos, 2000).
tunen, 2005, 2006). The operational environment of an organisation
Dynamic IEs aim to continuously produce innova- consists of the organisation and its stakeholders, cus-
tions by self-organisation. An essential feature is that tomers and partners, local community, and society.
power and authority are not used but the process is led Each organisation has to adapt its internal processes,
by the actor best suited for the task. The information resources, and capabilities to the changing environment
in the dynamic IEs is obtained from the weak signals in the strategic plan. Higher education institutions have
of networks. The dynamic IE typically reaches outside to adapt their activities to the education policy, the lo-
of the organisational limits and provides two-way ac- cal demand for labour, and the needs of stakeholders.
cess to the common information. The continuous and The different operational environments can be seen
fast current of information reinforces the individuals as interconnected surroundings within each other.
for innovations. The surrounding operational environments may have
The main idea of dynamic IEs and interaction with diverse connections with the information systems of
the operative environments is the strategic awareness the institution.
of opportunities for virtual learning, interaction, com- Castells (2001) introduces a concept of ad hoc
munication, and diversity. In the learning process, open network, which typically appears in e-business and
and grey areas can be found: virtual learning systems network enterprises. The concept of ad hoc network
and networking, net casting and different portals con- is also used to describe a group formed to deal with
nected with more risky, chaotic and innovative environ- specific issues and disbanded after the issue has been
ments (Sauer, Bialek, Efimova, Schwartlander, Pless, resolved. These temporary groups provide solutions
& Neuhaus, 2005), and online networking platforms to problems that are not resolved by ordinary proc-
(Steinberg, 2006). The management and regional de- esses of the organisation. Castells defines the concept
velopment process rely more on the open systems of of a network enterprise, which is designed around a
the local, regional, and global partners of the TUAS. specific business project in the network. The business
Knowledge is accumulated through learning proc- of the network enterprise is performed using ad hoc
esses, which require both cultural and technological networks, which have the flexibility and adaptability
skills. Gathering explicit knowledge is relatively un- required by continuous technological innovation and
problematic because this type of data is codified and rapidly changing demand. A network enterprise open to
can be retrieved from mechanical and organic IEs. suppliers and customers enables the enterprise to obtain
However, a great deal of knowledge is not codified and information from specialists widely across the supplier
resides in the abilities and experiences of people. This organisation and customers to specify their needs. In
knowledge can be gathered together in dynamic IEs. this course of action, the exchange of information and
This knowledge may be of strategic importance but is the actors are tied together to an ad hoc social network,
difficult to acquire since it is not formalised and often where the continuous flow of communication between
concerns diffuse and context-sensitive matters. The way individuals creates a structure where information and
organisations enable access to uncodified knowledge is knowledge circulates.
to invest in dynamic IEs, which support communication The work groups and informal communities of
between individuals and interest groups. practice have an essential role in the exchange of
Figure 1 combines dynamic IEs and operational information and knowledge. Access to nonredundant
environments. The dynamic IE is the source where sources of information is therefore important (Hakka-
new innovations emerge by self-organisation. The in- rainen, Palonen, Paavola, & Lehtinen, 2004). The
formation is constructed by the weak signals and tacit structure of knowledge in organisational settings is
knowledge of virtual networks. Intellectual capital is often nested so that information circulates within work
one of the main factors of organisational development groups and informal communities rather than between
and innovations. The essential issues include the speed them (Palonen, 2006).
of information flow, the ways of information change,
and the utilization and quality of information. The
continuous movement and fast current of information
0
Knowledge Management with Partners in a Dynamic Information Environment
Wireless Local
regional community
network
Intranet Customers
and partners
Teachers,
Virtual networks researchers Ad hoc networks
and students
0
Knowledge Management with Partners in a Dynamic Information Environment
Table 1. Information systems in the dynamic IE supporting the core processes of the TUAS
Core processes
Information systems in the dynamic IE
Intranet
IT Help Desk
Management
Open systems of higher education partners
Local WLAN Net (SparkNet)
as the project management software Projektori, which among others, a business directory of over 13,000 local
is also a useful tool in publicly funded projects. companies, the location memo to companies consid-
The Optima platform supports cooperation with the ering relocating their operations, and the database of
operational environment. The number of daily users in vacant real estate in the region. The search engine of
Optima is reported to vary between 2,000 and 15,000 the TAD Centre helps customers find the companies
persons, and the partners cooperating via Optima is and real estate by name, product, or service.
estimated at about 550 organisations. Most of the The TAD Centre was established to foster continu-
interactions are connected to e-learning, but also many ous economic growth and employment in the region.
research and development projects are also online. The centre carries out strategic development projects,
Thus, the TUAS develops and provides learning and coordinates regional business policies, and creates
working environments which enable experiments and prerequisites for wide-ranging enterprise activities.
the study of new activities and procedures together It combines human resources and funding by the
with the companies and other working life organisa- municipalities committed to developing trade and
tions. The objective is to achieve customer satisfaction industry. The economic transformation of the region
with e-networking and to create long-lasting customer is supported in cooperation with companies, research
relationships which enable lifelong learning and con- units, educational institutions, and the local authorities.
tinuous cooperation between the educational institution The need to develop electronic services is obvious for
and customer organisations. the TAD Centre to achieve its objectives. The TAD
Centre is currently considering different types of col-
optima Partnership between the tuas laboration partnerships with various actors, including
and the tad centre the TUAS.
Collaboration between the TUAS and the TAD
The case study of the partnership between the TUAS and Centre is natural because they are both owned and
the regional Turku Area Development (TAD) Centre is maintained by the City of Turku. The strategic objectives
presented in this section. The objective of the centre is the TUAS and the TAD Centre are aligned to run paral-
to create an environment that promotes entrepreneurial lel. The cooperation includes, among others, regional
activities in the Turku Region by providing services development and the creation of partnerships in order
for companies and entrepreneurs. The services include, to strengthen regional networks and clusters in both
0
Knowledge Management with Partners in a Dynamic Information Environment
the public and private sectors. From this background, communication tools and skills are needed in the post-
the jointly developed information system could also industrial information society and organisations. There K
generate synergies to the other operational areas. is an urgent need to develop the skills of organisations
The TUAS is one of the regular partners of the to catch the uncodified information and tacit knowledge
TAD Centre. From the point of view of the TUAS, obtained from the partners. The ICT cluster is one of
the purpose is to develop partnerships, the extranet of the most prominent clusters where economic growth
the institution, and customer relationship management and employment are expected to emerge. The strategy
(CRM). Although the Optima platform is not a special- of the TUAS focuses on the development of the ICT
ized CRM system, some of the operational advantages cluster in Southwest Finland.
of CRM can be achieved using it. The TUAS suggested The logic of management and information flows
the TAD Centre should use the Optima platform for follows the processes and structures of the organisation
different purposes. The basic user activities of Optima in the mechanical and organic IEs, but in dynamic IEs
are easy because Optima has a folder structure and is the signals for the innovations can be obtained from ad
already linked to some other information systems of the hoc networks and virtual networks including modern
TUAS using the lightweight directory access protocol wireless equipment. Organisations can achieve competi-
(LDAP) of the institution. tive advantage if they operate successfully in dynamic
The information systems of the TAD Centre include networked environments. Interaction, networking, and
the Web site (http://intratad.turku.fi), databases in Lotus opening activities to existing and potential partners are
Notes, and networking on the Intranet of the City of the main elements of the success and innovations.
Turku. The future role of Lotus Notes was unclear.
The consulting of the TUAS detected a need for an
outsourced application service provision (ASP) concept, conclusIon
which provides cost-effective and worry-free solutions
and services. The TAD Centre appreciates innovative The article provides a useful tool for the development of
and versatile learning and networking solutions but information systems in networked environments. The IE
wants to avoid the time-consuming work of acquiring approach was introduced and described. The approach
and maintaining its own virtual environment. Thus, the was further developed to describe the dynamic opera-
specification of the software should include at least rapid tional environments of a higher education institution
implementation, ease of use, reliable and fast operation, and its partners. A case study was presented of how to
high data security, and cost-effectiveness. apply the theoretical concepts of IEs to practice at the
The first cooperation agreement included the open- TUAS. Outreach and engagement in business life are
ing of a subenvironment in the TUAS Optima virtual of increasing importance in educational institutions.
environment and personnel support and education by The IE approach helps management find how the
the e-learning unit of the TUAS. The experiences were information systems are connected to the core processes
analysed and reported to the partners of the development of the institution. The approach also helps management
project after the pilot period ending in autumn 2006. The get the big picture of how the information systems settle
project plan for the subsequent effort includes four to in different IEs. The analysis enables the consideration
six pilot work area applications in the subenvironment of the balance and functioning of IEs in different op-
of the TUAS. Then, the TAD Centre will consider a erating environments. On the other hand, the analysis
possible agreement with Discendum Ltd. to establish helps management detect the possible deficiencies of
a permanent Optima virtual environment. the information systems and make investments in new
systems to support the effective functioning of the core
processes.
Future trends
0
Knowledge Management with Partners in a Dynamic Information Environment
0
Knowledge Management with Partners in a Dynamic Information Environment
0
0 Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
From Knowledge to Personal Knowledge Management
From Knowledge to Personal Knowledge Management
last several hundred years. [] Personal Knowledge on component. (Avery, Brooks, Brown, Dorsey, &
Management (PKM) attempts to utilize the computer to OConner, 2000)
help the individual manage the information explosion
in a meaningful way (Frand & Hixon, 1999, p. 1). PKM, as defined at Millikin, consists of seven
information skills:
The objective of the PKM program was to teach
students some basic KM principles and their applica- 1. Retrieving information
tion, using computer-based tools, so that students would 2. Evaluating information
acquire a mindset and a methodology enabling them to 3. Organizing information
process information and transform it into knowledge. 4. Collaborating around information
In turn, the academic staff had to learn and adjust to 5. Analyzing information
the profile of the new Information Age generation of 6. Presenting information
students (see The Information Age Mindset Frand, 7. Securing information
2000). Their view of knowledge in the academic con-
text is clear-cut: These skills are thought capable of obtaining for the
individual a strategic balancing of performances, in the
Knowledge is a product, its something you can go public or private sphere of life and in intrapersonal or
to school and acquire Also: Begin with data. Add interpersonal relations.
context to get information. Add understanding to get When we look at how these skills were defined
knowledge. Add judgment (values) to get wisdom. (Dorsey, 2001; Millikin, 2003), we find that the effect
(Frand & Hixon, 1999, pp. 4-5) of time is very noticeable, even though the research was
done just a few years ago. Todays view on the same
At UCLA, the training for PKM concentrated set of skills would have to introduce several changes
around five tasks: and amplifications. For instance, with reference to (1),
sharper skills are required today to exploit the new
1. Searching/finding generation of the so-called super-search engines
2. Categorizing/classifying (e.g., multimedia-, citation-, scholarly engines). With
3. Naming things/making distinctions these tools, mastering the calibration, the adjustment of
4. Evaluating/assessing settings and the interpretation of results is a new type
5. Integrating/relating of effort. Managing the new media is also a challenge.
Much information is coming via streaming media, so
The Anderson Schools conceptual framework, with listening now takes an increment of difficulty (lis-
its very realistic setup, has been, and still is, a funda- tening to a Webcast is more demanding than listening
mental reference for all PKM developments. Not many to face-to-face speech). With reference to (2), there is
specific tools were available at the time, but Frand and an important change from the past: much information
Hixon had the correct intuition that a large technological today is no longer qualified and ranked by authorities
development would soon follow, as it did. but rather by crowds, that is, by the user themselves.
Many items of information are found today already
the Millikin universitys approach ranked (with kudos, tags, etc.). From blog posts, to
Web pages, to pictures, most material produced by the
The developments at Millikin University are due to frenzy of folksonomies carries a grade. The tagging
Professor Paul A. Dorsey, Associate Professor of Man- revolution, or folksonomy, requires, when assessing
agement Information Science, and his team. According a piece of information, a complete new understanding
to Dorsey and colleagues: and approach by the user, which is involved in paral-
lel processes of fruition and creation. With reference
Personal knowledge management is best viewed as to (5), we are now beginning to see some innovative
based on a set of problem solving skills that have both software tools, unheard just a few years ago, for the
a logical or conceptual as well as physical or hands- task of analyzing information and extracting meaning
from data: summarizers, keyword extractors, and
From Knowledge to Personal Knowledge Management
relevance engines. However, learning to use these in real time (as in an online classroom, seminar,
tools is becoming a specialists activity and, in all business meeting, project, etc.); ability to ex- K
cases, the human element remains the fundamental ploit the new features of technology-supported
decision engine. human exchanges (information visualization,
post-processing of recordings, digital annotations,
automatic abstracting, etc.)
develoPIng PKM sKIlls Ability to communicate in several languages (very
valuable knowledge exchanges can be achieved
The pioneers of PKM proved that developing skills when speaking the native language of our cor-
to create and maintain personal knowledge is not respondents).
a casual activity. Skills can be taught in an academic
environment, they can be instigated and facilitated Yet more skills can be envisaged, which we could
in an enterprise environment but, in all cases, an act call future skills, because their need will be greater
of self-responsibility on the part of the individual is in the future generations, when wireless and ubiquitous
fundamental and necessary. communications will be fully pervasive and comput-
PKM requires a conscientious and continuous invest- ing fully ubiquitous. A case in point is the advent of
ment of time and resources. It is a matter of craftsman- location-awareness and presence management tools.
ship: the knowledge worker should take continuously In a world that is always on the move, mobile data
care of his tools and pay attention about what is new in services influence the ways we use context and media
his trade, as it would be for any other kind of worker, to refine our knowledge processes: Presence manage-
such as an artisan or a mechanic. ment will change the way we use all person-to-person
The seven skills of the Millikin project are a good communication media and will affect almost every
reference model, which, however, can be updated network service (Smith Grubb, 2004).
and further developed. The Millikin approach, as KM
scholar Steve Barth remarks, has a shortcoming: it only
deals with information. Barth suggests adding in each PKM tools
entry of that list the word ideas to information, for
example, Presenting information and ideas (Barth, PKM does not exist without tools: technological sup-
2003). The effect is that the skilling process will ad- port is necessary to enact this discipline. PKM tools
dress not only information but also products of the are abundant and varied, but appear still immature
mind, that is, knowledge. when we try to identify toolkits. This is typical of
To update the model in question for current times, it a young market, but there is a very noticeable trend
is necessary to envisage additional skill requirements, to offer more refined, more comprehensive and also
taking into account a social dimension that was indeed opensource products.
noted at that time (row 4 in the Millikin list earlier), The list we present (Table 1) shows elements of
but that presently is much more visible. Here are some what is almost a new technique, a new way to use the
socially oriented PKM skills that are destined to be computer. Some of the categories will appear familiar
more and more required over time: but the difference lays in the tools design, which is
meant to appeal to the IKW (Individual Knowledge
Ability to meaningfully master an IM exchange: Worker), rather than to the Manager of the ICT Pur-
for example, conciseness, understanding the con- chasing Department of a business enterprise.
cept of turn, focus, no rambling, and so forth; New PKM tools are continuously proposed under
Managing contacts: keeping an accurate profile the push of the Web 2.0 technologies. A for beginners
of ones correspondents, including what informa- list can be found at the University of Victoria Faculty
tion tools they use, what digital equipment they of Law (UVIC, 2006) while the use of PKM tools
adopt, on which channel they can be reached, and inside an enterprise is well discussed by in an IT Pro
so forth; Magazine issue (Clemente & Pollara, 2005).
Ability to adequately perform when immersed
in virtual environments and acting and reacting
From Knowledge to Personal Knowledge Management
Category Function
News aggregators, feeds, blogging engines, It is the repertoire of tools of any blogger or personal
metadata creation tools publisher.
Multimedia management tools, authoring Video and voice recording and editing, speech-to-text and text-
tools to-speech translation, speech annotation, and so forth.
Not only browsing, but also added values like: tracking the
Advanced browsers users navigation, providing chronologies, caching effects, filters,
keywords discovery, security features, and so forth.
Many new products are appearing, merging several functions
(e.g., searching, information capture, annotation, etc.). The
Mind mappers, concept mappers
distinctive feature of these tools is information visualization,
an advantage for understanding complexity.
The Skype paradigm is the reference, often augmented by
IM facilities, voice and video conferencing
features aiming at better usability.
Very flexible, swiss-knife kind of tools, providing support for
Web assistants
any kind of manipulation of Web-resident information.
Emerging, still quite rare, tools of advanced design acting on
large-scale information depots, either personal or corporate.
Knowledge discovery
The objective is attempting to find patterns, relevant concepts,
relations, keywords, taxonomies, and so forth.
Provision of time and task management, notebooks, scrapbooks,
Personal schedulers, also called GTD (get
contact lists. More sophisticated features are meetings planning
things done) tools.
and scheduling, presence and location management.
Tools allowing multi-user collaborative activities of many
kinds: distributed project management, distributed workflow,
wiki-like cooperative document creation, whiteboards, gaming,
Collaboration software, shared workspaces near-immersive spaces, and so forth. This is the area of foremost
research and development, but also the most challenging in design:
tools must be capable to manage simultaneously local, individual
resources and team resources in distributed locations.
From Knowledge to Personal Knowledge Management
tions current and cultivate personal culture and Clemente, B. E. & Pollara, V. J. (2005). Mapping the
interests. course, Marking the trail. IT Professional, 7(6), 10-15. K
Retrieved March 13, 2008, from http://doi.ieeecomput-
The word personal in PKM should not be read as ersociety.org/10.1109/MITP.2005.149
selfish: knowledge needs the institution of the com-
Community Intelligence Labs (2000). What is a
munity and the dimension of networking to exist and
knowledge ecosystem. Retrieved March 13, 2008, from
grow. However, it necessary for anyone, from young
http://www.co-i-l.com/coil/knowledge-garden/kd/kes.
student to adult professional, to learn to manage ones
shtml
personal knowledge first, before claiming that it can
be shared with others. Dorsey, P. A. (2001). Personal knowledge manage-
The view of knowledges role in society and ment: Educational framework for global business.
economy and the methodologies about managing Retrieved June 30, 2006, from http://www.millikin.
knowledge that were current in the past century, do edu/pkm/pkm_istanbul.html
not appear adequate to interpret todays times. KM
expert Denham Grey (2005) points out that PKM Drucker, P. (2000). Managing knowledge means man-
should concentrate on social skills and networking aging oneself. Leader to Leader, 16, Spring 2000. Re-
of minds, rather than on technology aimed at managing trieved March 13, 2008, from http://www.leadertoleader.
individual property. org/knowledgecenter/journal.aspx?ArticleID=26
There is an important difference with the past caused EI.pub. (2002). Digital content RTD perspectives
by the availability of extremely powerful and flexible - Knowledge management - El.pub Analytic No. 9.
communication means and the disseminating power Retrieved March 13, 2008, from http://www.elpub.
of the new Web, the so-called Web 2.0. People now org/analytic09e.htm
live, learn, and work in a space dense with messages
and connections (Siemens, 2006). Knowledge can no Frand, J. (2000). The information age mindset. Changes
longer be tied to artifacts or repositories, but it becomes in students and implication in higher education. Edu-
a flow. Creating a Personal Knowledge Environ- cause Review, Sept.-Oct. 2000. Retrieved March 13,
ment around oneself, therefore, shall mean to master 2008, from http://www.educause.edu/er/erm00/ar-
knowledge as a flow, that is, the dynamics of rich but ticles005/erm0051.pdf
continuously changing content and the multiplicity of
Frand, J. & Hixon, C. (1999). Personal knowledge
engaging but transient relations with ones peers.
management : Who, what, why, when, where, how?
Retrieved March 13, 2008, from http://www.anderson.
ucla.edu/faculty/jason.frand/researcher/speeches/
reFerences PKM.htm
Avery, S., Brooks, A., Brown, J., Dorsey P., & Grey, D. (2005). PKM. Retrieved March 13, 2008, from
OConner, M. (2000). Personal knowledge manage- http://kmwiki.wikispaces.com/PKM
ment: Framework for integration and partnerships.
Millikin University (2003). Personal knowledge man-
Retrieved March 13, 2008, from http://www.millikin.
agement at Millikin University. Retrieved March 13,
edu/pkm/pkm_ascue.html
2008, from http://www.millikin.edu/pkm/
Barth, S. (2000). The power of one. Retrieved
Siemens, G. (2006). Knowing knowledge. Retrieved
March 13, 2008, from http://www.quantum3.co.za/
March 13, 2008, from http://knowingknowledge.
KMM%20Article%20Dec2000.htm
com
Barth, S. (2003). Personal toolkit: A framework for
Smith, S., Grubb, J. (2004). Location and presence in
personal knowledge management tools. Retrieved
mobile data services. Retrieved March 13, 2008, from
March 13, 2008, from http://www.kmworld.com/Au-
http://www.boxesandarrows.com/view/location_and_
thors/AuthorDetails.aspx?AuthorID=508
presence_in_mobile_data_services#comments
From Knowledge to Personal Knowledge Management
UVIC (2006). Personal knowledge management tools, concept much more widely known. Metadata are vital
prepared by Rich McCue. Retrieved March 13, 2008, to retrieve data from repositories, namely the Web
from http://www.law.uvic.ca/rmccue/documents/km_ and are necessary to associate meaning (i.e., knowl-
collab_software.pdf edge) to information. There are, unfortunately, many
standards pretending to regulate metadata creation
W3C HCLS-SIG (2006). Knowledge ecosystem task for digital content. One of a few to have some status
force proposal. Retrieved March 13, 2008, from http:// is IEEE LOM (learning object metadata) (http://ltsc.
lists.w3.org/Archives/Public/public-semweb-lifesci/ ieee.org/wg12/).
2006Feb/att-0128/Knowledge_Ecosystem.htm
Mobile Services: An expression to indicate generi-
Wiig, K. (2004). People-focused knowledge manage- cally all communication service that use radio waves,
ment: How effective decision making leads to corporate but currently more directly referring to wireless voice
success. Oxford: Elsevier Butterworth-Heinemann. and video telephony, and wireless computer com-
munications. Advanced mobile data services provide
Wilson, T. D. (2002). The nonsense of knowledge
information and service based on the user geographical
management. Information Research, 8(1). Retrieved
location obtained though the GPS (global positioning
March 13, 2008, from http://informationr.net/ir/8-
system).
1/paper144.html
News Aggregators, Feeds: The most used term for
these items is actually RSS (or RSS feed), an acronym
Key terMs whose interpretation is uncertain, the most popular one
being really simple syndication. A news aggrega-
Folksonomy: Folksonomy is a neologism, a word tor is a software application that collects syndicated
constructed by mimicing another word: taxonomy. content from disparate sources and provides a single
A taxonomy is a hierarchical data structure whose consolidated view. As a tool it is used in blogs and
purpose is to classify elements of a given domain: works like a reader, therefore it can also be referred to
nature, science, knowledge, and so forth. Folksonomy as a feed reader.
indicates a trend of recent times, becoming almost a
philosophy, that contrasts formal classification methods, Presence Management (PM): With people always
because the definition and organization of the elements on the move and hooked to anyone of the many com-
is based on the judgment and the concourse of generic munication devices available in our times, reaching
people (folk), usually gathered in communities, and ones correspondent has become a vital necessity. PM
not of authorities. tools give users control over how they appear on a
communication link, for example on the online con-
IM (Instant Messaging): Instant messaging is nection over the Internet. The most advanced tools are
real-time communication between remote correspon- integrated with IM, attempt to cover all channels (e.g.,
dents over a network, typically the Internet. IM (text) including voice) and provide status messages that at
services and tools are extremely popular and avail- each instant inform the external environment about the
able on all kinds of computing devices. Modern IM state of presence of the user.
software solutions offer many more features than just
message transfer, such as presence management, cor- Relevance Engines: Relevance engines are ad-
respondent management, conversation logs, file transfer vanced search engines emerging from recent devel-
and support of video and (asynchronous) voice mail. opments in the field, aimed at improving the mean-
Synchronous voice messaging is known as chat and ingfulness of search results. Looking for a piece of
is also very popular. information is not a standard process. Selecting and
interpreting the result of a search are activities whose
Metadata: Metadata are data about data. A simple outcome is deeply dependent on the mindset of the
example is the label on a box, which tells about the searcher and on the context of the operation. However,
content. Metadata used to belong just to the cultural even the best search engines, for any given search,
domain of librarians but, since the Web, search engines always give the very same result to different persons
and the open knowledge movement, it has become a and in different situations. Instead, relevance engines,
From Knowledge to Personal Knowledge Management
Section: Context ICT
Ict and the learnIng socIety and changing situations, what is needed is a formative
planning which aims at fostering knowledge and general
Confronting with the educational emergences defined culture on one side, that is, spread in a capillary way
in the white paper presented in 1995 by the European the ability to catch the meaning of things, understand,
commission with the title Teaching and Learning. be able to act, choose, create, adapt to the present com-
Towards a Society of Knowledgethe Commission plex social condition; on the other side at developing
identifies three main factors of upheaval: information an aptitude at occupation, that is to say encouraging
society, internationalization and the world market, through an access to lifelong learning, e-learning
scientific and technological knowledge. These factors and promoting ICTthe social mobility of citizens
involve a modification of the systems of knowledge (workers, students, adults, young people).
and work, and, as a consequence, also of educational At a careful analysis it is clear that the current
politics which must promote a personal development society of knowledge is tied to a culture that regards
of citizens through the development of the necessary education only as a function of market needs, thus
competences in dealing with these factors. penalizing a knowledge considered unnecessary and
The consequences that emerge are the reported in favouring a reproductive idea of competence against a
the next section. First of all, the society of knowledge critical, constructive and transformative competence.
is linked with a condition of uncertainty and risk of It is therefore arguable that the most important part of
social exclusion, which determines a great disorienta- what we define understanding is actually linked with
tion for the individual. The individua is exposed to the activation and structuring of feeling. The dimension
infinite cognitive potentialities on one side, but also to of feeling helps everybody to become him/herself,
a cognitive weakening on the other side. Among these to grow up, or, vice versa, leads to a missed existence
risks, the first is a disorganized and confused fruition when this only chance fails (De Monticelli, 2003).
of the knowledge resources offered by the symbolic The European Commission, finally, suggests five
world in which the individual is plunged in. He/she is general objectives in order to create a learning soci-
irreparably depressed when plunged in an infinite net ety: encourage the acquisition of new knowledge, that
of knowledge which the individual can not reach in a is, raise the general level of knowledge, implementing
critical way, being also bombarded by pervasiveusu- new systems that recognize technical and professional
ally persuasiveinformation of mass-media pushing competences beyond what is stated in diplomas; bring
him/her toward homologation. school and the business sector closer together, that is,
Another risk is linked with the traditional school develop a professional training system that keeps up
curriculum: the individual stores up a static series of set with new conditions in production and with the needs
portions of knowledge, transmitted usually by outdated of the world of work, also with the promotion of ap-
strategies, but the individual is not stimulated to learn prenticeship/trainee schemes at European level; combat
to learn, which is what is needed to be able to face and exclusion, that is, offer a second opportunity to all the
actively take part in the post-modern society. categories of population left by the wayside (young
The indications provided by the white paper are people with no qualification, older workers, long-term
clear: in order to be able to confront with a quantitative unemployed, women) to improve their social status.
increase of information and forms of knowledge, as This can be achieved through an adequate training
well as an increase of complex, fluid (Bauman, 2000) offer, complementary funding, consultation and part-
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Learning Processes and ITC
nership with firmsfor example a firm could support Ict and learnIng Processes
a school offering working opportunities to the people L
who successfully complete the vocational course; de- The attention given by the constructivist approachby
velop proficiency in three European languages, treat the culturalism approach (Bruner) as well as neo-
capital investment and investment an training on an piagetian and neo-vygotskian studiesto the intrinsic
equal basis, that is, encouraging by positive measures constructivity of thought and its rooting in the inter-
firms and public authorities which pay education par- actions of the individual with the world in which the
ticular attention. individual realizes the experiences, become real in the
However it would be the case to face the problemati- enhancement of the individual dimension in the learn-
zation with a thorough consideration on training politics, ing/teaching processes on one side; and it is based on
as the knowledge of the contemporary age requires the the enhancement of its social dimension on the other
rethinking of the entire scholastic knowledge. side. Starting from these preliminary remarks it is pos-
This is in line with a complex cognitive system sible to sketch an effective educational and training
directed towards the flexibility of knowledge, the fad- frame for the learning society, since the association
ing of disciplinary boundaries and the extending of of the individual dimension of every single students
interconnections among cognitive worlds (although building processes of his/her cognitive identity to the
formative institutions are still anchored to abstract forms inter-subjective and cultural dimension allows the
of knowledge and to reproductive teaching/learning establishment and maintenance of a link between the
strategies, which are not easily capable of managing self-constructed autonomydefining the meaning on
the complex evolution of the cognitive knowledge). the free explanation of the training path of every indi-
Difficulties of the educational system in confronting vidualand the coconstructed dependencedefining,
with the new requirements in competences arising on the other side, the indissoluble/relentless rooting
from the society of learning highlight how urgent in a net of relations inside a community: in a system
it is to rethink a possible new conjugation between of shared responsibilities and mutual commitments
symbolic-reconstructive teaching/learning forms and (Rivoltella, 2003; Wenger, 1988; Varisco, 2002).
experiential teaching/learning forms using ICT. The culturalist approach, as well as a culture of
The education of the mind is not a problem of pure educationlinked with the achievement of mass
application, but it is both a research and education education, didactic planning, and life-long learning of-
program and a program concerning the living model fersbased on knowledge and competences confirmed
of organization of the production processes and per- the emancipating function of education (knowledge and
sonalization of knowledge and experiences, which we competence are considered as the basic propelling ele-
generally call learning. ment for individual and social progress) without omit-
Living in the global village, that is to say in an ting the contradictions and unsolved problems (referring
enormous and pervasive hypertext, even in their con- to the Italian context) such as the high percentages of
tribution to the development of this metaspace the new school drop-out, demotivation, waste of intelligences,
generations conform their learning styles, their lives, new-illiteracy (Frabboni, 2004, 2005; Frabboni, Pinto,
and briefly, their minds to this specific environment. & Minerva, 2001; Trentin, 2001).
As Pierre Lvy argues (1996), the cyberspace is the In this frame, with a raising cultural and social
support of intellectual technologies which amplify, ex- complexitywhere the changing request, the recur-
teriorize and modify several human cognitive functions sion and the connection refer to the plurality and the
such as memory (e.g., hyperdocuments), imagination problematic nature of reality, experience and thought
(for ex. simulations), perception (for ex. virtual reali- itselfeducation is going towards specific knowl-
ties), reasoning (e.g., modeling of complex phenomena). edge and competences. It is about knowledge and
Moreover such intellectual technologies promote new competences able to support multidimensional, open
forms of access to information (e.g., surfing the Net, and problematic view of the individual on reality and
knowbots), new reasoning and cognitive styles such as knowledge itself (complex, uncertain, and plural). This
simulation: a real industrialization of thinking practices can be achieved through an educational planning that
which does not depend either on logical deduction or trains the thought to organize connections even between
induction from experience. things that seem far and disconnected, that knows how
Learning Processes and ITC
to handle with courage the uncertainty of reality with of relations (between neurons, concepts, knowledge),
a radical multidimensionality and opening to differ- where the knots of the network become themselves
ence. It is what Edgard Morin (2000, 2002) defines as networks (Pinto Minerva & Gallelli, 2004).
complex thought: a thought that is able to understand From an educational point of view this has roused
the multiplicity of different threadsmultiple knowl- a multidisciplinary consideration on the relationship
edgebuilding the complex net of reality. between knowledge and competence. Starting from
This way, the evolution of electronic technologies the psico-pedagogical studies of the 1980s, researches
of a simulative kind opened up the field to innova- agree in stressing that the experts and competent
tive solutions in optimizing the educational processes individual, directly observed in their own specific
through direct experiences with experiential forms working contexts and interactions with colleagues,
of teaching-learning, which show how immersion in present the following characteristics: organization,
realistically reproduced environments (simulated articulation, contextualization, flexibility. Moreover,
on the basis of dynamic models)made possible by the constituent components of expertise are the poli-
virtual technologiesoffers to the individual specific contextuality (the ability of diversifying ones own
and real contexts of experience, and puts him/her in the performances, adapting them to different contexts)
position of manipulating the variables involved. In this and the crossing of borders (the ability of negotiat-
way the individual is invited to build nets of knowledge ing solutions with colleagues in different ways, using
corresponding to the cognitive needs which emerge dur- charts and sketches, to facilitate the confrontation of
ing the task. At the same time this stimulates learners different competences). The competence is, therefore, a
to put into practice associative, analogical, horizontal complex ensemble of abilities: an ensemble of abilities
and interactive procedures, and it allows them to move that depend only partially on personal strategies and
inside more or less systematically organized cognitive more on the interpersonal system of activities in which
contexts, yet not rigid. What follows is that the learners the individual is involved. It emerges from a reticular
themselves reach an effective and multi-dimensional system of declarative knowledge, procedural knowledge
learning (Anderson, 1998; Calvani, 2000; Galliani, and conditional knowledge that is realized between the
2004; Haughey & Olson, 1979). action and individual cognitive processes, and the rela-
In the context of the recent expansion of electronic tions that the individual establishes and has with other
technologies, new practices based on connectivity, individuals involved in concrete practices of research
ipertextuality, interactivity, operativity are getting and solution of problems (through the mediation of a
more and more important and suggest alternative series of technical and symbolic tools). The process
models of thought and knowledge. Multimediality through which the individual moves from a simple
and interactivity of new media, generating networks application of knowledge and rules using reproductive
among permanently moving knots of knowledge, patterns, towards a more mature expertise, involves the
break the traditional structure of knowledge and define access to forms of complex learning. It is about the
it as a dynamic space that can be read thanks to two acquisition of integrated competences, resulting from
new metaphors: knowledge-flow and knowledge- the combination of comprehension and organization
network. The metaphor of knowledge-flow fights of concepts (cognitive component), aptitude in trans-
against the idea that fixed portions of knowledge forming knowledge in a personal value (motivational
inside static boundaries defending the peculiarity and component), aptitude in improving competences and
self-referentiality, and suggests an alternative idea of performances drawing on the resources of the context
totalities of meaning partial and provisional, that is, (contextual component). The acquisition of compe-
areas with an always changing meaning, open to ac- tences in a specific field of knowledge, therefore,
tive filtration of information and knowledge coming coincides with the capacity of building strategies in
from the outside (Lvy, 1996, 2000). The metaphor applying non-repetitive knowledge and abilities, in
of knowledge-network recalls the idea of getting over dealing with knowledge in an active and participate
the linear and hierarchic organization of knowledge, way, in developing creative aptitudes of autonomous
which takes into account what neurobiological studies and self-regulated building of knowledge and also
are revealing about the functioning of the brain, which metacognition (Ajello, 2002; Cambi, 2004; Flavell,
endlessly works by building and modifying networks 1979; Goleman, 2006).
0
Learning Processes and ITC
The pedagogical problematization on the role of or territorial one of the past: it is a power that arises
the school in the education of competent individuals from the ability to learn and work in a synergic and L
requires a change in perspective. The debate of the democratic way, a power that is proportionate to the
past few years on the concept of competence is leading degree of reciprocal trust and recognition which masters
the present transition towards an educational system the human space. A habitus based on the density, speed
concerned about the development of competences that and qualitative diversification of links and exchanges.
are, at the same time, sectional, flexible and convertible. The question of power (or centre) and exclusion (or
Besides, it helped to focus the attention on the active periphery) sends us back to what we are collectively
dimension of knowledge: a dimension that involves a re- able to support (or to choose) as responsible, engag
vising, transferring, applying ability which has lead to a citizens.
crisis in the traditional pedagogical system (based on the What is, now, the relationship between the recon-
linearity of knowledge and on pedagogical approaches nection of the human species with itself (process of
focussed on symbolic-reconstructive procedures, rather globalization) and the expansion of knowledge and
than on research and coconstructing knowledge, e.g., citizenship? It (globalization) certainly produces a
in workshops/atelier). This lead to the reappraisal of spread in human horizons and if the movement of inter-
the theory of experience suggested by Dewey, who, in connection were not linked to an advance in knowledge
the 1950s, went beyond the dualism thought/action, it would not represent a real progress. For this reason
theory/experience, authority/democracy and set the it is possible to suppose that the global interconnection
basis for the existing models of situated knowledge is only the material side of the conscience expansion,
(Dewey, 1966; Maragliano, 1998; Solomon, 1993). as the two movements always go together.
The virtual approach, in this perspective, offers the
possibility of starting again from the centrality of the
learner and his/her learning. An active learner in the Ict: PossIbIlItIes and
net, co-producer of education and of virtual realities, educatIonal PersPectIves
protagonist of his/her formation as co-constructor of
common meanings. The virtualwhere it is combined The technological and scientific revolution has been
with learningoperates an epistemological revolution: growing faster and faster in the past decades, filling our
a revolution involving both the participants to the edu- daily life with information and messages, symbols and
cational processes and the researchers who study the meanings, multi-faceted and sophisticated instruments.
practices in use. Even if the increase in connections This acts on the entire space of experience and not only
of humanity with itself and the hypothetic, virtual on communication, but especially on culture itself. It
shortening of distances between North and South of the boosts the complexity of the world of communication,
worldwhich will be dealt in the following paragraphs where you can findside by side, overlapping, coex-
on digital dividedoes not automatically entail a greater istingold and new media, creating new stimuli and
equality among humans, we can however claim that new possibilities of experience in a varied situations
ICT and digital communication create and develop an of daily life, such as work, leisure, study, and private
expansion of the individual conscience, unknown in the life, thus changing in an unthinkable way rhythms and
past. The phenomenon of virtual learning communities modalities of existence (way of life). However, this
and of connective intelligence that is taking place proliferation of communication tools (satellite televi-
strengthens in a natural way the centrality, and therefore sion, internet, mobile phones) cuts physical distances
the power, of big consolidated centersintellectual, and speeds up the possibility of sharing information
economical and politicalin the North of the world. and cultural products coming from distant places on
Yet at the same time it is usedand one thing does not one side, but on the other side this quick movement
exclude anotherby social movements, solidarity nets, from one place to another modifies the perception of
development initiatives, pedagogical projects, change- spatial-time barriers, and forces upon the individual the
able forms of cooperation, exchange of knowledge need of being connected, being in touch, if he/she
and of experiences in a more participating democracy. does not want to feel excluded/out.
The kind of power promoted by the extension of the Yet this cultural complexity has a paradox. On one
cyberspace is clearly not the hierarchical, bureaucratic, side the technological evolution offers occasions to build
Learning Processes and ITC
new knowledge and multiply training experiences, on identifying the requests and the standardized models of
the other side the high and diversified offer of informa- the market found in media messages and experiences,
tion introduces in a fragmented, contradictory or, even in order to revise them on the basis of a personal, au-
worse, in a homologated or homologating archipelago tonomous and critical point of view, thus regaining the
(responding to market standards or models). We are, fundamental freedom of choice and go beyond what is
therefore, in front of a paradox: the virtual widening already given (which is worn-out, depersonalizing and
of possibilities in cultural enrichment goes together standardizing). A common base for cultural literacy
with a more and more limited freedom of choice, tools is the cornerstone of a school able to promote
because there is a prevalence of a pervasive tension autonomous abilities of choice in the learning indi-
toward a linguistic, cognitive, existential leveling, and vidual, that is, critical and creative abilities, both in a
standardization. behavioral and in an ethical domain. However, together
This is the reason why we need to promote in with educational equal opportunities, the educational
new generationsat school but also outside school - system must take the commitment of promoting the most
knowledge and competences able to exploit differences favourable educational conditions, in order to give all
(individual, cultural, social and politics). This can be the students the opportunity of developing their own
done with a set of fundamental knowledge and com- peculiar talent or intelligence. This is possible only
petences, in order to allow everybody to participate in if educational strategies are planned to allow every
the cultural network in an expert way. The attention student to cultivate at his/her best his/her own talents
moves therefore from teaching to learning: the focus and intelligences (formae mentis), presenting a clear
is the individual with his/her horizontal, interactive, differentiation of learning targets in relation with the
motivated learning, as a cocostructive actor of his/her specific cognitive abilities of the individual, between
own education and shared meanings. The cognitive ac- individualization and personalization (Cambi, 2004;
tivity is something that occurs not only inside, but also Baldacci, 2005; Gardner, 1994).
among the individual through exchanges that structure To sum up, we need to go back to the etymologi-
the reality and where the media have a fundamental role cal meaning of the word communication (from Latin
in the ongoing exchange. The learning process loses the communicare) which refers to sharing knowledge,
connotation of private event and takes on the dimen- emotions and thoughts by conveying messages. It is
sion of shared, distributed and conversational activity also important to emphasize the importance of being
(Salomon, 1993; Sorrentino & Paganelli, 2006). ICT able to interact and reflect both with others and with
facilitate interaction and sharing, therefore also col- oneself. A democratic and intentional teaching/learning
lective and connective intelligence processes, as well process, therefore, is directed to the co-construction of
as knowledge and innovating communities: Internet knowledge, to the development of a critic and conscious
seems like an ongoing interbreeding factor among thought in the individual, the promotion of a subjective
communities (Calvani, 2005). Knowledge is framed identity and the creation of a variety of spaces where
following reticular, connective, horizontal schemes, culture/s can meet and exchange and where it is pos-
able to activate dynamics of a concrete intelligence and, sible to overcome communication barrierscognitive,
operating by trials and errors, through virtualization affective-emotional, cultural, linguisticgoing towards
and interaction, it allows to plan new paths in training educational options of autonomy, responsibility, com-
(Haughey & Anderson, 1998). mitment. A possible antidote against thought homolo-
This is the main reason why all the individuals in gation, cultural levelling, ethic and civic commitment
training need to acquirewith the same level of com- drift towards a new idea of a world citizenship, in a new
manda toolbox (computer literacy) which allows Humanism and a new Renaissance (Margiotta 2005) is
them to perform two important operations: the first is the creation of a virtuous and communicative circularity
the use of specific knowledge-competences on complex, open spiral, able to facilitate effective, welcoming,
multi-faceted technological alphabets and tools, in order and generative communicative contexts, thanks also to
to fully understand media messages and experiences on ICT. We moved from the individual thought of the past
the basis of a personal and creative point of view. to a more global thought, considered as a community
The second important operation is the use of specific of minds communicatingthrough a new connective
critical and interpretative knowledge-competences, thought (not centred on an individual learning and
Learning Processes and ITC
based on the integration between formal and informal content, import, branding, lenses). It is also important to
learning)which interact in the virtual world through point out the ease in collaborating among people who L
open modalities of relation and communication based know and who can elaborate/transmit the information
on writing, words, image. and the guarantee of open licenses as Creative Com-
The idea of a distributed and shared knowledge mons and General Public License (GPL, copyleft); (5)
emerges, moving from the individual to the networks, the GNU project, created by Richard Stallman in 1984
from the individual to practices of social communi- as a complete open and free operative system; (6) the
ties, from the individual to the collaborative practices Debian project developed in 1993, which stresses the
of social networks. We must not forget, however, the issue of sharing and construction of knowledge in the
urgent problem of the digital divide (OCSE-OECD community and for the community; (7) all the free
2001, 2004): technological and knowledge gaps among software, more and more easily distributed, accessible,
individuals, organizations and countries connected with shared also thanks to the increasing use of cooperative
their real opportunities (closely linked with various fac- development models.
tors among which we can quote education, computer If the Canadian sociologist and media scholar Mar-
literacy, income, age, gender, English, geographical shall McLuhan, between the 1960s and 1970s of the
position and also the educational and economic na- last century, observing the global village stated that
tional and international politics promoting equity and the media is the message/massage, today we can say
equality principles in practice) both in accessing ICT, with, Lvy, that the role of information technology is
in using Internet, and in benefiting from it. This poses that of facilitating the construction of intelligent col-
againand dramaticallythe question of social exclu- lectives, where the social and cognitive potentialities
sion of a large part of the population from knowledge of the individual can mutually develop and expand.
sharing/creation.
Only by way of an example I will list a few among
the most meaningful and concrete open-tools which reFerences
can contribute in reducing the digital divide from the
point of view of a solidly and equal opportunity in- Ajello, A. M. (a cura di) (2002). La competenza, Il
formation technology in accessing to knowledge: (1) Mulino, Bologna.
Wikipedia, the huge free encyclopaedia on the internet,
available in several languages and considered by many Bauman, Z. (2000). La societ dellincertezza, Il Mu-
as the new democratic border of knowledge, an en- lino, Bologna
cyclopaedia from everybody and for everybody, with Baldacci, M. (2005). Personalizzazione o individualiz-
free contents, devised and created by Jimmy Wales in zazione, Erickson, Trento.
2001; (2) Connexions, a project created in 1999 and
launched in 2004 by Rice University Texas, USA, with Calvani, A. (2000). Manuale di tecnologie
educational aims and supporting an approach based on delleducazione, ETS, Pisa.
communities of people willing to create teaching and Id. (2005). Rete, comunit e conoscenza. Costruire e
learning contents, whose philosophy can be summarized gestire dinamiche collaborative, Erickson, Trento.
in its slogan create, rip, mix, burn. It is a corpus of
small units of high quality information and learning Cambi, F. (2004). Saperi e competenze, Laterza,
which can be managed and used to create new teaching Bari.
contents available on line and printable; (3) the Open- De Monticelli (2003). R. Lordine del cuore. Etica e
CourseWare program of the Massachusetts Institute of teoria del sentire, Garzanti, Milano.
Technology (MIT), which makes available to teachers
and students the materials of the prestigious courses Dewey, J. (1966). Democrazia ed educazione, La Nuova
in several subjects; (4) the Merlot project (Multimedia Italia, Firenze.
Educational Resource for Learning and Online Teach-
Morin, E. (2002). I sette saperi necessari alleducazione
ing) especially for its care in planning, production and
del futuro, Raffaello Cortina Editore, Milano.
description of the fundamentals (together with the
possibility of print on demand, semantic description of Id. (2000). La testa ben fatta, Raffaello Cortina Editore,
Milano.
Learning Processes and ITC
Flavell, J. H. (1979). Metacognition and cognitive Sorrentino, F., & Paganelli, F. (2006). Lintelligenza
monitoring. A new area of cognitive-developmental distribuita, Erickson, Trento.
inquiry. American Psychologist, 34(10).
Trentin, G. (1999). Insegnare e apprendere in rete,
Frabboni, F. (2004). Il laboratorio, Laterza, Roma- Zanichelli, Bologna.
Bari.
Id. (2001). Dalla formazione a distanza allapprendi-
Frabboni, F. (2005). Societ della conoscenza e scuola, mento in rete, Franco Angeli, Milano.
Erickson, Trento.
Varisco, B. M. (2002). Costruttivismo socio-culturale:
Frabboni, F. F. (2001). Pinto Minerva, Manuale di genesi filosofiche, sviluppi psicopedagogici, applica-
pedagogia generale, Laterza, Roma-Bari. zioni didattiche, Carocci, Roma.
Galliani, L. (2004). la scuola in rete, Laterza, Roma- Wenger, E. (1988). Communities of practice: learning,
Bari. meaning and identit. London: Cambridge University
Press.
Gardner, H. (1994). Intelligenze multiple, Anabasi,
Milano.
Key terMs
Goleman, D. (2006). Intelligenza sociale, Rizzoli,
Milano.
Cyberculture: The culture that has emerge from the
Haughey, M. & Anderson, T. (1998). Networked use of computers. It is a wide social and cultural move-
learning: The pedagogy of the Internet. Toronto: ment closely linked to advanced information science
McGraw-Hill. and information technology and regards the social and
cultural levels of human-computer interaction (between
Lvy, P. (2000). Cybercultura, Feltrinelli, Milano.
knowledge and lifelong learning).
Id. (1996). Lintelligenza collettiva. Per unantropologia
Digital Divide: Gap between people who have
del cyberspazio, Feltrinelli, Milano.
regular, effective access to digital and information
Maragliano, R. (1998). Nuovo manuale di didattica technology, and those without this access. It regards
multimediale, Laterza, Roma-Bari. both physical access to technology hardware and skills
and resources which allow to use it.
Margiotta, U., & Balboni, P.E. (a cura di) (2005). Proget-
tare luniversit virtuale. Comunicazione, tecnologia, Distributed Knowledge: instructional model that
progettazione, modelli, esperienze, Utet, Torino. allows instructor, students, and content to be located
in different places (but they work, create, and learn
OCSE-OECD (2001). Understanding the digital divide. together); instruction and learning occur independently
OCSE, Parigi. of time and place.
OCSE-OECD (2004). Information technology outlook E-Learning: Term used to refer to computer-en-
2004, OCSE, Parigi. hanced learning, commonly associated with the field
Olson, D. (1979). Linguaggi, media e processi cognitivi, of advanced learning technology, which deals with
Loescher, Torino. both the technologies and associated methodologies in
learning: e-learning 2.0, Web 2.0 (between formal
Pinto, F. & Minerva, R. (2004). Gallelli, Pedagogia e and informal e-learning, the Web and the personal
Post-umano, Carocci, Roma. learning environment).
Rivoltella, P.C. (2003). Costruttivismo e pragmatica Formal and Informal Learning: Formal learning
della comunicazione on line. Socialit e didattica in is learning that takes place within a teacher-student
Internet, Erickson, Trento. intentional relationship, such as in a school system.
Salomon, G. (1993). Distributed cognitions. Psycho- Nonformal learning is organized learning outside the
logical and educational considerations. Cambridge: formal learning system, such as clubs, youth organiza-
Cambridge University Press. tions, workshops (extra/out-school). Nevertheless, in
Learning Processes and ITC
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Leveraging Supply Chain Management in the Digital Economy
Figure 1. Products and services differentiate on price, supplier who may be a customer or even a competitor
functionality, and delivery performance in different parts of the chain. This complexity is why L
some people refer to supply chains as supply net-
works or supply webs (http://www.manufacturing.
net/scl/scmr/scm0016/integration_1.html).
Executives of the various companies are increasingly
recognizing the tremendous payoff of truly integrated
supply chains. They read about Wal-Marts leveraging
of the chain to achieve a dominant position in the retail
marketplace. They hear of companies like Dell Com-
puter reconfiguring the supply chain to respond almost
immediately to customized orders. They are intrigued
by the bold measures taken by M&M Mars to virtually
eliminate standing inventory from the pipeline.
The supply chain payoff can come in many forms.
(Source: http://www.internetsolutions.enterprise.hp.com/sup- It might reduce transaction costs by eliminating un-
plychain/library/articles/30000_feet.html. 2000) necessary steps in moving product to market. It could
enhance customer service through closer coordination
among vendors upstream and carriers, distributors, and
themselves in cost, functionality, and delivery perfor- customers downstream. Or may be it increases market
mance with respect to both their customers require- share within better customer service or lower costs.
ments and their competitors strategies and gambits
(see Figure 1). Companies can achieve this with better
supply chain management. Key characterIstIcs and
Supply chain management involves the flows of PrIncIPles oF suPPly chaIn
material, information, and finance in a network con-
ManageMent
sisting of customers, suppliers, manufacturers, and
distributors. (Figure 2 gives an overview.) Material
The best supply chain management programs display
flows include both physical product flows from sup-
certain common characteristics. For one, they focus
pliers to customers through the chain and reverse flows
intensely on actual customer demand. Instead of forc-
via product returns, servicing, recycling, and disposal.
ing into the market product that may or may not sell
Information flows involve order transmission and
quickly (and thereby inviting high warehousing and
delivery status. Financial flows include credit terms,
inventory-carrying costs), they react to actual customer
payment schedules, and consignment and title owner-
demand. And by doing so, the supply-chain leaders are
ship arrangements.
able to minimize the flow of raw materials, finished
These flows cut across multiple functions and areas
product, and packaging materials at every point in the
both within a company and across companies (and
pipeline.
sometimes industries). Coordination and integration of
Andersen Consulting has encapsulated these quali-
these flows within and across companies are critical to
ties in what it terms the Seven Principles of supply
effective supply chain management. However managing
chain management. When consistently and comprehen-
these flows effectively is a daunting task, particularly
sively followed, the consulting firm says, these prin-
for global corporations. A global corporations supply
ciples lead to a host of competitive advantagesamong
chain now usually consists of multiple enterprises
them, enhanced revenues, tighter cost control, and more
located around the world. Furthermore, each of these
effective asset utilization. The seven principles are
enterprises is involved in a wide variety of supply chain
(http://www.ascet.com/ascet/wp/wpQuinn.html):
activitiesorder fulfillment, international procure-
ment, acquisition of new information technology, and
1. Segment customers based on service needs.
customer service. There are complex relationships such
Companies traditionally have grouped customers
as multiple suppliers serving multiple customers, or a
by industry, product, or trade channel and then
Leveraging Supply Chain Management in the Digital Economy
provided the same level of service to everyone 6. Develop a supply chain-wide technology strategy.
within a segment. Effective supply chain man- Information technology must support multiple
agement, instead, groups customers by distinct levels of decision making across the supply chain.
service needsregardless of industryand then The IT system also should afford a clear view of
tailors services to those particular segments. the flow of products, services, and information.
2. Customize the logistics network. Companies 7. Adopt channel-spanning performance measures.
need to design their logistics network based on Excellent supply chain measurement systems do
the service requirements and profitability of the more than just monitor internal functions. They
customer segments identified. The conventional adopt measures that apply to every link in the
approach of creating a monolithic logistics supply chain, incorporating both service and
network runs counter to successful supply chain financial metrics.
management.
3. Listen to signals of market demand and plan ac- To respond more accurately to actual customer
cordingly. Sales and operations planning must demand and keep inventory to a minimum, leading
span the entire chain to detect early warning signals companies have adopted a number of speed-to-mar-
of changing demand in ordering patterns, customer ket management techniques. The names by now have
promotions, and so forth. This demand-intensive become part of the supply chain vernacular...Just in
approach leads to more consistent forecasts and Time (JIT) manufacturing and distribution; efficient
optimal resource allocation. consumer response (ECR); vendor managed inven-
4. Differentiate product closer to the customer. tory (VMI); collaborative planning, forecasting, and
Companies today no longer can afford to stockpile replenishment (CPFR); cross docking; and more. These
inventory to compensate for possible forecasting are the tools that help build a comprehensive supply
errors. Instead, they need to postpone product dif- chain structure.
ferentiation in the manufacturing process closer The critical questions are: How do companies get
to actual consumer demand. to be supply chain leaders? What are the challenges
5. Strategically manage the sources of supply. By involved in the process of implementation?
working closely with their key suppliers to reduce An essential first step is to integrate the key internal
the overall costs of owning materials and services, organizational functions that are involved in moving
supply chain leaders enhance margins both for product to market. But, advancing from a highly seg-
themselves and their suppliers. mented structure to a cross-functional team orientation
Leveraging Supply Chain Management in the Digital Economy
can be a formidable challenge; people are inherently any gaps. At this stage, the team also works closely
resistant to change. But, as the industry leaders have with management to assess the organizations L
demonstrated, making that essential transition pays readiness to pursue needed changes.
handsome dividends in terms of cost reduction, opera- 4. Prioritize the action items identified and then
tional efficiency, and customer satisfaction. commit the appropriate resources. The end
Once the internal integration is underway companies result of this task should be a unified commitment
can set their sights on the next challenge--executing to a supply chain strategy and a clear agenda to
the supply chain strategy and building the bridges to achieve that strategy.
the external partners. This is not an easy task, even
for the best-run organizations. It takes a dedicated Subsequent actions to implement the supply-chain
effort and committed people who know the meaning agenda typically fall into these broad categories:
of persistence.
Designing the long-term supply chain structure
to position the company in the right roles in the
a strategIc suPPly chaIn right supply chains with the right customers and
agenda: Intent and suppliers.
IMPleMentatIon Re-engineering supply chain processes to
streamline product, information, and funds flow
The consulting firm of A.T. Kearney has developed an internally and externally.
instructive framework for settingand then implement- Reinforcing the supply chain's functional foun-
inga strategic supply chain agenda. The consultants dation by improving quality and productivity
recommend that a supply chain assessment team be within operational areas such as warehousing,
created to spearhead the effort. Under the teams guid- transportation, and fleet management.
ance, the agenda-setting process would proceed along
four steps. (http://www.ascet.com/ascet/wp/wpQuinn. Ultimately, successful execution of this strategy
html) will depend upon how effectively companies can
integrate their operations with supply chain partners
1. Assess the organizations supply-chain com- both upstream and downstream. As consultant James
petitiveness. The evaluation begins by compar- T. Morehouse of A.T. Kearney has pointed out in his
ing business objectives to existing capabilities writings and speeches, in tomorrows market arena it
and performance. This exercise typically reveals will be supply chain vs. supply chain as opposed to
where the existing supply chain can achieve imme- company against company.
diate competitive advantage (the low-hanging
fruit) and where inefficiencies may be leaving
the company vulnerable to the competition. analysIs oF PayoFF oF
2. Create a vision of the desired supply chain. successFul suPPly chaIn
Through a series of visioneering sessions that ManageMent
include key customers and suppliers, the team
considers how such trends as globalization, chan- Given the extensive time, effort, and commitment
nel shifts, and new technology will affect the of resources involved, is design and execution of a
desired supply chain configuration. It addresses comprehensive supply-chain strategy really worth it
questions such as, what supply chain factors all? An evaluation of the bottom-line numbers is the
and performance levels drive customer buying best way to respond to this question. According to
decisions? What would make one supply chain A.T. Kearneys research, supply chain inefficiencies
a winner over others? can waste up to 25% of a companys operating costs.
3. Define those actions required to close the gap With profit margins of only 3 to 4%, then, even a 5%
between tomorrows vision and todays reality. reduction in supply-chain waste can double a companys
The team identifies possible re-engineering, re- profitability.
structuring, or other actions that could help narrow Through its comprehensive Integrated Supply Chain
Benchmarking Study, Pittiglio Rabin Todd & McGrath
Leveraging Supply Chain Management in the Digital Economy
(Source:http://www.ascet.com/ascet/wp/wpQuinn.html)
(PRTM) found that best practice supply chain manage- determined by IBMs Wholesale Distribution Industry
ment companies enjoyed a 45% total supply chain cost Segment, based on consulting engagements in a wide
advantage over their median competitors. Specifically, range of industries. This typically breaks down into
their supply chain costs as a percentage of revenues transportation savings of 15 to 25 percent and improve-
were anywhere from 3 to 7% less than the median, ments in inventory-carrying costs of 10 to 15 percent,
depending on the industry (see Figure 3). says Mark Wheeler, national solutions manager for
Based on his experience with companies participat- the IBM consulting unit. (www.ascet.com/ascet/wp/
ing in MITs Integrated Supply Chain Management wpQuinn.html )
Program, Prof. Metz has identified certain commonly Another supply chain technique with proven
reported bottom-line benefits. These center on cost payback potential is cross-dockingthe practice of
reductions in such areas as inventory management, receiving and processing goods for reshipment in the
transportation and warehousing, and packaging; im- shortest time possible and with minimum handling.
proved service through techniques like time-based According to Maurice A. Trebuchon, a partner with
delivery and make-to-order; and enhanced revenues, PricewaterhouseCoopers, cross docking can produce
which result from higher product availability and greater savings of 25% or more over conventional warehous-
product customization. ing. In a presentation made at the annual Council of
There are other payoffs as well. For example, the Logistics Management meeting, Trebuchon cited one
supply chain technique of optimizing the distribution manufacturer that used cross docking to realize a net
networkthat is, determining the best location for savings of $0.84 per ton of freight processed. The sav-
each facility, setting the proper system configuration, ings resulted from the elimination of putaway, picking,
and selecting the right carrierscan bring immedi- and storage costs.
ate cost advantages of 20 to 30%. Thats the number
0
Leveraging Supply Chain Management in the Digital Economy
conclusIon KeyWords
L
In todays business world, one thing becomes strikingly Collaborative Planning, Forecasting and Re-
clear: Supply-chain management is not just the wave plenishment (CPFR): Aims at the enhancement of
of the future. For professionals working in this field, supply chain integration by supporting and assisting
the issue is not so much whether to become expert in joint practices. It seeks for cooperative management
the art and science of supply-chain management, but of inventory through joint visibility and replenishment
rather how fast. This means becoming intimately fa- of products throughout the supply chain. Information
miliar with the corporate mission and figuring out how shared between suppliers and retailers aids in planning
supply chain processes can help achieve that mission. and satisfying customer demands through a supportive
It means becoming an evangelist of the supply chain system of shared information.
wordpreaching both within the organization and
Efficient Consumer Response (ECR): The joint
externally to customers, suppliers, carriers, and third
trading and industry working towards a more efficient
party logistics providers.
and productive answer to consumer demand and the
removal of unnecessary costs from the supply chain.
Its characterized by the emergence of collaborative
reFerences
management in the supply chain.
Hau, L. L. ( 2000, October ). Creating value through Supply Chain: A network of facilities and distribu-
supply chain integration. Supply Chain Management tion options that performs the functions of procurement
Review (Online). Retrieved March 16, 2008, http:// of materials, transformation of these materials into
www.manufacturing.net/scl/scmr/scm0016/integra- intermediate and finished products, and the distribution
tion_1.html of these finished products to customers.
Ganeshan, R. & Harrison, T. P. (1995, May). An intro-
duction to supply chain management. Department of
Management Science and Information Systems, Penn
State University. Retrieved March 16, 2008 http://sil-
maril.smeal.psu.edu/misc/supply_chain_intro.html
Supply chain management from the 30,000-foot level!
(2000, October 16). HPs Library. Retrieved March 16,
2008 http://www.internetsolutions.enterprise.hp.com/
supplychain/library/articles/30000_feet.html
Kuglin, F. A. & Rosenaum, B. A. (2000). The supply
chain network @ internet speed. New York: Ama-
com.
Supply Chain At The Ready (2000, October 1). SCTN
Solutions for the extended enterprise. Retrieved
March 16, 2008 http://www.sctn.net/default.asp/
section=sctnthismonth
Section: Process ICT
Hitendra Pillay
Queensland University of Technology, Australia
Vinesh Chandra
Queensland University of Technology, Australia
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Linking E-Assessment to Students Use of Online Learning Content
permitted to move ona form of electronic page-turn- sessed onlinethe structure of the course content and
ing (Conole, 2004). associated tools used to evaluate learning gainhave L
When designing online learning systems, the struc- received much less attention.
ture of how learning content is incorporated is vital Meanwhile, content development has certainly not
to its success. According to Boettcher (2003), course been neglected. Large amounts of funds have been
contentthe material to be learned or studiedis only spent on developing digital libraries, learning objects,
one of the four key core components of the learning and online learning systems. These are all efforts that
experience. The other three are the teaching, the foster the evolution of learning management systems
learner, and the environmental components. In her and tools for easy mounting of content and access to
research, she emphasized that online learning based on such content resources. There is clearly a trend for
well-structured content can impact the identification, governments worldwide to continue further develop-
selection, and development of course content in three ment of knowledge repositories at all levels of educa-
ways: tion. However, putting content online or packaging
them as learning objects does not in itself guarantee
Content must be semantically well-structured the quality of teaching and learning. It may help stu-
for instruction; this corresponds to the teaching dents access learning opportunities, but it is unlikely
component of the learning experience. to prove acceptable unless online learning is carefully
Content must be a good fit or well-structured for a and appropriately designed and structured to assess
particular student; this corresponds to the learner learning outcomes. Online learning materials cannot be
component of the learning experience. stand-alone units; they have to blend in with teaching,
Content must be technologically well structured; learning, and assessment strategies.
this corresponds to the environmental component Within the context described above, the main
of the learning experience. purpose of the article is to present the framework
used for content creation when developing the online
Boettcher extends this notion well beyond the dic- learning system which incorporated technology tools
tionary meaning of well-structured content. It includes to facilitate a better understanding of profiles of stu-
the nuances of interaction with the other three com- dent learning and the effective use of e-assessment.
ponents of the learning experienceteaching, learner, The framework established from this implementation
and environmental. guides us to understand how to utilize ICT tools and
Therefore, in practice, when researchers work with capabilities to enhance online learners abilities to
teachers and students in schools, how can course content acquire knowledge through experiencing the process
be sufficiently well-structured to be really meaningful of guided e-assessment.
to the students? Just as being an expert in teaching One critical factor for designing appropriate student-
science is not by itself a guarantee of good pedagogy, centered e-learning is to understand how students
any ICT technology tools might miss the mark if they actually interact with the content and the ELMS.
are not fine-tuned to the content the teacher wishes to Another critical factor is: how can the ELMS develop
present. It is well established that how the tools are being and provide a profile of each students learning which
used is more important than whether the students and in turn allows teachers to attend to student learning
teachers like them. Therefore, when designing content deficiencies? The diagnostic assessment and content
for online delivery, teachers, instructional designers, marking tools integrated in the ELMS presented in this
and other stakeholders need to actively investigate and article help to raise fundamental questions about the
formulate their own strategies on e-learning as well as whole learning and teaching process. This is a process
how to apply ICT tools to e-assess students. which needs continual research if we are to achieve the
With the emergence of online technologies as a new desired goal of maximizing the potential technologies
space for instruction, a lot of research has been con- offer to improve learning, teaching, and assessment.
ducted on the effectiveness of the teaching and learning
process rather than on what students are doing within
the learning experience. The organization of what is
being taught and how content is being taught and as-
Linking E-Assessment to Students Use of Online Learning Content
Linking E-Assessment to Students Use of Online Learning Content
school 1
Knowledge/
open-ended skill Ids
questions testing
school 2
Fill-in-the-blanks Multimedia
questions school 4
lessons
school 3
Multiple choice
learning
learning
content users
users
content
database
database
editing
tool elMs
elMs
answer
answer
training reporting
training reporting
content
system
system
Marking
tool
diagnostic
diagnostic
Profiling
Profiling
system
diagnostic system
assessment student teacher
tool
their own practice purely based on professional motiva- ized software that allowed teachers to teach science
tion and not on any official sanctions. per se. It was a complete learning environment that
facilitated meaningful professional thinking and work-
ing. Through this tool, teachers could use the reusable
the e-assessMent tools WIthIn learning objects and the environment to engage their
the elMs students in critical thinking and to help further their
own professional development concerning aspects of
Teachers were asked to explicitly identify the type of assessment. The online curriculum content provided
science problems that a student found difficult to solve. teachers with interactive learning activities which
Based on this information, high-quality, interactive included text, graphics, audio, and animation which
component lessons were developed which comprised were linked to the specified science skills framework.
a suite of teaching and learning content based on the Such materials were purposefully designed to exploit
diagnostic capabilities of the diagnostic and content the use of online tools to enhance students learning
marking systems which would allow students to en- experiences. These learning objects existed as either
gage in learning in new ways. Great care was taken one or more files or chunks of learning material which
when designing the interactive materials to ensure that may be used in multiple contexts for multiple purposes.
students could achieve a deeper mental interaction The learning objects could also be used as components
with the content. Through simulations, students would of a topic or unit of work alongside other digital and
need to grapple with ideas, make decisions, and choose nondigital resources and tools. To provide meaningful
directions when given options to consider. data for teacher analysis, each of the specified science
In order to alleviate the problem of time, substantial skills as portrayed in official curriculum documents
resources were produced which comprised usable learn- were explicitly identified and coded and accessed by
ing objects that could be used to strengthen teaching and their metadata descriptors.
learning activities. Appropriate content was integrated
into curricula so teachers had more time to monitor the diagnostic tool
and assess actual student learning. In no way was the
ELMS meant to comprise isolated pieces of special- Within the ELMS, teachers had use of two major as-
sessment and diagnostics tools, which fed data into the
Linking E-Assessment to Students Use of Online Learning Content
diagnostic profiling system. When data was collected The predictobserveexplain learning cycle was
by the diagnostic and content marking systems, teach- employed for each topic where students had to engage
ers could then access the DPS to obtain a continuous in three tasks. First, they predict the outcome, and then
profile of students abilities on the specific subjects or they observe the event (simulated experiment online)
topics. Teachers could easily monitor students over a and describe what they see and finally they explain
period of time and keep historical records, thus ena- any conflict between their initial prediction and final
bling them to see areas of strength and weakness of observation. Using this process, the students thinking
individual students or classes at any time of the year for processes were made explicit and, at the same time,
each subject topic. With this information, they could documented by the ELMS for later analysis by the
plan future lessons or carry out revision accordingly. teacher.
This successfully eliminated the current practice where The ELMS could be used in class to supplement
teachers were only able to know pupils strengths and face-to-face teaching. It could also be used by students
weaknesses after several months or after each manual for individual self-learning through repetition without
test or exam. the presence of the teacher, as the system can be accessed
The diagnostic assessment system is an innovative from home. On the one hand, it provided opportunities
tool that intelligently identifies the specific strengths for students to be independent learners. On the other
and weaknesses of individual students throughout hand, it offered an opportunity for schools to embark
each topics relevant lesson and automatically prompts on and create an e-learning culture through learning and
component lessons for remediation in weak areas. It teaching via the Internet. Through this approach, stu-
is Web-based and aims to add value to the teaching dents were exposed not only to quality content but also
and learning process of students and make learning given the chance to experience knowledge acquisition
more effective and efficient. Access via the Internet in a different mode, an important process in the overall
also enables students to access the resources outside objective of the current education reform agenda.
their classrooms (e.g., homes). This tool instigates a
complete learning cycle (Figure 2) by replicating the the content Marking tool
teaching and learning process while automating the
performance feedback mechanism. It does so by em- The content marking tool is able to mark open-ended
powering the learner to engage in self-learning through content like short and paragraph answers for subjects
the Web on any subject, for example, science (as is the like science where the content that does not require writ-
case for this project). ing style as a criterion for performance. This system is
P rom pts com ponent lessons fo r rem ediation in identified w eak are as,
students can repeat th e cycle as n eeded
Linking E-Assessment to Students Use of Online Learning Content
also able to classify and group various students answers, Advantages of the Student Profiling
especially nonstandard, creative answers. With the use system L
of this tool, online learning is no longer constrained to
conventional inputs such as multiple-choice and fill- The student profiling system (DPS) collates each
in-the-blank questions. This tool can mark thousands students answer and allows the teachers to monitor the
of open-ended answers instantaneously and provide performance of each student. In addition to the teacher,
feedback to students as they learn. coordinators or subject committees can gather real-time
statistics of all students performance. Since each skill
The Diagnostic Profiling System: is tagged, specific skills and subskills attached to the
tools for Formative and summative questions within topics can assist the teacher to more
assessment of Individual students closely evaluate and assess the students on their literal,
interpretive, or applied skills. As and when needed,
The diagnostic and content marking tools engage stu- reports can be generated to provide a profile with clear
dents in a complete learning cycle comprising multi- diagnostics of areas of weakness or strength as depicted
media lessons, diagnostic tests, component lessons, and in the boxes in the righthand column (Figure 3).
remediation activities. Data collected with these tools With regard to teaching and learning science, Linn
are then combined to reveal each students degree of (2004) found that students do not connect their views,
learning through the diagnostic profiling system (DPS). they fail to generalize their ideas to new problems,
At the system level, teachers are provided with: and they often cannot recognise problems that closely
resemble those they have studied (p. 345). They main-
Instantaneous and meaningful feedback to stu- tained that too often assessments tend to reinforce
dents; piecemeal science learning (p. 345). In order to avoid
Removal of time lag for teacher feedback to this, the ELMS was designed to give students a low
students; threat environment where they can be provided a second
Significant reduction in marking load for teachers, and third chance learning. In this study, students could
freeing up time for them to focus on diagnostic work with the ELMS in three ways:
and assessment strategies;
Provide historical records of student diagnos- The teacher teaches the topic in a face-to-face
ticsindividual, class, or level; classroom situation, and students are then asked
to complete the assessment tasks in class;
Once the answers have been marked, the system After the topic has been covered in class, students
can automatically tabulate all the marks of each student can access the system at any time and work on
after the new marking scheme (after step 4 has been the assessments tasks to further consolidate their
completed) has been set and saved. In this manner, skills and knowledge and be guided through the
the teacher does not have to mark every script. All the learning according to their level of ability; and
teacher has to do is sieve out all the creative or unac- Students can attempt the topics, questions, and
ceptable answers and allocate the marks that need to be component lessons totally on their own or for
rewarded for correct or partially correct answers. revision purposes.
Linking E-Assessment to Students Use of Online Learning Content
Figure 3. Strengths and weaknesses of each skill diagnosed for individual students to facilitate remediation
Linking E-Assessment to Students Use of Online Learning Content
Figure 4. Student performance improved when more attempts at learning were made
L
P e rfo rm a n c e o f A tte m pts P e rfo rm a n c e o f A tte m p ts
1 50
1 35
2 79
Attempts
Attempts
3 53
2 77 4 96
5 100
0 10 20 30 40 50 60 70 80 90 100
0 10 20 30 40 50 60 70 80 90 100
Score % Score %
Performance increased from 35% to 77% after two attempts Performance increased for students: after five attempts students
scored 100% on the assessment tasks
Cox (2004) had emphasized, ICT in secondary science methodology prompted by the unique features of
does provide a range of affordances for learning sci- the diagnostic assessment and content marking tools
ence. However, they cautioned that teachers do need to particularly moving in the direction of more student-
understand the affordances provided so that they can centered methods and how they impact student learning.
select ICT to meet their teaching objectives (Webb & For this implantation, the expectations of our research
Cox, 2004, p.258). It is also very important for teachers clashed somewhat with teacher beliefs because they
to be aware of their students beliefs in relation to their had the tendency towards conservative teaching styles.
degree of control of their learning, and they need to Our expectations for the manner of engagement of
understand the affordances for their particular students. students emphasized thinking and discussion, but this
It is only then that teachers will be able to plan activi- again did not match the student expectations as it was
ties that enable students to exercise control over their foreign to them.
learning and to provide support or scaffolding when The development of e-learning and e-assessment
students need it (p. 274). has provided an essential step forward for use of ICTs
The experience gained from this implementation in schools. The outcomes from this implementation
is in accord with a model for assessment presented in provide important insights into the use of these tools,
a NCR report, Knowing What Students Know: The and it can be concluded that there is a need to (1)
Science and Design of Educational Assessments (Pel- provide a wider range of question formats; (2) encourage
ligrino, Chudowsky, & Glaser, 2001). In this report, students to be more self-directed and control their
it is argued that an improved educational assessment own learning online; (3) encourage teachers to make
system ought to connect the three key elements of significant changes to their pedagogical practices, and
an assessment triangle: cognition, observation, and (4) continually refine and enhance the intelligence
interpretation: The cognition leg of the assessment level of the marking system by achieving critical mass
triangle is a model of student cognition and learning input of answers. Our view is that for the ELMS to be
in the domain (p. 296). Report authors contend further effective, all students and teachers need to experience
that assessments need to examine how well students it on an ongoing basis before they can fully appreciate
engage in communicative practices appropriate to a its value and benefits.
domain of knowledge and skill, what they understand
about those practices, and how well they use the tools
appropriate to that domain (p. 92). acKnoWledgMent
There is, in any event, further scope for research
that would need to identify innovation in teaching The ELMS and associated tools were proprietary tools
developed by Litespeed Pte Ltd. The implementation
Linking E-Assessment to Students Use of Online Learning Content
was supported by a grant from the Quality Educa- Pachler, N., & Byrom, K. (1999). Assessment of and
tion Fund, Education and Manpower Bureau, Hong through ICT. In M. Leask & N. Pachler, Learning to
Kong. teach using ICT in the secondary school (pp. 125-146).
London: RoutledgeFalmer.
Pellegrino, J.W., Chudowsky, N., & Glaser, R. (Eds.).
reFerences
(2001). Knowing what students know: The science and
design of educational assessment. Washington, DC:
Black, P. J., & Wiliam, D. (1998a). Assessment and
National Academy Press.
classroom learning. Assessment in Education, 5(1),
7-73. QCA. (2004). The basic and key skills (BKS) e-assess-
ment experience report. Retrieved March 5, 2008, from
Black, P. J., & Wiliam, D. (1998b). Inside the black box:
http://www.qca.org.uk/adultlearning/downloads/bks_
raising standards through classroom assessment. Lon-
e-assessment_experience.pdf
don: Kings College, London School of Education.
Schofield, J., & Davidson, A. (2002). Bringing the
Boettcher, J. V. (2003). Designing for learning: The
Internet to school: Lessons from an urban district. San
pursuit of well-structured content. Syllabus. (ERIC
Francisco: Jossey-Bass.
Document Reproduction Service No. EJ668279)
Webb, M., & Cox, M. (2004). A review of pedagogy
Bransford, J. D., Brown, A. N., & Cocking, R. R. (Eds.).
related to information and communications technol-
(2000). How people learn: Brain, mind, experience, and
ogy. Technology, Pedagogy and Education, 13(3),
school. Washington, DC: National Academy Press.
235-286.
Conole, G. (2004). Assessment as a catalyst for innova-
tion. Keynote paper presented at the Quality Assurance
Agency for Higher Education Assessment Workshop 5. Key terMs
Retrieved March 5, 2008, from http://www.enhance-
mentthemes.ac.uk/uploads\documents\Conolepaper- Content Marking Tool: A technology that is able
revised.pdf to mark open-ended content like short and paragraph
answers for subjects like science and any other content
Davitt, J. (2005). New tools for learning: Accelerated
that does not require writing style as a criterion for
learning meets ICT. Stafford: Network Educational
performance. This system is also able to classify and
Press Ltd.
group various students answers especially nonstandard
Kozma, R. (Ed.). (2003). Technology, innovation, and (creative answers) to facilitate immediate classroom
educational change: A global perspective. Eugene, OR: discussions.
International Society for Technology in Education.
Diagnostic Profiling System: A tool that intelligent-
Lee, K.T. (2002). Effective teaching in the information ly identifies the gaps in student understanding. Where
era: Fostering an ICT-based integrated learning envi- required, the diagnostic process can automatically
ronment in schools. Asia-Pacific Journal for Teacher trigger appropriate learning resources to help the
Education & Development, 5(1), 21-45. learner start to address any gaps that might have been
identified. It is Web-based and facilitates self-paced
Linn, R.L. (1996). Linking assessments. In M.B. Kane
learning via a complete learning cycle which replicates
& R Mitchell (Eds.), Implementing performance as-
the teaching and learning process while automating the
sessments: Promises, problems, and challenges (pp.
performance feedback mechanism.
91-105). Hillsdale, NJ: Lawrence Erlbaum.
E-Assessment: Refers to on-demand testing to cater
Means, B., Penuel, W., & Padilla, C. (2001). The con-
for students who learn at different rates; assessment is
nected school: Technology and learning in high school.
provided in a timely manner and is adaptive in nature. It
San Francisco: Jossey-Bass.
includes automating administrative procedures relating
0
Linking E-Assessment to Students Use of Online Learning Content
Section: Process ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Management Information System in Higher Education
Management Information System in Higher Education
Management
process Objectives Resources Operations Results
E-management
portal
Planning Observed
data data
Data warehouse
Data sources
The data warehouse is a collection of data received This information includes strategic and action plans,
from the existing operational systems (Guan, Nunez, the target values of the measures, budgets, and the hu-
& Welsh, 2006; Inmon, 1996). The operational data man resources planning of the organisational units. The
systems provide information about the performance of system aggregates the plans and budgets of the units
the organisation. The planning information produced on the level of the organisation and stores the informa-
by management is also stored to the data warehouse. tion to be compared with the transaction data in the
The data warehouse is a consistent, consolidated, and future. This information is connected to the procedural
refined information collection that integrates differ- knowledge of the e-management portal.
ent data sources. The task of the data warehouse is to Table 1 describes the peoples involvement and
produce diverse reports, statistics, and analyses based their roles and functions in the MIS, including the
on the data from the operational systems and the in- balanced scorecard. The role of top management is
formation produced in the portal. strategic planning and the implementation of strategic
The data warehouse of the TUAS integrates data plans with middle management and other personnel.
from three operational data systems: the accounting The measures of the balanced scorecards describe the
system, the human resources system, and the study implementation of the strategy. The target values of the
management system. There are also plans to integrate measures are agreed in the internal strategic negotiations
the project management system and the workload between top and middle management. The development
planning system into the data warehouse in the future. manager helps top management with the planning and
The integrated systems provide the basic data of the support of the portal and the planning of measures. The
functioning of the organisation. The raw data from these information service coordinator assumes responsibility
systems are extracted, transformed to a consistent and for providing reliable data obtained from the basic data
recognizable form, and then loaded into multidimen- sources. The system does not require any additional
sional information cubes at the data warehouse (ETL activities of the personnel but provides them with more
processing). information on how the information they produce in
The information system also receives input pro- accounting, student and personnel administration, and
duced in the portal during the management process. other activities used in management.
Management Information System in Higher Education
Strategic management has been widely used as a Inmon, W.H. (1996). Building the data warehouse.
management system in various educational organisa- New York: John Wiley & Sons.
tions. Even though the management processes are Kaplan, R., & Norton, D. (1996). The balanced score-
similar in different organisations, they also differ. card. Boston: Harvard Business School Press.
Information systems are not equal in different organi-
sations. Therefore, the MIS has to be tailored for each Kaplan, R., & Norton, D. (2001). The strategy-fo-
organisation. The experiences of this study show that cused organisation. Boston: Harvard Business School
the balanced scorecard is a useful basis for the MIS Press.
because it translates the strategic plan into objectives Kettunen, J. (2003). Strategic evaluation of institutions
and tangible measures. by students in higher education. Perspectives: Policy
The MIS requires organised and controlled informa- and Practice in Higher Education, 7(1), 14-18.
tion technology architecture. The diverse data sources of
an organisation form the basis for data warehousing. The Kettunen, J. (2005). Implementation of strategies in
data from various systems are extracted, transformed continuing education. International Journal of Edu-
into consistent and recognizable form, and then loaded cational Management, 19(3), 207-217.
into the data warehouse. Data warehousing provides Kettunen, J., & Kantola, I. (2005). Management in-
an integrated database to facilitate the technical in- formation system based on the balanced scorecard.
frastructure of management. It provides an effective Campus-Wide Information Systems, 22(5), 263-274.
means for handling the large amounts of data needed
in various tasks of an organisation. Kettunen, J., & Kantola, M. (2006). Strategies for vir-
A portal of the MIS is a tool developed to support tual learning and e-entrepreneurship. In F. Zhao (Ed.),
the management process and communicate the strategic Entrepreneurship and innovations in e-business: An
objectives throughout the organisation. A useful MIS integrative perspective (pp. 107-123). Hershey, PA:
portal can be used with a Web browser and by all the Idea Group Publishing.
members of the personnel. An advantage of this is that
Middlewood, D., & Lumby, J. (1998). Strategic
the members of the organisation can directly see how
management in schools and colleges. London: Paul
they can contribute to the organisations strategic objec-
Chapman Publishing.
tives and are committed to implementing the strategy.
Data warehousing makes the collection and processing Remenyi, D.S.J. (1990). Strategic information systems:
of data much more effective and reliable compared to Development, implementation, and case studies. Man-
the systems where the data are decentralised to differ- chester: NCC Blackwell.
ent data systems.
Management Information System in Higher Education
Rose, J.G. (2003). The joys of enterprise portals. In- E-Management Portal: An e-management portal is
formation Management Journal, 37(5), 64-70. an electronic platform for the management process and M
quality assurance. The implementation of the strategic
Smith, M.A. (2004). Portals: Toward and application
plan and the continuous improvement of quality assur-
framework for interoperability. Communications of the
ance are described in the action plan of the portal.
ACM, 47(10), 93-97.
ETL Processing, Extract Transform and Load
West-Burnham, J. (1994). Strategy, policy and planning,
Processing: The data from diverse data sources are
In T. Bush & J. West-Burnham (Eds.), The principles
extracted, transformed into consistent and recognizable
of educational management (pp. 77-99). Harlow:
form and then loaded into the data warehouse.
Longman.
Higher Education Institution: Higher education
Wheale, J. (1991). Generating income for educational
institutions include typically traditional universities
institutions: A business planning approach. London:
and in many countries professionally-oriented insti-
Kogan Page.
tutions known as universities of applied sciences or
White, M. (2000). Corporate portals: Realizing their polytechnics.
promise, avoiding costly failure. Business Information
Management Information System: A management
Review, 17(4), 177-184.
information system presupposes modelling the entire
Woodhouse, D. (2003). Quality improvement through management process of an organisation and tailoring all
quality audit. Quality in Higher Education, 9(2), 133- the necessary components of the information technol-
139. ogy support system to meet its needs. The management
information system should include a description of
Zhou, J. (2003). A history of Web portals and their how the strategic objectives will be achieved and the
development in libraries. Information Technology and necessary measures.
Libraries, 22(3), 119-128.
Management Process: The management process
typically includes a sequence of management activities
Key terMs with the necessary descriptions. The main management
activities include the definition of strategic objectives,
Balanced Scorecard: The Balanced Scorecard ap- operations of internal processes, allocation of resources
proach was developed to communicate and implement and achievement of results.
the strategic plan. The Balanced Scorecard approach
translates the strategic plan into tangible objectives and Strategic Planning: Strategic planning involves
measures and balances them typically into four differ- taking a view of the long-term future planning with
ent perspectives: customer, finance, internal processes clearly articulated values, mission, vision and strategic
and learning. objectives.
Section: Context ICT
Davide Diamantini
University of Milano Bicocca, Italy
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Mobile Learning and an Experience with Blended Mobile Learning
lines: the first work group deals with the nature of the theories is published in the report by the Nesta Futurlab
collaborative activity: how this favors or hinders learn- titled Literature Review in Mobile Technologies and M
ing, and the implications relative to the development of Learning (Naismith, Lonsdale, Vavoula, & Sharples,
the mobile wireless technology for learning. The second 2005). The report concludes that at present there is no
work group reports studies regarding the innovative use theory about mobile learning; we must work towards an
of mobile wireless technology for learning. At last, the approach that can integrate and put together elements
last series of work shows the innovative developments of various theories, those elements that are most likely
in the field of learning (p. 256). to support the various learning activities.
Trifonova and Ronchetti (2003) also have cataloged In fact, the authors emphasize that mobile devices
their research relative to m-learning on the basis of three can support a wide range of activities for students of
macro areas: infrastructural research, accessing content all ages and that the most significant experiences in-
and communicating and interacting with people. volve an eclectic approach, where many theories are
In the first area, studies treat problems connected harmonically mixed. Sharples, Taylor, and Vavoula
to navigating on the web with a device, such as a PDA (2005) stress that learning is a social process which
with a very small screen. This area includes all of the occurs within a context where students cooperate with
studies relative to the techniques of adapting contents each other and with their teachers, in order to arrive at
of Web pages to mobile devices. interpretations of the real world. Learning occurs when
The second area includes research relative to the technology is used through the continuous exploration
adaptation of courses taught in e-learning to mobile of the external world and the negotiation of its various
learning, the creation of new courses from scratch, and meanings.
finally also included in this group are the areas of study
relative to the construction of WAP portals. For example,
in this area there are several studies which are relative our blended MobIle learnIng
to the development of different systems for combining exPerIence
WAP courses with notification systems via SMS. These
studies took place in different universities, of which In the spring of 2006 the Nomadis lab of the University
the Griffith University Gold Coast where HyWeb of Milano-Bicocca designed a blended mobile learning
was developed (Jones, Jo, & Cranitch, 2002) and the training course, which included two face-to-face meet-
Minnesota State University where Virtanen, John, and ings and a learning unit to be used on the Pocket PC. It
Wright (2002) developed mid2000. was decided to use the blended learning methodologies
Finally, the last area contains all of the studies on since it is believed that both e-learning and m-learning
communications and interactions. Interaction can be present a series of pros and cons, as in all new applica-
limited (for example: as only an exchange of messages) tions. Therefore, the forms of blended learning are able
or it can be very structured. In both cases, as Trifonova to take advantage of the benefits of the technological
and Ronchetti (2003) evidenced, technology has a lot innovation without having to sacrifice the strong points
to offer. Experiments based on the simplest interactions of the more traditional and consolidated modalities of
were conducted by Stone, Briggs, and Smith (2002) in class learning.
and Stone and Briggs (2002) at Kingston University. One of the main reasons why the Nomadis lab has
Experiments based on very structured interactions were started this experience is the wide spread use of mobile
studied in the Norwegian project KNOWMOBILE devices, their portability and their cost that has now
(Smrdal, Gregory & Langseth, 2002). become accessible for most people. The success of these
However if we analyse literature, we can see that mobile devices is also connected to their operational
literature concerning theoretical models and the mobile flexibility and wide use for non-didactic purposes
learning scenario has only recently started to appear. (Corlett, Sharples, Bull, & Chan, 2005). A handheld
The fundamental question iswhich learning computer easily becomes a multimedia display unit for
theories can be applied to mobile learning, and which listening to music, for watching videos and images, as
educational activities can be followed using mobile well as having mobile telephone functions. As many
devices? A complete and detailed analysis of mobile experiences testify, learning through mobile devices
learning experiences making use of existing pedagogic can also be fun for users (Facer, Joiner, Stanton, Reid,
Mobile Learning and an Experience with Blended Mobile Learning
Hull, & Kirk, 2004; Gth, 2003; Prensky, 2001; Savill- partments such as Sociology, Philosophy, Education,
Smith & Kent, 2003; Schwabe & Gth, 2005; Seppl, Communication Sciences and Psychology.
2002; Seppl & Alamki, 2003).
Another critical element which has been observed the Model and didactic strategies
and that can enhance the success of mobile learning
has underlined that with this kind of remote training The transformations in the current didactics used for
the learning phase is not linked to a special space any mobile learning are mainly linked to the fact that the
longer, but it becomes a potentially omnipresent source learning activity takes place through a new toolthe
of learning. mobile device. And, just as on line teaching differs from
As stressed by Graham (1997), Steinberger (2002) face to face teaching, teaching via mobile devices must
and Figg and Burston (2002), with regard to its user- also take into consideration various elements which
friendliness, the instruction manual is not usually differ from face to face and on line didactics.
necessary in order to learn how to use a mobile device. Obviously, these elements are not exclusively linked
In less than 30 minutes, a new user is able to become to the mobile device in itself, but to the peculiarities of
familiar with its main functions and its software so mobile learning. Just as on line teaching cannot be a
that he can follow a course autonomously (Prensky, simple transposition of personal teaching in the most
2004), since most users are already used to similar traditional sense, the same is also true for teaching via
devices in everyday life, for example, mobile tele- mobile learningit cannot be a mere transposition of
phones. However, this cannot be a valid assumption for on line didactics.
personal computers, since the lack of familiarity with From tests and studies carried out so far, it seems
operational environments means that training sessions that the technologies are very flexible they can support
of a minimum of one day are needed by users who are various models, from those based on the transmission
not familiar with computers, plus one or more days to of contents to those based on interaction, experience
practice with the application environment (Attewell & and the building up of knowledge.
Savil-Smith, 2002). Starting with these considerations, in each mobile
learning object we decided to let the transmission of
the structure of the experience contents be followed by a topic for reflection or by
homework, the results of which were shared during
This experience included three steps: the next face-to-face meeting.
To create this learning unit, the guidelines of Stein-
1. A face to face meeting with the participants, where berger (2002) and Figg and Burston (2002) have been
the Pocket PC was introduced and distributed to taken into consideration. According to them (as quoted
them after the administration of a pre-question- by Trifonova & Ronchetti, 2003), Modules should
naire; be short, and last no longer that 5-10 minutes. Users
2. Supply of the learning unit; should be able to use their small fragments of time
3. A face-to-face meeting with the participants in spent waiting or idle time for learning, reading small
order to share their comments and to distribute a pieces of data, doing quizzes or using forums or chats.
questionnaire to assess their experience. It is important that it is simple, fun and with added
value functionality. The computational power and other
the sample properties of mobile devices make it difficult in most
cases to use complex and multimedia content, although
Our sample is composed of 16 doctoral students between devices of the same size are used for entertainment with
28 and 33 years of age. The recruited students participate great commercial success. It should be possible to use
in a programme of doctoral studies on Technologies an m-learning system without reading a user manual,
for Communication and Information Applied to the and the experience of studying with the help of such
Knowledge Society and to Educational Processes devices should be interesting and engaging.
organized by the University of Milan Bicocca. The
doctoral students come from various university de-
0
Mobile Learning and an Experience with Blended Mobile Learning
bile learning permits potentially omnipresent learning. Facer, K., Joiner, R., Stanton, D., Reid, J., Hull, R.,
Generally speaking and practically at any time from & Kirk, D. (2004). Savannah: Mobile gaming and
waiting at the bus stop to an underground ride, time learning? Journal of Computer Assisted Learning,
which would otherwise be considered wasted or 20, 399409.
time in which it was previously not possible to enrich
Figg, C. & Burston, J. (2002). PDA strategies for
with learning contents becomes a potential learning
preservice teacher technology training. In Proceed-
moment, all thanks to mobile learning.
ings of the 14th World Conference on Educational
From the assessment questionnaire and the final
Multimedia, Hypermedia and Telecommunications,
meeting, we noticed that participants enjoyed learning
2002. Denver, CO.
via Pocket PC, and they found that the proposed stimu-
lus was interesting at the end of each mobile learning Gth C. (2003). Prototypische Implementierung ei-
object. Even if our subjects came from nontechnical ner mobilen Spielumgebung fu r den PDA, Diploma
university faculties, they did not experience particular Thesis at the University of Koblenz-Landau, Koblenz,
problems in using the mobile device. Germany.
Graham, B. (1997). The world in your pocket using
pocket book computer for IT. Social Science Review,
Future trends
79(287), 45-48.
Regarding future trends, first of all it is extremely in- Harris, P. (2001). Goinmobile, ASTDs online magazine
teresting to see which innovations will take place, both all abaut e-learning. Retrieved March 16, 2008, http://
on the software and on the hardware level. Secondly, www.leamingcircuits.org/2001/jul2001/harris.html.
it is important to understand what the real application
fields of this new learning methodology will be. Ac- Hoppe, H. U., Joiner, R., Millard, M. & Sharples, M.
cording to Prensky (2004), through a mobile device it (2003). Guest editorial: Wireless and mobile tech-
is possible to learn almost anything and in fact, mobile nologies in education. Journal of Computer Assisted
learning has been used at the most diverse levels from Learning, 19, 255-259.
the year 2000 to date. However, there are still many Jones, V., Jo, J. H., & Cranitch, G. (2002). HyWeb: A
sectors where mobile learning has not been used. For holistic approach to technology -based tertiary educa-
example, the Nomadis lab has on ongoing blended tion. In Proceedings of the 14th World Conference on
mobile learning experimentation in an Italian scientific Educational Multimedia, Hypermedia and Telecom-
technological park. This experimentation uses mobile munications, 2002. Denver, CO.
learning for the training of managers of technologi-
cal transfer. And last, but not least (last but definitely Naismith, L., Lonsdale, P., Vavoula, G. & Sharples,
not less important) an important step consists in the M. (2005). Literature review in mobile technologies
development of a theory for mobile learning, which and learning. Nesta Futurelab Series. 11. Birmingham:
as we have seen does not exist yet. NESTA.
Pownell, D. & Bayley, G. D. (2001). Getting a handle
on handhelds. American School Board Journal, 188(6),
reFerences 18-21.
Attewell, J. & Savil-Smith, C. (2002). Learning with Prensky, M. (2001). Digital game-based learning. New
mobile device, research and development. Londra: York: McGraw-Hill.
LSDA. Prensky M. (2004). What can you learn from a cell
Corlett, D., Sharples, M., Bull, S., & Chan, T. (2005). phone? Almost Anything!, How to use the 1.5 bil-
Evaluation of mobile learning organiser for university lion computers already in our students and trainees
students. Journal of Computer Assisted Learning, pockets to increase learning, at home and around the
21(3), 162. world. Retrieved March 16, 2008, from http://www.
marcprensky.com/writing/PrenskyWhat_Can_You_
Learn_From_a_Cell_Phone-FINAL.pdf.
Mobile Learning and an Experience with Blended Mobile Learning
Savill-Smith, C. & Kent, P. (2003). The use of palmtop Stone, A., Briggs, J., & Smith, C. (2002). SMS and
computers for Learning, A Review of the Literature. interactivity Some results from the field, and its im- M
London: LSDA. plications on effective uses of mobile technologies in
education. In Proceedings of the IEEE International
Schwabe, G. & Gth, C. (2005). Mobile learning with a
Workshop on Wireless and Mobile Technologies in
mobile game: Design and motivational effects. Journal
Education, 2002, Vxj, Sweden, 147-151.
of Computer Assisted Learning, 21, 240-216.
Trifonova, A. & Ronchetti, M. (2003). Where is mobile
Seppl, P.(2002). Mobile learning and mobility in
learning going? In Proceedings of the World Conference
teacher training. In Proceedings of the IEEE Interna-
on E-Learning in Corp., Govt., Health., & Higher Ed.
tional Workshop on Wireless and Mobile Technologies
2003, 1, 1794-1801.
in Education (pp. 140-146). Vxj: Sweden.
Virtanen, V., John, S., & Wright, K. (2002). Nokia and
Seppl, P.& Alamki, H.(2003). Mobile learning in
midwest wireless establish model wireless campus at
teacher training. Journal of Computer Assisted Learn-
Minnesota State University. Retrieved March 16, 2008,
ing, 19, 330-335.
http://press.nokia.com/PR/200009/790728_5.html.
Shepherd, M. (2001). M is for maybe. Tactix: Training
and communication technology in context. Retrieved
Key terMs
March 16, 2008, http://www.fastrakconsulting.co.uk/
tactix/features/mlearning.htm.
Mobile Device: Mobile technologies such as Pocket
Smrdal, O., Gregory, J. & Langseth, K. J. (2002). PDAs PC, PDA (personal digital assistant), Table PC, eBook,
in medical education and practice. IEEE International mobile phones, and other portable devices.
Workshop on Wireless and Mobile Technologies in
Mobile Learning: Modality of the distribution of
Education, 2002 (pp.140-146). Vxj, Sweden.
almost any educational content, for example: entire
Steinberger, C. (2002). Wireless meets wireline e-learn- traditional courses or new mini-courses, using mobile
ing. In Proceedings of the 14th World Conference on device.
Educational Multimedia, Hypermedia.
Stone, A. & Briggs, J. (2002). ITZ GD 2 TXT How
to use SMS effectively in m-learning. In Proceedings
of the European Workshop on Mobile and Contextual
Learning, 2002 (pp.11-14).Birmingham, UK.
Section: Process ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Modeling Business Actions
reFInIng the FraMeWorK tions was already recognized in Goldkuhl (1996) where
they were named mixed communicative actions. If we
To develop elements of a business action language, apply a so-called material and speech act analysis to the
the BAT framework is refined as shown in Figure 1. remaining generic business actions, we get the results
The transaction layer is divided into the exchanges (or shown in Table 2.
phases) that have already been mentioned. An exchange These results show that a busines act typically has
consists of two hand-over actions: One is directed from one or two functions. The communicative function is
the supplier to the customer and the other vice versa. always present but there might also be another func-
These hand-overs usually happen one after the other tion of either type (see also Figure 1). We are aware
where the second happens in return for the first, but of the fact that such a list of generic actions cannot be
the order is not predefined; that is, in some cases, the a prescriptive template for all business interactions,
supplier hands over first and in others the customer but it shows how material and speech act analysis can
hands over first. identify material and communicative functions. The
An action pair consists of two business acts, an results of this analysis can help us in finding a set of
initiative and a response. They have already been in- recurring functions that can be used as a pattern for
troduced as trigger and response in Lind and Goldkuhl a modeling language for the analyzed domain. If we
(2001). On the lowest layer, a business act consists of compile the identified material and communicative
one or more functions. The importance of these func- functions and sort them according to the illocutionary
Modeling Business Actions
points introduced in Searle (1979), adding a column for 1) and complex actions (remaining layers). Complex
material functions, we arrive at the structure shown in actions are represented by a rounded rectangle with a
Table 3. This classification can be seen as an extension double line. A symbol can be used to identify the layer:
of van Reijswoud, Mulder, and Dietz (1999). two intersecting circles for an action pair, two arrows
Based on the suggested refinements, the next section pointing towards each other for an exchange, a T
develops a set of elements that describe the outline of for a transaction, and a G for a transaction group.
a potential modeling language for BAT. For business acts, we also use the rounded rectangle
and the octagon for material acts. Both shapes have
only one line to show that the act is elementary. The
language eleMents shape can either contain the name of the business act
or the respective function(s) where the illocution is
As mentioned earlier, there are already methodologies italicized. For multiple functions, the shape is divided
implementing language action concepts. We therefore into horizontal compartments, one for each function.
propose a set of elements that can be used to enrich If material and communicative functions are mixed,
them. The techniques for that are offered by (situational) we also mix the respective shapes. Figure 2 shows
method engineering (Ralyt, Deneckre, & Rolland, an overview of the notational elements for a business
2003). They are extending an existing method, creat- action language.
ing a new one from chunks of existing methods, and Undirected arcs represent material flow (thick arc)
constructing a new method from scratch. Using the first or information flow (thin arc). A condition arc shows
approach, method extension, we might for example that one action is a condition for another. The end
enrich and refine the language of SIMM with the ele- with the black dot is attached to the latter. The arrow
ments introduced here. serves two purposes. If it points from one action to
We propose that a business action language requires another, the former triggers the latter. If it points from
at least three element categories: actors, actions, and one actor to another, it represents an action that is di-
(action) objects. We define objects according to SIMM rected from the first actor to the second. In this case,
where many object types are introduced. Two of them, the name of the action is written along the arrow. It
information and material objects, are shown in Figure 2. can be accompanied by a symbol denoting the layer.
Actors are denoted by a rectangle with the name of the For complex actions, we use a diamond for business
actor. The actions are divided into business acts (layer
Modeling Business Actions
acts with a material function and a circle for business close business relationship. One of them is a retail chain
acts without a material function. As an alternative to in the home textiles and decoration industry, the other
annotating the arrow, the respective action shape can a third-party logistics provider (LogPro) that performs
be combined with the arrow. In the next section, we all inbound and outbound logistics for the retailer. Our
use the language elements to define two diagram types goal was to discover problems in their relationship and
that are suitable for analyzing commitments and to help to suggest solutions by analyzing order processing and
with detecting bad commitment management. delivery. We used SIMMs interaction diagram first but
discovered a need for information on action type and
level so we enriched it with the features introduced
coMMItMent analysIs above. The resulting diagram is shown in Figure 3.
The process starts when Headquarters (of the retailer)
Commitment analysis in terms of language action send an estimate of the capacity for handling orders in
was introduced by Auramki, Lehtinen, and Lyytinen advance. A customer order is initiated by the Shop on
(1988). Our work has been carried out in the context of behalf of a customer who wishes to buy an article that
a project that involved two companies that have a very is not available in the Shop. A refill order is triggered
Modeling Business Actions
by Headquarters whenever the Shops stock is running level. Headquarters send a capacity estimate first. On
low on articles of the basic assortment. Both actions the day of delivery, a pick file is transferred to LogPro
are on the action-pair level because they require some that contains the order data. This is used by LogPro to
kind of confirmation from the partner. A distribution pick the appropriate articles from the shelves and to
order is based on the budget that was negotiated before, pack them for delivery. As soon as the articles are on
and the Shop has to accept it as part of their franchise their way, LogPro reports the delivery to Headquarters.
obligations. It is therefore a single speech act with At the next billing occasion, LogPro send an invoice
informative character. Budget negotiation is a bilateral and Headquarters make the respective payment.
process initiated by Headquarters that consists of an For performing a commitment analysis, we need
exchange of budget proposals. Orders of all types are more detailed information about how actions are related
combined into one by Headquarters and forwarded to to each other. For that, we have to exhibit the functions
LogPro who perform delivery to the Shop. Headquar- of the actions because they lead to the establishment
ters inform the Shop about the upcoming delivery and and fulfillment of commitments. When they have been
receive a confirmation that has arrived (delivery hand- made explicit, we can show the conditional and causal
shake). In regular intervals, LogPro bill their services relationships between the functions. This in turn helps
to Headquarters. us to uncover broken commitments. For this, we need
On the basis of this overview, we developed detailed a new type of diagram, the action function diagram
interaction diagrams. The one between LogPro and (see Figure 5).
Headquarters is shown in Figure 4 on the business-act
Modeling Business Actions
Each actor box covers the actions that are performed 1. Headquarters promise that the order will require
by this actor. The capacity estimate is an action that the capacity that was requested, but in reality,
implies both a request to provide this capacity and a the orders often deviate substantially from the
promise to place an order that requires approximately estimates.
the requested capacity. LogPro makes an offer to provide 2. The request for the capacity is not in a LogPro-
this capacity subject to Headquarters order in general suitable format so that they can hardly plan for
and their offer of payment in particular. This offer is providing this capacity, but Headquarters assume
implicit (i.e., not communicated) because LogPro is that the capacity is provided.
required to provide the respective capacity by the terms 3. As a consequence of 1 and 2, the conditions for
of the frame contract. The provision of the capacity is performing the delivery are not given in many
a condition for the ability to perform the delivery that cases. This leads to higher costs and sometimes
is triggered by the respective request from Headquar- failure to meet the deadlines for delivery.
ters that is a function of the order. The other function,
offer payment, is subject to an accepted delivery. The We have used this approach for other parts of the
performed delivery triggers a respective report (state business process where we also succeeded in finding
delivery) which in turn triggers the invoice (request mistakes in commitment management. Among the prob-
payment). The latter triggers the payment (transfer lems we have identified are indistinct communication
money) but only if the Shop has confirmed the arrival structures, lack of trust, lack of information, excessive
of the delivery. Headquarters does not explicitly accept communication, and high transaction costs.
the delivery towards LogPro but does so implicitly by
paying the invoice. Therefore, transfer money and
accept delivery are functions of the same business conclusIon
act.
The business act diagram has clearly shown us that Business action theory is a stable framework for ana-
the commitment concerning the capacity is broken in lyzing business processes. It can guide the modeler in
three different places (see the flash symbols in Figure finding appropriate abstractions of the studied process
5): and in relating different parts of the model to each other.
Modeling Business Actions
These features are achieved by rooting the theory solidly Denning, P. J., & Medina-Mora, R. (1995). Completing
in an ontology, that is, socio-instrumental pragmatism, the loops. Interfaces, 25(3), 42-57.
that describes all important aspects of social behavior
Dietz, J. L. G. (1999). Understanding and modeling
in general and business behavior in particular. Another
business processes with DEMO. In J. Akoka, M.
cornerstone of BAT is the existence of different dimen-
Bouzeghoub, I. Comyn-Wattiau, & E. Mtais (Eds.),
sions, layers, and phases, and the multifunctionality of
Conceptual Modeling: ER 99 Proceedings (LNCS
business acts. All these features contribute to better
1728, pp. 188-202). Berlin: Springer.
business process models. But the support of the modeler
can be strengthened by providing a modeling language Dietz, J. L. G., & Habing, N. (2004). The notion of
that reflects these features of BAT. We have suggested business process pevisited. In R. Meersman & Z. Tari
a number of elements of such a language, and we have (Eds.), Proceedings of the OTM Confederated Inter-
shown two ways in which they can be used: to extend national Conferences, CoopIS, DOA, and ODBASE
existing modeling methods (e.g., SIMM) and to define (pp. 85-100). Berlin: Springer.
new diagram types that are adapted to a particular
modeling situation. Goldkuhl, G. (1996). Generic business frameworks
As an example for such a situation, we have used the and action modelling. In F. Dignum, J. Dietz, E. Ver-
analysis of commitments that are created and fulfilled haren, & H. Weigand (Eds.), Communication Model-
(or broken) in the course of a business process. An ing: The Language/Action Perspective, Proceedings
enriched interaction diagram and an action function of the 1st International Workshop on Communication
diagram, two examples of newly defined diagram types, Modeling, Electronic Workshops in Computing. Berlin:
have proved useful in this context, but the language Springer.
elements are only a first step towards a language. The Goldkuhl, G. (1998). The six phases of business pro-
further development of such a language depends on cesses: Business communication and the exchange of
whether they can also be used in other contexts. This value. Paper presented at the 12th Biennial ITS Con-
is subject to future research. ference Beyond Convergence (ITS98), Stockholm,
Sweden.
Austin, J. L. (1962). How to do things with words. Goldkuhl, G., & Lind, M. (2004, June 14-16). De-
Oxford University Press. veloping e-interactions: A framework for business
capabilities and exchanges. Paper presented at the
Axelsson, K., Goldkuhl, G., & Melin, U. (2000, Au- 12th European Conference on Information Systems,
gust 18-20). Using business action theory for dyadic Turku, Finland.
analysis. Paper presented at the 10th Nordic Workshop
on Interorganisational Research, Trondheim. Goldkuhl, G., & Melin, U. (2001, April 9-11). Relation-
ship management vs business transactions: Business
Barua, A., Kriebel, C., & Mukhopadhyay, T. (1995). interaction as design of business interaction. Paper
Information technology and business value: An ana- presented at the 10th International Annual IPSERA
lytic and empirical investigation. Information Systems Conference, Jnkping International Business School,
Research, 6(1), 3-23. Sweden.
Burn, J. M., & Szeto, C. (2000). A comparison of the Habermas, J. (1984). The theory of communicative
views of business and IT management on success factors action 1: Reason and the rationalization of society.
for strategic alignment. Information & Management, Boston: Beacon Press.
37, 197-216.
0
Modeling Business Actions
Kethers, S., & Schoop, M. (2000). Reassessment Sircar, S., Turnbow, J. L., & Bordoloi, B. (2000). Infor-
of the action workflow approach: Empirical results. mation technology value through different normative M
In M. Schoop & C. Quix (Eds.), Proceedings of the lenses. Journal of Management Information Systems,
5th International Workshop on the Language-Action 16(4), 69-97.
Perspective on Communication Modelling LAP 2000,
van Reijswoud, V. E. (1996). The structure of busi-
RWTH Aachen University, Germany (pp. 151-169).
ness communication: Theory, model and application.
Lehtinen, E., & Lyytinen, K. (1986). An action based Doctoral thesis, Delft University of Technology, The
model of information systems. Information Systems, Netherlands.
11(4), pp. 299-317.
van Reijswoud, V. E., & Dietz, J. L. G. (1999). DEMO
Lind, M., & Goldkuhl, G. (2001, July 21-22). Generic modelling handbook (vol. 1). TU Delft. Retrieved
layered patterns for business modelling. In Proceedings March 4, 2008, from http://www.demo.nl/documents/
of the Sixth International Workshop on the Language- handbook.pdf
Action Perspective on Communication Modelling (LAP
van Reijswoud, V. E., & Lind, M. (1998). Comparing
2001), Montreal, Canada.
two business modelling approaches in the language
Liu, K., Sun, L., Barjis. J., & Dietz, J. L. G. (2003). action perspective. In Proceedings of Language Action
Modelling dynamic behaviour of business organisa- Perspective (LAP98), Stockholm, Sweden.
tions: Extension of DEMO from a semiotic perspective.
van Reijswoud, V. E., Mulder, H. B. F., & Dietz, J. L.
Knowledge-Based Systems, 16(2), 101-111.
G. (1999). Communicative action-based business pro-
Mahmood, M. A., & Mann, G. J. (2005). Information cess and information systems modelling with DEMO.
technology investments and organizational productivity Information Systems Journal, 9(2), 117-138.
and performance: An empirical investigation. Journal of
Verharen, E. (1997). A language-action perspective on
Organizational Computing and Electronic Commerce,
the design of cooperative information agents. Doctoral
15(3), 185-202.
thesis, KUB, Tilburg.
Medina-Mora, R., Winograd, T., Flores, R., & Flores,
Weigand, H., & van den Heuvel, W. J. (1998). Meta-
F. (1992). The action workflow approach to workflow
patterns for electronic commerce transactions based
management technology. In J. Turner & R. Kraut
on FLBC. Paper presented at the Hawaii International
(Eds.), Proceedings of the Conference on Computer-
Conference on System Sciences (HICSS 98). IEEE
Supported Cooperative Work, CSCW92. New York:
Press.
ACM Press.
Winograd, T., & Flores, F. (1986). Understanding
Mukhopadhyay, T., Kekre, S., & Kalathur, S. (1995).
computers and cognition: A new foundation for design.
Business value of information technology: A study
Norwood, NJ: Ablex.
of electronic data interchange. MIS Quarterly, 19(2),
137-156. Zammuto, R. F. (1982). Assessing organizational ef-
fectiveness: Systems change, adaption, and strategy.
Ralyt, J., Deneckre, R., & Rolland, C. (2003, June
Albany: State University of New York Press.
16-18). Towards a generic model for situational method
engineering. In J. Eder et al. (Eds.), Proceedings of 15th
International Conference on Advanced Information Key terMs
Systems Engineering (Caise 2003), Klagenfurt, Austria
(pp. 95-110). Heidelberg: Springer-Verlag. Business Action: A social action aimed at an actor
Searle, J. R. (1969). Speech acts: An essay in the phi- with the purpose of achieving a goal.
losophy of language. London: Cambridge University Business Act: A business action that cannot be
Press. decomposed.
Searle, J. R. (1979). Expression and meaning: Stud- Communicative Function: A language-based func-
ies in the theory of speech acts. London: Cambridge tion of a business act that aims at changing the state
University Press.
Modeling Business Actions
Section: Product ICT
IntroductIon bacKground
In recent decades, local area network (LAN) has taken The tendency towards networking has been started at
a dominating role as communication media inside or- the same time at schools, rather than in other kinds
ganisations between individual users and the services of organisations in society. The school system as a
they would like to use. The personal computer (PC) has whole is multiform because the lowest level of educa-
become a basic piece of furniture in every workplace tion is very different from the highest educational and
like a chair and a desk. The communication media has scientific institutes. Also the information technology
evolved from a thick clumsy coaxial cable to flexible and networking needs, use, and resources vary. How
thin pair cable or even thinner very high capacity opti- equipped a school organisation is with information
cal cable. In other tools, the development has not been technology tools is very dependent on the resources of
stopped either, but instead computing tools, equip- the bearer organisation. The owner of an institute can
ment, software, and communication applications have be a public company, city, or state organisation. In the
seen further development with increasing speed. The past, institutes of higher education with IT programs
computers have been packed to very compact form, and scientific research organisations got the very first
and they move around with people everywhere, and central computers around which the computer centres
the network is following them in wireless form. Fast were built. Nearby these centres, the first computer
moving, modern people are choosing their own time classes were established where the students could get
and place to work. access to the computers either by queuing their turn
The radical change does not concern only enter- in computer terminal rooms or by reserving their time
prises, but various organisations, particularly educa- slots beforehand to few computer terminals.
tional institutes, are changing. Computerisation and the In the course of time, the central computer capacity
increase of networking have been very fast. Wireless was squeezed into even smaller space giving birth to
LANs are one of the latest examples on this; many insti- mini- and microcomputers and at last the widespread
tutes are forerunners in taking new network innovation computer capacity was connected together with net-
into use. New methods of teaching and learning and works. Modern local area networking was created.
better ways of student working are matters of interest Today, much of the information handling intelligence
in many scientific communities and schools. and capacity lays on the client desktop PCs. Differ-
This article is partly based on the research being ent services, applications, communication, and other
done by Turku University of Applied Sciences in Turku, facilities are fetched from different servers behind the
Finland. The research was started in spring 2006 and network. The physical structure of the modern local area
is backed by the Ministry of Education in Finland. network is mostly based on fixed cables that reach out
The aim of the research is to do the basic information to all relevant rooms and workplaces. The computers
collation of the current implementations and the use of are plugged to wall panels with a data cable and not
wireless local area networking in Finnish universities at all easily moved around.
of applied sciences (former polytechnics). Based on At schools, the computer based learning happens in
certain models and best practices for WLAN (wireless computer classrooms. Entire rooms have been furnished
local area networking), networking is created. with computers, cables, computer tables, and special
air conditioning to fit for computer based working. The
students have scheduled times for working in these
classrooms based on their specialisation, group, or
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Modeling Wireless Local Area Networking in Higher Education Institutes
class. Some students do also have a computer at home, For example, the speed was increased from 11 Mbps
but still most often the devices are firmly plugged to (millions bits per second) to 54 Mbps.
the wall. One of the most important things in WLAN is the
As the information needs have grown and the tech- radio technique used. The use of radio frequencies is
nology has improved, the ways to access and handle strictly regulated as whole and actually the frequency
information have also changed. One of the biggest space is divided into regulated and unregulated fre-
changes has been the way to transmit voice commu- quency band. The WLAN typically uses the latter
nication between people. Earlier, there was the fixed and thus the organisation or an individual person
network to carry the speech, but then the telephone implementing WLAN need not to apply for license
cut the wires and started the time of personal com- from the authorities. The unregulated frequency band
munication by jumping into each individuals pocket. is typically in the 2.4 or 5 GHz area. Furthermore, ra-
People could move about based on their instant needs dio waves as communication media do have qualities
and perform work tasks or leisure activities in different and characteristics that have to be carefully taken into
places as they wish. account like reflections, absorption, attenuation, and
Computers have started to demand the same grade radiation. One of the future challenges is also how to
of freedom as telephones. Two things have happened overcome the constant lack of radio frequencies for
by the help of electrical circuit and component devel- communication purposes as wireless communication
opment. The computer processors have penetrated the volumes grow.
telephones and personal computers have turned to very The construction of WLAN network demands care-
small laptop computers that can easily be carried with ful planning and considerable amount of work. With
a person. The communication line is converting into measurement equipment, the location for each base
wireless and the era of wireless local area networking station is defined to ensure the coverage without gaps
has started. to desired areas. The coverage area of each base station
is spherical although the borderline is not unbroken.
Because of this, the coverage of neighbouring base
the technology oF the WIrelIne stations has to overlap somewhat to the next station
and WIreless netWorK to avoid breaking down the communication signal
while moving from one coverage area to another. The
A modern data network in an organisation consists of recommendation is usually to have approximately 30%
wired (fixed) and wireless IP-network. IP stands for of overlap in signals from base stations next to each
Internet protocol and refers to transmission of data other. The signal is degraded fast while moving away
packets according to certain way defined in the com- from the base station and walls, and other constructions
munication protocol specification. WLAN network can quicken the degradation and even kill the signal
uses wireless communication between the base station completely.
and the end user station. The main components of the The capacity of the network is strongly dependent
wireless communication are the wireless adapter inside on the amount of users within reach of the base sta-
the user device and the base station. Both have trans- tion, because the total capacity is divided between the
ceiver-receiver hardware and certain software installed. users based on competitive reservation of resources.
In addition, there are antennas, power equipment and Additionally, the use of different radio channels on the
possibly some routing, switching, data security, and frequency area is important. The unregulated 2.4 GHz
printing services available in the base station. frequency area is divided into 13 different channels, and
In the course of time, many new standards to refine they are overlapping somewhat to each other. Actually,
WLAN were accomplished and the possibilities of using only 3-4 clear channels can be used in the same area
the WLAN have been made better. In the beginning, at the same time. It is thus recommended that either a
the speed and other features of wireless communica- proper channel usage plan is made or automatic channel
tion were minimal. After the first standard called IEEE selection feature is set on in the base stations.
802.11b, new standards were published soon and the The most severe concern in WLAN is related to
communication features were substantially increased. data security. The most important definition of policy
is whether the network is open or closed security-wise.
Modeling Wireless Local Area Networking in Higher Education Institutes
In an open network, the user is not required to authenti- At first, there was altogether 25 colleges interviewed
cate at all and thus the identification of individual user out of 30 during spring 2006. The main focus was M
is impossible or at least very difficult. In fully closed in clarifying the current WLAN situation at schools
networks, all users as persons need to authenticate with with the best specialists. On the second round, 23 IT
their given IDs and passwords or with a visitor identity managers out of 30 took positions on some matter of
to the network and even the computer is identified based opinion questions.
on hard-wired codes. In between these extremes, there In the analysis, it could be seen that in about 75%
are several networking models that can be used. of the institutes, the building of WLAN was already
Another important choice is which user groups are started. The rest of the institutes had no or less than
defined in an organisation and which services are al- five base stations. Early comers had started the building
lowed for each of them. In many cases, the network is process 3-4 years ago. The average cover of the WLAN
divided into inner and outer network. In the inner part varies, but roughly, it is around 20% of the total surface
of the network, there are the critical services that need of the schools. There was no reliable statistics available
to be protected carefully against any misuse. The outer in most of the schools about the current user amount
network is for common services like Web services. The and simultaneous users. During the rest of the year, the
question how to mix and match the user groups and amount of base stations is expected to increase from
services is answered best by a proper security policy. the current number of 800 to over 1100 base stations
In all organisations, it is very important to define the in these institutes.
security policy in which at least physical security, user As the IT managers opinions were asked, they
authentication, device configuration, set up require- stated that they clearly see that WLAN could be a
ments, services offered, software upgrade rules and strategic advantage for their institutes. The personnel
methods, network management, documentation, and are believed to retool their computers to laptops in a
encryption are determined. The coupling methods couple of years; in some opinions, the transition might
and tools of fixed and wireless networks need to be take 3-4 years. The students are increasingly buying
defined as well. their own laptops, and this is probably going to decrease
the amount of fixed computers and computer classes at
schools. The transition can be believed to be fastened
Wlan: netWorKIng In FInnIsh through the wider coverage of the WLANs and with
unIversItIes oF aPPlIed scIences lower prices of laptop PCs.
The history in WLAN implementations seems to be
This article is partly based on the research being done varying. In many cases, the first implementations were
in University of Applied Sciences in Turku, Finland. done by individual persons who just wanted to move
The research was started in spring 2006 and is backed around in their own workroom with their computer.
by the Ministry of Education in Finland. The aim of Some other persons followed these early adapters and
the research is to do the basic collation of the use of possibly added some nearby base stations to the same
wireless local area networking in Finnish universities of network segment, giving birth to the first department
applied sciences (former polytechnics) and to draw some or faculty WLANs. In some cases, these wild imple-
conclusions on the best practises and network models mentations were not at all known by the central IT
to be recommended for an educational institute. The management at school.
main method of the research has been the interviews Afterwards, more organised projects have been
and questioning and two rounds of information collation evoked, and the central management has taken their
were done. The following steps included the analysis of role in WLAN networking, too. Many implementation
information, drawing conclusions, and setting up some projects nowadays are started with careful planning.
test networks based on the results. The Universities of Plans are made concerning the desired network policy,
Applied Sciences form an important part of the Finnish coverage, and financing. After this, the careful technical
higher education institution network and supplement measuring of the premises is done. While doing this
the offering of other universities by offering the highest also, the rest of the wild networks are found and usu-
grade in vocational education. ally either smelted to the new network plan or simply
torn down. In some projects also, student workforce is
Modeling Wireless Local Area Networking in Higher Education Institutes
Modeling Wireless Local Area Networking in Higher Education Institutes
other institutes, security warnings provided if no way is the data security in WLAN communication. As
encryption available and minimum set of services, the communication and security protocols develop all M
for secure connections VPN or other security the time, it is only a matter of a short time when proper
protocols are used, access granted for users from solutions are available and the implementation skills
all participating institutes or authorised visitors are organised. At the same time, wireless networking
through the same infrastructure. is assuming a new role of being an investment oriented
Closed access model: Access for institute and business. Even the authorities are confused with the
authorised visitor users only. Technically 802.1x, new scheme of things in wireless networking and are
meaning authentication is used together with en- through some discussions creating their views on these
cryption and some security access protocol like new matters.
Radius.
Strictly closed access model: Access for identi-
fied institute users and hardware only. Technically reFerences
802.1x, meaning authentication is used together
with user and hardware certification methods. Abyzov, I., Henderson, T., & Kotz, D. (2004). The
changing usage of a mature campuswide wireless net-
Fortunately, if not a single network model is respond- work. Hanover, NH: Department of Computer Science
ing to the total need of a particular organisation alone, Dartmouth College Hanover.
the most modern technology allows us to implement
several models to the same network infrastructure and Blinn, D. P., Henderson, T., & Kotz, D. (2005). Analysis
interface at the same time. In such a solution, different of a Wi-Fi hotspot network. Hanover, NH: Dartmouth
networks sit on top of each other, and the users are College, Department of Computer Science.
able to pick up the right network for their needs. This Brown, S. W., Boyer, R. T., Griswold, W. G., Ratto,
multipurpose network model is an ultimate in net- M., Shanahan, P., Shapiro, R. B., & Truong, T. M.
working as it gives a freedom of choice for users and ActiveCampus: Experiments in community-oriented
organisations. On the other hand, WLAN networking ubiquitous computing.
will turn into investment business through the cost and
effort of implementations and the old days of free and Gold, M. (2005). Business opportunities: Community
wild networking are left behind. wireless networks (Draft). SRI Consulting Business
Intelligence.
Hmlinen, T. (2005). Kunnanist hersivt wlaniin.
conclusIon TiVi Tietoviikko 40
The computers and the networks have developed very Koskinen, E., Laaksonen, T., Veitonen, U., & Vn-
much in the last few years. The move over to laptop nen, O. (2005). New generation wireless technologies
computers from fixed terminals and to wireless net- impact on educational environments. Case: Utilizing
working from wired work spots seem to be inevitable. Finnish sign language in interpreter training. In Pro-
People are very much aware of the benefits of being ceedings of the Third IEEE International Workshop on
able to move around freely while still being able to Wireless and Mobile Technologies in Education 2005,
communicate in work and in leisure, which is enabled Tokushima, Japan.
by the new generation laptops, handheld telephones, and McGullogh, J. (2004). Caution! Wireless networking:
portable devices. The technology as such is complicated Preventing a data disaster. Wiley Publishing Inc.
and has many details in it to be further developed and
solved before all the facilities are in place. Puska, M. (2005). Langattomat lhiverkot. Talentum
The direction of the development seems to be clear Media Oy ja Matti Puska. ISBN 952-14-0934-7.
according to at least the IT-managers. The laptops are Rauste-von Wright, M., & von Wright, J. (1995). Op-
going to displace the traditional computers as personal piminen ja koulutus [Learning and education]. Juva:
tools and even the student work will be based on new Werner Sderstrm Osakeyhti
kinds of arrangements. The main question still on the
Modeling Wireless Local Area Networking in Higher Education Institutes
Riordan, B., & Traxler, J. (2005). The use of targeted Encryption: Encryption is a method to hide the
bulk SMS texting to enhance student support, inclusion clear text of the user data from misuse. There are several
and retention. In Proceedings of the Third IEEE Interna- methods of encoding the original text and nowadays
tional Workshop on Wireless and Mobile Technologies the method of encrypting is dynamically changed all
in Education 2005, Tokushima, Japan. the time during the transmission.
Syvnen, A., & Sariola, J. (2005). Langaton kampus Laptop Computing: Laptop computer is a small
suomen yliopistoissa, Nykytila ja kehityshaasteet, computer held in ones lap instead on a table. The com-
Suomen virtuaaliyliopiston e-julkaisut 13 puter is very compact and small in size and is equipped
with all needed software and hardware inside.
Salden, A., Stap, R., & Verhoosel, J. (2003). A generic
business model for WLAN hotspots: A roaming business Network Access: The network access is the way to
case in The Netherlands. TNO e-Business, Colosseum connect the computer into the network. The network
27, Enschede, 7521 PV, The Netherlands. access can be wired or wireless referring to the physical
form of the networking media.
Network Coverage: The network coverage is the
Key terMs exact area where the signal from the nearest base sta-
tion can be received. The coverage area is dependant
802.1X: An IEEE-standard that defines the authen- on many things like the transmission power of the base
tication method for user and workstation identification. station, locations of the neighboring base stations, and
It is used to secure any kind of network communica- the physical structure of the building or campus.
tion that involves allowing authorized parties to access
networked resources (e.g., servers, hosts). Wireless Local Area Networking: A wireless data
network that is used to transmit data packets between
Authentication: Authentication is the method and network communications users locally without wired
procedure to identify the users who try to get into the connections to or between the computers. Known
network. The authentication procedure can include commonly as WLAN.
physical and software based identification means and
nowadays is strictly based on the protocols that define
all details.
Section: Process ICT
Terry T. Kidd
University of Texas School of Public Health, USA
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Multimedia Integration in Active Online Learning Environments
of multimedia technology to access digital media such that multimedia-based instruction has overall positive
as audio, video, and data via the Internet. Walsh and effects on student learning, but it largely depends on
Reese (1995) also discussed the growing popularity of what type of instruction it is being compared to. Dil-
video conferencing via compressed digital video tech- lon and Gabbard (1999) reviewed 30 experimental
nology. This technology has shown to provide students studies on multimedia effects and found that there
at different campuses access to live interactive course was no significant evidence that multimedia improves
materials and content. comprehension. Clark (1983) also viewed that the use
The impact of multimedia on learning is still a of media does not influence student achievement. It
controversial issue. Both quantitative and qualitative was not the medium that caused the change but rather
studies report positive ideas concerning multimedia- a curricular reform that accompanied the change. Ba-
based instruction and its impact on student academic sically, the choice of vehicle might influence the kind
achievement. The effective use of this technology may or distributing instruction, but only the content of the
or may not affect the students achievement in online vehicle can influence achievement (Clark, 1983, p.
courses (Ryan & Kasturi, 2002; Mayer, 2001; Reed, 445). Clark further contended that multimedia is a
2003; Vogt, Kumrow, & Kazlaukas, 2001). According delivery system for instruction and does not directly
to these studies (Ryan & Kasturi, 2002; Mayer, 2001; influence learning.
Reed, 2003; Vogt et al., 2001; Roblyer, 2006; Shelly, Integrating multimedia components in online
Cashman, Gunter, & Gunter, 2004), multimedia com- courses has been a hot topic since its use in education.
ponents, such as graphics, audio, digital animation, and The issues that have been associated with online courses
video, can be integrated into the online courses envi- have been extensive due to the limitations of computer
ronment to enhance, engage, and extend the students hardware, software, and bandwidth. However, with the
ability in understanding course content and materials. rapid advancement of multimedia technology, these
An example of this phenomenon can be derived from issues have become less prominent in online courses.
a study conducted by Mayer (2001), discovering a link The recent advancement of computer hardware, the
between the students ability to understand the course increasing number of high-speed Internet connec-
content and motivation to advance further in an online tions, and easy-to-use software applications make the
course. From studies conducted by Roblyer (2006) process of using multimedia much easier (Ryan &
and Shelly, Cashman, Gunter, and Gunter (2004), Kasturi, 2002).
multimedia can be used as an effective learning tool
to help mitigate online course attrition and drop out.
Here again you see the concept of motivation and consIderatIons For MultIMedIa
ones ability to grasp the course content in an online desIgn
course environment. Moreover, multimedia can be
combined to produce a visually enriching environment Considering the potential value of multimedia, online
that has the potential to improve the online instruction instructors need to fully understand the capabilities,
and facilitate student learning. According to Ryan and limitations, and applications of this technology and
Kasturi (2002), the utilization of animation, video, and prepare for its use in their online courses (Reed, 2003).
audio in online courses can be effective in enhancing If multimedia courses are not designed properly, the
the students understanding of vital concepts. Central integration of audio, video, and other multimedia ele-
to the construction of online courses is the concept ments will distract rather than enhance Web-based in-
of instructional design. Instructional design of online struction. This point has been shown to adversely affect
courses is particularly significant for courses that have student-learning outcomes. Mayer (2001) believed that
a strong emphasis on visual aspects, such as construc- well-designed multimedia online courses can provide
tion processes or engineering. A meta-analysis study by an opportunity for students to improve the learning
Liao (1999) examined 35 studies and concluded that process. Vossen, Maquire, Graham, and Heim (1997)
multimedia-based instruction is more effective than also stated that effective multimedia design involves a
traditional instruction. However, 10 of the 30 studies systematic and comprehensive approach to analyze the
showed that traditional instruction is more effective than context of use and aspects such as the learner, task, and
multimedia-based instruction. Liao (1999) confirmed
0
Multimedia Integration in Active Online Learning Environments
setting. They identified four elements of multimedia further, the instructor should also provide instructions
design: content, structure, access, and style. for installing the specific software if needed (Vossen, M
Multimedia puts high demands on the network, Maquire, Graham, & Heim, 1997).
computer hardware, and the user. Preparing multimedia
is a time-consuming task and poses big challenges on Graphics and animations: Graphics are used to
the instructors. However, it is important for instructors supplement textual content and reinforce concepts
to consider and understand the characteristics of dif- derived from the text. Nielson (2000) outlined five
ferent media formats and the limitations of delivering functions of graphic illustrations. First, graphics make
media in a networked environment. In order to teach decorations by making text more appealing and at-
online courses effectively, instructors should employ tractive, thus engaging students in content. Second,
multimedia that is instructional, relevant to the content, graphics can represent information in the text such
and focused on students learning objectives, rather as a person, place, or thing. Third, graphics can help
than merely entertaining (Reed, 2003). The study also viewers remember key information and recall that in-
showed that if content are not correlated with multime- formation based on the picture word index or induction
dia, the comprehension rate will be lower. According model. Fourth, graphics can organize information into
to Ryan and Kasturi (2002), multimedia should have a memorable structure. Last, graphic illustrations can
text, graphic, still images, and video that support serve a descriptive function to help reader understand
interactivity of the conent with the learners. Accord- the concepts presented in the text. While we look at
ing to Nielson (2000), when instructors incorporate the positive notions of the uses of graphics, it is also
multimedia components in their online courses, they important to understand the negative. A study con-
should consider the instructional necessity of the media ducted by Wetzel, Radtke, and Stern (1994) showed
elements, the accessibility to end user, and technical that only 3 of the 16 studies conducted found positive
limitations of the delivery of multimedia content via effects of graphic illustration. Eight of the studies
the online course. For instance, online courses that reported mixed results for animated graphics. Five of
require high-quality video and audio components, but the studies found no effect at all. Therefore, it appears
high-speed networks might perform poorly given the that graphics in themselves present a mixed benefit to
quality and volume of information being downloaded student learning. However, Nielson (2000) discovered
to the local computer. A large multimedia file can be that graphical elements provide a benefit when they are
easily downloaded and viewed on campus-networked used to improve learners understanding of texts by il-
computer, but it may take a long time to download and lustrating concepts and organizing textual information
view on a students computer with a dial-up modem and animated graphics. These strategies have increased
connection. Futher, instructors should be aware of the comprehension and reinforced positive student learning
students computing experience, as well as the limita- outcomes. It is important to understand that if instruc-
tions of their access to technology including access tors chose to incorporate graphics and or animation
to high bandwidth, computer hardware, and software into the content, it may divert readers concentration
(Nielson, 2000). Moreover, if instructors incorporate and thus hinder the student in their aim to obtain the
additional multimedia elements that require special objectives of the online course (Nielson, 2000). These
plug-ins or software to view the multimedia elements distractions come in the form of moving text, moving
in their online courses, they should consider two im- animations, audio and video that do not relate to the
portant facts. First, the confusion and annoyance of text or content. To help with this problem Nielson
downloading and installing plug-ins may affect the (2000) and Vossen (1997) suggested that instructors
perceptions of students regarding online course. Sec- use animations: (1) to draw the learners attention or
ond, it is always a good idea to create content within a alert viewers to new information, (2) to demonstrate
popular file format. Creating multimedia content in the navigation in a particular direction, and (3) to create
standard formats for Windows- or Mac-based operating icons for actions that cannot be adequately expressed
systems and browsers should be considered. Instructors with a flat, static picture. One of the most popular
must also explain exactly what software and hardware forms of animation is Macromedia Flash. Because of
is needed to operate the online course as well as to its ability to produce small file sizes and interactivi-
view the multimedia components. To take this a step ties, Flash is a very useful media format to incorporate
Multimedia Integration in Active Online Learning Environments
into an online course and to explain concepts visually Premiere can optimize video multimedia elements
over dial-up modem connections (Macromedia, 2004). for online delivery. The use of images will motivate
Now with Flash, instructors can incorporate descriptive students to read the text. However, images included in
text to animations, forms, movies, and content that is a presentation must relate to the content. Instructors
readily accessible. Soma, Riskin, Harris, Collins, Ngo, should decide which type of image is appropriate; oth-
and Ferre (2002) discuss the use of Flash animations erwise, the image will cause confusion and or distract
for online courses. In order to teach using this specific from the main points presented in the lesson content.
tool, instructors are confronted with the following chal- When dealing with video, it is recommended not to
lenges: (1) providing students with the opportunities set video clips to automatically start in a slide, but
to acquire problem-solving skills; (2) providing them instead to allow students to choose when to start the
with sufficient exercises to practice their skills without video segments. It may also be better to have a small
using excessive class time; (3) generating effective still image to start the video in a window. Sound should
practice exercises to ensure students understanding; be used to enhance the presentation. Avoid repeating
and (4) offering valuable feedback to all students, which sound because it often distracts from the purpose of
cannot be performed by the instructor. Through Flash the presentation. It is recommended that instructors
animation, animation generates practice exercises that test their presentations on various computer platforms.
challenge online students to practice their acquired Different platforms and settings can cause changes in
concepts. Once students complete exercises that involve the display of content, and having a different contrast
plotting lines from a graph, the computer produces the level or changing how the image appears could cause
correct image, while retaining the students work, thus disruption of the presentation.
enabling them to review their work and determine their
level of accuracy. In other exercises, students are able Streaming video: Video is an efficient way to de-
to use Flash to see vivid demonstrations of various liver information. According to Nielson (2000), when
complex concepts. They are then able to interact with instructors add video as an instructional medium in their
the Web site in a step-by-step process to determine online courses, they need to use it to enhance the content,
whether they have understood the concepts (Soma et rather than to simply deliver it; the video must comple-
al., 2002). When incorporating Flash animation into ment the materials in the online course. Mayer (2001)
online courses, instructors should also inform students also stated that video in multimedia-based instruction
to download Flash plug-ins to view this animation. is an important component, but design issues and the
factors that influence the quality of the video must be
PowerPoint: Microsoft PowerPoint is another considered. Streaming video is defined as video data
presentation tool that is widely used in online courses. transmission over the Internet network (Reed, 2003).
Online instructors can synchronize images, audio, and This term implies a one-way data transmission to the
video with text on PowerPoint slides. Now PowerPoint users. The users computer buffers a few seconds of
has become more sophisticated; presentations can be streaming video before it starts sending it to the screen,
saved as HTML files to use on the Web (Cavanaugh & which compensates for delays. Streaming video allows
Cavanaugh, 2000). However, online instructors should the learners to view live video over the Internet, and
be mindful when adding PowerPoint presentations to it also allows the server to adjust the streaming video
their courses. The following considerations may help data rate depending on the users connection status,
them to incorporate PowerPoint slides (Cavanaugh & whether the connection is a high-speed such as DSL and
Cavanaugh, 2000). It is important to keep in mind that cable modem or a 56K modem (Reed, 2003). The size
students should have PowerPoint application software of video files, compared to that of other data types, is
or a PowerPoint viewer on their computer in order to huge. Uncompressed video, such as AVI format video,
view the PowerPoint lectures. If instructors include is composed of 30 frames per second. Each frame has
multimedia elements such as images, sound, and video, a resolution of 720x486 pixels, which requires almost
it is important to keep the file sizes of these elements 170 million bits per second to broadcast. This is a
as small as possible. File size is a critical issue in much higher data rate than current Internet technol-
the online learning environment. Adobe Photoshop, ogy is capable of sending, so the video file must be
Sound Forge, and the video editing program Adobe compressed to be usable and manageable. A video file
Multimedia Integration in Active Online Learning Environments
that is accessed via the Internet must be compressed 2. Instructors always make sure that students have
(Dixon, 2000). A considerable literature related to the the latest streaming video software installed on M
current and potential uses of streaming video exists. In their computer. Currently, three main software
one study conducted at Illinois State University, Hecht formats (RealNetworks RealVideo, Microsofts
and Schoon (1998) used various methods of online Windows Media Player, and Apples QuickTime)
courses, including compressed video over the Internet. are available to choose from for viewing stream-
Using Real streaming technology, they offered the class ing video over the Internet.
off campus in both synchronous and asynchronous 3. Set the video data rate lower than students average
modes. Students had options to participate in both Internet connection. Because of the compression
modes over the Internet. The interactive chat system of the video, the quality will be less than optimal.
allowed instructor and students to communicate and The important point is that streaming video should
to ask questions. However, a number of hardware and be viewable by the viewers computer.
software problems were reported. For example, instruc- 4. Instructors should always make sure that the
tors and students had experienced frequent hardware and streaming video is used to assist students learn-
software failures during the course delivery. Problems ingnot to distract.
such as incompatibilities with computer hardware and
software, loss of synchronization between audio and However, if the adoption of streaming video over-
video, and interaction barriers due to audio difficulties comes barriers such as a lack of high-speed Internet
were reported. In addition, due to the slow response access and minimal technical support, instructors can
time, students lost the topic by the time that instructors take advantage of this new streaming video technology
were talking another topics. Hecht and Schoon (1998) to deliver their online courses. As high-speed internet
concluded that instructors and students required a huge access increases, online courses with streaming video
amount of time to become fluent in the new stream- open up many possibilities in online education (Dixon,
ing video technology and encountered unexpected 2000).
problems. Instructors need more time to prepare their
courses for this delivery mode. Technical expertise and
willingness on the part of the instructor and students conclusIon
are also needed.
Online and Web-based learning environments with
Instruction using streaming video technology multimedia in distance education is growing to meet
may have a negative impact on students perceptions the needs of the learning population. With advances
regarding online courses (Reed, 2003). To overcome in Internet, computing technology, multimedia, and
the issues and problems regarding streaming video in Web-based technologies and their ability to reach
online courses, instructors need to consider the follow- diverse locations, a diverse program offering can be
ing points (ION, 2003; Palloff & Pratt, 1999; Reed, provided to students throughout the world. The qual-
2003). These points may help instructors integrate ity of instruction and the effective design of the online
video streaming in their online courses. course with multimedia will increase as the number
of participants and the knowledge exchange among
1. Instructors should remember the bandwidth limi- faculty and students. However, it must be understood
tations. If students are using Internet on school that the instructional quality of Web-based and online
campus, then streaming video is feasible. They can courses with multimedia are critical to the success of
download streaming video smoothly. However, if the learner and the instructor. Through utilizing the a
they are using home computer with dial-up 56K variety of instructional design principles, online course
modems, video and audio quality are not expected environment design concepts, multimedia design, and
to be feasible. Thus, students may perceive the virtual learning scaffolding model, instructors can
online course as a frustrating delivery mode. If incorporate multiple instructional routes to include
instructors think that motion is not necessary, they all learners, fostering active and dynamic learning
may consider an illustrated audio format. environment.
Multimedia Integration in Active Online Learning Environments
The findings of the report show that multimedia enhanced ing Media. Retrieved March 4, 2008, from http://illinois.
instruction involves a great deal conceptual and design online.uillinois.edu/IONresources/streamingMedia/ap-
knowledge in attempts to develop effective online learning plications.htm
environments where student have the opportunity to fully
engage in course materials, content, and course interactivity. Lee, W., & Owen, D. (2004). Multimedia-based instruc-
By using multimedia within the online course environment, tional design (2nd ed.). San Francisco: Pfeiffer.
one is able to extend, engage, and enhance course materi-
als and content that may otherwise cause students to have Mayer, R. (2001). Multimedia learning. Cambridge,
a difficult time learning and understanding the material. UK: Cambridge University Press.
Multimedia in the online course environment helps students
in their attempts to understand the course materials and con-
Michael, M.M., & Tait, A. (2002). Open and distance
nect concepts for further classroom and content engagement. learning: Trends, policies, and strategy consideration.
The article presented subject matter that revealed the online Paris, France: United Nations Educational, Scientific,
learning environment with multimedia would allowed them and Cultural Organization.
to be more active participants in their learning process, in-
creasing their critical and creative thinking skills as well as
Nielsen, J. (2000). Designing Web usability. Indianapo-
improving their problem-solving skills, if the aspects that lis: New Riders Publishing.
affect the instructional quality of the online course were Palloff, R.M., & Pratt, K. (1999). Building learning
taken into consider and implemented. As a whole, the results
communities in cyberspace: Effective strategies for the
obtained in this project were positive and encouraging. The
research examined in this article provides educators with
online classroom. San Francisco: Jossey-Bass.
the relevant factors to the quality and overall success of the Reed, R. (2003). Streaming technology improves
student learning outcomes via online and Web-based courses student achievement: Study shows the use of stan-
with multimedia. This method of course design and learning
dards-based video content, powered by a new Internet
engages students actively in participating in their own learning
process, thus leading to the promotion of quality teaching
technology application, increases student achievement.
and student learning for a more consistent and dynamic T.H.E. Journal, 30(7), 14-17.
Web-based educational learning environment. Roblyer, M.D. (2006). Integrating educational tech-
nology into teaching (4th ed.). Upper Saddle River, NJ:
Pearson Prentice Hall.
reFerences
Ryan, R.C., & Kasturi, S. (2002). Instructional design
Alessi, S., & Trollip, S. (2001). Multimedia for learning: and use of interactive online construction exercises. In
Methods and development (3rd ed.). Needham Heights, ASC Proceedings of the 38th Annual Conference (pp.
MA: Allyn and Bacon. 61-70). Blacksburg, VA: Virginia Polytechnic Institute
and State University.
Cavanaugh, T., & Cavanaugh, C. (2000). Interactive
PowerPoint for teachers and students. In D.A. Willis, Shelly, G.B., Cashman, T.J., Gunter, R.E., & Gunter,
J.D. Price, & J. Willis (Eds.), Technology and teacher G.A. (2004). Integrating technology into the classroom
education annual (pp. 496-499). (3rd ed.). Boston: Thompson Course Technology.
Clark, R. (1983). Reconsidering research on learning Soma, M., Riskin, E.A., Harris, J., Collins, L.J., Ngo,
from media. Review of Educational Research, 53(4), B., & Ferre, E. (2002). Macromedia Flash animation:
445-459. Interactive learning in introductory online electrical
engineering courses. Retrieved March 4, 2008, from
Dillon, A., & Gabbard, R.B. (1999, August 13-15). http://dcl.ee.washington.edu/papers/INEER-UW.doc
Prepared to be shocked: Hypermedia does not improve
learning. In Proceedings of the 5th Americas Conference Vogt, C., Kumrow, D., & Kazlaukas, E. (2001). The
on Information Systems, Milwaukee, WI (pp. 369-371). design elements in developing effective learning and
Association for Information Systems. instructional Web-sites. Academic Exchange, pp. 40-
47.
ION. (2003). Instructional applications of streaming
technology. Illinois Online Network Resources-Stream-
Multimedia Integration in Active Online Learning Environments
Vossen, P., Maquire, M., Graham, R., & Heim, J. (1997). Instructional Design: Also known as instructional
Design guide for multimedia (2nd ed., version 2.1). systems design is the analysis of learning needs and M
INUSE European Usability Support Centres. systematic development of instruction. Instructional
designers often use instructional technology as a method
Wetzel, C.D., Radtke, P.H., & Stern, H.W. (1994).
for developing instruction. Instructional design mod-
Instructional effective video media. Hinsdale, NJ:
els typically specify a method that, if followed, will
Erlbaum Press.
facilitate the transfer of knowledge, skills, and attitude
to the recipient or acquirer of the instruction.
Key terMs
Multimedia: The presentation of information made
with a combination of data, images, animation, sounds,
Animation: A simulation of movement created by
and video.
displaying a series of images through frames. Digital
animation is a primary component of multimedia Online Learning: Instruction and interaction that
presentations. are primarily based on the technologies available from
the Internet and the World Wide Web.
Digital Media: Refers to any type of information
in digital format including computer-generated text, PowerPoint: A presentation authoring software cre-
graphics, and animations, as well as photographs, ating graphical presentations with or without audio.
animation, sound, and video.
Web-Based Learning: A form of computer-based
ICT: Information and communication technology instruction that uses the World Wide Web as the primary
is the term used to describe exciting and innovative delivery method of information.
ways to provide lifelong learners with global access to
information, learning, and support facilitated through
technology.
Section: Process ICT
IntroductIon bacKground
Narrative, in the form of stories and narrations, is a The expression NLE was created over a decade ago
natural mode of communication and expression, fa- within the field of artificial intelligence (AI) to indi-
miliar to children from a very early age and frequently cate interactive environments basing their learning
used also by adults. For this reason, it has often been potential on the use of stories. It is not surprising that
informally employed, both in and outside school, to the concept of NLE first arose in the AI field since
facilitate understanding and raise learners interest, this has a long-time tradition as concerns attention
therefore supporting learning in both its cognitive and to narrative, from early attempts to make computers
motivational aspects. For a long time, however, nar- understand and generate stories in natural language up
rative was not an object of interest for the educational to the more recent interest to interactive storytelling
research. Its first systematic analyses were worked out environments, where the users can actively contribute
within humanities studies, characterizing it in several to the creation of computer-generated stories (Mateas
different ways. Some of such definitions already high- & Senger, 1999).
light characteristics that appear crucial for its use in Due to the increasingly widespread interest for nar-
education. Ricoeur (1981), for instance, describes it rative, the concept of NLE has successively widened its
as a sequence of events connected with each other by boundaries to include learning environments of other
cause-effect relations supporting the construction of a kinds, originated from research in education-related
meaningful totality out of a set of scattered events. fields, such as multimedia and instructional design.
We owe to Bruner (1986, 1990, 1996) the argument Multimedia studies gave rise to editors oriented to
that narrative could be a powerful tool to support the construction of stories, as well as to hypermedia
learning. Following his studies, the literature in environments where a meaningful background story
education has witnessed a growing interest in narrative. guides the content fruition. Studies in instructional
Several authors have underlined the important roles it design, on the other hand, influenced the realization of
can play: external knowledge representation (Porter environments including some relevant narrative activity
Abbott, 2002); cognitive process (Luckin, Plowman, carried out with the use of general-purpose technological
Laurillard, Stratford, Taylor, & Corben, 2001; Scalise tools. The result of such variety of approaches is that
Sugiyama, 2001); sense-making device through the currently a very diverse set of learning environments
provision of meaningful contexts (Aylett, 2006); can go under the name of NLEs. Though differing as
organizational principle (Polkinghorne, 1988); and a concerns appearance and mode of use, all of them share
way to structure human experience, both individually the conceptual similarity to support learning by letting
and collectively (Aylett, 2006). As a consequence the users engage in some narrative-based activity. This
of this interest to consciously using narrative in fact allows the definition of a unitary framework to
education, many different technology-enhanced analyze their educational impact, as will be explained
learning environments (TELE) have been developed, in the next sections.
in which a narrative activity plays a central role to Before proceeding, however, we need to point out
facilitate learning. They are called narrative learning that not all learning environments including some
environments (NLEs). Based on the literature and on a story can be considered NLEs. Stories are often used
qualitative analysis of some well-known examples, this in educational programs to provide an appealing back-
article describes the characterizing features of NLEs, ground to some unrelated activity without integrating
highlighting their relation with the learning afforded. the proposed tasks and the narrative fruition process
(Aylett, 2006). This is the case, for instance, of drill-
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Narrative Learning Environments
and-practice software tools where some assigned Pizzi, 2006) in order to select and suitably develop the
problems must be solved in order to progress through constituent elements of a story. N
a story. The presence of a story in these cases simply Another important issue to tackle when implement-
aims to give the learners extrinsic motivation to get ing interactive NLEs concerns the realization of real
engaged in some activity they possibly dislike. It does interactivity between human and virtual agents in the
not facilitate the problem solution on the cognitive joint construction of narrative. This entails balancing
level nor does it create intrinsic motivation, that is, users freedom and systems intended aims, which
help the learners perceive the interest or beauty of the entails solving a number of complex conceptual and
considered learning topic. technical problems. Research in this field has originated
a number of different approaches (Paiva, 2005), lead-
ing to a variety of solutions for the creation of what
three categorIes oF nle is called emergent narrative, that is, consistent stories
collaboratively created by humancomputer interaction
Currently available NLEs can be divided into three main (Aylett, 1999).
groups, based on the fact that they use very specialized Several interactive environments were developed in
technology (like conversational and intelligent agents), the past decade within a number of research projects;
or weakly specialized technology (like multimedia) or unfortunately, most of them remained in the form of
general purpose technology (like communication func- prototypes not widely available. In order to guide the
tions) to support a narrative activity. They correspond to reader to deepen knowledge in this respect, we will
the origin of NLEs from different education-related re- mention here the main features of some well known
search fields, namely artificial intelligence, multimedia, examples, referring to the respective Web sites for more
and instructional design. This subdivision corresponds complete information. A longer list of examples can
only to the different kinds of technological tools used: be found at http://nle.noe-kaleidoscope.org/resources/
in each of the three groups we find environments with studies.html.
various educational aims and pedagogical orientations
as well as addressed to users of different ages and with 1. Carmens Bright Ideas is a program designed to
different learning needs. help mothers of paediatric cancer patients learn to
deal with family problems induced by the childs
nles based on very specialized illness. In this environment, a sequence of stories
technology is offered to the user, featuring two characters,
Gina, a counselor, and Carmen, the mother of a
Interactive NLEs allow the users to interact in a sick child. Carmen describes a difficult situation
nontrivial way with the system to generate consistent she is currently facing due to her childs illness
narrative. In order to actually realize nontrivial interac- and is helped by Ginas questions to focus crucial
tion, intelligent agents and other AI techniques (Paiva, points and to become aware of her own reac-
Machado, & Martinho, 1999) or functions to control tions. The user can (partially) determine the next
nonstandard interfaces need to be used. A variety of story presented by selecting the kind of problem
environments belong to this group, such as virtual drama to be discussed in it. The stories are created by
and storytelling, educational computer games, as well autonomous agents, and a new version of them
as augmented reality environments, where interaction is generated every time, even if the user suggests
takes place not only by using standard input/output (I/O) the same problem twice. The prospective users
devices but also by manipulating real objects or moving are adult women. The expected learning is the
in an ad hoc equipped, physical space. Implementing acquisition of a more conscious attitude in tack-
environments of this kind entails working out a solution ling life problems; learning is induced by creating
to a number of technological and conceptual issues. A empathy with the storys main character.
major one regards making computers automatically 2. FearNot! is an application aiming to prevent ag-
generate consistent and believable stories. To this end, gressive behavior in school by inducing childrens
researchers have been drawing from narrative theories affective response against bullying situations.
formulated within narratology studies (Cavazza & Like in the previous case, a story is presented
Narrative Learning Environments
to the users, who in this case are primary school together with other children or intelligent agents.
children. Some scene of bullying is shown, and The activity is organized as on a virtual stage,
at the end, the victim asks the user suggestions conceived as intrinsically collaborative and meant
on what to do to avoid being bullied again. A to be integrated in classroom activity. Before the
natural language interpreter allows the user to performance, the users make some preparatory
express opinions by means of a short personal work, selecting the characters that will appear
sentence, based on which a new story is gener- in the play, the scenes where the action will take
ated by autonomous agents in order to show in place, and the props that will be used. Once the
practice if the suggestion given is like to produce setting is complete, a number of users, logged
positive or negative results. The expected learning in on different computers, take part in the story
is the development of some social competence; representation by giving life to different charac-
it is induced by creating empathy with the sto- ters. Intelligent agents are provided to check the
rys main character and by providing a narrative consistence of the characters behavior and to
representation of the users suggestions. play the characters included in the plot but not
3. POGO is a virtual story world, accessible through interpreted by any user. The expected learning is
a number of interactive physical tools, aiming to the development of story creation and storytell-
enable primary school children to create stories by ing competence, the choice between creation and
connecting the physical and virtual worlds. The telling obviously depending on the task assigned
expected learning is the development of storytell- by the teacher.
ing and story creation abilities. The environment
strongly supports collaborative activity. environments exploiting Multimedia
4. SAM is an environment designed to let a child technology
practice storytelling with a virtual peer realized
by means of a conversational agent. The virtual NLEs which sprang from research in multimedia include
child, SAM, is projected on a wall and repre- hypermedia environments with narrative guidance
sented in an ambiguous way so as to be possibly (Luckin et al., 2001), as well as environments based on
perceived as a peer by either boys and girls. SAM narrative editors, that is, multimedia editors explicitly
and the user take turns in telling stories to each (and mostly exclusively) oriented to support the cre-
other. The environment includes a toy castle lean- ation of multimedia stories (Earp & Giannetti, 2006).
ing against the projection wall and some plastic As pointed out in the previous section, hypermedia
figurines, which the user can manipulate while embodying a narrative can properly be considered NLE
telling stories and then put in a sort of exchange only if the given story is related to the learning task at
box in the toy castle so as to allow SAM to use hand. In this case, the learning afforded is related to
the figurines on his turn. This allows the user and the fact that a narrative is given to the user, as will be
the virtual child to share objects across the real explained in the next section.
and virtual worlds. In this environment, there Learning environments based on narrative editors,
is no collaborative story construction nor real on the other hand, provide features facilitating the
exchange of experiences, in that the natural lan- construction of multimedia stories, such as predefined
guage understanding implemented is very basic backgrounds, characters, props, speech bubbles, and
and allows only the recognition of some words often also voice recording and animation facilities. Un-
that are then used in the next story proposed by like most interactive NLEs, which have a well-defined
SAM. Nor is there any consistency check on the learning content, the environments based on narrative
stories told by the user. The simulated exchange editors are general purpose and can be used to support
of stories between the human and virtual child, learning in different fields. Narrative construction, as a
however, motivates the user to repeatedly practice matter of fact, can foster expressive abilities (learning
storytelling and hence become more fluent in this to tell stories), or allow the user to practice with some
activity. particular content knowledge, like using a foreign
5. Teatrix is a 3D virtual environment which allows language or rehearsing knowledge on a historic period
children to participate in the creation of stories, (learning by telling stories). Analogously, these NLEs do
Narrative Learning Environments
not offer built-in proposals of activities, which means since a learning task and some learning activities must
that a teacher or mentor will need to design suitable always be specified to define them. They often (but not N
tasks related to the expected learning. Unlike interac- exclusively) make use of narrations of experienced or
tive NLEs, moreover, where some guidance is provided observed events, rather than of invented stories, used as
by the presence of intelligent functions, these NLEs a starting point to stimulate reflection and comparison
do not offer automatic guidance to the learners work. on a concrete ground.
Therefore, a precise didactical planning and guidance An example is provided by De Vries (2006) who
by a teacher or mentor is necessary in order to make reports a case study where primary school children
sure to exploit the educational potential of narrative develop and share with peers experiential narrations of
by guiding the learners to construct stories which are their science classes. In this environment, the narration
consistent in themselves and with the assigned task. of the learning activities carried out in the science class
Narrative editors currently available include both aims to stimulate reflective thinking, hence to improve
commercial tools (e.g., Story Maker2 [6], Kar2ouche learning. The technology employed is e-mail, used to
Composer [7], MediaStage [8]), and freeware (e.g., share the narrations with the pupils of another school.
Zimmer Twins [9]). Though all provide rich libraries The communication phase amplifies the impact of
of elements to create stories, the three mentioned com- narration construction by giving the pupils a concrete
mercial editors differ from each other for the graphics public for their productions and hence motivating the
aspect and for offering some different features that need to work with particular care.
make each of them preferable for one or the other kind Another example of this kind of NLE is offered by
of applications. StoryMaker appears more suitable for Dolk and Den Hertog (2006) who challenge trainee
young children than the other ones, not for being less teachers to collaboratively develop narrations of para-
powerful but due to the use of 2D graphics and to the digmatic classroom situations after watching videos on
naf style of the pictures provided. It provides support them. The fact of constructing collective narrations of
for a number of European languages, which makes it the watched situations before reflecting on them makes
oriented to language learning. Kar2touch Composer the reflection phase start on a concrete and shared basis,
does not allow animations, which forces the learners avoiding possible (and frequent!) misunderstandings
to rely on dialogues to produce interesting stories; due to inaccurate observation of the proposed situation.
it therefore appears oriented to the development of The technology used in this case is a software to show
communication abilities. Finally, Media Stage allows videos; its role is to allow repeated observations of the
the creation of 3D animation where the end user can proposed situations, hence leading to the construction
move around with some freedom. As concerns the of more accurate narrations. The expected learning is
mentioned freeware (Zimmer Twins), it provides a to improve observation abilities.
rich menu of actions that the three characters allowed
can perform, hence highlighting one of the distinctive
aspects of narrative, that is, to concern actions, not asPects oF nle InFluencIng
simply descriptions of situations. learnIng
nle based on general Purpose Narrative can be used in many different ways within
software learning environments. Its mode of use determines how
its educational potential is exploited and consequently
The literature offers a variety of examples of NLE what learning is afforded by a narrative environment.
which make use of general purpose software and en- Three factors appear particularly relevant in determining
visage some relevant narrative task within the overall narratives influence on learning, namely the role of
design of an articulated learning activity. NLEs of this the user with respect to the narrative, the technological
kind are characterized by a strong human component, means used to generate, share or receive it, and the learn-
since the use of only general-purpose software makes ing approach underlying the proposed narrative activ-
their consistency and efficacy completely depend on ity. The most often implemented learning approaches
human planning and monitoring. They share with most include game-based, challenge-based, case-based, and
interactive NLEs a specialization in their purpose, situated learning, problem solving, empathy driven
Narrative Learning Environments
learning. All of them imply a constructivist general Finally, when participating in story creation, each
orientation, which is not surprising, since NLEs always (human or virtual) agent involved gives life to a differ-
entail some kind of activity by the user. The learning ent character, and the narrative raises from the actions
induced by the user role and by the technology used individually performed by all of them. This activity
deserve a wider discussion, which is the object of the stimulates creativity like individual story creation, but
following subsections. results more demanding on the logical level since the
consistency checks are made more complex by the need
role of the user to control ones character in an overall framework that
integrates the ideas of all participants. A particular case
In NLEs, the student can be given a narrative or is role play, where the participants interpret characters
asked to produce one. Giving a narrative helps make with assigned features that constrain and characterize
sense of problem situations, with the aim to improve their behavior.
understanding or to facilitate problem solving. Often,
the story provided acts as a container highlighting the technological Means
elements of a considered problem situation and helping
the user relate them with each other in a meaning-cre- The development of ICT and its increasing use in
ation process which is functional to the construction education has provided a variety of tools and tech-
of a solution. Receiving a story created and told by niquesfrom 3D graphics and animation to intelligent
others stimulates understanding, in that it implies a agents, from communication means to augmented real-
cognitive activity consisting in elaborating a mental ityapt to exploit and strengthen the use of stories.
representation of the narrated facts and of the causal Not only do the technological means used influence the
and temporal connections among them. As concerns appearance and operation of an environment, they also
problem solving, a given story may provide a guidance determine what kind of activities can be carried out,
to the exploration of a hypermedia environment, like and hence the learning afforded. An increasing number
in the Galapagos environment (Luckin et al., 2005); of studies on technology-enhanced narrative environ-
help the user understand the nature of a problem, like ments has highlighted that the use of different media
in the FearNot! (Aylett, 2006); or help the learner (Decortis, Rizzo, & Saudelli, 2003; Fusai, Saudelli,
understand the relation among a problems data, like Marti, Decortis, & Rizzo, 2003) and of technological
world problems in mathematics education. Story pro- tools (Aylett, 2006) affects the learning affordance of
duction may take place in different ways, namely by an environment so that the ICT tools employed deter-
creating, telling, or participating in story creation. Each mines what cognitive activities can be carried out and
of these possibilities puts into play different abilities. hence what learning is likely to take place. Moreover,
Story creation entails that the learner invents a story, ICT tools facilitate the creation and use of multimedia
possibly starting from some given elements (e.g., a narratives, including nonverbal ones (or with a very
story involving some particular character or set up in limited amount of verbal language), made of sequences
a particular context) or with some constraints (e.g., a of scenes, like movies or cartoon strips. This allows
story to illustrate some moral or general fact, like in even people with language-related learning disabilities
Aesops fables). Such activity stimulates creativity; it to carry out educational activities which exploit the
also encourages logical reasoning, in that stories must learning potential of narrative (e.g., Faux, 2006).
satisfy constraints of consistence as well as of temporal As an example of the different learning afforded
and causeeffect relations. by environments with similar aims but based on dif-
Story telling, on the other hand, entails reporting ferent technologies, let us consider Teatrix [10] and
a story created by somebody else. This puts into play StoryMaker2 [11], both of which can be used to create
memory and the ability to express a known story in stories (Dettori & Giannetti, 2006a, 2006b). In Teatrix,
personal way, yet preserving the original content and which implements Propps narrative theory (1968), the
meaning. Both story creation and telling can be car- characters available are limited to eight different kinds
ried out individually or in cooperation with some other and can take a limited number of well-defined roles.
learner, which entails that the overall development This means that they are completed by a description
of the story must be negotiated among the subjects which constrains their possible behavior. Hence, story
involved.
0
Narrative Learning Environments
creation in this environment actually results in a role- Moreover, particular attention should be given to
play activity. Teatrix, moreover, includes an intelligent two important issues that are transversal across the con- N
function (the hot-seating) which detects inconsistencies ceptual, technical, and pedagogical, that is, evaluation
in characters behavior and monitors the overall coher- and diffusion of applications. Evaluation is a complex
ence of the story. This environment, therefore, strongly task, since several different aspects should be taken
supports the development of a narrative competence, into consideration, such as educational effectiveness,
in particular as concerns causal reasoning. modes of interaction afforded, influence on students
StoryMaker2, on the other hand, is oriented to learning competence, and appreciation of the narrative
support the practice of communication skills and is experience. As concerns the diffusion of applications,
not based on any narrative theory. It offers a library attention should be paid to preparing teachers to ef-
of backgrounds, props, and characters which is much fectively make use of this kind of environment and to
richer than that provided by Teatrix, as well as more support the transformation of many interesting pro-
complex animations and a more refined graphics. It posals from the state of prototypes developed within
also allows the user to import images and sounds from research projects to that of widely available products
external files and to record spoken language. All these (Aylett, 2006).
features can support the creation of more articulated
and fancy stories than in Teatrix, and also favor the
acquisition of a technological literacy in relation with acKnoWledgMent
multimedia expressive competence. This comparison
highlights that the different technological tools used This work was carried out within the Special Interest
in the two environments actually lead to structure and Group Narrative and Learning Environments [12]
develop the experience of story creation in different of the European network of excellence Kaleidoscope
ways. [13].
conclusIon notes
NLE is an emerging field. Attention to the use of nar- 1. http://www.isi.edu/isd/carte/proj_parented/
rative to support learning is rapidly increasing, and we 2. http://info.nicve.salford.ac.uk/victec/
can expect a fast growth of its research and diffusion 3. http://www.iku.ulg.ac.be/projets_5_en.htm
of its applications. Several issues should be addressed 4. http://www.media.mit.edu/gnl/projects/castle-
to further develop the field: mate/
5. http://gaips.inesc-id.pt/teatrix
From a conceptual point of view, the relation be- 6. http://www.spasoft.co.uk/storymaker.html
tween narrative, technology, and learning should 7. http://www.mediastage.net/kar2ouche/
be deepened, and particular cases of NLE should 8. http://www.mediastage.net/mediastage/
be explored so as to define more precisely the 9. http://www.zimmertwins.com
limits and structure of the field. 10. See reference in the previous section.
From a technical point of view, more effective, 11. See reference in the previous section.
efficient, and interactive environments should be 12. http://nle.noe-kaleidoscope.org/
built, trying to bridge the three mentioned groups 13. http://www.noe-kaleidoscope.org/
of NLE.
From a pedagogical point of view, the impact of
applying NLEs in different disciplines, including
reFerences
nontraditional ones, like the scientific domain,
should be analyzed, and their educational potential
Aylett, R. (1999). Narrative in virtual environments:
further explored.
Towards emergent narrative. In Proceedings of the
AAAI Fall Symposium on Narrative Intelligence, Menlo
Park, CA. AAAI Press.
Narrative Learning Environments
Aylett, R. (2006). And they both lived happily ever after? nology-mediated narrative environments for learning
In G. Dettori, T. Giannetti, A. Paiva & A. Vaz (Eds.), (pp. 27-40). Rotterdam: Sense Publishers.
Technology-mediated narrative environments for learn-
Faux, F. (2006). Speak for yourself! Developing a narra-
ing (pp. 5-25). Rotterdam: Sense Publishers.
tive within a multimedia, multimodal, ICT environment.
Bruner, J. (1986). Actual minds, possible worlds. Cam- In G. Dettori, T. Giannetti, A. Paiva, & A. Vaz (Eds.),
bridge, MA: Harvard University Press. Technology-mediated narrative environments for learn-
ing (pp. 67-78). Rotterdam: Sense Publishers.
Bruner, J. (1990). Acts of meaning. Cambridge, MA:
Harvard University Press. Fusai, C., Saudelli, B., Marti, P., Decortis, F., &
Rizzo, A. (2003). Media composition and narrative
Bruner, J. (1996). The culture of education. Cambridge,
performance at school. Journal of Computer Assisted
MA: Harvard University Press.
Learning, 19, 177-185.
Cavazza, M., & Pizzi, D. (2006). Narratology for
Luckin, R., Plowman, L., Laurillard, D., Stratford, M.,
interactive storytelling: A critical introduction. In S.
Taylor, J., & Corben, S. (2001). Narrative evolution:
Gobel, R. Malkevitz, & I. Iurgel (Eds.), Technology
Learning from students talk about species variation.
for interactive digital storytelling and entertainment
International Journal of Artificial Intelligence in
(LNCS 4326, pp. 72-83). Berlin: Springler-Verlag.
Education, 12.
Decortis, F., Rizzo, A., & Saudelli, B. (2003). Medi-
Mateas, M., & Senger, P. (1999). Narrative intelligence:
ating effects of active and distributed instruments on
An introduction to the NI Symposium. In M. Mateas &
narrative activities. Interacting with Computers, 15(6),
P. Senger (Eds.), Working Notes of the Narrative Intel-
801- 830.
ligence Symposium. Menlo Park, CA: AAAI Press.
Dettori, G., & Giannetti, T. (2006a). Ambienti Nar-
Paiva, A. (2005). The role of tangibles in interactive
rativi per lapprendimento. Tecnologie Didattiche,
storytelling. In G. Subsol (Ed.), Virtual Storytelling 2005
37(1), 20-27.
(LNCS 3805, pp. 225-228). Berlin: Springer-Verlag.
Dettori, G., & Giannetti, T. (2006b). A concise intro-
Paiva, A., Machado, I., & Martinho, C. (1999). Enrich-
duction to narrative learning environments (Intro-
ing pedagogical agents with emotional behaviour: The
ductory notes for an online course on NLE for the
case of Vincent. In Proceedings of the AIED Workshop
Virtual Doctoral School of Kaleidoscope) ITD-CNR
on Animated and Personified Pedagogical Agent, Le
Report 03/06: Genova, Italy. Retrieved March 4, 2008,
Mans.
from http://telearn.noe-kaleidoscope.org/read_publi.
php?publi=653 Pokinghorne, D. (1988). Narrative knowing and the
human sciences. State University of New York Press.
Dettori, G., Giannetti, T., Paiva, A., & Vaz, A. (Eds.).
(2006). Technology-mediated narrative environments Porter Abbott, H. (2002). The Cambridge introduction to
for learning. Rotterdam: Sense Publishers. narrative. Cambridge: Cambridge University Press.
De Vries, B. (2006). Reflective narration with e-mail: Propp, V. (1968). Morphology of the folk tale (2nd ed.,
Issues concerning its implementation. In G. Dettori, T. M. Skazki, trans.). Austin: University of Texas. (First
Giannetti, A. Paiva, & A. Vaz (Eds.), Technology-medi- English edition 1958)
ated narrative environments for learning (pp. 41-54).
Ricoeur, P. (1981). Hermeneutics and the human sci-
Rotterdam: Sense Publishers.
ences. Cambridge: Cambridge University Press.
Dolk & Den Hertog (2006). Teachers storied lives:
Scalise Sugiyama, M. (2001). Food, foragers, and
Narratives in teacher education. In P. Brna (Ed.), Pro-
folklore: The role of narrative in human subsistence.
ceedings of NILE 2006 (pp. 13-26).
Evolution and Human Behavior, 22(4), 221-240.
Earp, J., & Giannetti, T. (2006). Narrative-oriented
software for the learning of a foreign language. In G.
Dettori, T. Giannetti, A. Paiva, & A. Vaz (Eds.), Tech-
Narrative Learning Environments
Section: Product ICT
Dvid Tegze
Budapest University of Technology and Economics, Hungary
Gbor Hossz
Budapest University of Technology and Economics, Hungary
Ferenc Kovcs
Budapest University of Technology and Economics, Hungary
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
NETRIC
simple direct form (Levine & Garcia-Luna-Aceves, NETRIC system, we use existing mechanisms and try
1998). to select the best collection of mechanisms to imple- N
An attempt to classify these protocol attributes was ment. The building block-based approach is focused
published by the IETF Reliable Multicast Transport on development and needs human assistance during
Working Group (RMTWG) in Handley, Whetten, Ker- the process; however, we concentrate on simulation
mode, Floyd, Vicisano, and Luby (2000) and Whetten, and selection. We try to create an automated process,
Vicisano, Kermode, Handley, Floyd, and Luby (2001), which can automatically determine the right solution.
introducing the building blocks for multicast proto- Their productivity differs in the various using areas. For
cols, where these building blocks can be considered example, a building block-based development is more
mostly equivalent with the protocol parameters. The use productive for new types of services, but NETRIC is
of building blocks is reasonable because of the intention better for fine tuning existing, well known protocols
to make the work of a protocol-designer easier. Our in different environments.
approach shows that the idea of partitioning protocols
based on their parameters is good and can serve the
base of further research. Method
In the transport area, the RMTWG defines some
design criteria for the building blocks connected to top- The main goal of the NETRIC project is, as mentioned,
ics like the data content model, the group membership the optimization of the protocol parameters in order to
dynamics, the sender/receiver relationship, the group improve multicast reliability. However, applying any
size, the data delivery performance, and the network appropriate mathematical optimization method, the
topology with or without router level intermediate selection of the protocol parameters mentioned above
system assistance. The protocols are divided into three must be carried out to provide a linearly independent
families, on the grounds of their realization-bases: (in other words, orthogonal) set of parameters. Select-
NACK based protocols, Tree-based ACK protocols, ing these protocol parameters, basically a hyperspace
and an Asynchronous Layered Coding Protocol that of the parameters is created where all transport pro-
uses Forward Error Correction. All building blocks can tocol corresponds to one point of this space (Hossz,
be used to develop a new protocol belonging to these 2005). The optimization procedure means to find the
three protocol families, so the work of a protocol-de- most suitable point on this space to provide the best
signer gets easier. performances of multicast. The modeling procedure
However, all work described above has been made based on the introduced protocol parameter set is pre-
in only one direction, especially based on the require- sented on some examples (Handley et al., 2000). The
ments of such applications that use one-to-many bulk strangeness of this orthogonality may be weakened,
data transfer. This could mean a limit for the usability as discussed later.
of this approach, just as for defining all of the protocol To carry out a correct optimization procedure on
parameters. In the novel NETRIC protocol analyzer and the appropriately selected protocol parameters, a well
synthesizer system, a most universal interpretation of usable simulation program should be applied in order
these protocol parameters was applied, constructing to present statistically acceptable results for multicast
an orthogonal hyperspace of these. This assembly of data transfer. This problem has been solved by the mul-
parameters allows applying well known mathematical ticast simulator SimCast (Orosz & Tegze, 2001), which
methods for optimization in order to select an individual describes the performance of the transport protocols
point on this space providing the optimum set of mul- (Whetten et al., 2001). The simulator has a modular
ticast protocol parameters. However, the specification architecture, which makes it possible to choose from the
of the parameters can be done with compatibility to alternative mechanisms of each protocol parameter.
the building blocks. The system presented does iteration loops with
The design process of the building blocks was the multicast transport protocol parameters in order
done from a functionality based point of view, but the to satisfy the requirements of the upper layer media
NETRIC system uses the mechanism-based approach. applications. The synthesis is done by designating the
The aim of the building blocks is creating a develop- protocol parameters and determining the range of them,
ment framework in order to help the developers. In the based on the results of the simulation loops. Using
NETRIC
this simulator, an optimized transport protocol can be For an individual application, the protocol param-
synthesized, satisfying the requirements of a certain eters get actual values. In order to optimize a transport
media application. This means that by a mathemati- protocol, the optimal point should be found in the 31-
cal method, an optimal point in the hyperspace of the dimensional hyperspace of the protocol parameters.
protocol parameters can be found. The optimization procedure can be executed easily
if the applied protocol parameters are orthogonal to
each other. Orthogonality means that any of them can
the hyPersPace oF the be changed independently from the others. Since the
transPort Protocols selection of the applied protocol parameters is very
important, the task is to obtain a complete set of the
The possible values of protocol parameters (which are protocol parameters, which can be taken as orthogonal.
the types of various mechanisms as the components For the current set of the 31-protocol parameters, the
of the transport protocols) are the realizations of each orthogonality is not completely satisfied, but because
protocol functionality. Table 1 shows a possible set of of the fact that the importance of different protocol
31 different protocol parameters and their classifica- parameters are highly different, it can be used. A quasi-
tion into categories. The protocol parameters represent orthogonal subset of the protocol parameters and their
the well-known reliable mechanisms of the transport possible values is presented in the Table 2.
protocols (Obraczka, 1998). The protocol parameter flow control means the
The orthogonality is defined in the Euclidean space. prevention of the receivers against the overload. The
Let E be the v-dimension Euclidean space, where each data accuracy is reliable if there is a mechanism in
point is in the space is in fact a -dimensional vector. the protocol for loss recovery, and it is atomic if the
The V1, V2, , V vectors are members of the E space. protocol provides exactly the same data for all receiv-
The {V1, V2, , V} vectors are orthogonal if the fol- ers. The feedback addressee is the host which receives
lowing equation is true. the positive or negative acknowledgments.
The state control parameter defines the responsibil-
(V , V )= 0 for 1 i, j
i j , ity for loss detection. The feedback control means the
prevention of the feedback address host against the
where (Vi,Vj) is the scalar product of the vectors Vi, Vj
feedback implosion. The way of sending repair deter-
and is the dimension of the E space. In our case,
mines the applied transporting mechanism. The scope
=31.
of repair describes the responsibility of the repairing
Each multicast transport protocol parameter can be
source, which can be global or local. If its responsi-
transformed to different {V1, V2, , Vv} vectors of the
bility is global, it can send packets to every member,
E Euclidean space.
NETRIC
Table 2. The selected subset of the protocol parameters and their values
N
Protocol parameters Values
Window-based, Rate-based, Multigroup multicast, Receiver
Flow control
give-up, None
Data accuracy Reliable, Atomic, Unreliable
Feedback addressee Original source, Intermediate host, Every member, None
State control Sender-based, Receiver-based, Shared, None
Structure-based, Timer-based, Representatives-based, Rate-
Feedback control
based, None
Way of sending repair Unicast, Multicast, None
Global, Global to secondary group, Global to individual
Scope of repair
members, Local, None
Session membership
Explicit, Implicit, None
control
Session membership
Implicit Implicit Implicit Explicit
control
to a subset of the whole group (secondary group), or control parameter is none, the feedback addressee is
even to individuals only. Finally, the parameter session not obviously none, as Table 3 shows, where the actual
membership control describes the handling method of protocol parameter values of four transport protocols
hosts, which want to join to the session. This protocol are displayed.
parameter is explicit if the members of the session are The presented transport protocols are TRM: Trans-
registered and implicit if they are not. port protocol for Reliable Multicast (Sabata et al.,
The selected parameters are quasi-orthogonal only, 1996); LBRM: Log-Based Reliable Multicast (LBRM)
since there are trivial cases where the orthogonality protocol (Holbrook et al., 1995); LRMP: Light-weight
cannot be satisfied. For example, if there is no feedback, Reliable Multicast Protocol (Liao, 1996); and RAMP:
then the protocol parameters feedback addressee and Reliable Adaptive Multicast Protocol (Koifman &
feedback control will be none. However, if the feedback Zabele, 1996). All of the presented transport protocols
NETRIC
have receiver-based state control. The reason of the object loads in the network topology and the program
orthogonality of the protocol parameters is that the calculates the routing information for this topology. The
background mechanisms are independent from each Transmitter object determines the datagrams to be sent
other. to the distribution tree on the basis of the configuration
file of the data traffic. In the next step, the Scheduler
object controls the scheduling, which is nonpreemp-
aPPlIcatIon oF the sIMulator tive. The Scheduler sends a message in each simulation
time point to all routers, hosts, and transmitter objects.
Most of the formal protocol evaluation methods pub- Receiving these messages, the objects calculate their
lished in the literature are restricted to a limited set of states in the next time point and, if it is necessary,
protocols, mostly to one only. Consequently, these op- they communicate with other objects (e.g., sending a
timizations are performed on the protocol mechanisms package). The Scheduler updates the display in each
fitting their attributes of conditions of the actual network simulation time point. The objects, which participate in
and the requirements of the applications. However, the the simulation, are in relation with the Logger object,
comprehensive selection of the protocol mechanisms which logs the saturation of the nodes and transmission
during the optimization should lead to better results. The of the packages, respectively.
multicast transport simulator for multicast (SimCast) The simulator needs three kinds of inputs, namely
has been developed earlier to describe the performance the network topology, the parameters of the multicast
of the transport protocols (Orosz & Tegze, 2001). delivery, and the input datagrams to be transmitted. In
The SimCast simulator contains a network layer order to define the network topology, the routers, links,
model that can create a distribution tree. However, and hosts must be configured with the appropriate at-
the SimCast can also use the output of other network tributes. In the case of routers, the necessary parameters
simulators, including the multicast distribution tree are the network address and the packet FIFO size and,
created by them. Its reason is that the SimCast is devel- furthermore, the processing speed of the router and
oped first of all for evaluating the transport protocols, the position of the network topology schematic on the
and the performance of the delivery based on these display. The network layer address is composed of the
protocols are partly independent from the underlying identifier in the local network and the local address of
network. Modifications have been made on the SimCast the host or router. This is a simplified model compared
simulator in order to achieve a better usability of it in to the IP addressing system; however, for performing
the NETRIC system. the simulation, the differentiation of the various IP
The architecture of the simulator SimCast is shown in address classes is not necessary.
Figure 1. By using the configuration files, the Manager
NETRIC
In the configuration of the host, the attributes are serial number of the latest successfully sent package.
similar to the parameters of the routers, with the only If the serial number of the arriving package is less than
difference that in this case no parameter representing the expected value, the router forwards the package on
the speed of the router is necessary. If the addressee of the distribution tree, since it is possible that the actual
the packet to be transmitted is in the LAN of the actual package is a repair one to another node. If the serial
host, the packet is delivered directly to the addressee; number equals the weighted value, the router forwards
otherwise the sender sends the packet to the local router, the package, too, and it modifies its registry of the serial
which takes care of the delivery to the destination. The number of the latest successfully received package. If
local identifier part of the network address is 0 in the the serial number is larger than the expected value, the
case of routers and a number larger than 1 for hosts. In router drops the package.
the case of links, the following parameters should be
defined: the network addressees of the two routers to be
connected, the delay parameter of the link, and a flag of the global structure oF the
the availability of the connection. The delay parameters systeM
are used in the case of routing information.
In the multicast simulation, the packets are ordered, The NETRIC system can be used to automate the
and so the packet can be trace-routed on the basis of process of designing a new multicast protocol, based
the output files. The packets arrive to the FIFO of the on the requirements of a specific application. The au-
routers or hosts, which forward the first arrived packets tomation means that not only can the optimal values
first. The routers forward the packets to other routers of a set of protocol parameters be determined, but the
or hosts, and finally, the network layer protocol entities optimal value of these protocol parameters can be
of the receiving hosts forward them to its higher layer determined, too.
protocol entity (see Figure 2). As seen before, discrete set of protocol parameters
The processing time of the packet depends on the can be defined based on the existing transport protocols,
speed of the router, which is defined in the network and the property space of these parameters can also
configuration file, and the size of the packet, which be declared. In order to achieve the best protocol for
on the other hand is defined in the configuration file of a specific application, we use these parameters as ele-
the data traffic. A packet loss can appear if the FIFO of ments and try to determine the optimal set of protocol
the destination machine becomes full. In the simula- parameters and the properties of them. Figure 3 shows
tor, the hosts use negative acknowledgment to request the structure of the NETRIC system.
retransmission. The routers and the hosts register the
NETRIC
After a simple, rule based pre-optimization, we get parameters, a novel protocol classification way can
a reduced hyperspace of protocol parameters, which be carried out, which is used in the NETRIC protocol
can be used as the input of the simulator. The SimCast analyzer and synthesizer system. By using the presented
simulator takes the information about the parameters model of the transport mechanisms and the NETRIC
of the network and the reduced hyperspace and does synthesizer, the design and the verification of new
the simulation with the information of the features multicast transport protocols can be improved.
of the application. The results serve as the base of
an optimization method, which can act back to the
set of protocol parameters (for example, prohibiting reFerences
some of them), or only to the simulation (setting some
parameter properties). At the end of the simulation-
Handley, M., Whetten, B., Kermode, R., Floyd, S.,
optimization loop, we will get the set of the optimal
Vicisano, L., & Luby, M. (2000). The reliable multicast
protocol parameters and the optimal properties of these
design space for bulk data transfer. Internet Engineer-
parameters. At the end of the optimization, the system
ing Task Force, Request for Comments (RFC) 2887.
NETRIC carries out the optimal values of the given
Retrieved February 26, 2008, from http://www.ietf.
set of protocol parameters.
org/rfc/rfc2887.txt
Holbrook, H.W., et al. (1995). Log-based receiver-re-
conclusIon liable multicast for distributed interactive simulation.
In Proceedings of the ACM SIGCOMM Symposium
The transport protocols improve the reliability of on Communication, Architectures and Protocols (pp.
the IP multicast delivery. The development of such 328-341). ACM Press.
protocols needs the knowledge of the fundamental
transport mechanisms. In this article, a decomposition Hossz, G. (2005). Reliability issues of the multicast-
of multicast transport protocols into various protocol based mediacommunication. In M. Pagani (Ed.), En-
mechanisms was presented. The protocol mechanisms cyclopedia of multimedia technology and networking
belonging to the same functionality form the possible (pp. 875-881). Hershey, PA: Idea Group Reference
values of so-called protocol parameters, which can be Koifman, A., & Zabele, S. (1996). Ramp: A reliable
taken as quasi-orthogonals. On the basis of the protocol adaptive multicast protocol. In Proceedings of the IEEE
0
NETRIC
INFOCOM 1996 (pp. 1442-1451). San Francisco: IEEE Hyperspace of Protocol Parameters: This abstract
Computer Society Press. space is composed of the possible values of each prop- N
erty of the multicast transport protocols. The values
Levine, B.N., & Garcia-Luna-Aceves, J.J. (1998). A
represent various protocol mechanisms.
comparison of reliable multicast protocols. In Multi-
media Systems (pp. 334-348). Springer-Verlag. IETF (Internet Engineering Task Force): A vol-
untary association for developing Internet standards.
Liao, T. (1996). Light-weight reliable multicast protocol
as an extension to RTP. Inria Co. Retrieved February Internet Protocol (IP): The network-level protocol
26, 2008, from http://webcanal.inria.fr/lrmp used in the Internet.
McCanne, S. (1997). Scalable multimedia communi- IP-Multicast: Network-level multicast technology,
cation with Internet multicast: Light-weight sessions which uses the special class-D IP-address range. It re-
and the MBone. University of California, Berkeley. quires multicast routing protocols in the network routers.
Retrieved February 26, 2008, from http://www.ncstrl. Its other name is network-level multicast (NLM).
org
Multicast: One-to-many and many-to-many com-
Obraczka, K. (1998). Multicast transport protocols: A munication way among computers (hosts).
survey and taxonomy. IEEE Communications Maga-
Multicast routing protocol: In order to forward the
zine, 36(1).
multicast packets, the routers have to create multicast
Orosz, M., & Tegze, D. (2001). The SimCast Multicast routing tables using multicast routing protocols.
Simulator. In Proceedings of the International Work-
Multicast Transport Protocol: To improve the
shop on Control & Information Technology, IWCIT01,
reliability of the multicast delivery, special transport
Ostrava, Czech Republic: Faculty of Electrical Engi-
protocols are used in addition to the unreliable User
neering and Computer Science, VSB-TU (pp. 66-71).
Datagram Protocol (UDP).
ISBN 80-7078-907-7.
RFC (Request for Comments): The IETF publish
Sabata, B., et al. (1996). Transport protocol for reliable
them as de facto standards of the Internet.
multicast: TRM. In Proceedings of the IASTED Inter-
national Conference on Networks (pp. 143-145). TTL (Time-to-Live): A field in the IP packet header.
Its value is the allowed hop-count, the number of rout-
Whetten, B., Vicisano, L., Kermode, R., Handley,
ers, which can forward the packet before delivery or
M., Floyd S., & Luby, M. (2001). Reliable multicast
dropping out.
transport building blocks for one-to-many bulk-data
transfer. Internet Engineering Task Force, Request for Unicast Transport Protocol: They handle the ports
Comments (RFC) 3048. Retrieved February 26, 2008, in each computer or improve the reliability of the uni-
from http://www.ietf.org/rfc/rfc3048.txt cast communication. As examples, the User Datagram
Protocol (UDP) is a simple unicast transport protocol
Yu, B. (2001). Survey on TCP-friendly congestion
mainly for port-handling, and the Transmission Control
control protocols for media streaming applications.
Protocol (TCP) is intended for reliable file transfer.
Retrieved February 26, 2008, from http://cairo.cs.uiuc.
edu/~binyu/writing/binyu-497-report.pdf Unicast: The one-to-one communication way, where
only one host transfers data with another host. In the
traditional IP, the unicast is applied.
Key terMs
Section: Product ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Network Management Resource Costs
SNMP messages
Network Management Resource Costs
Network Management Resource Costs
appropriate repairs. Our simulation results revealed The need to react and respond to network problems
that in an otherwise healthy network, it was difficult also generates data transfer requirements. Network N
to generate enough SNMP data of this type to have a managers in such situations respond by collecting as
measurable impact on overall network loading, though much data as possible (often in excess of that needed)
it is recognised that this might change where there is thereby increasing network loading (Donelan et al.,
network congestion. 2004). Also detecting intrusion attacks needs a vari-
ety of data from a number of different devices and.
snMP extensions particularly importantly, it is required quickly so that
a defence against the attack can be mounted before
Almost from its introduction, concerns were raised the full damage is inflicted (Pattinson & Hajdarevic,
about the performance of SNMPv1, in particular its 2004). As network size and complexity increase, data
ability to deliver large volumes of data. This relates collection at a single point becomes unsustainable.
particularly to traversal of a tree or table of data. For Delegation of management defers, rather than addresses,
example, applications which require information the onset of the problem.
about a particular devices routing table would expect
to retrieve all, or most of, that table. The mechanism Mobile agents
(tree walk) is simple, but its nave form creates
many requestresponse pairs, data retrieval overheads Rather than taking data to managers, management
are high, and the delay involved can mean the tables functionality can traverse the network, analysing data
content changes between the start and end of retrieval. and making decisions as it goes. Proponents of mobile
Therefore, modifications have been suggested, includ- agents (MAs) claim significant savings in bandwidth
ing retrieval of multiple data items (retrieving more and improved responsiveness. Performance analysis
than one column of data at once) (Rose, McCloghrie, & (Huang, 2003) indicates:
Davin, 1990); the get bulk operator (Rose, 2004); and SNMP generates more transactions than MAs, al-
different sequences of table traversal (Breitgand, Raz, & though MA transactions typically carry more payload
Shavitt, 2002). Some of these mechanisms use existing than SNMP ones. In LAN environments, MAs generate
SNMP specifications, others require modification and more data (per polling period) than SNMP agents. MAs
deployment in existing networks is more problematic. outperform SNMP agents in traffic efficiency when
In particular, the last mentioned creates an entirely new the initial MA sent out by the management station is
SNMP operator called get previous, which traverses >1000 bytes and the size of the domain is small (>50
the tree in reverse order to other operators. devices).
Published results from experiments with these modi- In WAN/LAN environments, MAs generate less
fications generally show improved retrieval time and network traffic than SNMP-agents, because with the
reduced data transfer overheads. Roses (1994) multiple former, only initial transfers from, and last returns to,
retrievals gave a sixfold reduction in retrieval time for the management station traverse the WAN, therefore
large tables, while using the get bulk operator produces only two WAN propagation delays (typically high) occur
an order of magnitude improvement over this; and the in each polling period. Conversely, in the SNMP-agent
get previous operation offers two orders of magnitude paradigm, every SNMP PDU travels across the WAN,
increase in speed and two to three orders of magnitude thus incurring two WAN propagation delays (for the
decrease in bandwidth over nave tree traversal (Bre- request and the reply PDU).
itgand et al., 2002). However, in all these cases, the
data transfer remains concentrated; all data are passed xMl vs. snMP Performance
to the network manager for further processing. As the
network grows, this becomes unsustainable, leading to Some of the most influential figures in network manage-
the development of so-called delegated management ment development indicated that the future of network
support, where multiple managers control subsets of management is XML-based, and further development
the network, coordinated by a Manager of Managers of SNMP is unlikely (Pras, Schnwlder, & Festor,
(MoM). 2004). This possible paradigm shift (Pras et al., 2004)
means that the future network management applications
Network Management Resource Costs
Network Management Resource Costs
Rose, M. (1994). The simple book (2nd ed.). Prentice Power-Saving Network Management: A growing
Hall. awareness that networked devices are a significant N
power drain, even when inactive. The traditional net-
Rose, M., McCloghrie, K., & Davin, J. (1990, October).
work management processes (device polling, health
Request for comments: 1187, bulk table retrieval with
checks, fault and intrusion detection by anomaly) are
the SNMP.
predicated on the requirement that networked devices
are able and ready to report their status (and to monitor
Key terMs the status of neighbors) on a regular basis, and where a
lack of response is taken as an indication of potential
Centralized/Distributed Management: In small- device or connection failure. Therefore, networked
scale networks, it is possible to create a centralized devices typically remained powered on so that they
network management platform, to which all manage- can respond to checks on a regular basis.
ment data is delivered, at which all decisions are taken, SNMP: The Simple Network Management Protocol
and from which all management commands are issued. is an IETF communications protocol designed to sup-
There are clearly limitations to the size of the network port the function of network management. In its most
which can be controlled in this manner, limits being basic form, it provides support for data retrieval, for
created by the bottlenecks of transfer and processing modifying data in controlled devices, and for generat-
of data at a single location. ing alerts. Extensions allow communication between
Management Agent: A software process able to network managers. The original SNMP, now called
support some or all of the network management activ- SNMP version 1 (SNMPv1) is a simple client-server
ity required on a networked device. Agents are able protocol, with no in-built security; successive enhance-
to access and, where appropriate, modify data on the ments brought about SNMPv2, which included more
devices themselves. Agents are of two major flavors: efficient methods for handling larger volumes of data,
static agents, which reside on the managed device and and SNMPv3, with in-built authentication, encryption,
respond to management requests; and mobile agents, and other security features.
which are able to transfer between devices, collecting XML-Based Network Management: A proposal to
data, making decisions, and affecting device behavior use the Extended Markup Language (XML) to support
as they move. Web-based access to network management facilities in
MIB: The Management Information Base is a virtual place of an SNMP-based mechanism. This is expected
repository of network management data, conceptually to have the advantage of making use of universally
located on the devices managed. Software called a man- available Web support software, so removing the need
agement agent possesses the knowledge to extract real for explicit SNMP protocols, therefore enabling the net-
data necessary to populate the MIB, whether by direct work management toolset to be richer and more easily
retrieval of a specific data item or by some processing provided. A possible disadvantage is the extra load on
activity. SNMP requests and responses use MIB names the network created by this enhanced functionality.
to identify their data.
Network Management: The process of controlling
a computer network to ensure it delivers an appropriate
service to its users. This term also refers to the software
and other equipment used to support this activity. Much
of the information required by a network manager is
located in the devices which make up the network, in
particular, monitoring stations; and producing a com-
plete understanding of the network behavior requires
information from different locations, hence either the
decision maker must fetch the data, or the decision
maker must travel to the location(s) of the data.
Section: Product ICT
v2 b v5 b - v5 b -
(a) (b)
v3 c v4 d v6 c v7 e v6 c v7 e
v8 d v8 d
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
A New Algorithm for Minimizing Tree Pattern Queries
needs O(|Q|2) time and O(|Q|leafQ) space, where leafQ To see how to reduce a TPQ by using ICs, let us
represents the number of the leaf nodes of Q. have a look at Figure 1(b). If b c is known to hold N
in the input database, the tree shown in this figure can
be reduced to the tree shown in Figure 2(a). If e d
bacKground holds besides b c, it can further be reduced to the
tree shown in Figure 2(b).
In this section, we define the minimization of TPQs In some cases, in the presence of subtype constraints,
and review the related work. a query tree may also be reduced. For example, in the
presence of b b and c c, the tree shown in Figure
Minimization of TPQs 2(c) can be reduced to the tree shown in Figure 2(d).
v1 a v1 a a a
v5 b - v5 b - b- b b-
(a) (b) (c) (d)
v7 e v7 e c c
c
v8 d
A New Algorithm for Minimizing Tree Pattern Queries
the global minimality property: a minimum tree pat- As a simplified version of general constraint de-
tern equivalent to a given tree pattern p can be found pendent minimization, the minimization of TPQs was
among the subpatterns of p, and thus can be obtained studied by Amer-Yahia et al. (2001). They proposed an
by pruning redundant branches from p. Based on such O(n6) time to minimize a TPQ in the presence of three
an observation, they designed an algorithm for the tree kinds of integrity constraints shown above. Ramanen
pattern minimization which works, in general cases, in (2000) tried to improve Amer-Yahias algorithm and
time exponential w.r.t. the size of input tree patterns. proposed an O(n2) algorithm for minimizing queries
They also characterized the complexity of the minimiza- in the absence of integrity constraints, and an O(n4)
tion problem, showing that given a tree pattern p in an algorithm for minimizing queries in the presence of the
XPath fragment and a positive integer k, the problem above three kinds of integrity constraints. Ramanens
of testing if minimize(p) > k is NP-complete. algorithm needs O(n2) space.
Discovering extreme markup language (XML) Finally, there is a lot of research on the XML query
semantic constraints plays an important role in TPQ evaluation, such as the methods based on tree paths
minimization and has recently received increasing at- (Wang & Meng, 2005; Wang, Park, Fan, & Yu, 2003),
tention in the research community. In particular, Lee twig joins (Bruno, Koudas, & Srivastava, 2002; Chen,
and Chu (2000) showed a variety of semantic con- Lu, & Ling, 2005; Fontoura, Josifovski, Shekita, &
straints hidden implicitly or explicitly from the DTD Yang, 2005; Jiang, Wang, Lu, & Yu, 2003; Jiang, Wang,
of an XML database, and proposed two algorithms on & Lu, 2004), and labeled trees (Lakshmanan, Ramesh,
discovering and rewriting the semantic constraints in Wang, & Zhao, 2004), as well as the method based
relational database notation. Yu and Popa (2004) studied on parse trees (Gottlob, Koch, & Pichler, 2005). All
the problem of constraint-based XML query rewriting these methods, however, cannot be utilized for TPQ
for the purpose of data integration. Two novel algo- minimization.
rithms, basic query rewrite and query resolution, have
been designed to implement the semantic constraints.
More concretely, the basic query rewriting algorithm algorIthM descrIPtIon
first reformulates input queries based on containment
mapping in terms of the source DTD (no constraint In this section, we discuss our algorithm for query
considered). The query resolution algorithm then minimization according to the definition given in
generates additional rewritings by incorporating XML Section 1. The main idea of this algorithm is to search
semantic constraints. both T and Q bottom-up and checking the subtree em-
Query minimization in the presence of XML bedding by generating dynamic data structures. In the
constraints has also been studied by several authors. process, a tree labeling technique is used to facilitate
Calvanese, DeGiacomo, and Lenzerini (1998) studied the recognition of nodes relationships. Therefore, in
the problem of conjunctive query containment in the the following, we will first show the tree labeling in
presence of a special class of inclusion dependencies 3.1. Then, in 3.2, we discuss the main algorithm. In 3.3,
and established some decidability/indecidability results. we prove the correctness of the algorithm and analyze
In addition, Wood (2001, 2003) studied a special class its computational complexities.
of XPath queries that he called simple XPath queries.
A simple XPath query is a tree pattern query without
descendant child (nodes), but with a flexibility that tree labelIng
allows a wildcard, standing for any type of nodes.
Wood showed that, in the absence of constraints, the Before we give our main algorithm, we first restate
minimal query equivalent to a simple XPath query can how to label a tree to speed up the recognition of the
be found in polynomial time. Miklau and Suciu (2002) relationships among the nodes of trees. Consider a tree
explored the problem in a different way, showing that T. By traversing T in preorder, each node v will obtain
the minimization of TPQs that contain both child and a number (it can be an integer or a real number) pre(v)
descendant nodes as well as nodes labeled * is a co-NP to record the order in which the nodes of the tree are
complete problem. visited. In a similar way, by traversing T in postorder,
each node v will get another number post(v). These
00
A New Algorithm for Minimizing Tree Pattern Queries
two numbers can be used to characterize the ancestor- will check each node j in Q against all the other nodes
descendant relationships as follows. i. In order to know whether Q[i] can be embedded into N
T[j], we will check whether the following two condi-
Proposition 1. Let v and v be two nodes of a tree tions are satisfied:
T. Then, v is a descendant of v if pre(v) > pre(v) and
post(v) < post(v). 1. label(j) = label(i).
2. Let i1, ..., ik be the child nodes of i. For each ia (a
Proof. See Exercise 2.3.2-20 in Knuth (1969). = 1, ..., k), if (i, ia) is a c-edge, there exists a child
node jb of j such that Q[jb] contains Q[ia]; if (i, ia)
If v is a descendant of v, then we know that pre(v) > is a d-edge, there is a descendent j of j such that
pre(v) according to the preorder search. Now we assume Q[j] contains Q[ia].
that post(v) > post(v). Then, according to the postorder
search, either v is in some subtree on the right side of To facilitate this process, we will associate each j in
v, or v is in the subtree rooted at v, which contradicts Q with a set of nodes: {i1, ..., ij} such that for each ia
the fact that v is a descendant of v. Therefore, post(v) {i1, ..., ij} Q[ia] can be root-preservingly embedded into
must be less than post(v). The following example helps Q[j]. This set is denoted as M(j). In addition, each i in
for illustration. Q is also associated with a value (i), defined as:
Example 1. See the pairs associated with the nodes i. Initially, (i) is set to .
of the tree shown in Figure 3. The first element of each ii. During the computation process, (i) is dynami-
pair is the preorder number of the corresponding node cally changed. Concretely, each time we meet a
and the second is its postorder number. With such node j in Q, if i appears in M(jb) for some child
labels, the ancestor-descendant relationships can be node jb of j, then (i) is changed to j.
easily checked. For instance, by checking the label
associated with v2 against the label for v6, we see that In terms of above discussion, we give the algorithm
v2 is an ancestor of v6 in terms of Proposition 1. Note in Algorithm 1.
that v2s label is (2, 6) and v6s label is (6, 3), and we In the above algorithm, each time we meet a j in Q,
have 2 < 6 and 6 > 3. We also see that since the pairs we will establish the new values for all those nodes,
associated with v8 and v5 do not satisfy the condition which appear in (j1), ..., (jk), where j1, ..., jk repre-
given in Proposition 1, v8 must not be an ancestor of sent the child nodes of j (see lines 1-4). In addition,
v5 and vice versa. for any i in (jl)s (l = 1, ..., k), it will be marked to
be removable if it is neither a leaf node nor an output
Definition 1. (label pair subsumption) Let (p, q) and node. Then, all (jl)s (l = 1, ..., k) are removed (see
(p, q) be two pairs associated with nodes u and v. We line 5). In a next step, we will check j against all the
say that (p, q) is subsumed by (p, q), denoted (p, q) nodes i in Q (see lines 6-13). If i is not subsumed by
(p, q), if p > p and q < q. Then, u is a descendant of j and label(i) = label(j), we will check (i1), ..., (ig),
v if (p, q) is subsumed by (p, q). In the following, we where i1, ..., ig are the child nodes of i. If (i, il) (l
also use T[v] to represent a subtree rooted at v in T. {1, ..., g}) is a c-edge, we need to check whether (il)
= j (see line 11). If (i, il) (l {1, ..., g}) is a d-edge,
we simply check whether (il) is subsumed by j (see
algorIthM For query line 12). If all the child nodes of i survive the above
MInIMIzatIon checking, we get a root-preserving embedding of the
subtree rooted at i into the subtree rooted at j. In this
Now we discuss our algorithm for twig pattern match- case, we will insert j into M(j) (see line 13) and report
ing. During the process, the query tree Q is searched j as one of the answers if i is the root of Q (see line
bottom-up. That is, the nodes in Q will be accessed 12). In line 15, all the subtrees rooted at a marked node
along their postorder numbers. Therefore, for conve- will be removed.
nience, we refer to the nodes in Q by their postorder
numbers, instead of their node names. In each step, we
0
A New Algorithm for Minimizing Tree Pattern Queries
Algorithm 1.
Algorithm Query-minimization(Q)
Input: query tree Q (with nodes 1, ..., |Q|)
Output: a minimized Q
begin
1. for j := 1, ..., |Q| do
2. {let j1, ..., jk be the children of j;
3. for l := 1, ..., k do
4. {for each i M(jl) do {(i) j; if i is neither a leaf nor an output node, mark i to be removable;}
5. remove M(jl);}
6. for i := 1, ..., |Q| do
7. if i is no subsumed by j then
8. {if label(i) = label(j) then
9. {let i1, ..., ig be the children of i;
10. if for each il (l = 1, ..., g) we have
11. (i, il) is a c-edge and (il) = j, or
12. (i, il) is a d-edge and (il) is subsumed by j;
13. then insert i into M(j);}
14. }
15. remove all the subtrees rooted at a marked node;
end
Example 1. Consider the query tree Q shown in Both the checkings are successful. It indicates that
Figure 1(a) once again. Before we apply the algorithm Q[v5] contains Q[v2]. V2 is neither a leaf node nor an
to Q, the nodes in Q are first numbered in postorder, output node. Thus, it will be marked to be removable.
as shown in Figure 3. In the eighth step, we will meet the root of Q. No fur-
ther checking will be performed. In the final step, we
In the first two steps, we will generate M(v3) = {v6} remove the subtree rooted at the marked node v2, getting
and M(v4) = {v8}. In the third step, we first create (v6) a reduced query tree shown in Figure 1(b).
= v2 and (v8) = v2. In the subsequent searching, we will
meet v5. Since v5 is not subsumed by v2 and label(v2) = correctness and computational
label(v5), we will check all the child nodes of v5: v6 and complexity
v7 and find that (v6) = v2 but (v7) v2 So Q[v5] cannot
be embedded into Q[v2]. In the fourth and fifth steps, In this subsection, we show the correctness of the
we will generate M(v6) = {v3} and M(v8) = {v4}. algorithm given in 3.2 and analyze its computational
In the sixth step, we will check v7 and create (v4) complexity.
= v7. Since v7 does not match any other node, the child
nodes will not be checked. In the seventh step, we check Correctness. The correctness of the algorithm consists
v5. We remark that at this time point we have M(v6) = in a very important property of postorder numbering
{v3} and M(v7) = {}. So we will generate (v3) = v5. described in the following lemma.
Since v5 is not subsumed by v5 and label(v2) = label(v5),
the child nodes of v2 will be checked as follows: Lemma 1. Let v1, v2, and v3 be three nodes in a tree
with post(v1) < post(v2) < post(v3). If v1 is a descendent
v3 is a c-child node v2. So we check whether (v3) of v3, then v2 must also be a descendent of v3.
= v5.
v4 is a d-child node v2. So we check whether (v4) Proof. We consider two cases: (1) v2 is to the right
is subsumed by v5. of v1, and (2) v2 is an ancestor of v1. In case (1), we
0
A New Algorithm for Minimizing Tree Pattern Queries
Figure 3. Postorder numbering appears in M(v1), ..., M(vk). Without loss of generality,
assume that v = vi for some i {1, ..., k} and there N
v1 a 8 exists a j such that post(vj) < post(v) < post(vj+1). Then,
v2 b 3 v5 b - 7 at the time point when we check v, the actual value of
v3 c v4 d v6 c 4 v7 e 6 (v) is the postorder number for vjs parent, which is
1 2 equal to v or whose postorder number is smaller than
v8 d 5 post(v). If it is equal to v, then (v) is subsumed
by v, contradicting (2). If post((v)) is smaller than
post(v), we have:
0
A New Algorithm for Minimizing Tree Pattern Queries
Figure 5. Illustration for c-edge checking1 where leafQ represents the number of the leaf nodes of
Q. It is because at any time point for any two nodes on
Q:
the same path in T only one is associated with a M.
v a v a
v c v b v1 b v2 c Future trends
M(v) = {, v1, }. (v1 ) is changed to v when v
v b is recognized to be the parent of v. As shown in the second section, a query tree may be
M(v)
) = {, v1, }. (v 1) has been once set to further reduced in the presence of integration con-
straints. The existing method (Ramanen, 2000) needs
to augment a tree using the following rules:
|Q| d j |Q|
O( M ( ji ) ) (|Q| d j ) = O(|Q|2),
j =1 i =1 j =1 conclusIon
where dj is the outdegree of j.
In this article, a new algorithm for the minimization
2. The second part is the time used for constructing
of tree pattern queries has been discussed. The algo-
|Q| rithm runs in O(n2) time and (nleafQ) space, where
M(j)s. For each node j in Q, we need O( d i ) leafQ represents the number of the leaf nodes of Q. In
i =1 comparison with the existing methods, our method
time to do the task. So this part of cost is bounded
maintains a quite simple structure and uses much less
by space. Although our algorithm has the same worst-case
time complexity as Ramanens, it works in less time
|Q| |Q| |Q|
O( d i ) O( | Q | ) = O(|Q|2). on average. It is because during the process, a much
j =1i =1 j =1 smaller data structure is produced. In the presence
of three kinds of integrity constrains (required child,
The space overhead of the algorithm is easy to required descendant, and subtype), Ramanens method
analyze. During the processing, each j in Q will be can be incorporated into our algorithm to produce a
associated with a M(j). But M(j) will be removed later O(n4) time solution to the problem.
once js parent is encountered and for each i M(j)
its value is changed. Therefore, the total space is
bounded by: reFerences
O(leafQ|Q| + |Q|), Amer-Yahia, S., Cho, S.R., Laksmanan, L.V., & Sriv-
astava, D. (2001). Minimization of TPQs. In Proceed-
0
A New Algorithm for Minimizing Tree Pattern Queries
ings of the ACM SIGMOD International Conference Gottlob, G., Koch, C., & Pichler, R. (2005, June). Ef-
on Management of Data (pp. 497-508). ficient algorithms for processing XPath queries. ACM N
Transactions on Database Systems, 30(2), 444-491.
Bruno, N., Koudas, N., & Srivastava, D. (2002). Ho-
listic twig joins: Optimal XML pattern matching. In Jiang, H., Wang, W., Lu, H., & Yu, J. (2003). Holistic
Proceedings of the ACM SIGMOD. twig joins on indexed XML documents. In Proceed-
ings of VLDB.
Calvanese, D., DeGiacomo, G., & Lenzerini, M. (1998).
Decidability of query containment under constraints. In Jiang, H., Wang, W., & Lu, H. (2004). Efficient
Proceedings of the 17th ACM Symposium on Principles processing of XML twig queries with OR-predicates.
of Database Systems (pp. 149-158). In Proceedings of ACM SIGMOD.
Chamberlin, D.D., Clark, J., Florescu, D., & Stefanescu, Knuth, D.E. (1969). The art of computer programming
M. (1999). XQuery1.0: An XML query language. Re- (vol. 1). Reading, MA: Addison-Wesley.
trieved February 27, 2008, from http://www.w3.org/
Krishnamurthy, R., Kaushik, R., & Naughton, J. (2004,
TR/query-datamodel/
August 31-September 4). Efficient XML-to-SQL query
Chamberlin, D.D., Robie, J., & Florescu, D. (2000). translation: Where to add the intelligence. In Proceed-
Quilt: An XML query language for heterogeneous data ings of VLDB, Toronto, Canada (pp. 144-155).
sources. In Proceedings of WebDB 2000.
Lakshmanan, L., Ramesh, G., Wang, H., & Zhao, Z.
Chan, C.-Y., Fan, W., & Zeng, Y. (2004, August 31- (2004, August 31-September 3). On testing satisfiabil-
September 3). Taming XPath queries by minimizing ity of tree pattern queries. In Proceedings of VLDB,
Wildard steps. In Proceedings of VLDB, Toronto, Toronto, Canada (pp. 120-131).
Canada (pp. 156-165).
Lee, D., & Chu, W.W. (2000). Constraints-preserving
Chen, T., Lu, J., & Ling, T.W. (2005). On boosting transformation from XML document type definition
holism in XML twig pattern matching using structural to relational schema. In Proceedings of the 19th In-
indexing techniques. In Proceedings of the ACM SIG- ternational Conference on Conceptual Modeling (pp.
MOD Conference. 323-338).
Deutch, A., Fernandex, M., Florescu, D., Levy, A., Miklau, G., & Suciu, D. (2002). Containment and
& Suciu, D. (1998). A query language for XML. In equivalence for an XPath fragment. In Proceedings of
Proceedings of WWW99. the 21st ACM Symposium on Principles of Database
Systems.
Fan, W., & Simeon, J. (2000). Integrity constraints for
XML. In Proceedings of the ACM PODS Conference Ramanan, P. (2000). Efficient algorithms for minimiz-
(pp. 23-34). ing tree pattern queries. In Proceedings of the ACM
SIGMOD Conference.
Flesca, S., Furfaro, F., & Masciari, E. (2003). On the
minimization of Xpath queries. In Proceedings of the Wang, H., & Meng, X. (2005, April). On the sequencing
29th VLDB Conference, Berlin, Germany. of tree structures for XML indexing. In Proceedings
of the Conference on Data Engineering, Tokyo, Japan
Florescu, D., Levy, A., & Suciu, D. (1998). Query
(pp. 372-385).
containment for conjunctive queries with regular ex-
pressions. In Proceedings of the 17th ACM Symposium Wang, H., Park, S., Fan, W., & Yu, P.S. (2003, June).
on Principles of Database Systems (pp. 139-148). ViST: A dynamic index method for querying XML
data by tree structures. In Proceedings of the SIGMOD
Fontoura, M., Josifovski, V., Shekita, E., & Yang, B.
International Conference on Management of Data,
(2005). Optimizing cursor movement in holistic twig
San Diego, CA.
joins. In Proceedings of ACM CIKM.
Wood, P.T. (2001). Minimizing simple XPath expres-
Garey, M.R., & Johnson, D.S. (1979). Computers and
sions. In Proceedings of WebDB.
intractability: A guide to the theory of NP-complete-
ness. New York: W.H. Freeman & Co.
0
A New Algorithm for Minimizing Tree Pattern Queries
Wood, P.T. (2003). Containment for XPath frag- Tree Embedding: A mapping that maps a tree
ments under DTD constraints. In Proceedings of 9th pattern query into an XML document by which the
International Conference of Database Theory (pp. node types, and parent-child and ancestor-descendent
300-314). relationships are preserved.
World Wide Web Consortium. (1999, November 19). Tree Labeling: A method to assign the nodes of
XML path language (XPath) (W3C Recommenda- a tree a number or a bit string, which reflects some
tion, Version 1.0). Retrieved February 28, 2008, from relationshiops among the nodes and can be used to
http://www.w3.org/TR/xpath facilitate computation.
World Wide Web Consortium. (2001, December). Tree Pattern Minimization: A process to recognize
XQuery 1.0: An XML query language (W3C Recom- similar parts in a tree pattern query. All the similar parts
mendation, Version 1.0). Retrieved February 28, 2008, will be removed to reduce the size of the query.
from http://www.w3.org/TR/xquery
Tree Pattern Query: Queries represented as a tree
Yu, C., & Popa, L. (2004). Constraint-based XML structure, where the nodes are types from {*} (*
query rewriting for data integration. In Proceedings is a wildcard, matching any node type), and edges are
of the ACM SIGMOD International Conference, Paris, parent-child or ancestor-descendant relationships.
France. Among all the nodes of a query Q, one is designated as
the output node, denoted by output(Q), corresponding
to the output of the query.
Key terMs
XML Document: A document consisting of an
Document Database: A database designed for (optional) XML declaration, followed by either an
managing and manipulating XML documents or even (optional) DTD or XML schema, and then followed
more generic SGML documents. by a document element.
Integrity Constraints: A set of rules that the
data in an XML document database satisfy, such as
required child, required descendent, and type-subtype
relationship.
0
Section: Product ICT 0
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
A New Algorithm for Subset Matching Problem Based on Set-String Transformation
a a a a
b a b b d d b a b b d d
c c c c e e c c c c c e e c
t t1 t2 t3 t4 t5 t6 t7 t t1 t2 t3 t4 t5 t6 t7
a match not a match
a a a a
c c c c c c
p p1 p2 p3 p p1 p2 p3
(a) (b)
Figure 2. A 0-1 matrix for a text string In this trie, for each node, its left outgoing edge
1 2 3 4 5 6 7
is labeled with a string beginning with 0 and its right
a 1 1 0 1 0 0 0 outgoing edge is labeled with a string beginning with
b 1 0 1 1 0 0 0
c 1 1 1 1 0 0 1 1; and each path from the root to a leaf node represents
d 0 0 0 0 1 1 0
e 0 0 0 0 1 1 0 a bit string that is different from the others. In addi-
tion, each leaf node v in trie(T) is associated with a
set containing all those tis that have the same string
matching to solve the problem. Concretely, we will represented by the path from the root to v. Then, t can
generate a suffix tree over t' and search the suffix tree be transformed as follows:
against p' in a way similar to the traditional methods.
If the size of the alphabet is small, our method needs Number all the leaf nodes of the trie from left to
only O(n + m) time. But in general cases, it needs O(n right (see Figure 3 for illustration).
+ mn0.5) time on average. Replace each ti in t with an integer that numbers
The remainder of the article is organized as fol- the leaf node, with which a set containing ti is
lows. In the second section, we discuss our algorithm, associated.
which is designed based on a transformation of subset
matching problems. In the third section, we analyze For example, the text string t shown in Figure 1(a)
the average time of a trie searching, which shows the will be transformed into a string t' as shown in Figure
average cost of our method. Finally, the fourth section 3(b), in which each position is an integer. For this
is a short conclusion. example, t1 and t4 are replaced by 5, t2 by 4, t3 by 3, t5
and t6 by 1, and t7 by 2.
In order to find all the sets in t, which contain a certain
algorIthM descrIPtIon pj, we will search trie(T) against b(pj) as below.
Assume that = {1, ..., k}. We construct a 0-1 matrix (i) Denote the ith position in b(pj) by b(pj)[i].
T = (aij) for t = t1t2 ... tn such that aij = 1 if i tj and aij (ii) Let v (in trie(T)) be the node encountered and
= 0 if i tj (see Figure 2 for illustration). In the same b(pj)[i] be the position to be checked. Denote
way, we construct another 0-1 matrix P = (bij) for p = the left and right outgoing edges of v by el and
p1p2 ... pm. er, respectively.
Then, each column in T (P) can be considered as a
bit string representing a set in t (in p). (In the follow- If b(pj)[i] = 1, we will explore the right outgoing
ing discussion, we use b(ti) (b(pj)) to denote the bit edge er of v. That is, we will compare the label
string for ti (pj).) of er, denoted by l(er), with the corresponding
In a next step, we construct a (compact) trie over substring in b(pj) according to the following
all b(ti)s, denoted by trie(T), as illustrated in Figure criteria: if one bit in b(pj) is 1, the corresponding
3(a). bit in l(er) must be one; if one bit in b(pj) is 0,
0
A New Algorithm for Subset Matching Problem Based on Set-String Transformation
3 4 5
01 1 00 10000 {t3 } {t2 } {t1 , t4 } t: 5 4 3 5 1 1 2
1 2
{t5 , t6 } {t7 }
(a) (b)
where Sett is the set of all tis in t and = {1, ..., 2k};
and
0
A New Algorithm for Subset Matching Problem Based on Set-String Transformation
Algorithm 1.
Algorithm Subset-Matching
begin
1. Let t = t1t2 ... tn and p = p1p2 ... pm;
2. Transform t to t = t1t2 ... tn and p to p = p2 ... pm by using the trie constructed over t;
3. Construct a suffix tree tsuffix over t;
4. Search tsuffix against p;
4. for any e = (v, u) in tsuffix with l(e) = l1 ... lg, which is checked with lg pm do
5. {return all the leaf nodes in the subtree rooted at u;}
end
(iii) Let e1, ..., eq be vs outgoing edges. Let l(ej) = For this simple example, only one path in the suffix tree is
explored. But multiple paths may be searched in general.
l j1 l jh (for some h) be the label of ej (1 j
l). Then, for any ej = (vj, uj) (1 j q), if l j1 Proposition 1. Let t = t1t2 ... tn and p = p1p2 ... pm.
The algorithm Subset-Matching will find all tis (1 i
p'i+int(v)-1, l j2 p'i+int(v)..., and l jh p'i+int(v) + h - 1, the n - m) such that ti+1ti+2...ti+m-1 matches p.
subtree rooted at uj will be continually explored.
Otherwise, the subtree will not be searched Proof. Let n1 n2 ... nm nm+1 be a path that is
anymore. In addition, we notice that the symbol visited when searching the trie against p'. Let li = l(ni,
$ is always ignored when we check the labels ni+1) denote the label associated with the edge (ni, ni+1)
associated with the edges in trie(T). (1 i m). Then, we must have li pi' (1 i m). In
terms of Lemma 1, the substring in t: ft-1(l1) ... ft-1(lm)
In the above process, for any e = (v, u) with l(e) = definitely matches fp-1(p1') ... fp-1(pm') = p1p2 ... pm. We
l1 ... lg, if lg is checked against pm' with lg pm', any leaf remark that all the suffixes represented by the leaf nodes
node in the subtree rooted at u indicates a substring in t, in the subtree rooted at nm+1 has l1 ... lm as the prefix. So
which matches p. Algorithm 1 is the formal description
of the whole process.
Figure 5. The suffix tree for t'
Example 1. By applying the above algorithm to the
problem shown in Figure 1(a), trie(T) shown in Figure 3(a)
will be first generated and t will be transformed to t' as shown 1
2 3 7
one by one, we will transform p to p' as shown in Figure 2 2
4(b). The suffix tree for t' is shown in Figure 5. Finally, we 435112$
4351 1 2$ 1 1 2$ 12$ 2$
will search the suffix tree against p' as shown by the heavy 1 4 5 6
edges in Figure 6.
0
A New Algorithm for Subset Matching Problem Based on Set-String Transformation
each of these suffixes corresponds to a substring in t, 7(a), we show a noncompact trie for a set of bit strings
which matches p. shown in Figure 7(b).
Concerning the time complexity of the algorithm, For such a noncompact trie T, the searching of it
we consider two cases: small k and large k, where k is against a bit string s = s[1]s[2] ... .s[k] is performed in
the size of . In the case that k is small, the cost can be a similar way to a compact trie, but simpler:
analyzed as follows. First, we need O(n) time to con-
struct the trie for t and to generate t'. Then, to produce (i) Let v be the node encountered and s[i] be the
p' for p, we need O(Cm) time, where C represents the position to be checked.
largest cost of searching the trie against a pi (1 i (ii) If s[i] = 1, we move to the right child of v.
m). Obviously, C is bounded by 22k. It is because the (iii) If s[i] = 0, both the right and left child of v will
number of the leaf nodes of the trie is bounded by 2k be visited.
and the trie is in fact a binary tree. In addition, a set
in p' can be represented as a bit string of length 2k and In the following, we use cs(T) to represent the cost
the membership checking needs only a constant time. of searching T against s. In addition, we use s', s'', s''', ...
Thus, for both the suffix tree construction and the suffix to designate the patterns obtained by circularly shifting
tree searching, we need O(n) time. So the total time is the bits of s to the left by 1, 2, 3, ... positions.
bounded by O(n + Cm) = O(n + 22km) = O(n + m). Obviously, if the first bit of s is 0, we have, for the
In the case that k is not small, the trie constructed expected cost of a random string s:
for t might be large (but bounded by 2min{n, 2k})
and the trie searching becomes a dominant factor of cs(T) = 1 + cs'(T1) + cs'(T2), (1)
time complexity. In the next section, we will make a
probabilistic analysis of this cost, which shows that where T1 and T2 represent the two subtrees of the root
the time spent on searching a trie of size N is on the of T. See Figure 8 for illustration.
order of O(N0.5) on average. Since N 2min(n, 2k), It is because, in this case, the search has to proceed
the average cost of our algorithm is bounded by O(n in parallel along the two subtrees with s changing cycli-
+ Cm) = O(n + mn0.5). cally to s'. If the first bit in s is 1, we have:
A New Algorithm for Subset Matching Problem Based on Set-String Transformation
t1 : 001 0 1
t2 : 010
t3 : 01 1 0 1 0 1
t4 : 001
t5 : 01 1 0 1 0 1 {} 0 1
t6 : 11 0
t7 : 11 1 { } {t1 , t4 } {t2 } {t3 , t5 } {t6 } {t7 }
(a) (b)
q N q
N 1 1 1 N
= (4) Proof. In terms of Equation (7), Cs(z) can be re-
q 2 2 2N q written as:
N
C s ( k 1)(z)= k ez/2 C s (2z ) + e - 1 - z. z
(11)
z
Cs(z) = c s ,n (8)
N 0 N! This system can be solved by successive transporta-
tion. For instance, when we transport the expression of
satisfies the relation Cs'(z) given by the second equation in (11), we have:
A New Algorithm for Subset Matching Problem Based on Set-String Transformation
( ( ) 1 )
k 1 To estimate cs,n, we resort to the complex analysis,
exp
j exp z 1 2 j
1 z z
j =0
1 2
2j 2j 1 bk
which shows that c s ,n ~ n . If b
k
= 1
2
, we have:
= 2k-b exp z 1 [( 1
2m
)]C ( s
z
2m
) + cs,n = O(n0.5). (18)
( ( ) 1 ),
k 1
exp
j exp z 1 2 j
1 z z An interested reader is referred to Chen (2006)
j =0
1 2
2j 2j
and Chen and Chen (2006) for a detailed analysis on
(13) how to evaluate cs,N given by Equation (16) by using
contour integration of complex variabled functions in
great detail. Finally, we notice that N min{n, 2k}. So
where b is the number of 1s in s. cs,N = O(N0.5) O(n0.5). This shows that the average
Let = 2k-b, = 1 -, l =, and A(z) = and A(z) = time complexity of Algorithm Set-Matching is on the
( ( ) 1 ). We have:
k 1
exp order of O(n + mn0.5).
j exp z 1 2 j
1 z z
j =0
1 2
2j 2j
This equation can be solved by iteration as dis- As mentioned earlier, the subset matching has a lot of
cussed above: applications to information processing and retrieval,
such as the tree matching problem, general string match-
( ) ( z)
ing and general counting matching. It also enables us
1
j j j
Cs(z) = exp zA (15)
1 to design efficient algorithms for several geometric
j =0
A New Algorithm for Subset Matching Problem Based on Set-String Transformation
the occurence of the pattern containing dont care Chen, Y., & Chen, Y. (2006). On the signature construc-
symbols and OR-expressions of the form: s1 s2 ... tion and its analysis. IEEE Transactions on Knowledge
sk, where sis are symbols. In the near future, we will and Data Engineering, 18(9).
explore in this direction and try to find more efficient
Cole, R., & Hariharan, R. (1997). Tree pattern match-
algorithms for that problem.
ing and subset matching in randomized O(n log^3 m)
time. In Proceedings of the 29th Annual Symposium
on the Theory of Computing (pp. 66-75).
conclusIon
Cole, R., & Hariharan, R. (2002). Verifying candidate
In this article, a new algorithm for the subset-matching matches in sparse and wildcard matching. In Proceed-
problem is proposed. The main idea of the algorithm ings of the 34th ACM Symposium on Theory of Comput-
is to represent each set ti in the text string t as a single ing, Montreal, QC, Canada (pp. 592-601).
integer a and each set pj in the pattern string p as a set
Cole, R., & Hariharan, R. (2003). Tree pattern match-
b of integers such that a b if and only if pj ti. This
ing to subset matching in linear time. SIAM Journal
is done by constructing a trie structure over t. In this
of Computing, 32(4), 1056-1066.
way, we transform the original problem into a differ-
ent subset matching problem, which can be efficiently Indyk, P. (1997). Deterministic superimposed coding
solved by generating a suffix tree over the new text with applications to pattern matching. In Proceedings
string that has an integer at each position. By a proba- of the 38th Annual Symposium on Foundations of
bilistic analysis, together with the contour integration of Computer Science (pp. 127-136).
complex variabled functions, we show that the average
time spent on the trie construction is on the order of McCreight, E. (1976). A space-economical suffix tree
construction algorithm. Journal of the ACM, 23(2),
1 b
O(n + m n k ), where n is the length of the text string, 262-272.
m is the length of the pattern string, k is the size of the
alphabet, and b is the average number of bits set to 1 Muthukrishan, S. (1995). New results and open prob-
in a bit string representing a set in p. If: lems related to non-standard stringology. In Proceed-
ings of the 6th Annual Symposium on Combinatorial
b 1 Pattern Matching (pp. 298-317).
= ,
k 2 Muthukrishan, S., & Palem, K. (1994). Non-standard
stringology: Algorithms and complexity. In Proceed-
the average time complexity of our algorithm is bounded ings of STOC94 (pp. 770-779).
by O(n + mn0.5).
Ukkonen, E. (1995). Constructing suffix tree on-line
in linear time. Algorithmica, 14(3), 249-260.
reFerences
Key terMs
Aho, A.V., Hopcroft, J.E., & Ullman, J.D. (1974). The
Set-String Transformation: The set-string trans-
design and analysis of computer algorithms. London:
formation for a given subset matching is to transform
Addison-Wesley.
the text set-string t and the pattern set-string p into two
Faloutsos, C. (1992). Signature files. In W.B. Frakes different strings t' and p' so that p has matches in t if
& R. Baeza-Yates (Eds.), Information retrieval: Data and only if p' has matches in t'.
structures and algorithms (pp. 44-65). Prentice Hall.
String Matching: A string matching problem is to
Chen, Y. (2006). On the cost of searching a signature find all the occurrences of a pattern string (a sequence
tree. Information Processing Letters, 99, 19-26. of characters) in a text string (another sequence of
characters).
A New Algorithm for Subset Matching Problem Based on Set-String Transformation
Subset Matching: The subset matching problem (1) the root of P maps to v,
is to find all occurrences of a pattern string p of length (2) if x maps to y, then x and y have the same label, N
m in a text string t of length n, where each pattern and i.e., label(x) = label(y), and
text position is a set of characters drawn from some (3) if x maps to y and x is not a leaf, then the ith child
alphabet . The pattern is said to occur at text position of x maps to the ith child of y. (In particular, the
i if the set p[j] is a subset of the set t[i + j - 1], for all outdegree of y is no less than the outdegree of
j (1 j m). This is a generalization of the ordinary x.)
string matching problem.
Suffix Tree: A suffix tree is a trie over all the suf- Trie: A trie for a set of strings is a type of digit
fices of a string. search tree over a finite alphabet . In the trie, each
edge represnts a symbol from , and sibling edges must
Tree: A tree is a graph, in which each node may
represent distinct symbols. In addition, each path from
have more one child nodes, but only one parent.
the root to a leaf node forms a prefix of a string, which
Tree Matching: The tree matching problem is to differs the string from the others.
find all occurrences of a pattern tree P in a target tree
T. A pattern tree P matches a target tree T at node v if
there exists a one-to-one map from the nodes of P into
the nodes of T such that:
Section: Product ICT
Gbor Hossz
Budapest University of Technology and Economics, Hungary
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Novel Application of the P2P Technology for Intrusion Detection
must pay for it. LimeWire guarantees no bundled word. They are of a relatively small number and easily
software with downloads. The open source property guessable. N
of the LimeWire encourages its users to monitor its The attacker can also be trying to find resources
development. The largest competitor of LimeWire is through security holes. With this type of action, whole
BitTorrent, which is very efficient in sharing large files ranges of network addresses are scanned for a particular
(BitTorrent, 2006). Its users upload portions of required service having a bug or just being badly configured.
documents to a requester instead of forcing one client The port number is fixed here. An example for this is
to upload the whole file many times. scanning for an open e-mail (SMTP) relay to send junk
mail anonymously.
A common feature of the attack methods described
the ProbleM oF the IntrusIon above is that the attacker makes several attempts against
a host. The Komondor software developed by us uses
Computers connected to networks are to be protected by this as a base. As one host running the Komondor
different means (Kemmerer & Vigna, 2002). Informa- detects an intrusion attempt and shares the address of
tion stored on a computer can be personal or business the attacker on the overlay network, the other ones can
character, private or confidential. An unauthorized prepare and await the same attacker in safety, who will
can person can therefore steal it; its possible cases are usually arrive sooner or later.
shown in Table 1. Traditionally, organizations have relied on their
We have to protect not only our data, but also our firewall to enforce their corporate policies. To stop the
resources. Resources are not necessarily hardware only. use of P2P file sharing, organizations may add a rule
Typical types of attack are to gain access to a computer that denies outbound ports not required for business
to initiate other attacks from it. This is to make the (Sorensen & Richards, 2004). Unfortunately, many
identification of the attacker more difficult because of the P2P applications today use a port-hopping
this way the next intruded host in this chain sees the method of communication to circumvent firewall rule
IP address of the previous one as its attacker. sets that limit outbound connections to specifically al-
Stored data can not only be stolen, but changed. lowed ports. If the firewall restricts the ports permitted
Information modified on a host is extremely useful to to establish outbound connections to only the essential
cause economic damage to a company. The attacker ports, such as port 80 (HTTP) and port 25 (SMTP),
can alter or obstruct its functioning properly and cause the P2P application modifies the port that it uses to
damage. communicate with other P2P nodes to use these ports
Intrusion attempts, based on their purpose, can be allowed through the firewall.
of different methods. But these methods share things To effectively detect this type of P2P application
in common, scanning networks ports or subnetworks traffic in an environment requires the use of a device
for services, and making several attempts in a short that can examine the contents of the packets allowed
time. This can be used to detect these attempts and to through the firewall. Intrusion detection systems (IDS)
prepare for protection. were designed to satisfy this need. These systems are
Simple, low strength passwords are also a means designed to monitor network traffic to look for known
of security holes. These are used by the so-called signature attack patterns and/or deviations from pro-
dictionary method, trying to log into the system with tocol specifications that represent malicious intent.
common names or proper names as somebodys pass- When potentially malicious traffic is observed, they
generate an alert. More importantly, these detection
technologies lack the capabilities to effectively prevent
this traffic, leaving the burden with the administrator
Table 1. The types of the information stealth to manually investigate and respond.
which install further software known as spyware. NeVO uses different methods to determine if a host
Spyware monitors the browsing habits of the user and is alive and what the host is. It reconstructs both sides
then sends the collected information to third parties. of a network conversation and then analyzes the data
Typically, the user gets advertisements based on the for evidence of specific client or server vulnerabilities.
data collected by the spyware. This kind of software Unique client and servers for protocols such as HTTP,
can be hard to sense and to clean from the system. SMTP, and FTP have unique strings which identify
Before installing any file sharing program, the user the version of the service. NeVO also makes use of
should buy antivirus software that can detect the al- passive operating system identification by monitoring
ready downloaded spyware on the users hard drive SYN packets which may be emitted by the system
and prevent the operating system from downloading during network usage. Each operating system, such
further spyware programs. as Windows or Linux, builds its SYN packets in its
The active network vulnerability scanners own unique way, and this can be used to distinguish
such as the NMAP (2006), Nessus (2005), and between some specific types.
ISS Scanner (ISS Scanner, 2005) send packets or Passive vulnerability scanning is not a replace-
communicate in some manner with the systems ment for active vulnerability scanning, but it is a very
they are auditing. Naturally, they are bound by efficient technology. When it is deployed on its own,
the physical limitations of the networks and the passive vulnerability scanner will produce very
systems they are auditing to send and receive interesting information about the security profile of a
these packets. In other words, scanning can monitored network. However, this is by no means a
take a long time, especially for large networks full view of network security. When deployed together,
(Deraison, Gula, & Hayton, 2005). both methods will efficiently detect vulnerabilities
In some rare cases, the act of probing may and changes to the monitored networks (Deraison et
cause instability in the audited system. Network al., 2005).
devices such as routers and switches may also The ability to correctly identify the attacks on the
be affected by large numbers of port scans, Internet is very important. The exchange of alert infor-
host enumeration, and vulnerability testing. mation between organizations can greatly supplement
Also, networks change all too often. After the the knowledge obtained from local monitors (Locasto,
scan has been finished, it slowly becomes out Parekh, Keromytis, & Stolfo, 2005). The IDS usually
of date as the network changes. operates within one administrative domain. Therefore,
Active network vulnerability scanners may information about the global state of network attack
also have a political stigma within large orga- patterns is usually unexamined. However, global in-
nizations. For a variety of reasons, a system formation exchange can help organizations in ranking
administrator may feel that there is no need and addressing threats, which they would not have
to have a third party scan their systems. To otherwise identified.
compensate for this, a passive vulnerability In order to construct an efficient IDS, a lot of
scanner can be deployed in a manner to watch problems must be solved before intrusion alert data
these off limits networks and report on their can be safely distributed among cooperating organiza-
vulnerabilities. tions. For example, distributing all alert information
Passive vulnerability scanning is the process of in a P2P overlay quadratically increases bandwidth
monitoring network traffic at the packet layer to deter- requirements. Also, information exchange between
mine topology, services, and vulnerabilities (Deraison cooperating organizations must be carefully managed,
et al., 2005). The passive scanners, such as NeVO, since confidential network information can be distrib-
monitor for client and server vulnerabilities of a specific uted with the alert information by chance.
network through direct analysis of the packet stream. There are developments to construct a P2P system
As NeVO observes network packets, it builds a model that can detect and identify attacks in a distributed
of the active hosts on a network and their services. For manner. Krugel, Toth, and Kerer (2001) proved that
example, observing a TCP port 25 SYN-ACK packet only a small number of information exchanges need
from one of the monitored hosts will cause NeVO to to be exchanged to determine an attack in progress.
reevaluate the network model. Their results confirm that a P2P solution is feasible and
A Novel Application of the P2P Technology for Intrusion Detection
usable for creating decentralized IDS. They supposed program, monitoring the occurring network intrusion
that the attack signatures are known by the systems attempts. If one of the peers detects an attempt on a N
before the intrusion takes place. The DOMINO overlay system supervised, it takes two actions:
system (Yegneswaren, Barford, & Jha, 2004) applies
the Chord document routing protocol (Stoica, Morris, 1. Strengthens the protection locally, by configur-
Karger, Kaashoek, & Balakrishnan, 2001) to dissemi- ing the firewall to block the offending network
nate alert data based on a hash of the source IP address. address.
The DShield project uses a centralized repository to 2. Informs the other peers about the attempt.
receive intrusion alerts from a lot of distributed sources
(Ullrich, 2005). The DShield supports the exchange of Komondor nodes protect each other this way. If an
information among administrative domains, too. intrusion attempt was recorded by a node, the other
ones can prepare for the attack in advance. This is
shown in Figure 2.
algorIthMs used In the Information about intrusion attempts is
develoPed systeM collected by two means: intrusion detected
by the node in question or intrusion detected
This section introduces a novel method, which utilizes by another one. The first working version of
the results of the existing IDS methods and efficiently Komondor monitors system log files to collect
combines the individual security solutions of the oper- information. These log files can contain various
ating systems with the P2P technology to construct an error messages, which may refer to an intrusion
overlay of the developed client programs running on attempt. Possible examples are log-in attempt
individual hosts. The most important algorithms making with an inexistent user name or several attempts
up the proposed system will also be presented. to download an inexistent file through a HTTP
The use of the peer-to-peer network model for this server (Czirkos, 2005). The actual topology and
purpose is new in principle. Test results proved its related data of the Komondor overlay is con-
usefulness, with its aid were not only simulated, but tinuously displayed on the Komondor project
also real intrusion attempts blocked. The design goal page (Czirkos, 2006).
of the system is listed in Table 2.
The proposed method is implemented in software
called Komondor, which got its name from the famous conclusIon
Hungarian guard dog. The Komondor software is in-
tended to mask the security holes of services provided The article reviewed some security-related problems
by the host, not to repair them. For this, it does not need of the P2P virtual networks and presented many useful
to know about the security hole in detail. It can provide and applicable approaches, which address the problem
some protection in advance, but only if somewhere on of the intrusion detection. A novel application of P2P
the network an intrusion was already detected. It does theory was also introduced that helps the users of this
not fix the security hole, but keeps the particular at- system to increase security of their hosts.
tacker from further activity. If the given security hole The developed system is easy to use; the nodes or-
is already known, it is worth rather fixing that itself. ganize the P2P overlay automatically and do not need
The inner architecture of Komondor is presented in any user interaction. It proves the reasonability of a
Figure 1. Different hosts run the uniform copies of this security application utilizing local protection and P2P
theory together. The dependability of a P2P overlay
ensures that intrusion alerts will reach all hosts which
Table 2. The design goals of the proposed system need protection. The self-organizing property of such
an overlay also ensures that it will remain functional
Creating a stable overlay network to share information. in an environment with a high number of network link
Reports of intrusions should spread as fast as possible over the
network. failures.
Decentralized system, redundant peers.
Masking the security holes of each peer based on the reports.
A Novel Application of the P2P Technology for Intrusion Detection
Figure 1. Architecture of the Komondor system Deraison, R., Gula, R., & Hayton, T. (2005). Passive
vulnerability scanning: Introduction to NeVO. Tenable
Network Security. Retrieved February 26, 2008, from
http://www.tenablesecurity.com
Frasz, A. (2005). Download this article. The Platform,
4(2). AEA Consulting. Retrieved February 26, 2008,
from http://www.aeacondulting.com
Goth, G. (2005). A (P2)Perfect Storm. IEEE Distributed
Systems Online, 6(5).
Hossz, G. (2005). Mediacommunication based on
application-layer multicast. In S. Dasgupta (Ed.), En-
cyclopedia of virtual communities and technologies
(pp. 302-307). Hershey, PA: Idea Group Reference.
Figure 2. Attack against a Komondor node ISS Scanner. (2005). The ISS Scanner home page. Re-
trieved February 26, 2008, from http://www.iss.net
Kemmerer, R. A., & Vigna, G. (2002). Intrusion
detection: A brief history and overview. Security &
Privacy-2002., Supplement to Computer Magazine.
IEEE Computer Society, pp. 27-30.
Krugel, C., Toth, T., & Kerer, C. (2001, December).
Decentralized event correlation for intrusion detection.
Paper presented at the International Conference on
Information Security and Cryptology (ICISC).
Locasto, M.E., Parekh, J.J., Keromytis, A.D., & Stolfo,
S.J. (2005, June 15-17). Towards collaborative secu-
rity and P2P intrusion detection. In Proceedings of
the 2005 IEEE Workshop on Information Assurance
reFerences Security, United States Military Academy, West Point,
NY (pp. 30-36).
Bildson, G. (2005). LimeWire home page. Retrieved Nessus. (2005). The Nessus home page. Retrieved
February 26, 2008, from http://www.limewire.com/ February 26, 2008, from http://www.nessus.org
english/content/home.shtml/
NMAP. (2006). NMAP free security scanner, tools &
BitTorrent. (2006). Bittorrent home page. Retrieved hacking resources. Retrieved February 26, 2008, from
February 26, 2008, from http://www.bittorrent.com http://www.insecure.org/
Czirkos, Z. (2005, November 11). Development of P2P Sirer, E.G., & Walsh, K. (2005). Credence home page.
based security software [in Hungarian]. In Proceed- Cornell University. Retrieved February 26, 2008, from
ings of the Conference of Scientific Circle of Students http://www.cs.cornell.edu/People/egs/credence/
(Second Award), Budapest, Hungary.
Snort. (2006). Snort: The de facto standard for intru-
Czirkos, Z. (2006). The Komondor project page with sion detection/prevention. Retrieved February 26, 2008,
dynamic monitoring of the Komondor overlay. Budapest from http://www.snort.org
University of Technology & Economics, Department of
Electron Devices. Retrieved February 26, 2008, from Sorensen, S., & Richards, S. (2004). Preventing peer-
the http://jutas.eet.bme.hu to-peer file sharing activity: Mitigating the risks with
0
A Novel Application of the P2P Technology for Intrusion Detection
Juniper Networks NetScreen-IDP product line. Juniper Client/Server Model: A communicating way, where
Networks, Inc. Retrieved February 26, 2008, from one host has more functionality than the other. It differs N
http://www.juniper.net from the P2P model.
Stoica, I., Morris, R., Karger, D., Kaashoek, F., & Firewall: This is a host or router which provides a
Balakrishnan, H. (2001, August). Chord: A scalable strict gateway to the Internet for a subnetwork, checking
peer-to-peer lookup service for Internet application. traffic and maybe dropping some network packets.
In Proceedings of ACM SIGCOMM.
Intrusion Detection System (IDS): Examines the
Ullrich, J. (2005). Dshield home page. Retrieved Febru- contents of the packets allowed through the firewall. It
ary 26, 2008, from http://www.dshield.org/ monitors network traffic to look for known signature
attack patterns. When the malicious traffic is observed,
Yegneswaran, V., Barford, P., & Jha, S. (2004, Febru-
the IDS generates an alert.
ary). Global intrusion detection in the DOMINO overlay
system. Paper presented in the ISOC Symposium on Overlay Network: The applications, which create
Network and Distributed Systems Security. an ALN, work together and usually follow the P2P
communication model.
Key terMs Passive Network Vulnerability Scanner: Monitors
network traffic at the packet layer to determine topology
Active Network Vulnerability Scanner: Such services. They also try to identify the vulnerabilities of
systems send packets and communicate in some man- the client and the server in a specific network through
ner with the systems they are auditing. direct analysis of the packet stream.
Application Level Network (ALN): The appli- Peer-to-Peer (P2P) Model: A communication way
cations, which are running in the hosts, can create a where each node has the same authority and communica-
virtual network from their logical connections. This is tion capability. They create a virtual network, overlaid
also called overlay network. The operations of such on the Internet. Its members organize themselves into
software entities are not able to understand without a topology for data transmission.
knowing their logical relations. ALN software entities
usually use the P2P model, not the client/server model,
for the communication.
Section: Product ICT
Gbor Hossz
Budapest University of Technology and Economics, Hungary
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
On the Stability of Peer-to-Peer Networks
Table 1. Topologies DHT networks connectivity and others not. This issue can be solved
Overlay network Metric Topology
by the data replication. As node IDs are usually chosen O
CAN Euclidean n-dimensional torus
randomly, nodes which are close to each other in the
Chord Subtraction ring application network address space can be quite far
Kademlia XOR operation binary tree from each other in the physical address space, and even
geographically. Therefore, sending messages to more
the peers are organized in a ring, and messages than one node, which are close to a specific destination,
are always sent clockwise around the ring. can result in replicating data at very different locations,
almost as if destinations were randomly chosen.
Figure 1 shows our simulation of a random Kademlia
overlay topology. The simulated scenario was that we
relIabIlIty In Peer-to-Peer
tested all the participating nodes of the overlay (in this
netWorKs experiment, we used n=200 nodes) if they are able to
send an information message to a certain destination
Reliability of a peer-to-peer network is directly influ-
node and some replication of the information message
enced by the dependability of the underlying network
to the closest nodes of the destination. We did not use
packet transfer service. The different topologies,
a real topology, since in Kademlia there is not real
however, are affected differently by packet losses and
topology; in fact, every node can send message to
other errors. Most structured peer-to-peer networks,
every other. But the success of the sent message was
for example, CAN (Ratnasamy et al., 2001), have an
measured by a random variable, namely the ratio of the
exact topology. In the n-dimensional circular torus of
bad links of each participating node. In this experiment,
CAN, every node has to maintain only a small number
a replication factor of k=8 was selected, which means
of connections; in a two-dimensional example, this
that every participating node stores its key-value pairs
number is four (up, down, left, and right). Data to be
at eight different locations.
sent are forwarded (routed) on the overlay network
The ideal case is when all network connections are
from node to node, finally arriving at their destination.
functioning, and there are no errors. If there are fail-
CAN is therefore able to use session-oriented TCP as
ing connections, senders of messages choose nodes
its transport protocol, as a node always communicates
as destinations, which are not the eight closest ones in
only with its neighbors.
the entire network, but a bit further in node identifier
There are other structured networks, which have
address space. This can happen since peers can detect
no specific topology, for example, Kademlia (May-
the failing links. (For example, a node is intending to
mounkov & Mazieres, 2002). In Kademlia, messages
send its message to eight peers, but it detects that the
are not forwarded inside the overlay (there is no routing
node with the third closest address is unreachable.
defined), rather they are sent directly between the source
Then it sends its piece of information to the 9th closest
and the destination as datagrams. The purpose of the
node, too.)
overlay is only to find the physical network address
In Figure 1, the three different plots visualize net-
(IP address, port number) of the destination node in
work messages arriving at destination nodes, in case of
question, and it uses UDP for its messages. Therefore,
various ratios of nonfunctioning network links. The X
network errors directly influence the communication
axis shows the nodes of the overlay; they are sequenced
between peers, and this is especially true for specific
in the order of closeness to the destination address. X=0
source-destination pairs. Permanent network errors,
is the closest one; the higher the sequence number on
nodes that cannot be reached (because they are behind
the X axis, the further the node denoted by the actual
a firewall, for example), all degrade the quality and
sequence number from the destination node. In other
performance of the overlay.
words, X=0 is the primary destination (closest), X=1 is
The availability of a specific connection can naturally
the secondary (second closest), X=2 is the tertiary, and
be tested by a simple ping message. Due to network
so on. The Y axis shows the number of nodes, which
errors, information available at nodes can sometimes be
could reach the destination. This is the value which
unreachable for others. The exact distribution of errors
is our point of interest. Let us suppose that we have a
is usually highly uneven; with some nodes having good
key-value pair stored in the overlay with 200 nodes, and
On the Stability of Peer-to-Peer Networks
20% of the links are failing. The information is stored The first property of the hash function can be
at different locations. We are willing to find a node, utilized so that the result of the calculation does not
which is accessible to almost all the nodes, so anybody seem to correlate with the input. For example, the
can retrieve the key-value pair. This was the fourth node hash value of the word cat can have the hexadecimal
on Figure 1 for the 20% error rate simulation. value FA9823A7, and the word cut might yield the
As a result of the simulation presented in Figure value 79EFB2D3. The result can be totally different,
1, even with high ratio of bad links in the overlay even when changing one bit in the input. Its second
network, the content replication helped to find a node, important property is that the resulting numbers are
which can store the information of the message. With distributed evenly in the range of the function. This
20% of failed links, the node that was only the fourth way, in an overlay of many peers, the data to be stored
closest to the original destination could still receive are evenly distributed among them if we store the data
messages from all other nodes dependably. In case of files according to the hashed values of the identifiers
a high number of such experiments, we found very of the peers (nodeID) and the hashed values of the
similar results. identifiers of the data files.
When we simulate the operation of the Kademlia
overlay, sometimes we do not simulate actual IP ad-
beneFIts oF usIng hash dresses but we simulate the activity of the peers be-
FunctIons longing to the Kademlia by utilizing the properties of
hash functions. If a node stores some key-value pair
A hash function can usually take an arbitrary sized file in the Kademlia overlay, first it uses the hash function
and the generated checksum is always fixed in length, to scramble the key. The result seems to be a random
for example, 160 bits. Hash functions have properties, number, which is evenly chosen from the address space
which make them applicable even in cryptography so- of the nodeIDs. As these nodeIDs of participating peers
lutions. Some of these properties can also be exploited were also chosen virtually randomly, we end up with
in the peer-to-peer networks mentioned above. simply picking a random number of bad network links
for the simulation. This fact simplifies the simulation
On the Stability of Peer-to-Peer Networks
instead of decreasing the conformance of the simula- nodeID address space) from the correct destination
tion results. will not be retrieved by others: they will not request O
that piece of information there. The most fundamental
assumption for a distributed hash table was that every
Peer-to-Peer overlays In key-value pair is stored in a well defined place. We
real-World netWorKs modeled this distribution with the number of perma-
nently failing links increasing quadratically, based on
Peer-to-peer networks are usually not that effective on the power-law graph model (Albert & Barabsi, 2002).
the Internet, as in a computer laboratory experiment. The ratio for a given peer is then given by:
One of its reasons is that many nodes participating in
the network are behind NAT (network address transla- m
tion) or firewalls. Those usually cannot receive incom- h(m )= c (1)
n
ing connections, but are only able to initiate outgoing
ones (P2PRG, 2007). That is a serious drawback in
where m is the sequence number of the examined
peer-to-peer applications, where the equal role of the
peer, n is the number of all peers (0m<n), is 2 for a
participators is a fundamental requirement.
quadratic distribution, and c is a constant, which sets
Another important fact, which has influence on the
the maximum proportion of errors (ratio of inacces-
operation of an overlay in a real-world environment
sible neighbors for a specific node). These values can
that node inside the network, can have good or bad
be set experimentally and depend on the size and the
connectivity due to the random network errors. The
actual properties of the Internet network underlying
distribution of network errors is similar to a power-
the Kademlia overlay. Local area networks are usually
law graph (Albert & Barabsi, 2002). In the following
much more dependable than wide area networks like
simulation, this fact is used.
the Internet.
As mentioned previously, Kademlia does not have
This h(m) function gives the ratio of bad connec-
an exact topology. To store data in the overlay, a node
tions for a given peer in case of n=200 for various
is required to send FIND_NODE messages to nodes
and c values, as seen in Figure 2. The X axis shows
successively closer to the destination identifier. The
the parameter m, and the Y axis shows the h(m). The
replies for these messages are IP address, port number
function h(m) should be a stepping function, as the
pairs; network addresses of other nodes (Maymounkov
result multiplied by the number of nodes gives the
& Mazieres, 2002). Finally, the node intending to store
number of bad connections, and the h(m)*n product
a datum finds out the Internet address of that node (it
should be an integer, since it is the number of the bad
will be the destination node), which has its application
links. Therefore, this formula is an estimation, as one
level address the closest to the hashed key and sends
cannot interpret 0.5 links fail, only 0 or 1, which
a STORE request directly as a datagram. Due to the
will be very inaccurate. On the other hand, rounding
inherent network errors, the data will be sent not to
10.3 links fail to 10 failing links is only a small error.
the destination node, but to some other nodes close to
Fortunately, we are interested in modeling the operation
the destination, depending on the actual value of the
of the overlay in a heavily error prone environment;
replication.
the final equation derived in this paragraph is not ap-
Unlike other overlay networks like CAN, which
plicable for a low number of errors.
require nodes to maintain only a small number of con-
Remember that as STORE requests end up at des-
nections to neighbors, in Kademlia overlay network, a
tinations, of which nodeIDs can be taken into account
node (called peer) can send a message to anyone. If we
as random variables, thanks to the properties of hash
have n=200 nodes in a Kademlia overlay, it is possible
functions, it does not really matter which error link ratio
for a node to send a message to any other participator
belongs to which node. Only the global distribution of
peer; however, it cannot know for sure that its connec-
the node peers is important and that some nodes can
tion to the destination address will work. The node will
receive most of the messages, some not.
get the network address of the destination, but maybe
As the underlying Internet network is not perfect,
it cannot connect it, for example, because of firewall
we also cannot expect the overlay to be so. But still
settings. This is a problem, as data stored far away (in
On the Stability of Peer-to-Peer Networks
(1)
(2)
(3)
(1)
(2)
(3)
we can have a requirement, expressed in numeric the hash function), so this way the stored data always
terms; for example, in 99% of all the cases, we should gets to randomly chosen hosts; at least we can suppose
be able to retrieve the stored key-value pair from the it in the terms of simulation and modeling.
Kademlia overlay. Similarly, the original Kademlia If we solve the inequality (2), we get the ratio of
paper (Maymounkov & Mazieres, 2002) gave a proba- nodes, which fulfills our requirements accruing to the
bilistic guarantee for a key-value pair being available allowed error ratio . The solution of the inequality (2)
for lookup over time. We have the ratio of allowed if Equation (1) is substituted is:
errors (=1%), and for a lookup to be successful with
a probability of 1- , the inequality: m
(3)
n c
h(m ) (2) The right side of the inequality (3) can be interpreted
as a condition which must be fulfilled. If it is, a cer-
should hold for the given node, which is responsible tain piece of information stored in the overlay can be
for storing the key-value pair in question and able to retrieved successfully, too. We denote the probability
answer the request. Due to the fact that the return val- that the lookup procedure is successful with P. Since
ues of hash functions seem to be random variables and 0m/n<1, and randomly changes from 0 to 1 (virtu-
the probability distribution of this random variable is ally, due to the hash value), the following equality
practically equal distribution, the inequality (2) must holds for P:
be valid for every m value in the interval [0, n]. That
is why we can choose m freely, so m/n is virtually a
P'=
random number between 0 and 1. Also, nodes chose c (4)
their identifiers (nodeID) by virtually picking a random
number in the address range (due to the properties of
On the Stability of Peer-to-Peer Networks
If the Kademlia overlay implements replication k, Equation (5) can be used to estimate the necessary
it has more than one, exactly k opportunities to store or replication factor k, if the ratio of network errors and
retrieve data. Practically speaking, it can choose more required probability of correctness is given. Figure
than one random m number, and the probability of cor- 3 shows the results for given error and replication
rect lookups denoted with P increases. Calculating the levels, with 1% failure allowed. As one can see, for
probability of all lookups failing, and then subtracting h(m)=10% of failing links, for example, replication
that from one, we get: factor of k=4 is enough to ensure correct operation
with high probability (P>0.6). This replication factor
P = 1 (1 P') ,
k k is essentially the same as the size of the k-buckets in
(5)
Kademlia (see Maymounkov & Mazieres, 2002 for a
discussion). The model we presented here can be used
which gives the probability of successfully looking
to determine this configuration parameter k for such
up a given information despite network errors. In this
an overlay, as it is a trade-off between dependability
formula, k is the level of replication, the number of
and induced network traffic.
nodes storing a given key-value pair.
On the Stability of Peer-to-Peer Networks
On the Stability of Peer-to-Peer Networks
message means sending it to nodes in every k-bucket ity of those application level networks and the ways
(so every neighboring subtree). they can overcome these obstacles and increase their O
For Kademlia, another algorithm is feasible. In dependability at the same time. By using replication,
this one, messages do not need unique identifiers, but each participant is able to find information stored in
every message is tagged with an auxiliary value, which the overlay network with high probability.
represents the size of the subtree it is sent to.
Consider the overlay in Figure 5. The node marked
with black (having ID 00110) starts a broadcast message reFerences
by sending it to randomly chosen nodes from all of its
k-buckets. Every message is tagged with a number, Albert, R., & Barabsi, A.L. (2002). Statistical mechan-
the depth of the subtree it belongs to. The tag values ics of complex networks. Reviews of Modern Physics,
are shown in Table 2. 74, 47-97.
As one can see, the tag value is essentially the number
of bits which the source and the destination share on Eastlake, D., & Jones, P. (2001, September). US Se-
the most significant bits of their addresses. This way cure Hash Algorithm 1 (SHA 1). The Internet Society,
every receiver of the message knows which subtree in Request For Comments 3174.
the complete overlay it is responsible for. That is why El-Ansary, S., Alima, L.O., Brand, P., & Haridi, S.
the node on the right hand side, with identifier 00000, (2003, February). Efficient broadcast in structured P2P
does not have to forward the broadcast message. The networks. In Proceedings of IPTPS03.
second burst of messages is drawn with dotted lines.
Note that this algorithm heavily depends on the require- Gnutella. (2006). Retrieved February 26, 2008, from
ment in Kademlia for every node to keep track of its http://www.gnutella.org/
close neighbors Internet addresses. Hossz, G.. (2005). Mediacommunication based on
A similar approach for the Chord overlay is intro- application-layer multicast. In S. Dasgupta (Ed.), En-
duced in El-Ansary, Alima, Brand, and Haridi (2003). cyclopedia of virtual communities and technologies
Both algorithms depend on routing information in the (pp. 302-307). Hershey, PA: Idea Group Reference.
overlays being correct, which may not be the case in
a high-churn environment, where nodes frequently Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., & Lim, S.
join and leave the network. The redundancy of the (2004, March). A survey and comparison of peer-to-peer
first algorithm shown here can be the key to solve this overlay network schemes. IEEE Communications.
issue, too. Maymounkov, P., & Mazieres, D. (2002, March).
Kademlia: A peer-to-peer information system based
on the xor metric. In Proceedings of IPTPS02, Cam-
conclusIon bridge.
In this article, we presented some aspects of peer-to- P2PRG. (2007). The Internet Research Task Force
peer networks operating in real-world environments. Peer-to-Peer Research Group. Retrieved February 26,
We have shown that replication of data is important in 2008, from http://www.irtf.org
situations where network errors and bad connectivity Ratnasamy, S., Francis, P., Handley, M., Karp, R., &
sets back the correct operation of overlays. We also Shenker, S. (2001, August). A scalable content-ad-
simulated the modeled the Kademlia network in such dressable network. In Proceedings of ACM SIGCOMM
conditions and determined the level of replication 2001.
which is required for successful operation. As the
number of computers connected to the Internet grows Spinellis, D., & Androutsellis-Theotokis, S. (2004,
exponentially, the network address space becomes December). A survey of peer-to-peer content distribu-
a bottleneck. Therefore, solutions for sharing public tion technologies. ACM Computing Surveys, 36(4),
network addresses are very common. Unfortunately, 335-371.
those usually mask the full potential of peer-to-peer
Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., &
overlays. This article presented the inherent flexibil-
Balakrishnan, H. (2001, March). Chord: A scalable
On the Stability of Peer-to-Peer Networks
peer-to-peer lookup service for Internet applications Hash Function: A mathematical formula, which
(Tech. Rep. No. TR-819). MIT. is used to turn some data into a representing number,
which can serve as a digital fingerprint. These formula
can usually be applied to any data and create a seem-
Key terMs ingly random but reproducible identifier. Example
algorithms for this are MD5 and SHA-1.
Application Level Network (ALN): The appli- K-bucket: A list of a nodes neighbors in the
cations, which are running in the hosts, can create a Kademlia overlay.
virtual network from their logical connections. This is
also called an overlay network. The operations of such Key-value Pair: The fundamental unit of informa-
software entities are not able to understand without tion stored in a hash table. Every piece of information
knowing their logical relations. ALN software entities content (value) is assigned an identifier (key), which
usually use the P2P model, not the client/server model is used for reference: values are mapped onto keys.
for the communication. An everyday example for this is a name of a file and
its content.
Client/server Model: A communicating way, where
one host has more functionality than the other. It differs Network Address Translation: Two or more net-
from the P2P model. work hosts sharing the same Internet address. One of
the hosts serves as a gateway and forwards network
Datagram: A short, separate message between packets between the Internet and the local network.
computers, similar to a conventional letter. A typical
protocol to send and receive datagrams over the Internet Overlay Network: The applications, which create
is UDP, the User Datagram Protocol. See Session. an ALN, work together and usually follow the P2P
model.
Distributed Hash Table: A hash table stores key-
value pairs and enables a fast lookup for every value Peer-to-Peer (P2P) Model: A communication way
(piece of information), given its key. DHTs are applica- where each node has the same authority and communica-
tion level networks, functioning as hash tables which tion capability. They create a virtual network, overlaid
span across many computers. A hash function is used on the Internet. Its members organize themselves into
to map each key-value pair to a specific computer in a topology for data transmission.
the network so that other participants will know from
Replication: Storing data at different physical loca-
where to retrieve it.
tions to enhance availability and dependability.
Firewall: This is a host or router which provides a
Session: An established channel for messages be-
strict gateway to the Internet for a subnetwork, checking
tween two computers, similar to a conventional phone
traffic and maybe dropping some network packets.
call. On the Internet, the TCP (Transmission Control
Protocol) is used mostly to implement session-based
communication. See Datagram.
0
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Online Catalog of Manuscripts Conserved in Libraries in the Veneto Region
following the guidelines laid down by the ICCU (5), to completed. At this point the reviser checks the
integrated by the MANUS system, the need to transfer data sheet and, if necessary, adds corrections, thereby
all descriptions previously compiled on the MANUS changing its state to be checked again. The cataloger
system to the NBM, and last but not least the need to adds his/her own corrections and the sheet becomes
continue sending data to the ICCU, exporting it from corrected. After checking these corrections and if there
the NBM. This is another reason why the Veneto Re- are no other elements to be added, the reviser decides
gional Council cooperated with the ICCU, monitoring that the manuscript can be published. Whenever the
the updates and technical and scientific development manuscript needs updating or modifying, the published
of the MANUS system. manuscript returns to the work in progress state, while
The catalog, which is freely accessible to users who for research the previous manuscript data sheet is still
click on the site, provides a simple search (any word available until the new description is published.
included in each descriptive field, which can also be At this point the main features of the NBM system
filtered by library) and an advanced search, where the should be outlined:
user can search information by word within a single
field and combined fields, by shelf mark, name and title Separate profiles for catalogers, librarians, revisers
headings of the published manuscripts. A search by text and administrators;
language and subject choosing from a predetermined Catalog data sheets conforming to the model set
list shared by the catalogers has also been provided. out by the ICCU;
From the point of view of shared cataloging that Identification of features common to manuscripts
gathers together libraries that are typologically differ- listed by type of binding, script and illustrator;
ent, it was deemed necessary to administrate libraries Cross-reference among names by official, variant
and catalogers through a central coordinating team and and alternative form;
for the same reason a work schedule was designed that Fields designating language, subject, contents and
could efficiently coordinate all the activities. Hence, literary genre (can be searched by the catalog);
different profiles for the members taking part in the Internal description organized on different lev-
project were defined and designated as follows: els, with the possibility of assigning collective
titles;
Administrator: Coordinates activities, is a tech- Template containing manuscript data preview
nical and scientific consultant, revises and pub- while in completion;
lishes the records, assigns and deactivates access Shared list of collections, names, provenance,
passwords, and mediates discussion forums; titles, bibliography, old libraries and subject;
Reviser: Corrects the data sheets, and directly Management of shared lists with sole insertion
modifies the lists of name and title headings and option (for catalogers);
bibliography, if authorized by the administra- Management of manuscripts according to status:
tor; work in progress, completed, corrected (for cata-
Cataloger: Only has access to manuscript data logers);
sheets being cataloged and shares lists with other Management of manuscripts according to status:
catalogers; to be revised or published (for revisers);
Librarian: Views all manuscripts in the library, Management of images.
and can intervene on the data sheets produced
by the cataloger in the library, if authorized by Working for two years on the project has enabled
administrator. us to fully understand the difficulties and problems
encountered when combining manuscript cataloging
The procedure for revision includes constant moni- and IT. In Italy, there have been other experiments
toring of the manuscripts and their different stages of similar to the MANUS project (http://manus.iccu.sbn.
completion. Revision is also managed via the Web. it), and two of these in particular should be mentioned.
When the cataloger is compiling a data sheet, the On a regional level a project was set up in Tuscany,
manuscript is in work in progress. Once description where around 2,700 medieval manuscripts dated prior
has been terminated, the cataloger changes the state to 1500 are available online. Cataloging has almost
Online Catalog of Manuscripts Conserved in Libraries in the Veneto Region
been completed and descriptions of printed sources cataloger tends to focus on individual fields and thus
are currently being transferred (www.cultura.toscana. loses sight of the manuscripts complex whole, so that O
it or www.sismelfirenze.it/CODEX/codex.htm). On a the resulting record is often inconsistent or unbalanced
local level there is the open catalog of the manuscripts amongst its various parts and is not always easy to
holding in the Biblioteca Malatestiana in Cesena (www. consult. There were also some problems experienced
malatestiana.it/manoscritti), which is quite unique in understanding the philosophy of a program such
in Italy. As for foreign projects, of which there are as MANUS, which does not allow multi-level descrip-
many, we will just mention the cataloging of medieval tion for composite manuscripts, and when dealing with
manuscripts in Germany, where at www.manuscripta- analytical internal descriptions listing a single collec-
mediaevalia.de the description of over 60,000 codices tive title without using the Camicia area belonging to
is now available to researchers. The German project, the external description of the manuscript. Indeed, it
working to an extremely substantial budget, in particular was often the case that sections of a work were listed
demonstrates how central management and carefully at the same level as the title heading of the work itself,
chosen catalogers lead to excellent results. In our sometimes relegated in Camicia. This was precisely
experience the greatest problems were recruiting and due to the problem of adapting cataloging by field to
training people qualified to catalog manuscripts. The the manuscripts complex whole.
coordinating team, as well as visiting each library and As a result of this experience, in the NBM system
examining the projects proposed, setting out descrip- it was decided to gather together on one screen all the
tions suitable for the various types of manuscripts and fields of one area and to display at the bottom of the
commencing cataloging itself, concentrated specifi- screen the record during work in progress for the cata-
cally on the selection and training of catalogers. They loger, in the form of a search report. The NBM system
are graduates whose subjects are usually in the fields enables the cataloger to make choices. Once a work has
of books and manuscripts in particular. Some have been assigned a title and indexed in the shared lists,
specialized degrees and masters in specific subjects. the cataloger can decide whether to index the sections
Nevertheless, most of them had never cataloged a of a single work with its own titles (as in the case of
manuscript, which is not so unusual amongst paleog- anthologies or florilegia with their own history), or else
raphers and professional cardiologists, either. Indeed, to supply a detailed description of the sections, without
cataloging is rather different from studying writing and providing the various chapters, parts, books, and so
its other aspects, whether material or not, to be found forth. with a title of their own. In the final record the
in a codex. Experience comes with work in the field sections appear and can be searched by word, whereas
itself, as well as with training (6). Catalogers who are the sections having their own history appear in the list
qualified in different ways produce different types of of titles and are searchable by index.
data sheet descriptions, as well as varying in the amount A further problem encountered is the fact that most
of time taken to do this, which affects revision and collections to be cataloged are made up of modern manu-
hence the need sometimes to send the work back for scripts. This type of manuscript, unlike the medieval
further examination. It should be said that in this case codex, does not have an established cataloging tradition
the referents from each library, which cooperated with and for many complex reasons the resulting implications
correction and work monitoring, closely working with have not been thoroughly analysed so far.
the coordinating team, proved highly useful. Compensa- The concept of information sharing and consistency
tion for each manuscript was difficult to quantify, and when cataloging online were other problematic areas
was basically calculated on the basis of the degree of that were discussed when creating a program that
detailed information present in the data sheet and on would provide extended ongoing lists of name and
the average time taken by an expert cataloger. In order title headings and bibliographies and also guarantee
to explain what was observed, a brief description of cataloge uniformity and access points. One only has
the difficulties encountered in revising the records will to think of the various catalogers, 21 libraries and 30
now follow. catalogers have participated in the project), working
In the first place, there existed the problem of using in different locations, who create lists of name and
IT for cataloging manuscripts. Cataloging field by field, title headings that are inevitably different when using
which the software usually proposes, means that the a local program. When constructing authority records,
Online Catalog of Manuscripts Conserved in Libraries in the Veneto Region
they may produce cross-references to sources that are so that project members could exchange ideas and
based on each catalogers personal knowledge and on proposals and obtain external contributions.
the availability of the information on the territory, which
may result in inconsistency. As foreseen, revision was
slow and complex, producing a cataloge that was not Future trends
uniform and hence almost inaccessible. Sharing enables
the cataloger to extract useful information from the The transfer of data from the MANUS system to the
lists, thus reducing cataloging time: an official name NBM was completed in the summer of 2006 and con-
is linked by cross-reference to the manuscript reper- tains all information concerning holdings deposited
tory, which only has to be verified, and a conventional in the following libraries: Museo Biblioteca Archivio
name can be more easily recognized and identified by of Bassano, Biblioteca Lolliniana of Belluno, San
other catalogers; a uniform title is linked to the author Francesco della Vigna of Venezia, the private library
with relative notes and also by cross-reference to the Andrighetti Zon Marcello of Venezia, Seminario di
repertory or edition. This means that the coordinating Vittorio Veneto, amounting to around 800 manu-
team has to verify and monitor the process constantly, scripts, to which can be added 2,200 and 3,000 letters
correcting errors in the lists and providing official name from the other libraries: the Biblioteca civica of Bel-
and title headings, in the logic of an open catalog. luno, the Biblioteca civica of Padova, the Biblioteca
Those catalogers who were familiar with the SBN dellAccademia dei Concordi of Rovigo, Biblioteca
system were obviously at an advantage when imple- capitolare della Cattedrale of Treviso; la Biblioteca
menting this type of cataloging, so different from the del Museo Correr of Venezia, la Fondazione Querini
traditional cataloging of manuscripts that only had to Stampalia of Venezia, la Biblioteca del Museo di Storia
guarantee and conform to internal consistency. Knowing Naturale of Venezia, la Biblioteca civica of Verona,
how to deal with problems of consistency in assigning the Biblioteca del Museo civico di Storia Naturale of
names and headings, being familiar with the RICA and Verona, the Biblioteca civica Bertoliana of Vicenza,
SBN index guidelines, and being aware of the prob- the Biblioteca del Gabinetto di lettura of Este and the
lems of incorrectly inserting data in a shared catalog Biblioteche venete dellOrdine dei frati minori. At the
have highlighted the problems of online cataloging same time cataloging in the NBM system was com-
compared to traditional card cataloging methods. The menced, thus making available to the public a further
NBM system, which is currently importing over 3,000 set of 1,500 codices as well as letters. A particular type
manuscripts and letters from the MANUS system, aims of software that provides more detailed cataloging and
to standardize catalog entries, thus guaranteeing accu- images is to be developed to meet the needs of libraries
rate cross-references between entries and manuscripts that house music manuscripts. The NBM system will
according to present standards and studies, and enables also include study and reference tools, which will be
constant modification. Whenever an entry is modified digitized and made available to scholars. The project
in a list it is also modified in all the associated manu- undertaken by the Biblioteca del Museo Correr concerns
scripts at the same time. The work is indeed laborious, the digitization of the manuscript catalog of the library
but the quantity of data, the cataloging time involved of Emmanuele Antonio Cicogna, which has around
that cannot be compared to the time taken to catalog 4,500 codices, compiled by Cicogna himself in seven
printed books, and the processing of a small number descriptive volumes and six indexes. Through the NBM
of manuscripts at a time means that the database can catalog it will be possible to access the pages of this
be kept under control. It is hoped that once a sufficient precious scholarly tool and search by present and past
number of manuscripts have been inserted, the catalog- shelfmark, by author and by manuscript date.
ers themselves, when looking through different types Since July 2005 around 10,000 manuscripts have
of published records, can standardize their descriptive been published, proving that online cataloging and
style, solve the same problems in a uniform manner and management leads to a daily increase in the number of
have access to substantial lists of name and title headings available records and that it seems to be successful in
and bibliographies that can be captured or increased by processing the vast number of manuscripts housed in
applying the same criteria. Hence, it was also deemed Italian libraries. Nevertheless, experience has taught
important to set up a discussion forum within the NBM, us that these kinds of enterprises cannot be embarked
Online Catalog of Manuscripts Conserved in Libraries in the Veneto Region
upon without the support and solid determination of Some interesting indications on the subject can
institutions, libraries and scholars that are confident of be found in Riflessioni di un catalogatore di libri O
the success of this initiative. manoscritti by Paul Canart, published at www.
let.unicas.it/links/didattica/palma/testi/canart1.
htm.
notes
Online Catalog of Manuscripts Conserved in Libraries in the Veneto Region
Online Cataloging: Manuscript cataloging via Shared Resources: Information sharing among
the Web. catalogers (lists of: name of person, corporate body
and location, title heading, subject, collection, ancient
Online Management: Work of revision and pub-
libraries, bibliography)
lication managed via the Web
Veneto Region: Geographical area in which project
Opac Search: Database search tool, via simple
members are working (Venezia, Padova, Treviso, Rovi-
search (by word using Boolean operator) or advanced
go, Belluno, Verona, Vicenza, Vittorio Veneto, Basano
(by combining terms from different fields)
del Grappa, Monselice, Este, Feltre).
Section: Process ICT
Zane Berge
University of Maryland, Baltimore County, USA
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Online Learnings Future in the Workplace with Augmented Reality
Figure 1. U.S. Navy wireless head mounted display (HMD) From Eye on the Fleet Photo Gallery, by the U.S.
Navy, 2006, http://www.news.navy.mil/. (U.S. Navy photo by John F. Williams (Released))
northwest corner of an upper floor. After several long 2-dimensional wiring behind a wall. Figure 3 shows a
moments of silence, the sound of heavy footsteps and head mounted display view of a 3-dimensional character
loud voices is heard coming down the stairs toward and church created to bring art history to life.
the outside doorway. It is time to debrief. Was their Augmented reality immerses participants in work-
strategy successful? Could they have planned a more place contexts that closely match the actual contexts
effective strategy? The soldiers are focused on learning of their jobs. This contextual approach to learning is
from their mistakes in preparation for their imminent consistent with principles of adult learning theory:
deployment to the war zone. adults need to know why they need to learn something;
adults prefer the learning context to be practical and
augmented reality applicable; and adults are motivated to learn when
it will help them better cope with actual job and life
The technology of augmented reality (AR) made it tasks (Knowles, Holton, & Swanson, 1998). Contex-
possible for the platoon to see through the building. tual learning facilitates the development and retention
Augmented reality enables users to view the real world of skills and knowledge and active engagement in
enhanced by the addition of computer-generated, or problem solving (Brill, 2001). Some experts theorize
virtual, images. Each virtual image is aligned with its that the contexts of work and job-related learning are
related real world object so that the real and virtual intertwined with workplace knowledge. According to
images appear to coexist. A view of augmented reality Eraut (1994):
as seen through a head mounted display is shown in
Figure 2. The virtual electrical wires seen on the wall Professional knowledge cannot be characterized in a
match the exact placement of the actual wires inside manner that is independent of how it is learned and
the wall (Azuma, 1997). The addition of virtual images how it is used. It is through looking at the contexts of
enhances the viewers perception and augments their its acquisition and its use that its essential nature is
experiences in the real world environment (Azuma, revealed. (p. 19)
2004).
Many image formats are used in augmented reality: enabling technologies
graphics, diagrams, drawings, text, short movies, and
avatars, or virtual people (Shelton, 2002). Displayed Augmented reality images are dynamic, changing in
images can be 2- or 3-dimensional (Regenbrecht, Bara- response to user movement. As the user moves while
toff, & Wilke, 2005), depending on the environmental viewing images through a head mounted display, the
context. Figure 2 shows a head mounted display view of images alter to accommodate the persons perspec-
Online Learnings Future in the Workplace with Augmented Reality
Figure 2. An augmented reality view of electrical wiring. Reprinted courtesy of Fraunhofer IGD and ZGDV,
Germany. (Copyright 2007, Gundrun Klinker. Used with permission.) O
tive. Figure 4 illustrates the changes made to images reality system may one day be mass-marketed as the
in response to user movement. Viewed from a body Walkman of the 21st century (Bonsor, 2001).
position facing the front of the image, the image looks
as it would in reality. When the body position moves
to the right, the image changes so that it continues to scenarIo 2: the PotentIal
look like it would in reality (Bonsor, 2001). Four tech- oF augMented realIty In
nologies are required to make it possible to view such WorKPlace learnIng
real-time, dynamic, 3D images: a powerful computer
to render images; a network to transfer the images to Imagine another platoon of 30 soldiers patrolling the
the learner; a system to track user movement and ori- northwest sector of an enemy city known as Quadrant
entation, such as a global positioning system (GPS) or Four. Walking slowly, wearing head mounted displays,
a tracking device (acoustic, mechanical, magnetic, or or windshields (Julier, 2006), with attached stereo
vision tracker); and a visual display, generally a head ear buds, and a backpack containing tracking sensors
mounted display, through which to view virtual images and a powerful personal digital assistant (PDA) with
and the real world (Mahoney, 1999). Figure 5 illustrates wireless Internet access, they carefully study each
the way in which the four technologies work together intersection and building while remaining alert and
to create augmented reality (Zlatanova, 2002). aware of their surroundings. Suddenly, a car bomb
The learner carries the computer with network ac- explodes 100 yards away. The soldiers take cover and
cess, a tracker, and head mounted display. Ideally, the try to listen to orders coming through their ear buds,
computer and tracker are incorporated into one wearable but the sound of the explosion was deafening, mak-
unit, such as a backpack, to enable ease of movement ing hearing difficult. Waiting for the call to move out,
and use of hands (Bonsor, 2001). The head mounted the men and women check their weapons and spend
display is securely attached to a helmet or strap. The a moment in silence waiting for their heart rates and
tracking system has two components: one worn by the adrenaline levels to return to normal. The all-clear call
person, the other built into the surrounding environ- finally comes and they leave the safety of cover. When
ment (Feiner, 2002). As the technology advances and the platoon is 25 yards from the bombsite, machine gun
computers and head mounted displays become smaller, fire erupts from rooftops all around them. Startled, they
the wearable augmented reality system will become less wildly look all around as they realize that this part of
cumbersome. It has been speculated that an augmented the city is surrounded by high walls with few places
Online Learnings Future in the Workplace with Augmented Reality
Figure 3. Augmented reality view of a 3-D character and church created to bring art history to life From How
Real Should Virtual Characters Be? by D. Wagner, M. Billinghurst, D. Schmalstieg, 2006, In Proceedings of
the ACM SigCHI International Conference on Advances in Computer Entertainment Technology 2006 (ACE
2006). (Copyright 2006, D. Wagner, M. Billinghurst, D. Schmalstieg. Reprinted with permission.)
to seek cover. Panic ensues as several soldiers are hit The burden of carrying cumbersome equipment
by gunfire before the sergeant calls an end to the train- should be relieved as advances are made in technol-
ing activity. This experience has made quite clear the ogy. Head mounted displays are expected to one day
need to learn Quadrant Four so that they can avoid resemble a regular pair of eyeglasses, eliminating any
the Mogadishu experience of getting lost in the streets fashion concerns (Azuma, 2004). Handheld comput-
of a war zone (Heltzel, 2002). The platoon will return ers, personal digital assistants (PDAs), and mobile
to the windowless block buildings that make up the phones are being used in some current augmented
geographically correct city to spend another day learn- reality e-learning prototypes (Klopfer, Perry, Squire,
ing Quadrant Four in preparation for their deployment & Ming-Fong, 2005). Though the global position-
to the war zone. ing system is used in some prototypes, the location
information it currently provides can be yards off the
the Potential of augmented reality in mark, requiring the addition of another tracker. As error
learning correction techniques and availability improve, use of
global positioning may become common in augmented
Multisensory immersion has been shown to aid learning reality e-learning (Zlatanova, 2002).
(Dede, Salzman, Loftin, & Sprague, 1999). Augmented
reality has the potential to apply not only to vision, but the Potential of augmented reality in
also to hearing, touch, and smell (Azuma et al., 2001). e-learning
Three senses were involved in the second scenario.
In addition to the visual image of a bomb exploding, Both combat scenarios highlight the enormous potential
the sound of an explosion could be heard and bullets of augmented reality e-learning. Training participants
could be felt striking the body. With simultaneous can experience dangerous or unusual situations while
visual, auditory, and haptic input, participants were remaining in the safety of a controlled learning envi-
immersed in the experience and reacted at a visceral ronment (Information in Place, 2004). Learning op-
level (Kurzweil, 2006). The multisensory immersion of portunities can be brought directly into the workplace
augmented reality facilitates rapid learning in prepara- without causing the disruption to workflow that can
tion for critical situations.
0
Online Learnings Future in the Workplace with Augmented Reality
Figure 4. Changing view of image in response to user movement. From Modelo de Contexto Para Realidad
Aumentada, by Andres Agudelo, 2004, http://aagudelo.control-systems.net/2004/10/publications.html. (Copy- O
right 2004, Andres Agudelo. Reprinted with Permission.)
Figure 5. The integrated functions of the four technologies used in augmented reality (Copyright 2006, Katherine
Ira. Reprinted with Permission.)
result from supervising a trainee learning-by-doing potential benefits of augmented reality in e-learning.
on the job (Traskback & Haller, 2004). The unique Boeing wire shop workers string hundreds of miles
nature of augmented reality e-learning appears well of wiring in each plane built. As planes are custom-
suited for the development and practice of problem ized by model, each model requires its own unique
solving and physical skills (Shelton, 2002). The U.S. configuration of wires. A 747, for example, contains
Naval Submarine Learning Center anticipates that the approximately 1,000 wire bundles ranging from 212
use of augmented reality in submariner training will feet long. Wire assemblers in 1995 used customized
decrease training time by 30%, decrease costs by 15%, computer printouts of formboards to guide them in
and improve understanding (Lotring, 2006). stringing wire, which required constant movement
Researchers see a potential for augmented reality between printout and plane. To increase productivity,
e-learning in many fields, including medicine, manu- Boeing initiated an exploratory augmented reality
facturing and repair, architecture, paleontology, and the system to display the correct formboard image over its
military (Azuma, 1997). The first successful augmented matching plane location. The augmented reality system
reality system was developed by Boeing to support has been quite effective, allowing workers to complete
the wiring of jets (Regenbrecht et al., 2005). While wiring 2050% faster, improving productivity (Nash,
not developed as a tool for learning, it exemplifies the 1997). Boeings successful use of augmented reality,
Online Learnings Future in the Workplace with Augmented Reality
rapid developments in technology, and the falling costs ing around an outdoor location, they use augmented
of hardware have led to a surge in augmented reality reality to access information at specific locations and
research and development (Feiner, 2002; Kaplan-Lei- interview virtual experts, or avatars. Team members
serson, 2004). share data in the field via infrared beaming (Kleefeld,
Over the past decade, the U.S. military has funded 2005). Reconvening in the classroom, students discuss
much of the augmented reality research and develop- and analyze information collected and formulate a
ment in the United States (Kaplan-Leiserson, 2004). hypothesis for solving the mystery.
One such synchronous e-learning prototype currently Results indicate this is a very effective learning
in development at the Naval Research Lab is Fire Sup- activity. Ten pairs of alternative high school students,
port Team Training, designed to hone communication described as largely unmotivated by school, actively
skills between the forward observer, a mortar trainee, participated, collaborated to reformulate hypotheses
and the Fire Direction Center. The forward observer in the face of new data, and articulated an average of
wears a head-mounted display showing 3-dimensional five different hypotheses in the course of the game
virtual targets, such as combatants, tanks, and planes (Academic Advanced Distributed Learning Co-Lab,
superimposed on the real practice range. The instructor, n.d.). Future research will include a comparison of
in the role of Fire Direction Center, uses a computer standardized test scores between groups of students
touch screen to control target movement. Looking learning with Mad City Murder Mystery and control
through the head mounted display, the forward ob- groups learning with pen-and-paper technologies
server locates the target, identifies gird coordinates (Kleefeld, 2005).
on a map, and relays the call to fire to the instructor. Many augmented reality e-learning systems in re-
Once the shots are fired, the instructor determines their search and development are applicable to workplace
accuracy and effect on the target, and sends a virtual learning, including the Multimedia Augmented Reality
representation of that effect to the forward observer, Interface for E-Learning (MARIE). An outcome of the
as seen in Figure 6. The calls for fire are adjusted Virtual Interactive Teaching Environment, MARIE was
until the desired effect is realized. The use of wireless designed to facilitate more effective learning through
networking and video cameras linked to the instructor the use of virtual media. This system uses a lightweight
station make this augmented reality system portable, head mounted display with attached camera, a computer
or mobile. Fire Support Team Training has been well with broadband Internet access, markers in the form of
received by mortar trainees and instructors at Quantico paper cards, predefined multimedia information cor-
(Brown, Baillot, Bailey, Pfluger, Maassel, Thomas, & responding to each marker, and a flat surfaced tabletop
Julier, 2005). While a rigorous study of effectiveness work area. Seated in front of a computer wearing a
has not yet been done, the ability to fire on moving head mounted display, the learner is assigned a specific
targets creates a more realistic learning experience for marker card. As the student moves the marker into the
forward observers preparing for combat. line of sight, the camera sends input to the computer,
Augmented reality is by no means limited to mili- which in turn superimposes virtual 3-dimensional im-
tary applications. Mad City Murder is a collaborative, ages and text onto the marker, as well as an animation
mobile, augmented reality e-learning game based on and a 2-dimensional diagram. Figure 7 illustrates the
the premise that augmented reality can support content augmented view of a learner in an engineering class
learning and development of the critical 21st century (Liarokapis, Petridis, Lister, & White, 2002). This e-
information technology skills of collaboration, infor- learning system is applicable to learning in a variety
mation sharing, and analysis of complex information of workplace environments, including maintenance,
(Klopfer et al., 2005). Designed for middle school manufacturing, architecture, and medical surgery.
through college use, students work in teams to solve a A new system in development, e-AR, will blend
murder mystery. Team members use a personal digital augmented reality with an online learning management
assistant with wireless Internet access and a global system (LMS). e-AR is designed to facilitate immersive
positioning system tracker to collect data in the field learning and enhance remote collaboration through the
for their murder investigation (Brown, 2006). To facili- use of augmented reality in a traditional e-learning
tate collaboration, each team member takes a distinct environment. The prototype will feature an e-learn-
role, accessing specific data unique to that role. Mov- ing science course on the solar system that includes
Online Learnings Future in the Workplace with Augmented Reality
Figure 6. Head mounted display view of a virtual target destroyed by a round of fire. From Using Augmented
Reality to Enhance Fire Support Team Training by D. G. Brown, Y. Baillot, M. Bailey, K.C. Pfluger, P. Maas- O
sel, J. Thomas, and S.J. Julier, 2005, Interservice/Industry Training, Simulation, and Education Conference
(I/ITSEC) 2005. (Reprinted courtesy of the U. S. Naval Research Laboratory).
Figure 7. A MARIE users augmented view. From independent learning activities as well as synchronous
Multimedia Augmented Reality Interface for E-learn- collaborative activities and competitive board games.
ing (MARIE), by F Liarokapis, P Petridis, PF Lister, Learners will wear lightweight head mounted displays
M White, 2002, World Transactions on Engineering to view virtual contents stored in the learning manage-
and Technology Education 2002 UICEE, Vol.1, No.2, ment system, participate in synchronous events, and
2002. (Copyright 2002, Fotis Liarokapis. Used with collaborate asynchronously to solve problems using
permission.) augmented reality. Individual student progress will be
monitored via the learning management system. The
proposed interface features four parts: a large display
area in which to view augmented reality while wearing
a head mounted display; a mini-map providing special
information; an area for assignments to be posted; and
an area linking to online communication tools. Rigor-
ous learner studies to evaluate the learning activities
and interface design are planned for the final phase of
development (Yu, 2006).
Results of a study conducted in 2002 with university
students studying the solar system found that the use
of augmented reality improved conceptual and factual
information and led to a reduction of the misrepresen-
tation of factual information. An interaction analysis
found that learners acquired information in the aug-
mented environment by viewing and interacting with
sophisticated phenomena (Shelton, 2002). The research
proposed in the e-AR study will take this a step further
by analyzing learnerlearner interaction as well as that
of learner to content.
Online Learnings Future in the Workplace with Augmented Reality
Online Learnings Future in the Workplace with Augmented Reality
Learning Management System: An online infra- Synchronous: Two-way communication that occurs
structure platform through which learning content is with no time delay, allowing interaction in real time.
organized, delivered, and managed. Features include
Tracking Device/Tracker: Electronic device that
access control, provision of learning content, commu-
records and/or relays information about the position and
nication tools, such as e-mail and threaded discussion
orientation of a person in motion. It can be worn by the
forums, and assessment of student progress.
person or attached to a stationary or moving object.
Local Area Network (LAN): An enclosed network
Virtual Media: The representation, effect, or es-
connecting a collection of computers in a local area,
sence of a real thing produced through technology.
such as an office, building, or college campus.
Virtual Reality: An artificial 3-D sensory immer-
Marker: A physical object in augmented reality that
sive environment created with computer software. The
triggers the display of predefined virtual images.
user typically wears headgear with an internal viewing
Personal Digital Assistant (PDA): Portable screen, earphones, special gloves, and/or full-body
handheld computing device that can store, retrieve, wiring.
and transmit data. Also called a palmtop, handheld
Wide Area Network (WAN): A group of computer
computer, and pocket computer.
networks connected together over a large geographical
Situated Learning: Learning that takes place in a distance crossing metropolitan, regional, or national
setting functionally identical to the setting in which it boundaries.
will be applied.
Section: Context ICT
C. J. Hsu
Griffith University, Australia
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Online Trust in Mobile Commerce
tickets, purchasing goods from vending machines Users have a need for increased security, and
via wireless devices, and trading stocks. believe that the mobile technology will increase
M-commerce marketing functions may alert security (Wong et al., 2005a).
users of shops and special sales based on their Mobile technology is more convenient to use than
locations. previous/alternative systems.
Users trust those holding the data to keep them
There are a number of mobile technologies and secure and not use them in any other way than
applications supporting m-commerce. For example, the advertised purpose.
location-based services can be used for advertising
goods or services to customers in a unique way. Many Perceived Usefulness and Perceived Ease of Use
innovative technologies and applications in B2C The technology acceptance model (TAM) is an infor-
mobile commerce can be found in the retail industry mation systems theory that models how users come
(Extended Systems, 2002; Roussos, 2002; Wong et to accept and use a technology. The TAM was first
al., 2005a; Wong, Hsu, & Steele, 2005b). However, introduced by Davis et al. in 1986 (Davis, 1989). The
to build trust and reach customers, it is important to model provides a traditional viewpoint about technol-
understand customer buying behavior such as their ogy acceptance from users aspects. The level of the
buying decision process. users acceptance depends on perceived usefulness
and perceived ease of use. TAM is a well-respected
Framework for online trust in Mobile model of IT adoption and use. TAM shown in Figure
commerce 2 includes two constructs; perceived usefulness and
perceived ease of use (Davis, 1989).
This section reviews some research streams and based TAM is used as a base model to produce a causal
on identified factors effecting confidence from the model resembling a network of relationships among the
previous section, determines which ones may affect constructs of the study. This work has also indicated
consumer buying decisions (Steele & Tao, 2006). A that perceived usefulness has the largest influence on
framework of m-commerce acceptance is proposed and IT acceptance followed by users attitudes toward IT.
discussed. A significant body of knowledge from several Perceived usefulness is demonstrated to operate directly
research streams sheds light on how confidence forms. on IT acceptance and indirectly through user attitudes
Drawing from those theoretical streams, a number of (Davis, 1989). Meanwhile, perceived ease of use has
confidence antecedents have been identified from the a larger influence on users attitudes than perceived
literature. The framework of the mobile technology usefulness (Davis, 1989).
acceptance model has a number of elements which The core concept of TAM is that perceptions of
are psychological and behavioral factors that effect usefulness, ease of use and other external variables
buying behavior (see Figure 1) (Wong & Hsu, 2006). will influence an individuals intention to use IT, which
The behavioural factors include perceived ease of use will ultimately influence actual usage behavior (Davis,
and perceived usefulness (these two factors are directly 1989). The TAM also offers a promising theoretical basis
adopted from TAM) (Davis, 1989). The psychological for examining the factors contributing to IT acceptance
factors refer to security, convenience and trust. in natural settings. A key purpose of TAM therefore,
is to provide a basis for tracing the impact of external
Behavioral Factors factors on internal beliefs and attitudes (Davis, 1989).
TAM was formulated in an attempt to achieve these
In most technological inventions, success or failure goals by identifying a small number of fundamental
is determined by user acceptance. Attewell & Rule variables suggested by previous research dealing with
says its the pivotal factor (Al-Gahtani, 2001). User cognitive and affective determinants of computer ac-
cooperation is essential for many technology applica- ceptance (Davis, Bagozzi, & Warshaw, 1989).
tions of mobile technology. Three important factors Perceived usefulness and perceived ease of use are
that lead to acceptance: the two particular beliefs, as depicted in Figure 2. Ac-
cording to this model, system usage is determined by
the users attitude towards using the system while at-
Online Trust in Mobile Commerce
Figure 1. Confidence-based framework for mobile commerce adoption An extension of the technology acceptance model
(Wong & Hsu, 2006) O
Psychological factors
Personality-based
confidence
History-based confidence
Institution-based confidence
Behavioral Actual buying
Attitude decision
intention
behaviour
Behavioural factors
Perceived usefulness
Perceived
Usefulness
Perceived Ease of
Use
titude towards using is jointly determined by usefulness focus in mobile technology developments over the
and ease of use (Davis, 1989). Perceived usefulness is last 20 years.
defined as the degree to which a person believes that
using a particular system would enhance performance Psychological Factors
(Davis, 1989, p210).
Perceived ease of use is defined as the degree to Personality-Based Confidence
which a person believes that using a particular system Personality-based confidence is defined as the extent to
would be free of physical and mental efforts (Davis, which one displays a consistent tendency to be willing
1989, p. 320). Davis (1989) also suggested that per- to depend on others across a broad spectrum of situa-
ceived ease of use might actually be a prime causal tions and persons (Mayer, Davis, & Schoorman, 1995;
antecedent of perceived usefulness. TAM also postulates McKnight, Choudhury, & Kacmar, 2002). This form of
that perceived ease of use is an important determinant confidence is based on a belief that others are typically
of attitude toward using a system. We believe that the well-meaning and reliable (Wong et al., 2005b). These
user friendliness of mobile devices has been a central beliefs are a confidence that is influenced by cultural
Online Trust in Mobile Commerce
background and personality type (Mayer et al., 1995). based confidence such as familiarity, reputation, brand,
Such a disposition is especially important in the initial and size will be discussed below.
stages of a relationship (Mayer et al., 1995; McKnight, History-based confidence antecedents such as fa-
Cummings, & Chervany, 1998). miliarity with the online mobile vendor suggest that
Existing researches have revealed that an individu- confidence develops over time with the accumulation
als propensity to confidence has a relation to customer of confidence. Thus, the development of confidence
confidence in the m-commerce context. For example, between parties requires time and an interaction history
research conducted by Gefen (2000) suggested that the (McKnight et al., 2002). Familiarity is experience with
propensity to confidence has a significant association the what, who, how, and when of what is happening.
with customer confidence. This evidence suggested that While confidence reduces social complexity relating to
propensity to confidence should be especially important future activities of the other party, familiarity reduces
for inexperienced online mobile customers, since, in the social uncertainty through increased understanding of
absence of social cues and experience with an online current actions of the store.
mobile retailer, new customers are forced to base their In m-commerce, customer familiarity, for example,
confidence primarily on their socialized propensity corresponds to how well a customer comprehends the
to confidence (Gefen, 2000). Findings from a study online procedures, including when and how to enter
carried out by Teo and Liu (2005) in U.S., Singapore, credit card information (Gefen, 2000). Accordingly,
and China indicated that propensity to confidence has a familiarity with an online mobile vendor should in-
positive impact on customer confidence in online pur- crease customer confidence because more familiarity
chases. Similarly, the research conducted by Wingreen implies an increasing amount of accumulated knowl-
and Baglione (2005) also suggested that propensity to edge derived from experience from previous success-
confidence positively affects mobile confidence. How- ful interactions through the online activities (Gefen,
ever, the aforementioned studies did not take place in an 2000). People tend to trust the familiar, and familiarity
Australian environment and this study seeks to verify obtained through frequent exposure has the potential
that a propensity to confidence influences m-commerce to engender confidence. Brands remain critically
confidence in an Australian environment. important to vendors (Gallaugher, 1999), since they
supply three fundamental benefits. Those benefits are
History-Based Confidence lower search costs, building confidence, and to com-
History-based confidence (also known as knowledge- municate quality (Gallaugher, 1999). Customers feel
based confidence) is based on the development of the that the better the brand is, the higher the confidence
predictability of the other party through knowing the they have. Hence, the creation of better brands should
other sufficiently well that their behavior is predictable produce an important source of customer confidence
(Lander, Purvis, McCray, & Leigh, 2004). History- and so overcome their uncertainty.
based confidence relies on information rather than Reputation is conceptualized as a customers percep-
fear of punishment or rewards of being trustworthy. It tion of a stores reputation, where reputation is defined
assumes that the parties have firsthand or secondhand as the extent to which customers believe a store is
knowledge of each other, based on an interaction his- honest and concerned about its customers (Doney &
tory and knowledge. The firsthand knowledge should Cannon, 1997). When customers do not have personal
come through direct familiarity with the online mobile experience with a vendor, word of month reputation
vendor. If there is no interaction history with the par- can be a key to attracting customers. Hearing from
ticular party, Hoffman, Novak, and Peralta (1999) have someone else that having a positive experience with
noted that customers do not have confidence with most a vendor can help ease users perceptions of risk and
online mobile stores enough to engage in relationship insecurity in interacting with the vendor (Wong &
exchanges that involve money and personal infor- Rubasinghe, 2005).
mation. While the secondhand knowledge like store Doney and Canon (1997) stated that the size of a
reputation, brand name, and store size may influence vendor is its overall size and market share position
confidence, one missing factor is the implicit comfort in a transitional business environment. Since a large
of face-to-face communication present in firsthand market-share vendor should serve a more diverse and
interactions (Wong & Hsu, 2005). Aspects of history- heterogeneous set of customers, research suggests that
0
Online Trust in Mobile Commerce
the large vendor consistently delivers on its promise to As m-commerce is an innovative concept surrounded
its customers and many customers tend to have confi- by considerable skepticism, a mobile retailers actions O
dence in it. The reasoning is that otherwise, it would not must be congruent with its promises. This refers situ-
have been able to maintain its position in the industry ational normality. Some researchers stated that firms
(Doney & Canon, 1997). Large organizational size also could maintain customer retention by responding to
indicates that the vendor is likely to possess expertise service failures in a fair manner (Oliver & DeSarbo,
and necessary support systems to produce confidence 1988). These findings suggest that purchase intentions
and loyalty (Jarvenpaa, Tractinsky, & Vitale, 2000). will remain stable, and possibly increase, when service
In an m-commerce environment, customers consider recovery is effective. These findings imply that effec-
that the large size of a vendor is able to guarantee their tive customer support also decreases customer risk
products or services or if a product failure or the loss of and inspires confidence again. On the other hand, a
a transaction occurs the vendor can compensate buyers poor customer service effort may substantially reduce
accordingly (Jarvenpaa et al., 2000). ones future intentions to purchase from the failing
firm, because the firm does not keep its promise and
Institution-Based Confidence that dramatically reduce the confidence worthiness of
The concept of institution-based confidence proposed the firm. In online business environments, Reibstein
by McKnight et al. (2002) represents the beliefs held (2002) conducted a study over a million respondents
by customers about impersonal structures and favor- to find out which attributes are most important in the
able conditions, in which they feel safe, assured, and customer choice process for the repeat buyers. His find-
comfortable with the prospect of depending on the ings suggested that the highest connection falls between
business. Although institution-based confidence consid- perceived customer service support and likelihood to
ers technological components of the institution, prior purchase again. Those findings implied that customer
theoretical (McKnight et al., 2002) and operational support is an important factor for customer purchase
definitions have been very general with respect to tech- decisions in both offline and online mobile commerce.
nological factors present in the electronic marketplace However, there is no empirical study to use customer
(McKnight et al., 2002; Steele & Tao, 2006). The two service as a factor of measuring m-commerce confidence
types of institution-based confidence discussed in the and this study considers that an effective customer
literature are structural assurance and situational nor- service will affect confidence between customers and
mality (Gefen, Karahanna, & Straub, 2003; McKnight online mobile vendors (Steele & Tao, 2006).
et al., 2002). Research on the concept of confidence in the online
Structural assurances or structural safeguards refer mobile environment, starting from the late 1990s has
to an assessment of success due to structures such as generated a valid list of factors that engender cus-
legal recourse, guarantees, regulations, or other proce- tomer confidence in an online business environment.
dures that exist in a specific context (Gefen et al., 2003; The commonly cited study by Hoffman et al. (1999)
McKnight et al., 2002). Structural assurance leads the focuses on security and privacy as the key drivers of
customer to believe that it is not in the best interest of mobile confidence. They argue that environmental
the business to defect (Doney & Cannon, 1997). control or customers ability to control the actions of
Mobile shopping also contains a level of risk (Steele a Web vendor directly affects customer perception of
& Tao, 2006). Customers cannot physically check the online mobile security and privacy. They also discuss
quality of a product or monitor the safety and security the effectiveness of third-party trust-certification bodies
of sending sensitive personal and financial information (e.g., TRUSTe or Verisign) and the public key encryp-
while shopping on an electronic network (Wong et al., tion infrastructure for ensuring transactional security
2005a). This condition creates a sense of powerlessness (including privacy protection) as central success factors
among online mobile shoppers. Structural assurance for building customer confidence in online network
can decrease customer risks. For example, on the Web, (Steele & Tao, 2006; Tao & Steele, 2006).
cues appear on the Web page, and may include seals
of approval (McKnight et al., 2002), explicit privacy
policy statements (McKnight et al., 2002), insurance,
and affiliations, with respected companies.
Online Trust in Mobile Commerce
Online Trust in Mobile Commerce
gies. The security policy should be included as part of their Web sites. A high-quality and well-designed Web
their Website so consumers can be reassured that the site can be employed to predict the shopping results, O
measures taken by the online vendor will protect their thus engendering trust toward an online vendor.
consumers personal information and ensure the risk Fourth, online customer service can be improved
associated with unauthorized access to their information through the introduction of comprehensive electronic
is reduced as much as possible. Hoffman et al. (1999) tools and technologies. For example, online vendors
suggests that trust arising from privacy concerns could provide the tracking system that integrates logistics
be accomplished better by allowing the balance of power with global positioning system (GPS) and then con-
to shift toward a more cooperative interaction between sumers can know their product shopping status with
online business and its consumers. An import step in an easy click. Service supported by appropriate elec-
this balancing process is recognizing the consumers tronic technology is essential to improve operational
right to data ownership in the Internet environment. efficiencies and maintain consumer satisfaction. Thus,
A more customer-oriented privacy policy will lead to online businesses can offer excellent customer service
better relationship exchanges with important benefits and create positive customer experience through order
for the consumers and online vendors. By disclosing processing, payment integration, on time delivery and
on the Website, the online vendors privacy practices, after-sales service.
consumers privacy concerns should significantly Finally, the literature has shown that the perceived
decrease and online vendors can build a more trusting reputation of online vendor is related to online trust.
environment for online transactions. This relationship was also shown in this study, since
Second, third-party assurance can be treated as an reputation and online trust loaded on the same factor.
important signal or argument for the development of Online business should have a good reputation in the
online trust in the m-commerce context. However, market to continue growth in the m-commerce envi-
third-party assurance may useless when consumers are ronment. It is recommended that regular advertising
unfamiliar with the third-party assurors provide or when and marketing campaigns in various communication
they do not comprehend the meaning of such assurances channels will enhance perceived reputation of online
as displaying a Web seal (Moores, 2005). In order to in- vendor (Papadopoulou et al., 2001).
crease consumers online trust, Internet vendors should Rapid developments in technology have made
participate in recognized and trustworthy third-party significant contributions to secure the network for m-
assurance programs and endeavor to educate consum- commerce. However, challenges remain in this area,
ers about the significance of the third-party assurance. and consumer confidence remains a substantial issue
Consumers who aware of and have knowledge about for the development of m-commerce. Many other re-
Web seals will perceive that transacting with Internet searchers have reinforced this belief asserting that only
vendor is assured, and thus will exhibit higher trust after security and privacy have been addressed will
(De Ruyter, Wetzels, & Kleijnen, 2001). customers consider other features (i.e., familiarity, repu-
Third, a high-quality and well-designed Website is tation, technology application quality) to determine the
also critical when consumers consider transacting with extent to which they can have confidence and feel safe
online vendors (Grabner-Krauter & Kaluscha, 2003). transacting with a merchant. This chapter overviewed
A consumer usually can efficiently search and collect important factors in m-commerce acceptance both
enough product information over the Internet when the behavioral and psychological. To examine customer
customer is considering buying a product or service. In acceptance of mobile commerce, we have applied and
searching for information, abundant information may extended the TAM. The confidence-based framework
lead to information anxiety. Further, not all information for B2C mobile commerce has been developed for
will be useful for purchase decision making. However, empirical validation of the research problems.
information that is unclear or confusing will increase
uncertainty and risk and may result in consumers
reluctance to purchase products over the Internet. reFerences
Thus, online vendors should provide appropriate key
product information on their Website in order to lower Al-Gahtani, S. (2001). The applicability of TAM out-
consumers perceived uncertainty about shopping on side North America: An empirical test in the United
Online Trust in Mobile Commerce
Online Trust in Mobile Commerce
Steele, R. & Tao, W. (2006, October). An enhanced Mobile Business Personal and Ubiquitous Computing.
architecture for mobile retailing. In Proceedings of Springer Publisher. O
The International Conference on Mobile Technology,
Worldwide Mobile Market Forecasts 2006-2011 (2006,
Applications and Systems (IEE Mobility 2006) (pp.
Jan. 18). Retrieved March 16, 2008 from, Portio Re-
25-27). Bangkok, Thailand.
search: http://www.portioresearch.com/WMMF06-
Tang, F., Thom, M. G., Wang, L. T., Tan, J. C., Chow, 11.html
W. Y., & Tang, X. (2003). Using insurance to create
Vijayasarathy, L. R. (2004), Predicting consumer
trust on the internet. Communication of the ACM,
intentions to use on-line shopping: The case for an
46(12), 337-344.
augmented technology acceptance model. Information
Tao, W. & Steele, R. (2006, September). Mobile trust and Management, (41), 747-762
via extended digital certificates. In Proceedings of
the 2nd IEEE International Symposium on Depend-
able, Autonomic and Secure Computing (DASC 06), Key terMs
Indianapolis.
History-Based Confidence: History-based confi-
Teo, S. H. & Liu, J. (2005). Consumer trust in e-com-
dence (also known as knowledge-based confidence) is
merce in the United States, Singapore and China. In-
based on the development of the predictability of the
ternational J. of Management Science, Omega, 1-17.
other party through knowing the other sufficiently well
Torkzadeh, G. & Dhillon, G. (2002). Measuring fac- that their behavior is predictable.
tors that influence the success of Internet commerce.
Institution-Based Confidence: The concept of
Information Systems Research, 13(2), 187-204.
institution-based confidence proposed by McKnight
Wingreen, S. & Baglione, S. (2005). Untangling the et al. (2002) represents the beliefs held by customers
antecedents and covariates of e-commerce trust: In- about impersonal structures and favorable conditions,
stitutional trust vs. knowledge-based trust. Electronic in which they feel safe, assured, and comfortable with
Markets, 15(3), 246-260. the prospect of depending on the business.
Wong, Y. K., Rubasinghe, A., & Steele, R. (2005a). An Mobile Commerce (M-Commerce): M-commerce
empirical research program for biometric technology is an extension of e-commerce. In terms of e-com-
adoption. In Proceedings of The IRIS28 Conference, merce, mobile commerce often refers to the business
Kristiansand, Norway. to consumer (B2C) model.
Wong, Y. K., Hsu, C. J., & Steele, R. (2005b). Tech- Personality-Based Confidence: Personality-based
nology acceptance model (TAMCom) for business confidence is defined as the extent to which one displays
to customer (B2C), In Proceedings of The IRIS28 a consistent tendency to be willing to depend on others
Conference, Kristiansand, Norway. across a broad spectrum of situations and persons.
Wong, Y. K. & Rubasinghe, A. (2005). Security issues Structural Assurances: Structural assurances or
and management: Biometric technology acceptance. structural safeguards refer to an assessment of success
In Proceedings of The European Management and due to structures such as legal recourse, guarantees,
Technology Conference, Rome, Italy. regulations, or other procedures that exist in a specific
context.
Wong, Y. K. & Hsu, C. J. (2005). Enhancing e-eommerce
success A model driven approach. In Proceedings of Technology Acceptance Model (TAM): The TAM
The European Management and Technology Confer- is an information systems theory that models how users
ence, Rome, Italy. come to accept and use a technology. The TAM was
first introduced by Davis et al. in 1986 (Davis, 1989).
Wong, Y. K. & Hsu, C. J. (2006). A confidence-based
The model provides a traditional view point about
framework for business to consumer (B2C) mobile com-
technology acceptance from users aspects.
merce adoption [Special Issue]. Business-to-Consumer
Section: Context ICT
A. Daltri
Biblioteca Malatestiana, Italy
P. Errani
Biblioteca Malatestiana, Italy
M. Palma
University of Cassino, Italy
P. Zanfini
Biblioteca Malatestiana, Italy
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Open Catalogue of Manuscripts in the Malatestiana Library
catalogues of Manuscripts and the open libraries, normally accessible only to the few scholars
catalogue who are admitted to their direct study. O
It is easily understandable how and why in the last
The history of manuscript cataloguing began between decades many librarians or researchers liked much to
17th and 18th century, when some scholars (Peter write books about the theory of manuscript description
Lambeck in Vienna, Bernard de Montfaucon in Paris) than prepare catalogues of manuscripts.
prepared the first printed catalogues of manuscript In the authors opinion time has come for a radical
collections. Their example was followed in the last change in catalogue publishing. First of all the Inter-
two centuries by many cataloguers, who described net can make available great part of the manuscript
thousands of manuscripts written in ancient and mod- heritage all over the world (i.e., a good example for
ern languages stored in many big and small libraries the new way of catalogues publishing can be found in
throughout Europe and the rest of the Western world. what is reported from CDF and Overgaauw, 2001, in
Notwithstanding the great work paleographers made Germany); furthermore it is possible to give scholars
in these centuries an enormous amount of manuscripts new and more powerful tools to improve their work
still remains uncatalogued, if not unknown. and let them create Open Catalogues (i.e., catalogues
The main trouble with old, handwritten books is the in progress, constantly changing with the continuous
difficulty of getting in touch with them, mostly for the contribution of new information).
following reasons:
the open catalogue of Manuscripts
a. People simply do not know of manuscripts
existence in a given place (with respect to texts, The project of the information system to be used for the
where bibliographies and Internet resources make Open Catalogue had to take into the right consideration
relatively easy to find a printed book, or at least the communication medium it was based on, that is, the
a bibliographical description of its content, the Internet. The creation of a Web site looked very soon as
same instruments are usually not available for the best solution for an on line community within which
manuscripts), people could meet other people or share their researches
b. Every manuscript is a unique book: there are no and ideas; the site was also helped in the management
duplicates for it. Even if the text in two books is of manuscripts data by a database. The whole system
the same, as in the case of a model and its copy, looked reliable enough both on the server side and on
the two books can be different in script, physical the client side; in the first case the reliability laid on
appearance and even text, because a handwritten the server technical features (its fault tolerance, backup
copy always contains some changes with respect to procedures, etc.) and on the Net steadiness (nowadays
its source. This is the main reason for an accurate only seldom happen breakdowns preventing people
description of the external and internal features from the use of connecting services), in the second case
of every single handwritten book: to identify and the clients connecting features seemed to guarantee a
qualify it beyond its sheer shelf mark, that is, what good and easy access to Web resources. In both cases
for a human being is her or his name. the property rights of the information made available
on the Net was reasonably guaranteed.
Due to the features of a manuscript (physical ap- While planning the structure of the Open Catalogue
pearance, materials making it, number of folios, content the following environments were kept apart (Cartelli
organization, presence or not of illuminations, etc.) & Palma, 2002): a former one where researchers and
a catalogue of manuscripts is a really difficult task, scholars had the scientific liability of the materials to
it requires a deep competence in a lot of fields, from be published and a latter one people could use occa-
philology to history, from history of art to paleogra- sionally or systematically to obtain information (i.e.,
phy, from literature to library science. A catalogue of not to produce them).
medieval (or modern) manuscripts can then be carried The separation affected the way users could access
out by connoisseurs who devote an enormous amount the system and led to three different and separated
of time and work to describe some tens or hundreds of access levels:
these peculiar objects which lie hidden in the shelves of
The Open Catalogue of Manuscripts in the Malatestiana Library
a. System and scientific administrator level; one or MalatestIana lIbrary and the
more persons having the scientific responsibility oPen catalogue oF ManuscrIPts
of the catalogue, who can enable researchers and
scholars to enter into the system and give them In the libraria designed and built in the mid-15th century
the access rights to manage the materials to be by Malatesta Novello, Lord of Cesena, 343 manu-
published; at this level it is also possible the scripts, which give witness to his tastes and cultural
management of the data produced by everyone inclinations, are housed. Malatesta Novello enriched the
b. Scholars and researchers level; allowed people ancient volumes (about 50) of the Franciscan convent
who can insert, modify, delete and display the with an invaluable collection of manuscripts which
materials to be published (manuscripts descrip- were especially copied and illuminated, and with the
tions, notes, images, etc.), at least when they decide codices which were purchased, received in donation,
that the materials have an ultimate structure and dedicated, or already part of his familys patrimony.
can be publicly accessed The collection of Giovanni di Marco, the physician
c. General user level, where only the answers to of Malatesta Novello, is made of 53 codices that were
specific queries can be obtained (i.e., the descrip- added to this already noteworthy and homogenous col-
tions and images of manuscripts, notes, etc.). lection. Few later donations on behalf of the citizens of
Cesena have not altered the original characteristics of
As regards the structure of the Open Catalogue it this quite impressive collection of ancient books.
was hypothesized to be made of five sections, to be Moreover, the Malatestiana Library houses two
intended in a flexible manner, that is, the presence of celebrated 15th century liturgical series consisting in
each section depends on the resources the library will seven choral books of the Cathedral and eight other
have at its disposal and on the different solutions it will books of the Franciscan convent. These works can
adopt (Cartelli & Palma, 2003): be traced back to the project aimed at bibliographic
renewal undertaken by Malatesta Novello. Finally, 59
a. The first section is devoted to documents ex- manuscripts spanning from the 12th to the 15th century
plaining the history of the library and its manu- belong to the Piana Library, which was the private li-
scripts; brary of Pope Pius VII (Barnaba Chiaramonti). Twelve
b. The bibliography ordered by shelfmark and, more manuscripts belonged to the town library, which
eventually, alphabetically and chronologically, was formed at the beginning of the 19th century with the
is housed in the second section; books once in the property of the dissolved religious
c. In the third section the descriptions of the manu- houses. The total number of manuscripts is made of
scripts, that is, previous printed catalogues or an- 429 specimens.
cient handwritten catalogues (suitably digitized) Over the years, significant and in-depth studies have
and new descriptions (according to nationally/in- enriched, renewed and updated the traditional printed
ternationally defined standards) are stored; catalogues by Giuseppe Maria Muccioli and Raimondo
d. The fourth section is devoted to the images of Zazzeri, starting from the fundamental contributions
the highest number of manuscripts in the library of Augusto Campana up to the research done in the
(possibly all); last twenty years.
e. The fifth and last section is based on a communica- The staff of the Malatestiana Library supported
tion subsystem including electronic blackboards, the idea of the Open Catalogue and decided to find
chats, forums and special Web solutions granting the resources for building it mostly because it looked
the easier acquisition, writing and editing of texts interesting and useful to have a catalogue in progress.
among the members of a selected community The advantages of this choice were both immediate
of scholars interested in the materials of the and evident:
library.
The possibility of proceeding in a programmed
and gradual manner;
The ability to retrieve all the information already
The Open Catalogue of Manuscripts in the Malatestiana Library
acquired even in a partial and non-final form; their contributions online. Recently this section
The opportunity to extend the research to ancient enriched of two special functionalities: O
sources that were difficult to access;
The increase in the interactive updating of the a. collaborative bibliography, by which every-
information available by qualified specialists and one entrusted with the access to the section
scholars. can insert a personal bibliographical record
in the page,
The Website for the Open Catalogue of manuscripts b. manuscripts work in progress, by which a
in the Malatestiana Library can be accessed from the community of study and research is granted
portal of the Forl-Cesena county, with a direct access permission of accessing all the texts in the
from the new Library Web page (http://www.malates- area.
tiana.it/manoscritti/). The database accompanying the
site was autonomously constructed with a personalized The open catalogue neither excludes nor acts as
wwwisis 5.0 application. a supplementary to a printed work, which is always
The catalogue is made of four parts: possible and even desirable, because this has a par-
ticular type of diffusion and is permanent by nature.
The first part credits people working to the project Instead, the open catalogue is updated constantly by the
and its carrying out, Library staff, particularly by those who are involved
The second section contains general texts on in manuscript preservation. It is their duty to actively
the Library and the manuscript collections (i.e., administrate the site and to promote research even
history of the library, Cesena humanistic culture, encouraging interested specialists to provide critical
the scriptorium, the illumination, the collections, contributions.
etc.); first of all classical texts suitably digitized Figure 1 reports the home page of the manuscripts
have been put on line, special works and degree section of the Malatestiana Library (i.e., the Open
theses are adding to the former ones together with Catalogue).
descriptions of the Library coming from foreign
visitors,
The third part provides a list of all the manuscripts conclusIon and Future trends
according to shelf mark, although manuscripts
can also be accessed by author and title. For each Main remarks on the work carried out from Malatestiana
codex there is its description according to the two staff during last three years can be easily summarized
traditional catalogues by Muccioli and Zazzeri, as follows (Cartelli & Palma, 2007):
all the complete or partial descriptions taken from
existing catalogues and the bibliography. The Institutional librarians not only coordinated
bibliography on each manuscript is furnished on the work in the library and in the site but also
the basis of the traditional catalogues and the more produced descriptions and bibliographies for
recent studies. A program for a regular updating the manuscripts (until now 76 manuscripts have
and retrieval of recent and previous bibliography, been reproduced and made available in the library
according to the resources of the Malatestiana site),
Library and its goals has been planned. At the Continuous contacts have been kept with public
moment users will find in this section the re- and private institutions and with scholars inter-
productions of 76 codices, although the Library ested in the study of manuscripts in the Malates-
plans to offer a complete reproduction of all the tiana library,
manuscripts; Young and highly qualified people (i.e., people
The fourth section plays a fundamental role in coming from special humanistic studies) has
this project hosting users requests, opinions and been involved in the production of manuscripts
articles. Here, scholars or persons interested in descriptions and other texts.
the Librarys manuscript collection can contrib-
ute with their observations, as well as publish
The Open Catalogue of Manuscripts in the Malatestiana Library
Furthermore, the use of Web technologies produced Cartelli, A. & Palma, M. (2003). The open Catalogue
relevant effects on the way of studying and working of manuscripts between paleographic research and
in this field by introducing social-constructivist ele- didactic application. In M. Khosrow-Pour (Ed.), In
ments in everyday activities. In other words it became Proceedings of IRMA 2003 International Conference,
possible the sharing of knowledge and experiences on Information Technology and Organizations: Trends,
manuscripts analysis and study never known before. Issues, Challenges, and Solutions (pp. 51-54). Hershey,
What will happen in the future? When all the manu- PA: Idea Group Publishing.
scripts in the library will be digitized and will be on
Cartelli, A. & Palma, M. (2007). The open Catalogue of
line the work of the librarians will be at the end? The
manuscripts in the Malatestiana Library: Balance and
answer can only be negative for different reasons. First
perspectives. In M. Khosrow-Pour (Ed.), In Proceedings
of all there will be the need for the updating of the
of IRMA 2007 International Conference Managing
bibliography, secondly new kinds of cooperation and
Worldwide Operations and Communications with In-
sharing among scientists and scholars can be hypoth-
formation Technology (Vol. 1, pp. 225-226). Hershey,
esized while new types of involvement in library work
PA: IGI Global.
for general users of its information can be planned.
Cartelli, A., Daltri, A., Errani, P., Palma, M., & Zanfini,
P. (2006). Il catalogo aperto dei manoscritti Malatestiani:
reFerences bilancio e prospettive. In Proceedings of the conference
Conoscere il manoscritto: esperienze, progetti, proble-
Cartelli, A., Miglio, L., & Palma, M. (2001). New mi. Dieci anni del progetto Codex in Toscana, (Firenze,
technologies and new paradigms in historical research. 29-30 giugno 2006). Retrieved March 16, 2008, from
Informing Science, 4(2), 61-66. http://www.malatestiana.it/manoscritti/
Cartelli, A. & Palma, M. (2002). Towards the project of CDF (Committee of the Deutsche Forschungsgemein-
an open Catalogue of manuscripts. In E. Cohen & E. schaft) (2001). Neue Konzepte der Handschriftener-
Boyd (Eds.), In Proceedings of the Informing Science schliessung. Informationsysteme zur Erforschung des
+ Education Conference, (Cork, 19-21 June 2002). Mittelalters und der Frhen Neuzeit. Retrieved March
Retrieved March 16, 2008, from http://proceedings. 16, 2008, from http://www.dfg.de/foerder/biblio/down-
informingscience.org/IS2002Proceedings/papers/ load/handschriften.pdf.
Carte188Towar.pdf
0
The Open Catalogue of Manuscripts in the Malatestiana Library
Cohen, E. (1999). Reconceptualizing information sys- and automated processes. Recently the definition has
tems as a field of the transdiscipline informing science: been erroneously used as a synonymous for computer- O
From ugly ducking to swan. Journal of Computing and based information system, where only the technological
Information Technology, 7(3), 213-219. component of an information system is included.
Manfron, A. (1998). La biblioteca di un medico del
Manuscript: A book handwritten by a copyist on
Quattrocento. I codici di Giovanni di Marco da Ri-
parchment or paper. Manuscripts were especially used
mini nella Biblioteca Malatestiana. Torino (Italy):
in the Middle Ages before printing invention and every
Allemandi.
manuscript is unique because there are no duplicates
Overgaauw, E. A. (2001). Neue Konzepte der Hand- for it. Even if the text in two books is the same, as in
schriftenerschliessung in Deutschland. Gazette du livre the case of a model and its copy, the two books can be
mdival, 38, pp. 49-54. different in script, physical appearance and even text,
because a handwritten copy always contains some
changes with respect to its source.
KeyWords
Open Catalogue: The answer to the need of spread-
Catalogue: Usually been a book describing one or ing information on manuscripts and ancient books in the
more ancient manuscripts or books (hosted or not in knowledge society. It intensively uses IT and ICT and
the same library but having some common feature). is mostly based on an information system which can
The Internet, and especially the Web, have changed be differently accessed from various kinds of people. It
the way of cataloguing manuscripts and new ways of aims at the joint management of information storing and
making available their information are today possible. retrieving while creating a sort of virtual library.
The Open Catalogue of manuscripts is the solution
adopted from the Malatestiana Library in Cesena and Paleography: The discipline studying ancient writ-
from the Lancisiana Library in Rome. ing styles and their evolution during the centuries. It
can be defined a cross-discipline because it needs deep
Codicology: The discipline studying the structure competences from a lot of fields: Greek and Latin an-
of ancient manuscripts from binding to pages materials cient languages, philology, history and literature only
(parchment or paper) and structure till illuminations; to cite some among them.
it also studies the arrangement of the text within the
pages. During last decades together with the qualita- Web Technologies: A very general definition
tive description of the codices their quantitative study including both the basic instruments for the creation
affirmed and is today a solid branch of the discipline. of dynamic Web sites (Web server software, interface
language, database instruments) and the instruments
Information System: The whole set of persons, marking the evolution of the Web towards Web 2.0 (so-
data records, and activities that process information cial-networking sites, wikis and folksonomies) and Web
in a given organization. It includes manual processes 3.0 (Semantic Web, Geospatial Web or 3D Web).
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
An Overview of Online Trust Derivatives for E-Commerce Adoption
While analysing the impact of trusted referrals information between reputation systems was
Fullam et al. identified that users prior confidence identified as an effectiveness limiting factor of O
in the information source that is, users perceived such systems. This lack of inter-integration makes
trustworthiness of the information source, contents the collection of information from all trusted
of the reported information, number of sources sources expensive and a tiring activity for the
reporting similar information, certainty conveyed potential customers. Resnick et al. (2000) also
in the information and age of the information recognized that mostly previous customers do
affect the users belief on acquired information. not bother to provide any feedback and if they
Besides aforemetioned factors, the existence of do, they usually only provide feedback if they go
trusted referrals in small isolated segments, if any, through very bad experience.
is an obstacle limiting the capability of new and Moreover the new and emerging online merchants
emerging merchants to fully utilize their business have relatively small existing customer base,
potential. Any new and emerging online merchant therefore they cannot fully rely on online
will have relatively lower brand value and small reputations systems to build trust. Thus online
existing customer base in relation to established reputation building should be a parallel process
existing e-merchants. Therefore they have to which the e-merchants should execute as they
rely more on other individual and collective trust establish their brand and online business.
transferring sources to further increase potential c. Third party privacy and security seals:
customers trust in them. Third party Web seals are used to provide
b. Online reputation: In the absence of trusted consumers with a trusted view of an e-merchant.
referral, online reputation is one of the main Such seals are mostly used by new and small
sources used by customers to establish relations businesses. The dominant trust seals used on the
with online service providers. Zacharia (1999) Internet include BBBOnLine Privacy (2006a),
states reputation is usually defined as the amount BBBOnline Reliability (2006b), TRUSTe
of trust inspired by a particular person in a specific (2006), and WebTrust. While evaluating the
setting or domain of interest (p. 163). Online impact of WebTrust (2006) on users perceived
reputation regarding an e-business is built by trustworthiness Portz (2000) identified that 94% of
collating the past experiences of the users who the participants noticed the presence of WebTrust
have previously interacted with the same service seal. A recent study by Egger (2003) identified that
provider. This technique in the form of reviews, the Web-based trust seals contribute significantly
feedback and point ratings, is also used by several to trustworthiness in case of US respondents. The
online auction sites like eBay.com and some Web same study recognized that Americans consider
retailers like Amazon.com to enhance users level the presence of familiar brands and credit card
of trust in Web merchants. In an empirical study companies logos, like MasterCard or Visa, as
by Sarah, Choon-Ling, and Kai (2002) it was less of an indication of trustworthiness than
identified that most users give high value to the Web-only trusted third parties like VeriSign or
previous customers endorsements to evaluate TRUSTe. Cheskin Research (2000) investigated
the ability of the Web merchant, even more than the international validity of online seals. Cheskin
third party affiliation. In the study 80% of the research concluded that the VISA brand is most
respondents reacted positively to establishing trust trusted in Latin America while TRUSTe is most
on online merchant, due to the positive feedback trusted in US. However contrary to other studies,
from the previous customers. Princeton Survey Research Associates (2002)
Resnick, Zeckhauser, Friedman, and Kuwabara survey estimated that only 19% of respondents
(2000) identified that, from potential customers identified seals as important factor in their trust
perspective, the absence of a process to validate formation.
and assure the honesty of feedbacks, acts as a The third party seals are mostly used by new
hurdle in wide acceptance of the online reputation or small businesses, as it only makes sense to
system. In the same study, the absence of a use them when the trust value generated by the
mechanism to exchange/share online feedback seals used on the Website exceeds the trust value
An Overview of Online Trust Derivatives for E-Commerce Adoption
generated by the merchants brand. This explains and professionalism along with an attempt to
why major e-brands are not part of online seal grab users attention. The strong relationship
programs. McKnight, Choudhury, and Kacmar between Website quality and users initial trust
(2000) while evaluating the effectiveness of is also empirically verified by Kim and Tadisina
trusted third part seals and icons in promoting (2005). Head, Hassanein, and Cho (2003) also
consumer trust in electronic commerce states identified a strong positive relationship between
that Web-related consumer decisions take place Web interface and product trust and company
within the context of an individuals personal trust.
tendencies and his/her perceptions about the web b. Alternate dispute resolution: Access to alter-
environment. Thus, user trust in web vendors and nate dispute resolution is one of the emerging
the effect of third party icons may depend, to an techniques employed by e-businesses to enhance
extent, on individual characteristics and an users trust in electronic transactions and environ-
individuals prior experience with the web. A ment. Due to costs involved with the traditional
recent study by Egger (2003) identified that Web- legal system in terms of time, effort and money,
only privacy and security seals were perceived as the availability of alternate dispute resolution is
trustworthy only by the people who know them. considered to be an impacting factor in users final
Burke, Kovar, and Kovar (2000) study identified decision. Such services are usually provided as an
that consumers who attended to the seal, were added facility by the electronic service providers
those who were exposed to the advertisement either for very little fee or in some cases free of
about the seal. charge. The effectiveness of such systems is yet
to be empirically tested.
Individual trust transferring techniques c. Privacy statement: Online privacy is information
privacy in the electronic environment, mostly
The commonly used trust transfer techniques include, over the internet. Chellappa (2002) defined online
Web interface design, use of privacy policies, avail- privacy as an individuals ability to control
ability of transaction insurance and alternate dispute the terms by which their personal information is
resolution. The individual techniques are subjective and acquired and used (p. 10). Culnan and Armstrong
are impacted by users cultural background, physical (1999) established that consumers do not hesitate
and social context and personal experiences. to provide personal information, if they expect to
get benefit from it. The same study concluded that
a. Web interface: The impact of Web site interface most consumers will provide personal informa-
and its structure has been studied in detail by many tion if they believe that they have control over the
researchers. Effective interface, good quality provided personal information. Although online
graphics and ease of use have been recognised consumers are willing to provide their personal
to portray trustworthiness (Kubilus, 2000). Jar- information for personal gains, the risks associ-
venpaa, Tractinsky, and Saarinen (1999) believe ated with information disclosure to third parties
that trustworthiness features of a Website actually without the users explicit consent does add to
function as an expert and professional salesper- the total risk factor. Therefore the presence of a
son of the company. The relationship between clear privacy statement does add value to users
Website interface and consumer decision was trust in online business.
also identified by Karvonen (Karvonen, 2000, d. Online security technology: Environmental un-
2001). In another study Karvonen and Parkkinen certainty is negatively influenced by the behaviour
(2001) suggested the use of real pictures rather of Web retailers who aim to reduce infrastructure-
than abstract graphics to further enhance users related concerns. In Benassis (1999) observation
trust. Basso, Goldberg, Greenspan, and Weimer the users level of trust in infrastructure can be
(2001) while analysing the emotional and cog- greatly increased by facilitating encrypted transac-
nitive factors underlying judgments of trust in tions, installing firewalls, utilizing authentication
e-commerce indicated that Web retailers actually mechanisms, and ensuring privacy seals and pro-
use eye-catching graphics to convey competence viding disclosure statements. Even though trust
An Overview of Online Trust Derivatives for E-Commerce Adoption
building is more than secure communication via curity technologies, provision of alternate dispute
electronic networks, as the reliability of informa- resolution services and availability of transaction O
tion regarding the trade partner has little to do insurance are the primary sources for transferring
with secure communication and more to do with trust to further improve users trust in financial
variables which enhance the users trust level in transaction. The enhanced users trust on financial
e-business in terms of businesss performance, transaction increases users trust on transaction
credibility and ability to perform the designated medium and actual exchange of funds.
task. But the provision of secure environment and
communication channel does transfer users trust The recognised collective and individual e-trust
in security technology to the online business. derivatives, their effect on e-business dimensions
and each dimensions characteristics are presented in
trust derivatives, business dimensions, Figure 1.
and characteristics
An Overview of Online Trust Derivatives for E-Commerce Adoption
Dimensions of E-Business
Online Reputation
Business
Capability
Business
Web User Interface
Performance
Business
Performance to
Deliver
Trusted Referral
Trust Transferring Sources
Business Characteristics
Trust Transferring Sources
Business reliability
Business Characteristics
in delivering
Privacy Statements service
Business Worthiness
Privacy Seals Business honesty
and credibility in
terms of using user
information
Security Seals
Security of
Online Security communication
Technology Financial channel
Transaction
Alternate Dispute
Resolution
Security of
transaction
Transaction
Insurance
Individual Collective
An Overview of Online Trust Derivatives for E-Commerce Adoption
BBBOnLine (2006a). BBBOnLine privacy seal pro- Head, M., Hassanein, K., & Cho, E., (2003). Establish-
gram. Retrieved March 16, 2008, from http://www. ing eTrust through humanized website design. In Pro- O
bbbonline.org/privacy/ on 12 October 2006 ceedings of the 16th Bled eCommerce Conference
BBBOnLine (2006b). BBBOnLine reliability program. Jarvenpaa, S. L., Tractinsky, J., & Saarinen, L. (1999).
Retrieved March 16, 2008, from http://www.bbbonline. Consumer trust in an Internet store: A cross-cultural
org/reliability/ on 12 October 2006 validation. Journal of Computer Mediated Communica-
tion, 5,(2). Retrieved March 16, 2008, from http://jcmc.
Benassi, P. (1999). TRUSTe: An online privacy seal pro-
indiana.edu/vol5/issue2/jarvenpaa.html on 13 March
gram. Communications of the ACM 42(2), 56 69.
2006
Bricklety, D. & Miller, L. (2005). FOAF vocabulary
Karvonen, K. (2000). The beauty of simplicity. In
specification. W3C. Retrieved March 16, 2008, from
Proceedings of the ACM Conference on Universal Us-
http://xmlns.com/FOAF/0.1/on 16 September 2006
ability. Arlington, VA: The Association of Computing
Burke, K. G., Kovar, S. E., & Kovar, B. R. (2000). Sell- Machinery.
ing WebTrust: An exploratory examination of factors
Karvonen, K. (2001). Designing trust for a universal
influencing consumers decisions to use online distribu-
audience: A multicultural study on the formation of trust
tion channels. The Review of Accounting Information
in the Internet in the Nordic countries. In Proceedings
Systems, 4(2), 39-52.
of the First International Conference on Universal Ac-
Chellappa, R. K. (2002). Consumerstrust in electronic cess in HCI (UAHCI2001), New Orleans, LA.
commerce transactions: The role of perceived privacy
Karvonen, K. & Parkkinen, J. (2001). Signs of trust.
and perceived security. Retrieved March 16, 2008,
In Proceedings of the 9th International Conference on
from http://asura.usc.edu/~ram/rcf-papers/sec-priv.pdf
HCI, New Orleans, LA.
on August 8, 2006
Kim, K. & Tadisina, S. (2005). Factors impacting
Cheskin Research (2000). Trust in the wired Americas.
customers initial trust in e-businesses: An empirical
Cheskin Research, California. Retrieved March 16,
study. In Proceedings of the 38th Hawaii International
2008, from http://www.cheskin.com/assets/report-
Conference on System Sciences 2005
CheskinTrustIIrpt2000.pdf on 10 Oct 2006
Kim, K. & Prabhakar, B. (2000). Initial trust, perceived
Culnan, M. J. & Armstrong, P. K (1999). Information
risk, and the adoption of Internet banking. In Proceed-
privacy concerns, procedural fairness, and impersonal
ings of the Twenty First International Conference on
trust: An empirical investigation. Organization Science,
Information Systems (pp. 537-543).
10(1), 104-115.
Kubilus, N. J. (2002). Designing an e-commerce site
Egger, F. N. (2003). From interactions to transac-
for users. ACM Crossroads, 8. Retrieved Mach 16,
tions: Designing the trust experience for business-
2008, from http://www.acm.org/crossroads/xrds7-
to-consumer electronic commerce. Unpublished
1/ecuser.html
doctoral thesis, Eindhoven University of Technology
(The Netherlands). Mahmood, O. (in press). Modelling trust recognition
and evaluation in electronic environment. International
Fullam, K. & Barber, K. S. (2004). A belief revision
Journal of Networking and Virtual Organisations
algorithm based on information valuation. Laboratory
(IJNVO).
for Intelligent Processes and Systems (Tech. Rep. No.
TR2003-UT-LIPS-021). Mahmood, O. (in press). Online initial trust evalu-
ation and comparison in electronic environment. In
Gartner (2006a). Gartner says Web 2.0 offers many op-
Proceedings of the IADIS International Conference
portunities for growth, but few enterprises will immedi-
e-Commerce 2006, Barcelona, Spain.
ately adopt all aspects necessary for significant business
impact. Retrieved March 16, 2008, from http://www. McKnight, D., Choudhury, V., & Kacmar, C. (2000).
gartner.com/press_releases /asset_152253_11.html on Trust in e-commerce vendors: A two-stage model. In
18th September 2006 Proceedings of the 21st International Conference on
Information systems (pp. 532 536).
An Overview of Online Trust Derivatives for E-Commerce Adoption
Section: Process ICT
Juha Kettunen
Turku University of Applied Sciences, Finland
Ari Putkonen
Turku University of Applied Sciences, Finland
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Participatory Design Project on Mobile ICT
Figure 1. The generic work system features to meet users needs. However, earlier studies
of participatory design have focused on issues like the
design process, concept communication, product speci-
E xte rn a l
en viro nm en t fication, and prototype trials. Studies rarely focus on the
importance of the work contexts where the new products
will be used. This article examines the participatory
T echnical P ersonnel
subsystem subsystem design process from the natural work context view by
reporting a case study of a working tool development
for the mobile maintenance team.
The people examined represent a group of 12 male
O rganisational
system
employees working under the supervision of one fore-
man in a maintenance district located in Finland. The
data were gathered through semistructured interviews
and by observing the working habits of the employees.
The model of the generic work system described in
Figure 1 illustrates the generic work system ad- Figure 1 was used for analysing the data: the data were
opted from Kleiner (2006). The work system consists coded and classified according to the factors of the
of a personnel subsystem, where two or more people system with the help of AtlasTi programme. A parallel
collaborate; a technical subsystem, where people are coder was used for confirming the reliability of coding.
interacting with technology; and an organisational After parallel coding, the parameters of classification
system, which includes physical and cultural internal were redefined.
environment of an organisation and an external envi-
ronment.
Mobile work is a potentially interesting area of new MaIn Focus oF the artIcle:
applications for mobile ICT. Designing new ICT tools PartIcIPatIon and collaboratIon
for mobile work systems is a challenge because our
In WorK and tool desIgn
understanding of these systems is still fairly limited.
Most of the literature addresses the product design
Company Alpha maintains and modernises buildings.
from the stationary point of view, either describing
The real properties to be serviced were divided into
the features of a product in a known use context or
districts. The service districts were further divided into
discussing the product development associated with
maintenance areas, each with one employee responsible
manufacturing or marketing (Clark & Wheelwright,
for the maintenance. The maintenance work consisted
1994; Kamrani & Salhieh, 2003; Lewis, 2001; Magrab
of the service tasks defined in the maintenance contract,
& Magrah, 1997). Few studies have focused on mobile
emergency situations demanding immediate responses,
systems used in highly dynamic contexts (Kjeldskov
and possible on-call and specific tasks.
& Stage, 2004).
Each employee used a maintenance van to move
Participatory design is a field of research and a
from one service location to another and transfer all the
progressive practice among professional designers
necessary spare parts and maintenance equipment. The
(Kensing & Blomberg, 1998). In participatory design,
employees drove directly from home to the service area,
the end users are invited to cooperate with the devel-
where they started work at seven oclock in the morn-
opers in a product development process. Potentially,
ing. They visited the office only for specific reasons.
they are expected to participate in several stages of the
The maintenance men ended their working day at four
development process. Among others, Olsson and Jans-
oclock after which they drove straight home.
son (2005) and Kensing and Blomberg (1998) claim
that participatory design is essential in developing and
Twelve maintenance men worked as a commu-
testing new products. Ulrich and Eppinger (2004) have nity and cooperated with each other when neces-
also emphasised that an information channel between sary, despite working in a mobile and dispersed
product users and the designers of the new product manner. For communication and collaboration,
has a crucial role in order to discover relevant product they used handheld computers and mobile phones.
0
A Participatory Design Project on Mobile ICT
Employees assisted each other in tasks that could participation in the development work as significant,
not be completed alone, for instance, for reasons since they understood that by participating they were P
of safety. This added to their job moving outside developing tools for their own work and for themselves.
their own maintenance areas. The maintenance men The interviewees emphasised that their work experience
visited the main office perhaps every two weeks, and knowledge of the tasks were highly appreciated in
the development group. They felt free to express ideas
mostly to pick up equipment for the maintenance
on development. From the work activity system point
van. Usually during these visits, they also met their of view, the development covered the whole system,
supervisor. Daily communications with the supervi- not only the device or the software. The tool and also
sor were taken care of over the mobile phone. the real work were developed.
The company launched a project during the period Accelerated customer service was one of the main
20032004 aiming at a paperless reporting routine in values and objectives of development. Although
the tasks of maintenance men. To achieve this, a palm the objective for mobile device development was to
computer with a special program was introduced. The achieve a portable reporting method, the main value
development of software aimed at creating a transferable was in customer service. On the go reporting from the
service entity applicable to the equipment of various job location improved customer service and invoic-
manufacturers. The objective of the development work ing. The reports of maintenance measures could be
was also to offer employees a simple, easy to use, and forwarded to clients more quickly than before. Both
portable tool for receiving tasks and reporting on them. employer and employee underlined customer service
The group of maintenance men in this study participated as their main object of their work and thus greatly
in the experiment. appreciated this improvement. According to both
The employees received their work orders via the employer and employees, the device encompassed
palm computer and reported the jobs completed. In
countless other options for developing the work
the reception of work orders, the maintenance men
themselves entered the monthly service lists into the and its processes. Both groups were well disposed
palm computer, and in acute fault situations, the cus- towards further development steps. The employees
tomer service centre sent a message to the maintenance interviewed emphasized the process of continuous
mans palm computer. Reporting on the job took place joint development.
immediately after working hours and was carried out
at the service location. Electronic work reports were Benefits and Drawbacks of the
the basis of the payroll and acted as the basis for the Personnel subsystem
client invoices.
The collaboration between the employees in the service
Benefits and Drawbacks at the district was mostly built on indirect interaction. The
organisational level new software was developed to facilitate this. Contacts
between the team members and the supervisor were
User participation was taken very seriously from the maintained by phone and text messages. The palm
beginning of the development project. All users in the computer was developed for these tasks so that the
experiment had hands-on training in the test use of the employee did not need to carry several tools with him.
desired system. The main idea was to offer all users The phone had been implemented relatively recently
the same information and thus underline equality in in the experiment and a few of the employees were
the development process of the implementation. This using it.
goal seems to have been achieved in the light of the The need to visit the office had decreased and
interviews. The interviewees thought that they were operations were increasingly focused on the service
a part of the development work and considered their field. Earlier, the repair task codes were read with an
own participation very important. IR reader and the information was downloaded once a
When the worker could see his own contribution week at the office. The employees also submitted their
to the development, commitment to the new way of time sheets, which were the basis for the payroll. The
working was easy. The interviewees reported that their new practice had decreased the number of office visits
A Participatory Design Project on Mobile ICT
and the office was visited once every two weeks to load sheets. The employees kept a manual double ledger
the van and once every two months for a team meeting. on their work performance in order to remember the
Otherwise, the hours were spent on the service field. details so that payroll and client invoicing could be
Both employer and employees were content with this taken care of.
working mode. The phone feature had only been tested for a short
In the earlier practices, the assignments and urgent period, but the phone development had not been the
work tasks were sent to the XTech device in the van, main issue. Because of the problems in the working
and in crisis situations, the customer service centre mode of the phone, some of the tester employees had
also had to phone the maintenance man on duty. In the given up the use of the phone. Answering incoming
new working mode, any sudden assignments could be calls shut off the other operations and the caller could
sent to the work location and the maintenance men did hear this as a delay when the call was answered. Some
not need to return to the van to read the assignment. interviewees were bothered by this delay.
The new practice had made the ways of contacting The most serious obstacle to work was losing
employees clearer. unfinished reports when answering an incoming call.
According to the interviews, the palm computer After ending the call, the work had to be started from
could also be used in the follow-up and control of the beginning. Employees would be keen to continue
working hours, since the time of the first opened job to complete the report, which they consider a routine,
was recorded into it and the logout was registered even during a phone call. If there were many incoming
in the machine every day. It would also have been calls, being able to continue writing the report during
possible to monitor the routes taken and the working them would have been a time-saver. The employees
locations of employees. The employees thought that hope they could answer the incoming calls while car-
they were trusted and therefore the monitoring of the rying out a maintenance task without having to stop
starting time, bookings out, or routes had not been working. However, when using, for instance, the loud
implemented. Trust was very important to them. On speaker feature, the receiver of the phone call was
the other hand, maintenance men perceived the global disturbed by a strong echo that prevented the message
positioning system (GPS) monitoring as a safety factor from coming or going through.
and an opportunity. If something happened, the man Because the palm computer was kept in a pocket
on the move could be found easily. while moving, they were planned to be light and tiny.
Maintenance work also includes safety risks. There- However, the problems of visibility emerged when
fore, if the maintenance had not used the software the device was small. For example, the maintenance
application for one hour, the application would send men had visual difficulties when they moved in dark
an inquiry about the situation. If the inquiry was not stairwells and engine rooms. Also, using text message
answered, the application sent a report to the person services (SMS) required reasonably good eyesight.
on-call in the client service centre. For this reason, the
inquisitive palm computer had been given nicknames
such as Tamaqotchi and Tamara. Future trends
Benefits and Drawbacks with the Technical problems will be the main challenges for
technical subsystem the future in the development project. The employees
were, however, satisfied with their new tool and the
The problems of the new working mode were mostly development process. The main reason for this was
concerned with the software operations. Uncertainty their involvement in the development work. Because
in the smooth running of the technology had caused they felt their thumb prints in both the device and in
some problems in the implementation. The programme the development of personal and organisational ways
operations were not reliable and the programme might, of working, they disregarded many problems of the
for instance, lose report information. The employee did software developed. This does not mean that they had
not receive confirmation upon receipt of the information not noticed the failures of the programme, but instead
he had reported. Often, the loss of report information had a positive attitude towards the new device, the
was only discovered when the foreman asked for time program, and the developing mode of working. This
A Participatory Design Project on Mobile ICT
O ve ra ll
P a rticip a to ry
D e g re e o f w o rk e rs pa rticip a tion
w o rk s ys tem
d e ve lo p m e n t
d e ve lo p m e n t
d
en
in t o o l de ve lo p m e n t
Tr
C o n ve n tio n a l C o n ve n tio n a l
to o l w o rk s ys tem
d e ve lo p m e n t d e ve lo p m e n t
D e g re e o f c o ns id e ra tio n o f t h e w o rk s ys tem
A Participatory Design Project on Mobile ICT
Clark, K.B., & Wheelwright, S.C. (1994). The product Lilischkis, S. (2003). More yo-yos, pendulums and
development challenge: Competing through speed, nomands: Trends of mobile and multi-local work in the
quality, and creativity. Boston: Harvard Business information society. STAR (Socio-economic Trends
School Press. Assessment for the Digital Revolution, Issue report 36).
Retrieved March 6, 2008, from http://www.databank.
Engestrm, Y. (1999). Expansive visibilization of work:
it/star/join.asp
An activity-theoretical perspective. Computer-Sup-
ported Cooperative Work, 8(1-2), 63-93. Lilischkis, S., & Meyer, I. (2003). Mobile and multi-
local work in the european union: Empirical evidence
Engestrm, Y. (2006). Development, movement and
from selected surveys. STAR (Socio-economic Trends
agency: Breaking away into mycorrhizae activities:
Assessment for the Digital Revolution, Issue report 37).
Building activity theory in practice: Toward the next
Retrieved March 6, 2008, from http://www.databank.
generation (Tech. Rep. No. 1). Osaka: Kansai Univer-
it/star/join.asp
sity, Center for Human Activity Theory.
Magrab, E.B., & Magrah, E.B. (1997). Integrated
Hartswood, M., & Procter, R. (2000). Design guidelines
product and process design and development: The
for dealing with breakdowns and repairs in collabora-
product realization process. CRC Press.
tive work settings. International Journal of Human-
Computer Studies, 53(1), 91-120. Olsson, E., & Jansson, A. (2005). Participatory design
with train drivers: A process analysis. Interacting with
Hendrick, H.W., & Kleiner, B.M. (2001). Macroergo-
Computers, 17(2), 147-166.
nomics: An introduction to work system design. Santa
Monica: Human Factors and Ergonomics Society. Richter, P., Meyer, J., & Sommer, F. (2006). Well-be-
ing and stress in mobile and virtual work. In J.H.E.
Hyrkknen, U. (2006). Analysis of work load factors
Andriessen & M. Vartiainen (Eds.), Mobile virtual
and well-being in mobile work. In M. Vartiainen (Ed.),
work. Heidelberg: Springer.
Workspace methodologies: Studying communication,
collaboration and workscapes (Report 2006/3, pp. SIBIS. (2002/2003). Measuring the information society
63-79). Espoo: Helsinki University of Technology, in the EU, the EU accession countries, Switzerland
Laboratory of Work Psychology and Leadership. and the US. SIBIS pocketbook 2002/03. Retrieved
March 6, 2008, from http://www.sibis-eu.org./publica-
Kamrani, A.K., & Salhieh, S.M. (2003). Product
tions/pocketbook.htm
design for modularity. Boston: Kluwer Academic
Publishers. Ulrich, K.T., & Eppinger, S.D. (2004). Product design
and development. New York: McGraw-Hill Compa-
Kensing, F., & Blomberg, J. (1998). Participatory
nies.
design: Issues and concerns. Computer Supported
Cooperative Work: The Journal of Collaborative Vartiainen, M., Hakonen, M., & Kokko, N. (2003). The
Computing, 7(3-4), 167-185. use and usefulness of communication, collaboration and
knowledge management tools in virtual organisations.
Kjeldskov, J., & Stage, J. (2004). New techniques for
In D. Harris, V. Duffy, M. Smith, & C. Stephanidis
usability evaluation of mobile systems, International
(Eds.), Human-centred computing: Cognitive, social
Journal of Human-Computer Studies, 60(5-6), 599-
and ergonomic aspects. London: Lawrence Erlbaum
620.
Associates.
Kleiner, B.M. (2006). Macroergonomics: Analysis and
design of work systems. Applied Ergonomics, 37(1),
81-89. Key terMs
Lewis, M.A. (2001). Success, failure and organisational Ergonomics: Ergonomics is the scientific discipline
competence: A case study of the new product develop- concerned with the understanding of the interactions
ment process. Journal of Engineering and Technology among humans and the other elements of a work
Management, 18(2), 185-206. system.
A Participatory Design Project on Mobile ICT
High Intensity Mobile Worker: Works away from Mobile E-Work: High intensity mobile work in the
the office and away from the main workplace for 10 or course of which an online connection to the Internet P
more hours in a week. and to company computer systems is being used.
Human-Centered Approach: Approach to human- Mobile Worker: Spends some working time
machine function and task allocation that first considers away from home and away from the main workplace
the capabilities and limitations of the human and whether such as on business trips, in the field, and customers
the function or task justifies the use of a human. premises.
Macroergonomics: The subdiscipline of ergonom- Participatory Design: A design philosophy that
ics that focuses on the design and harmonization of the uses participative approaches to involve users in the
overall work system. design process.
Section: Product ICT
Gbor Hossz
Budapest University of Technology and Economics, Hungary
Ferenc Kovcs
Budapest University of Technology and Economics, Hungary
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Pattern-Based Identification in P2P Systems
is lightweight, meaning that its design goals were the A similar monitoring problem was introduced in
fast operation and relatively small computing power. Lourens (1990) and the used feature, a section of the P
In order to reach these goals, the length of the pattern energy envelope of the record signal (reference), was
to be recognized should be very limited and the total correlated with the input (test) signal. The demand on
score is not required. This article deals mainly with the real-time execution drove the development of the recog-
heart of the EMESE system, the pattern recognition nition scheme introduced in Richly, Varga, Hossz, and
algorithm, especially with the creation of the reference Kovcs (2000) that is capable of recognizing a pattern
pattern, the process called reference selection. of transformed audio signal in an input stream, even
in the presence of level-limited noise. This algorithm
first selects a short segment of the signal from each
the ProbleM oF Pattern record in the set of records to be monitored (Richly
recognItIon et al., 2001).
Carrying out tests on live audio broadcasts showed
In the field of sound recognition, there are many dif- that the success of identification process depends on the
ferent methods and applications for specific tasks proper selection of the representative short segment.
(Coen, 1995; Kondoz, 1994). The demand for work- The position where this representative segment can be
ing efficiently with streaming media on the Internet extracted is determined by the recognition algorithm
increases rapidly. These audio streams may contain of the proposed system called EMESE. The selected
artificial sound effects besides the mix of music and references must be noncorrelated to avoid false alarms.
human speech. These effects furthermore may contain The method applied in the novel method EMESE is
signal fragments that are not audible by the ear. As a analyzed in the following in order to check how the
consequence, processing of this kind of audio signal is monitoring system can synchronize to the stream under
rather different from the already developed methods, as various conditions, and the measured results are also
for example the short-term predictability of the signal presented.
is not applicable. The representation of digital audio
signal as individual sample values lacks any semantic
structure to help automatic identification. For this the sound IdentIFIcatIon In the
reason, the audio signal is transformed into several eMese
different orthogonal or quasi-orthogonal bases that
enable detecting certain properties. The reference selection algorithm needs a well under-
Already, there are solutions for classifying the type of standing of the recognition method. The audio signal,
broadcast on radio or television using the audio signal. sampled at fs=16kHz, is transformed into a spectral
The solution in Akihito, Hamada, and Tonomura (1998) description. It is a block of data, where the columns
basically makes a speech/music decision by examining are feature vectors of the sound corresponding to a
the spectrum for harmonic content and the temporal frame of time-domain data (Nf=256 samples, Tf =16ms
behavior of the spectral-peek distribution. Although it long). First, the amplitude of the Fourier spectrum is
was applied successfully to that decision problem, it computed from the frame. Then, averaging is adapted to
cannot be used for generic recognition purposes. Liu et the neighboring frequency lines to project the spectrum
al. (1998) also describe a scheme classifying a method onto the Bark-scale. The reason for this is to speed up
where the extracted features are based on the short-time the later comparison stage and to include a well estab-
spectral distribution represented by a bandwidth and lished emphasizing tool used in audio processing, the
a central frequency value. Several other features, for perceptual modeling of the human auditory system.
example, the volume distribution and the pitch contour As a result, we get NB=20 values, building up a vec-
along the sound clip, are also calculated. The main dif- tor, that are normalized and quantized. Two levels are
ficulty of these methods is their high computation-time determined in each transformed frame. The levels are
demand. That is why their application for real-time or the 10% and 70% of the peak value of the amplitude
fast monitoring is hardly possible when taking the great spectrum. We name the transformed frame a slice. In
number of references to be monitored into account. every reference, there are NS=50 slices of non-overlap-
ping consecutive frames and the audio section, from
Pattern-Based Identification in P2P Systems
which the reference was made, is called the soundprint of this section all along the record, then it can be observed
of that specific record. that the distance function has a local minimum, a pit
The scheme of the recognition algorithm is to grow around the candidates position. This is demonstrated
the already identified parts of the reference patterns in Figure 1, where the x-axis shows which frame of the
continuously, according to the input. This means that record is compared with the selected candidate, while
the algorithm takes a frame from the input signal, ex- the y-axis shows the Manhattan-distance values.
ecutes the previously described transformation series, To achieve robust synchronization during the rec-
and compares the resulting slice to the actual one of ognition, we must guarantee large Manhattan-distance
every reference. The actual slice is the first one in every between the candidate and its vicinity. This is assured
reference by default, and if it is decided to be similar if the slope of the pit, as shown in Figure 1, is as big
to the slice computed from the input stream (a slice- as possible. For selecting the best distance-pit and its
hit occurs), the next non-overlapping input slice will corresponding candidate section, we should deter-
be compared to the next slice of that reference. If an mine the steepness of the pit-side. However, because
input slice is decided to be nonsimilar, the actual slice it is generally not constant, so as an alternative we
of that reference is reset to the first one. The similarity calculate the width at a given value. Figure 2 shows
is evaluated by calculating the weighted Manhattan- pit-width of 100 candidate sections, where the sections
distance of the two slices that is the sum of the absolute are extracted from the same record so that their first
element-vise differences in the slice vectors. samples are consecutive in the record. In Figure 2, the
For achieving more accurate alignment between horizontal axis is the sample position of the candidate
the test and reference signals, the initial slice-hit in a in the record, while the vertical axis is the width of the
reference is evaluated using a distance buffer. In this pits at a record-adaptive level.
circular-memory, the distances of that first reference Our reference selection algorithm is based on the
slice to overlapping test slices are stored, and the middle same principle, but since our pattern recognition method
of the buffer is examined whether it contains the lowest uses the first frame as kernel and grows from the first
value in the buffer. In case it does, and it also satisfies record, we observed this pit-width for one frame long
the threshold criteria, the identification of the reference candidates. The minimum value has to be found in the
proceeds to the next reference slice. This method intends above function without calculating every point of it.
to align the identification process to the distance-pit We must also assure that our selected reference does
described in the next section. After successfully iden- not occur anymore in the record again or in any other
tifying the last slice of a reference, we successfully records. Using database terminology, we would say
identified that record in the monitored input. that the reference must be a key. To avoid unambigu-
ous identification, we must try to identify the selected
reference in all the other records, and if it is not a unique
the Method oF selectIng the
reFerence Patterns
Figure 1. The distance-pit around the reference
The selection algorithm also uses the previously de-
position
scribed weighted Manhattan-distance for measuring
the similarity of the audio segments. In the vicinity of 6
x 10
6
Pattern-Based Identification in P2P Systems
Figure 2. The width of the pits around the sound-print the new references have to be checked for false alarms.
candidate If we detect a possible false alarm due to representa- P
tive signal similarity, the selection must be repeated
for the whole set. This takes 525 minutes in case of
300
69 records. This is a worst-case scenario, and it should
290 be very rare. The average selection time for every new
280 record is 10 minutes.
270
The second test was a synchronization test. We
selected 50 frames from the stream, and we observed
260
the dependency of the width of the pit on the level of
250 the noise, and the noise level where the monitoring
240 algorithm cannot synchronize to the frame. The result
230
of this test is shown in Figure 4.
1378 1388 1398 1408 1418 1428 1438 1448 1458 1468
Future trends
key, then a new reference must be selected. The exact Based on the continuous development of the host
solution would require us to compare every one of the computers, the P2P-based file search systems will
reference-candidates to every other one. This would have increasing need for the content-based media
mean a lot of comparisons even in the case of a few identification, and also the enhancements in the hard-
records that could not be done in a conceivable time ware will provide a possibility to run lightweight but
period. In the presented algorithm, we tried to keep the sophisticated and sensitive pattern-based identification
number of comparisons as low as possible. To do so, we methods. Using Internet-oriented pattern identification
examine only the vicinity of the reference candidate in tools as the EMESE, the content-based search methods
a region having the width w, where w is expressed in will be inherent parts of the e-collaboration and the
number of samples. Also, we do not examine all pos- searching systems.
sible reference candidates, only every one hundredth.
The algorithm is listed in Table 1.
conclusIon
results In this article, a reference selection method has been
described and realized for an existing real-time recog-
Using this algorithm, we selected references from 69 nition algorithm that was used on live audio streams
advertisements that previously were recorded from a to identify specific sound signals. The proposed selec-
live Internet audio stream. During the tests, we moni- tion algorithm takes the properties of the recognition
tored these 69 advertisements that were broadcast in algorithm into account. This algorithm was tested on
test Internet stream-media. We added white noise to Internet media streams with a prerecorded signal set,
the input signal to test the robustness of the system. and we reached good results. Further tests should be
The duration of the test was 48 hours. The recognition carried out to determine the exact effect of the input
results are shown in Figure 3. noise level on the width of the distance-pit. The experi-
We also observed the performance of the system, mental results presented in the article and the described
namely how many references can be handled in real- algorithms proved that the pattern-fitting based media
time. The computer used was equipped with a Pentium- identification methods can implement even in Internet-
II-350 MHz processor and 256 MB of RAM, and the related environment, where the computing power and
maximum possible number of references was 258. If the quality of the media data are limited.
the record set to be monitored is added, the reference
selection for the added record must be performed, and
Pattern-Based Identification in P2P Systems
1. In the first turn, the reference candidate is selected from the w2 th sample of the
first region o f the given record ( The region i s w=5000 s amples). T he f irst
region b egins on t he f irst s ample of t he r ecord, a nd i t will d efine the first
sample of the frame.
2. The frame is compared to all possible frames in the region using the distance
metric mentioned above. As a result we get d(i), where i=0w-N , as shown
on Figure 1.
3. The next r egion is s elected k*N samples forward in t he record, a nd s tep 2 is
repeated. We s elect further regions t he s ame way a nd c alculate t he
corresponding d(i) until we reach the end of the record.
4. The steepest p it a nd t he c orresponding iopt frame position i n the record i s
selected examining all the d(i) functions for the narrowest pit.
5. In the k*N vicinity of position iopt the frame with the narrowest distance-pit is
determined u sing a g radient search algorithm. T his is t he l owest point of t he
function on Figure 2.
6. The reference consisting o f NR s lices (transformed frames) i s extracted from
the record beginning with the frame selected in the previous step.
7. This reference is tested for uniqueness using the recognition algorithm. If the
reference appears in the record more than once, not only at the correct position,
then the next best reference must be selected in the previously described way.
8. The reference is then tried against all the other records, to filter out in-set false
alarms. If t he reference i s found i n any other record, s tep 7 is u sed for
reference reselection.
9. The above steps are applied to all other records.
100%
80%
D e te c te d p a t
60%
40%
20%
0%
0% 2% 4% 6% 8% 10% 12% 14%
800
700
W i d th o f th e
600
500
400
300
200
100
0
0 1 2 3 4 5 6
N o is e
0
Pattern-Based Identification in P2P Systems
Pattern-Based Identification in P2P Systems
Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Product Evaluation Services for E-Commerce
therefore, the aim of this chapter to propose a methodol- agents together to give a better evaluation of the given
ogy for agent learning that determines the desirability product. There is therefore insufficient agent integration
of a product and to propose an agent framework for towards product recommendation. The cause of this
meaningful product definition to enable value-based problem most probably lies in the form of knowledge
product evaluation and selection. representation for the products.
The trade services is proposed to be a neutral, logical faster search time. The queue for services from the
entity that embodies a collection of autonomous expert trade services could be split into shorter queues
agents, each capable of handling a specific domain. for individual expert agents, thus reducing the
However, the trade services needs not play a merely mean waiting time for requests. This again will
passive role as a routing mechanism in a client-server lead to superior performance from the system.
framework that connects the purchase agent to the Knowledge representation of the domain can be
relevant expert agent. It also plays an active role in uniquely determined: Ambiguity that may arise
providing interconnectivity between the various expert from similar terminology employed for different
agents in order to achieve a better evaluation of the products is avoided. Specific ontology for agent
product. This divide-and-conquer approach will be communication on product specification level can
especially useful in evaluating complex, composite also be established along product lines.
products like the PC, where reliable evaluation of
individual components could be the key to a reliable some components of the agent-based
overall recommendation. This could mean that the Trade trade services
Services needs to have some meta-knowledge about the
relationships between products and these relationships Expert agent plays an active role in providing intercon-
could be built into the knowledge base by the manner nectivity between the various expert agents in order to
the product information was represented. achieve a better evaluation of the product. It conducts
The advantages to a multiagent trade services ap- its own learning based on the statistics and inferences
proach are: derived from the acquired knowledge. Thus, it should
have knowledge base, a statistics-gathering module,
Lower search cost and waiting time: If each one or more learning mechanisms, and a reasoning
expert agent handles its own knowledge base, the engine that is capable of handling uncertainty in the
extent for a search is greatly limited, leading to a knowledge.
Product Evaluation Services for E-Commerce
queue Manager Managed simultaneous and linear regression model techniques. For the non-
requests for the services of the same linear correlation model, it is observed that most of
expert agent the price-attribute correlations exist in a monotonic
manner. Therefore, we only need to consider intrinsi-
The Statistician entity acting in the Information Gath- cally linear functions to model the relationship. This
erer role extracts salient information about the product greatly simplifies the mathematical modeling com-
category like the maximum, minimum, and the mean plexity as the choice of the model can be reduced to
values of the product features. Rule-Former analyses merely three main categoriesthe logarithmic model,
the product category and forms rules out of it. the exponential model and the power model, and for
The performance analyzer module is a fuzzy-logic which the parameters can be easily obtained.
module that determines the performance of the product It is further argued that the correlation model ob-
based on the feature values of the product that affect tained is an indication of the desirability of the product
its operational performance. The purchase analyzer feature. That is, we can assume that the price-attribute
module is another fuzzy-logic module whose purpose correlation to be equivalent to the desirability-attribute
is to make recommendations of the products that meet correlation for a product feature. This correlation can
the feature specifications dictated by the user. then be assigned as the membership function of a fuzzy
logic variable upon which fuzzy inferences and reason-
Product evaluation Methodology ing can be performed to evaluate the product.
Product Evaluation Services for E-Commerce
appear to be too encouraging, as the difference in rank correlation coefficient was calculated. It
values seems to be rather wide. The maximum value was found to have a value of 0.703. This is much
provided by the performance analyzer is only 85.7. greater than the critical value of 0.432 required at
This is a drawback of using the product-moment 1-% significance level. Therefore, we claim that
defuzzification scheme for fuzzy logic systems. A the results from the Performance Analyzer show
possible way around this problem is to normalize positive correlation with the ICOMP 3.0 results.
the results and after doing so, the results from the However, it was observed that the fuzzy module
Performance Analyzer were quite similar to that of showed low level of sensitivity when the cache-
ICOMP 3.0. To ascertain if positive correlation ex- size and bus speed are low. An analysis of the
ists between the two sets of ratings, the Spearmans surface plot for the bus-cache relationship when
Product Evaluation Services for E-Commerce
the processor speed was set to 600 MHz revealed a embedding more intelligence in e-commerce. The
relatively flat surface over a wide range of values, knowledge base implementation of Trade Services
thus accounting for the insensitivity. for product services caters to the possibility of further
reasoning using AI techniques like forward chaining
and backward chaining. The proposed architecture
for Trade Services as a logical entity comprising of a
Future trends
group of intelligent agents allows greater integration
of the expert agents towards product evaluation where
For future work, the performance of the fuzzy logic
component-wise evaluation of a complex product is
modules could be improved by fine-tuning using genetic
possible.
algorithms. The most important features of a product
can be determined using decision trees and extracting
those attributes that contribute the most information.
Case-based learning algorithms can also be imple- reFerences
mented into agents to handle situations where all the
users criteria cannot be met simultaneously. allExperts.com web site: http://www.allexperts.com
CPU processor benchmark ICOMP 3.0: http://cpus-
corecard.com
conclusIon
Devore, J. L. (2000). Probability and statistics for
In conclusion, it was shown through the prototype engineering and sciences (5th ed.). Brooks/Cole.
implementation that intelligent agent is a feasible ap- epinion.com web site: http://www.epinion.com
proach to handle the uncertainty involved in product
selection and evaluation. This could be a step towards
Product Evaluation Services for E-Commerce
Esparza, O., Muoz, J. L., Soriano, M., Forn, J. Poh, T. K. & Guan, S.-U. (2000). Internet-enabled
(2006). Secure brokerage mechanisms for mobile smart card agent environment and applications. In S. M. P
electronic commerce. Computer Communications, Rahman & R. J. Bignall (Eds.), Internet commerce and
29(12), 2308-2321. software agents: Cases, technologies and opportunities
(pp. 190-206). Hershey, PA: Idea Group.
Guan, S.-U. & Yang, Y. (1999). SAFE: Secure-roam-
ing agent for e-commerce. In Proceedings of the 26th Wang, T., Guan, S.-U., & Chan, T. K. (2002). Integ-
International Conference on Computers and Industrial rity protection for code-on-demand mobile agents in
Engineering, Australia. e-commerce. Journal of Systems and Software, 60(3),
211-221.
Guan, S.-U. & Yang, Y. (2002). SAFE: Secure agent
roaming for e-commerce. Computer & Industrial En- Yang, Y. & Guan, S.-U. (2000). Intelligent mobile agents
gineering Journal, 42, 481-493. for e-commerce: Security issues and agent transport.
Electronic commerce: Opportunities and challenges.
Guan, S.-U. & Hua, F. (2003). A multi-agent architecture
Hershey, PA: Idea Group Publishing.
for electronic payment. International Journal of Infor-
mation Technology and Decision Making (IJITDM), Zhu, F. M., Guan, S.-U., & Yang, Y. (2000). SAFER
2(3), 497-522. E-commerce: A new architecture for agent-based
electronic commerce. In S. M. Rahman & R. J. Bignall
Guan, S.-U. & Yang, Y. (2004). Secure agent data
(Eds.). Internet commerce and software agents: Cases,
integrity shield. Electronic Commerce and Research
technologies and opportunities (pp. 190-206). Hershey,
Applications, 3(3), 311-326.
PA: Idea Group.
Guan, S.-U., Zhu, F., & Maung, M. T. (2004). A fac-
tory-based approach to support e-commerce agent
fabrication. Electronic Commerce and Research Ap- Key terMs
plications, 3(1), 39-53.
Guttman, R. H. & Maes, P. (1999). Agent-mediated Agents: A piece of software, which acts to accom-
negotiation for retail electronic commerce. In P. Noriega plish tasks on behalf of its user.
& C. Sierra (Eds.) (pp. 70-90), In Proceedings of Agent
Mediated Electronic Commerce: First International E-Commerce: The conducting of business transac-
Workshop on Agent Mediated Electronic Trading. tions over networks and through computers.
Berlin: Springer . Client-Server: A network architecture consisting of
Hua, F. & Guan, S.-U. (2000). Agents and payment clienst or servers. Servers are computers or processes
systems in e-commerce. In S. M. Rahman & R. J. dedicated to managing files, databases or network
Bignall (Eds.), Internet commerce and software agents: resources. Clients are computers on which users run
Cases, technologies and opportunities (pp. 317-330). applications.
Hershey, PA: Idea Group. Genetic Algorithm: An evolutionary algorithm
Lee, J. K. & Lee, W. (1998). An intelligent agent- which generates each individual from some encoded
based competitive contract process: UNIK agent. In- form known as chromosomes or genome.
ternational Journal of Intelligent Systems in Account, Heuristic: A set of rules intended to increase prob-
Finance and Management, 7, 91-105. ability of solving problem.
Maes, P. (1994). Agents that reduce work and infor- Fuzzy Logic: An extension of Boolean logic that
mation overload. Communication of the ACM, 37(7), deals with the concept of partial. It is useful in clus-
31-40. tering, expert systems and other intelligent system
Ouardani, A., Pierre, S., Boucheneb, H. (in press). A applications.
security protocol for mobile agents based upon the SAFER: An infrastructure to serve agents in e-
cooperation of sedentary agents. Journal of Network commerce and establish the necessary mechanisms to
and Computer Applications.
Product Evaluation Services for E-Commerce
0
Section: Process ICT
Ismo Kantola
Turku University of Applied Sciences, Finland
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Quality Assurance View of a Management Information System
quality assurance system produces useful information possess the power and resources needed for carrying
for continuous improvement (FINHEEC, 2006). out the planned development steps (corrective action).
When building a quality assurance system, the first One way to look more profoundly at the relationship
step is to define the concept of quality. In everyday between strategic management and quality assurance is
language, the word quality has been associated with to emphasise the fitness of purpose and use the phases:
excellence. However, fitness for purpose is the approach plan, do, check, and act (PDCA). This is known as
to quality accepted by most quality agencies. Fitness Demings cycle (Beckford, 2002). The cycle has been
for purpose sees quality as fulfilling a customers used in various quality awards. The Malcom Baldrige
requirements, needs, or desires. In higher education, quality award has renamed it and uses the words: ap-
fitness for purpose is understood as the ability of an proach, deployment, results and improvement (ADRI)
institution to fulfill its mission or a study program to (Woodhouse, 2003).
fulfill its aims (Harvey, 2007; Harvey & Green, 1993). Figure 1 presents the quality cycle of continuous
This is the definition adopted in this chapter. At the improvement. The approach is about planning what
institutional and faculty level, quality is defined in the will be done and how it will be done. Deployment is
institutions mission, strategic plan, and annual action about how to implement these plans. The results are
plans and evaluated against these plans. the consequences of these actions. At this point, the
The concept of quality assurance has various defini- results may be accepted as such and no changes are
tions in different contexts. According to Woodhouse made to the approach or deployment. Often results are
(1999) quality assurance refers to the policies, attitudes, unsatisfactory and objectives have not been achieved.
actions, and procedures necessary to ensure that qual- Then a systematic reflection about what approach and
ity is maintained and enhanced. Quality assurance is deployment led to these results may suggest useful
defined in this chapter to include strategic manage- improvement measures (Woodhouse, 2003).
ment and the performance of the internal processes. A
similar interpretation is given by FINHEEC (2006),
which states that quality assurance is part of strategic MaIn Focus oF the artIcle
planning and includes the management process and the
internal processes of HEIs. Quality assurance refers to the quality Map
the procedures, processes, and systems which safeguard
and improve the quality of an HEI, its education, and The concept of the quality map is introduced to describe
other activities. At the level of HEIs, the quality assur- the quality assurance of an organization. The quality
ance system refers to the entity composed of the quality map is a visual representation of the cause-and-effect
assurance organization, the respective responsibilities, relationships among the objectives of education policy,
procedures, processes, and resources. regional strategies and the institutional strategic plans.
The relationship between the strategic management It provides an insight into the management, personnel
and quality assurance of higher education institutions and stakeholders to understand the main elements of
could be interpreted as a new conceptualization for quality assurance. The quality map is a graphical rep-
some of the most essential features of quality assur- resentation of quality assurance. We have developed
ance. From our viewpoint, two basic ideas of quality the concept of a quality map from the strategy maps
assurance are continuous improvement and manage- introduced by Kaplan and Norton (2004). A quality
ments commitment. According to Beckford (2002), map describes the essential characteristics of the qual-
the principle of continuous improvement is an explicit ity assurance system like a road map, but omits all the
part of the thinking of many quality gurus. Furthermore, minor details.
John Oakland says, Quality must be managed, it does Figure 2 describes the quality map of the TUAS. The
not just happen, and Beckford argues that without quality map shows that quality assurance is a compre-
adherence to the quality management system, it is hensive concept including the strategic planning, the
impossible for the organization to know how well it management process and the internal processes and
is performing. structures of the organization. There is a continuous
It is evident that management is an essential element flow of communication and interaction between these
of quality assurance. Mostly it is only the managers who elements. The description of the quality assurance sys-
Quality Assurance View of a Management Information System
PLAN
Approach
ACTION
DO
Assessment
Deployment
and improvement
CHECK
Evaluation of results
and process
performance
Strategic planning
Quality
assurance
Management process
Quality Assurance View of a Management Information System
tem is an attempt to formalize the diffuse knowledge various data sources also needed automation. It was
and context-sensitive procedures. evident that the new MIS would provide clear benefits
The management process includes sequential as required generally for development projects of this
planning and management activities. They include kind (Galliers & Sutherland, 1991; Galliers, Swatman,
the strategic management and objectives, the plan- & Swatman, 1995).
ning of operations and resources, implementation and The development and description of the manage-
monitoring, and finally, the evaluation of results and ment process started at the beginning of 2004. The
process performance. The strategy process produces entire management process was described in detail.
the strategic objectives for the planning period. The About 700 concepts were defined and the data model
operations of the internal processes are aligned with was developed. More detailed process descriptions and
budgeting and human resources planning. The achieve- specifications for the services provided by the portal
ment of results is regularly monitored and ensured to were written to facilitate the automation of the process.
achieve the desired objectives during the planning year. It is important that the management process be entirely
Finally, the achievement of objectives is evaluated and developed and described before the planning of the
reported to stakeholders. information system. It is also important that there is a
The main internal processes include the innovation well-defined and widely used approach to communi-
process (research and development), support processes cate and implement the strategic plans. The balanced
(support services) and education (teaching and learning scorecard approach clearly fulfills this requirement
processes). The strategic planning and quality assurance (Kettunen, 2004, 2005; Kettunen & Kantola, 2005).
overlap. The involvement of students, members of the The first services of the portal were launched in the
personnel and external stakeholders in strategic plan- autumn of 2005 and the implementation continued
ning is an important means of quality assurance. through 2006.
The linkages between the management process and The MIS portal was developed to support the
internal processes describe the guidance and informa- management process. The members of the personnel
tion flows which have to be taken into account in the have diverse user rights and roles in the interactive
continuous improvement of activities. The aim of the management tool. The administrative units are able to
management process is to steer the development of draft their strategic plans, action plans, budgets and
internal processes. Another linkage is the feedback human resources plans. The action plan of the units is
and evaluation results from different sources, which important, because it describes the implementation of
include students, employers and self-assessments. The the strategic plan, timetables and responsibilities. The
action plans located in the MIS are used to collect and action plan also defines the development steps based
store the steering information and development steps on the evaluative information produced by the quality
which may be based on self-assessment, feedback, or assurance system. The portal has been planned to be
external evaluation. accessible to the personnel and to make the strategic
planning understandable. The portal takes advantage
the Management Information system of the data warehouse.
Data warehousing effectively utilizes the vari-
Without proper management tools it would be nearly ous data sources including personnel administration,
impossible for administrators and evaluators to know financial planning, and student and study registers.
how well the institution, department, or program is The data warehouse captures data from data sources,
performing. The introduction of the balanced scorecard makes transformations, and directs data to an integrated
approach in 2002 laid the foundation for developing the database (Guan, Nunez, & Welsh, 2002; Inmon, 1996).
management information system at the TUAS. Balanced Sometimes these are called extract, transform and load
scorecards were planned for all the administrative units (ETL) processes. Before the introduction of the data
of the institution. It was evident from the beginning warehouse, the data were scattered and undocumented.
that without any proper tools the maintenance of the Data collection was also unreliable because it was to
scorecards was troublesome. The consistent aggre- a large extent collected manually from separate data
gation of the scorecards to the upper organizational sources or personal files.
level needed automation. The data collection from the
Quality Assurance View of a Management Information System
Quality Assurance View of a Management Information System
Quality Assurance View of a Management Information System
tangible objectives and measures and balances them Quality Enhancement: Enhancement is a process
typically into four different perspectives: customers, of improvement. In relation to higher education qual- Q
financial outcomes, internal processes, and learning. ity, enhancement may refer to: (1) individual learners
when it means improvement of the attributes, knowl-
Higher Education Institution: Higher education
edge, ability, skills, and potential of learners; (2) the
institutions include traditional scientific universities
improvement in the quality of an institution or study
and professional-oriented institutions, which are called
programme.
universities of applied sciences or polytechnics.
Quality Management: Quality management em-
Management Information System: A proper man-
phasises the importance of managements commitment
agement information system presupposes modelling
to quality. Quality must be managed; it does not just
the entire management process and tailoring all the
happen.
necessary components of the information technology
support system to meet the needs of the organization. Strategic Management: Strategic management is a
The management information system should include matter of bridge building between the perceived present
a description and measures of how the strategic objec- situation and the desired future situation. Strategy im-
tives will be achieved. plies the movement of an organization from its present
position, described by the mission, to a desirable but
Quality Assurance: Assurance of quality in higher
uncertain future position, described by the vision.
education is the process of establishing stakeholder
confidence that provision (input, process and out-
comes) fulfills expectations or measures up to threshold
minimum requirements. Quality assurance refers to
the procedures, processes and systems that safeguard
and improve the quality of a HEI, its education and
other activities.
Section: Process ICT
Donatella Persico
Institute for Educational Technology, National Research Council, Italy
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Relationship Between Assessment and Evaluation in CSCL
development. It is for this reason that evaluation strate- that this ratio is often studied by means of a comparative
gies are being increasingly integrated into the learning approach aimed at determining the conditions which R
process, and self-evaluation and peer evaluation are make one method more suitable than another from the
frequently practiced along with hetero-evaluation point of view of the return on investment.
(Ranieri, 2005). For example, first and second generation distance
Although according to the above definitions, the education would seem preferable to face-to-face
distinction between assessment and evaluation is education as the number of students increases. This
quite clear-cut, the two concepts have several points is because the fixed costs of a large-scale production
in common, both in theory and in practice. First, the of learning materials are offset by the variable costs,
evaluation of learning outcomes, or assessment, is of which increase more slowly than those of traditional
paramount importance in the evaluation of the quality education. On the other hand, face-to-face and online
of the educational process. A second correlation derives education have similar trends as far as tutoring costs
from the considerable overlap of both the methods and are concerned, since in third generation distance edu-
the data generally used for the two kinds of evaluation. cation, they are directly proportional to the number of
According to Moore (1999), the relationship between students (Trentin, 2000).
evaluation and assessment lies mostly in the moni- The evaluation of the effectiveness of a learning
toring process. This is particularly true in the CSCL event is a key factor in the development of e-learning
field, where the use of computers as mediators of com- initiatives and deeply affects their design since it pro-
munication between individuals allows us to record not vides information on the adequacy of the instructional
only the interactions between participants, but also any design with respect to its objectives. The evaluation
event that is regarded as relevant for tutoring, evalua- process can also lead to reflection and revision of the
tion, assessment, or research purposes. educational objectives, as it may reveal a divergence
between the latter and the learners expectations and/or
the social or training needs which the course was sup-
evaluatIng a learnIng systeM posed to meet.
Evaluation of effectiveness also means understand-
In order to evaluate a learning system, a systematic ing how much learning (intended as a modification of
study should be carried out to produce a value judgment students competences) has really occurred. However,
on its efficiency, its effectiveness, or any other aspect it should be noted that formative evaluation of a course
deemed relevant. This normally includes the collection, goes beyond the assessment of students learning.
analysis, and interpretation of information on its various For example, another aspect usually covered in the
aspects (Thorpe, 1993), such as the quality of learn- evaluation of a learning event is the degree of student
ing materials, effectiveness of the tutoring, efficacy of satisfaction. This is not necessarily correlated with
the collaboration between the members of the virtual learning; yet it is a useful source of information for at
community, as well as the suitability, user-friendliness, least two reasons. The first is that a pleasant approach
and efficiency of the tools used for synchronous and motivates students and predisposes them to face pos-
asynchronous communication. sible difficulties in a positive manner. The second is
The evaluation of the efficiency of a teaching pro- that, at least for adult students, positive feedback often
gram or of a single course focuses on organizational mirrors the conclusions of a critical reflection on the
aspects and on issues related to the cost-benefit ratio educational process.
of the considered system, where costs and benefits Typically, student satisfaction about a learning event
are not considered solely from a financial standpoint. is ascertained through interviews or questionnaires
Indeed, costs can also be regarded from the point of aimed at recording their opinions on the course and
view of investments in human resources and learning its components and their perceived satisfaction com-
materials, while benefits usually include educational pared to their initial expectations. Hence, determining
and social outcomes. The evaluation of the cost-benefit whether the educational objectives have been met and
ratio of a learning program is therefore quite complex performing a survey of the participants opinions on
and involves political, social, economic, and educational the learning event are both necessary in order to carry
considerations (Phillips, 1998). It is worth pointing out out formative evaluation of a training event. Together,
The Relationship Between Assessment and Evaluation in CSCL
they provide a reliable picture of the strengths and values, and beliefs). The evaluation of the latter, con-
weaknesses of the learning initiative in itself, although sidered the most important component of competence,
they cannot predict the long-term consequences that requires the involvement of the students in authentic,
the course will have on the organizational and social situated problem solving or inquiry learning activities
context where the trainees are expected to put their such as those usually proposed in CSCL environments.
achievements into practice. As discussed in the next section, the features of CSCL
systems make them particularly well suited to assess
competences with a process-oriented approach, rather
assessIng student learnIng than a product-oriented one.
00
The Relationship Between Assessment and Evaluation in CSCL
Monitoring usually aims to collect information of A possible solution to such a contradictory situa-
both a qualitative and a quantitative nature. To gather tion is to have the quantity and quality of participa- R
this information, it is necessary to identify indicators of tion positively affect summative assessment. Little
the relevant aspects of the learning process. The most or poor participation should not influence summative
frequently used indicators in CSCL refer to students assessment in negative terms, therefore allowing for
active participation (such as writing messages, upload- alternative learning paths. In this way, summative and
ing documents, participating in chats, etc.) and passive formative assessment can be integrated with the addi-
participation (such as reading messages, downloading tional advantage that students participating online are
documents, etc.). Quantitative indicators of participa- informed of their results throughout the course.
tion include the number and duration of sessions for
each participant, the number of messages sent and read
by each of them, the number of chats they participated conclusIon
in, and so forth. Content analysis of interactions can
produce quantitative indicators of qualitative data, such Matching the needs of the learning context with the
as quality of collaboration (Pozzi, Manca, Persico, & principles put forth so far is not easy. CSCL environ-
Sarti, 2007), self-regulation (Giannetti, Dettori, & Per- ments, however, make this endeavor easier thanks to a
sico, 2006), social presence (Gunawardena, Lowe, & robust kernel of monitoring methodologies and tools that
Anderson, 1997), and so forth. The ensemble of these have been developed to support tutoring, assessment,
techniques clearly makes the shift of emphasis from the evaluation, and research activities. Shifting the focus
product to the process of learning possible and feasible. from knowledge and skills acquisition to competence
Product evaluation still occurs by means of traditional development is heavily influencing the way learning
intersubjective evaluation techniques applied to essays processes are planned, designed, and evaluated.
and other artifacts produced by the learners. For example, the development of metareflection and
It is interesting to note that, in many online courses, self-regulation abilities has become a primary concern
monitoring is used to inform not only formative assess- because these aspects are critical components of the
ment and evaluation, but also summative assessment. It desirable competences of citizens of the knowledge
is in fact quite frequent for tutors to take participation society. To achieve these aims, many online courses
into consideration for the final assessment of learners. include targeted activities that entail the use of edu-
This approach does have some drawbacks, however. cational strategies such as peer review, role play (Per-
First, because learning should allow for the learners to sico & Sarti, 2005), scaffolding and fading tutoring
make mistakes, put forward nave theories or con- techniques (Brown, Collins, & Duguid, 1989; Wood,
sider wrong hypotheses, and this should not negatively Bruner, & Ross, 1976).
influence summative assessment. Second, because if This brings about several major changes in how as-
students are aware that summative evaluation takes sessment and evaluation are carried out. For example,
account of what they write in their messages, some of many online courses which adopt hetero-directed
them might be inhibited by feelings of inadequacy or evaluation rely heavily on the tutors role (Swan, Shen,
fear of affecting their marks. Third, because this kind & Starr, 2006). In fact, the tutors continuous monitor-
of summative evaluation could penalize those who ing of learning dynamics allows for close integration
cannot participate in the learning event for reasons between educational activities and evaluation strate-
that are independent of their will. In principle, the gies. This integration ensures that the final evaluation
summative evaluation should consider each learners is not based merely on facts and notions but rather on
results regardless of how they were obtained. On the more complex skills, such as solving complex multi-
other hand, not to use information from monitoring of disciplinary problems, creatively transferring solution
online participation would hinder the tutors role and strategies to new contexts, formulating and verifying
discourage learners from participating. In fact, they hypotheses, choosing and discussing appropriate in-
would realize that their work and commitment to the quiry methods, and sharing and negotiating knowledge
online activities are not taken into consideration for through participation in a virtual community.
the final evaluation. Another important change is that summative and
formative evaluation are partly based on the same
0
The Relationship Between Assessment and Evaluation in CSCL
methods. They consider both the process and the prod- Kanuka, H., & Anderson, T. (1999). Using construc-
uct of learning and allow for flexible learning paths as tivism in technology-mediated learning: Construct-
well as personalized assessment methods. Even the ing order out of the chaos in the literature. Radical
principle that assessment methods should be the same Pedagogy, 1(2).
for everybody is somewhat undermined. Thanks to
Macdonald, J. (2003). Assessing online collaborative
these changes, it is now possible to pursue and assess
learning: Process and product. Computers and Educa-
the development of complex competencies for which
tion, 40(4), 377-391.
there is no one objectively correct solution but many
possible informed, creative, and expert approaches. Moore, M. G. (1999). Monitoring and evaluation.
American Journal of Distance Education, 13(2).
Nipper, S. (1989). Third generation distance learning
reFerences
and computer conferencing. In R. D. Mason & A. R.
Kaye (Eds.), Mindweave: Communication, comput-
Bloom, B. S. (1956). Taxonomy of educational objec-
ers and distance education. Oxford, UK: Pergamon
tives: Handbook I. New York: David McKay Company
Press.
Inc.
Pellerey, M. (2004). Le competenze individuali e il
Bloom, B. S., Hastings, J. T., & Madaus, G. F. (1971).
portfolio. Milano, Italy: La Nuova Italia.
Handbook on formative and summative evaluation of
student learning. New York: McGraw-Hill. Persico, D., & Sarti, L. (2005). Social structures for
online learning: A design perspective. In G. Chiazzese,
Brown, J. S., Collins, A., & Duguid P. (1989). Situ-
M. Allegra, A. Chifari, & S. Ottaviano (Eds.), Proceed-
ated cognition and the culture of learning. Educational
ings of the International Conference on Methods and
Researcher, 18(1), 32-42.
Technologies for Learning. Boston: WIT Press.
Delors, M. J. (1996). Learning: The treasure within.
Phillips, J. J. (1998). The return-on-investment (ROI)
Report to UNESCO of the International Commission on
process: Issues and trends. Educational Technology,
Education for the Twenty-first Century. Paris, France:
38(4).
UNESCO.
Pozzi, F., Manca, S., Persico, D., & Sarti, L. (2007). A
Ellington, H., Percival, F., & Race, P. (1993). Hand-
general framework for tracking and analysing learn-
book of educational technology. London, UK: Kogan
ing processes in CSCL environments. Innovations in
Page.
Education and Teaching International.
Garrison, G. R. (1985). Three generations of tech-
Ranieri, M. (2005). E-learning: Modelli e strategie
nological innovation in distance education. Distance
didattiche. Trento, Italy: Erickson.
Education, 6(2), 235-241.
Scriven, M. (1967). The methodology of evaluation. In
Giannetti, T., Dettori, G., & Persico, D. (2006). SRL in
R. Tyler, R. Gagn, & M. Scriven (Eds.), Perspectives
online cooperative learning: Implications for pre-ser-
of curriculum evaluation (Area Monograph Series on
vice teacher training. European Journal of Education,
Curriculum Evaluation). Chicago: Rand McNally &
41(3/4), 397-414.
Co.
Gunawardena, C. N., Lowe, C. A., & Anderson, T.
Scriven, M. (1991). Beyond formative and summative
(1997). Analysis of a global online debate and the
evaluation. In M. McLaughlin D. C. Phillips (Eds.),
development of an interactional analysis model for
Evaluation and education: At quarter century. Chicago:
examining social construction of knowledge in com-
University of Chicago Press.
puter conferencing. Journal of Educational Computing
Research, 17(4), 397-431. Swan, K., Shen, J., & Starr, R. H. (2006). Assessment
and collaboration in online learning. Journal of Asyn-
Hadji, C. (1995). Lvaluation des actions ducatives.
chronous Leaning Networks, 10(1)
Paris, France: Presses Universitaires de France.
0
The Relationship Between Assessment and Evaluation in CSCL
Thorpe, M. (1993). Evaluating open and distance information for teachers and students to make the
learning. Harlow, UK: Longman. necessary adjustments to the teaching and learning R
process, including the use of alternative instructional
Trentin, G. (2000). The quality-interactivity relation-
approaches or the provision of more opportunities for
ship in distance education. Educational Technology,
practice.
40(1), 17-27.
Formative Evaluation: Typically conducted dur-
Trinchero, R. (2006). Valutare lapprendimento nelle-
ing the development or improvement of a program or
learning. Trento, Italy: Erickson.
product (or person, and so on), it is conducted, often
Wood, D., Bruner, J., & Ross, G. (1976). The role of more than once, for in-house staff of the program with
tutoring in problem solving. Journal of Child Psychol- the intent to improve. The reports normally remain in-
ogy and Psychiatry, 17, 89-100. house; but serious formative evaluation may be done
by an internal or an external evaluator or preferably, a
combination; of course, many program staff are, in an
Key terMs informal sense, constantly doing formative evaluation
(Scriven, 1991).
Blooms Taxonomy of Educational Objectives: Summative Assessment: It aims to produce a com-
The American psychologist B.S. Bloom and his co- prehensive judgment on the learning outcomes of an
workers compiled a set of taxonomies of learning individual student. Typically, summative assessment is
objectives, classified into three broad domains: the quantitative and uses numeric scores or letter grades.
cognitive, affective, and psychomotor domains. The
most famous is the taxonomy proposed for the cogni- Summative Evaluation: Provides information on
tive domain where six levels are identified, ranging the quality of the learning system with particular refer-
from the simple/concrete to the complex/abstract. They ence to its ability/suitability to achieve its objectives.
are knowledge, comprehension, application, analysis, It usually produces a global judgment of the system,
synthesis, and evaluation (Bloom,1956). According considering all of its components and taking a very
to Bloom, the six subdivisions should not be regarded general point of view. However, it may also focus
as rigidly distinct or mutually exclusive, but rather as on one particular aspect of the system. For example,
a continuum spanning the whole domain (Ellington summative evaluation of the learning outcomes or
et al., 1993). summative evaluation of students acceptance.
Babis Theodoulidis
University of Manchester, UK
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Semantic Web Adaptation
The preprocessing stage is followed by the dis- Pattern analysis is the last stage of the Web usage
covery of traversal patterns from the user access data. mining process. The patterns that have been produced S
Traversal patterns reveal the way a user navigates are reviewed, and useful information is extracted from
through the site during each session. Clusters of users them. Knowledge query mechanisms, similar to struc-
can be discovered through clustering of similar traversal tured query language (SQL), can be used to filter out
patterns. Moreover, association rules can be applied the patterns. Another approach involves the use of data
to the pages accessed during a session, independent cubes and OLAP operations. Visualization techniques,
of their ordering. Examples of association rules that such as graphing patterns or assigning colors to differ-
were extracted from an IBM analysis of the Web logs ent values, can also be utilized to highlight interest-
of the Official 1996 Olympics Web site (Elo-Dean & ing trends in the data. Last but not least, content and
Viveros, 1997) are: structure information can be used to filter out patterns
containing pages of a certain usage type, content type,
45% of the visitors who accessed a page about or pages that match a certain hyperlink structure.
Indoor Volleyball also accessed a page on Hand- Numerous approaches to Web usage mining have
ball. been followed, targeted to a wide range of applica-
59.7% of the visitors who accessed pages about tions. Chen, Park, and Yu (1998) and Nanopoulos and
Badminton and Diving also accessed a page about Manolopoulos (2000) have introduced the concept of
Table Tennis. using the maximal forward references to break down
user sessions into transactions for mining access pat-
The percentages mentioned in both association rules terns. Yang, Pan, and Chung (2001) have proposed an
are called confidence. Confidence can be defined as the efficient hash-based method, HMFS, for discovering
number of transactions containing all of the items in a the maximal frequent itemsets. Spiliopoulou (1999) has
rule, divided by the number of transactions containing presented an algorithm for building aggregating trees
the rule antecedents (Cooley, Mobasher, & Srivastava, from Web logs, then mining the Web access patterns
1999). Additionally, temporal relationships among data by MINT mining language. (Cooley et al. (1999) have
items can be discovered, such as the following (Cooley, provided a query language on top of external mining
Mobasher, & Srivastava, 1997): software for association rules and for sequential pat-
terns. Another query language for extracting navigation
30% of clients who visited the /company/prod- patterns, called MiDAS, has been proposed by Buchner,
ucts page had done a search in Yahoo within the Baumgarten, Anand, Mulvenna, and Hughes (1999).
past week on keyword w. Xiao and Dunham (2001) have investigated techniques
60% of clients who placed an online order in the to discover frequently used contiguous sequences of
/company/product1 page also placed an online page references, which they call maximal frequent
order in the /company/product4 page within 15 sequences (MFS). They have also developed an algo-
days. rithm called online adaptive traversal (OAT) pattern
mining, to mine MFS. Xing and Shen (2004) have
Depending on the purpose of the mining, a traversal proposed two algorithms, user access matrix (UAM)
pattern may contain backward traversals. Backward and preferred navigation tree (PNT), for mining user
traversals consist of references of pages earlier vis- preferred navigation patterns.
ited. Studying backward traversals can help discover
missing hyperlinks, which if added will reduce these Web adaptation
traversals, thus making navigation paths shorter and
more convenient for the users. A patterns accesses Several Web adaptation systems have been developed
can also be restricted only to contiguous ones, which over the years, mainly based on Web usage mining
can be used for prefetching and caching purposes. A techniques. The WebWatcher system (Joachims, Fre-
frequent pattern is maximal if does not contain any itag, & Mitchell, 1997) suggests links that may interest
frequent subpatterns. This can reduce significantly the a user, based on other users online behaviour. The
number of meaningful discovered patterns. system is implemented in the form of a proxy server.
Each user is asked, upon entering the site, what kind of
0
Semantic Web Adaptation
information he is seeking. Before he departs, the user to find answers to questions that require more than a
is asked whether he has found what he was looking for. keyword search.
His navigation paths are used to deduce suggestions The Semantic Web (Berners-Lee, Fischetti, &
for future visitors that seek the same content. These Dertouzos, 1999) means to address these problems
suggestions are visualized by highlighting existing by expressing Web data in forms that are machine-
hyperlinks. processable, in order to be more efficiently maintained
The Avanti project (Fink, Kobsa, & Nill, 1996) tries by software agents, thus enhancing precision of search,
to predict the visitors final objective as well as her as well as logical reasoning. The vision behind this
next step. A model for the visitor is built, based partly concept can be summarized as giving information a
on the personal information of the visitor and partly well-defined meaning, better enabling computers and
on information extracted from her navigation paths. people to work in cooperation (Berners-Lee, Hendler,
Visitors are provided with direct links to pages that & Lassila, 2001).
are probably the ones they are looking for. In addition, Ontologies are a key enabling technology for the
hyperlinks that lead to pages of potential interest to each Semantic Web, since they offer a way to give informa-
visitor are highlighted. The suggestions are extracted tion a common representation and semantics. Daconta,
with the use of association rules that are applied to the Obrst, and Smith (2003) distinguish three levels of
users model. ontologies: top, middle, and lower domain levels. At
A drawback of both the WebWatcher and the Avanti the top level, the ontological information represented
approaches is that they require the active participation concerns primary semantic distinctions that apply to
of the users in the adaptation process, by asking them every ontology. The middle level represents knowledge
to provide information about themselves. On the other that spans domains and may not be as general as the
hand, Footprints (Wexelblat & Maes, 1999) relies knowledge of the upper level. Finally, the lower level
entirely on the navigation paths of the users. The navi- represents ontologies at the domain or subdomain level.
gation paths of all visitors are recorded and the most This is typically knowledge about domain-specific
frequent ones are presented to the visitor. Additionally, subject areas. While an ontologist can address the up-
next to each link, the percentage of people who have per and to a certain extent the middle level, the domain
followed it is displayed. expert is absolutely required for the construction and
Perkowitz and Etzioni (2000) have proposed a maintenance of the lower level.
conceptual framework for adaptive Web sites, focusing Mikroyannidis and Theodoulidis (2005) distinguish
on the semi-automatic creation of index pages from between the domain ontology and the ontology of a
clusters of pages. They have developed two cluster Web site dedicated to a certain domain. A Web site
mining algorithms, PageGather and IndexFinder. The ontology is strongly related to the topology of the site
first one relies on a statistical approach to discover and is comprised of the thematic categories covered by
candidate link sets, while the second finds link sets the sites pages. These categories are the concepts of
that are conceptually coherent. the ontology. Each Web page, depending on its content,
is an instance of one or more concepts of the ontology.
the semantic Web The concepts can be related to each other through a
number of relationship types, representing the associa-
Since January 2005, the Web has grown by more than tions the concepts have according to the Webmasters
17 million sites, according to monitoring firm Netcraft. perception. Figure 1 shows the Web site ontology
This figure exceeds the growth of 16 million sites seen belonging to the University of Manchester School of
in 2000 when net fever reached its most intense pitch.1 Informatics (www.informatics.manchester.ac.uk). The
Significant progress has been made in technologies for ontology has been built considering the organization of
publication and distribution of knowledge and infor- the thematic categories as this is defined in the current
mation on the Web. People add private, educational, topology of the site. The hierarchys top level contains
or corporate content. Growth also comes from the rise seven classes: School, Undergraduate Programmes,
in blogging, in which users write regularly updated Postgraduate Taught Programmes, Postgraduate Re-
Web journals on various topics. However, much of the search, Research, News and Intranet. These are the
published information is not organized, and it is hard main thematic categories of the site. These categories
0
Semantic Web Adaptation
Figure 1. The School of Informatics Web site ontol- seMantIc Web adaPtatIon
ogy S
The Semantic Web is undoubtedly a remarkable advance
in the area of information management. The magnitude
of Web data necessitates the use of machine-process-
able metadata. Nevertheless, the Web users needs and
requirements should not be neglected in the process of
building and maintaining the Semantic Web. Semantic
Web adaptation utilizes traditional Web usage mining
methodologies and extends them in order to address
the ontological perspective of the Semantic Web. Apart
from the topology of the Web, which is targeted in a
conventional Web adaptation system, semantic Web
adaptation also aims to the evolution of Semantic Web
ontologies.
The Heraclitus framework (Mikroyannidis, 2004;
Mikroyannidis & Theodoulidis, 2004, 2005) proposes
the transformation of the Semantic Web based on Web
usage data. Web usage mining and text mining are used
for the extraction of knowledge from navigation paths
and the adaptation of the physical and semantic struc-
ture of the Web. An implementation of the Heraclitus
framework has been released as a suite of open source
tools (http://heraclitus.sourceforge.net).
architecture
0
Semantic Web Adaptation
page of the page sets is then assigned by SVM to one framework. The topology of the Web site was refined
or more concepts of the ontology. through the insertion of new shortcut links between
Based on the topological and ontological features pages that were not previously linked together, as well
of the page sets, a report containing proposals for the as through the highlighting of popular existing links.
improvement of the Web site is generated. This report In addition, the Web site ontology was modified in
contains proposals for the insertion of shortcut links several ways, based on the outcomes retrieved from
from source pages to target pages that are frequently the classified page sets.
accessed together but are currently not linked. It also More specifically, Heraclitus produced two sets of
contains proposals for the change of the appearance reports: shortcut links reports and highlighted links
of popular hyperlinks. In addition, the report contains reports. Page sets of unlinked pages suggest the inser-
proposals for the evolution of the Web site ontology. tion of shortcut links between these pages, in order to
After the proposed modifications have been revised by achieve shorter navigation paths. From the page sets
the Webmaster, they can be applied to the Web site. of linked pages, changes in the appearance of existing
The site topology is then refined through the insertion links can be extracted. For example, if an index page
of new shortcut links, as well as changes in the appear- and some of its links comprise one or more page sets,
ance of the existing ones. The ontology is also refined then highlighting these links in the index page will
in a number of ways. provide valuable help to visitors.
Figure 3 shows an example of a modified Web page,
case study according to the proposed Heraclitus adaptations. The
page has been modified to facilitate the navigation
The Web site of the School of Informatics at the Uni- of the users during the first semester. Shortcut links
versity of Manchester (www.informatics.manchester. to popular courses of the first semester have been
ac.uk) was used as a case study for the Heraclitus inserted in the left side of the page, under the title
0
Semantic Web Adaptation
Quick links. Moreover, popular links that already Reorganization of the concepts hierarchy was also
existed, such as the hyperlink leading to the page of performed. Further improvements included the creation
the Personal and Professional Development course, of new categories, the removal of existing categories,
have been highlighted. as well as changes to the levels of hierarchy that the
The Web site ontology was modified in several ways, concepts belong to. For instance, the Staff concept
based on the outcomes retrieved from the classified was previously a subconcept of the School concept,
page sets. The resulting ontology, after the applica- which resided in the highest level of the ontology. It
tion of Heraclitus adaptations, is shown in Figure 4. should be noted that the Staff concept has as instances
Based on these adaptations, the content organization all the Web pages that carry information about the staff
of the Web site was altered to better satisfy the needs members of the school. However, the high frequency
of its visitors. First of all, new associations were dis- with which this concept appeared in the page sets
covered between concepts. These associations reflect implies the significance that it has in the interests of
the interests of the users, as documents belonging to the users. It would be thus appropriate to transfer this
these concepts are frequently accessed together. In concept to the top level of the ontology, as shown in
particular, new associations were inserted between the Figure 4. Based on the performed classification, the
following concepts: undergraduate and postgraduate programmes were
grouped under the more general concept Students.
Research and Students The School concept was also extended to include
Research and Staff more subconcepts.
School and Students The ontology of the Web site was extended to
School and Staff include multiple instances of concepts or multiple
Students and Staff subconcepts. The categorization of the Web pages that
was carried out suggested that several pages belong to
0
Semantic Web Adaptation
Figure 4. Refined Web site ontology for the School of Visiting Professors, Administrative Information
Informatics for Students, and so forth.
Finally, useful conclusions were deduced about
the usage of the Web site. Particularly, the thematic
category that was the first in the preferences of the
users was, as expected, the Students concept. This
concept contains all pages that support the schools
modules, both undergraduate and postgraduate. This
is not surprising, since most of the traffic is generated
by the students. Second, in the users interests comes
the Staff concept. The Research concept is third,
followed by the School category. These results can
be used to enhance the performance of the server, for
example, by the use of additional servers that will host
the popular resources, or to promote the problematic
concepts by making them more easily accessible.
conclusIon
0
Semantic Web Adaptation
Semantic Web Adaptation
Section: Context ICT
Teachers as well can find wikis very useful for majority of blogs are in fact densely interconnected:
working on projects, preparing articles, putting together bloggers (3) very frequently read other blogs and link
course materials. A wiki is ideal, for instance, for col- to them, reference them, post comments on them, thus
lecting proposals and ideas for a conference or within forming a highly animated agor. Blogs can thus be-
a research project. However, the main strongness of come the true individuals on line identity: according
wikis can also be seen as a weak point: the possibility to a suggestive expression used by Granieri (2005), the
offered to all to modify content. For this reason the blog is the stable point of presence of a person. This
majority of sites is somehow monitored to avoid intru- is all the more true in personal blogs, when the blog is
sions, spam, and other abuses. understood as a collection of content items, that range
from professional, to spare time interests; differently
blog from the thematic blogs, but still very interesting at
the collective level, a multidisciplinary, personal blog
The term blog is the contraction of Web log, that is a can be a holistic representation of the individual, making
log on the Web. Blogs offer the possibility of writing it possible for him to participate (through cross links)
quickly, without having any specific technical knowl- in different social networks. One could hazard say-
edge, notes, thoughts, reflections, texts of any kind, ing, that it is the very concept of identity that changes
in the form of a Web page. The blog is probably the meaning on line, from belonging to or being part
application that marks, more than any other, the transi- of, it becomes being linked to....
tion from the read only Web to the read and write Web, Even in the field of formal learning the use of blogs
where everyone can be an author, in addition to being presents some very interesting features: in the school
a reader. The user thus writes new articles, whenever blogs easily can allow teachers and students to become
the user wishes, giving to the blog its characteristic authors of log-books. This space can be understood
appearance of a sequence of brief entries, similar to also as a store of materials and exercises: an archive,
annotations in a diary. The blog is generally open to or a course portfolio. Blogs can be an occasion for
contributions from other users, who can add comments reflecting on lessons and a place for discussing and
to the articles (if the author allows it), or can even be study in-depth certain topics.
managed by many users, with writing rights. This is the case of class blogs that enable teachers
The current use of blogs goes well beyond that of to actively exploit Internet potentialities, transforming
a diary. The old personal homepage is increas- students from passive users into authors.
ingly giving way to blogs; journalists, public figures, Blogs have also an important role for providing
politicians frequently use blogs, both as an extension the means to come into contact with experiences tak-
of articles printed on paper, or as an alternative means ing place outside ones own class. The coming into
of communication. It is a particularly significant contact with research and didactic material developed
phenomenon, because one notices how access to the by other work groups (for example by other schools)
production of Web content is available now to a large can become, in turn, an occasion for reflection and
segment of users who were previously excluded. If the investigation, that teachers can suggest and organize.
personal Web sites were generally a prerogative of In the informal learning context, instead, blogs
ICT practitioners, today blogs are published mostly by represent an important space for the dissemination
nontechnical people. of ideas and research findings. Many researchers and
It is very frequent, in addition, the contamination scholars, in the ICT field in particular, use blogs to
with other tools, such as podcasting and systems for present and discuss the outline of their inquiry. Finally,
archiving and sharing of digital photographs and vid- other possible uses of blogs are linked to writing, as an
eos (the new term videoblog or vlog has already been introspective tool of investigation and, with its avail-
coined) (2). ability on line, to the dynamics of a social space (the
The widespread use of these tools has given rise to blogosphere).
information indexing and searching services inside what
is now referred to as the blogosphere. With this col- tagging
lective name one indicates the entire blog community
that increasingly takes the form of a social network. The Tagging is another example of the users direct partici-
pation in the definition of Web content. In this case,
Social Networking and Personal Learning Environment
however, it is not exactly concerned with the creation of is established. Users find as well a measurement of
content but, rather, of information relating to the clas- the popularity of a given resource, since the number S
sification of content. The question of classification and of users that have tagged and saved each link, found
search for information on the Web became very early in the system, is always shown. The act itself of tag-
of crucial importance: search engines and directories ging has potentially a value, as it obliges the user to
(4) have been for many years the main point of access reflect on the meaning of the information he is saving.
to the immense quantity of information contained in Each time that a user comes across a Web page that he
the Web. Search engines and indexers operate in a top- thinks is interesting, the user can with a simple gesture,
down way, implicitly imposing on users, in response catalogue it, and share this information with others:
to a query, their classification and their criterion of it is apparently a inconsequential step but it has an
relevance (5). enormous reach in the sharing of knowledge. Finally,
Tagging completely reverses this approach: it is the significance of resources on the Web is decided
the single user that, with a bottom up approach, de- socially and transparently, subtracting the decision to
fines the link between the digital resources (Websites, experts and to the complex algorithms used by search
images, films, music) and the terms used to describe engines.
them, which are exactly the tags, simple labels (single
words or short sentences). Since tagging comes through
the Web, above all through systems for the sharing of socIal netWorKIng
bookmarks called social bookmarking, the collaborative
aspect emerges as well. This mechanism of spontane- The concept of a social network stems from the stud-
ous and collective categorisation done by means of ies in socio-psychology, sociology, and anthropology
tags is called folksonomy (a neologism from the root as early as the beginning of the 900. The studies on
folkspeoplecombined with the word taxonomy; the analysis of the interactions between individuals in a
it indicates a system of classification (taxonomy) which community are more recent, such as the Social Network
is informal and managed autonomously by groups of analysis that deals with the study of the structure of
people, who collaborate, spontaneously, in the organi- the network of interactions (of various kind) which is
zation of information. It is the opposite of the formal, established amongst individuals (Scott, 1997). In recent
a-priori, classification systems, in which the taxonomy years, in addition, the theory of connectivism is gaining
is predetermined; it is also different from search engine momentum, as the theoretical basis to consider the net
indexing based on terms contained in the text: through itself as a tool for learning (Siemens, 2004).
folksonomy, meanings are continuously created by the The online version of the social networks is known
users. The dishomogeneity and possible dispersivity are today by the name social networking and it refers to
nonetheless the chief critical elements of folksonomy. technologies and services available on the net that make
In the absence of rules, each user is free to interpret the possible for individuals to participate in real and proper
information tagging it freely. The lack of standards for virtual communities.
the tag definition can lead to confusion: for instance a It is a multifaceted phenomenon corresponding more
user can classify a resource using the singular, other the or less to the equivalent contexts of human relations,
plural, there are generally no rules for using compound although the boundaries are a bit blurred:
words or to represent hierarchical concept structures
Tagging is not an exclusivity of social bookmarking, In the professional context, with the creation of
for instance it is widely used also by blog authors to communities of colleagues or thematic communi-
classify the articles and the pages they have inserted. ties;
Systems based on tagging and social bookmarking, In the context of free time activities, for friendly
can thus be used as an alternative to normal search and sentimental interpersonal relations and the
enginesstill, this systems offers greater potentiali- exchange of informal relations (6).
ties. For example, as the social bookmarking services
keep track of who has created each reference and al- Web sites that offer social networking services do
lows access to that persons other bookmarks, a form not normally use particularly innovative technologies.
of connection with others interested in different topics Basically the user, after signing up, is invited to insert
Social Networking and Personal Learning Environment
as much information as possible about the user, in order The possibility of allowing the use of information,
to draft a personal profile that is as detailed as possible. or parts of the services normally offered, can be re-
One starts from personal details to arrive to interests and garded as a strong, rather than a weak point. The trend
hobbies, passions, and preferences of any kind (this is is to invest in the fact that users, anyway, use the data
especially so in communities dealing with spare time (OReilly, 2005). A specific term for this concept has
interests), or a detailed curriculum (for communities also been coined: this remix of content and services
in the professional sphere) The next step usually con- is called mashup. One could observe that the re use of
sists in inviting other people to sign up for the service. images, films, news, graphics and other types of content,
Generally one contacts his friend or colleagues inviting provided that the source is cited, is part of the ethics of
them to do the same, in a sort of endless progression the hacker (Himanen, 2003) by which concepts such
that, ideally, could include the entire world population. as freedom of speech, freedom of action and self
The mechanism of the social networking is in synthesis realisation, through ones own contribution to the
the following one: I sign up, I invite my friends, who creation of the net, are the parameters that since the
in turn invite their friends an so on, to arrive to create 1980s populate the dreams of those who believe in the
a wide network of friendships. development of a network society free from monopolies
Through some services one can even make acquaint- and restrictions (8). The new network develops new
ances, be means of algorithms, varying in their degree rules. The Open Access Initiative, born from the Berlin
of sophistication, that manage to match up the different Declaration in 2003, to promote free circulation and
personal profiles. dissemination of human knowledge and of the cultural
To indicate the members of a community, one usually assets produced by the scientific community (9); projects
uses the term friends: the members are thus linked like the already cited Free Software Foundation, active
by a bond of friendship that, nonetheless, is limited since 1985 aimed at the promotion of the users right to
to those who are registered for the same service. Each use, study, copy, modify, and redistribute software (10),
one can thus belong to different communities, through and finally the Creative Commons licences proposed
the registration to different social networking Websites. by the nonprofit organization known by the same name,
There is no lack, however, of standardization proposals as alternatives to the traditional copyright, share this
to universalize the concept of friendship, at the base of new spirit of the Web, seen as an open network based
social networking, which is now currently limited to the on the participation and the creative involvement of
services offered by individual Websites. An example is the users (11).
the proposal named FOAF (friend of a friend), a project According to a research study of the Pew Internet &
that aims at creating documents in XML format aimed American Life Project on the use of Internet by young
at describing people and their connections (http://www. Americans (12-17 years old), 57% of them use the PC
foaf-project.org) (7). for recreational activities, such as the management
of a Blog or the production of music and videos; 20%
content: aggregation, use and reuse of them affirms, in addition, that they normally use
materials produced by others, feeling free to download
The protection of personal data and the attention to the from the net and to manipulate texts, images, and audio
safeguard of intellectual property rights are usually a to be recombined in their production (Pew Research,
major concern on the net. Surprisingly, however, in 2005).
many new Web applications there is, instead, an in-
creasing opening up of corporate Databases. an application of social networking in
Striking examples are offered by Google Maps (that online learning systems
allow the re-use of maps to add commercial and/or other
type of information, in a perspective of georeferenc- Starting from 2004, thanks above all to the activity of
ing), Ebay, and Amazon: they both allow public access the British research community, the concept of personal
to their DBs, to the extent that Web sites that use data learning environment (PLE) is gradually taking ground.
coming from these two organisations, to provide added Starting from the experiences and the studies on the
value services, have been created. e-portfolio, and including new life-long learning issues,
with the PLE there is an effort to highlight even further
Social Networking and Personal Learning Environment
the centrality of the individual. The acronym itself is instance the e-learning platforms and/or the institutional
not accidental: the assonance with VLE (virtual learn- services provided by schools and universities attended S
ing environment) is deliberate and wanted. The PLEs, by the student) and partly relating to social networking
in their being environments centred on the student, services and Websites in which the student could be
are contrasted to VLEs, considered institutionalised registered and actively using, which represent the area
learning environments, that leave very little control of informal learning.
to the student. Some authors stress that it is important to keep the
In 2005, Scott Wilson, published in his blog concept well separated from the technical system: there
dedicated to the research in this field, a diagram that are different ways to implement a PLE, some are based
thanks also to successive re-elaborations, is now very on an ad hoc software, and others, on the contrary, use
well known in the blogosphere: In synthesis, a PLE a mix of already available desktop software and Web
(the future of VLE, at the centre in Wilsons repre- services which, one hopes will develop further in the
sentation) should function as an operational centre, future (Attwell, 2006). The risk is that PLE might
managed and controlled entirely by the student. The become in the end something very similar to the very
system should be able to interact with a series of external thing they want to contrast (VLE): a new form of walled
systems, partly related to formal learning activities (for garden in which to isolate students from the rest of the
It is the key concept of a PLE. From this point of view the environment is able to
perform the functions of an e-portfolio, combined and/or implemented by means
of a blog. The blog is seen as an essential element to overcome the difficulties
that still limit the use on a wide scale of the e-portfolio. Differently from the
latter, generally perceived as an institutional tool, a blog is considered a true
Learner-centred Blog personal area, informal, where no limitations are imposed on spontaneity. The
success of informal environment shows how important it is to be able to choose
the place and the way we wish to present ourselves. It is typical of blogs to be
able to find different aspects of the authors personality: alongside ideas and
reflections related to ones own study and profession, one often finds notes on
interests, hobbies, and personal aspirations.
PLEs are open to social networking; systems and they support and integrate
Social networking
Collaborative learning them. They are natively a typology of social software and foresee the possibility
and social software
of sharing resources, including social bookmarking.
PLEs are based on microcontents. Their structure is based on, or inspired by,
the model of a Web Service and the opening to any other system, in addition to
Micro-contents RSS / Mashup
the intrinsic orientation toward RSS as a powerful tool for the aggregation of
content.
The openness is the chief feature of a PLE. If it is viewed as a technological
system, it must interface with the greatest possible number of heterogeneous
Open Web Service
systems, for example with numerous LMS platforms, for the formal element and
with public services of social software for the informal element.
Social Networking and Personal Learning Environment
The basic matrix that comes out from the proposals at Attwell, G. (2006). Personal learning environ-
the theoretical level, but also from the early implementa- ments. Retrieved March 13, 2008, from: http://www.
tions carried out, is based on the e-portfolio model. The knownet.com/writing/weblogs/Graham_Attwell/
PLE are seen as an extension of the latter but revisited entries/6521819364
in the light of the social software.
The following table sums up the main functions Blackall, L. (2006). Die LMS die! You too PLE! Re-
attributed to PLE, in relation to some key objectives trieved March 13, 2008, from: http://teachandlearnon-
identified in the debate on this new vision of e-lean- line.blogspot.com/2005/11/die-lms-die-you-too-ple.
ing. html
Granieri, G. (2005). Blog generation. Bari: Laterza.
Wilson S. (2005b). Future VLE - The visual ver- content has been added on a certain site. Blogs combine
sion. Retrieved March 13, 2008, from http://www. perfectly with RSS: each blog is equipped in fact with S
cetis.ac.uk/members/scott/blogview?entry=2005 its RSS system that make it possible to keep up-to-date
0125170206 with the new articles that have been posted, without
any need of visiting the Website directly. An alterna-
tive interpretation of the acronym RSS is really simple
Key terMs syndication: the term syndication is borrowed from the
press (it would stand for diffusion through a press
E-Portfolio: A collection of material in the guise of office). Leaving aside definitions and interpretations,
digital artefacts (documents, multimedia clips, links to the fundamental element is the means to disseminate
resources, notes, etc.) related to a persons educational Whats new on different Web sites.
path. It can be referred to a specific course, or it can
be seen as a permanent support for the individual, in Social Bookmarking: Those that once were known
the perspective of lifelong learning. as bookmarks, or preferred sites that each user used to
save inside the users own browser are now increasingly
Folksonomy: A neologism that indicates the contri- shared through specialised Websites. Social bookmark-
bution from people (folks) in the definition of meaning ing, that is in pooling ones own bookmarks, together
and in the classification of information on the Web. It is with the tags freely supplied by the users. One of the
contrasted to a-priori taxonomies complied by experts main sites of social bookmarking is http://del.icio.us.
(for example in the library field).
Virtual Learning Environment (VLE): In general,
Microcontets: In the perspective of mashup, the Web systems used for the management of courses in
microcontent is the ideal unit for the re-use of infor- schools and in Universities. They are often also re-
mation (MacManus e Porter, 2005). The Web is no ferred to by the acronym LMS (learning management
longer viewed as a set of pages, but instead of even system).
smaller units (for example a single post in a blog or
a pod-cast).
Podcasting: The term podcasting groups all the endnotes
techniques aimed at the production, the sharing and the
use of audio/and or video material. The basic element of
1
The fortune of Wikis is mostly due to the project
this technique is an audio or video recordingvarying Wikipedia, the free encyclopaedia compiled
in the degree of expertise with which it is made, that can with contributions from common users (www.
be used directly online or downloaded for listening or wikipedia.org) and based on a wiki system for the
viewing off-line. This denomination is derived from the compilation of pages (www.mediawiki.org).
2
well known digital music reader Apple iPod; with the Amongst the most well known tools for the sharing
suffix casting, derived from broadcasting, it comes to of photographs stands out Flicker (http://www.
indicate a system for the transmission of audio material flickr.com) or for the videos YouTube (http://
that can be listened to on many different devices, from www.youtube.com/. For sharing of audio Flickr
the PC to a digital reader, to mobile phones. (http://www.flickr.com) should be mentioned.
Main Web sites for the aggregation and sharing
RSS: RSS stands for RDF Site Summary, a format of news items are: Digg (http://www.digg.com/),
for the diffusion of content through the Web. From a Slashdot (http://www.slashdot.com/).
technical point of view, RSS is based on the XML mark 3
A Blogger is the author/owner of a blog.
up language, well known for being the foundation 4
In the world of information searching on the
stone on which the present Web could rise, separating Web two lines of action have gained ground: the
content from presentation and graphical aspects. The first, a feature of pure search engines such as
RSS technology has as its fundamental aim the feeding Google, based on whole text indexing of pages
on the Web of headlines of articles, news, links and, and the other, first proposed by Yahoo, based on
more generally, any sort of whats new of any site. directories, that is on a hierarchical classification
It works as a kind of announcement that some new
Social Networking and Personal Learning Environment
7
through numerous levels of categories and sub- The aim of FOAF is to free personal details from
categories. the relational ones (that is the individual own
5
It is well known that Googles fortune might also social network) from the mebership to a certain
be due to the use of an almost secret algorithm community or service.
8
to establish the relevance of a Web site (and The term hacker is commonly associated in com-
therefore its prominence in the search results). mon usage to computer crimes. On the contrary
The basic element for the calculation of the so (according to a distinction that is progressively
called page ranking is the number of direct links more difficult to contrast, that confuses them with
to the page, but it is not the only element taken crackers, the real computer criminals) the hacker
into consideration. culture is part of that wide movement, formed
6
One of the first services to be available online almost by students, to whom we are in debt for
was Classmates (www.classmates.com), active the many innovations and software that we use
since 1995 which made possible the search of old daily.
9
school mates. The true boom of social networking http://www.zim.mpg.de/openaccess-berlin/ber-
services, however, has come after 2001, with sites lindeclaration.html
10
like Friendster (www.friendster.com) MySpace http://www.fsf.org/
11
(www.myspace.com), Facebook (www.facebook. http://creativecommons.org
com) and LinkedIn (www.linkedin.com)..
0
Section: Process ICT
Mark S. Teachout
University of the Incarnate Word, USA
IntroductIon bacKground
This article describes a training innovation that com- The idea of a stream of training data or information
bines research on advances in information communi- evolved from the literature on artificial intelligence
cation technologies (ICTs) and leading-edge training (AI) and machine learning (see references in Atkeson,
techniques. It also extends an evolution of traditional Moorey, & Schaalz, 1997; Rosario, 1992; Utgoff,
organizational change management (OCM) approaches 1989; Utgoff & Brodley, 1990). In this research lit-
and integrates technology more fully than current tradi- erature, a stream of training or a continuous flow of
tional change management practices. This new approach data/information into a program permits learning to
to training is based on concepts that have been utilized occur from the relationships present in the stream. The
in artificial intelligence (AI) and machine learning. This programs used in this research usually rely upon very
approach merges traditional project communication and sophisticated algorithms or models (such as a variant
project training together to form a continuous stream of the Hopfield net) to interpret these relationships.
of training throughout the life cycle of the project. This stream or flow of data/information is possible
This technique is an advanced combination of both today because of the speed of the processors and the
training and communication. Rather than utilizing a capacity of the neural network (approximately 14%
traditional linear training model, in this technique, of the number of nodes in the network according to
training becomes a stream of learning incorporating Goertzel and Troianov, 2005).
pretraining communication (screen prints of new ap- In the project management stream of training ap-
plications), push training that can be electronically proach, both training and communication are merged
distributed through really simple syndication (RSS, together. Separately, both training and communication
also referred to as resource description framework, site are critical aspects of an overall project management
summary, or rich site summary) to key stakeholders approach to successfully implementing new systems
just-in-time (JIT) and electronic performance support or structures. Utilizing this approach, the project team
systems (EPSS) that reinforce new process/technology combines training and communication into a steady
changes. Some of the potential advantages of this ap- stream of data/information to all relevant stakeholders
proach are that it is less costly than providing separate throughout the life of the project.
communication and training functions and that utilizing The importance of good project management (PM)
an integrated or streaming approach to communication in an implementation project is obvious. In order for a
and training may lead to less conflict and confusion project to be carried out in a logical and rational way,
among key stakeholders about the current status of good project management is critical. However, good
the project team. A discussion of the background and project management may also be responsible for the
the benefits achieved by this approach are described strategic differentiation of the organization. In a recent
in the following sections. enterprise resources planning (ERP) conference, Ritchie
(2005) stated that project management has become
the critical linchpin between strategy and operations
(p. 13). Often, the bridge between the successful
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Stream of Training Approach
Stream of Training Approach
process improvements, and/or training content Therefore, because of recent advances in ICT, it
and then communicated or trained to relevant is now possible for practitioners to adopt a stream
stakeholders of training approach that combines project training
Change control: Changes to the project timeline, and communication. Some of these technologies
scope, or team are communicated to all relevant could include RSS, streaming digital media, Web-
stakeholders based training (WBT), and EPSS which is defined
Process flows: The process workflows, changes, as the electronic infrastructure that captures, stores
and/or improvements are communicated to all and distributes individual and corporate knowledge
relevant stakeholders and/or developed into train- assets throughout an organization, to enable individu-
ing materials for relevant users als to achieve required levels of performance in the
Project team communication: Project team fastest possible time and with a minimum of support
communications (e.g., project team meeting notes) from other people (Raybould, 1997, p. 167). These
are distributed to all relevant stakeholders technologies allow the training and communication
Draft versions: Draft versions of the applica- to be continuously streamed throughout the life of the
tions or systems are made available to all relevant project. An example of this can be found in the model
stakeholders in Figure 3, which shows how both training and com-
Sandbox: A beta version of the application or munication can flow throughout the project and utilize
system is made available for training purposes integrated data/information (listed above) created by
Feedback from stakeholders: Feedback about the project team.
the application and/or system is collected from In a book by Dinsmore published in 1999, 14
users and communicated back to the project principles are listed for successful enterprise project
team/or and all relevant stakeholders management. The thirteenth principle states: Com-
User acceptance: User acceptance training, munication in enterprise project management covers
validation, and/or vetting occurs and any relevant the spectrum from alignment of companywide goals
data/information is collected and turned into on one end to interpersonal communication on the
FAQs, process improvements, and/or training other. Similarly, this principle should apply to train-
content and then communicated or trained to ing. Enterprise projects need comprehensive (cradle to
relevant stakeholders grave) communication and training. Training should
Stream of Training Approach
not be considered just another function of the project to Project Management, Cleland (1997) suggests that
or, even worse, simply a final deliverable. Imagine a there are eight project management functions that can
scenario where a training course on a new application be a source of conflict.
(for new entry level employees) did not incorporate
information about the new processes (put in place by Scope: What is to be done (results, products, and
the project team) nor did it cover aspects of the new services)
operating system or hardware (that were determined to Quality: What measures, what steps to be
be requirements or issues early on in the risk analysis taken
performed by project team). This would most likely be Cost: Financial outcomes, savings, return on
a very unsuccessful implementation. In a best practices investment
example, both training and communication should be in- Time: Deadlines, resources, when complete
tegrated, comprehensive, just-in-time, and intertwined Risk: What risks are accepted, avoided, de-
so fully that they cover the same source materials and flected
tell the same story. Human resources: What resources, what skills,
availability, competency
Contract/procurement: Cost, requirements/
advantages specifications, when, how, what, where
Communications: When, how, to whom, contains
One of the potential advantages of this approach is what
that it can decrease the costs of providing separate
communication and training functions. From the lit- Utilizing a streaming approach to both communica-
erature on WBT, there is support for at least modest or tion and training can reduce the amount of confusion
possibly astounding cost savings, depending on how and integrate project team data/information. In a typi-
training dollars are currently spent (Cangero, 2000). cal project, communication may come from different
Expanding upon this finding, Cangero (2000) suggests individuals or groups depending on which PM func-
that typically WBT courses cost far less than the same tions are involved. In addition, there may be different
course taught in a classroom setting (WBT eliminates information repositories in the various PM functions
the substantial additional costs of travel, lodging, and which may or may not be shared fully. In the traditional
meals for students), and they have the advantage of approach, this can lead to the perception of functional
providing a continuous stream of training material to silos within the project team itself (see Figure 4 for
workers at their desktops. These same cost savings can an example of the various functions). This can lead to
be realized for project communication as well. a decrease in the effectiveness and efficiency of the
In addition, an integrated or streaming approach to project teams communication and training efforts.
communication and training may lead to less conflict In their book Total Project Management, Stallworthy
and confusion among key stakeholders about the cur- and Kharbanda (1983) suggest that an area of project
rent status of the project team. In the book Field Guide expense that is commonly overlooked and severely
underestimated is pre-operational expenses. These are
Stream of Training Approach
expenses that occur in the operations area of product the integrated streaming approach. The advantages over
development prior to producing a product. They suggest the traditional approach to project communication and
that the training of both operational and maintenance training are summarized in Figure 4.
personnel would be considered a pre-operational ex-
pense, as the personnel have to be trained before the plant
goes live. This can sometimes lead to a prolonged Future trends
startup and commissioning period which is sometimes
hidden costs in the project (Stallworthy & Kharbanda, In the future, evolving technologies could lead to more
1983, pp. 154-155). The integrated streaming approach seamless integration between training and communi-
can eliminate or reduce these costs as the training of cation, as well as human capital management (HCM),
personnel would occur during the lifetime of the project knowledge management (KM), and human resource
thereby reducing the amount of down-time. information systems (HRIS). In the near future, the new
Some additional advantages that differentiate this skill sets that are developed by project team members
approach from the traditional approach include: will be tracked in HCM systems, and the best practices
from the team will be tracked in KM systems which
The initial screen prints and other project-level will in turn feedback to new project teams as integrated
information are distributed to first-line staff training and communication content (see Vequist &
employees so that their awareness and under- Teachout, 2006 for a review of HCM and KM integra-
standing of the application prior to go-live are tion). The project team members will be selected in
increased. advance from the HRIS system and given preproject
The training is performed in a just-in-time basis streaming communication through digital devices (like
and is developed from project materials which personal digital assistants or cellular phones).
allows for a quick turnaround of information and In a recent book chapter, Vequist and Dominguez
knowledge. (2006) found that there are five constructs that seem
This approach adds additional content and real- to underlie the fulfillment that some people experience
ism to project team communications. being involved in project teams: autonomy (defined as
This approach can also add to higher adoption rates the condition or quality of being autonomous or inde-
and less resistance to change among stakeholders pendent); career expectancy (defined as expecting that
(thus relating to OCM as well). the outcome will assist them in their career); ownership
(defined as able to take ownership or responsibility for
Based on these potential benefits, project teams that outcomes); self-development (defined as the ability
have as their responsibility both the training and commu- to learn from activities in a self-paced manner); and
nication of project teams and end users should consider sociability (defined as giving the opportunity to enjoy
Stream of Training Approach
the company of others). In the future, studies may find Gonzales, A., & Nelson, L. (2005, January). Learner-
that the streaming approach to project communication centered instruction promotes student success. T.H.E.
and training may even lead to higher levels of satis- Journal 32(6).
faction among project team members. The streaming
Raybould, B. (1997). Performance support engineering:
approach could make the project team members feel
An emerging development methodology for enabling
as if they have more ownership of the project, and this
organizational learning. Performance Improvement
approach may lead to higher levels of career expectancy
Quarterly, 10(1), 167-182.
and self-development.
Ritchie, P. (2005, October). The five dimensions of
project management expertise: Balancing knowledge
conclusIon and skills to grow your career in an SAP world. In
Proceedings of Managing SAP Projects 2005.
In conclusion, based on the research and findings, it is
Rosario, R. (1992). A conjugate-gradient based algo-
suggested that the stream of training approach should
rithm to train feedforward multilayer perceptrons. Doc-
continue to improve upon some of the traditional, func-
toral dissertation, Florida Institute of Technology.
tional areas of PM. The streaming approach to project
training and communication reflects technological Stallworthy, E., & Kharbanda, O. (1983). Total project
improvements to the PM methodology and can lead management. Aldershot, Hants, UK: Gower Publishing
to increases in the overall effectiveness and efficiency Company Unlimited.
of project teams. In the future, it is possible that this
improvement will involve other systems as well to form Utgoff, P. E. (1989). Incremental induction of decision
a continuum of streaming data and information that will trees. Machine Learning, 4, 161-186.
revolutionize project work as we know it. Utgoff, P. E., & Brodley, C. E. (1990). An incremental
method for finding multivariate splits for decision trees.
In Proceedings of the 7th International Conference on
reFerences Machine Learning (pp. 58-65). Austin, TX: Morgan
Kaufmann.
Atkeson, C. G., Moore, A. W., & Schaal, S. (1997).
Locally weighted learning for control. Artificial Intel- Vequist, D., & Dominguez, D. (2006). The fulfillment
ligence Review, 11, 75-113. of application. University of the Incarnate Word Fac-
ulty Anthology.
Cangero, K. (2000). WBT: One piece of the learning
puzzle. TechRepublic Online. Retrieved March 4, 2008, Vequist, D., & Teachout, M. (2006, May). A concep-
from http://techrepublic.com.com/5100-10878_11- tual system approach for the relationship between
5033081.html# collaborative knowledge management (CKM) and
human capital management (HCM). Paper presented
Cleland, D. (1994). Project management: Strategic at the Meeting of the 2006 International Symposium
design and implementation (2nd ed.). New York: Mc- on Collaborative Technologies and Systems (CTS
Graw-Hill. 2006), Las Vegas, NV.
Cleland, D. (1997). Field guide to project management.
Hoboken, NJ: Wiley. Key terMs
Dinsmore, P. (1999). Winning in business with enter-
prise project management. New York: AMA Publica- Artificial Intelligence (AI): Generally accepted to
tions. mean intelligence as exhibited by a computer program
or other artificial entities. This is an area of computer
Goertzel, B., & Troianov, T. (2005). Continuous learn- science dealing with fuzzy logic, intelligent behavior,
ing in sparsely connected Hopfield Nets. Retrieved machine learning and adaptation to new stimuli. Ap-
March 4, 2008, from http://www.goertzel.org/papers/ plications of AI systems are primarily found in mili-
ANNPaper.html tary and commercial systems concerned with control,
Stream of Training Approach
planning and scheduling, answering diagnostic and Organizational Change Management (OCM):
consumer questions, and handwriting, speech, and Describes the multidisciplinary/ multidimensional S
facial recognition. Closely aligned with robotics, it process of managing change in an organization. Often
aides in the production of autonomous machines that involves understanding the communication flows and
can perform automated tasks requiring high levels of structures/processes that exist in the organization.
intelligent behavior. Usually, the objective of OCM is to minimize the risk
of failure of implementing the change by maximiz-
Electronic Performance Support Systems
ing the collective efforts of all people involved in the
(EPSS): These systems support a worker so that they
change.
will be more successful and productive in their work.
It can be any type of electronic system that supports Project Management: A methodology undertaken
workers with flows of data and information. These by a project team and led by a project manager to
systems are very important in the new age of work minimize the risk of failure and maximize the chances
because workers have become inundated with data and of success in a project. The project team under the
information, and it is imperative that they learn how to leadership of the project manager defines goals/targets,
organize and consolidate it quickly and accurately. The determines how to efficiently utilize project resources
payback for EPSS lies in its ability to adapt, change, such as time, money, people, materials, systems, and
and evolve to meet the changing needs of workers who so forth during the course of a project.
utilize these systems.
Really Simple Syndication (RSS): A relatively
Enterprise Resources Planning (ERP): These new format for distributing news headlines and other
are typically integrated systems that can provide the content on the Internet. Other names for RSS are RDF
infrastructure for a wide range of processes including (resource description framework), site summary, or rich
human resources, procurement/supply chain, call-cen- site summary, or really simple syndication. It is found
ter/sales-force automation, and financial/accounting. on many Web sites, portals, e-zines, and electronic
Usually this refers to packaged software provided by databases.
vendors such as PeopleSoft, SAP, Oracle, Lawson, JD
Web-Based Training (WBT): This is a form of
Edwards, and Baan. The advantages of these systems
computer-based education or training where the train-
are that they typically allow for improved enterprise
ing material resides on the Internet and is accessible
application integration and are part of an overall
using a Web browser. This form of training typically
business process reengineering (BPR) to improve the
incorporates multiple types of media elements into the
companys processes.
content including text, graphics, animation, audio, and
video. May be facilitated by a trainer or be in a self-
directed, asynchronous format.
Section: Context ICT
Koray Velibeyoglu
Izmir Institute of Technology, Turkey
IntroductIon bacKground
During the last two decades knowledge based devel- In the information era, sustainable economic growth
opment (KBD) has become an important mechanism and development is highly associated with knowledge
for knowledge economies. In a knowledge economy economies (Metcalfe & Ramlogan, 2005). The term
information and communication technology (ICT) knowledge economy was first introduced by the OECD
is extensively seen as a potentially beneficial set of in 1996. A knowledge economy creates, distributes, and
instruments, which may improve the welfare and uses knowledge to generate value and gives rise to a
competitiveness of nations and cities. At present both network society, where the opportunity and capability
public and private actors aim to exploit the expected to access and join knowledge and learning intensive
benefits of ICT developments. ICTs offer unprecedented relations determines the socio-economic position of
promise for social and economic development on all individuals and firms (Clarke, 2001). Rapid advances
global, national, regional, urban, and local levels. This in ICTs during the last two decades established the
chapter seeks to investigate the potential of ICT strate- infrastructure that enables the knowledge economy to
gies at both regional and urban levels, and in particular scale up. The main novelty of the knowledge economy
to shed light on various factors that influence urban consisted of the need to manage an intangible asset that,
ICT strategies in the public domain. in contrast to material resources, does not depreciate
The chapter sets out to explain the KBD processes through use but rather becomes more valuable the more
and challenges and opportunities in information it is used (Laszlo & Laszlo, 2006).
acceptance and use in urban policy making. This According to Buckley and Mini (2000) a citys
chapter draws on providing a clear understanding on knowledge economy is the economic wealth and well
policy frameworks and relevant ICT applications of being that results from the effective investment in people
the Queensland Smart State experience. and ideas that create an environment where informa-
The chapter is made of six sections. The first sec- tion, creativity, goods and services are produced and
tion following the introduction provides background exchanged, drawing on best practices. It requires a
information. The second section focuses on the KBD skilled labor force, up-to-date knowledge, effective use
processes in Queensland. The third section offers a of technology (primarily ICTs), and broad city resources
comprehensive analysis of the Queensland Smart State that foster a productive urban economy. In this process,
initiative, and it also identifies actors and goals of the communication, good governance and partnerships are
agenda of Smart State experience. The fourth section developed with all major stakeholders.
reviews KBD and ICT applications and policies of KBD is a powerful strategy for economic growth
the Queensland Smart State and Brisbane Smart City and the post-industrial development of cities and
experiences, and their impacts on Brisbanes successful nations to participate in the knowledge economy. It
KBD. The fifth section discusses knowledge hubs and is a strategic management approach, applicable to
ICT developments within the Brisbane metropolitan purposeful human organizations in general (Carillo,
area. Then the chapter concludes with conclusion and 2002). KBD has two purposes: The first one is, it is a
future trends section. strategy that codifies technical knowledge for the in-
novation of products and services, market knowledge
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Strengthening the Knowledge-Base of Cities Through ICT Strategies
for understanding changes in consumer choices and innovation, competitiveness and growth (Marceau,
tastes, financial knowledge to measure the inputs and Manley, & Sicklen, 1997). S
outputs of production processes, and human knowledge Mainly because of the high level of knowledge base,
in the form of skills and creativity, within an economic business research and development (R&D), govern-
model (Lever, 2002). The later one is that, it indicates ment support for business R&D, total investment in
the intention to increase the skills and knowledge of knowledge, communication and electronic commerce
people as a means for individual and social develop- and venture capital in many respects Australia is well
ment (Gonzalez, Alvarado, & Martinez, 2005). KBD placed to compete in the global knowledge economy.
policies includes: developing and adopting the state of Australias prime strengths revolve around the following
art ICTs, distributing instrumental capital, developing three key factors (McKeon & Lee, 2001):
human capital, and developing capital systems (Car-
rillo, 2002). A reasonable strong knowledge and technology
To date, the structuring of most of the knowledge base
cities/regions has proceeded organically: in essence, A number of competitive industries linked to that
as a dependent and derivative effect of global market knowledge base
forces. Urban and regional planning has responded A rapid process of adjustment to new global reali-
slowly, and sometimes not at all, to the challenges and ties.
the opportunities of the knowledge city. Therefore,
in recent years urban planning has consolidated its The KBD process in Australia comprises five in-
interest in the paradigm of post-modern social pro- terrelated components. These are: ICTs; information
duction under the rubric of knowledge based urban networks; new industry processes (including innova-
development (KBUD) (Yigitcanlar, Velibeyoglu, & tion, research and development, and technological
Baum, 2008a). Planning sees KBUD as a new form diffusion); human capital; and capital accumulation
of urban development for the 21st century that could, through the privatization and commercialization of
potentially, bring both economic prosperity and sus- knowledge (Munro, 2000).
tainable socio-spatial order to the contemporary city.
The goal of KBUD is a knowledge city purposefully
designed to encourage the production and circulation queensland sMart state
of abstract work (Yigitcanlar, Velibeyoglu, & Baum, strategy
2008b). KBUD can also be regarded as a tool or an
approach to nourish the transformation and renewal In terms of overall economic measures, Queensland
of a city into a knowledge city and its economy into a is an outstanding performer and has been Australias
knowledge economy (Yigitcanlar, 2005). fastest growing regional economy over most of the last
decade. Economic growth in Queensland has exceeded
Kbd Possesses in australia that for Australia for about a decade, and Australia
itself has been acclaimed as one of the fastest grow-
Once Australia entered the information era and the ing economies in the OECD (Greenfield, Hammond,
new millennium, Australia needed to make a choice Milsom, & Rayner, 2006).
between two options for the continuum of her suc- In 1998, Queensland was developing an extensive
cessful economy. The first option was competing as knowledge infrastructure centered on nine universities,
a low wage economy based on the excellent but now and research agencies. Queensland also had emerging
degrading natural resource base by reducing wages, capabilities in niche areas such as ICT, nanotechnology,
living standards and environmental controls. And the neuroscience, forensics, sports science and eco-tourism,
second one was continuing with industries that are as well as continuing her competitiveness in food and
price takers (e.g., ICT, nanotechnology) in the global agribusiness, aviation and aerospace, mining, marine
economy. Fortunately, Australia has chosen the later and environmental technology industries. However,
one, which is to be part of the emerging knowledge many of the developments were not coordinated and
economy, an economy that has an emphasis on the there was insufficient recognition of these sectors
use and dissemination of information as the basis for potential to generate wealth. The Queensland Gov-
Strengthening the Knowledge-Base of Cities Through ICT Strategies
ernment recognized that greater levels of investment Key initiatives for making the right connections by
were needed to boost Queenslands knowledge infra- investing in strategic alliances and networks include
structure and take advantage of the States potential. (Queensland Government, 2005a):
In August 2003, the Government released the Smart
State strategy prospectus: Queensland the Smart State Smart State Council to provide advice on emerg-
investing in science, research, education and innovation ing trends
over the next five years. The prospectus outlined the International collaborations program to support
Governments commitment to achieving the Smart State strategic alliances
vision, stated the vision as using knowledge to drive A virtual forum to shape the future agenda.
economic growth, and charted future directions and
new initiatives in nine key strategic areas (Queensland As well as providing an immediate stimulus for in-
Government, 2004): novation, Smart Queensland takes the long-term view
by building Queenslands capacity as an innovative
Knowledge intensive economic growth society. Investing in knowledge and skills requires new
Skilling up the labor force approach in learning and education that equips people
Science and technology (i.e., ICT) education with the knowledge, technology (e.g., ICT), skills and
Building scientific and research facilities abilities necessary to succeed in an innovative society.
Commercializing discoveries and innovations Key initiatives in learning and education focus on
Harnessing smart science for the environment (Queensland Government, 2005a):
Managing the knowledge economy
Government agencies to drive research and in- Smarter learning assessing and reporting across
novation all schools
Strategic partnerships. Smart classrooms access to learning beyond
the school grounds
The Smart State strategy comprises a number of Smart academies excellence in science, technol-
initiatives for providing a stimulus to boost industry ogy and creative arts.
innovation and commercial capacity for greater global
export and trade gains. Key initiatives for mobilizing the Creation of new knowledge-intensive jobs and new
innovation process by providing support in converting skills are among the major requirements of the knowl-
ideas into results include (Queensland Government, edge economy, therefore training and higher education
2005a): system enthusiastic about innovative enterprise and
partnership with industry is a must. Key initiatives in
Innovation building fund this area include (Queensland Government, 2005a):
Smart State research facilities fund
Innovation skills fund Modernizing the vocational and education train-
Innovation projects fund. ing system to deliver flexible and responsive
training by using ICTs
Key initiatives for building the Queensland brand Smart State university internships to assist
through expanding on strengths, successes and rec- students become work-ready
ognition to take Queensland to the world comprise Skilling solutions a one-stop shop providing
(Queensland Government, 2005a): free training and career advice.
Smart ICT to grow the ICT industry and ex- To achieve KBUD and being competitive in the
ports global markets the Smart State strategy also aims to
Smart sector strategies to grow priority industry attract international investment and knowledge workers
sectors as well as improving its residents skills through training
Aquaculture development initiative. and providing incentives to Australian investors. Invest-
ing in diversity, creativity, connectivity and sustainabil-
0
Strengthening the Knowledge-Base of Cities Through ICT Strategies
ity is another important aspect of creative knowledge following initiatives are supported (Queensland Gov-
regions. Therefore Smart Queensland aims to increase ernment, 2005a): S
Queenslands appeal as a place to live, study, work
and play, by creating a dynamic Queensland, building Sustainable natural resource development strat-
a community that cares for its people and fosters and egy
celebrates knowledge and creativity. Key initiatives International water center
comprise (Queensland Government, 2005a): Innovative research to control cane toads.
Business and skilled migration program attract- The Smart State strategy is mainly about positioning
ing knowledge workers Queensland economy as a modern knowledge economy,
Queensland multicultural festival and images of recognizing knowledge, science, technology, research,
Queensland the diversity education, and innovation as key drivers of economic
Ideas festival exchange of bright ideas. growth. It also aims to achieve KBD and KBUD
through a wide collaboration between public-private-
Infrastructure (mainly ICT networks) is needed academia partnership and including all stakeholders
to be provided in order to strengthen connectivity of and interest groups into the decision-making process
Queenslands firms, institutions and residents. Key as active actors.
initiatives in the provision of new infrastructure include Most of the initiatives have targeted enabling
(Queensland Government, 2005a): technologies as applications of enabling technologies
are critical to the sustainability and globally competi-
Streamlined development approvals process for tiveness of Queenslands important traditional indus-
ICT infrastructure triessuch as agriculture and miningbased in the
Online telecommunications information portal regions, and for the growth of emerging industries such
for business and communities. as ICT, nanotechnology, biotechnology, smart materials,
and aviation and aeronautics (State Development and
Sustainability and smart use of our natural resources Innovation, 2004). These initiatives and the Smart State
is an integral part of the Smart State strategy and the strategy have a strong pushing power in positioning
Queensland economy as a knowledge economy.
Strengthening the Knowledge-Base of Cities Through ICT Strategies
the role oF Ict In Kbud In key service center through ICT development is seen
brIsbane as strategic and important for KBUD.
Brisbane shows the synergy that can come from
Brisbane is the capital of Queensland and the fastest publicprivate partnerships (private partners in out-
growing state in terms of economy, urban development brisbane.com, in providing access for communities to
and population within Australia. Although there are inexpensive hardware), from networks with other state
few knowledge intensive industries located, and some agencies such as State Education in providing various
limited KBUD initiatives are planned for Cairns and initiatives and internet training; and working with Fed-
Townsville, most of the KBUD in Queensland occurs eral and State government in establishing opportunities
within the Brisbane metropolitan area. for one-stop service payment and registration online
The use of ICTs in interorganizational communi- around life-events (Odendaal, 2003). This synergy is
cation, in information sharing and data management combined with the strong local economy and lifestyle
is key to achieve cities agendas, in terms of KBUD, options to attract more knowledge intensive industry and
delivery of services, and outcomes through social in- workers, which supports KBUD within the region.
tegration. Similar to Queenslands Smart State strategy
Brisbane City has also adopted a 10 year Smart City Knowledge hubs in brisbane
vision aimed at addressing and promoting the follow-
ing: information access; lifelong learning; the digital A feature of globally competitive knowledge economies
divide; social inclusion and economic development. is that governments, universities and industry work to-
The operationalization of Smart State and Smart gether in these economies to create regional knowledge
City initiatives from one center for each promotes hubs. Knowledge hubs have three major functions: to
overall integration of various local and statewide e- generate knowledge; to transfer and apply knowledge;
governance initiatives. The city and the metropolitan and to transmit knowledge to others in the commu-
region are well integrated in terms of service delivery, nity through education and training. The Queensland
the infrastructure for which is underpinned by the Smart State and Brisbane Smart City strategies have
telecommunications plans, with social integration ad- augmented KBUD in and around Brisbane. Brisbane
dressed through the various initiatives. Integration is and its metropolitan area have emerging strengths in a
facilitated largely through a strong state government number of dynamic new sectors and knowledge hubs
and city councilwith a clear policy framework and that will help drive the regional capacity to develop
well-resourced staff (Odendaal, 2003). into the future. ICT, biotechnology and biosciences
ICTs are to function as tools for development and more generally, aviation and aerospace are examples
then skills development and improved access are key to of strong development opportunities which have the
achieving this. Underlying this technical development potential to make Brisbane a global player in the worlds
is the importance of social developmentliteracy train- fastest growing industries (Andrews, 2006).
ing, public computer access and creating opportunities The Brisbane central business district and surround-
for participating in the ICT industry. Brisbanes efforts ing suburbs are home to globally recognized knowledge
in this regard are based around partnerships; with State hubs and clusters such as Herston (medical research)
government in providing training in schools, with and Kelvin Grove (creative industries, health). The
small-scale businesses in providing cheap hardware, ICT sector is developing in Queensland University of
and with small ICT businesses in implementing our- Technology at Gardens Point, Milton and Fortitude
brisbane.com portal for participation (Odendaal, 2003). Valley, with government representation in the iLab
The ourbrisbane.com project is promoted as an icon in incubator (Toowong) and Information Industries Board
itself; it is marketed aggressively as a key component (Milton). Substantial activity is also centered around the
of the Smart State and Smart City initiatives. It is seen University of Queensland at St Lucia with a range of
as an underpinning to all of Brisbane long-term objec- research facilities, including the Institute for Molecu-
tives and emerged as a project, in response to the need lar Bioscience and a natural resources/environmental
to make Brisbane a competitive city, nationally and cluster nearby at Indooroopilly Longpocket. A similar
regionally. Given the city and regions reliance on the concentration is located south of the city, with Griffith
service sector for growth, enhancing its function as a University at Nathan, the nearby Mt. Gravatt Research
Strengthening the Knowledge-Base of Cities Through ICT Strategies
Park and Brisbane Technology Park at Eight Mile Plains. continuum of these strategies would likely to transform
Emerging clusters are apparent at the Sunshine Coast, Brisbane into a globally competitive knowledge city, S
based on the University of the Sunshine Coast and at and its economy into a knowledge economy.
the Gold Coast with the Griffith University campus and
the proposed knowledge precinct. The Gold Coast is
also home to a thriving ICT industry and enterprises reFerences
associated with leisure and entertainment (Queensland
Government, 2005b). Andrews, P. (2006). The smart regions report: Charac-
Elsewhere in the region, there are specialist centers teristics of globally successful regions and implications
of research and development at sites such as Pullenvale for Queensland. Queensland Government Smart State
(minerals and energy), Coopers Plains (pathology, Council, April 2006, Brisbane.
biosecurity) and Cooroy (timber). The ongoing de-
velopment of University of Queensland campuses at Buckley, R. & Mini, F. (2000). From commissars to
Ipswich and Gatton will be a key factor in diversifying mayors: Cities in the transition economies. Infrastruc-
that areas economic activity, as well as increasing ac- ture Sector Unit Europe and Central Asia Region.,
cess to education and training in the Western Corridor. Washington, DC: The World Bank.
Urban redevelopment areas, particularly ecoscience and Carrillo, F. (2002). Capital systems: Implications for
lifescience knowledge precincts such as Boggo Road/ a global knowledge agenda. Journal of Knowledge
PA hospital, provide the opportunity for mixed-use Management, 6(4), 379-399.
development, incorporating high value-added research,
development and service industries and linkages to Gonzalez, M., Alvarado, J., & Martinez, S. (2005).
university research facilities. Such developments have A compilation of resources on knowledge cities and
the potential to encourage industry clusters, which can knowledge-based development. Journal of Knowledge
be located either in close proximity or more distant, but Management, 8(5), 107-127.
connected by high-speed broadband and equipped with Greenfield, P., Hammond, L., Milsom, N., & Rayner,
other ICTs (Queensland Government, 2005b). M. (2006). The smart regions report: Characteristics
of globally successful regions and implications for
Queensland. Brisbane: The Smart State Council,
conclusIon and Further trends Queensland Government.
Strengthening the knowledge base of cities through Laszlo, K. & Laszlo, A. (2006). Fostering a sustain-
ICT strategies requires a broad intellectual team with able learning society through KBD. In Proceedings
expertise in ICT, urban development and management, of the 50th Annual Meeting of the ISSS. Sonoma State
urban studies and planning, socio-economic develop- University, California.
ment, models of intellectual capital and knowledge Lever, W. (2002). Correlating the knowledge-base of
management. It also requires a nuanced geographical cities with economic growth. Urban Studies, 39(56),
frame that allows understanding in diverse spatial 859870.
forms of the knowledge city, where a large number of
knowledge clusters (e.g., universities, R&D institutions, Marceau, J., Manley, J., & Sicklen, D. (1997). The
knowledge precincts) are particularly important in the high road or the low road? Alternatives for Australias
promotion of the spill over effects found to be vital for future. A report on Australias Industrial Structure for
long-term economic prosperity. the Australian Business Foundation, Australian Busi-
It is evident from the Smart State and Smart City ness Foundation, Sydney.
strategy and vision that Queensland and particu- McKeon, R. & Lee, L. (2001). Australias challenge:
larly Brisbane have the required KBUD potential. In Building the knowledge-based economy. CEDA Bul-
Queensland and Brisbane the State and Local govern- letin, March, 62-70.
ments have and are being developed strong urban ICT
strategies to strengthen the knowledge base of the Metcalfe, J. & Ramlogan, R. (2005). Limits to the
state and the city. Successfully implementation and economy of knowledge and the knowledge of the
economy. Futures, 37(2005), 655-674.
Strengthening the Knowledge-Base of Cities Through ICT Strategies
Section: Context ICT
Donatella Persico
Institute for Educational Technology, National Research Council, Italy
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Supporting Self-Regulated Learning with ICT
tackle new problems. It also suggests that SRL is a by Zimmermann (planning, execution, and monitoring,
competence that improves more rapidly as people and self-assessment), also includes a section on general
progress in education. Some studies, however, suggest features of the TELE structure and interface.
that SRL does not improve quickly or spontaneously For the sake of generality, the list contains aspects
(Boekaerts, 1997), but requires suitable teaching that can be relevant for some kind of TELEs, but not
and practice. The literature reports improvement in necessarily for all of them. In order to clarify the possible
learning when self-regulation is explicitly addressed meaning of the selected features in different situations,
in classroom instruction (Schunk & Zimmerman, we will comment on two very different cases of TELEs,
1998). It also underlines the importance of creating and that is, virtual collaborative environments to run online
structuring favourable learning environments which courses and programs for individual use.
stimulate reflection and revision, provide meaningful
feedback and help learners to feel responsible for their srl in virtual environments for online
own activity and achievements (Dettori, Giannetti, & collaborative learning
Persico, 2006).
The relationship between SRL and online collaborative
learning is rather complex, since the latter appears to
Ict-based envIronMents and srl both support and require the former (Dettori, Giannetti,
& Persico, 2006).
Is it possible to understand the potential support to The fact that online collaborative learning supports
SRL provided by technology-enhanced learning envi- SRL is suggested by three considerations:
ronments (TELE) by analysing their features and the
way they are used? To what extent does such support Online learning allows greater freedom of choice
depend on the features of the software tools and to what than face-to-face instruction (Williams & Hell-
extent does it depend on the way they are configured man, 2004) since students can decide, at the very
and used? least, where and when to study, and often how to
Such questions were addressed by a group of re- organize their activity. According to Boekaerts
searchers from nine countries within a European project (1999), the perception of choice encourages self-
called TELEPEERS (1), which focused on TELEs of regulation.
various kinds, from offline self-instructional programs In online collaborative courses, discussion and
to online collaborative courses. To guide the analysis comparison with peers play a key role. According
of the TELEs, the TELEPEERS partners identified to Bolhius (2003), social experiences in general
a set of features that, according to the literature, are (not only online) are an important source of SRL
desirable when SRL practice and development are competence.
among the learning objectives. The standpoint of this The need to put in writing ones thoughts and
project was that the analysis should focus not only on reflections, according to Kanselaar, Erkens, Jas-
the software component but also on its mode of use, pers, and Tabachneck-Schijf (2001), encourages
since these two aspects are so strictly intertwined that reflection and assumption of responsibility.
their effects are too difficult to separate. Based on the
aforementioned features, TELEPEERS also produced On the other hand, self-regulation appears neces-
and tested two questionnaires (2). The first is meant to sary to help students take advantage of online courses.
be used by teachers and/or SRL experts for an a priori In particular:
evaluation of the TELEs potential, while the second is
addressed to the TELEs users and allows a posteriori Commitment, feeling of responsibility, reflection
assessment of the tool and its use. and the ability to plan the learning activity are
Based on the project outcomes, we further elaborated even more important in online experiences than in
the TELEPEERS set of features and came up with the traditional ones, in fact, satisfactory achievements
checklist in Table 1. This list, in addition to items refer- in online contexts heavily depend on these aspects.
ring to the three cyclical phases of SRL control identified As a consequence, students who are not used to
Supporting Self-Regulated Learning with ICT
online learning might find that this change in can hopefully be of help, especially in environments
learning style requires nontrivial adjustments. where SRL support appears to be a crucial aspect to
Online learning requires students to be able to the success of the courses.
use the technology necessary to participate in What aspects of self-regulation can we expect to
online courses. For those who are unfamiliar with be supported in online collaborative environments?
computer use, even operations like text-based CMC (computer mediated communication) platforms
communication or environment navigation may are empty containers, which provide collaborative
be challenging (Arbaugh, 2004). tools and organizational features only; hence their
Using freedom profitably requires some training. influence on SRL would appear to be limited to social
As Schraw (1998) points out, learners need to behavior. Support to motivation, meta-cognition and
have some minimal knowledge to be able to make individual behaviour, however, is not lacking, rather it
informed choices. Paradoxically, some guidance is indirectly provided, since well organized and ductile
is necessary to allow learners to exercise control platforms allow course designers and teachers to work
(Jones & Issroff, 2005). out configurations and activities that support SRL in
these respects too. The virtual presence of peers and
This analysis suggests that online collaborative en- tutors often compensates for those aspects that CMC
vironments can provide good opportunities for students platforms do not support directly. It is important,
to practice, and therefore develop, self-regulation, hence therefore, that people involved in the production and
becoming better learners. Of course, this is more likely delivery of online courses become aware of such po-
to happen if the TELE is designed and organized with tentialities and pay attention to them while designing
this objective in mind, and our list of desirable features and running the course.
Supporting Self-Regulated Learning with ICT
An analysis of several CMC platforms in relation The support to SRL provided by such features of
to the above SRL model led us to distil a number of CMC platforms can be exploited and further amplified
potentially beneficial features specific to this particular by setting up ad hoc functions for activity planning, by
kind of TELE (Dettori, Giannetti & Persico, 2005a, proposing learning materials and task assignments that
2005b): stimulate reflection and self-evaluation and by using
scaffolding and fading techniques that help maintain a
An easy and intuitive interface can reduce cogni- positive attitude and motivation. To this end, it is neces-
tive overload and allow students to concentrate sary that materials and activities are cognitively well
on learning rather than on the use of the environ- structured and explicitly make use of the potentialities
ment; of the platform used. A configuration and course plan
Features for controlling and personalizing the that does not make full use of the features offered by
individual workspace, such as grouping of mes- the platform risks falling short of its potential. This
sages and threads, and organization of folders happens, for instance, if a platform allows the use of
and forums, can facilitate cognitive planning and multimedia files but the configuration only proposes
avoid confusion; they can also raise awareness textual materials, or if the planning tools provided, like
of ones own thoughts, learning style and current calendars, are hardly ever used by tutors to pace shared
educational needs; activity nor are they proposed to the students to assist
Features for personalizing content presentation, the organization of individual work.
by hiding/removing/ordering content items, dis-
tinguishing between read and unread messages srl in Individual learning
and texts, adding comments and annotations, may environments
support motivation and positively influence task
performance; Environments for individual learning usually consist
Methodological help can facilitate learners con- of programs or multimedia systems with well-defined
scious use of metacognition and reflection; educational aims, specific contents and a structure and
Features to exchange and jointly edit multimedia learning strategy that somehow follow from them. The
documents, by managing their versions, can have above features vary considerably from case to case,
a positive influence on task execution and group making it very difficult to characterise these environ-
work; ments from the point of view of SRL as precisely as
Tools for different modes of communication we did for online collaborative environments. A few
(public and private, textual, audio, and video, considerations derived from the analysis of the SRL
synchronous and asynchronous) can foster the potential of environments of this kind, however, can help
development of personal initiative and support us to better understand their potential and limits.
different learning styles, therefore improving It is important to remember, first of all, that the
motivation, stimulating positive emotions, and analytical approach applies to environments, not to pro-
encouraging social behavior; grams; hence it is necessary to consider how programs
Tracking functions, such as the history function, are used to learn. By environment, in this context, we
showing who has read or modified any item on mean the setting needed to use the software as well
the platform, can support planning and facilitate as the activities and the tasks that students are asked
performance; to carry out and the type of scaffolding provided. The
Automatic reminders of appropriate actions to software component of a TELE, therefore, provides
undertake can assist planning and support task only potential support to the practice of SRL, which
performance; must be suitably exploited by careful pedagogical
Features and tools for self-assessment, as well as planning. This can be provided by the teachers if the
the use of peer-reviews and reciprocal teaching program is used in the context of formal education, or
strategies can inform and encourage monitoring even by the students themselves in the case of learners
and self-evaluation. engaged in self-instruction.
It should also be clear that this particular kind of
analysis of TELEs does not provide an evaluation of
Supporting Self-Regulated Learning with ICT
Supporting Self-Regulated Learning with ICT
0
Supporting Self-Regulated Learning with ICT
742 Section: Context ICT
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Technology Enhanced Learning in Continuing Medical Education
Be planned so as not to take up an entire work- been an increasing diffusion of TEL approaches (above
ing day but divided into training segments (or all formal) within health care training. However its T
modules) each lasting one or two hours. diffusion is scattered like leopard spots which is typi-
cal though during the initial stages of any innovation
For this reason, since 2002 the national programme process.
of CME has included, on experimental basis, Distance
Education (DE) among the various ways of providing
health care workers with training courses. Almost methodology
from the outset, interest has been oriented towards DE
based on the educational use of ICT (Ruiz, Mintzer, Having defined the specific research objectives and
& Leipzig, 2006). the corresponding indicators for the data collections,
a sample was then defined, that is, those LHUs were
identified which had already acquired experience using
research aIms TEL methods in CME.
Subsequently an online questionnaire was admin-
The aims of the research has been to draw up a istered, developed according to the above-mentioned
picture in Italy on the ways of using TEL in accredited indicators and divided into four sections relating
educational activities for CME, highlighting both the respectively:
main approaches adopted and the critical issues related
to their introduction. 1. To the general approaches followed by the LHUs
In other words, it was agreed to proceed with not so in proposing and using TEL;
much a quantitative survey on the use of TEL in CME, 2. To the opinions of staff interviewed about TEL;
as rather a qualitative analysis on the ways it is proposed 3. To the characteristics of TEL courses already
and managed and on the outcomes of its introduction realised or planned;
within the LHUs which have already gained experience 4. To the informal learning processes based on the
in the educational use of ICT. sharing of knowledge and good practices within
However, research has not been limited to analyzing the different professional communities.
the use of TEL in the formal context of CME, that
is, those related to accreditation, but has also spread to However, before administrating the questionnaire,
the use of ICT in informal learning processes. Health steps were taken for its validation and so it was piloted
care is regarded as particularly suitable for the adoption by a subset (about 10%) of the entire sample identified
of both educational approaches (Trentin, 2005). (84 LHUs).
Formal training refers to approaches based on a Having made the necessary modifications suggested
precise training programme, with a start and an end, during the validation stage, the questionnaire was then
a direction managed by the training provider and a e-mailed to those responsible for training in the LHU
scaffolding for the trainees made up of tutors, teach- sample. Two weeks later, the ITD personnel contacted
ing materials, the presence of experts/specialists, and (by phone) those who received the questionnaire to of-
so forth. All this is independent of the use of learning fer support in compiling it. At the end of this stage, 61
strategies, whether individual, assisted, collaborative of the 84 LHUs sample had answered and given their
or blended. own data and information.
Informal learning refers instead to those processes
that see the individuals meet their cognitive/professional
needs independently (Coiera & Dowton, 2000), even results
via networked interaction within professional com-
munities of practice aimed at enhancing the sharing of From the survey it emerged that the overall judge-
knowledge and best practices. ment of the LHUs on the use of TEL in CME is fairly
From an initial reconnaissance carried out in the positive. Nevertheless, as those responsible for training
wake of research work and based primarily on what was point out, there is a general feeling that more time is
presented at national conferences, since 2002 there has
743
Technology Enhanced Learning in Continuing Medical Education
needed before the use of these methods become part etc.); 15% to administrative areas (office productivity
of the health care staffs routine. tools; budgeting principles, etc.).
tel delivery
general approaches followed
By the lhus In proposIng and With regard to TEL delivery (Figure 1), 74% of the
usIng tel sample opt for co-sourcing, thereby relying on both
internal and external resources. Out-sourcing (entrust-
The LHUs have been lead to use TEL approaches ing exclusively to authorized external providers) has
mainly to facilitate course attendance for staff distrib- been used for courses by 21% of LHUs and a mere
uted over the territory (74%) and to test the specific 5% preferred to rely on internal resources alone (in-
methodology in CME (70%) in order to both innovate sourcing).
the training activities and to complement/integrate It is estimated in the future that these percentages
classroom education. 31% of LHUs have then stated are unlikely to undergo significant variations given
that they use TEL approaches to also, but not only, the persistent shortage of specialized internal staff in
reduce training costs. the planning and running of TEL activities, and the
In the majority of cases (79%), besides the single consequent, almost compulsory choice of using co-
LHU staff benefiting from the TEL courses, they are sourcing.
also made available for LHUs operating within the
national health service, LHUs belonging to the divided the platforms
Vast Areas (**) making up each Italian region, as well
as for those individual professionals working within With regard to the platforms used to deliver TEL courses
the public services. In particular, it is considered more (Figure 2), 18% of LHUs said they possessed their
suitable to organise a distance training system on a re- own, 4% were in the process of acquiring one, whilst
gional scale rather than on a local scale. For this reason, the remaining 78% opted to rent one.
only 21% of TEL courses are designed exclusively for The most used platforms include Docebo, Tecnema,
staff of a given LHU. Learnet, Weblearning Agatel, Claroline and recently
More than half of the training activities (58%) special interest has been shown towards Moodle.
have drawn on themes related to the specialist areas It is interesting to note how several cases (21%)
of medicine (viral hepatitis, prevention and treatment have already considered using the platform not only to
of decubitus lesions, etc.); 16% to cross disciplinary deliver e-content, but also as a place to initiate learning
areas (e.g., rules and regulations, English language, processes connoted by a high degree of interactivity
Figure 1. Means of TEL delivery Figure 2. Platforms used to deliver TEL courses
5% 4%
18%
21%
74%
78%
744
Technology Enhanced Learning in Continuing Medical Education
among all the actors involved. This is due to a grow- be defined more precisely, breaking away from
ing awareness of the possibilities offered by ICT in the current concept of any educational content T
implementing forms of sharing and interpersonal transmitted via Web;
dialogue, that are applicable not only in the sense of Great care needs to be taken with regard to the
teacher-trainee relationship, but within trainee groups pressure induced by producers of technologies
too. One is therefore turning more and more to the use and to the potential conflict of interests that may
of forum and e-groups as tools capable of managing arise when educational activities are sponsored
actual networked learning groups with the aim of at- by pharmaceutical companies.
taining higher quality levels of TEL activities.
A final note on the use of platforms concerns the Eleven percent of the sample were rather sceptical
need shown by many LHUs (63%) to be integrated regarding the possible improvements that TEL can
with other companies network services in order to contribute to the quality of CME. In their opinion, the
foster continuity and complementarity between training most significant improvements are not related so much
activity and professional practice. to the standard of quality of the training activity than to
the containment of costs and to the facility of content
delivery. From an educational perspective, they con-
opInIons of staff IntervIewed sidered that the TEL approaches deprives the learner of
aBout tel the interpersonal relationship with both their colleagues
and the content experts. Therefore TEL may only be
Eighty-four percent of LHUs interviewed are convinced suitable in a fairly limited number of cases, for training
that TEL has the potential to bring about improve- in technical content such as information technology,
ments in the quality of CME training. In order for this languages, administrative rules and so on.
to actually occur though, certain key conditions have These last considerations seem however to be con-
been highlighted: ditioned by a rather stereotyped view of TEL, probably
still due to a lack of awareness of the wide spectrum of
The option of using TEL approaches must be possible educational approaches associated with it.
the result of a careful analysis of the educational However, it is worth noting that these opinions are
needs of medical staff as well as the necessary somewhat limited, since 95% of LHUs interviewed
background conditions regarding the content, stated their intention in the immediate future of increas-
environment, culture, technology, and so forth, ing the number of training activities delivered in TEL
for it to be actually applied to teaching; format. There are various reasons for this regarding:
It is unadvisable to conduct a training activity
relying entirely on the use of TEL since one The extension of testing to a wider and heteroge-
cannot disregard the importance, if not the ir- neous range of both subjects and potential users
replaceability, of face-to-face interaction; so as to offer TEL activities to all categories of
The TEL system, besides e-content delivery, health care staff interested in CME;
should guarantee the circulation of continuously The implementation of more TEL courses in
updated knowledge by also levering on the activa- blended format;
tion of online professional communities and there- The testing of integration between formal
fore sharing of experiences, opinions, and good and informal TEL, that is, between training
practices inside and outside their company; based on prepackaged training products and
Together with the content delivery, fast and de- new knowledge sharing/development. This is
cisive educational support should be guaranteed; facilitated by the aggregation of internal staff in
hence the need for online tutoring as well as the actual professional communities of practice based
need to train tutors (e-tutors); on networked interactions;
In order for TEL to be considered a valuable The use of TEL to familiarize staff with new
training practice on a par with the more traditional practices and new tools aimed at enhancing
CME training methods, the certification criteria for knowledge-sharing and company problem-solv-
both the content and delivery modalities should
745
Technology Enhanced Learning in Continuing Medical Education
ing processes, that is, improving company per- an ever-increasing trend towards the use of blended
formance; solutions.
A more precise analysis of the return on investment
in applying TEL approaches, an analysis based The Availability of Qualified Tutors
chiefly on the evaluation of intangible returns.
For example, these may include the capacity As illustrated by the previous point, the LHUs clearly
to provide for their own continuous education tend to adopt TEL approaches that include distance
autonomously and, as already mentioned, the assistance for users. The logical consequence is that
enhancement of peer-to-peer learning processes almost all (95%) distance/blended training activities
as well as knowledge-sharing and company delivered by the LHUs envisage the availability of tu-
problem-solving processes. tors, with different functions due to the different TEL
approach adopted (individual, assisted, collaborative,
or blended).
characterIstIcs of tel courses In this regard, another interesting fact is that the
already realIzed or planned LHUs have overall provided for a specific training
of 88% of all tutors involved in the support of TEL
The survey has reported that 41% of TEL activities activities.
(Figure 3) have been delivered using educational ma- During the delivery stage, the tutors have mainly
terials (e-content) with the assistance of tutors/trainers acted in assisting trainees in the use of e-content and TEL
made available by the provider. 23% used a virtual platform, in supervising exercises, in administrating as-
asynchronous class to arrange distance tutored learning sessment tests and in moderating online activities within
groups, while 21% used blended (online/onsite) solu- virtual asynchronous and synchronous classes.
tions. 10% used teleconferencing to deliver distance Hardly ever were tutors also required to provide
lessons and discussion groups in real time, and lastly content support and experts generally assumed this
5% relied on self-study (using structured educational role involved in providing the course.
materials without any kind of educational support).
In blended approaches, in particular, the distance learning evaluation
stages favoured a virtual asynchronous class (62% of
cases), followed by an assisted learning (23%) and Since TEL can exploit the specific characteristics of
lastly by self-study (15%). It is worth noting how in more technological media and more ways of supervising
future prospective the LHUs reckon that there will be the training activity, in principle it has a wider range of
5%
10%
as s is ted learning
41% c ollaborative learning
23%
746
Technology Enhanced Learning in Continuing Medical Education
possibilities for supervising the monitoring of distance the learning group (Wiecha & Barrie, 2002) during
activities and learning evaluation. which participants had a way of meeting and compar- T
Nevertheless, what actually emerges from the sur- ing their knowledge on specific professional themes,
veyand is cause for concernis that in almost all thereby providing the basis for their next participation
training activities (98%) the questionnaire has been used in online professional collaboration.
with priority in learning evaluation. The exclusive use
of this questionnaire is indeed rather restrictive since
the preset answers do not lend themselves very well to dIscussIon and conclusIon
drawing an accurate picture of the target level of some
types of knowledge and competence (Trentin, 1997). As indicated by the survey, the CME sector shows
To a much lesser degree, one resorts to practical considerable interest in TEL methods. Unlike other
tests (6%), to the development of project work (3%) companiescontexts, there is not only organizational and
and in just 2% of courses to evaluating the contents of financial interest, but there are also questions involving
networked interactions (reading messages produced by the quality sphere of the educational processes.
participants in their online learning group). The purpose This is a positive attitude not merely based on
is to discover exactly what and which particular skills observing what occurred in view of the introduction
they have developed in relation to the preset training of TEL but also on further untested potentials of the
objectives. very approaches.
Consequently, the majority of LHUs interviewed
have included a widening of the TEL offer in their future
formal and Informal learnIng programmes in order to increasingly diffuse its use and
to extend it to those professional profiles for which no
One particularly interesting aspect emerging from the specific courses have yet been developed to date.
survey regards the evolutionary trend of TEL systems The CME context, like many other educational
in health care. This is just what is predicted, in the contexts, entertains great expectations for the educa-
medium-long term, by the LHUs with the most experi- tional use of ICT. In view of this, there is however the
ence in the educational use of ICT. awareness of a persisting wide range of critical issues
In the vision of these LHUs, once through the first that interposes between the innovators enthusiasm and
stage of cultural growth towards TEL approaches the actual extensive use of TEL approaches.
(on the part of both providers and users), it is then These critical issues range from the diverse cultural
necessary to proceed towards integrating formal and levels of the workers (doctors, paramedics, administra-
informal learning formats. In other words, according tion), to the poor computer literacy of some of these
to those interviewed, it is necessary to make sure that categories, to the lack of suitable skills in LHUs to run
formal educational events (based on TEL approaches a training programme centred on TEL (from planning to
but not only) are not an end in themselves. Instead, they delivery). Other critical issues are related to the difficul-
should become the springboard for self-run continuous ties often met in quantifying the number of ECM credits
education processes even by participating in online for attending TEL activities, the (poor) quality level
professional communities. of the courses, and the costs to readapt some training
Therefore, what is proposed is a TEL strongly in- packages to a specific LHU needs. Furthermore, there
tegrated with processes (spontaneous and/or induced) is the difficulty in finding consultants and companies
of knowledge management and sharing. for the out-sourcing for the whole or some of the ser-
In confirmation of this trend, the survey showed vice, the difficulty in finding sponsor-free courses, and
that there are already online professional communi- finally the inadequacy of evaluation systems.
ties in 22% of LHUs. It is interesting to note how they All these critical issues can potentially prevent TEL
initiated: in 60% of cases, they were promoted by the from becoming an integral part of CME practices.
same LHUs and in 20% of cases; they aggregated However this is not a reason for despondency but
spontaneously (generally according to the specific should be a spur to raise a greater awareness of the
professional problems). In the remaining 20% of cases, pros and cons of adopting the method. Only in this way
the community incubator was a TEL course based on will it be possible to acquire the appropriate skills to
747
Technology Enhanced Learning in Continuing Medical Education
carefully and consciously examine the offers coming service, is divided into 3 vast areas: North-West,
more and more by the day from technology producers Centre and South-East.
and commercial sponsors.
The research conducted by ITD has been the first
real opportunity, on a national level, to highlight and references
analyse these problem areas so that the best solutions
could be found to mitigate them gradually. Coiera, E. & Dowton, S. B. (2000). Re-inventing our-
A further key element springing from the research selves. How innovations such as on-line just-in-time
is the developing awareness, especially of the LHUs CME may help bring about a genuinely evidence-based
with more experience in the educational use of ICT, clinical practice. Medical Journal of Australia, 173,
of being able to effectively blend formal and informal 343-344.
learning processes via TEL. The most used strategy is
to create, within a formal course, the best conditions to Curran, V. R., Hoekman, T., Gulliver, W., Landells, I.,
then develop informal learning processes. These may & Hatcher, L. (2000). Web-based continuing medical
be based both on the autonomy of each individual to education: Evaluation study of computer mediated
access knowledge sources and on their participation in continuing medical education. Journal of Continuing
online communities of practice where they can share Education in the Health Profession, 20, 106-119.
knowledge and best professional practices. Letterie, G. S. (2003). Medical education as a science:
To foster such processes, it is necessary to mix meth- The quality of evidence for computer-assisted instruc-
odological approaches and technological environments tion. American Journal of Obstetrics and Gynecology,
according to the specific situation that can provide the 188, 84953.
opportunity to personalise learning and implement it
following the specific organizational/company view. Manning, P. R. & DeBakey, L. (2001). Continuing
The quality of TEL systems under these conditions medical education: The paradigm is changing. Journal
will be increasingly measured in terms of its capacity of Continuing Education in the Health Profession,
to adapt to the requirements of the user, by offering a 21(1), 46-54.
multitude of resources and services, including those Ruiz, J. G., Mintzer, M. J., & Leipzig, R. M. (2006). The
distributed on a local level, and not necessarily devel- impact of e-learning in medical education. Academic
oped for the specific TEL process. Medicine, 81(3), 207-212.
Furthermore, the quality of TEL systems will also be
evaluated in terms of the education of the users both in Slotte, V., Wangel, M., & Lonka, K. (2001). Information
the individual use of TEL resources/services and in the technology in medical education: A nationwide project
capacity to become independentonce the formal on the opportunities of the new technology. Medical
learning process is overin providing for their own Education, 35, 990-995.
personal continuous education in their professional TEL Committee, University of Texas (2004). Report
content area. of technology enhanced learning committee. Retrieved
March 16, 2008, from http://www.utexas.edu/provost/
planning/reports/TEL_Report_2004.pdf
notes
Trentin, G. (1997). Computerized adaptive tests and
* The LHUs are public bodies with autonomy in formative assessment. International Journal of Educa-
technical, administrative management which tional Multimedia and Hypermedia, 6(2), 201-220.
organize health assistance in their own territory Trentin, G. (2005). From formal to informal e-
and provide it through public or accredited private learning through knowledge management and sharing.
organisations. Journal of e-Learning and Knowledge Society, 1(2),
** A group of territorial districts, each falling under 209-217.
the competence of a specific LHU, belonging to
a geographical subarea that divides an Italian re- Wiecha, J. & Barrie, N. (2002). Collaborative online
gion. For example, Tuscany, as regards the health learning: A new approach to distance CME. Academin
Medicine, 77, 928929.
748
Technology Enhanced Learning in Continuing Medical Education
Wutoh, R., Boren, S. A., & Balas, E. A. (2004). E- Collaborative Learning: A learning process based
learning: A review of internet-based continuing medi- on both the individual study and the strong interaction T
cal education. Journal of Continuing Education in the among all the players in the process (trainees, tutors,
Health Profession, 24(1), 20-30. experts), organized into actual networked learning
groups.
Wyatt, J. C. (2000). Keeping up: Continuing education
or lifelong learning? Journal of the Royal Society of Formal Training: Refers to approaches based on
Medicine, 93, 369-72. a precise training programme, with a start and an end,
a direction managed by the training provider and a
scaffolding for the trainees made up of tutors, teach-
key terms ing materials, the presence of experts/specialists, and
so forth.
Assisted Learning: A learning process based on Individual Learning: A learning process based
both the individual study of educational materials and on the autonomous study of learning materials struc-
the guidance on the subject-matter by the tutor/trainer, tured, tailored and developed explicitly to be used for
who sometimes runs events such as networked work- self-study.
shops/seminars on course themes.
Informal Learning: Refers to those processes
Blended Solution: Consists of an integration of that see the individuals meet their cognitive/profes-
classroom and distance learning activities, where in- sional needs independently, even via networked
dividuals at a distance are supervised by using one (or interaction within professional communities of practice
more) online approaches (individual learning, assisted aimed at enhancing the sharing of knowledge and best
learning, collaborative learning). practices.
CME (Continuing Medical Education): CME TEL (Technology Enhanced Learning): Technol-
consists of educational activities that serve to main- ogy Enhanced Learning is referred to the use of ICT
tain, develop, or increase the knowledge, skills, and to maximize learning within an environment of sound
professional performance and relationships a physician course design that can offer students the options of
uses to provide services for patients, the public, or the time, place, and pace and emphasizes different learn-
profession. CME represents that body of knowledge ing styles.
and skills generally recognized and accepted by the
profession as within the basic medical sciences, the
discipline of clinical medicine, and the provision of
health care to the public.
749
750 Section: Context ICT
Exhibit 1.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Theories and Principles for E-Learning Practices with Instructional Design
of the most appropriate learning methods, taking into An ID theory therefore defines not only the methods,
consideration the conditions-of-learning and the dif- but also the situations, while identifying the aspects of T
ferent learning methodologies. And yet this sector the context that influences the choice of the method. In
was often confused with other fields, thus generating any learning situation, the most important aspects can
ambiguity and misunderstanding. Recently, Reigeluth be put into two macrocategories which are the learning
(1999) elaborated a deep study on ID with the purpose to conditions and the desired results. Among the first to
clarify its specific field and focus on the epistemological be considered are: the nature of that which must be
nature of ID theories. Broadly speaking, an ID theory learnt (e.g., understanding concepts is different from
provides more or less general indications on how to developing abilities), the characteristics of the students
facilitate learning and cognitive, emotional, social and (e.g., their previous knowledge, their learning strategies,
physical development of people. But how should the their motivations), the characteristics of the learning
term theory be interpreted, and what does an ID theory environment (e.g., the activities could be carried out at
consist of, compared to other theoretical fields? home, or in a class of 20 students, or in small groups at
First of all an ID theory is design-oriented, that is, it workplaces, etc.), and the organizational and economic
focuses on how to achieve learning results. It therefore constraints. All these conditions can affect the choice of
has a prescriptive nature, and does not involve the de- the most favorable methods for achieving the desired
scription of cause-effect relations between events, but results. They must not be confused, however, with
indicates how to obtain specific results. An ID theory the conditions-of-learning of Gagn, even when the
is not true or false, but involves a choice between pos- internal conditions coincide with the category, stu-
sible preferable ways of intervening, and thus satisfies dent characteristics, while the external conditions are
preferability criteria rather than that of validity. methods of learning and not conditions of learning. The
There is a tendency to identify ID with the area of desired results are the levels of effectiveness, efficiency
learning theories. Obviously the relationship between (costs/time) and appeal (attraction for the student) with
these fields is very close since the learning theories have which one hopes to reach learning objectives.
the fundamental role of explaining why an ID theory The situation is therefore defined in a rather com-
works or not. However, an ID theory involves the defin- plex way and the intervening factors are multiple. This
ing of the methods that facilitate learning and indicates entails another characteristic of the ID methods, that
the situations in which their use is preferable. is, they always possess a probabilistic nature. It means
The methods have a situational nature and not a that an ID method does not guarantee that the appli-
universal one, meaning that they work in certain situa- cation of an appropriate method in a certain situation
tions and not in others. The situation affects the choice will deterministically lead to the desired results, but
of methods and influences their applicability.
I. d.t.
sItuatIons methods
751
Theories and Principles for E-Learning Practices with Instructional Design
does indicate a good degree of probability in a given rather the activation of those mental models that can
situation, that the method will work. be modified in order to allow students to integrate new
Briefly, an ID theory identifies the adequate methods, knowledge with the existing one.
so that, given certain learning conditions, learning results The best example for activation is that of the ad-
to be effective, efficient and appealing (Figure 1). vanced organizers of Ausubel (1960, 1963).
Currently there are two main approaches occurring
in this field. The first is more traditional and is usually Demonstration. Learning is facilitated when, what
indicated as instructivist. The second prefers alterna- must be learned is demonstrated instead of just receiving
tive expressions like learning communities rather than information about it. Knowledge is often represented
instruction and leans towards constructivism. at a too general level rather than through examples.
In the second part of the chapter, we shall focus It would be more opportune instead, if examples and
on these two different approaches, examining the ID counterexamples were furnished for concepts, demon-
principles developed in the traditional approach and the strations held for procedures, and visualization done for
most recent evolutions of ID due to constructivism. processes and modelling of behaviour. Demonstrations
entail a guide that helps the student to select the relevant
information, the offer of the multiple representations
do fIrst prIncIples of of knowledge and also the comparison among multiple
InstructIon exIst? examples.
Merrill (2001), an advocate of the instructivist approach Application. Learning is facilitated when the stu-
(Merrill, Drake, Lacy, Pratt, & ID2 Research Group, dent is given the opportunity to practise and apply
1996), claims the right of ID to develop general prin- new knowledge or abilities in the solution of a vari-
ciples in order to design instruction. According to Mer- ety of problems. It is necessary obviously to provide
rill, in comparing existing instructional models, it can adequate support (coaching) and feedback during the
be gathered that there are five instructional dimensions performance.
occurring in a transversal way: problems, activation,
demonstration, application, and integration. What do Integration. Learning is facilitated when students
such principles prescribe? are encouraged to apply the new knowledge/abilities
in real life, are given the opportunity to demonstrate
Problem. Learning is facilitated when the students their own new knowledge/ability, and are able to reflect,
concentrate on the solution of authentic problems. This discuss and defend their new knowledge. Integration
principle is followed by resulting corollaries, that is, has positive effects on motivation. If the students have
learning is facilitated: (1) when students are shown the the opportunity to demonstrate their own progress, their
task to achieve or the problem to resolve at the end of motivation increases.
the course, rather than focusing on abstract learning
objectives; (2) if the students are engaged in achieving
a task or resolving a problem and not at the level of InstructIonal desIgn and
simple action or application of procedures; and (3) when constructIvIsm
the student solves more problems arranged in order of
growing complexity for the gradual and progressive During the last 20 years, studies in cognitive science
development of skills. and psycho-pedagogy have led to a meaningful change
in the definition of learning. Three main research paths
Activation. Learning is facilitated when pre-existing have been developed which, though similar, emphasize
knowledge is activated as foundation for new knowl- different aspects (Striano, 1999). These main perspec-
edge. It is surprising, Merrill observes, how often we tives consist of: (1) a constructivist approach which
pass on immediately to presenting new information in recovers the piagetian work, and interprets learning
very abstract forms, without first having prepared the as an adaptive process in which the learner plays an
ground for them to be understood. Activation implies active role of construction/de-construction of structure
much more than testing previous knowledge; it is and knowledge strategies; (2) a historical-cultural ap-
752
Theories and Principles for E-Learning Practices with Instructional Design
proach referring to Vygotskij and interpreting learning Emphasis on social meaning negotiation and
as a mediated experience and as a socially shared and cooperative learning. T
culturally constructed process; and (3) a contextual
approach which emphasizes the ecological attitude of We now focus on two models arising from the Vy-
learning processes (Striano, 1999). gotskjian tradition, that is, the community of learners
Therefore, new currents have emerged in the ID (Brown & Campione, 1990) and the Community of
field as constructivist instructional design (Dick, 1991; Practice (Lave & Wenger, 1991). What defines a learn-
Jonassen, 1994; Savery & Duffy, 1995; Wilson, 1996), ing community is the existence of a culture of learning
which share the perspectives developed on the psycho- in which each person is committed in a collective ef-
pedagogical level. fort of meaning comprehension (Collins & Bielaczyc,
The instructional models which are oriented to- 1999). The four specific factors that characterize such
wards constructivism, put the emphasis on the concept a culture are:
of learning environment. This is defined as a place
where learners may work together and support each The diversity of expertise among the community
other as they use a variety of tools and information members
resources in their guided pursuit of learning goals The shared objective to contribute to the continu-
and problem-solving activities (Wilson, 1996, p. 5). ous growth of expertise and collective knowl-
The idea is to set up around learners, multiple supports edge
and resources available for their cognitive progress. The emphasis on learning how to learn
This concept is derived from the Vygotskijan theory The setting-up of methods and tools for sharing
of zone of proximal development. The latter indicates what is learned.
a set of potentialities that the individual can develop,
if adequately helped. In order to promote learning a A learning community can also be considered as a
varied environment consisting of learning resources, social device oriented towards favoring collaborative
techniques, and interpersonal activities must be con- learning. It is characterised by members joining spon-
structed around learners, so that each student can find taneously and deep emotional relationships. A learning
the suitable atmosphere and the most appropriate community cannot be designed in a strict sense, but is
strongholds to make progress. at most, favored or cultivated. More analytically,
Other authors provide further interpretations. Ac- according to Collins and Bielaczyc (1999), the issues to
cording to Collins (1996), a learning environment be addressed in order to promote a learning community
should offer multiple representations of reality, avoid can be analysed within eight dimensions:
simplifications representing the natural complexity
of the real world, focus attention on the building of 1. The scope of the community: It is that of pro-
knowledge and not of its transmission and reproduc- moting a culture of learning, in which both the
tion, offer opportunities for learning based on real individuals and the community considered as a
world situations rather than on predefined instructional whole, learn how to learn. The members of the
units, nourish reflective practices, allow the building community share their efforts to reach a deeper
up of knowledge according to context and favor the understanding of what they are learning. The
cooperative construction of knowledge through social students learn to consider multiple perspectives
negotiation. Briefly, a constructivist learning environ- to solve problems, and to use each others knowl-
ment is characterized by the following aspects: edge and expertise as a resource to collaboratively
solve problems.
Focus on knowledge construction rather than 2. Learning activities: The activities of a learn-
knowledge transmission; ing community aim at: (a) promoting individual
Focus on context rather than abstraction thus development and collaborative construction of
presenting authentic tasks based on real cases; knowledge; (b) favoring the sharing of knowl-
Multiple and complex perspectives on reality edge and abilities; and (c) making the process of
which stimulate metacognitive attitudes; learning visible and well structured.
753
Theories and Principles for E-Learning Practices with Instructional Design
A learning community is typically involved in research. In this process the students help each
learning activities, such as individual and group other.
research, discussions, peer tutoring and learning, 7. Expertise: In learning communities both indi-
collaboration in artefacts production intended to vidual and collective expertise are emphasized.
make visible what students learn, and collabora- Subjects that focus on principles and ideas that
tive problem solving based on shared objectives. can generate wider and deeper comprehension of
Brown and Campione (1996) suggest that learn- the themes themselves, are preferred. A growth in
ing community activities are distinguished by the community knowledge also occurs when the
two aspects, that is, interdependent actions and discussions on what the members have learned
interconnected objectives. lead them to seek other knowledge to be shared
3. The changing role of the teacher and trans- within the community. Therefore there exists an
formation of the educational relationship: In a inter-relationship between personal growth and
learning community the teacher assumes the role that of the group.
of organiser and facilitator. The student becomes 8. Products: In a learning community the members
responsible for his/her own learning and that of collaborate to produce artefacts that can be used
the others. by the community to understand other themes or
4. Centrality/peripheral and identity: The problems.
members identity is defined by the central or
peripheral role he plays in the community and by As regards communities of practice (CoP), they
the respect he receives from the other members are defined by Lave and Wenger (1991) as groups of
of the community (Lave & Wenger, 1991). In a persons sharing an interest and regularly interacting
learning community the central roles are those to learn how to perform better. They are distinguished
that contribute more directly to collective ac- by three crucial features: identity that is defined on the
tivities and to community knowledge. There are, strength of a shared interest, belonging to a community
however, opportunities for all and the participants wherein the members help each other, and the sharing
who assume peripheral roles are evaluated for of practices. A CoP shares a program of resources, ex-
their contributions. The centrality and peripheral periences, stories, tools, ways of problem resolutions,
aspects depend on the context. Individual identity and in short, a program of practices.
is constructed through participation. Therefore the
community identity emerges by working towards
a common goal. It makes collective awareness InstructIonal desIgn and
grow, and favours the skipping of peripheral e-learnIng practIce
positions to favor centrality.
5. Resources: In a learning community the knowl- We have just examined the two main current perspec-
edge acquired and the learning processes enriched tives in ID field. How can they offer methodological
by external sources are shared between the mem- insight for e-learning design?
bers and become part of collective knowledge. As an example, let us consider the following case,
6. Speech: In learning communities language used that is, the methodological structure of a master on
to communicate ideas and practices emerge in e-learning designing and managing delivered at the
the community through the interaction with the University of Florence since 2001. The master lasts one
various sources of knowledge and the cobuilding year (including a period of internship and one month
and negotiation of meaning between the members. reserved for the final dissertation) and provides blended
The learning communities construct a common learning, including f2f meetings and online activities
language through which they express learning supported by a virtual learning environment.
processes, plans, aims and assumptions. Speech Briefly, the overall instructional model which
assumes the function of a medium for the exchange characterises the master is based on the following
of ideas; promoting moreover, the motivations of principles inspired by both Merrills Principles and
research and reflection, and arousing new ques- learning community theory:
tions and hypotheses that give rise to ulterior
754
Theories and Principles for E-Learning Practices with Instructional Design
755
Theories and Principles for E-Learning Practices with Instructional Design
Exhibit 2.
E-tutor
Monday
ONLINE WORK
The e-tutor presents the
subjects and the themes
that will be examined and
discussed during the week.
PROBLEM He also introduces the subject
matter experts (SME).
At the same time, he provides
documents and learning
materials on the subject
area, and focuses on the
fundamental questions that
will be addressed in face-to-
face event.
Students
Monday SME
Tuesday
ONLINE WORK ONLINE
Wednesday
Students achieve their SUPPORT
tasks autonomously During this period
or in small groups the SME may
supported by a Web interact if needed
ACTIVATION forum. They must with students
identify problems giving support
and issues emerging and hints on the
Thursday from the provided subject area.
learning materials He therefore
and documents. intervenes in
Eventually they the Web forum
realize a concept map collaborating with
or a final report on the e-tutor.
FACE-TO-FACE
WORK*
During the face-
Before the face-to-face to-face event, the
event, the e-tutor summarizes SME discusses the
Fryday
students reports and submits issues identified
(afternoon)
DEMONSTRATION the final report to the SME by the students
and Suterday
so that he can arrange the giving feedback
(morning)
face-to-face lecture on the and adding new
emerged issues. information and
examples on the
subject area.
756
Theories and Principles for E-Learning Practices with Instructional Design
Exhibit 2. continued
T
FACE-TO-FACE
WORK*
Students will realize
personal works taking
FACE-TO-FACE WORK *
into consideration the
The e-tutor gives ulterior
information and the
information on the
Suterday suggestions provided
DEMONSTRATION discussed themes, and
(afternoon) by the SME and
organises possible in-depth
supported by the e-
examinations if needed.
tutor . The personal
works will be inserted
into the student
portfolio.
* Students who cannot be present to the face-to-face event, may participate and interact with the SME and other students
through a videoconferencing system.
perspectives on the design of technology-supported Merrill, M. D., Drake, L., Lacy, M. J., Pratt, J. A., &
learning environments (pp. 347-361). Hillsdale, NJ: ID2 Research Group (1996). Reclaiming instructional
Lawrence Erlbaum Associates. design. Educational Technology, 36, 5, 5-7.
Collins, A. & Bielaczyc, K. (1999). Learning communi- Merrill, D. (2001). First principles of instruction.
ties in classroom: A reconceptualization of educational Retrieved March 13, 2008, from www.id2.usu.edu/
practice. In C. M. Reigeluth (Ed.), Instructional design Papers/5FirstPrinciples.PDF
theories and models: A new paradigm of instructional
Reigeluth, C. M. (Ed.) (1999). Instructional design
design (Vol. II, pp. 269-292). Mahwah, NJ: Lawrence
theories and models: A new paradigm of instructional
Erlbaum Associates.
design. Mahwah, NJ: Lawrence Erlbaum Associates.
Dick, W. (1991). An instructional designers view of
Savery, J. R. & Duffy, T. M. (1995). Problem based
constructivism. Educational Technology, 31, 5, 41-
learning: An instructional model and its constructivist
53.
framework. Educational Technology, 35, 5, 31-38.
Dijkstra, S., Seel, N., Schott, F., & Tennyson, R. D. (Eds.)
Striano, M. (1999). I tempi e i luoghi dellapprendere.
(1997). Instructional design. International perspective
Processi di apprendimento e contesti di formazione.
(Vol. 2). London: Lawrence Erlbaum Associates.
Napoli: Liguori Editore.
Gagn, R. (1985). The conditions of learning (4th ed.).
Wilson, B. & Cole, P. (1991). A review of cognitive
New York: Holt, Rinehart & Winston.
teaching models. ETR&D, 39, 4, 47-64.
Gagn, R. M. & Briggs, L. J. (1974). Principles of
Wilson, B. (1996). Constructivist learning environ-
instructions design. New York: Holt Rinehart & Win-
ments. Case studies in instructional design. Englewood
ston.
Cliffs, NJ: Educational Technology Publications.
Jonassen, D. H. (1994). Thinking technology, toward
a constructivistic design model. Educational Technol-
ogy, 34, April, 34-37. key terms
Lave, J. & Wenger, E. (1991). Situated learning, legiti-
mate peripheral participation. New York: Cambridge Constructivism: Epistemological theory accord-
University Press. ing to which individuals construct knowledge through
active experience. It emphasizes that knowledge is a
757
Theories and Principles for E-Learning Practices with Instructional Design
social product, historically and culturally situated, and essential characteristics to define a learning commu-
which is negotiated, constructed and learned by the nity are: (1) diversity of expertise among its members,
members of a community. who are valued for their contributions and are given
support to develop; (2) a shared objective of continu-
E-Learning: A Neologism created at the start of
ally advancing collective knowledge and skills; (3) an
the 2000s to indicate a set of methodologies aimed at
emphasis on learning how to learn; and 4) mechanisms
using the ICTs in order to provide learners with learning
for sharing what is learned (p. 272).
resources and interactions free from temporal and spatial
constraints. Three main solutions can be distinguished: Learning Environment: A definition currently
content + support, wrap around, and integrated model. accepted in literature is a place where learners may
These three structures are respectively based on content, work together and support each other as they use a
teachers support for activities between peers and the variety of tools and information resources in their
Internet, and the collaborative learning group. guided pursuit of learning goals and problem-solving
activities (Wilson, 1996, p. 5).
Instructional Design: Is the sector which has to
do, on international levels, with the study of criteria Zone of Proximal Development (ZPD): The ZPD
and instructional models applicable to diverse contexts, theory goes back to the work of social psychologist Vy-
in such a way that learning has a greater possibility of gotskij, according to which social interaction is critical
becoming effective, efficient, and appealing. to learning. He considers the learning process as continu-
ously moving from an actual development level to a
Learning Community: It is a notion that received
potential development level. The movement between
a great attention in last years by educational scholars.
these two levels, where the ZPD lies, occurs through
According to Bielaczyc and Collins (1999) the four
the interaction of an expert and a novice.
758
Section: Process ICT 759
John A. Clarke
Queensland University of Technology, Australia
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Towards a Framework for Evaluating ICT-Based Materials
USER
DESIGN EVALUATION
EVALUATION
IMPACT
EVALUATION
When these three phases of the product development student learning (p. 4). The criteria provide the broad
cycle are considered, any framework that proposes framework for the design and development of ... online
to evaluate LOs will need to incorporate criteria for content (Atkins & Jones, 2004, p. 2). The criteria,
judging them at each phase. These evaluation foci are which have received international recognition (Haughey
referred to here as: & Muirhead, n.d) and are metatagged to Australian
school curricula, are underpinned by the four principles
Design evaluation of learner focus, integrity, usability, and accessibility.
User evaluation These principles, all of which articulate with the notion
Impact evaluation of engagement, are defined and discussed in detail in
TLF (2002) but are summarised below.
These foci provide the beginnings of a framework
for evaluating ICT-based materials as summarised in learner focus
Figure 1.
Before dealing with each of these foci and the crite- This will be achieved by designing a LO that:
ria associated with them, it is necessary to discuss the
pedagogical principles underpinning the framework Reflects the relevant learner profiles based on
that guide the educational soundness of the design, intended users (e.g., age and stages of schooling;
use, and impact of ICT-based materials. socio-economic status) and enables learners to
interact with, organise, represent, interpret, and
manage the process of learning and the informa-
pedagogIcal prIncIples tion flow (e.g., making choices and decisions,
facIlItatIng student engagement inquiring, investigating, and problem solving)
Makes explicit and consolidates the process of
A recent comprehensive list of criteria with a specific learning (e.g., structuring informational content
focus on how online curriculum materials may facilitate in order to scaffold student learning)
the engagement of students has been generated by The Contextualises student learning (e.g., establishing
Le@rning Federation (TLF).2 The criteria are designed connections with prior and likely future learning;
to provide specifications for the educational soundness supporting communication, activity, and collab-
of online curriculum materials (TLF, 2002) where orative action, both online and off-line)
educational soundness is defined as the capacity Maintains learner focus through the interaction
of online curriculum content to successfully promote between users and the learning content (e.g.,
760
Towards a Framework for Evaluating ICT-Based Materials
content assemblage, generation, conversion, and Provides specific language support for students
publishing) whose first language is not English T
Is appealing to and inclusive of students of all
Integrity genders, socioeconomic groups, ages, races, and
cultures
This will be achieved by designing a LO that:
The application of these criteria to design, use, and
Accurately represents the ways of knowing and impact evaluation is now discussed.
conceptualising of the content domain
Uses the language and symbols of the content
domain and its ways of representation and sup- desIgn evaluatIon
ports students in developing and using them
Presents controversial issues with balance and Based on these criteria, TLF has developed a detailed
fairness and in accordance with mandated cur- iterative process for evaluating LO prototypes to pro-
riculum policies, where these apply vide feedback into the design and development phase,
Supports studentsdeepening of knowledge within which they call an in school evaluation (ISE). The ISE
the content domain process is built around cognitive task analysis method-
Assists the learner with identifying and differ- ology (Hall, Gott, & Pokorny, 1995), which involves
entiating between different points of view and a very detailed and close scrutiny of each screen and
perspectives presented is linked to individual students learning profiles. The
Incorporates content area advice supplied by ISE is carried out with a sample representative of the
expert representatives from relevant domains and intended audience, in this case, primary and second-
practice areas. ary school students, and focuses on technical issues
such as the aesthetics of the design, the interaction,
usability the navigational processes, the links between screens,
the challenging nature of the tasks, and the language
This will be achieved by designing a LO in which: difficulty and understanding of meaning. The ISE fo-
cuses on evaluating the design specifications and has
The purpose, process, and intended outcomes of the ultimate purpose of determining the potential of the
the learning are explicit proposed learning design to support the targeted users
Learning and information design is intuitive (i.e., in achieving the learning objectives and outcomes.
the user knows what to do and how to do it)
The time and effort needed to use it is reason-
able user evaluatIon
The media is exploited to maximise the op-
portunities for learners to achieve the learning The evaluation of ICT-based learning materials often
outcomes ends after the design and development stage when
Content is constructed in manageable and mean- the LOs are put out to the market. However, the user
ingful concept chunks to facilitate learning. uptake depends not only on the educational soundness
of the LOs but also on the capacity of the end users to
accessibility engage with them. Quantitative criteria such as number
of teachers choosing to use the LO and the frequency of
Online content will be accessible when it: use are good indicators of user uptake. Further, how the
LOs are being used will provide authentic feedback and
Complies with accessibility standards for students also evaluate in a realistic manner some of the macro
with disabilities and for rural and remote com- issues of equity and utility identified in the education
munities soundness criteria. Such evaluation supplements the
Utilises the capacity of multimedia to support ISE feedback and adds to the appreciation of the full
student acquisition of standard Australian English potential of the LO to be integrated into everyday
or standard New Zealand English classroom learning activities and to engage students.
761
Towards a Framework for Evaluating ICT-Based Materials
LOs are instructional artefacts which can be inte- Prestructural: Incompetence; nothing is known
grated into classroom learning activities in a variety about the area of knowledge
of ways. However, there is very little research to date Unistructural: One relevant aspect is known but
investigating this aspect of ICT-based learning ma- there is no relationship of facts or ideas
terials, although recently, there has been recognition Multistructural: Several relevant independent
of this hiatus with the beginnings of the exploration aspects are known but are not interrelated
of the professional competencies that teachers use to Relational: Several aspects of knowledge are
engage with and develop innovate learning activities integrated into a structure that has coherence and
using ICT-based materials (Atkins & OConner, 2005; meaning
Muirhead & Haughey, 2005). The outcomes of using Extended abstract: That coherent whole is gen-
learning objects rely not just on the intrinsic properties eralised to a new domain/topic area to a higher
of the learning objects but on the teaching and learning level of abstraction
processes adopted in the classroom (Freebody, 2006,
p. 21). How the teacher interprets and integrates the The levels are ordered in terms of characteristics
LOs into the teaching-learning situation needs to be such as from concrete to abstract, an increasing number
evaluated. of organising dimensions, increasing consistency and
the use of organising or relating principles and can
be considered as criteria for evaluating the quality of
Impact evaluatIon student learning outcomes. There are two general ap-
proaches to this. The first approach is to analyse existing
Perhaps the ultimate test for the large investment in outcomes. It has been used in poetry, history, mathemat-
the development and deployment of ICT-based learn- ics, science, economics, chemistry, geography (Hattie
ing materials is the impact they have on learnersthe & Purdie, 1998), and, more recently, in the evaluation
quality of the learning outcomes. A number of evalu- of student-developed Web pages in English and history
ation criteria have been developed as indicators of the (Kimber, Pillay, & Richards, in press). Extending the
quality of learning outcomes (Nesbit, Belfer, & Leacock, work of Kimber et al. offers the exciting development
n.d.; also see www.merlot.org). Typical of these are of challenging students to identify a problem and to
relatively simple tracking of such aspects as attention create a solution. Similar strategies are being explored
given to the buttons, menus, text, and types of user- by TLF (S. Atkins, Director of TLF Online Initiatives,
object navigation. The approach used here, consistent personal communication, February 24, 2006) where
with the complexity of the student engagement notion students become designers (Murphy, Harvell,
central to the effectiveness of LOs, is to go beyond that Sanders, & Epps, 1999). The range of content areas is
to evaluate the quality of the knowledge acquired by testament to the robust applicability of the taxonomy.
learners. To do this requires the melding of structural The second approach is to construct test items reflecting
and design characteristics with qualitatively different the levels.1 This can be done using traditional test item
conceptions of respective discipline knowledge and construction procedures (Biggs, Holbrook, Ki, Lam,
thinking. Li, Pong, & Stimpson, 1989) or, in the context of an
There are a plethora of taxonomies that reflect LO, repurposing the LO to assess learning (Atkins
the complexity of thinking (Anderson, 2001; Linn & & OConnor, 2005).
Miller, 2005), but the structure of observed learning
outcomes (SOLO) taxonomy (Biggs & Collis, 1982)
offers a vehicle against which the students structural proposIng an Integrated
and functional aspects of knowledge may be matched. framework
Its superiority to other taxonomies as an indicator of
student learning outcomes has been cogently argued By combining the design evaluation, user evaluation,
by Hattie and Purdie (1998). It provides a means of and impact evaluation criteria, it is possible to provide
evaluating the complexity of thinking facilitated by an inclusive framework for the comprehensive evalu-
the LO by classifying it as either: ation of ICT-based materials. By integrating the TLF
criteria with an evaluation of the level of knowledge
762
Towards a Framework for Evaluating ICT-Based Materials
The criteria focus on such aspects as learner focus, integrity, usability and accessibility
Related to the quality of the Related to factors Related to the quality of the
educational soundness of the influencing the uptake and learning outcomes of the
design of the material. The utilisation of the artefacts. students. The criteria focus on
criteria focus on technical The criteria focus on aspects the complexity of thinking
aspects such as aesthetics of the such as quantitative indices ranging from isolated and
design, the navigational of use and the variety, concrete to integrated,
processes and the links between quality and innovativeness complex and abstract.
screens. of applications.
demanded by the LO, and by evaluating the degree and There is significant evidence relating to the reluctance
quality of uptake, it is possible to produce a set of evalu- of teachers to take on new technologies (Russell, Lucas,
ation criteria that is multidimensionally comprehensive & McRobbie, 2003; Syverson & Slatin, 1995). For there
and addresses the complexity of student engagement. to be any chance of successfully integrating ICT-based
This framework for evaluating ICT-based materials is materials into mainstream classroom learning, there
summarised in Figure 2. The total evaluation process is is a significant need for the professional development
iterative in that relevant information from later stages of teachers in this area at both the preservice and in-
can be recycled back into earlier stages as required. service levels.
notes
conclusIon
1. This chapter is associated with a joint University of
In beginning to develop a framework for the evaluation Melbourne, Queensland University of Technology
of ICT-based materials, it was necessary to draw on the and The Le@rning Federation research project
product development cycle that led to the identification funded by the Australian Research Council grant
of design, user, and impact evaluation criteria. Relevant #LP0454996. The authors are indebted to Stuart
design and impact evaluation criteria based on the ISE Tait, Manager, Market Information and Research,
work of TLF (2002) and with the SOLO taxonomy, and Susan Atkins, Director, Online Initiatives,
respectively, were put forward as quality examples of both at The Le@rning Federation, for comments
ways to evaluate the design and development of online on earlier drafts of this chapter.
learning materials and their manifestation as learning 2. The Ministerial Council on Education, Employ-
outcomes. Linking these and elements are the user ment, Training and Youth Affairs (MCEETYA)
evaluation criteria which address how the teacher inter- established The Le@rning Federation in 2001
prets and integrates the LOs into the teachinglearning to produce online curriculum materials and sup-
situation and it has been posited that this process is the portive infrastructure to ensure that teachers and
key to the quality of the learning outcomes in students. students in Australia and New Zealand can use
763
Towards a Framework for Evaluating ICT-Based Materials
these materials to widen and enhance learning of the Australian Society for Computers in Learning
experiences. For more information, please see in Tertiary Education. Retrieved March 5, 2008, from
http://www.thelearningfederation.edu.au http://www.ascilite.org.au/conferences/auckland02/
proceedings/papers/059.pdf
Downes, S. (2001, July). Learning objects: Resources
references
for distance education worldwide. International Review
of Research in Open and Distance Learning. Retrieved
Anderson, L. (2001). A taxonomy for learning, teach-
March 5, 2008, from http://irrodl.org/content/v2.1/
ing and assessing: A revision of Blooms taxonomy of
downes.html
educational objectives. New York: Longman.
Duval, E., Hodgkins, W., Rehat, D., & Robson, R.
Atkins, S., & Jones, D. (2004). Considerations for
(2003, June 24). Introduction. In E. Duval, W. Hodgins,
learning design. Melbourne, Australia: The Le@rning
D. Rehak, & R. Robson (Eds.), Learning Objects 2003
Federation. Retrieved March 5, 2008, from http://www.
Symposium: Lessons Learned, Questions Asked (Ed-
thelearningfederation.edu.au/tlf2/sitefiles/assets/docs/
Media 2003), Honolulu, HI. Retrieved March 5, 2008,
ldpaper310804_final.pdf
from http://www.aace.org/conf/media/LO2003Sym-
Atkins, S., & OConnor, G. (2005, October). Re-purpos- posium.pdf
ing learning objects as assessment instruments. Paper
Freebody, P. (2006). Early-stage use of The Le@rning
presented at the 10th Annual Assessment Reporting
Federations learning objects in schools: Results of
and Technology Roundtable, Melbourne, Australia.
a field review. Melbourne, Australia: The Le@rning
Retrieved March 5, 2008, from http://www.vcaa.vic.
Federation. Retrieved March 5, 2008, from http://www.
edu.au/roundtable/papers.html
thelearningfederation.edu.au/tlf2/sitefiles/assets/docs/
Biggs, J., & Collis, K. (1982). Evaluating the quality brochures_reports/Freebody_TLF_report_stage2.pdf
of learning: The SOLO taxonomy. New York: Aca-
Griffin, S. (2003). An international framework for
demic Press
e-learning specifications. IMS Global Learning Con-
Biggs, J., Holbrook, J., Ki, W., Lam, Y., Li, W., Pong, sortium Inc. Retrieved March 5, 2008, from http://
W., & Stimpson, P. (1989, November). An objective www.elearningresults.com/old/documents/pdf/Grif-
format for evaluating the quality of learning in vari- fin/Steve%20Griffin%20Elearning%20Summit%202
ous secondary subjects. Symposium presented to the 003%20final.pdf
6th Annual Conference of the Hong Kong Educational
Hall, E., Gott, S., & Pokorny, R. (1995). A procedural
Research Association. Hong Kong: City Polytechnic
guide to cognitive task analysis: The PARI methodology
of Hong Kong.
(AL/HR-95-108). Brooks Air Force Base, TX: U.S. Air
Carr, S. (2000, February 17). Wisconsin project seeks Force Material Command.
to create a common standard for online courses. The
Hattie, J., & Purdie, N. (1998). The SOLO model:
Chronicle of Higher Education: Daily News. Retrieved
Addressing fundamental measurement issues. In B.
March 5, 2008, from http://chronicle.com/free/2000/
C. Dart & G. M. Boulton-Lewis (Eds.), Teaching and
02/2000021701u.htm
learning in higher education (pp. 145-176). Melbourne,
Clarke, J. (2004). A model for researching student Australia: ACER Press.
engagement. Report prepared for the Directors of the
Haughey, M., & Muirhead, M. (n.d.). Evaluating learn-
Teaching and Learning Large Grant project Creating
ing objects for schools. Retrieved March 5, 2008, from
Environments for Engaging Students in Becoming Self-
http://www.usq.edu.au/electpub/e-jist/docs/vol8_no1/
directed and Reflective Learners, Brisbane, Australia.
fullpapers/eval_learnobjects_school.htm
Queensland University of Technology,.
Kimber, K., Pillay, H., & Richards, C. (in press).
Currier, S., & Campbell, L. (2002). Evaluating learning
Technoliteracy and learning: An analysis of the quality
resources for reusability: The DNER & Learning Ob-
of knowledge in electronic representations of under-
jects study. Paper presented at the Annual Conference
standing. Computers and Education. Retrieved March
764
Towards a Framework for Evaluating ICT-Based Materials
765
Towards a Framework for Evaluating ICT-Based Materials
endnote
1
Only four levels are measured as the Prestructural
is not considered.
766
Section: Context ICT 767
The 20th century has marked the transformation of J. Piaget (1971, 1973) and D. P. Ausubel (1990) are
the philosophical definition of knowledge into a new among the first scientists stating the importance of
and different one. The new idea of knowledge mostly subjects mental actions in cognitive processes. They as-
depends on the experiences and theories from hu- sign a great role to the subject-reality interaction for the
man and social sciences like psychology, pedagogy, explanation of knowledge development and evolution;
anthropology, sociology, and so forth. But many con- for this reason they are also considered cognitivists and
tributions to its specification are also due to biology, precursors of constructivism (they are usually classified
neurophysiology, telecommunication, cybernetics, and as the first interactive constructivists). They, on another
other scientific disciplines. In other words knowledge hand, assign a little or no role to social and cultural
is today a complex matter and its analysis and defini- interactions in knowledge construction and evolution.
tion depends on the observation fields one can use for The ideas from J. Piaget and D. P. Ausubel have been
its analysis. verified, integrated and, sometimes, contradicted from
Since the origins of philosophy Plato and Aristotle further scientist but have retained all their importance
marked the difference between the different ways of for the role they assigned to individuals in knowledge
constructing knowledge by proposing two alterna- management and development.
tive perspectives, that is, idealism and empiricism. On a different basis moved D. H. Jonassen (1994),
The reasons for the philosophers assumptions can be who founded the project of learning environments on
synthesized in two radically different viewpoints for the following statements: (a) knowledge construction
the analysis of human-reality interaction: the former is based on individual and social influences, (b) mean-
assigned to human mind the right of observing reality, ingful contexts support problem solving skills (which
interpreting and thinking about it with the use of well have to be derived from real situations), (c) coopera-
founded mental categories to arrive to the production tion between student and teacher and among peers is at
and development of new knowledge, the latter assumed the basis of learning processes. He also suggested the
that reality is true by itself independently from human idea of cognitive apprenticeship as a teaching-learn-
beings so that it has to be analyzed, measured and read, ing strategy strongly based on the experience and the
otherwise stated mankind has to interact with reality reflection on it.
to know it. Further studies introduced the concepts of multiple
During the centuries the ideas of idealism and intelligence (Gardner, 1993), learning styles (Mc Lellan,
empiricism cyclically alternated with more or less 1996) and cognitive flexibility (Spiro & Jehng, 1990),
success until the 19th and 20th centuries when human to consider the complexity of the cognitive phenomenon
sciences developed new ideas for the interpretation of into individuals.
knowledge phenomena. Today further elements coming The importance of context and social effects on
from communication sciences and organization theory individuals knowledge construction and development
are adding to the aforementioned ones and make more has been stated in many other studies, often under the
complex and articulated the panorama of ideas on influence of L. Vygotskij and A. N. Leontev hypoth-
knowledge construction and development. eses (Varisco, 2002). The first assigns a leading role
In what follows two different viewpoints for knowl- to language and social interactions and hypothesizes
edge analysis will be proposed: the former concerning the presence of ZSP (zones of proximal development)
individuals, the latter organizations. to mark the differences existing among the differently
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Towards a New Model for Knowledge Construction and Evolution
skilled subjects in a community. The latter is better With respect to studies on individuals knowledge
known for his activity theory, where subjects work development, new hypotheses were now developed
on objects in order to obtain a desired outcome; to to explain knowledge features and structure within
do this people employ tools, which may be external communities and organizations. I. Nonaka and N.
(i.e., a material instrument) or internal (plans, etc.). Y. Konno (1999), for example, based their ideas on the
Engestrm (1987) proposes a scheme of activity dif- definition of two different kinds of knowledge: (a)
ferent from that by Leontev because it contains three tacit knowledge, which is deeply-rooted in actions
interacting entities: the individual, the object, and the and experiences of communitys members and can be
community. only difficultly codified, transmitted and shared; i.e. it
The most recent theory on the influence of social is the individuals know how marking the skills of
phenomena on human knowledge and learning is the E. the community, (b) explicit knowledge, which is the
Wengers (1998) social learning theory. This theory has communitys knowledge and can be easily formalized,
at its basis the following principles: (a) individuals are represented, transmitted, and shared.
social beings and are the focus of the learning action; Activity theory intervenes on the difficult problem
(b) knowledge is a specific aspect of competence; (c) of learning and, particularly, on tacit knowledge by
knowledge is the expression of the participation; (d) suggesting that organizational learning process includes
meaning is the product of learning. If these ideas are preliminary stages of goal and problem formation
mostly concerned with the effects of learning actions (Engestrm, 1997).
on individuals it has to be noted that E. Wenger looks As regards learning organizations, that is, organi-
at communities as autonomous realities and, for him, zations continuously developing new knowledge, I.
communities of practice coincide with learning com- Nonaka and H. Takeuchi (1995), developed a model for
munities. knowledge construction and evolution strongly based
on the tacit and explicit knowledge transformations.
This model is made by four phases (which initials
corporate and organIzatIon give the name SECI to it): (1) socialization, it is the
knowledge informal process letting tacit knowledge be shared
(often in nonverbal way). It has features very similar
While starting from Wengers research on communities to the modeling phase of apprenticeship and to the on-
of practice recent studies analyze knowledge construc- the-job-training used in many organizational contexts,
tion in those communities for the importance they have (2) externalization, it transforms tacit knowledge in
in corporate and organizations. In other words a theory explicit concepts and is the crucial phase of knowledge
of knowledge construction and development in com- construction. Formal language, metaphors, and analo-
munities has been developed, autonomously from the gies play an important role in helping people making
hypotheses on knowledge construction in individuals explicit their know how, (3) combination, it inserts the
reported in the above paragraph. newly built concepts into organizations knowledge and
Among the starting points for these studies there are connects them to previous knowledge, so increasing
Wengers (2004) basic elements marking a community the knowledge of the community and of the organiza-
of practice: (a) shared identity domain, where member- tion, (4) internalization, it closes the cycle by making
ship implies a commitment to the domain, and therefore internal the explicit knowledge and transforms it into
a shared competence that distinguishes members from know how for the organization.
other people; (b) community, because in pursuing their
interest in the domain, members engage in joint activities
and discussions, help each other, and share information; the role of It and Ict on
that is, they build relationships enabling them to learn knowledge constructIon
from each other; (c) practice, because members of a and evolutIon
community of practice are practitioners; they develop
a shared repertoire of resources: experiences, stories, As regards the influence of IT and ICT on individual
tools, ways of addressing recurring problems (in short teaching-learning processes it has to be remembered
a shared practice). here the contributions from R. Taylor (1980) and L.
768
Towards a New Model for Knowledge Construction and Evolution
Galliani (Galliani, Costa, Amplatz, & Varisco, 1999). P. Lvy (1996) stated that collective intelligences well
The former proposed three metaphors for computer use characterize the situation emerging from the increase T
in education: tutor, tool, and tutee; the latter extended in the individuals communication speed in the Net and
these metaphors, while considering the great deal of from the great amount of information freely available
software tools developed in last decades. At the end in it.
of such an integration tutor appellation describes the On another hand, the impact of ICT on learning
experiences people can make under behaviorist and environments is mostly due to the role it can play in
cognitivist influence with the help of special programs, educational contexts: (1) repository for information and
like CAI (computer assisted instruction), CAE (com- documents of every kind (CMS content management
puter assisted education) and CAL (computer assisted system), (2) system for the management of learning
learning) tools, or with the help of artificial intelligence objects (LMS learning management system), (3)
software like ICAI (intelligent computer assisted in- virtual environment letting individuals interact and
struction) and ITS (intelligent tutoring systems). Tool build communities of learners (CSCLS computer
metaphor includes special software for analyzing large supported collaborative learning system).
amount of data and browsing specific contexts (usually In communities and especially corporate and orga-
provided with authoring, co-authoring functions). Tutee nizations, knowledge management has seen a great ap-
metaphor mainly includes programs for the creation of plication and use of ICT for the collection, organization,
special developmental environments, such as micro- sharing and analysis of knowledge. The tools adopted as
worlds made by Papert with LOGO. instruments for the application of knowledge manage-
Together with computer metaphors, metacognitive ment principles are devoted to knowledge discovery,
ideas must be remembered. Strictly speaking they sug- and knowledge audit (usually based on knowledge
gest that computer use stimulates functions develop- mapping) together with the planning and carrying out
ment more than learning topics so that meta-cognitive of knowledge networks.
attitudes and learning are better developed in students In this direction G. Trentin (2004) hypothesizes
systematically working at the computer (Cornoldi & for networks, and especially for the Internet, the role
Caponi, 1991). of technical infrastructure letting communities build a
Furthermore it cannot be discarded the applica- shared memory (i.e., shared knowledge basis support-
tion of activity theory to information systems (B. ing professional CoPs).
Nardi & ODay, 1999); while supporting the study At last A. Cartelli (2007) suggests that implementa-
of HCI (human computer interaction) activity theory tion of practices by means of ICT can:
claims for the study of artifacts with respect to mental
representations of reality. Following B. Nardi ideas, Create communities where never seen before,
activity theory can be seen as a powerful and clarify- Help people in bringing to consciousness their
ing descriptive tool rather than a predictive theory (a tacit knowledge and share it with the members
metaphor for explaining how consciousness is located of the community
in everyday practice is: you are what you do); it is Deeply influence knowledge management strate-
based in fact on a strong notion of mediation because gies (by passing from the management of com-
all human experience is shaped by the tools and sign munity data to the management of community
systems that people use. processes).
At last the influence of ICT and especially of the
Internet on knowledge construction and development As a result ICT will make easier the transfer of
must be recalled. As regards individuals H. Rheingold information and knowledge among the members of a
(1994) introduced the definition of virtual communities community and will help the development of learning
to describe the subjects using the Net for interpersonal activities in corporate, organizations and in more tradi-
communication and knowledge construction, D. de tional contexts like school and continuous education.
Kerckhove (2000) introduced connective intelligence
to describe the set of strategies and cognitive skills
developed from individuals contextually to ICT use,
769
Towards a New Model for Knowledge Construction and Evolution
towards new models for such knowledge with people in the communities
knowledge descrIptIon they belong to and in the society (there is no
proportion among the single parts and the whole
The elements reported until now clearly confirm how individual knowledge in the scheme). Individual
complex and articulated can be the description of knowledge will neither identify with community
knowledge phenomena. In what follows two different knowledge (except very exceptional situations
viewpoints will be adopted. like the one emerging in a little community, e.g. a
The former one will aim at representing the knowl- family), nor will identify with society knowledge
edge perspective (i.e., the different kinds of knowledge (the better example in this field is the presence of
will be listed and the correlations among themselves misconceptions and mental schemes in scientific
will be proposed, with no reference to subjects, com- disciplines, marking the differences between in-
munities or any possible source of information). Figure dividuals representation of real phenomena and
1 drafts the authors hypothesis for a tripartition of the their scientific explanation).
possible kinds of knowledge: individual, community, b. Each community will have peculiar and special
and society (science) (Cartelli, 2006). features, including knowledge, and different com-
By individual knowledge is meant here the knowl- munities will differ one another for one or more
edge that each subject constructs and develops while aspects. People belonging to more than one com-
interacting with reality. Community knowledge is the munity will have their personal knowledge which
knowledge of a community in its entirety, or by using partially will overlap that of the communities they
Wengers words, the knowledge letting people identify belong to; on another hand there will be aspects
in that community and the most part of signs, symbols of community knowledge which will be proper
and languages adopted from the members of the com- of that community so that no identification with
munity itself. Society knowledge (mostly scientific other communities will usually happen. Further-
knowledge) is the knowledge which is well codified and more community knowledge will never identify
approved from individuals and communities (it could with society knowledge because of the presence
be better described from scientific paradigms). of the tacit knowledge of communitys members
The reasons for this scheme are reported: with respect to the presence of the only formal
knowledge in the society (i.e., language, signs
a. Subjects develop knowledge by interacting with and codices adopted from communitys members
the environment they are immersed in and share will very rarely be accepted and validated from
society).
770
Towards a New Model for Knowledge Construction and Evolution
c. At last social knowledge will never completely The corresponding schema for what the author
identify or include individuals knowledge and hypothesizes for knowledge interactions in a subject
communities knowledge, because of its features: is reported in Figure 2.
data and information coming from subjects and It emerges from the earlier description of a complex
communities can spread into a society, but the schema for knowledge phenomena, both when looking
combination of the new elements with preexisting in abstract at knowledge structure and articulation and
ones can only result from a process of mediation when the influences among the different components
and validation. Any change must be recognized of knowledge in a subject are analyzed.
and accepted to have an official character and to
become a property for the society (it must have
the seal of acceptance). conclusIon and future trends
The second viewpoint to be discussed here is the The discussion reported on knowledge construction
individual knowledge and its structure as a result of the and evolution has interest by itself for the discussion
abstract considerations reported above on knowledge still alive in the scientific community on knowledge
structure. features, due to the different perspectives in its analysis
From the scheme in Figure 1 it can be deduced that it opens. Furthermore, as regards individuals, it pro-
all the components described until now for knowledge poses a multilevel structure for knowledge description;
can be present in a subject; personal, community and otherwise stated subjects build their knowledge through
society knowledge all together appear in fact in the the elements coming from three different channels:
oval representing individual knowledge and overlap personal, community and society. The knowledge
one another. Furthermore the same figure gives only a components all together contribute in the creation of
static description of the different elements in individual the individuals knowledge.
knowledge: when considering activity theory, social Furthermore the same remarks suggest a change
constructivism and all the theories reported above the in the well-consolidated tradition of personal human
static representation in Figure 1 appear inconsistent learning. During last centuries, in fact, there has been
and a more dynamic view of the interaction among the exaltation of personal reading for knowledge ac-
the various elements is needed. quisition and development with respect to other ways
of learning. Today collaborative learning strategies
771
Towards a New Model for Knowledge Construction and Evolution
supported by the ICT give a great impulse to communi- schools to help teachers in the planning of suitable
ties and to the development of common strategies and teaching strategies.
instruments for knowledge construction. It is perhaps too early to say if the multilevel knowl-
Coming back to teaching strategies we can con- edge structure described earlier will play a relevant role
clude that new strategies are needed in education to or not in the final version of the questionnaire.
let people develop a flexible and adaptive multilevel
knowledge structure.
As an example the recent situation of ICT literacy references
studies and researches will be discussed here.
The reason for those studies can be easily found in Ausubel, D. P. (1990). Educazione e processi cognitivi.
the interest recently manifested from single scientists Milan: Franco Angeli.
and public institutions for youth and its IT skills. Very
shortly the debate concentrates today on the following Cartelli, A. (2006). Teaching in the knowledge society:
topics: What means ICT skills? What are the ICT skills New skills and instruments for teachers. Hershey, PA:
people need to be the citizens of knowledge society? IGI Global.
Is the Net-generation automatically ICT skilled due to Cartelli, A. (2007). Socio-technical theory and knowl-
its immersion in today society? What must do schools edge construction: Towards new teaching paradigms?
inherently to ICT skills to help young people in devel- Journal of Issues in Informing Science and Information
oping the right ICT skills? Technology, 4, 1-14. Retrieved March 10, 2008, from:
To answer all or part of the above questions a research http://proceedings.informingscience.org/InSITE2007/
project titled Internet and School: Access Problems, IISITv4p001-014Cart339.pdf
Equal Policies and Information Management, directed
from professor A. Calvani in the University of Florence, Cornoldi, C. & Caponi, B. (1991). Memoria e meta-
Italy and funded from the Italian Ministry for Research cognizione. Trento: Erickson.
and University, recently started. Within that project the de Kerchkove, D. (2000). La pelle della cultura. Rome:
local unit of Cassino, Italy coordinated from the author Editori Riuniti.
was charged of the analysis of the cognitive dimension
of the Internet use (i.e., the access to information, its Engestrm, Y. (1987). Learning by expanding. An ac-
critical use and the construction of new knowledge). tivity theoretical approach to developmental research.
The more relevant points emerged until now from Helsinki: Orienta-Konsultit.
the analysis of national and international literature and Engestrm, Y. (1997). Innovative learning in work
from the first surveys can be summarized as follows: teams: Analyzing cycles of knowledge creation in prac-
tice. In Y. Engestrm, R. Miettinen & R.L. Punamki
ICT literacy skills do not identify with ECDL (Eds.), Perspectives on activity theory (pp. 377-404).
(European Computer Driving Licence) skills, Cambridge: Cambridge University Press.
Group dynamics in young people play a relevant
role in the development of the ICT skills concerned Galliani, L., Costa, R., Amplatz, C., & Varisco, B.
with the acquisition and sharing of information, M. (1999). Le tecnologie didattiche. Lecce: Pensa
The Net-generation has high competence in re- Multimedia.
ceiving, storing, and transmitting information but
Gardner, H. (1993). Multiple intelligences: The theory
has no deep understanding of the meaning of the
in practice. New York: Basic Books.
operations and of the structure of information.
Jonassen, D. H. (1994). Thinking technology. Towards
The above statements give only a provisional a constructivist design model. Educational Technology,
sketch of the results expected from the research group, 34(4), 34-37.
which is still working on the development of a digital
Lvy, P. (1996). Lintelligenza collettiva. Per unan-
competence assessment questionnaire to be developed
tropologia del cyberspazio. Milan: Feltrinelli.
in a few months. Once ready it could be used in the
772
Towards a New Model for Knowledge Construction and Evolution
773
Towards a New Model for Knowledge Construction and Evolution
774
Section: Product ICT 775
Gbor Hossz
Budapest University of Technology and Economics, Hungary
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Transport-Level Requirements of the Internet-Based Streaming
776
The Transport-Level Requirements of the Internet-Based Streaming
Widmer, 2003). The TFRC is a receiver-based con- if its sending rate is generally within a factor of two
gestion control mechanism, with calculation of the loss of the sending rate of a TCP flow under comparable T
event rate performed in the data receiver rather than conditions (Handley et al., 2003).
in the data sender. This is appropriate for an applica- The drawback of smoother throughput than TCP
tion where the sender is a large server handling many while competing fairly for bandwidth is that TFRC
concurrent connections. Therefore, this is suitable as responds slower to changes in available bandwidth
a building block for multicast congestion control. The than TCP. Thus, TFRC should only be used when the
TFRC is not a complete protocol; it is a congestion application has a requirement for smooth throughput,
control mechanism only. It could be implemented in a in particular, avoiding TCPs halving of the sending
transport protocol like Real-time Transport Protocol rate in response to a single packet drop.
(Schulzrinne, Casner, Frederick, & Jacobson,
1996) or in an application incorporating end-to-end
congestion control at the application level. sImulatIon results
TFRC uses the following throughput equation
directly to determine the allowed sending rate as a Implemented Protocol Entities
function of the loss event rate and the RTT. This equa-
tion is a simplified version of the throughput equation A virtual testbed called SimCast was developed to
for the Reno TCP (Padhye, Firoiu, Towsley, & analyze the effects of the important transport proto-
Kurose, 1998). col TCP on multicast traffic. Standardized TCP and
TFRC protocol entities are implemented in SimCast,
described below. In the protocol entity TRFC, the rate-
s based AIMD-driven congestion control mechanism is
T=
3bp
R
2bp
3
+ t RTO 3
8
( )
p 1 + 32 p 2 ,
implemented, which uses Equation (2).
(2) the simcast simulator
777
The Transport-Level Requirements of the Internet-Based Streaming
Figure 2. TFRC average loss interval and the latest loss interval (s0) with idealized perfectly periodic losses
Figure 2 shows the last loss interval using dashed stated that the TFRC entity of SimCast produces very
line, which is the number of received packets since the similar results to the ns2 protocol entity.
last detected loss event at the receiver side. The calculated and measured sending rates of the
The average loss interval, which is calculated using TFRC sender are shown in Figure 3. The simulator
the WALI algorithm, is shown by solid the line. This keeps track of outgoing and incoming packets and logs
algorithm averages the most recent samples of loss the summarized bandwidth. The period of bandwidth
intervals using a weight function which calculates the logging is set to 5 seconds. At the start of the simula-
weight of elements in the recent half of the history with tion, TFRC probes the available bandwidth using a slow
the factor of 1, and with linearly descending factors start mechanism because, in this time period, there is
as we advance toward the least recent elements in the no valid packet history at the receiver side to calculate
second half of the history. As can be seen in Figure 2, the sending rate. This slow start behavior is similar to
the average loss interval follows the last loss interval TCPs slow start, but TFRC cannot use the ACK clock-
smoothly. The calculated loss event rate is the reciprocal ing mechanism to control the sending rate. Therefore,
of this value. As this value is calculated at the receiver to avoid flooding the network, TFRC does not send
and the sender uses it in the sending rate calculation, more than twice as much data to the network that was
the value should be included in feedback messages. It sent in the last RTT. This limitation keeps the initial
is apparent that the algorithm eliminates aliasing effects sending rate of TFRC as twice the available bandwidth
of incoming and outgoing loss events in the history. during a slow start. The peak of the measured sending
This simulation scenario is similar to the one that was rate at the start of the simulation is caused by the slow
carried out by the ns2 team (Floyd et al., 2000). start. After the first loss indication TFRC exits the slow
Comparing the results of the two simulations, it can be start state. At this time, TFRC has no valid history of
778
The Transport-Level Requirements of the Internet-Based Streaming
loss events, so TFRC fills the history with initial data flows. Here we define smoothness intuitively as the
calculated from the measured sending rate. degree of sending rate variations over time for a par-
ticular flow in a stationary environment. Responsiveness
Concurrent Simulation of TCP and describes how fast the deceleration of the sending rate
tfrc flows is when there is a step increase of network congestion
and aggressiveness is the acceleration rate of protocol
This simulation demonstrates the concurrent execu- sending rate to improve network utilization when there
tion of TCP-friendly flows. The goal of this kind of is a step increase in the available bandwidth. Our earlier
simulation is the qualification of TCP and TFRC flows simulations pointed that generating smoother traffic
fairness. By this, we mean that the sending rate of measured by time samples improves fairness measured
TFRC flow should be approximately the same as that by population samples.
of a TCP flow under the same conditions of round-trip For more precise numerical qualification of the
time and packet loss rate. flows fairness, it would be more appropriate to simulate
The simulated flows are of type TCP Tahoe and several flows simultaneously, since running more flows
TFRC. Figure 4 depicts the bandwidth share of the concurrently increases the level of statistical multiplex-
two protocol entities. The granularity of the band- ing, which makes it possible to carry out more realistic
width logger was set to 2 seconds for both flows. The simulation of TCP-friendly flows. Such simulations can
upper darker lane denotes the bandwidth utilization be performed using SimCast; however, this simulation
of the Tahoe entity; the lower lighter area represents result is carried out for the visual demonstration of
the bandwidth share of TFRC. We set the packet drop protocols bandwidth share only.
rate of the WAN link in the topology to 7%. Figure 4
shows that the long-term bandwidth share of two flows
are relatively fair; however, the sending rate of TCP conclusIon and future
varies largely. developments
Using the output data resulted by this kind of simula-
tion, one can qualify the smoothness, responsiveness, Our primary goal is the development of a qualifying
and aggressiveness properties of concurrently running system, which can be used to classify various transport
779
The Transport-Level Requirements of the Internet-Based Streaming
Figure 4. Bandwidth utilization of concurrently running TCP Tahoe and TFRC flows
level protocols from a TCP-friendliness point of view. tions. In Proceedings of ACM SIGCOMM 2000 (pp.
The qualifying process should provide the maximum 43-56). Stockholm, Sweden: ACM Press.
amount of information about the investigated proto-
Floyd, S., & Henderson, T. (1999). The NewReno
cols running the minimum amount of simulation. Our
modification to TCPs fast recovery algorithm. Internet
simulations confirmed that TFRC is more suitable for
Engineering Task Force, Network Working Group, Re-
multimedia applications than TCP implementations
quest for Comments (RFC) 2582. Retrieved February
because of its smoother sending rate, and it is also justi-
26, 2008, from http://www.ietf.org/rfc/rfc2582.txt
fied that TFRC can be stated as TCP-friendly because
the examined protocols long-term throughput and other Handley, M., Floyd, S., Padhye, J., & Widmer, J.
relevant parameters do not differ significantly from (2003). TCP friendly rate control (TFRC): Protocol
each other. Therefore, the protocols implemented in specification. Internet Engineering Task Force, Network
SimCast can be used as the basis of such a qualifying Working Group, Request for Comments (RFC) 3448.
system. The simulation results were compared with Retrieved February 26, 2008, from http://www.ietf.
the results from ns2 (Floyd et al., 2000), and they org/rfc/rfc3448.txt
seem to be qualitatively identical.
Using the developed protocol qualifying system, one He, E., Vicat-Blanc Primet, P., & Welzl, M. (2005) A
can determine some fairness related properties of TCP- survey of transport protocols other than standard
friendly flows such as smoothness, responsiveness, and TCP. Global Grid Forum Document GFD-I.055, Data
aggressiveness. In addition, several other measures of Transport Research Group. Retrieved February 26, 2008,
protocol fairness can also be qualified. To refine the from http://www.ggf.org/documents/GFD.55.pdf
results of the analyses, future development should take Hossz, G. (2005). Reliability issues of the multicast-
more parameters into the qualifying process, such as based mediacommunication. In M. Pagani (Ed.), En-
the queuing dynamics and throughput covariance of cyclopedia of multimedia technology and networking
competing protocol entities. (pp. 875-881). Hershey, PA: Idea Group Reference.
Jacobson, V. (1988). TCP congestion avoidance control.
references In Proceedings of ACM SIGCOMM 1988 (pp. 314-329).
Stanford, CA: ACM Press
Floyd, S. (2001). A report on some recent developments Mathis, M., Mahdavi, J., Floyd, S., & Romanow, A.
in TCP congestion control. IEEE Communications (1996). TCP selective acknowledgement options. Inter-
Magazine, 39(4), 84-90. net Engineering Task Force, Network Working Group,
Floyd, S., & Fall, K. (1999). Promoting the use of Request for Comments (RFC) 2018. Retrieved February
end-to-end congestion control in the Internet. ACM 26, 2008, from http://www.ietf.org/rfc/rfc2018.txt
Transactions on Networking, 7(4), 458-472. Orosz, M., & Tegze, D. (2001). The SimCast multicast
Floyd, S., Handley, M., Padhye, J., & Widmer, J. (2000). simulator. In Proceedings of the International Workshop
Equation-based congestion control for unicast applica- on Control & Information Technology, IWCIT01,.
Ostrava, Czech Republic: Faculty of Electrical Engi-
780
The Transport-Level Requirements of the Internet-Based Streaming
Wang, Q., Long, K., Cheng, S., & Zhang, R. (2001). TCP (Transmission Control Protocol): Widely
TCP-friendly congestion control schemes in the used for bulk data transmission. It is suitable for file
Internet. In Proceedings of the 2001 International transfer, but not for streaming media transmission.
Conference on Information Technology and Informa- Transport Layer: This is an abstraction; the pro-
tion Networks (ICII2001) (Vol. B), Beijing, China tocol belonging to the transport layer is responsible
(pp. 205-210). for the port handling and sometimes the improved
Yu, B. (2001). Survey on TCP-friendly congestion reliability of the transmission.
control protocols for media streaming applications. TTL (Time-To-Live): A field in the IP packet
Retrieved February 26, 2008, from http://cairo.cs.uiuc. header. Its value is the allowed hop-count, the number
edu/~binyu/writing/binyu-497-report.pdf of routers, which can forward the packet before delivery
or dropping out.
781
782 Section: Product ICT
RFID, also known as radio frequency identification, Jeremy Landt (2001) wrote a history of RFID published
is a form of Auto ID (automatic identification). Auto by AIM, The Association for Automatic Identification
ID is defined as the identification of an object with and Data Capture Technologies, explaining that in the
minimal human interaction (Puckett, 1998). Auto ID 20th century, the invention of radar took advantage of the
has been in existence for some time; in fact, the bar electromagnetic energy that some postulate to have been
code, the most ubiquitous form of Auto ID, celebrated present at the creation of the universe. By broadcasting
its 30th year in commercial use in 2004 (Albright, 2004). and analyzing the reflection of radio waves, radar can
Barcodes identify items through the encoding of data identify two important characteristics about an object,
in various sized bars using a variety of symbologies, its position and its velocity. This application of radio
or coding methodologies. The most familiar type of waves was a precursor to the use of radio waves in
barcode is the UPC, or universal product code, which radio frequency identification.
provides manufacturer and product identification. During the 1950s, transponders were developed
While barcodes have proven to be very useful, and and improved, becoming increasingly more sophis-
indeed, have become an accepted part of product usage ticated and allowing for long-range determination of
and identity, there are limitations with the technology. the identification of aircraft (Landt, 2001). Through the
Barcode scanners must have line of sight in order to decades of the 1960s, 1970s, and 1980s, inventors, aca-
read barcode labels. Label information can be easily demicians, commercial enterprises, and governmental
compromised by dirt, dust, or rips. Barcodes take up a agencies explored a plethora of opportunities related
considerable footprint on product labels. Even the newer to the use of early RFID devices, using radio trans-
barcode symbologies, such as 2D, or two-dimensional, missions, short-range radio-telemetry, microwave
which can store a significant amount of data in a very technology, and radar beams (Landt, 2001). Landt
small space (Two dimensional, 2005) remain states that RFID was first used commercially in the
problematic. RFID proponents argue that limitations 1960s by companies that developed security related
of barcodes are overcome through the use of RFID devices called electronic article surveillance (EAS)
labeling to identify objects. equipment. Although EAS could only present the
detection or absence of a tag, the tags were low cost
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Understanding RFID
and provided valuable deterrents to theft. EAS is still Some of the concerns relating to RFID are inherent
an important application of RFID today. to the technology upon which it is based. For instance, U
Work continued through the 1970s and in the 1980s, the range over which devices using radio waves can
as companies began offering a variety of RFID related consistently communicate is affected by the following
business solutions, primarily aimed at transportation, factors:
controlled access, and animal tracking applications
(Landt, 2001). Of primary importance, in 1973 the 1. The power contained in the wave transmitted
United States government determined that there was 2. The sensitivity of the receiving equipment
no need for a national standard for electronic vehicle 3. The environment through which the wave trav-
identification. This was serendipitous because it meant els
that individual firms, researchers, and others could have 4. The presence of interference (Hodges et al.,
the freedom to develop new uses of RFID without being 2003)
constrained by a governing body (Landt, 2001).
Hardware Components
TV Microwaves
AM Radio
FM Radio FM Radar
Visible X-rays;
LF MF HF VHF UHF Infrared Ultraviolet
Light Gamma Rays
Low frequency High frequency
Long wavelength Short wavelength
783
Understanding RFID
is transmitted from the reader. This reduces the costs of RFID are using current database and application
of the tags, but also reduces their performance. (2) systems and modifying them to accommodate the cur-
Semi-active tags incorporate a battery which powers rently modest amount of additional data. However, the
the electronic circuitry while the tag is communicat- industry understands that RFID technology brings with
ing with a reader. Although the power is not used to it the promise of huge amounts of data to be managed,
produce radio waves, the power source improves the stored, and communicated.
performance of the tag, most commonly by increasing
the transmission range. (3) Active tags are fully pow-
ered by battery; they are able to generate radio waves rfId standards
autonomously, without the need for a reader to first
transmit a radio wave. As power sources are added to Electronic Product Codes
these tags, we can see that their utility increases, but
at the expense of the cost per tag, and so active and Just as barcodes encoded universal product codes,
semipassive tags are generally reserved for higher-value RFID tags encode electronic product codes, known as
items (Angeles, 2005; Hodges et al., 2003). EPCs. The EPC is a unique standard in that it is being
The tags consist of three components: antenna, systematically developed well in advance of its use
silicon chip, and substrate or encapsulation material rather than being cobbled together on the fly as has
(Want, 2004). The antenna is used for receiving and happened with other standards. The Auto-ID Center at
transmitting radio frequency waves to and from the MIT began the thought process to develop EPC. The
reader. The chip contains information pertaining to original concept was that using RFID and EPC would
the item tagged such as part number and manufacturer. permit an Internet of things, a universe of identified
Chips can be either read-only or read-write; the costs objects that could be tracked, interrogated, and provide
are higher for the read-write chips. There is a crucial added value to supply chains by enabling granular
difference between read-only chips and read-write information at the item level for every item, big or
chips. Read-only chips are essentially electronic bar- small, high value or low value (EPC: The End of Bar
codes. Once the data has been encoded onto the chip, Codes?, 2003). The Auto-ID Center has completed its
it cannot be modified and, therefore, cannot transmit pioneering work and passed the torch on to EPCGlobal.
information about the product as it moves through a The labs of the Auto-ID Center are still in existence
sequence of events (The Write Stuff, 2003). A under the aegis of Auto-ID Labs (www.autoidcenter.
twist on the read-only vs. read-write chips is the EE- org). EPCGlobals focus is not only on the creation
PROM (electrically erasable programmable read-only of EPC standards, but also on the creation of a global
memory chip). While individual pieces of information community of EPC users spanning a multiplicity of
on EEPROM chips cannot be modified, the entire ex- supply chains around the world (RFID Implementa-
isting data on these chips can be replaced by new data tion Cookbook, 2006).
(Angeles, 2005; Want, 2004).
Frequency Allocations
software
The frequencies used by RFID devices are dictated by
The RFID reader and tags represent just part of the en- the governments of the countries in which the technol-
tire RFID story. RFID is feasible only due to advances ogy is deployed. The management and allocation of
in database management and information technology specific frequencies for use by commercial and gov-
which have allowed the storing, processing, and analysis ernmental agencies has been seen as a responsibility
of the data generated through RFID. Traditional bar- which should devolve to the government to control.
codes require just the addition of the UPC code to the As an example, Hall and Schou (1982) argued that
existing database of items. RFID, by virtue of its use what they called the electromagnetic spectrum was
of a computer chip, has the capability of not only stor- essentially a finite resource with strategic importance
ing static data, such as UPC codes, but also of storing to national and international communication and to the
dynamically created information, such as movement national economy.
of the product through a supply chain. Early adopters
784
Understanding RFID
Figure 3.
U
RFID TAG
MICROCHIP
ANTENNA
With respect to RFID frequency allocations, govern- that will be vendor-neutral and cover such items as
ments are beginning to realize that it is also important radio frequencies, interference, terminology, and
to harmonize radio communication systems with standards (CompTIA, 2005).
other countries in order to benefit most fully from in- Independent testing and research facilities are also
ternational trade. Developers and users of RFID need moving along the development of RFID technology.
to become familiar with the legislation pertaining to Examples include the nonprofit RFID Alliance Lab,
RFID for their areas. It should be noted that even if based at the University of Kansas (Swedberg, 2006)
there are conflicting frequencies assigned, in some and the University of Arkansas RFID Research Center
cases it is possible for developers to obtain waivers (Researcher, 2006).
to test RFID systems outside of assigned spectrums if
the system being created is intended for use in another technology development
country (Hodges, 2003).
Current research is concentrating on tags that are not
Governing Bodies/Testing and Research affected by liquids or metals, and that permit the read-
facilities ing of closely packed tags such as would be used when
tagging individual items in a retail situation. Early test-
Two primary governing bodies are involved with de- ing has indicated that Generation 2, known as Gen 2,
velopment of RFID standards. As mentioned earlier, UHF tags successfully fill these criteria. UHF, or ultra
EPCGlobal has taken up the development of standards high frequency, permits near-field reading, in which the
from the Auto-ID Center. In addition, AIM Global (the reader is close to the tag being read, in addition to far-
Association for Automatic Identification and Mobility) field reading of tags. When transmitting in a near-field
is working with CompTIA, the Computing Technology situation, the UHF tags transmit through the magnetic
Industry Association to develop an RFID certification field; when transmitting in a far-field situation, the
785
Understanding RFID
UHF tags transmit through the electromagnetic field. Wal-Mart Corporation has been a major force in
However, others, particularly in the pharmaceutical the deployment of RFID within supply chains. In
industry, believe that HF, high frequency, tags are more 2003, Wal-Mart dictated that its top 100 suppliers must
efficient. The possibility of multiple standards looms as implement RFID to identify cases and pallets being
a concern for companies involved in multiple industry shipped through the Wal-Mart distribution system
sectors (OConnor, 2006). by 2005 (Seideman, 2003). Early examination of the
impact has shown that RFID has reduced Wal-Marts
replenishment cycle and increased inventory accuracy
rfId successes (Study of Wal-Mart, 2004).
Another retailer that has made significant contri-
Transportation Industry butions to the evaluation of RFID is Metro Group,
a German supermarket firm. In its Future Store near
EZPASS is a well-known and well-accepted area of Dusseldorf, Metro Group has tested products ranging
RFID technology use deployed in the eastern part of from razor blades to cream cheese (Tarnowski, 2005).
the United States. The EZPASS system was developed Marks and Spencer, a clothing retailer in the United
for a consortium of states wishing to automate the toll- Kingdom, has been successful in using RFID garment-
collecting process on major highways, tunnels, and tagging to increase its inventory accuracy (Marks &
bridges. With the EZPASS system, motorists are issued a Spencer, 2005).
transponder which can be mounting on the inside of the
front windshield. When the vehicle passes an EZPASS other applications
toll collection point, a stationary reader recognizes the
serial number encoded in the transponder. This serial RFID has already proven to be a valuable technology
number is used to identify the motorists EZPASS ac- in a number of industries. Some other applications
count, in which funds are held in escrow. The amount of include asset tracking, condition monitoring, and fleet
the toll is automatically deducted from the fund. When management.
the fund balance falls below a minimum amount, it is The mining industry was an early adopter of RFID
automatically replenished by charging a credit card technology. One use of RFID tags in mining was in
account furnished by the motorist. Initially, motorists validating the correct movement of haulage vehicles.
were induced to participate through discounts offered on These vehicles have read only tags permanently attached
tolls collected by EZPASS vs. tolls collected manually. to the vehicles dump bed. As a vehicle approaches a
EZPASS has reduced the number of toll takers and, in dump area, a reader validates that it is approaching the
some instances, increased the throughput of vehicle correct dump bed. Information concerning the transac-
traffic by allowing drivers to pass the toll collection tion, including the vehicle number, the weight of the
station at speed. Although the transponders are bulky, vehicle before and after the dump, and the time, are
they are easily mounted. While there is no charge for the recorded automatically. Using RFID obviates the need
transponders, motorists are responsible to return them for human interaction between the scales operator and
when leaving the program; unreturned transponders are the vehicle driver (Puckett, 1998).
subject to a fee (Vavra et al., 1999).2 Asset tracking is an important application for RFID.
Scottish Courage, a major UK brewer, used RFID to
supply chains track beer kegs. In the brewing industry, reusable beer
kegs constitute a major expense; when kegs are lost
Supply chains consist of manufacturers and retailers or not returned, these costs escalate. By tagging kegs
working together to provide product to the end con- with RFID labels, Scottish Courage was able to cut its
sumer. Supply chain partners rely on close working keg losses in half, defer the need for purchase of new
relationships in order to increase the efficiency and containers, and improve the visibility of the kegs and
lower the costs of moving product from the raw mate- products (Wilding, 2004).
rial stage through manufacturing to the final retailing Because the chips embedded in RFID tags can
of the merchandise. RFID is proving to be a valuable record environmental information, RFID is very use-
tool to this end. ful in monitoring the condition of tagged items. The
786
Understanding RFID
United States military uses this feature to monitor the is expected to grow exponentially. With that growth,
physical condition of munitions, which are very sen- important questions need to be answered to address U
sitive to heat, humidity, and physical shocks (IDTech privacy and other social concerns about the information
Ex Ltd, 2003). being provided by these very smart chips.
787
Understanding RFID
IDTech Ex Ltd, (2003). Smart Labels USA 2003 The Write Stuff: Understanding the Value of Read/Write
Conference Review, Smart Label Analyst, Issue 27, RFID Functionality (2003). Intermec. Retrieved March
April 2003 4, 2006, from http://www.aimglobal.org/technolo-
gies/rfid/resources/RFID%20Read%20write%20Wh
Landt, J. (2001). Shrouds of Time: The history of RFID.
itePaper.pdf
Pittsburgh, USA: The Association for Automatic Iden-
tification and Data Capture Technologies. Retrieved Two dimensional (2D) Bar Code Symbologies (2005).
March 4, 2006, from http://www.aimglobal.org/tech- Association for Automatic Identification and Mobil-
nologies/rfid/resources/shrouds_of_time.pdf ity. Retrieved December 27, 2005, from http://www.
aimglobal.org/technologies/barcode/2d_symbologies.
Leach, P. T., (2004). Ready for RFID? The Journal of
asp
Commerce, Vol. 5 Issue 42 (pp. 12-14).
Understanding Gen 2: Key benefits and criteria for
Marks & Spencer Expands RFID Trial, (April 2005).
vendor assessment. Symbol White Paper. Retrieved
Frontline Solutions, Vol. 6 Issue 3 (pp.11-12).
March 7, 2006, from http://promo.symbol.com/forms/
OConnor, M. C. (2006). Wal-Mart Seeks UHF for gen2/RFID_WP_0106_final.pdf
Item-Level. RFID Journal, Mar. 30, 2006. Retrieved
Vavra, T. C.; Green, P. E.: Krieger, A. M., (1999).
on March 31, 2006 from http://www.rfidjournal.com/
Evaluating EZPass. Marketing Research. Vol. 11 Issue
article/articleprint/2228/-1/1/
2 (pp. 4-16).
Ohkubo, M., Suzuki, K. & Kinoshita, S. (2005). RFID
Want, R. (2004). The Magic of RFID. ACM Queue.
Privacy Issues and Technical Challenges. Communica-
Vol. 2 Issue 7 (pp. 40-48).
tions of the ACM, Vol. 48 Issue 9 (pp. 66-71).
What is Radio Frequency Identification (RFID)? (2005).
Puckett, D & Patrick, C. (1998). Automatic Identifica-
Association for Automatic Identification and Mobility.
tion in mining. Mining Engineering. Vol. 50 Issue 6
Retrieved December 27, 2005, from http://www.aim-
(pp. 95-100).
global.org/technologies/rfid/what_is_rfid.asp
Researcher to Reveal EPCs Further Impact at Wal-
Wilding, R. & Delgado, T. (2004). RFID Demystified:
Mart (2006). RFID Journal, March 27, 2006. Retrieved
Supply-Chain Applications. Logistics & Transport
March 31, 2006, from http://www.rfidjournal.com/ar-
Focus. Vol. 6 Issue 4 (pp. 42-48).
ticle/articleprint/2221/-1/1
www.autoidcenter.org, Retrieved on March 5, 2006, at
RFID Implementation Cookbook (2nd Release Sept.
http://www.autoidcenter.org
2006), (2006). EPCGlobal. Retrieved December 17,
2006, from http://www.epcglobalinc.org/what/cook-
book/
other resources
Seideman, T. (December 1, 2003). The race for RFID,
The Journal of Commerce, Vol. 4 Issue 48 (pp.16-
18). www.aimglobal.org
Study of Wal-Mart reveals first benefits of RFID, www.autoidlabs.org
(December 2004). Healthcare Purchasing News, Vol.
29 Issue 12 (pp. 6). www.epcglobalinc.org
788
Understanding RFID
Air Interface: Air, the medium through which radio Frequency: Frequencies constitute the rate at which
waves are transmitted. electromagnetic waves, such as light, television, and U
radio waves, oscillate. Electromagnetic waves are
Alignment: How the reader is oriented to the tag.
comprised of a continuum of emanations, including
Auto ID: Auto ID, also called Automatic Iden- light waves which are visible, and invisible frequen-
tification, is a form of ICT that enables identifying cies such as television and radio waves which are
information about objects to be gathered through the lower frequency than light, and x-rays and gamma rays
agency of scanners and readers. Auto ID encompasses which are higher frequency. Frequencies are measured
barcodes, RFID, and similar tagging technology which in Hertz (Hz), kilohertz (kHz), megahertz (MHz), or
can be read and interpreted automatically by a mechani- gigahertz (GHz), and represent the rate of oscillation
cal device. A bar code reader can interpret a printed bar of the waves.
code; an RFID reader can interpret an RFID tag.
Gen 2: Second generation tags. Uses ultra high
Bar Code: Automatic identification technology that frequency range of radio waves.
generally employs a series of black vertical bars sepa-
HF (High Frequency): The original range of
rated by vertical white spaces as a method of encoding
frequencies used with case and pallet level tagging
numeric and alphanumeric data. Commonly used forms
in supply chains. The signals exchanged between
of barcodes are placed on consumer goods to identify
HF tags and readers are subject to attenuation due to
universal product codes (UPCs). Newer technologies
dielectrics.
of barcodes include 2D (two dimensional) which allow
more information to be encoded using a smaller area. Passive Tag: Type of RFID tag that does not have a
There must be a line of sight between barcodes and battery incorporated and therefore must rely on power
barcode scanners in order for information to be read. contained in the radio wave transmitted by the reader.
Passive tags are the lowest cost tags, but also perform
Dielectrics: Materials, such as liquids, that are not
at the lowest level.
able to conduct electricity. These materials interfere
with the transmission of radio frequency waves. Reader: One of the two components of an RFID
system. The reader generates and sends a radio wave
EAN (13-digit UPC code): Provides more flex-
signal to the tag, and captures and decodes the reflected
ibility than original UPC code.
signal from the tag in order to identify the object to
EAS (Electronic Article Surveillance): The use which the tag is attached. All readers have some power
of an RFID tag to identify valuable property in order source. Also known as an interrogator.
to reduce theft.
RFID: RFID, or radio frequency identification, is
EDI (Electronic Data Interchange): The electronic a form of Auto ID in which radio waves are used to
transmission of business information from one supply gather information from electronic tags attached to
chain member to another, using a standard data format items such as vehicles, merchandise, or animals.
and standard transaction codes. An EDI transaction,
Semi-active Tag: Type of RFID tag with a built-
known as Advance Shipment Notice, or ASN, is being
in battery power source which provides power to the
coordinated with data tracked by RFID tags on products
electronic circuitry while the tag is communicating
moving through supply chains.
with the reader. Semi-active tags do not have enough
EPC (Electronic Product Code): Encoded on power to autonomously generate radio waves.
RFID tags and tied to a multiplicity of data concerning
Tag: One of the two components of an RFID system.
the object tagged. Standards are still being developed
The tag, a radio frequency transponder, is affixed to
and proposed for EPC by EPCGlobal, an international
the product that needs to be identified and is actuated
organization devoted to creating a community of sup-
by receiving a radio wave sent to it by the reader. See
ply chain firms cooperating to consistent end-to-end
passive tag, semi-active tag, and active tag.
partnerships of product movement and tracking.
789
Understanding RFID
endnotes
1
Some sources simplify the types of tags into two
categories: active and passive. See What is Radio
Frequency Identification (RFID)?, 2005
2
Information also based on the authors personal
experience with EZPass.
790
Section: Context ICT 791
Giovanni Rosso
University of Roma, Italy
IntroductIon Background
The term communities of practice (CoPs) has been Lave and Wengers studies examine the social features of
coined by Lave and Wenger (1991) during their quests learning, in particular they have taken into consideration
on apprenticeship from 1988. They considered some Vygotskijs (1980) works about the zones of proximal
studies carried on in very different backgrounds and development. This theory explains the possibility for
kinds of culture such as those of Maya midwives in the learner to carry out some tasks also slightly out of
Yucatan, Vai, and Gola tailors in Liberia, U.S. Navy the learners capacities field, using, with the learners
boatswains drill-grounds, butchers of some American communicative mediation, the competences back-
supermarkets, and among the members of Alcoholics ground of the learning group the learner is in.
Anonymous Association. However it needs to point out the fundamental dif-
The common denominator of these studies that has ference between the situation of the communities of
appeared relevant to Lave and Wenger is the presence learning (CoLs), artificial environments where teacher
of learning mechanisms not surveyed before by others and disciples roles are well defined, and that of the
scholars and not connected with the direct interaction CoP, real environments where experts and apprentices
between apprentice and master, but with the participa- co-participate in the realization of shared practices.
tion to a practice shared with other actors such as other More recent studies as those Engestroms (1987)
apprentices, masters and journeyfolks. Vygotskijs original works traced their origins during
Lave and Wenger have therefore considered learn- the 1930swiden the range of concept application
ing as something strictly linked to the social practice of proximal development zone, explaining it from a
and they have observed the mechanism, defined as collectivistic or social viewpoint. Other authors
legitimate peripheral participation, according to such as Orr (1996) study in depth the individual and
which also the apprentices are considered members of public identity coming out in working environments,
the community, that they call CoP, so they are entirely by spreading war stories that are tales on particularly
legitimated to share its resources and experiences, to difficult applicative situations having been solved suc-
take part in discussions and to have an equal interaction cessfully by intuition or experience.
with senior experts. The exponential growth of Internet connections from
Sprung up in an academic background, in issues the 1990s (Rosso, 2005) fosters the spread of virtual
connected with the study of language and social in- communities (Rheingold, 1993) and the transformation
teractions, the CoPs have quickly come to business of CoPs studied by Lave &Wenger into communities
world where they are becoming successful as support where the face-to-face interaction is more often replaced
strategy for training by e-learning (Brown & Duguid, by distance interaction with the consequent issues of
1995), knowledge management tools (Profili, 2004) and, the computer-mediated communication (Rivoltella,
more in general, development perspectives for studies 2003).
on organizational learning (Alessandrini, 2005).
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
University Training on CoPs
a traInIng experIence on Amid the conventional tools for on-line social interac-
communItIes of practIce tion (Calvani, 2005) each group had a private forum
monitored by tutor at its disposal, to discuss the work
In the research work of LAOC (Laboratory of Organi- development and organization, and a reserved area for
zational Learning and Communication), coordinated materials exchange and sharing (repository). On the
by Professor Giuditta Alessandrini from University of contrary, a discussion area in the public forum was
Roma Tre, has been experimented a specific training dedicated to the impressions and opinions exchange
on CoPs during last three academic years. That was about the progress of the activity.
possible thanks to the starting up of a Community of The interaction by private forums has been very
Practice among people attending the distance Master strong, with an average of hundred messages for each
GESCOM (Knowledge Management and Development group of six to seven people in the space of about three
in Human Resources) directed by Prof. Giuditta Ales- months. The public forum area dedicated to community
sandrini. The activity, coordinated by Prof. Giovanni has collected more than 300 messages in the same
Rosso, expert in Pedagogy of Work and researcher at period. Some groups in the first academic year have
the Regional Institute of Educational Research in La- developed a strong sense of identity that at first fostered
tium, has been composed of several phases according them to chose a name able to identify their group and
to a methodology (Wenger, Smith, & Stuckey, 2005) then to organize an association among people attending
outlined by Etienne Wenger, one of the most important the course of all master editions. This activity has also
experts in this field. permitted in this first phase to create the community
The first phase mainly aimed at creating the commu- domain, that is the area of shared contents and organized
nity and giving rise to identities and sense of ownership. knowledge, typical of CoPs.
In fact a community is not a community of practice On the contrary, the second phase aimed at achieving
without the following three features (Wenger, 2001): the practice by studying the cases suggested by tutors
or discussing specific situations linked to the work
1. An identity coming from interests sharing and experience of people attending the course and that
above all from its adherents devotion and loyalty have been proposed by the participants. In this phase
(commitment) towards community; in these condi- people attending the course have been also stimulated
tions the community obtains a collective expertise to have, depending on the context and their expertise,
and its members learn from each other. different roles (coordinator, mediator, novice) so that
2. An interaction within the community carried on they could experiment the mechanism of the legitimate
by discussions, activities in common, mutual help. peripheral participation.
The interests sharing is a necessary condition but By way of an example we describe briefly a proposed
it is not enough so that a community of practice case regarding the difficulties into which a hypothetical
can exist: the interactive aspect is crucial and the Eng. Pressi runs, supporter of an innovative manage-
engagement in joint activities has to be shared ment where there is much regard for workers training
even if it can be discontinuous. and development needs, during his role of human re-
3. The presence of resources and shared practices sources manager in a conventional company, managed
as a result of the non-stop informal and dialecti- by its owners, where the only way to stimulate workers
cal comparison of the personal experiences at the has always been the recourse to premium pays. Eng.
community disposal. The development process Pressi has organized training interventions and meet-
of these resources can also be carried on uncon- ing chances (indoor gym for employers, social trip for
sciously and unintentionally, but it can simply start workers), but his initiatives have not achieved the result
up spontaneously thanks to the social relations expected of higher personnel productivity.
among the other members of the community. The proposed incitement has opened a lively debate
among people attending the course who have interact
In order to stimulate people attending the course exclusively online, in forum, using the repository for
and arouse involvement and a sense of ownership to sharing those materials used as a support of each theory.
community, group tasks have been proposed, chosen In this second phase, in order to make the interaction
every year in a different field of masters curriculum. conditions closer than those of a real CoP, people at-
792
University Training on CoPs
tending the course have been divided in groups of 10-12 One of the analysis and debate proposals for next
units each. Some people with a direct knowledge of the academic year is going to deal with the organizational U
subject due to their work history had the experts role welfare, because it is a fundamental element for the
whereas the others behaved as apprentices, because quality of life in the working environment.
their knowledge was only theoretical and achieved
thanks to the master specific modules.
During the degree thesis preparation followed by conclusIon
Prof. Alessandrini and her collaborators, people attend-
ing the course were given questionnaires regarding their The CoPs subject is becoming more and more important
on-line interaction experience in general (Gabanella as a Knowledge Management tool (Profili, 2004) and
2006) and that specific one of the training on Com- a strategy for organizational learning (Alessandrini
munities of Practice (Lolli, 2007; Sisti, 2006). 2005), whereas studies and training experiences on
Most people attending the course seemed to be satis- CoPs are still scanty.
fied for what they have experimented, declaring that the The innovative aspect of the experience we have
suggested activities have been extremely important to realized does not lie in the attempt to cultivate a CoP as
learn to collaborate at a distance and to interact online a tool for knowledge training or management, but in the
successfully. These competences are very required in purpose to carry out a training in situation on strategies
the work market, but there are not yet specific training to use so that a CoP can rise and be cultivated.
paths to achieve them.
However the answers of the different questionnaires
are not totally superimposable. Gabanellas question- references
naire (2006) included a question about the possibility
to communicate efficaciously at a distance by forum Alessandrini, G. et al. (2005). Manuale per lesperto
which most people attending the course have answered dei processi formativi. Carocci, Rome.
positively. On the contrary, the majority of tested people
have answered negatively to the question dealing with Brown, S. & Duguid, P.(1995). Apprendimento nelle
the possibility to realize a community only by online organizzazioni e comunit di pratiche in Pontecorvo,
interaction (Sisti 2006). Aiello & Zucchermaglio (a cura di) I contesti dellap-
Maybe this contradiction can be explained consider- prendimento, Zanichelli, Ambrosiana.
ing that most people attending the course lived in Rome Calvani, A. (a cura di) (2005). Rete, comunit e cono-
and had the possibility to see each other face-to-face scenza. Erickson, Trento.
with a higher degree of satisfaction.
The more recent degree thesis, that of Lolli, has Engestrom, Y. (1987). Learning by expanding. Helsinki,
verified a high degree of satisfaction about the whole Orienta-Konsultit Oy.
training experience in the field of CoPs that is perceived Gabanella G. (2006), Metodologie di comunicazi-
as innovative and quite useful for future work. one interattiva in ambiente virtuale: un approccio
sperimentale, unpublished degree thesis, University
of Roma Tre.
future developments
Lave, J. & Wenger, E. (1991). Situated learning. Legiti-
The described experience is going to be repeated in mate peripheral participation. New York: Cambridge
the next master editions to construct a specific module University Press.
for training on CoPs. The exigency to train Human Lolli, C. (2007). Comunit di Pratica e Comunicazio-
Resources Managers both in companies and central and ne on-line: il caso master GESCOM, unpublished
local civil service has suggested to determine, for the degree thesis, University of Roma Tre.
practice development phase, more general themes and
not specific issues of several sectors to which people Orr, J., (1996). Talking about machines: An ethnog-
attending the master belong. In fact these people have raphy of a modern job. New York: Cornell University
already settled in the work world. Press Ithaca.
793
University Training on CoPs
Rheingold, H. (1993). The virtual community. Boston: metacommunicative forms are the use of capital letters,
MIT Press. that means speak loud or shout, and the strategic use
of the punctuation marks such as dots or a series of
Rivoltella, P.C. (2003). Costruttivismo e pragmatica
question or exclamation marks (????; !!!!).
della comunicazione on-line. Erickson, Trento.
Knowledge Management: All tools, software and
Rosso, G. (2005). Comunit on-line per la formazione
procedures, to manage the knowledge in an organization
e la professione in Alessandrini G. & al., Manuale per
or community. The term, introduced in 1986 by Karl
lesperto dei processi formativi, Carocci, Rome.
M. Wiig, at first was related to technological aspects
Profili, S. (2004). Il Knowledge Management Approcci of knowledge filing, retrieval and spread, but later
teorici e strumenti gestionali, FrancoAngeli. it included Human Resources training and manage-
ment policy fostering knowledge sharing and spread
Sisti, C. (2006). Comunit di Pratica per lapprendi- within the organization. The knowledge management
mento organizzativo: un approccio sperimentale nel philosophy goes together with the values, loyalty,
Master Gescom, unpublished degree thesis, University cooperation and sharing system, that is at the roots of
of Roma Tre. business culture.
Vygotskij, L.S. (1980). Il processo cognitivo, Borin- Learning Community: A tool of collaborative
ghieri, Turin. learning based on the on-line interaction between stu-
Wenger, E. (2001). Communities of practice: Learning, dents and teachers. The model, suggested by Brown
meaning and identity. Cambridge: University Press. and Campione in the early 1990s borrowing the para-
digm of the research scientific communities, goes by
Wenger, E., Smith, J. & Stuckey, B. (2005). Founda- participants knowledge sharing and use of metacogni-
tions of communities of practice. Retrieved March 13, tive strategies of learning considerations. Teacher has
2008, from http://www.cpsquare.org a support function with his/her disciples, fostering the
peer tutoring and the reciprocal teaching.
key terms Organizational Learning: A field of the knowledge
studies in the theories on organizations that inquires into
Community of Practice: Groups of people who the ways and tools with which an organization learns
share a concern or a passion for something they do and adjusts to the environment. Argyris and Schoen
and learn how to do it better as they interact regularly. considered the fathers of the organizational learning,
You can interact face-to-face or by forum, e-mail, chat define it as a process according to which knowledge
in a spontaneous and self-regulated way and members and experiences of each member in the organization
decide how often and regularly it is better to apply to are codified and stored as common background of the
themselves to that. Obviously it is possible to take entire organization. The term does not stand for learn-
part in several CoPs at the same time and that is why ing organization which, on the contrary, is related to
the structure and the substance of communities evolve the strategies to use in an organization, so that it can
dynamically. The term was coined by J. Lave &E. learn continuously and successfully.
Wenger in the late 1980s.
Virtual Community: A social aggregation spring-
Computer-Mediated Communication: A par- ing out of on-line interaction, on Internet, by forum
ticular form of interpersonal communication where or e-mail, of groups of people sharing a concern and
participants interact at a distance by computer, sharing usually having no face-to-face contacts. This kind of
textual messages synchronously (chat) or asynchro- interaction simply aims at knowledge and opinions
nously (forum or e-mail). To counterbalance the lack sharing, unlike CoPs where the forming of shared
of nonverbal elements of communication and their practices occurs. According to Rheingold (1993) the
metacommunicative content, graphic elements repre- community exists when the public discussions last so
senting emotions or moods, called emoticons or smiley, long and with an emotive participation to create a net
are used. The most widespread ones are :-) to indicate of personal relationships.
happiness, :-( for sadness, ;-) for Im joking. Other
794
Section: Context ICT 795
1. Terminology: Students cannot describe geo- 1. Integrated learning environments: The de-
graphic characteristics using geographic terminol- sign and implementation of integrated learning
ogy (Harwood & Jackson, 1993; Keliher, 1997; environments involving active participation of
Golledge, 2005). the students is of major importance. Specific
2. Interpretation: There are misconceptions and didactic goals and learning activities, as well as
difficulties in the interpretation and explanation the elimination of cognitive overload resulting
of geographic characteristics and phenomena. from the huge volume and density of information
This is quite often observed among elementary are also important elements.
students (Schee et al., 1992; Neighbour, 1992; 2. Diversity in expression: Variety in the way
Livni & Bar, 1998; Pedersen et al., 2005). students express themselves beyond the verbal
3. Language: There is a difficulty for students to method is proposed, both for the construction
express themselves verbally, especially using of geographic knowledge and for evaluation
geographic terminology. Pupils perform better purposes.
using alternative methods, such as sketching 3. Experience enhancement: The huge space and
geomorphologic evolution. There is not a problem time scales concerning geographic phenomena
in perception, but rather in the usage of language are the main cause of misconceptions. Realistic
(Harwood & Jackson, 1993; Keliher, 1997; representations with natural semantics as well
Gobert, 2000; Golledge, 2005). as different spatial and temporal scales appear
4. Symbols: Misconceptions and difficulties arise to offer a solution for the difficulties in physical
from the frequent use of symbols for geographic geography teaching and learning.
characteristics rendering. Symbols mainly con-
cern the color attribution of hypsometric levels, Information and communication technologies (ICT)
discrimination between mountains, hills, valleys support integrated learning environments, diversity in
and plains, catchment basins and erosion levels expression, and experience enhancement.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Using Dynamic Visualizations to Enhance Learning in Physical Geography
This article presents a critical review of the ICT Nellis (1994) and Keiper (1999) reported on the
used in physical geography learning. It also proposes difficulty in GIS use at elementary level. Even for
interactive dynamic visualizations with an example on university students the results were not encouraging
the phenomenon of erosion, and presents the results of when they were taught spatial skills using GIS (Chen,
a qualitative empirical research involving elementary 1998). The same problems were found by OKelly
school pupils. (2000) and Lloyd (2001) in all educational levels.
Huang et al. (2001) spotted the problems with GIS
in their lack of three-dimensional visualization and
Ict In physIcal geography interactivity. Kerski in his survey of 1520 high schools
teachIng that use GIS software reported that the effectiveness of
GIS in teaching and learning is limited (2003). Positive
Computer assisted instruction and learning (CAI, CAL) learning outcomes reported only recently by Shin in her
have been applied to geography education for more study with fourth grade students. The author found that
than 30 years. Integrated educational applications were using GIS with a well designed instructional module
developed during the nineties, with the first positive helps students improve their geographic knowledge
learning outcomes appearing only recently. and map skills (2006).
The main reasons are the late technological boom Almost all the researchers propose constructivism
in graphics and spatial representations, and the delayed as the pedagogical support concerning the use of GIS
development of interactive computer-based educational in education, proposing authentic learning activities. It
environments dedicated to geographic knowledge con- seems that GIS are difficult to introduce in education
struction. and offer a limited method of geographic information
We believe that physical geography is a domain representation for knowledge construction and meta-
of special interest for the design of CAI and CAL cognitive skills acquisition.
applications, exploiting spatial technologies and high
resolution graphics. Various types of ICT are proposed Internet Tools and Applications
for students motivation and active participation in the
didactic process. Internet, Web sites and portals are a huge resource of
Regarding the evaluation of CAI and CAL systems dynamic information. Virtual universities, geological
for geography teaching, the results are poor and mainly institutes, meteorological stations and satellites are some
concern university students. A worldwide empirical of the resources for geographic information. Their im-
research showed that the use of ICT in Geography edu- mediate exploitation in the educational process is often
cation was limited, whilst featuring their effectiveness difficult, since the material is not provided through an
in geography teaching and learning (Gerber, 2001). educational context.
This is also highlighted by the recent published work Suthren (1998) proposed the replacement of educa-
(Morgan & Tidmarsh, 2004; Golledge, 2005; Pedersen tional geomorphologic posters with virtual represen-
et al., 2005; Shin, 2006 and references therein). tations published in web pages. Although the author
The purpose of the review that follows is the search pointed out the exploitation of ICT in cases where other
of the proper technological approach for the design of media are not appropriate, he simply transferred geo-
an integrated computer-based learning environment. graphic information from a traditional to an electronic
Thus, the research papers are classified according to the format. Hill and Solem (1999), Hurley et al. (1999) and
type of technologies used in geography education. Taylor (2000) summarized the value of the Internet as
an environment for up to date content delivery, online
geographic Information systems hypermedia context, interactive evaluation, tool for
communication and collaborative learning. The authors
Geographic information systems (GIS) provide a power- proposed online collaborative learning environments
ful environment for the management and presentation based on social constructivism. Harrison et al. in their
of geographic information using different levels for the large scale study on the use of ICT and its relationship
representation of different types of information. with performance in examinations reported a relatively
796
Using Dynamic Visualizations to Enhance Learning in Physical Geography
high usage of Internet to find geographic information Virtual field trips have been proposed and used by
(2004). many researchers and educators as an alternative ap- U
In general, approaches using the Internet as a tool proach to field work. Moore (1997) combined virtual
for geography teaching have a technocratic point of field trips with multimedia content and geographic
view, emphasizing technologies and tools rather than data bases and found positive learning outcomes with
pedagogy and instructional design. Geography students. Hurst (1998) with a similar ap-
proach had no such evidence. Stainfield et al. (2000)
Hypermedia Environments proposed interactive virtual field trips, temporal and
spatial modelling, without, however, presenting any
Krygier et al. (1997) developed a hypermedia applica- result from empirical studies.
tion for geography and earth sciences teaching based on
linked multiple representations of information such as Simulations and Visualizations
text, maps, tables and graphs. Their proposal followed
the general guidelines for hypermedia educational Simulations and visualizations in earth sciences teach-
software without special mention of geographic educa- ing have been proposed since 1997 (Mitas et al., 1997).
tion principles. Kraak and van Driel (1997) proposed The poor learning outcomes observed, are mainly due
hypermaps, multimedia systems with geographic refer- to the lack of didactic transformation of the scientific
ences. Results from the use of hypermedia software in knowledge, as well as the use of symbols (Edelson and
geography education have been published by Boyle et Gordin, 1998; Friedman & diSessa, 1999). Simulations
al. (1997). Technology proved to be strong motivation presenting geographic information through numerical
for 54 geography students who developed a positive data and graphs gave no positive learning outcomes
attitude towards ICT, but the learning outcomes were (Pinto et al., 2000; Renshaw & Taylor, 2000). Marlino
limited. Recently, Cooshna Naik and Teelock, in a (2001) has proposed visualizations of natural phenom-
study with pupils aged 8-10, reported positive results ena, without reporting any learning outcomes. Refer-
on their attitude towards a hypermedia application but ences regarding realistic visualizations using natural
not on learning outcomes (2006). Although pictures of semantics without symbols have not been found, except
any kind such as illustrations, photographs, animation, the positive learning outcomes reported by Bellos et al.
video, etc play an important role in physical geography, (2003) who exploited visualizations and virtual environ-
there is no much work on educational hypermedia ap- ments representing real and imaginary landscapes.
plications. Overall, a theoretical goal of contributing to Several technologies and approaches have been
a cognitive theory of how students learn from multiple designed for physical geography teaching and learn-
representations and a practical goal of contributing to ing. The main problem is the lack of empirical studies
the design of effective multimedia instruction have for the evaluation of this software and the absence of
to be set in order to reach positive learning outcomes results in terms of learning outcomes. The lack of a
(Mayer, 2002). proper methodology for empirical studies in geography
education had been noted since 1992 (Schrettenbrunner,
virtual environments 1992), confirmed in 1999 (Boehm & Petersen, 1999) and
2000 (Welford & Fouberg, 2000) and continues until
Virtual reality technologies offer a new context for the recently (Cooshna Naik & Teelock, 2006). Although
development of educational environments, based on ICT support integrated dynamic environments, diversity
three dimensional spatial representations. An educa- in expression, and experience enhancement, it seems
tional virtual environment is the virtual environment that the problems posed by terminology, interpretation,
that has one or more educational objectives, provides language, and the use of symbols are not yet sufficiently
users with experiences they would otherwise not be faced by any of the above approaches.
able to experience in the physical world and redounds It seems that todays proposals of ICT in geography
specific learning outcomes (Mikropoulos, 2006). education are in accordance with Freemans proposals
Mikropoulos (1996) designed an integrated envi- (1997), which are:
ronment for physical geography teaching combining
virtual environments, GIS and multimedia content.
797
Using Dynamic Visualizations to Enhance Learning in Physical Geography
Resources for content retrieval motivate the learner through multiple representations
Real situations modelling tools in order to make the relationship between the param-
Tools for enquiry learning eters obvious to them. The results of a simulation can
Communication tools be represented through a variety of ways, mainly as
Tools for measurement of natural phenomena. numerical data and graphics. Simulations are powerful
tools in the learning process through visualizations,
We believe that these have to be integrated in edu- defined as optical representations of information and
cational environments with certain didactic goals and mental images. Optical hermeneutic experimentation
learning activities. Taking into account all the above, as is what we mean by educational visualizations. Con-
well as the lack of positive learning outcomes from the sequently, we argue that animations that are not based
ICT approaches in geography teaching, we propose the on modelling and simulation processes do not have a
use of visualizations in physical geography learning. great value within the learning process.
The visualizations we propose follow the basic
principles that are accuracy, representativeness, visual
vIsualIzatIons In physIcal clarity and interest (Sheppard, 2001).
geography learnIng Our visualizations also incorporate the following
attributes which we believe are of greatest importance
There are two main difficulties in physical geography in the learning process:
teaching and learning for pupils and students; the use
of symbols for the representation of geographic infor- Natural semantics: Visualizations are realistic
mation through various media and the static character representations without the use of symbols.
of media. Researchers propose dynamic means for the They represent the natural terrain together with
study of geographic phenomena in space and time, hydrography, flora and other factors affecting the
without the use of symbols (Siegburg, 1987; Schee landscapes evolution
et al., 1992; Rose, 1996). They propose geographic Spatial scale alterations: Geographic character-
information visualizations based on simulations, rep- istics and phenomena are represented in small,
resenting characteristics and phenomena in a realistic screen size, scale
way. As the bibliographic review has shown, there are Temporal scale alterations: Long geological
no references regarding the design, development and eras are integrated in small time periods under
evaluation of computer-based educational environments the users control
supporting the above proposals. Exploration and investigation of alternative
The main component, as in any didactic process, realities: Students experience cognitive conflict
is the didactic transformation. The proper didactic and reach conclusions by inducing different sce-
transformation, proposed in this article, is the simula- narios for the evolution of phenomena
tion-based realistic dynamic representation of geomor- Experience enhancement. New experiences:
phologic characteristics and phenomena. Visualizations enhance, or provide new experi-
We define a simulation as the representation of an ences concerning phenomena which are impos-
object, a natural or social phenomenon by software, sible to study through field work because of their
where the user may manipulate conditions and pa- huge spatial and long temporal scales
rameters for study purposes. A simulation causes the Interactivity: Students may change parameters
machine to respond mathematically to data and changing involved in the simulated phenomena, investigate
conditions as if it (the machine) was the same object natural processes, foresee consequences and
or phenomenon. compare environments
A simulation in the learning process places the Immediate feedback: Students immediately
learner in situations similar to reality, providing real- discover the results of their actions
time feedback to questions, decisions and actions. A Multiple representations: The combination of
simulation has to be interactive giving the capability for multiple representations such as visual and verbal,
changing those parameters that are important accord- contributes to the learning process
ing to the didactic transformation. A simulation has to
798
Using Dynamic Visualizations to Enhance Learning in Physical Geography
Reusability: Visualizations may be integrated landscapes without symbols such as colour codes. An
in more than one context, depending on learning empirical study with 13 pupils investigates the role of U
styles or needs the dynamic visualizations in their ideas development
Hypothesis formation: Dynamic visualizations and learning.
provide a tool for hypothesis formation related to
the geologic history of the simulated places
Evaluation of geographic theories: The critical landforms: educatIonal
attitude towards computer models allows students software for physIcal
to discriminate between models and reality and geography
acquire a scientific attitude
Hypermedia environment: The integration of The bibliographic review presented in the previous
visualizations in hypermedia environments com- sections showed that although elementary pupils are
bining multimedia content and learning activities, interested in natural phenomena and have misconcep-
gives direct access to recourses for the support of tions about them, there are no references to the effect
the learning process. of running water on the earths surface. Moreover, there
are no references regarding the design of educational
Dynamic visualizations are more valuable in the software on phenomena such as erosion and landform
learning process when they involve multiple repre- creation.
sentations, especially when they combine visual and In a previous empirical research, we studied pupils
oral information. Learners are more likely to engage ideas about geographic phenomena (Bellou et al.,
in productive cognitive processing when correspond- 2001). The results showed that the majority of children
ing images and words are presented at the same time. aged 9-11 had a very limited understanding of terrain
Simultaneous presentation increases the chances that evolution. Children mainly faced difficulties in the
corresponding images and words will be in working following areas:
memory at the same time, thereby enabling the learner
to construct mental connections between them. This 1. It was difficult to accept the idea that the terrain
cognitive processing should result in deeper under- can dramatically change, so that a canyon may
standing (Mayer, 2002). one day be transformed into a valley
There are two tensions on the proper role of model- 2. They could not represent the different phases of
ling in the didactic process. One proposes the use of the evolution of the landscape in time
already-constructed models of phenomena for dem- 3. They could not accept the causes of the formation
onstration purposes, while the other forces students of riverbed and Delta.
to construct their own models to describe phenomena
(Wilensky, 2003). The pure constructivist point of In order to overcome childrens difficulties, we
view is the later one, but there are other intermediate have designed and developed landforms, an educa-
states between the two above. One of these, exploited tional environment comprising visualizations of the
by Wilensky (2003) and proposed in this article, is the phenomena under study. The software has three main
use of pre-constructed visualizations as investigative parts, dynamically presenting the transformation of
tools. They involve changeable parameters, allow the a canyon into a valley, the erosion of a riverbed and
user to modify settings and conditions and study the the formation of a Delta. Each part consists of three
models behaviour. Two advantages of this approach sections. The first involves visualization with a time
are time saving and the necessity of low level computer bar for moving forward or backwards in time or even
literacy by the students. freezing evolution at will. The second combines the
In the following, landforms, an integrated educa- visualization with an oral presentation describing the
tional environment that involves visualizations concern- phenomenon under study. The last section consists of
ing the effect of running water, that is the phenomenon interactive learning activities some of which include
of erosion, is presented. The visualizations represent visualizations.
real phenomena using natural semantics and users The visualizations were created using four different
may observe, manipulate and perceive the evolution of software packages. Firstly, digital landscapes based on
799
Using Dynamic Visualizations to Enhance Learning in Physical Geography
real data including the geographic characteristics under Figure 1. Three screenshots from the visualization
study, were created using a package for the creation of representing the formation of a delta. Top: initial
virtual landscapes (VistaPro 4.0). The landscapes were landscape condition, middle and bottom: intermediate
processed in image processing software in order for the and final landforms.
appropriate landforms to be constructed. The landscapes
successively manipulated by VistaPro in order to give
a series of digital landscapes representing a realistic
evolution of the landforms due to the effect of running
water. After that, the digital landscapes were imported
into morphing software in order for the temporal evolu-
tion of the landforms to be created in a form of dynamic
visualizations. Finally, the visualizations representing
successive time periods were connected using video
processing software, to allow the final visualization to
be produced. The result was in two forms. The first was
the visualization with the time bar, for the user to move
in time. The second was the visualization combined
with oral representation, a narration about the terrains
transformation. Figure 1 shows three screenshots from
the visualization representing the formation of a river
Delta, caused by erosion.
Figure 2 shows one of the interactive learning activi-
ties. The pupil manipulates and observes two visualiza-
tions simultaneously, trying to discover the factor that
causes greater erosion. This specific example shows
two visualizations representing the same landscape
with (top) and without (bottom) plant coverage.
The educational software is integrated in a hyper-
media environment involving a glossary of geographic
terms as a reference. Landforms is easy for teachers
and pupils to use, without having any special expertise
in computers.
the study
Figure 2. A learning activity concerning the plantation as one of the erosion factors. Both visualizations represent
the same landscape. The two upper screenshots show the initial and final conditions of the landscape without U
plant coverage. The two bottom screenshots show the initial and final conditions of the same landscape covered
with rich plantation.
801
Using Dynamic Visualizations to Enhance Learning in Physical Geography
In a transitional stage, the pupil inadequately uses All pupils found their interaction with the software
a relevant datum. interesting, declaring no tiredness at all.
2. Unistructural: The pupil selects one relevant We have categorized pupils answers into the first
datum and closes on that. four SOLO levels, while we cite some of them below.
In a transitional stage, the pupil selects two rel- We present each pupils answer after the initial observa-
evant but inconsistent data. tion of the images and then after their interaction with
3. Multistructural: The pupil selects two or more the visualization. The question each pupil was asked
relevant data, uses them inconsistently and reaches was What do you think is presented here? Why is
an alternative conclusion. this happening?
n a transitional stage, the pupil recognizes incon-
sistencies but can not resolve them. prestructural to multistructural level
4. Relational: The pupil uses most or all relevant answers
data, integrates it with a relating concept and
reaches the right conclusion. Georgia: The river is shortening because the grass
5. Extended abstract: The pupil uses abstract grows around the lake and the ground starts chang-
principles that show the specific example is just ing.
one of many possible results.
The pupils answer was classified at the 1st prestruc-
We have used SOLO taxonomy for the data analysis tural level, since her description was extraneous to the
of our qualitative study, which resulted in different hier- matter in hand and focused on irrelevant details.
archy levels expressing the development of knowledge
construction. An additional reason for using the SOLO Georgia (after interaction): In the beginning the
taxonomy was its application in geography teaching mountains were big and afterwards they started low-
(Biggs & Collis, 1982). ering. The river was made by the rain and a Delta
Each pupils answer belongs to a level according appeared.
to the following three components:
Georgias answer was classified at the 3d multi-
1. Detection of geographic characteristics and fac- structural level, since she observed the changes in the
tors affecting the phenomenon under study landscape, as well as the Delta formation. She neither
2. Association of characteristics and factors connected the factors affecting the phenomenon, nor
3. Factual conclusion according to the above com- gave an adequate explanation.
ponents.
Vasso: As time passes some stones get out of wa-
We have detected the first four levels among the ter.
pupils answers, showing their development of under-
standing when they first observed the static images and Her answer was classified at the 1st prestructural
later after interacting with the visualization. level. It could be at a transitional stage towards the
unistructural level, since Vasso observed a datum, but
did not consider the factors connected with the topic.
results Thus, she did not make any connection and did not
explain any reason.
The results presented in this article concern only one
part of the software, that of the formation of a Delta. Vasso (after interaction): As time passes the water
Figure 1 shows three screenshots from the dynamic runs, it washes stones out and a Delta is made.
visualization. As the time passes, erosion caused by
rainfalls and running water alters the landscapes mor- Vassos answer was classified at the 3d multistruc-
phology and the rivers shape. The river transfers the tural level, since she reported some facts and reasons
eroded materials such as clay, slit and sand, deposits but did not explicitly explain the landscapes changes
them at its estuary, and a Delta forms. and the way the Delta is formatted.
802
Using Dynamic Visualizations to Enhance Learning in Physical Geography
unistructural to multistructural level Tom chose certain relevant data, reported on them
answers but he did not connect them. He used some ambiguous U
expressions concerning the outfall of the water and he
Sotos: Water found some obstacles changed its course gave a description without any explanation. So, his
and the Delta was formed. answer was classified at the 3d multistructural level.
This pupils answer was classified at the 2nd unis- Tom (after interaction): The area was firstly eroded
tructural level, since he observed one datum, the Delta, because of rain and snow. Materials were moved away
but did not associated it with erosion. by the river and a Delta was created during their de-
position at sea.
Sotos (after interaction): Heavy rains washed rocks
and clay out and a Delta was made. Tom used most of data in a generic way, associated
it in a consistent way, gave explanations and presented
Sotos answer was classified at the 3d multistructural the relations between cause and result. This pupil, after
level. It could be at a transitional stage between multi- the interaction with the visualization, constructed an ar-
structural and relational, since he related the action of gument and reached a scientifically correct conclusion.
water to the Delta formation, but without giving any His answer was classified at the 4th relational level.
explanation.
Simon: It shows the changes coming from the rivers
unistructural to relational level water and the Delta formation.
answers
Simons answer was classified at the 3d multistruc-
Thanos: A Delta formation is presented. The run- tural level, since he described the phenomenon without
ning water has found some obstacles. So its direction explaining the way the changes occurred.
changed.
Simon (after interaction): Water washed some materi-
This pupils answer was classified at the 2 unis-
nd als out, and afterwards deposited them at the Delta.
tructural level, since he chose one relevant datum and This way, the land expanded towards the sea.
stopped at that. He did not associate data and gave no
satisfactory explanations. Simons answer was classified at the 4th relational
level after his interaction with the visualization, since
Thanos (after interaction): The soil is washed out be- he cited the facts in their order, associated them and
cause of heavy rainfall and when the river reaches sea, gave explanations.
it leaves some of the particles and loose stones.
Figure 3 shows pupils SOLO levels concerning their
After the interaction with the visualization Thanos ideas on Delta formation both after the observation of
answer was classified at the 4th relational level, since the images and after the interaction with the dynamic
he reported the sequence of the facts, their reasons and visualization.
he constructed a complete argument. There was a shift in pupils answers towards higher
SOLO levels, after the interaction with the visualization.
It seems that interactivity and multiple representations
multistructural to relational level
were strong attributes that contributed to reasoning,
answers
knowledge construction and meta-cognitive skills.
In order to by-pass the pupils difficulties in language
Tom: Mountains started lowering. A river falls into
and the use of proper geographic terms, we studied
the sea. The river washed mud out and it finally divided
their sketches showing the evolution of a landscape and
into four parts.
the formation of Delta. The geographic characteristics
the pupils had to change were the mountains, the river
and the Delta. Eight out of the 13 pupils drew both the
803
Using Dynamic Visualizations to Enhance Learning in Physical Geography
Figure 3. SOLO levels concerning pupils ideas about erosion and Delta formation, after their observation of
static images and after their interaction with the visualization.
morphology and the Delta formation explicitly. The The pupils ideas improved after their interaction
remaining five represented either the changes of the with the dynamic visualization and multiple represen-
mountains and the river, or the Delta formation. All the tations. Their answers were shifted to higher SOLO
pupils managed to overcome their language difficul- levels, indicating knowledge construction. Initial
ties and express themselves by drawing the landforms ideas and misconceptions concerning the causes for
evolution. Although sketches are not a simple direct Delta formation diminished. The pupils ideas were
representation of mental images, they are considered shifted to scientifically accepted concepts that are that
as an effective tool to interpret the pupils internal running water and river flow were the main causes for
representations and have been used to assess students the anaglyph changes and Delta formation. There was
spatial concepts (Shin, 2006). not even one pupil who avoided answering. The pupils
recognized all the geographic characteristics and their
evolution in time. They mainly referred to terms from
conclusIon their everyday experience, which are integrated in the
cognitive categories reported by Mark et al. (1999).
This article proposes the use of dynamic, interactive The pupils meta-cognitive skills were activated during
visualizations with natural semantics for Physical their involvement with the interactive learning activities
Geography learning. The author designed and devel- that they all completed correctly.
oped the educational software landforms, involving Positive learning outcomes after the pupils interac-
dynamic visualizations in a hypermedia context. The tion with the visualization were also confirmed by a
article also presents results from a case study investi- series of the successive sketches they made, showing
gating 13 pupils ideas on Delta formation both after the landscape evolution and the Delta formation. This
their observation of static images and later after their activity was designed for the children to be able to
interaction with the dynamic visualization. To our present their ideas without the geographic terminology
knowledge, this is the first work presenting empirical which is difficult to use (Bartlett, 1999). These results
results from geographic dynamic visualizations repre- are in coherence with those reported by Bartlett with
senting phenomena in a realistic way without the use of students 13-16 years (1999) and by Gobert with pupils
symbols, following the proposals of many researchers 10-12 years old (2000).
(Siegburg, 1987; Schee et al., 1992; Rose, 1996). The results of the present study are consistent with
those of others such as Friedman and diSessa (1999)
804
Using Dynamic Visualizations to Enhance Learning in Physical Geography
805
Using Dynamic Visualizations to Enhance Learning in Physical Geography
visualization. Journal of Science Education and Tech- Keiper, T. A. (1999). GIS for Elementary Students: An
nology, 8(3), 175-195. Inquiry into a New Approach to Learning Geography.
Journal of Geography, 98, 47-59.
Gerber, R. (2001). The state of geographical education
in countries around the world. International Research Keliher, V. (1997). Childrens perceptions of nature.
in Geographical and Environmental Education, 10(4), International Research in Geographical and Environ-
349-362. mental Education, 6(3), 240-243.
Gobert, J. D. (2000). A typology of causal models for Kerski, J. (2003). The Implementation and Effective-
plate tectonics: inferential power and barriers to under- ness of Geographic Information Systems Technology
standing. International Journal of Science Education, and Methods in Secondary Education. Journal of
22(9), 937-977. Geography, 102, 128-137.
Golledge, R. G. (2005). Reflections on Procedures for Kraak, M. J., & van Driel, R. (1997). Principles of
Learning Environments without the Use of Sight. hypermaps. Retrieved May 28, 2002, from www.itc.
Journal of Geography, 104, 95-103. nl/~kraak/hypermap/Hypermaps.html.
Gregg, Sr. M. (2001) River Views of Beginning Pre- Krygier, J. B., Reeves, C., DiBiase, D., & Cupp, J.
service Teachers: Content Knowledge Use. Journal of (1997). Multimedia in Geographic Education. Journal
Geography, 100(2), 61-68. of Geography on Higher Education, 21(1), 17-39.
Harrison, C., Lunzer, E. A., Tymmsw, P., Fitz-Gib- Leung, C. F. (2000). Assessment for learning: Using
bonw, C. T., & Restorick, J. (2004). Use of ICT and SOLO taxonomy to measure design performance of
its relationship with performance in examinations: a design & technology students. International Journal
comparison of the ImpaCT2 projects research findings of Technology and Design Education, 10, 149-161.
using pupil-level, school-level and multilevel model-
LeVasseur, M. L. (1999). Students knowledge of ge-
ling data. Journal of Computer Assisted Learning, 20,
ography and geography careers. Journal of Geography,
319337.
98(6), 265-271.
Harwood, D., & Jackson, P. (1993). Why did they
Livni, S., & Bar, V. (1998). Starting Abilities Required
build this hill so steep?: problems of assessing primary
to Learn Mapping Skills Related to Physical Maps.
childrens understanding of physical landscape features
International Research in Geographical and Environ-
in the context of the UK National Curriculum. Interna-
mental Education, 7, 50-66.
tional Research in Geographical and Environmental
Education, 2(2), 64-79. Livni, S., & Bar, V. (2001). A Controlled Experiment
in Teaching Physical Map Skills to Grade 4 Pupils
Hill, A. D., & Solem, M. N. (1999). Geography on
in Elementary Schools. International Journal in
the Web: Changing the Learning Paradigm? Journal
Geographical and Environmental Education, 10(2),
of Geography, 98, 100-107.
149-167.
Huang, ., Jiang, ., & Li . (2001). An integration of
Lloyd, W. J. (2001). Integrating GIS into the Under-
GIS, virtual reality and the Internet for visualization,
graduate Learning Environment. Journal of Geography,
analysis and exploration of spatial data. International
100, 158-163.
Journal of Geographical Information Science, 15(5),
439-456. Marlino, M. R. (2001). Visualization in undergraduate
geoscience science education: what do we really know?.
Hurley, J. M., Proctor, J. D., & Ford, R. E. (1999).
Computers & Geosciences, 27, 497-498.
Collaborative Inquiry at a Distance: Using the Internet
in Geography Education. Journal of Geography, 98, Mark, D. M., Smith, B, & Tversky, B. (1999). Ontol-
128-140. ogy and geographic objects: an empirical study of
cognitive categorization. In C. Freksa & D. M. Mark
Hurst, S. D. (1998). Use of virtual field trips in teach-
(Eds.) COSIT99, LNCS 1661 (pp. 283-298), Berlin:
ing introductory geology. Computers & Geosciences,
Springer-Verlag.
24(7), 653-658.
806
Using Dynamic Visualizations to Enhance Learning in Physical Geography
Mayer, R. E. (2002). Cognitive theory and the design of cognitive load theory to improve the learning of spa-
of multimedia instruction: An example of the two-way tial information. International Research in Geographi- U
street between cognition and instruction. New Direc- cal and Environmental Education, 2(2), 80-91.
tions forTeaching and Learning, 89, 55-71.
Renshaw, C. E., & Taylor, H. A. (2000). The educational
Mikropoulos, T. A. (1996). Virtual Geography. VR in effectiveness of computer based instruction. Computers
the Schools, 2(2), 3-7. and Geosciences, 26, 677-682.
Mikropoulos, T. A. (2006). Presence: A unique char- Rose, G. (1996). Teaching visualised geographies:
acteristic in educational virtual environments. Virtual towards a methodology for the interpretation of visual
Reality, 10(3-4), 197-206. materials. Journal of Geography in Higher Educa-
tion, 20(3), 281-294.
Mitas, L., Brown, W. M., & Mitasova, H. (1997). Role
of dynamic cartography in simulations of landscape Schee van der, J., Dijk van, H., & Westrhenen van, H.
processes based on multivariate fields. Computers and (1992). Geographical procedural knowledge and map
Geosciences, 23(4), 437-446. skills. In H. Schrettenbrunner & J. van Westrhenen
(Eds.), Empirical research and geography teaching
Moore, K. (1997). Interactive Virtual Environments for
(pp. 91-113), Amsterdam: NGS.
Fieldwork. Paper presented at the British Cartographic
Society Annual Symposium, Leicester, www.geog.le.ac. Schrettenbrunner, H. (1992). Empirical didactics
uk/mek/VirEnv.htm. of geography history of a working group. In H.
Schrettenbrunner & J. van Westrhenen (Eds.), Em-
Morgan, J., & Tidmarsh, C. (2004). Reconceptualising
pirical research and geography teaching (pp. 3-18),
ICT in Geography Teaching. Education, Communica-
Amsterdam: NGS.
tion & Information, 4(1), 177-192.
Sheppard, S. R. J. (2001). Guidance for crystal ball
Neighbour, . (1992). Enhancing geographical inquiry
gazers: developing a code of ethics for landscape
and learning. International Research in Geographical
visualization. Landscape and Urban Planning, 54,
and Environmental Education, 1(1), 14-23.
183-199.
Nellis, M. D. (1994). Technology in Geographic Edu-
Shin, E. (2006). Using Geographic Information System
cation: Reflections and Future Directions. Journal of
(GIS) to improve fourth graders geographic content
Geography, January/February, 36-39.
knowledge and map skills. Journal of Geography,
Nordstrom, K. F., & Jackson, L. (2001). Using paintings 105, 109-120.
for problem-solving and teaching physical geography:
Siegburg, W. (1987). Zum Stellenwert geomorpholo-
examples from a course in coastal management. Journal
gischer Lehr-und Forschungsinhalte im Geographieun-
of Geography, 100, 141-151.
terricht. Geographie und ihre Didaktik, 2, 57-70.
OKelly, M. E. (2000). GIS and educational and
Stainfield, J., Fisher, P., Ford, B., & Solem, M. (2000).
instructional challenges. Journal of Geographical
International virtual field trips: a new direction?. Journal
Systems, 2, 23-29.
of Geography in Higher Education, 24(2), 255-262.
Pedersen, P., Farrell, P., & McPhee, E. (2005). Paper
Suthren, R. J. (1998). Virtual posters and virtual es-
versus Pixel: Effectiveness of Paper versus Electronic
says in geoscience courses. Computers & Geosciences,
Maps To Teach Map Reading Skills in an Introductory
24(7), 665-671.
Physical Geography Course. Journal of Geography,
104, 195-202. Taylor, J. S. (2000). Using the World Wide Web in
Undergraduate Geographic Education: Potentials and
Pinto, V., Rivero, L., & Casa, A. (2000). Teaching
Pitfalls. Journal of Geography, 99(1), 11-22.
oriented geophysical software. Computers and Geosci-
ences, 26, 809-814. Verdi, M. P., & Kulhavy, R. W. (2002). Learning with
maps and texts: an overview. Educational Psychology
Purnell, K. N., & Solman, R. T. (1993). The application
Review, 14(1), 27-46.
807
Using Dynamic Visualizations to Enhance Learning in Physical Geography
Welford, M., & Fouberg, E. H. (2000). Theory and River Delta: A low, watery land formed at the
research in geography education. Journal of Geogra- mouth of a river. It is formed from the silt, sand and
phy, 99, 183-184. small rocks that flow downstream in the river and are
deposited in the delta.
Wilensky, U. (2003). Statistical Mechanics for Second-
ary School: The Gaslab Multi-Agent Modelling Toolkit. Simulation: The representation of an object, a natu-
International Journal of Computers for Mathematical ral or social phenomenon by software, where the user
Learning, 8, 1 41. may manipulate conditions and parameters for study
purposes. A simulation causes the machine to respond
mathematically to data and changing conditions as if it
key terms (the machine) was the same object or phenomenon.
Didactic Transformation: The transformation of SOLO (Structure of the Observed Learning
high level abstraction symbolic codes used for the de- Outcomes): Taxonomy proposed by Biggs and Collis
scription of scientific models, in a way that optimizes (1982) that classifies students understanding in five
their comprehension possibilities in the educational hierarchical levels. SOLO taxonomy is used for the
process. qualitative analysis of empirical data.
Model: A physical or ideal system created to repre- Visualization: Construction of a visual image
sent a physical or ideal system at certain level. in the mind. A graphical representation of data and
concepts.
Natural Semantics: Representations without the
use of symbols.
Optical Hermeneutic Experimentation: Visuali-
zation based on modelling and simulation processes by
contrast to artistic representation.
808
Section: Product ICT 809
Weisi Lin
Nayang Technological University, Singapore
IntroductIon & Kunt, 1998; Chen, Chen, & Liao, 2000; Chen &
Swain, 1999; Chien, Ma, & Chen, 2002; Cucchiara,
Video object segmentation aims to extract different Onfiani, Prati, & Scarabottolo, 1999; Kim, Choi, Kim,
video objects from a video (i.e., a sequence of con- Lee, Lee, Ahn, & Ho, 1999; Kim, Jeon, Kwak, Lee, &
secutive images). It has attracted vast interests and Ahn, 2001; Koller, Weber, Huang, Malik, Ogasawara,
substantial research effort for the past decade because Rao, & Russel, 1994; Li et al., 2001; Li, Tye, Ong,
it is a prerequisite for visual content retrieval (e.g., Lin, & Ko, 2002; Li, Gu, Leung, & Tian, 2004; Liu,
MPEG-7 related schemes), object-based compression Hong, Herman, & Chellappa, 1998; Liu, Chang, &
and coding (e.g., MPEG-4 codecs), object recogni- Chang, 1998; Mech & Wollborn, 1997; Meier & Ngan,
tion, object tracking, security video surveillance, 1999; Mester & Aach, 1997; Neri, Colonnese, Russo,
traffic monitoring for law enforcement, and many & Talone, 1998; Odobez & Bouthemy, 1998; Ong &
other applications. Video object segmentation is a Spann, 1999; Shao, Lin, & Ko, 1998a, 1998b; Toklu,
nonstandardized but indispensable component for an Tekalp, & Erdem, 2000). Fully automatic extraction of
MPEG4/7 scheme in order to successfully develop a semantically meaningful objects in video is extremely
complete solution. In fact, in order to utilize MPEG-4 useful in many practical applications but faces problems
object-based video coding, video object segmentation like limited domain of application, ad hoc approaches,
must first be carried out to extract the required video need of excessive parameter/threshold setting and fine-
object masks. Video object segmentation is an even tuning, and overly complicated algorithms. With current
more important issue in military applications such as level of development of algorithms, in general, only
real-time remote missile/vehicle/soldiers identifica- supervised segmentation approaches (e.g., Castagno et
tion and tracking. Other possible applications include al., 1998; Toklu et al., 2000) are capable of detecting
home/office/warehouse security where monitoring and semantic objects more accurately from video. Super-
recording of intruders/foreign objects, alarming the vised approaches can be found in applications such as
personnel concerned or/and transmitting the segmented studio editing and content retrieval.
foreground objects via a bandwidth-hungry channel Nevertheless, automatic video object segmentation
during the appearance of intruders are of particular is essential and possible for some specific but important
interest. Thus, it can be seen that fully automatic video scenarios like traffic monitoring, video-conferencing,
object segmentation tool is a very useful tool that has and online/mobile security systems. For digital image
very wide practical applications in our everyday life and video storage and transmission, object-based cod-
where it can contribute to improved efficiency, time, ing improves the compression and coding efficiency.
manpower, and cost savings. In low bit rate applications, object segmentation en-
ables transmitting objects of interest in higher quality
and objects of less importance in lower quality (e.g.,
Background allocating smaller number of bits for objects of less
importance or only refreshing them occasionally, as
For segmentation of objects from video sequences, used in sprite-based video coding), while a conventional
temporal and spatial information and their appropriate frame-based video coding scheme would have to suffer
combination have been extensively exploited (Aach & an across-the-board reduction in video quality in order
Kaup, 1993; Bors & Pitas, 1998; Castagno, Ebrahimi, to fit into the bandwidth available.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Video Object Segmentation
The requirements for a practical video object seg- different video object segmentation methods differ in
mentation system to be useful in the above-mentioned how the change detection and the postprocessing are
scenarios are: (a) fully automatic operations; (b) ef- being performed. These have a significant influence on
ficient and fast (preferably real-time) processing; and the actual speed, accuracy, and reliability of the final
(c) robustness with noisy data. Automatic segmentation segmentation results.
is necessary because user intervention is not feasible
for real-time online applications. Appropriate domain
knowledge (e.g., head and shoulder scene is mostly vIdeo segmentatIon:
expected as foreground in video-conferencing) can new and old proBlems
be utilized in the process, besides spatial and temporal
information. Real-time realization is usually needed A general solution is still elusive in practice for au-
for such applications and therefore low computational tomatic video object segmentation due to its well-ac-
complexity is the key. Fast processing itself also aids knowledged inherent difficulties: (i) the difficulty in
in obtaining a better segmentation since frame dif- estimating objects motions and other distinguishing
ference due to the motion becomes too big for good features accurately in order to facilitate the separation
segmentation if a segmentation process fails to catch of differently moving foreground and background
up with the speed of live video camera input (unlike objects; (ii) the inevitable presence of noise/clutters
the case with prestored video sequences). Moreover, that affects accuracy in segmentation; (iii) the effects
the segmentation module in an integrated system may of occlusions and dis-occlusions, causing dis-occluded
need to share the available computing power with regions to be wrongly labeled as foreground (moving)
the video compression and coding module (e.g., Lin, objects; (iv) the lack of generosity and robustness of
Tye, Ong, Xiong, Miki, & Hotani, 1999) which is also an algorithm, especially in the situations in which no
computationally expensive. Furthermore, algorithms human intervention or fine-tuning of the segmentation
developed should be reasonably resilient to noise for parameters is possible; (v) high computational com-
reliable segmentation with live video. Possibilities plexity involved which makes it difficult to design an
can be exploited to incorporate appropriate stationary algorithm that is robust enough to run in real-time for
regions (e.g., human trunk that does not move all the real-life applications; and (vi) for change detection
time) with moving regions (like head and hands in the methods, the stationary background frame obtained is
example) to form a semantic object. nonrobust and not possible to obtain a good stationary
Liu et al. (1998a) describes an object boundary background frame in real-life practical applications.
extraction algorithm based on optical flow that is Spatiotemporal segmentation is more likely to obtain
real-time implemented on a HyperSparc workstation. good segmentation for digital video when compared to
For the more restricted applications, real-time vehicle methods using only motion information because spatial
detection systems have been developed with dedicated features usually provide more information on precise
hardware design (Cucchiara et al., 1999; Koller et al., object boundary. There were many spatiotemporal
1994) and a PC-based platform (Siyal & Fathy, 1995). approaches that have been proposed using change de-
Such systems are based upon interframe difference tection (Aach & Kaup, 993; Cheung & Kamath, 2004;
analysis. Methods using optical flow calculation and Kim et al., 1999; Liu et al., 1998b; Mester & Aach,
other motion parameter estimators are generally too 1997; Neri et al., 1998; Shao et al., 1998b), instead
computationally expensive for economical real-time of motion model/parameter estimation (Bors & Pitas,
PC/DSP implementation. 1998; Li et al., 2001; Liu et al., 1998; Meier & Ngan,
There are various techniques for video object seg- 1999; Odobez & Bouthemy, 1998; Shao, Lin, & Ko,
mentation, but the faster video object segmentation 1998a; Ong et al., 1999) since the former aims at real-
techniques (Aach & Kaup, 1993; Cheung & Ramath, time processing and different motion in a foreground
2004; Kim et al., 1999; Liu et al., 1998b; Mester & object does not need to be distinguished in the targeted
Aach, 1997; Neri et al., 1998; Shao, Lin, & Ko, 1998b) applications (that is, a scene is separated into only
are based on the change detection approach (with and two classes of objects: foreground and background).
without preprocessing to cater for global motion) Temporal information is extracted via change detec-
followed by further postprocessing. However, the tion as simple and straightforward hints of foreground
810
Video Object Segmentation
objects and then spatial features are utilized for more cost. The change detection mask is eroded to alleviate
accurate extraction of object contours. On the balance oversegmentation caused by uncovered areas, and then V
of incorporating multiple features for good segmenta- modified with appropriate morphological operators
tion (Castagno et al., 1998) and fulfilling the real-time (Vincent, 1993) to reduce the noise and holes inside
requirement, the minimum set of the most effective the mask before forming a preliminary object mask to
temporal and spatial features (change due to motion, be passed for spatial refinement. The reference frame
edge, and gradients) has been proposed (Ong, Tye, for change detection can be an immediate previous
Lin, & Etoh, 2002). frame or the stationary background image generated
Change detection is a fast way to extract moving in the initialization phase. The latter approach is able
foreground in video sequences with stationary cam- to solve the problems of dis-occluded regions appear-
eras. However, the change detection method has the ing as part of the segmented moving objects. For the
following drawbacks: (1) the correct threshold used in case in change detection where the reference frame is
detecting interframe difference is not easy to obtain; a stationary background image that has been generated
(2) uncovered areas affect the accuracy of the change in an initialization phase using a simple averaging, it
detection mask; (3) there are usually many holes inside is of paramount importance that there is no motion in
the resultant change detection mask due to the less the images being used to generate the stationary back-
textured areas within a moving object; and (4) object ground image. However, in practice, it is very difficult
contours are not accurate. Correct determination of the or almost impossible to ensure that there is no motion
decision threshold will result in lower error probability during the initialization phase in real-life applications
and thus greater robustness against noise. However, (in many situations where you have no full control over
the thresholds used in change detection are often set the environments, e.g., in traffic monitoring and video
empirically (Kim et al., 1999; Mester & Aach, 1997; surveillance applications).
Shao, Lin, & Ko, 1998b) or determined off-line us- A fast, automatic, and reliable video object segmen-
ing prior knowledge of noise variance of the camera tation algorithm suitable for content-based applications
(Aach & Kaup, 1993). These approaches result in poor has been proposed by Ong, Lin, Tye, and Etoh (2006)
portability of the algorithm and can also be regarded and illustrated in Figure 1. Targeted at the type of sce-
as a kind of user intervention (Castagno et al., 1998). nario with static camera, their algorithm has been shown
As a better approach, the decision threshold can be to perform better than other related work in terms of
estimated online from unchanged regions with live both fault rate and processing speed. Their proposed
video input. However, this is obviously very difficult algorithm may be extended for the cases with camera
in general because the unchanged regions cannot be in motion because dominant motion can be detected
found before performing change detection (in fact, (Kim et al., 1999; Mech & Wollborn, 1997; Shao et
separation of unchanged regions is the very aim of al., 1998a) and change detection can then be performed
change detection). with the current frame and the motion-predicted frame.
Ideally, the video object segmentation scheme should Nevertheless, the above extension of the algorithm of
have a method of adaptively determining the threshold Ong et al. (2006) will increase the computational costs
for fully automatic change detection (Neri et al., 1998) by quite a lot and render real-time purely software-based
and also a much more efficient and robust criterion for implementation difficult.
online real-time manipulations (Ong et al., 2002). Ong
et al. (2002) proposed a method where proper domain
knowledge is utilized to choose the most probably future trends
stationary pixels (MPSPs) for the said estimation with
at least 50% for the outlier tolerance in the candidate To achieve fast/real-time, automatic, robust, and reli-
set of pixels. Thresholding here is performed at each ably accurate video object segmentation suitable for a
pixel difference instead of a neighborhood of pixel dif- wide range of real-life applications, such video object
ference (in contrast to the change detection processes segmentation schemes are expected to have several
in Kim et al., 1999; Liu et al., 1998b; Mester & Aach, characteristics:
1997; Neri et al., 1998; Shao et al., 1998b) in order to
eliminate the blurring effect and reduce computational
811
Video Object Segmentation
Figure 1. Overall block diagram for the video object segmentation algorithm proposed by Ong et al. (2006)
Single-pixel Gradient
Threshold Change
CDM
Reference Moving-edge Morphological
Frame
Connected-
component
Labeling
POM
Temporal
S Filling-in
Process
Shortest-path
Linking
FOM
1. Fast, robust, and reasonably accurate and reliable and segmentation processes completely on each
motion estimation (for applications which require individual frame
segmentation of differently moving objects, such
as in military applications) or adaptive change To achieve real-time realization towards online
detection technique (for applications where the camera inputs, it seems that the change detection ap-
video only requires to be segmented into just proach is the choice for temporal segmentation due to
foreground and background objects) its efficiency, and direct single-pixel thresholding is
2. Spatial refinement to the motion mask (obtained used for further speedup and for avoidance of blurring
from the above step) by incorporating spatial effect. The algorithm should be fully automatic since
information to the temporal information since user interference at any stage is not possible, and the
spatial information (such as edges) provides more threshold for change detection is adaptively decided
accurate cue to the real object boundaries without empirical selection or prior calibration for the
3. Being able to correctly label dis-occluded regions camera used. The reference frame for change detection
as part of background object instead of being part should also be autoselected from the immediately previ-
of foreground object ous frame or the robustly generated background frame
4. The segmentation system has built-in knowledge to allow optimum segmentation quality according to
similar to an expert system for better video object different circumstances. With the construction of the
segmentation background reference frame, the algorithm is able to
5. More efficient, reliable, and accurate object solve the problems of dis-occluded regions appearing
tracking method so that objects are tracked and as part of the segmented moving objects.
segmented from frame to frame rather than For the algorithm to be useful with live video in-
performing the full suite of motion estimation put, robustness is another important consideration. An
812
Video Object Segmentation
automatic threshold determination scheme for change Gaussian models. It has been concluded via experiments
detection compensates camera and environmental noise that median filtering offers a simple alternative with V
dynamically and ensures correct calculation when many competitive performance. Piccardi (2004) reviewed the
of the pixels are not in motion. The same tolerance rate various background subtraction methods such as aver-
should also exist in the background frame generation. age, median, running average, mixture of Gaussians,
Use of multiple features (motion, edge, gradients, etc.) kernel density estimators, mean-shift, sequential kernel
in different steps can allow inconsistent object bound- density approximation, and Eigen backgrounds. The
ary to be adjusted. conclusion drawn is that it is difficult to assess which
In any change detection process, the change de- method has the best accuracy as there is no unbiased
tection mask can be obtained by performing change comparison with a significant benchmark. However,
detection on the current frame and a reference frame. simple methods such as standard average, running
The reference frame may be the immediate previous average, and median can provide fast speed and also
frame (as in the case of the video object segmentation acceptable accuracy in specific applications.
algorithms in Aach & Kaup, 1993; Kim et al., 2001; Another desirable characteristic of good video object
Mester & Aach, 1997; Neri et al., 1998, Shao et al., segmentation scheme is that it is able to adaptively se-
1998b) or a fixed stationary background image (as lect the best segmentation methods for the underlying
used in Cheung & Kamath, 2004; Chien et al., 2002; video content characteristics on-the-fly and switches
Li, Huang, Gu, & Tian, 2004; Li, Luo, Huang, Leman, the reference frame between the generated background
& Yau, 2005; Piccardi, 2004). The latter approach is image and the immediately previous frame to allow
able to solve the problems of dis-occluded regions ap- maximum segmentation quality according to scenes
pearing as part of the segmented moving objects (for being viewed and also to cater for significant changes in
the case of a fixed stationary camera). In this second lighting and even accidental movement of the otherwise
scenario, a simple approach is to obtain the fixed sta- stationary camera, and so forth. When the generated
tionary background reference frame by an initialization background image is used as the reference frame for
phase where several background frames are averaged change detection, the algorithm will be able to solve
to obtain the reference frame. However, in doing so, it the problems of dis-occluded regions appearing as part
is inherently assumed that there cannot be any moving of the segmented moving object when large object
object in the numerous background frames captured in motion occurs in the scene and thus obtain much more
the initialization phase. This is not good if the camera accurate segmentation results.
spans field of view where it is difficult or even impossible A good and practical automatic video object segmen-
to ensure that there are absolutely no moving objects tation scheme should not require any training/learning
in the scene during the camera setup and initialization processing for foreground object segmentation and
phase (e.g., in public places or common corridors or in addition, no continuous background maintenance
crowded areas where people/vehicles are moving across method should be used as such a method is bound to
now and then). In order to remove such restrictions and produce significant errors in unexpected situations
solve the above-mentioned problem, a robust method due to unexpected and significant video scene changes
which can tolerate moving objects in the images used for which cannot be sufficiently taken into account (such
the initialization phase is required for reference frame as the more complicated learning-based foreground
generation. Such robust method should ideally have object detection and also the use of background
a high breakdown point (e.g., 50%) and also efficient maintenance method reported in Harville, 2002; Li et
in the presence of Gaussian noise, especially when a al., 2002; Li et al., 2004). Processing speed for video
small number of samples (in this case, a small number object segmentation can be improved further if fore-
of previous captured frames) is being used to generate ground objects once segmented are tracked (instead of
the stationary background image in comparison to the being segmented at every frame) for a fixed number
use of a simple median filter (Cheung & Kamath, 2004; of frames or until scene change is detected. However,
Piccardi, 2004). Cheung and Kamath (2004) studied care needs to be taken to ensure that such an approach
the methods for generating a background model, such does not compromise on the accuracy and reliability
as frame differencing, median filter, linear predictive of the segmentation results.
filter, nonparametric model, kalman filter, and mixture of
813
Video Object Segmentation
Although the change detection based techniques are suffering from a lack of the combination of accuracy
usually designed for segmentation of video captured (usually measured in terms of fault rate), robustness
with a stationary camera, they may also be extended (being able to give good segmentation results for all
for the cases with camera in motion because dominant sorts of video sequences with different underlying mo-
motion can be detected (Kim et al., 1999; Mech & tion characteristics), and low computational cost (able
Wollborn, 1997; Shao et al., 1998a) and change de- to segment the video in real-time). The better and more
tection can then be performed with the current frame accurate methods suffer from very high computational
and the motion-predicted frame. If different classes cost while those that boasts of very fast computational
of foreground objects need to be discriminated with speed suffers from a lack of robustness and accuracy. It
motion velocity, each resultant connected component appears that significant research still needs to be done
in the object mask can be divided into multiple regions to achieve a fully automatic, fast/real-time, robust, reli-
based upon spatial homogeneity (Li et al., 2001). Mo- able, and accurate video object segmentation suitable
tion velocity for every region can be estimated and all for a wide range of real-life applications.
regions are grouped according to a motion similarity
measure (e.g., the one suggested by Li et al., 2001). This
attempt is expected to be less computationally expensive references
than those using motion estimation for the whole image,
especially when foreground objects occupy a relatively Aach, T., & Kaup, A. (1993). Statistical model-based
small portion of the image. Accurate motion estimation change detection in moving video. Signal Processing,
for whole image frame itself is a difficult problem, and 31, 165-180.
although a reasonably good method does exist (Ong &
Spann, 1999), such a method achieves good results at Bors, A.G., & Pitas, I. (1998). Optical flow estimation
the expense of very high computational costs. Further and moving object segmentation based on median radial
research is required to obtain reasonably accurate and basis function network. IEEE Transactions on Image
fast motion estimation technique which is suitable for Processing, 7(5), 693-702.
real-time video object segmentation. Castagno, R., Ebrahimi, T., & Kunt, M. (1998). Video
Last but not least, comprehensive and thorough segmentation based on multiple features for interactive
comparison of different video object segmentation multimedia applications. IEEE Transactions on Circuits
schemes that already existed is currently lacking and and Systems for Video Technology, 8(5), 562-571.
there are no common databases and benchmarks against
which such comparison can be performed. The methods Chen, L.H., Chen, J.R., & Liao, H.Y. (2000). Object
for measuring segmentation quality can be objective or segmentation for video coding. In Proceedings of the
perceptual. Although some initial work has been done 15th International Conference on Pattern Recognition
in MPEG resulting in the creation of MPEG-4 informa- (pp. 383-386).
tive segmentation tools (MPEG-4 Video Ver-2 WD, Chen, T., & Swain, C. (1999). U.S. Patent No. 5,960,111.
1999), these are not comprehensive and are not freely Washington, DC: U.S. Patent and Trademark Office.
available to the research community. Significant work
is still required in establishing such common databases Cheung, S.C.S., & Kamath, C. (2004). Robust tech-
and benchmarks in order to help advance video object niques for background subtraction in urban traffic
segmentation research. video. In SPIE Electronic Imaging: Video Communi-
cations and Image Processing, San Jose, California
(pp. 881-892).
conclusIon Chien, S.Y., Ma, S.Y., & Chen, L.G. (2002). Efficient
moving object segmentation algorithm using back-
Video object segmentation is a very useful and impor- ground registration technique. IEEE Transactions on
tant tool that has very wide practical applications in Circuits and Systems for Video Technology, 12(7),
our everyday life where it can contribute to improved 577-585.
efficiency, manpower, and system cost. Current fully
automatic video object segmentation techniques are still
814
Video Object Segmentation
Cucchiara, R., Onfiani, P., Prati, A., & Scarabottolo Lin, W., Tye, B.J., Ong, E.P., Xiong, C., Miki, T., &
N. (1999). Segmentation of moving objects at frame Hotani, S. (1999). Systematic analysis and methodology V
rate: A delicated hardware solution. In Proceedings of of real-time DSP implementation for hybrid video cod-
the 7th International Conference on Image Processing ing. In Proceedings of IEEE International Conference
and Its Applications (pp. 138-142). on Image Processing, Kobe, Japan (pp. 847-851).
Harville, M. (2002). A framework for high-level Liu, H.C., Hong, T.H., Herman, M. & Chellappa, R.
feedback to adaptive, per-pixel, mixture-of-gaussian (1998a). Motion-model-based boundary extraction
background models. In Proceedings of the European and a real-time implementation. Computer Vision and
Conference on Computer Vision (pp. 543-560). Image Understanding, 70(1), 87-100.
Kim, M., Choi, J.G., Kim, D., Lee, H., Lee, M.H., Liu, S.C., Chang, W.F., & Chang, S. (1998b). Statistical
Ahn, C., & Ho, Y.S. (1999). A VOP generation tool: change detection with moments under time-varying il-
Automatic segmentation of moving objects in image lumination. IEEE Transactions on Image Processing,
sequences based on spatio-temporal information. 7(9), 1258-1268.
IEEE Transactions on Circuits and Systems for Video
Mech, R., & Wollborn, M. (1997). A noise robust
Technology, 9(8), 1216-1226.
method for 2D shape estimation of moving objects in
Kim, M., Jeon, J.G., Kwak, J.S., Lee, M.H., & Ahn, C. video sequence considering a moving camera. Signal
(2001). Moving object segmentation in video sequences Processing, 66, 203-217.
by user interaction and automatic object tracking. Im-
Meier, T., & Ngan, K.N. (1999). Segmentation and
age and Vision Computing, 19, 245-260.
tracking of moving objects for content-based video
Koller, D., Weber, J., Huang, T., Malik, J., Ogasawara, coding. IEE Proceedings on Vision, Image and Signal
G., Rao, B., & Russel, S. (1994). Towards robust auto- Processing, 146(3), 144-150.
matic traffic scene analysis in real-time. In Proceedings
Mester, R., & Aach, T. (1997). U.S. Patent No.
of the International Conference Pattern Recognition
5,654,772. Washington, DC: U.S. Patent and Trade-
(pp. 126-131).
mark Office.
Li, H., Tye, B.J., Ong, E.P., Lin, W., & Ko, C.C.
MPEG-4 Video Ver-2 WD. (1999). MPEG-4 doc.
(2001). Multiple motion object segmentation based
ISO/IEC JTC1/SC29/WG11/M4583 (FDIS 14496-2),
on homogenous region merging. In Proceedings of
Annex F (Informative). Seoul, Korea.
the IEEE International Symposium on Circuits and
Systems, Sydney, Australia (pp. 175-178). Neri, A., Colonnese, S., Russo, G., & Talone, P. (1998).
Automatic moving object and background segmenta-
Li, L., Gu, Y.H., Leung, M.K., & Tian, Q. (2002).
tion. Signal Processing, 66(2), 219-232.
Knowledge-based fuzzy reasoning for maintenance
of moderate-to-fast background changes in video Odobez, J.M., & Bouthemy, P. (1998). Direct incremen-
surveillance. In Proceedings of the 4th IASTED Inter- tal model-based image motion segmentation for video
national Conference on Signal and Image Processing analysis. Signal Processing, 66(2), 143-155.
(pp. 436-440).
Ong, E.P., Lin, W.S., Tye, B.S., & Etoh, M. (2006, May).
Li, L., Huang, W., Gu, Y.H., & Tian, Q. (2004). Statisti- Fast automatic video object segmentation for content-
cal modeling of complex backgrounds for foreground based applications. In Y.-J. Zhang (Ed.), Advances in
object detection. IEEE Transactions on Image Process- image and video segmentation (pp. 140-160). Hershey,
ing, 13(11), 1459-1472. PA: IRM Press.
Li, L., Luo, R., Huang, W., Leman, K., & Yau, W.Y. Ong, E.P., & Spann, M. (1999). Robust optical flow
(2005). Adaptive background subtraction with multiple computation based on least-median-of-squares regres-
feedbacks for video surveillance. In Proceedings of the sion. International Journal of Computer Vision, 31(1),
International Symposium on Visual Computing, Lake 51-82.
Tahoe, Nevada (pp. 380-387).
815
Video Object Segmentation
Ong, E.P., Tye, B.J., Lin, W.S., & Etoh, M. (2002). key terms
An efficient video object segmentation scheme. In
Proceedings of the IEEE International Conference Background: A term to refer to the object that is of
on Acoustics, Speech, and Signal Processing, Florida little interest or visual importance in an image.
(pp. 3361-3364).
Change Detection: A method for performing
Piccardi, M. (2004). Background subtraction tech- temporal/motion segmentation based on subtracting
niques: A review. In Proceedings of the IEEE Interna- two images and labeling each pixel as stationary or
tional Conference on Systems, Man and Cybernetics, moving using a predefined threshold.
The Hague, The Netherlands (pp. 3099-3104).
Dis-Occlusion: A term indicating that a region which
Shao, L., Lin, W., & Ko, C.C. (1998a). Dominant has been covered/obscured from view in the previous
motion segmentation of video objects towards object- image has now become visible in the current image.
oriented video coding. In Proceedings of the 6th IEEE
International Workshop on Intelligent Signal Process- Foreground: A term to refer to the object of inter-
ing and Communication Systems, Melbourne, Australia est in an image.
(pp. 258-261). Mask: A term for referring to a grey-level digital
Shao, L., Lin, W., & Ko, C.C. (1998b). Video object image used to represent the various regions (marked
segmentation based on change detection and region with different labels or values) that encompass the
growing. In Proceedings of IASTED International various video objects.
Conference on Signal and Image Processing, Las Motion Estimation: The process of inferring the
Vegas, (pp. 387-391). magnitude and direction of motion in a visual scene
Siyal, M.Y., & Fathy, M. (1995). Real-time measure- from a video.
ment of traffic queue parameters by using image process- MPEG: MPEG is the abbreviation for Moving
ing techniques. In Proceedings of the 5th International Picture Experts Group and this is a working group of
Conference on Image Processing and its Applications ISO/IEC in charge of the development of video and
(pp. 450-454). audio compression standards.
Toklu, C., Tekalp, M., & Erdem, A.T. (2000). Semi- Occlusion: A term indicating that a region which
automatic video object segmentationin the presence of is visible in the previous image has now been covered/
occlusion. IEEE Transactions on Circuits and Systems obscured from view in the current image.
for Video Technology, 10(4), 624-629.
Supervised Segmentation: The process of achiev-
Vincent, L. (1993). Morphological grayscale recon- ing final segmentation results with the aid of human
struction in image analysis: Applications and efficient guidance and input (this is in contrast to automatic
algorithms. IEEE Transactions on Image Processing, segmentation where no human intervention and guid-
2(2), 176-201. ance is required).
Video: A term to refer to a sequence of consecutively
captured images.
Video Object: A meaningful concatenated region
in a digital video.
Video Object Segmentation: The process of par-
titioning a digital video into two or more meaningful
regions, called objects.
816
Section: Context ICT 817
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Virtual Communities and Collaborative Learning in a Post-Graduate Course
which give life (cultural life of the group, models, a group culture. Online socialization could form part
stereotypes); and finally, a social dimension, related of the same work process but cannot count on direct
to the sense of institutional belonging. contact. It can therefore produce a sociality vacuum.
According to Quaglino et al. (1992), a prerequisite It may then be necessary to dedicate specific moments
for a group to perceive itself as a group, is the develop- to preliminary online socialization.
ment of the sense of belonging to a common entity. This The types of mediums used, also hold an influence
is possible through the promotion and encouragement in many other ways. If on one hand these mediums
of interactions, aimed at favoring the sense of cohesion. free communication from the bond of spatial-tempo-
It is this linking factor which stands at the basis of the ral presence and amplify relational potentials, on the
birth of a group, characterized by the sharing of rules, other they also cause dispersive and fragmented com-
and the sentiment of pleasure arising from relating with munication. Not being able to directly see the effects
others, and being sustained and comforted by their of our own actions reflected on the face of the person
presence. An ulterior passage requests reciprocal inter- we are speaking to entails greater communication dif-
dependence, which is the conscious acknowledgement ficulties, above all in the quantity and pertinence of
of the other and of the others diversity as a resource the messages. This may favor a fragmented dialogue
for the group. The latter must be conceived as an entity or other undesired phenomenon like stress, soliloquy,
within which each person is able to give his/her own duets, or quarreling.
contribution and avail of the contributions of others.
Interdependence must evolve towards integration be-
tween the single needs and the demands of the group, the lte post-graduate course
following a particular configuration which facilitates
collaboration, and consists of the active participation The LTE at the University of Florence has been deliv-
of the group in a common project. ering post-graduate online courses on Methods and
A great part of group problems are also found Techniques for Network Collaboration since 1998. The
on the net, but with some differentiations (Calvani, course lasts five months and provides blended learning,
2005). The team building process will need some including three f2f meetings. Those registered usually
added details keeping in mind the specific features number around 150 people, and are mainly teachers
of computer-mediated communication (Bullen, 1998; still in service.
Feenberg, 1999; Jonassen, 2000; Rourke & Anderson, Along the years, innovative elements have been
2002). A critical element for example, possesses the introduced on the methodological and technological
necessary technological expertise. This may not only level with the aim of facilitating collaborative exchange.
represent a preliminary selective factor, but may also My following presentation of the general outline of
condition group dynamics since participants have dif- the course will include the methodological and tech-
ferent capabilities. Those technically advanced can nological devices recently introduced to facilitate and
even unconsciously dominate the others. The most improve collaborative work, facing the critical issues
vulnerable area however, is that of satisfying the needs noted earlier.
of identity and self-esteem. Feedback from online group
work participants is delayed since interaction occurs the courses structure
without nonverbal cues (looks, attitudes, gestures)
and communication is normally relegated to written The course is based on a five-phased model which
messages. As a consequence, the construction of ones is partially similar to the Salmons Five-Step Model
own identity in relationship with the other becomes (2000). It gradually proceeds from individual study to
a more difficult process, especially if the participants sharing and collaboration/cooperation.
have very little direct experience with working online.
This slows down the team building process and its Phase 1 Technological familiarization (1 month):
essential components. Mutual trust, self-esteem, the The aim of the first phase is to verify if the single par-
knowledge of being welcome, mutual understanding, ticipants are able to use online communication tools and
and social grounding are elements that contribute to the know the netiquette rules, and to allow them to explore
construction of a social atmosphere and the sharing of the functionalities of the virtual learning environment.
818
Virtual Communities and Collaborative Learning in a Post-Graduate Course
The e-tutor is a crucial figure who will be able to give in order to have significant interaction on the cognitive
support to the participants on a technical level. level during the collaborative phase. Another important V
moment is that of the building of collaborative groups.
Phase II Personal documentation (1 month): This must be handled by an e-tutor expert in commu-
The purpose of this phase is to allow each participant nicative and relational dynamics in order to facilitate
to acquire basic knowledge in the field of a specific the creation of a cohesive atmosphere and the groups
subject area. Each participant is asked to do research sense of belonging. The socialization phase responds
activity on the Internet and to produce a final report. In to the need of setting the grounds to enable the single
this phase as in the following phase, the e-tutor plays person to see that single person as part of the group.
a significant role as content expert and moderator of The model, moreover, gives great importance to self-
online interaction. He/she manages the group and helps evaluation and self-reflection. Besides providing for a
participants develop self-management capabilities de- final phase oriented towards this aim, the participants
creasing his/her presence in the 5th and 6th Phases. are invited to consciously assume conversational roles
in the cooperative project work phase.
Phase III Online socialization (20 days): In this
phase the objective is to promote social grounding in Conversational Scripts and Roles
order to start up collaborative activity and to give rise
to collaborative groups. The participants enter into the The analysis of roles, functions and conversational
virtual classroom, present themselves to their colleagues structures has already inspired technological research.
and launch ideas which may be the possible basis of Different models developed within the field of com-
project work. At the end of this phase the collabora- puter supported collaborative learning (CSCL) aim
tive groups are constituted. Each group is normally at creating support systems to conversation, favoring
composed of 5-7 members, one of which has the role well-argued discussions and dialogues based on mean-
of coordinator. ing negotiation (Dillenbourg, 1999; Jerman, Soller, &
Muehlenbrock, 2001; Koschmann, Hall, & Miyake,
Phase IV Cooperative project work (2 months): 2002; Soller, 2001).
This is the most relevant methodological phase. The How do we obtain the identification of a role within
participants analytically define the objective and the a dialogue that is held on a web forum? A message can
themes to be taken up, and the nature of the tasks and be characterized in its gist, which can be synthesized
roles the group may need. In this phase the coordina- in expressions such as request, proposal, ac-
tor carries out the important role of summing up the ceptance, or explanation. These conversations can
situation, stimulating the members of the group and so be combined with a sentence opener or even a label
on. We shall return to this phase later. (thinking type, TT) used in specific technological en-
vironment for collaboration (CSCL).
Phase V Metacognitive analysis (10 days): This In the courses last three editions, we decided to
phase aims at reflecting on the collaborative experience set up the collaborative/cooperative online activity
and evaluating the process and its results. (IV Phase) by structuring the process through the use
of the label or TT. The Discussion Module which was
The model gives particular attention to the initial the Web forum used, was developed and implemented
phase which aims at preparing participants for the task. on Moodle by our technical staff. The functionalities
The students find themselves facing a computer and typically present in CSCL were transferred to this open
may feel a sense of isolation, especially if they are not source platform. The Discussion Module is equipped
experts. This is often one of the major reasons why a with a certain number of TT. The participant is asked
participant might desert a task. It is therefore important to choose the TT which best represents the meaning of
to create a moment of personal training for technological the participants contribution. The TT is normally used
alignment (technological familiarization), or compen- in a metacognitive sense. The TT instead, have been
sations for gaps in the specific subject area (personal taken as tools to designate conversational roles, and as
documentation). This is based on the idea that the such, we have called them dialogue symbols (DS).
participants level of expertise must be homogeneous
819
Virtual Communities and Collaborative Learning in a Post-Graduate Course
The function of the DS is to help participants To facilitate this activity a dialogue format com-
consciously manage their own intentions in commu- posed of three conversational script sequences was
nication, position their interventions with respects to suggested. A conversational script is presented in
the groups interactions on the whole and make their the form of a Web forum predefined with a particular
own contributions more understandable to the other set of DS.
members of the group. The scripts and DS sets may obviously be different
The DS suggest the assumption of dialogue roles according to the specific objectives of the collabora-
that can be relevant in the process of collaborative con- tion activity. In our experience, the three types of Web
struction of knowledge. An example of such roles could forums were used in three consecutive sessions and for
include: Questioner, Mediator, Informer, Proponent, each of them a particular conversation script was sug-
Facilitator, Motivator, Opponent, Monitor, Compiler, gested: Informal Discussion, Knowledge Construction,
Cybrary, or Disseminator. and Critical Review (Table 1).
GENERATIVE SESSION
conversational script: informal discussion
820
Virtual Communities and Collaborative Learning in a Post-Graduate Course
Table 1. continued
V
Constructive Moment
Conversational script: knowledge construction
821
Virtual Communities and Collaborative Learning in a Post-Graduate Course
Table 1. continued
822
Virtual Communities and Collaborative Learning in a Post-Graduate Course
Calvani, A. & Rotta, M. (1999). Comunicazione e ap- Roschelle, J. & Teasley, S. D. (1995). The construction
prendimento in rete. Didattica costruttivistica in rete, of shared knowledge in collaborative problem solving. V
Trento: Erickson. In C. OMalley (Ed.), Computer supported collabora-
tive learning. Berlin: Springer-Verlag.
Dillenbourg, P. (1999). Collaborative-learning:
Cognitive and computational approaches. Oxford: Salmon, G. (2000). E-moderating, the key to teaching
Elsevier. and learning online. London: Kogan Page.
Dillenbourg, P., Baker, M., Blaye, A., & OMalley, Scardamalia, M. & Bereiter, C. (1992). An architecture
C. (1996). The evolution of research on collaborative for collaborative knowledge building. In De Corte et
learning. In P. Reinmann & H. Spada (Eds.), Learning al. (Eds), Computer based learning environments (pp.
in humans and machines: Towards an interdisciplinary 41-67). Berlin: Springer Verlag.
learning science (pp. 189-205). Oxford: Pergamon.
Soller, A. L. (2001). Supporting social interaction in
Feenberg, A. (1989). The written world: On the theory an intelligent collaborative learning system. Interna-
and practice of computer conferencing. In R. Mason tional Journal of Artificial Intelligence in Education,
& A. Kaye (Eds.), Mindweave: Communication, com- 12, 1, 40-62.
puters, and distance education (pp. 22-39). Toronto:
Strijbos, J. W. & Martens, R. L. (2001). Group-based
Pergamon Press.
learning: Dynamic interaction in groups. In Proceed-
Jermann, P., Soller, A., & Muehlenbrock, M. (2001). ings of the Educational Technology Expertise Centre
From mirroring to guiding: A review of state of the art (OTEC) Open University of the Netherlands (OUNL),
technology for supporting collaborative learning. In P. EURO-CSCL Conference 2001, March 22-24, Maas-
Dillenbourg, A. Eurelings, & K. Hakkarainen (Eds.), tricht, The Netherlands.
European perspectives on Computer-supported col-
Trentin, G. (1998). Insegnare e apprendere in rete.
laborative learning: Proceedings of the First European
Bologna: Zanichelli.
Conference of Computer-supported Collaborative
Learning (pp. 324-331). Maastricht McLuhan Institute,
Maastricht. keywords
Jonassen, D. (2000). Computers in the classrooms:
Mindtools for critical thinking. NJ: Prentice Hall. Collaboration/Cooperation: In the studies on col-
laborative learning the terms collaboration and coop-
Koschmann, T. D. (1996). CSCL: Theory and practice eration are usually distinguished from each other. The
of an emerging paradigm. New Jersey: Lawrence Er- former refers to a working together of a group towards
lbaum Associates. a common objective through mutual interventions and
sharing, and the latter refers to the joint effort of a group
Koschmann, T. D., Hall, R., & Miyake, N. (2002).
towards the achievement of an objective through strate-
CSCL 2: Carrying forward the conversation. New
gies based on the partitioning of work. This distinction
Jersey: Lawrence Erlbaum Associates.
is not to be taken as dichotomy. In reality cooperation
Quaglino, G. P., Casagrande, S., & Castellano, A. and collaboration can be seen as two activities that
(1992). Gruppo di lavoro Lavoro di gruppo. Milano: place themselves along a continuum. In some cases,
Cortina. especially for collaborative online activities, a certain
degree of structuring may be necessary.
Rheingold, H. (1993). The virtual community: Home-
steading on the electronic frontier. Reading, MA: Collaborative Learning: Research has widely
Addison-Wesley. deepened the concept of collaborative learning. The
Rourke, L. & Anderson, T. (2002). Exploring social expression collaborative learning can be defined
interaction in computer conferencing. Journal of In- broadly as an instruction method in which learners
teractive Learning Research, 13, 3, 257-273. work together in small groups towards a common
goal. It means that students are responsible for their
823
Virtual Communities and Collaborative Learning in a Post-Graduate Course
own learning as well as that of the others. Thus, it tion and metacognitive processes. Every time the user
promotes peer-learning and tutoring. posts his/her message in the Web forum, he/she has to
attribute a label (or thinking type) to his/her message
Conversational Script: A conversational script can according predefined categories.
be intended as a complex path of pertinent communi-
cative interactions in a certain stage of collaborative Virtual/Online Community: It refers to a group of
work, which is consciously assumed by a collaborative people that primarily interact via a computer network.
group as hopeful reference of interaction. The term is attributed to Howard Rheingold (1993).
Even if it still does not exist an universal definition for
CSCL (Computer Supported Collaborative this term, it can be defined as a social network with a
Learning): It is a field of research promoting the de- common interest or goal that interact in a virtual space
velopment of web technologies supporting teaching and across time and geographical boundaries and is capable
learning models based upon collaborative learning. of to developing personal relationships.
Virtual Learning Environment (VLE): It is a Web-
Thinking Type: It is a scaffold label often imple- based software system designed for the management of
mented in the Web-based groupware for Computer educational courses. They are often also referred to by
Supported Collaborative Learning in order to support the acronym LMS (learning management system).
online discussions in the Web forum, facilitating reflec-
824
Section: Context ICT 825
Exhibit A.
iPod, therefore I am: this is how the young generations, roaming the
Virtual identity digital sound spaces, state their identities (quoting Apples CEO Steve
Jobs on his cult music player).
The representation of a human identity that is used in cyberspace to
Digital identity
interact with machines or people
An attempt to establish in cyberspace an equivalent of domicile in
Virtual residence
the off-line world
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Virtual Identity, Digital Citizen
Information and communication technologies have become uncertain whether we are in front of fictitious
shaped the concept of identity in a digital world by and unsubstantial entities, that is, virtual ones, or facing
applying, the attribute virtual to the headwords of a different case. Perhaps we are witnessing a graft of
identity: I, me, self, persona. The result is realities of different grades or a second reality, a new
called virtual identity (VID). existential state that surreptitiously slips between the
real and the virtual as we usually understand them.
VID is born when online identity is born, simul-
VIRTuAL IdEnTITy (VId) taneously with the first computer game, named MUD
(Multi User Dungeon), the famous 1978 EssexMUD
Does virtual mean immaterial? Let us look at some (UCSB, 2007). This reference is also adopted by the
examples of the modern generation of avatars. For researchers at the large European project PRIME (Pri-
instance when, inside a fantasy world, they introduce vacy and Identity Management for Europe, https://www.
themselves to their community, as Elewin Lamfeu prime-project.eu/), who have done a very thorough
or Adsarta in the Encyclopdie de lHroc Fantasy terminology effort on the galaxy of notions pertaining to
(Fantasy-Archives, 2007). Let us take notice that there identity. Quoting in summary form some of their work
exists on the Web an avatar service, which moulds (Pfizmann & Hansen, 2006, pp. 24-25), we have:
a 3D animated character on the users specification,
with body, face, clothes and with the addition of all Virtual identity.
possible accessories (Meez, 2007); or the selling of
avatars, pretty images ready to be downloaded into Virtual identity sometimes is used in the same mean-
our cell phones (Chameleon, 2007). ing as digital identity or digital partial identity, but
So great is the strength of the presentations, the liveli- because of the connotation with unreal, non-existent,
ness and effectiveness of these digital creatures, that we seeming the term is mainly applied to characters in
Figure 1. Representing the identity and partial identities of Alice (Source: Clau & Khntopp, 2001, cited in
FIDIS document (FIDIS, 2005, p. 20))
826
The Virtual Identity, Digital Citizen
a MUD (multi user dungeon), MMORPG (massively 2nd Scene: E-Mail and Chat
multiplayer online role playing games) or to avatars. V
Often used to describe online contexts such as chat- With e-mail and chat the individual turns into pure writ-
rooms where the subject of the identity does not wish ing. An important step in building ones identity is the
it to be linked with offline identities. Thus the identity choice of ones nick, which intentionally may, or may
is exclusively electronic. not, reveal something about its owner. E-mail and chat
are the realm of CMC (computer mediated communi-
The main perspectives in which we analyze the cation), a completely new dimension of socialization.
notion of VID are: Therein body, looks, social status are obscured in the
identity and the only element that determines success
Virtual identity as a mode of being, as a new social or failure when dealing with others, is the word.
entity stemming from a history of technological
events; 3rd Scene: Virtual Communities
Virtual/digital identity viewed as a management
issue, caused by the multiplicity of relations and In the early 1990s the abundance of communication tools
interactions of the individual with the virtual/real changes the landscape and gives rise to a generation
world; of virtual identities which are richer and much more
VID from an evolutionary point of view: how this easily articulated. Virtual communities, since Howard
electronic form of identity and all the other digital Rheingolds definition (1993, p. 4) as social aggrega-
resources belonging to us will play when, in the tions that emerge from the Net, have greatly multiplied
future, we shall be moving across increasingly as places of deeply shared ideals and knowledge. Here
digitalized environments. the behavior is almost the opposite than in the previous
scene. Identity is not hidden or camouflaged, but rather
To develop the first point aforementioned we call put forward, to assert ones personality, to gain a strong
out a sequence of scenes belonging to the evolution role in a discussion, to enter participation.
of the VID in time.
4th scene: the Blogosphere
1st Scene: Muds and Avatars
The beginning of the new millennium marks the transi-
Although the technological foundation of MUDs (multi tion from cyberspace to the blogosphere. The carrier
user dungeons) is very simple, the very high creativity of the identity is no longer simply a participant in the
of the authors and the fantasy of the players make them virtual world, but becomes a generator of it. Bloggers,
very attractive still today, when the sophistication of with their massive creativity, have transformed cyber-
computer software is very high. MUDs were games space and assigned a new qualifier to the cybernaut:
which triggered many questions with scholars in many author. The owner of a VID now has to take care
fields. Sherry Turkle, the renowned MIT researcher, of a new side of his profile, his digital reputation, a
stands out as being the first to look deeply into the virtual ranking derived from the credibility and truthfulness
aspects of the persona of the players. A fundamental of his utterances as much as by hits on his blog. The
remark by her is, that it is the first time in human life VID does no longer just exist in a game or in a virtual
that people have to take themselves at interface value, community since its visibility becomes enormously
that is, not for what they are, but for what they appear magnified by all the connecting and disseminating
on the surface of a computer screen (Turkle, 1995, p. devices populating the Web.
103; 1998). It is the opacity of that interface that al-
lows the possession of multiple identities that can be
obtaineddifferently form the real worldwith very dIgItal IdentIty
limited means and in total freedom.
When we relate virtual identity with digital technologies
we come to the notion of digital identity. According to
the PRIME nomenclature:
827
The Virtual Identity, Digital Citizen
828
The Virtual Identity, Digital Citizen
ments of EUs ongoing Research Framework Programs. The online lives of people, families, and house-
The Ambient Intelligence Space is the future habitat of holds and their virtual representation, and V
the information societys citizen. A key document issued Mobility and interoperability between different
by the European Commission so describes it: AmI environments (Kameas, 2006).
Ambient Intelligence Space is the collection of tech- The key concept and vision introduced by the IPTS
nologies, infrastructures, applications and services researchers is the bubble, the pictorial representation
across different AmI environments. Examples of future of the digital territory (DT), a technical concept sup-
AmI environments are the home, the car, the school, porting the one of virtual residence. DT is a notion of
the neighbourhood, the city, etc. [] The AmI Space is space and borders, referred to its owner, as depicted in
composed of collaborative (location or social based) Figure 2. According to this model, it will be possible to
sub-spaces, of devices (including sensor and actuator filter or reject the transit of data, to deny access accord-
systems), services (including their interfaces) and the ing to security and privacy criteria and build defenses
connecting networks (IPTS, 2003, p. 72) against malicious attempts of contact.
The virtual residence is then a special case of a
There is a reason for the need of new guidelines for digital territory, as we project the physical residence of
social behavior. This space, simultaneously technical the intelligent home in the online world. What this
and social, is quite an unknown. Laws, values, notions bubble will contain and protect is not only the regis-
and conventions, to which we are accustomed in the try data of the dwellers, but the whole mass of digital
physical world, fail and a replacement is missing. In data surrounding them, like PC files, work documents,
front of this situation Virtual Residence is a clarifying schedules, health information, family archives.
concept. It consists of three elements that form the The objective of this type of research is that the
space where the real/virtual identity of the individual emerging PETs (privacy enhancing technologies) may
has a meaning and a role: adopt these concepts as key references and citizens may
become more aware of their digital identities.
The future ambient intelligent and connected
home (computing embedded in everyday objects
connected via domestic infrastructures);
Figure 2. Digital territories and bubbles in the AmI Space: A scheme for interaction and protection
829
The Virtual Identity, Digital Citizen
Figure 3. In Second Life you can even do skydiving (Source: Courtesy of secondlife.com - 2006, Linden Re-
search, Inc. All Rights Reserved)
830
The Virtual Identity, Digital Citizen
Fantasy-Archives (2007). LEncyclopdie de lHroc Rheingold, H. (1993). The virtual community: Home-
Fantasy [elewinLamfeu, Adsartha]. Retrieved March steading at the electronic frontier. London: Addison- V
13, 2008, from http://www.fantasy-archives.com/ Wesley.
liste_msg.php?id=123
Rost, M. (2003). An introduction to the concept of
FIDIS (2005). FIDIS deliverable D11.1. Collection of identity. In Proceedings of the FIDIS NoE WP2 Kick-
topics and clusters of mobility and identity - Towards a off meeting, Brussels, December 2-3, 2003. Retrieved
taxonomy of mobility and identity. Retrieved March 13, March 13, 2008, from http://www.calt.insead.edu/fidis/
2008, from http://www.fidis.net/fileadmin/fidis/deliv- workshop/workshop-wp2-december2003/presentation/
erables/fidis-wp11-del11.1.mobility_and_identity.pdf ICPP/ICPP_fidis_wp2_workshop_dec2003.ppt
Gibson W. (1984). Neuromancer. New York: Ace Books, SXIP (2007). SXIP identity homepage. Retrieved March
The Berkley Publishing Group. 13, 2008, from http://www.sxip.com/
IPTS (2003).Security and privacy for the citizen Trentin, G. (2004). Apprendimento in rete e condivisione
in the post-September 11 digital age: A prospec- delle conoscenze. Milan: Franco Angeli.
tive overview. Retrieved March 13, 2008, from
Turkle, S. (1995). Life on the screen: Identity in the age
http://cybersecurity.jrc.es/docs/LIBE%20STUDY/
of the Internet. New York: Simon & Schuster.
LIBEstudy%20eur20823%20.pdf
Turkle, S. (1998). MIT lecture March 24 - Taking things
Kameas, A. (2006). Security concerns associated with
at interface value from life on the screen: Identity in
digital territories. In Proceedings of the Conference
the age of the internet. Retrieved March 13, 2008, from
on Safeguards in a World of Ambient Intelligence,
http://web.mit.edu/sturkle/www/STS060.html
21-22 March 2006. Retrieved March 13, 2008, from
http://is.jrc.es/pages/TFS/documents/SWAMIKa- UCSB (2007). University of California at Santa Bar-
meas20060321.ppt bara, George Legrady Studio, Exploring virtual reality.
Retrieved March 13, 2008, from http://www.mat.ucsb.
Liberty Alliance (2005). What is the Liberty Alliance?
edu/~g.legrady/academic/courses/01sp200a/students/
In Proceedings of the GGF-12 Workshop on Opera-
enricaLovaglio/VRsite/developments.html
tional Security for the Grid. Presentation by Rebekah
Lepro-Metz (Booz Allen Hamilton, Inc). Retrieved VR, Virtual Residence Project (2004). In Proceedings
March 13, 2008, from http://grid.ncsa.uiuc.edu/ggf12- of the Minutes of the JRC-IPTS Workshop, Seville, 19-
sec-wkshp/panel2/metz-LibertyAlliance.ppt 20th January 2004. Retrieved March 13, 2008, from
http://cybersecurity.jrc.es/docs/VR%20IPTS%20Jan
LID (2007). LID Lightweight-identity homepage.
WS%20minutes%20%20.pdf
Retrieved March 13, 2008, from http://lid.netmesh.
org/wiki/Main_Page Wenger, E., McDermott, R. & Snyder, W.M. (2002).
Cultivating communities of practice. Boston: Hardvard
Meez (2007). Express yourself with Meez. Retrieved
Business School Press.
March 13, 2008, from http://www.meez.com
Nabeth, T. (2004). Communauts virtuelles, Agents
intelligents C1: Identity & Identity issues . Retrieved keywords
March 13, 2008 from http://www.calt.insead.edu/data/
Vcai-course/2004-C1-Identity.ppt Federated Identity Management: An approach
Pfitzmann, A. & Hansen, M. (2006). Anonymity, by which a set of service providers, explicitly linked
unlinkability, unobservability, pseudonymity, and by a reciprocal trust relation (a circle of trust), agree
identity management - A consolidated proposal for to support a scheme where the user does not have to
terminology. Retrieved March 13, 2008, from http://dud. establish his/her identity at every attempt to access a
inf.tu-dresden.de/literatur/Anon_Terminology_v0.28. different service, but does so just once (also known
pdf as SSO, Single Sign-On). In the circle, providers
have two profiles, the service provider and the identity
831
The Virtual Identity, Digital Citizen
provider. The service provider will accept as valid org/). Open Croquet is a recent, revolutionary open
identifiers those of a user, which has been previously source platform conceived to support 3D immersive,
authenticated by an identity provider, so that the user highly visual collaboration spaces. It is a joint software
will transparently access the service without having to development between the University of Minnesota at
do an authentication step. Madison and VPRI (ViewPoints Research Institute)
in California. The people working at this project are
Identity: An elusive concept, best explained in the
an exceptional group of inventors belonging to the
cited PRIME dictionary:
ICT world, among which there is Alan Kay, inventor
Identity can be explained as an exclusive perception of the Smalltalk language, ancestor of all windowing
of life, integration into a social group, and continuity, OSs, leading at VPRI; Doug Englebart (hypertext);
which is bound to a body and shaped by society. This Marvin Minsky, Nicholas Negroponte (pioneers at
concept of identity distinguishes between I and Me MIT), Seymour Papert (Logo, computers for learn-
[]: I is the instance that is accessible only by the ing); David Reed (several Internet laws). The tool is
individual self, perceived as an instance of liberty and usable for building boundless applications, ranging
initiative. Me is supposed to stand for the social at- from simulations to synchronous massive multiuser
tributes, defining a human identity that is accessible by environments.
communications and that is an inner instance of control
Virtual Communities: For Howard Rheingold
and consistency. (Pfizmann et al., 2006, p. 22)
(1993), Virtual communities are social aggregations
that emerge from the Net when enough people carry on
Metaverse: A term out of the book Snow Crash by those public discussions long enough, with sufficient
Neal Stevenson, it has been widely adopted to describe human feeling, to form webs of personal relationships in
virtual online words. These new spaces have been ex- cyberspace. They have been extensively investigated
isting mainly as gaming places, but a new generation (Wenger, McDermott, & Snyder, 2002) because of the
is expected based on new technologies, such as the many possible roles of the participants, the sophisticated
ones embedded in Croquet (http://www.opencroquet. technological platforms they may adopt and the variety
of shapes they take (Trentin, 2004).
832
Section: Process ICT 833
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Virtual Reality and Virtual Environments in Education
Using the constructivist approach, Byrne (1996) phenomena and concepts focusing on earthquake waves,
created a virtual environment to stimulate the students radiation balance, movements of sea water, solar sys-
to learn the chemistry by exploring and interacting with tem, and earths crust structure in the science field of
a virtual world. Instead of staying in a classroom and middle school. These virtual experiments have been
passively viewing images of the atomic structures, the designed to be compatible to the learner levels through
students can place electrons in the atoms and they can level analysis in the following cycle model: regular,
see the atomic orbital appear as the electron buzzes. advanced, and remedial course. The virtual experi-
Pantelidis and Auld (Virtual Reality and Education ments have been evaluated for six months using 701
Laboratory (VREL), East Carolina University) used middle school students, and 74.6% of students gave
a software package called Virtus VR on a group of a positive response on the use of VR in the science
primary school children. The aim of this activity was experiments.
to promote childrens abilities to conceptualize in
three-dimensional space and to have fun and provide
a sense of achievement while doing so. The children how to apply vr In educatIonal
created the interior of a room or building, with walls, envIronments
doors, windows, and furniture designed and edited and
then placed in the appropriate part of the screen-based Pantelidis (1997) presented a model for choosing
construction. Keyboard-controlled movement though where to apply VR in any one course. She proposes a
the three-dimensional representation is possible at any model, based on the work of Leslie J. Briggs and Robert
time (Stangel & Pantelidis, 1997). Gagn (Gagn & Briggs, 1979), which comprises the
Gerval, Popovici, Ramdani, El Kalai, Boskoff, and following 11 phases:
Tisseau (2002) created a distributed virtual environment
for children. The project, named EVE (Environnement 1. Define the objectives for specific course.
Virtuels pour Enfants), involved nine partners (univer- 2. Mark the objectives that could use a simulation
sities, primary schools, and small and medium-sized as a measurement or means.
enterprises) for three different countries: France, 3. Each of the marked objectives is examined: first
Morocco, and Romania. On a pedagogical perspec- to determine if it could use a computer-generated
tive, the main goal of the EVE project is teamwork. simulation for attainment or measurement, then
In fact, children from different countries are involved to determine if it could use a three-dimensional
in cooperative work. They have to achieve a common (3D), interactive simulation.
task together, hoping that this will encourage respect 4. Choose for each selected objective the level of
in a multicultural framework. On a technical perspec- realism required on a scale from very symbolic
tive, this project implements distributed virtual real- to very real.
ity technologies. From both points of view, EVE is a 5. Decide the type of interaction needed on a scale
NICE-like environment, being narrative, immersive, from no immersion into the 3D environment (for
constructionist, and collaborative. The EVE application example, desktop VR) to full immersion (for ex-
has been developed in order to help the primary school ample, using head-mounted display, data gloves,
children learn French and especially the reading. The and so forth).
target of the project is twofold: 6. Establish the type of sensory output from the vir-
tual world or environment desired, for example,
To realize new cooperative working environ- haptic (tactile or feeling), 3D sound, or visual
ment only.
To create new products development such as peda- 7. Choose VR software and hardware/equipment.
gogical software for primary school children 8. Design and build the virtual environment (VE).
The virtual environment may be built by the
Shin (2004) presented the educational possibilities teacher, the students, or both.
of the Web-based virtual experiment environment in 9. Evaluate the resulting virtual environment using
science education. He developed a virtual experiment a pilot or experimental group of students.
environment supporting students to learn scientific
834
Virtual Reality and Virtual Environments in Education
10. Modify the virtual environment using the results realized by the teacher using virtual reality modeling
of the evaluation. language (VRML), and they can be manipulated with V
11. The modification continues until the VE is shown the mouse and the keyboard.
to successfully measure or aid in attainment of In the second part, students familiarized with VR
the objective. in the first part of the course used the VR technology
as project tools, realizing virtual buildings and virtual
worlds. They also integrated the technology as a tool to
vIrtual realIty In educatIon: communicate their architectural projects. Students also
the case of a faculty of created VR low cost objects, for example, trees using
archItecture simple fractal algorithms based on iterative and recur-
sive processes. These teaching experiences emphasize
At this point, it is important to understand the rea- some positive aspects, for example, the strong impact
sons that bring to use VR in a faculty of architecture. that VR technology has on students. This impact helps
Therefore, it is logical to do some considerations. In in the comprehension of the complex topological and
architectural design, the computer is a medium that geometrical shapes. The use of VR in teaching path
can be used in different ways, for example, as a tool can also help students to use this technology in their
to conceive new shapes, using Non-Uniform Rational future working activities.
B-Spline (NURBS) and hypersurfaces. The computer Henderson (1999) notes that: Young designers
is entering in the creative process and it acquires a trained on graphics software are developing a new
sense in the architectural design process (this approach visual culture tied to computer-graphics practise, that
is used by the famous architect Peter Eisenman). The will influence the way they see and will be different
evolution of IT introduces the concept of virtual archi- from the visual culture of the paper world (Hender-
tecture that has only recently emerged with the ability son, 1999, p. 57). Architects who have grown up with
of computer-imaging technology to accurately simulate digital media and virtual reality will be expert users of
three-dimensional reality. In an age dominated by the interactive, spatial, real-time environments (Prestinenza
computer and by the electronic media, it is becoming Puglisi, 1999; Whyte, 2002).
increasingly clear that the perception of space is also
undergoing a profound transformation. The traditional
architectural space is changing; buildings are being future trends
rendered transparent, fleeting and intangible, enhanced
by virtual potential. The connection between the Internet and virtual reality
In agreement to these considerations, in the course will have great potential for educational and learning
named New Media for Architecture (3 credits, Acad- environments. A revolution is already underway outside
emy of Architecture-Mendrisio, University of Lugano, of education with the Web as the primary information
Switzerland), VR technology has been integrated in and retrieval tool, and the virtual reality as a medium to
the teaching path since 2004. Using Pantelidis model reconstruct and to interact with virtual objects. One of
(1997), we have established the different phases which the main aims of VR is to create virtual worlds and virtual
suggest how to insert the virtual reality inside our course environments in which humans can interact together.
(from the definition of the objectives for the course to The problem of the interaction with other users will be
the creation of virtual objects in low cost non-immersive raised in the near future. The realism presumably will
VR technology). The introduction of virtual reality in play a major role in the programs success and likely
the teaching path has been organized in two parts. In will prove positive in future endeavors.
the first part, the teacher introduces and explains to
the students, using VR, important topological objects How to Create the Virtual Worlds
(for example, the Kleins bottle, the Moebius strips),
the hypersurfaces and their use in architecture. For Some virtual worlds will be oriented certainly to the
example, describing the Moebius House, conceived educational field and others for training, research, or
by Ben Van Berkel and Caroline Bos, with a virtual tour fun. Architects will potentially help to make the virtual
inside it. Virtual objects and virtual buildings have been world a pleasant and stimulating place to work and live
835
Virtual Reality and Virtual Environments in Education
in with a good quality of life. This will require people necessary to complete the structure in reality. In the
who understand the psychological effects of the spaces future, architects as designers of virtual worlds will
generated by the computer on people inside them, and be required to make these environments interesting,
the architects have to prepare themselves to this new rich, and engaging places. Therefore, it is important
work opportunity. to prepare correct training on the use of VR in the
For architectural education, virtual reality will be- faculties of architecture.
come the place to go to do things that you could not
normally do in architect-designed buildings. Spaces
created with fractal and non-Euclidean geometry will references
exist, and they could be modified using soft-comput-
ing techniques. In the near future, we will introduce Antonietti, A., Imperio, E., Rasi, C., & Sacco, M.
immersive VR in our teaching environment, and we (2001). Virtual reality and hypermedia in learning
will try to realize virtual world, but one problem at the to use a turning lathe. Journal of Computer Assisted
moment is the cost to realize it. Learning, 17, 142-155.
Boudreau, C., & Okada, M. (1998). Virtual Nagoya
Castle: A foreign language acquisition shared virtual
conclusIon
environment. Retrieved March 6, 2008, from http://
www3.cm.deakin.edu.au/apweb98/FINAL/047.doc
This article illustrates how to integrate VR technology
in a teaching path in a faculty of architecture. Several Byrne, C.M. (1996). Water on tap: The use of virtual
research studies around the world demonstrated the reality as an educational tool. Doctoral dissertation,
potential of virtual reality systems as visualization tools, University of Washington, Seattle, WA.
and, as technology continues to improve, VR systems
Earnshaw, E., Chilton, N., & Palmer, I. (1997). Vi-
will become pervasive instrumentation in the future.
sualization and virtual reality on the Internet. In R.
The use of VR in education represents a phase in the
Earnshaw & J. Vince (Eds.), The Internet in 3D in-
evolution of teaching and training methods. Important
formation, images and interaction (pp. 203-222). San
examples the uses of virtual reality include:
Diego: Academic Press.
Learning in context impossible or difficult to Gagn, R.M., & Briggs, L.J. (1979). Principles of in-
experience in real life (Byrne, 1996; Youngblut, structional design (2nd ed.). New York: Holt, Rinehart
1998) and Winston.
Foreign language acquisition through immersion
in a virtual environment where the language can Gerval, J.P., Popovici, M., Ramdani, M., El Kalai,
be heard and its meaning understood (Boudreau O., Boskoff, V., & Tisseau, J. (2002). Virtual environ-
& Okada, 1998) ments for children. In Proceedings of the International
Engineering training in virtual laboratories provid- Conference on Computers and Advanced Technology
ing access to remote in hazardous environments Education (CATE), Cancun, Mexico (pp. 416-420).
(Antonietti et al., 2001) Gerval, J.P., Popovici, M., & Tisseau, J. (2003). Virtual
stories authoring tools for pedagogical purposes. In
Virtual reality, connected to the Internet and the Proceedings of IASTED International Conference on
World Wide Web, can create cyberspaces and virtual Computer and Advanced in Education, Rhodes, Greece
communities that contribute to realize active learning (pp. 642-646).
environments and more incisive training processes. VR
is invaluable to modern architects, as it allows them to Henderson, K. (1999). On line and on paper: Visual
simulate most scenarios that they will encounter during representations, visual culture and computer graphics
the design, construction, and eventually the life of the in design engineering. Cambridge, MA: MIT Press.
structure they are attempting to build. Virtual reality Johnstone, A.H. (1991). Why is science difficult to
allows architects to essentially create their structures learn? Things are seldom what they seem. Journal of
and test them without wasting any of the resources Computer Assisted Learning, 7, 75-83.
836
Virtual Reality and Virtual Environments in Education
Jonassen, D.H. (1994). Thinking technology: Toward a Youngblut, C. (1998). Educational uses of virtual
constructivist design model. Educational Technology, reality technology (IDA Document D-2128). Institute V
34(4), 34-37. for Defence Analyses. Retrieved March 6, 2008, from
http://www.hitl.washington.edu/scivw/youngblut-
Mantovani, F. (2001). VR learning: Potential and chal-
edvr/D2128.pdf
langes for the use of 3D environments in education and
training. In G. Riva (Eds.), Towards CyberPsycology: Zoller, U. (1990). Students misunderstandings and
Mind, cognition and society in the Internet age (vol. misconceptions in college freshman chemistry (general
2, pp. 207-225). Amsterdam: IOS Press. and organic). Journal of Research in Science Teaching,
27(10), 1053-1065.
Pantelidis, V.S. (1995). Reasons to use virtual reality in
education. VR in the Schools, 1(1). Retrieved March 6,
2008, from http://eastnet.educ.ecu.edu/vr/vr1n1a.txt key terms
Pantelidis, V.S. (1997). Virtual reality (VR) as an in-
structional aid: A model for determining when to use Avatar: Derived from the Sanscrit for the incarna-
VR. Retrieved March 6, 2008, from http://www.coe. tion of Godhead. In virtual environments, an avatar is
ecu.edu/vr/vredmod.html the body that a user wears in a virtual community,
an animated, articulated representation of a human
Prestinenza Puglisi, L. (1999). Hyperarchitecture
which represents the user.
spaces in the electronic age. Basel: Birkhuser.
Data Glove: A glove wired with biosensors to
Rosemblum, L.J., & Cross, R.A (1997). The challenge
detect hand and finger motions.
of virtual reality. In W.R. Earnshaw, J. Vince, & H. Jones
(Eds.), Visualization and modeling (pp. 325-399). San Flight Simulator: A mechanical or electronic
Diego: Academic Press. system for training airplane and spacecraft pilots by
simulating flight conditions. The purpose of simulation
Sala, N., & Sala, M. (2005). Virtual reality in education.
is to thoroughly familiarize students with the vehicle
In D. Carbonara (Eds.), Technology literacy applica-
concerned before they undergo expensive and danger-
tions in learning environments (pp. 358-367). Hershey,
ous actual flight training.
PA: Idea Group Inc.
Fractal Algorithms: Algorithms used in creating
Shin, Y.S. (2004). Virtual experiment environments
computer-generated images. Using either an iterative or
design for science education. International Journal of
recursive process, simple geometric shapes are divided
Distance Education Technologies, 2(2), 62-76.
and replaced by smaller versions of themselves.
Stangel, C., & Pantelidis V.S. (1997). South Greenville
Haptic Feedback: It is the sense of touch at the
Elementary School Virtual Reality Project. VR in the
skin and force feedback information from muscles
Schools, 2(4). Retrieved March 6, 2008, from http://
and joints.
www.coe.ecu.edu/vr/vrits/2-4so-gr.htm
Head-Mounted Display (HMD): A graphical
Virtual reality. (2007). In Encyclopdia Britannica.
display device, such as a pair of tiny LCD screens
Retrieved March 6, 2008, from Encyclopdia Britan-
worn like goggles. Often combined in a single helmet
nica Online, http://www.britannica.com/eb/article-
with position tracking sensors and earphones for 3D
9001382
sound.
Whyte, J. (2002). Virtual reality and the built environ-
Immersion: When several of a users senses are
ment. Oxford: Architectural Press.
isolated from the real world and fed information (im-
Winn, W. (1993). A conceptual basis for educational ages and sound) coming from a computer.
applications of virtual reality (HITL Tech. Rep. No.
Non-Uniform Rational B-Spline (NURBS): A
TR-93-9). Seattle, WA: Human Interface Technology
mathematical model commonly used in computer
Laboratory. Retrieved March 6, 2008, from http://www.
graphics for generating and representing curves and
hitl.washington.edu/publications/r-93-9
surfaces.
837
Virtual Reality and Virtual Environments in Education
838
Section: Process ICT 839
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
WCMS Acceptance with College Students in Estonia
usefulness which describes the users perceptions of tors of usage (e.g., Adams et al., 1992, Igbaria et al.,
the expected benefits derived from using a particular 1997; Straub et al., 1995). As previously noted, others
IS system (Davis, 1989). Usage is the dependent vari- have raised doubts as to the veracity of the framework
able in the TAM, and it is theorized to be influenced or model for VLE tools in higher educational settings
by perceived usefulness and perceived ease of use (Pan et al., 2003).
(p. 320). In general, IS researchers have confirmed Gefen and Straub (2000) suggested that perhaps
the relationships in the TAM (see Straub, Limayem, some aspects of the TAM may be relevant for IS ac-
& Karahanna, 1995). ceptance in the developed West. They listed 42 studies
Researchers (e.g., Brown, 2002; Lee et al., 2003; using the TAM and noted that 25 of these studies did not
Limayem, Cheung, & Chan, 2003; Pan, Siva, & Brophy, show perceived ease of use to be a significant predictor;
2003) have studied the adoption and acceptance of the others showed mixed results and only nine studies
WCMS in college environments. Brown (2002) studied seemed to uphold the view that perceived ease of use is a
the acceptance of WebCT among college students in predictor of usage. At a general level, Gefen and Straub
a developing country, The Republic of South Africa suggested that the perceived usefulness construct tends
(RSA). He found that perceived ease of use is strongly to support the TAM consistently. Similarly, other re-
related to usage and perceived usefulness. Limayem et searchers (e.g., Anandarajan, Igbaria, & Anakwe, 2002;
al. (2003) found support among the constructs used to Brown, 2002) using the TAM to research IS acceptance
investigate the adoption (and continuance intention) of in developing countries underscored the pertinence of
WCMS among students in Hong Kong, a developed relevance of regional contextual influences. For exam-
economy. Lee et al. (2003) reported strong relation- ple, Anandarajan et al. (2002) and Brown (2002)re-
ships between perceived ease of use and perceived searching WebCT acceptance among studentsfound
usefulness as did Brown (2002). However, other that perceived usefulness is not a significant predictor
researchers have reported equivocal results regarding of usage, which is contrary to the view in Gefen and
the suitability and relevance of the TAM for WCMS in Straub. This information indirectly strengthens the
higher learning contexts. For example, Pan et al. (2003) observations in Gefen and Straub highlighting the role
concluded that the TAM may in fact not be applicable of contextual considerations. In this regard, results for
to higher educational settings following the lack of the acceptance of WCMS in a developing country like
support among the relationships for the constructs RSA indicated that a strong relationship exists between
in their study. In the same vein, other findings in the perceived ease of use and usage.
IS literature examining the relationships in the TAM Despite its size, Estonia leads Eastern Europe with
framework have indicated mixed results as well (Gefen regard to the adoption and use of ICT products for so-
& Straub, 2000). Nevertheless, the TAM remains the cio-economic development. With regard to the Internet
most widely used framework for studying technology diffusion per capita, Estonia is among the worlds lead-
adoption and acceptance by IS researchers.
840
WCMS Acceptance with College Students in Estonia
ers (WEF, 2004). Estonian leadership in ICT products The questionnaire included validated measures from
use and diffusion has benefited various Web-based and the relevant literature. It contained multiple indicators W
e-learning initiatives in the country (Estonian eUniver- for each of the constructs (see Appendix). Three and
sity, 2004; The Tiger Leap Foundation, 1997). Given four items were used to measure perceived usefulness
these favorable conditions, it would be reasonable to (PUS) and perceived ease of use (PEOU), respectively.
conjecture that use of, and experience with, Web-based The seven items were taken from Davis (1989) and
technologies, including WCMS, among students in Brown (2002). The usage (USG) scale consists of
the country will be positive. Following the foregoing two items from Igbaria (1990). The measurements
discussion, we propose a set of hypotheses: were operationalized using a Likert-type scale ranging
from 1 (strongly disagree) to 7 (strongly agree) except
H1: Perceived ease of use of WCMS among Estonian for WebCT usage measures which used five and six
college students will have a positive effect on perceived options. SPSS 10.0 and PLS Graph 3.0 were used for
usefulness of WebCT. data analysis. The students demographic profile and
the diversity in WebCT use are shown in Table 2.
H2: Perceived usefulness of WCMS among Estonian
college students will have a positive effect on usage data analysis
of WebCT.
The PLS (partial least squares) procedure is used to as-
H3: Perceived ease of use of WCMS among Estonian sess the casual model. The approach is suitable for stud-
college students will have a positive effect on usage ies with small-sized samples (Chin, 1998) such as this
of WebCT. one. PLS recognizes two components of a casual model:
the measurement model and the structural model. The
measurement model consists of relationships among
research methodology the factors of interest (i.e., the observed variables) and
the measures underlying each construct; it demonstrates
Method and Research Constructs the construct validity of the research instrument (i.e.,
how well the instrument measures what it purports to
This exploratory study used a convenient sample of measure). The two main dimensions are the convergent
72 students. The participants came from four tertiary validity and discriminant validity. First, convergent
institutions in Estonia, that is, The Estonian Busi- validity (composite reliability) assesses the extent to
ness School, Tallinn University of Technology, Tartu which items on a scale are theoretically related. Chin
University, and Estonian IT College. The study used (1998) recommends items with loadings of greater than
judgmental sampling (Neuman, 1997), an approach 0.70. Second, discriminant validity checks the extent to
that permits the researchers to self-select research which items measure a construct. The square root of the
elements with experience or expertise in the research average variance extracted (AVE) for each construct is
theme. The author self-administered a two-page ques- used to check this measure. Fornell and Larcker (1981)
tionnaire to students with WebCT experience. The stu- recommend values higher than 0.50. In the structural
dents were classified into two groups. Thirty students model, this measure gives information as to how well
in the information technology (IT) and engineering the theoretical model predicts the hypothesized paths
disciplines were labeled IT savvy and those from or relationships. PLS software provides the squared
the social sciences and the arts as non-IT savvy. (See multiple correlations (R2) for each endogenous construct
Table 1 for their mean scores for the TAM constructs.) in the model and the path coefficients. The R2 indicates
Importantly, a one-way ANOVA test between the two the percentage of a constructs variance in the model
groups of students indicates little or no statistical dif- while the path coefficients indicate the strengths of
ferences between the two groups. (Recall the purpose relationships between constructs (Chin, 1998).
of the study is to elicit views of students that have used
WebCT; thus, we did not consider the views of non-
adopting students.)
841
WCMS Acceptance with College Students in Estonia
Number Percent
Male 32 44.4
Gender
Female 40 55.6
Less than 25 years 63 87.5
Age
26-39 years 9 12.5
Year 1 13 18.1
Year 2 22 30.6
Education (level)
Year 3 13 18.1
Year 4 24 33.3
Business / Economics 36 50
Information Technology 16 22.2
Study program
Mechanical Engineering 9 12.5
(Department)
Philosophy 6 8.3
Electrical Engineering 5 6.9
1-2 yrs 1 1.4
Years of experience with the 2-3 5 6.9
Internet 3-4 9 12.5
4-5 23 31.9
more than 5 yrs 34 42.7
Mean Standard deviation
Each task was anchored on a Likert scale ranging from 1 (Never use it) to 7
(Use it a great extent).
842
WCMS Acceptance with College Students in Estonia
Assessing the Measurement Model paths coefficients and the size of the R2 values. The
values are generated by PLS Graph 3.0. The test of sig-
Table 3 shows the results of the measurement model. The nificance of all the paths was done using the bootstrap
composite reliability values were consistently above resampling procedure with 200 resamples. It can be
0.9, which exceeds the recommended values by Chin seen that perceived ease of use has a strong effect on
(1998). The items loadings meet Chins (1998) guideline perceived usefulness with a path coefficient of 0.375
of between 0.60 and 0.70. Each of the constructs AVEs and accounts for 66% in the variation of perceived
exceeds the 0.5 guideline as suggested by Fornell and usefulness. The perceived ease of use construct has a
Larcker (1981). Table 4 shows the AVEs, intercorrela- significant effect on usage of WebCT (path coefficient =
tions among the constructs, and the square root of AVE 0.676). Inconsistent with our hypothesis (H2), perceived
(in bold text). No correlations were equal to or greater usefulness did not have a significant effect on WebCT
than the squared root of AVE in the leading diagonal. usage (i.e., the path coefficient is 0.072). Together, per-
This suggests that our measures are distinct and uni- ceived ease of use and perceived usefulness explained
dimensional. In brief, the convergent and discriminant 21% of the variance in the usage construct.
validity in this study is psychometrically adequate.
As noted above, the structural model is concerned with This study investigates the acceptance of WCMS by
the explanatory power of variables. Figure 2 shows the college students in Estonia, which is an emerging
843
WCMS Acceptance with College Students in Estonia
R2 = 0.66 R2 = 0.21
Perceived 0.072
usefulness Usage
0.676
0.375
Perceived
ease of use
economy in Eastern Europe. The study found support observations with regard to the results in the TAM stud-
for two of the paths (i.e., hypotheses) in the TAM. To ies in the developing and emerging countries; that is,
our knowledge, this study is among the first to inves- perceived usefulness and usage are less of a predictor
tigate this theme in the Baltic region. The study found in the TAM for IS acceptance in these contexts. With
support for relationships between perceived ease of this contribution, the body of knowledge in the IS
use and usage and perceived usefulness, but the data field is enriched and new insights could emerge. For
did not support the relationship between perceived example, researchers could also investigate why such
usefulness and usage. differences exist.
The empirical evidence from this study can make There are limitations in this study. The research
both practical and theoretical contributions. Practically, is exploratory; as such, a convenient sample size of
the findings suggest that college students and other 72 may be limiting. The selected subjects may not be
entities using WCMS and related technologies use representative of all college students in Estonia (or the
them more when the use of such tools is perceived to region). The measurement of WebCT usage was self-
be less difficult to use. It is not sufficient to expect that reported; and this might limit insight. This study is a
the perceived usefulness of WCMS and related VLE cross-sectional study; a longitudinal study may be en-
tools will lead to an increase in their use (and success). lightening. In order to improve upon the generalizability
This finding is useful for e-learning and Web-based of this studys findings, future studies could increase
learning projects administrators in Estonia and similar the sample size as well make an effort to incorporate
countries that may be looking for empiric information other relevant variables such as age, peer pressure, and
that could enable them to maximize their returns on in- facilitating conditions into the research model.
vestment in VLE and AEE technologies. Theoretically,
the results in this study add to the debate regarding the
results obtainable in the TAM studies in general (Gefen references
& Straub, 2000) and for WCMS acceptance in higher
education settings in particular (Pan et al., 2003). As Adams, D.A., Nelson, R.R., & Todd, P.A. (1992).
was discussed, Gefen and Straub (2000) suggested Perceived usefulness, ease of use and usage of in-
that some aspects of the TAM may be more important formation technology: A replication. MIS Quarterly,
for IS acceptance in richer nations. Anandarajan et al. 16(2), 227-247.
(2002) and Brown (2002) provided evidence for de-
veloping countries. In this study, we enriched insight Anandarajan, M., Igbaria, M., & Anakwe, U. (2002). IT
with evidence from an emerging economy country. acceptance in a less-developed country: A motivational
The data analysis and conclusions lend support to the factor perspective. International Journal of Information
Management, 22(1), 47-65.
844
WCMS Acceptance with College Students in Estonia
Brown, I. (2002). Individual and technological factors ing in distance learning. Educational Technology &
affecting perceived ease of use of Web-based learning Society, 6(2), 50-61. W
technologies in a developing country. Electronic Jour-
Leidner, D.E., & Jarvenpaa, S.L (1993). The infor-
nal of Information Systems in Developing Countries,
mation age confronts education: Case studies on
9(5), 1-15.
electronic classrooms. Information Systems Research,
Carliner, S. (2005). Course management systems ver- 4(1), 24-54.
sus learning management systems. Retrieved March
Limayem, M., Cheung, C.M.K., & Chan, G.W.W.
6, 2008, from http://www.learningcircuits.org/2005/
(2003). Explaining information systems adoption
nov2005/carliner.htm
and post-adoption: Towards an integrative model. In
Chin, W. (1998). Issues and opinion on structural equa- Proceedings of the 24th. International Conference on
tion modeling. MIS Quarterly, 22(1), vii-xvi. Information Systems.
Davis, F.D. (1989). Perceived usefulness, perceived ease Neuman, W.L. (1997). Social research method. London:
of use, and user acceptance of information technology. Allyn and Bacon.
MIS Quarterly, 13(3), 319-339.
Pan, C., Siva, S., & Brophy, J. (2003). Students attitude
Estonian eUniversity. (2004). The UNIVe Project. in a Web-enhanced hybrid course: A structural equation
Retrieved March 6, 2008, from http://www.e-uni. modeling inquiry. Journal of Educational Media and
ee/Minerva/ Library Sciences, 41(2), 181-194.
Fornell, C., & Larcker, D.F. (1981). Evaluating struc- Straub, D., Limayem, M., & Karahanna, E. (1995).
tural equations models with unobservable variables and Measuring system usage: Implications for IS theory
measurement error. Journal of Marketing Research, testing. Management Science, 41(8), 1328-1342.
18, 39-50.
Tavangarian, D., Leypold, M.E., Nlting, K., Rser,
Gefen, D., & Straub, D. (2000). The relative importance K.M., & Voigt, D. (2004). Is e-learning the solution for
of perceived ease of use in the IS adoption: A study of individual learning? Electronic Journal of E-Learning,
e-commerce adoption. Journal of AIS, 1(8), 1-28. 2(2), 273-280.
Ifinedo, P. (2005, September 12-15). E-learning technol- Tiger Leap Foundation, The. (1997). Retrieved March
ogy adoption factors in an Eastern European country: 6, 2008, from http://www.tiigrihype.ee/eng/sihtasutus/
An exploratory study. In Proceedings of the 9th East- tootajad.html
European Conference on Advances in Databases and
World Economic Forum (WEF). (2004). The networked
Information Systems (ADBIS2005), Tallinn, Estonia
readiness index rankings 2003. Retrieved March 6,
(pp. 249-262).
2008, from http://www.weforum.org/pdf/Gcr/GITR_
Ifinedo, P. (2006). Acceptance and continuance inten- 2003_2004/Framework_Chapter.pdf
tion of Web-based learning technologies (WLT) use
among university students in a Baltic country. Elec-
tronic Journal of Information Systems in Developing key terms
Countries (EJISDC), 23(6), 1-20.
Asynchronous Educational Environment (AEE):
Igbaria, M. (1990). End-user computing effectiveness: This is a learningteaching environment in which there
A structural equation model. Omega, 18(6), 637-652. is no timing requirement. Students can access course
material any time from anywhere.
Igbaria, M., Zinatelli, N., Cragg, P., & Cavaye, A.L.M.
(1997). Personal computing acceptance factors in small Emerging Economy: This term has differing inter-
firms: A structural equation model. MIS Quarterly, pretations; however, for the purposes of this study, we
21(3), 279-305. used it to refer an economy-type whose socio-economic
indicators (e.g., poverty and technological levels) are
Lee, J., Cho, H., Gay, G., Davidson, B., & Ingraffea,
better than those of developing countries (e.g., Nigeria
A. (2003). Technology acceptance and social network-
and Burma), but lower in comparison to richer coun-
845
WCMS Acceptance with College Students in Estonia
tries (e.g., Italy and Canada). Examples of emerging Technology Acceptance Model (TAM): This is a
economy countries include Estonia and Hungary. theoretical framework designed by Davis (1989) that
proposes a relationship between users acceptance of
Learning Management Systems (LMS): These are
a new IS and the users perceptions of the ease of use
tools that primarily act as electronic registrars and allow
and usefulness of the IS.
the monitoring of various enrollment and related tasks
in a virtual learning environment. Examples of LMS Usage: This is the dependent variable in the TAM,
include Saba, NetDimensions EKP, and SumTotal. and it gives an indication of the use of the information
system.
Perceived Ease of Use: This refers to the degree
to which an individual believes using a particular in- Virtual Learning Environment (VLE): An en-
formation system would be free of effort. vironment that facilitates the management of courses
between the instructor(s) and students. It is used to be
Perceived Usefulness: This refers to an individuals
used to support flexible and distance learning.
perceptions of the expected benefits from using a par-
ticular IS system Web-Based Course Management Systems
(WCMS): These are tools that permit the management
of asynchronous learning environments. Examples
include WebCT and Blackboard.
846
Section: Process ICT 847
It would be counterproductive for the 21st century stu- the ease of communication are the main goals of the
dent to be harnessed to a computer labhandcuffed to wireless revolution, the next question is how can this
place and time for learning to occur. Wireless technol- phenomenon impact classroom instruction? With this
ogy frees education by equipping each student with a notion, we can commit to quality teaching and student
laptop computer or PDA and a wireless network card learning.
that provides an Internet connection.
Copyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Wireless Revolution and Schools
maIn dIscussIon are heavily used, especially by classes that book for
an entire term (Davies, Carbonaro, & Kendal, 2003).
Wireless notebooks, also known as wireless laptops, are This same principle can apply to elementary schools,
one of the most widely used forms of wireless technol- middle schools, and junior high schools because those
ogy in schools and campuses today. Many schools and students often have to share access to one or two com-
campuses are using wireless mobile labs equipped with puter labs as well.
laptop computers and occasionally a network printer, The list of advantages regarding the use of wireless
all housed in a metal rolling cart. This notebook cart notebooks can continue, but there are also a few issues
allows for the automatic conversion of any classroom that need to be considered. Price is often an issue that
into a fully functioning computer lab. interferes with the availability of wireless devices in
The use of wireless notebooks in educational set- a classroom. Most laptops cost between $1,000 and
tings has many advantages. First, the lack of network $3,000 (Caverly & MacDonald, 2003), costing 50%
cables allows more flexibility in instructional activi- to 100% more than their desktop counterparts (McK-
ties. Students can work in collaborative groups with immy, 2003). Laptops are also harder to upgrade due to
their devices without being confined to a static room the hardware used is designated only for that particular
layout. They can even move into a different room brand and model, making it difficult to integrate future
with the devices, as long as they are in the range of technologies (McKimmy, 2003). It is also known that
the wireless network. The reduction in cords can also laptop batteries can only last for 2 to 5 hours, unless
significantly clean up the computing facility (McK- replaced with another charged battery (students must
immy, 2003). Second, instructional time can be saved shut down the computer before initiating the switch)
because students do not need to relocate in order to use or plugged into an electrical outlet with an AC adapter.
computers within any instructional activity. Also, in This may cause a distraction in a classroom or loss of
the case of using a mobile lab, each student can have instructional time, as well as an increased need for
access to his own computer and time can be saved surge protectors (increasing wires and cabling). Security
because students do not need to take turns completing can also be an issue if a wireless network and security
their assignments on the computer. By comparison, in protocols are not configured properly. Most wireless net-
the higher education setting, instructional time can be works, including the more common 802.11b standard,
saved because fewer cords means less setup time for provide a form of encryption known as WEP (Wired
class lectures (DeCerce, 2001). Third, the smaller size Equivalent Privacy), however it is notoriously weak
of the laptop computers and the comfort of having the (McKimmy, 2003). If configured properly through ad-
computers in their familiar classroom environment can ditional security measures, wireless networks can be
help both students and teachers feel relaxed and not relatively safe features. According to McKimmy:
overwhelmed by big desktop computers that neither One option is to control access to the network based
student nor teacher can see around (Rajala, 2003). As on the individual machines MAC address (message
Jamie McKenzie (2001), the editor of From Now On authentication code), a unique number that identifies
- The Educational Technology Journal, states, Finally its NIC (network interface card). Unknown computers
we have computers that can sit on a desk with no more may be denied access if their MAC address is not in
mess or bother than a textbook. Having computers an authorized list. Other alternative to method listed
at the students desks creates a scenario where an in- previously is the notion of the VPN or the virtual private
structor can move seamlessly between two classroom network system.
environments. When students have the laptop covers Another issue that often comes up is that students
down, the room is an ordinary classroom. A computer may begin to use their laptops for purposes other than
lab environment results by simply lifting up the laptop the classroom task at hand. With the capability of In-
covers (Levine, 2002). A fourth advantage is offered due ternet access, instant messaging, and various computer
to the increased access of computers among students. games, wireless laptops can often detract student at-
At the University of Alberta in Canada, a mobile lab tention from the lesson. However, Lawrence Levine
can be checked out and makes it possible for some (2002), a teacher of mathematics, has found software
classes to get computer access when it otherwise might applications, such as CrossTec Corp.s NetOp School
have been impossible since the regular computer labs and SMART Technologies SynchronEyes, that help
848
The Wireless Revolution and Schools
teachers or instructors monitor student laptop use. Ac- present to utilize technology as a teaching and learn-
cording to Levine, these programs allow instructors ing tool. W
to monitor and take control of a students machine, as Even though the use of wireless laptops seems more
well as project the screen of a students laptop so that prevalent among elementary, secondary, and higher
everyone in class can see it. In this way, students are education students, preschool students are also benefit-
discouraged from using their laptops for purposes other ing from the use of wireless laptops. At the Primrose
than class-related uses. School at Bentwater in Atlanta, Georgia, teachers use
Despite some of the issues raised against the use wireless laptops to engage students in curricular based
of wireless laptops, there have been many successful lesson activities. For example, during small group
scenarios demonstrating their benefit to educational instruction on a unit about air transportation, each of
environments and student learning. Several schools in eight students uses a laptop to learn more about hot-air
Louisiana, through a project called Project CREATE balloons. Their teacher helps them turn on their laptops,
(Careers, Research and Exploration, Application, and access the Internet, and connect to a preselected Web
Technology Education), a wireless mobile computer site on the Albuquerque International Balloon Fiesta.
lab was used to help ninth grade students improve While visiting this Web site, students learn how to
their technology skills and conduct a research project. count balloons, recognize different shapes, and look at
Students used word processing skills and electronic an image of the inside of a hot-air balloon while their
and Internet-based research skills to create a research teacher explains how these balloons work. The Web
project based on a career. The students also created a site also gives students an idea for the type of balloon
portfolio compiling their best writing and computer they would like to create for the art project they will
application activities. Due to this project, Mandeville design following their 20 minute mini-lesson (Scott,
High Schools Iowa Test of Educational Development 2003). Many believe that technology activities are
(ITED) scores rose an average of 20%, thus, contributing not developmentally appropriate for young students,
to an overall increase in the schools 2002 performance but this example definitely provides proof that even
score. In addition, 363 of 365 students scored 75% or small children can benefit from the use of wireless
higher on the final checklist, which included computer technology.
application skills such as creating and formatting word Handhelds, commonly referred to as personal digital
processing documents, envelopes, labels and tables, as assistants (PDAs), are slowly gaining popularity in in-
well as collecting data in a spreadsheet and insetting structional settings. Their pocket-sized portable feature
it in a word-processing document (Styron & Disher, makes them easy to manage and use in the classroom.
2003). Akin to the wireless notebooks, many PDAs also now
Levine (2002), at the Stevens Institute of Technology have integrated wireless capabilities that allow students
in Hoboken, New Jersey has also used wireless laptops to use the Internet and perform various network related
to teach his students mathematics. He often provides functions when in the range of a wireless network.
a complete set of class notes that are available to his There are several advantages to using handhelds in
students on the Web. He mentions that the students can the classroom for both instructors and students. First,
download the notes after class. However, it seems that when comparing the price of a handheld to the price
notes can also be referred to in class with the use of the of a laptop, there is a large discrepancy. While laptops
wireless laptops by having each student find the class cost thousands of dollars, handhelds cost hundreds of
Web page. Following an in class lecture, Lavine also dollars, with basic models starting at less than a $100
prepares an activity for his students to complete with (Caverly & MacDonald, 2003). The affordability of a
the use of their laptops to help reinforce the concepts wireless PDA vs. a wireless laptop may indeed make
presented in his lecture. He notifies his students when these devices eventually one of the more popular
the use of the laptop is appropriate in class by asking choices among wireless devices used in the classroom.
them to put their laptop cover up. Levine realizes that In addition, since PDAs are using two major operating
some challenges can arise with the use of wireless systems (Palm OS or PocketPC OS, with Blackberry
laptops in the classroom, but he feels that the effort OS a distant third), applications for these devices are
expended to deal with these challenges is more than prolific and platform ambivalent (cited in Caverly &
compensated by the opportunities that such classrooms MacDonald, 2003). The availability of various software
849
The Wireless Revolution and Schools
programs at shareware sites that are usable on different the classroom TV, which allowed him to turn it on and
PDA models allows these devices to be more accessible off from the back of the room (cited in Yuen & Yuen,
to all users. These software applications include tuto- 2003). Regardless of these limitations, there have been
rial and tool software available on regular computers. several successful programs initiated that demonstrate
Along with these applications, PDAs provide students the educational benefits of using PDAs within the
and teachers with organizational management. Students classroom environment. In a history class at Stagg High
can schedule appointments, store addresses, make to- School in Oakland Park, Illinois, students used Palm
do lists, respond to e-mail, make calculations, track III handhelds to check stock prices on the Internet and
assignments, and read e-books. Programs such as 4.0 write reports about the management of the fantasy stock
Student (Handmark, 2003) or Active Student Organizer portfolios they created by using the foldable keyboards
(Siang, 2003) track homework, quizzes, test details, due as input devices (Trotter, 2001). At that same school,
dates, scores, textbooks, grades, and even forecast GPA in a geography course, students used their handhelds
(Caverly & MacDonald, 2003). Teachers can use PDAs to create a concept map, using PiCoMap, which they
in a similar fashion to obtain instant access to student could then beam to their peers or their teacher with the
records and grades from a school server. Specialized infrared beaming feature (Trotter, 2001).
tutorials have also been created to help students with In Hartland, Michigan, sixth graders at Hartland
vocabulary, science, grammar, foreign languages, and Farms Intermediate learned about the polar regions of
other subject areas. PDAs can also provide support for the earth. They were required to investigate a particular
students with disabilities, due to text-to-speech readers polar animal. In order to do this, the students used their
and spell checkers that pronounce words and definitions Palm handhelds to record facts they found in magazines
(Caverly & MacDonald, 2003). One of the most distinct such as National Geographic. They were also able to
features of a PDA that differentiates it from a desktop use FlingIt to send Web pages about their topic to their
or laptop computer is its infrared beaming capability. handheld devices. Students then beamed these useful
With this capability, students can easily transfer files resources to their group members and interested peers,
either to their peers, to their teacher (who can instantly so that they could have off-line access to the pages at
assess the work, store the grade on a spreadsheet, and home. After their research on a polar animal, the stu-
beam it back to the student), or maybe eventually dents took a trip to the zoo and could document their
store them on a local networked server. The files can trip or any new information that would contribute to
also be synched to a desktop or laptop computer for their research project with Kodak PalmPix cameras
additional storage. (Curtis, Luchini, Bobrowsky, Quintana, & Soloway,
Although the personal desk assistant has several 2002). Programs on the handheld and peripherals as-
notable advantages, there are still many features that sociated with the handheld were used to enhance this
need to be improved. Viewing Web sites composed of group of students learning experiences.
several frames can be frustrating and sometimes not Teachers and administrators have also found that
accessible. In addition, it can be bothersome to have to handhelds can be used as excellent tools for the purpose
continuously scroll both horizontally and vertically to of increasing homeschool communication. Strom and
view an entire Web page due to the small screen size. Strom (2003) conducted a field test, with the cooperation
According to Caverly and MacDonald, the version of Motorola, on high school students from low- and
of Office packaged on PocketPC PDAs is limited, middle-income households. Faculty from that school
not allowing formatting or tables in word processing, were asked to use a PDA to record both positive and
charts in spreadsheets, editing or animation in a slide negative student behaviors and send those to parents
show, or frames in Web pages. All of these limitations throughout the day using a pager messaging system.
can be slightly frustrating in an educational setting. Both parents and teachers were given a School Code
Some administrators have also discussed the misuse of Recordable Events (SCORE) card that had 50 pre-
of PDAs in educational settings. They are afraid that determined statements that describe typical behaviors
students will use these devices to cheat on tests, play of students assigned to a certain code. Teachers were
games, or send notes and e-mail to their friends (Trotter, to use these codes to send messages to parents through-
2001). In one instance, a student installed a software out the day about their childs behavior. In this way,
program that turned his PDA into a remote control for parents would receive more immediate feedback on
850
The Wireless Revolution and Schools
both positive and negative behavior and could provide it to take on the functionality and practicality of an
their children with the proper form of reinforcement ordinary class notebook with the additional benefit of W
or punishment. According to Strom and Strom, the advanced computer technology.
requirement of immediacy for giving parents feedback Similar to the wireless notebooks and handhelds,
about student behavior is an important condition of ef- Tablet PCs also have a few issues that need to be ad-
fective positive or negative reinforcement and punish- dressed. First of all, since Tablet PCs are a rather new
ment. At the conclusion of the field-based portion of form of mobile technology, the cost of the Tablet PC
the study, surveys were distributed to faculty, parents, usually exceeds the cost of a wireless notebook, most
and students. The results of the surveys confirmed pricing well over $2,000 (Ashenhurst, 2003). However,
that use of personal digital assistants and pagers can this price will most likely decrease as the demand for
improve communication between the school and home Tablet PCs increases. Based on personal experience with
(Strom & Strom, 2002). Hence, PDAs can not only a Compaq Tablet PC TC1000, Tablet PCs also seem to
provide direct educational benefits to students, but can download information at a slower rate their wireless
also facilitate communication between all members of notebook counterparts, maybe due to the combination
the learning community. of processor speed and memory available. Another
Tablet PCs are one of the newest forms of wireless cumbersome aspect is that a CD-RW/DVD drive would
mobile technology. They preserve the relative screen have to be attached as an external drive. Thus, the
size of a laptop computer, but function much like a PDA only means for backing up data or transferring files
due to the use of a stylus as an input mechanism. Both without an external drive are through the USB ports.
quantitative and qualitative research has been conducted Even though a few issues may exist, Tablet PCs have
on the educational benefits these devices may provide. been used successfully in educational environments.
Although this device is in its infancy stage in relation At Sharon Academy in Vermont, Art teacher Ed Koren
to its use in educational settings, many of its features uses Tablet PCs to help students draw. He states that
have been found beneficial to learners. The handwriting students often get upset during the drawing process,
recognition feature and the ability to save notes written but by using the Tablet PC, students can do it without
in Windows Journal in either handwriting form or as fearing that theyre going to make a mistake. They can
digital text can allow students to preserve the notes as always go backwards, or can erase, or they can just
if they took them on a sheet of paper or search their start again. The Tablet PC accents and influences the
digital notes for certain keywords or phrases. Like both quality of the work that the students are able to do
the wireless notebooks and PDAs, Tablet PCs allow for (cited in Freedom and versatility, 2003).
flexible educational settings, where students can form Comparatively, at Ocoee Middle School, when
collaborative groups and still have access to their own students come into the classroom, they log onto their
wireless device. Tablet PCs can also provide students Tablet PCs and go to Microsoft Class Server 3.0
with instant assessment, just as PDAs do, with the use of where they can find their assignments, worksheets, and
handwriting recognition features. Instant polling, brain- quizzes, allowing them to be self-directed and work at
storming, and results from team and group activities can their own pace. Teachers access each students work
be easily shared with the entire class due to the Tablet through Class Server where they can correct assign-
PCs wireless networking feature. With programs such ments, provide immediate feedback, and enhance their
as Silicon Chalk and Colligo, users can discover one ability to individualize curriculum (cited in Tablet
another, set up connections, and start to communicate PCs Go to School, 2003). Since the Tablet PC is one of
in an informal manner (Lomas & Rauch, 2003). This the newest forms of mobile technology, several studies
feature of the Tablet PC encourages the formation of are still currently underway and should provide more
collaborative learning groups, a common occurrence real-life examples that demonstrate the benefits of the
within constructivist learning environments. Alterna- Tablet PC in educational settings. The similarity in the
tive methods of input, such as keyboard, stylus, and functions of this device with the wireless notebooks and
voice recognition are also available. This may provide handhelds, in combination with the additional new fea-
increased accessibility by addressing the varying needs tures present only in the Tablet PC, will surely provide
of different learners. Another important advantage of increased benefits in communication and information
the Tablet PC is its portable size, lightweight feature, retrieval within educational environments.
and adjustable monitor and display settings, allowing
851
The Wireless Revolution and Schools
852
The Wireless Revolution and Schools
Trotter, A. (2001). Handheld computing: New best tech PDA (Personal Digital Assistant): A portable
tool or just a fad? Education Week, 21(4), 8. Retrieved computing device for organizing personal data such as W
March 6, 2008, from http://www.edweek.org/ew/news- telephone numbers, appointments, and notes. It tech-
tory.cfm?slug=04palm.h21 nology device is capable of transmitting and receiving
data when equipped with a wireless module.
Yuen, S. C., & Yuen, P. K. (2003). PDAs as educational
power tools. Tech Directions, 62(9), 14-17. Tablet PC: A computer shaped in the form of a
notebook or a slate with the capabilities of being writ-
ten on through the use of digitizing tablet technology
key terms or a touch screen.
Education Technology: The use of information, Wireless Application: Wireless application pro-
communication, and technological devices and pro- tocol (WAP) is an application environment and set of
cesses to enhance, extend, and engage, the teaching communication protocols for wireless devices designed
and learning process to promote quality teaching and to enable manufacturer-, vendor-, and technology-inde-
active student learning and engagement. pendent access to the Internet and advanced telephony
services.
Handheld: Handheld devices (also known as
handhelds) are pocket-sized computing devices that Wireless Technology: The term wireless technology
are rapidly gaining popularity as the access to infor- is generally used for mobile IT equipment. It encom-
mation in every walk of life becomes more and more passes cellular telephones, personal digital assistants
mission critical. (PDAs), and wireless networking.
853