• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 28
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 49
  • 15
  • 11
  • 10
  • 10
  • 9
  • 8
  • 8
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

The Digital Badge Initiative and its Implications for First-Year Writing

Tillinghast, Rena 13 May 2016 (has links)
College students seek degrees to obtain employment in their field of interest, however, as the 21st century progresses, employers are often requiring specific skills in addition to degrees and transcripts. As students graduate with their Associates, Bachelors, and Graduate degrees, they plan to present these degrees as sufficient evidence of their qualifications. However, there is recent criticism of college degrees as evidence of qualifications. A beneficial alternative for students would be digital badges. A digital badge is a visual representation that signifies a specific achievement with detailed metadata attached. Digital badges in first-year writing courses would benefit students as they develop specific writing and critical thinking skills as prompted by the curriculum. First-year writing digital badges can include: researching, synthesizing, writing process, constructing authority, etc. as deemed appropriate by the instructor. Ultimately, students will display their badges on their resumes, CVs, or any other document verifying their achievements.
22

Participant Outcomes, Perceptions, and Experiences in the Internationally Educated Engineers Qualification Program, University of Manitoba: An Exploratory Study

Friesen, Marcia R. 20 August 2009 (has links)
Immigration, economic, and regulatory trends in Canada have challenged all professions to examine the processes by which immigrant professionals (international graduates) achieve professional licensure and meaningful employment in Canada. The Internationally Educated Engineers Qualification Program (IEEQ) at the University of Manitoba was developed as an alternate pathway to integrate international engineering graduates into the engineering profession in Manitoba. However, universities have the neither mandate nor the historical practice to facilitate licensure for immigrant professionals and, thus, the knowledge base for program development and delivery is predominantly experiential. This study was developed to address the void in the knowledge base and support the program’s ongoing development by conducting a critical, exploratory, participant-oriented evaluation of the IEEQ Program for both formative and summative purposes. The research questions focussed on how the IEEQ participants perceived and described their experiences in the IEEQ Program, and how the participants’ outcomes in the IEEQ Program compared to international engineering graduates pursuing other licensing pathways. The study was built on an interpretivist theoretical approach that supported a primarily qualitative methodology with selected quantitative elements. Data collection was grounded in focus group interviews, written questionnaires, student reports, and program records for data collection, with inductive data analysis for qualitative data and descriptive statistics for quantitative data. The findings yielded rich understandings of participants’ experiences in the IEEQ Program, their outcomes relative to international engineering graduates (IEGs) pursuing other licensing pathways, and their perceptions of their own adaptation to the Canadian engineering profession. Specifically, the study suggests that foreign credentials recognition processes have tended to focus on the recognition and translation of human and/or institutional capital. Yet, access to and acquisition of social and cultural capital need to receive equal attention. Further, the study suggested that, while it is reasonable that language fluency is a pre-requisite for successful professional integration, there is also a fundamental link between language and cognition in that international engineering graduates are challenged to understand and assimilate information for which they may not possess useful language or the underlying mental constructs. The findings have implications for our collective understanding of the scope of the professional engineering body of knowledge.
23

Participant Outcomes, Perceptions, and Experiences in the Internationally Educated Engineers Qualification Program, University of Manitoba: An Exploratory Study

Friesen, Marcia R. 20 August 2009 (has links)
Immigration, economic, and regulatory trends in Canada have challenged all professions to examine the processes by which immigrant professionals (international graduates) achieve professional licensure and meaningful employment in Canada. The Internationally Educated Engineers Qualification Program (IEEQ) at the University of Manitoba was developed as an alternate pathway to integrate international engineering graduates into the engineering profession in Manitoba. However, universities have the neither mandate nor the historical practice to facilitate licensure for immigrant professionals and, thus, the knowledge base for program development and delivery is predominantly experiential. This study was developed to address the void in the knowledge base and support the program’s ongoing development by conducting a critical, exploratory, participant-oriented evaluation of the IEEQ Program for both formative and summative purposes. The research questions focussed on how the IEEQ participants perceived and described their experiences in the IEEQ Program, and how the participants’ outcomes in the IEEQ Program compared to international engineering graduates pursuing other licensing pathways. The study was built on an interpretivist theoretical approach that supported a primarily qualitative methodology with selected quantitative elements. Data collection was grounded in focus group interviews, written questionnaires, student reports, and program records for data collection, with inductive data analysis for qualitative data and descriptive statistics for quantitative data. The findings yielded rich understandings of participants’ experiences in the IEEQ Program, their outcomes relative to international engineering graduates (IEGs) pursuing other licensing pathways, and their perceptions of their own adaptation to the Canadian engineering profession. Specifically, the study suggests that foreign credentials recognition processes have tended to focus on the recognition and translation of human and/or institutional capital. Yet, access to and acquisition of social and cultural capital need to receive equal attention. Further, the study suggested that, while it is reasonable that language fluency is a pre-requisite for successful professional integration, there is also a fundamental link between language and cognition in that international engineering graduates are challenged to understand and assimilate information for which they may not possess useful language or the underlying mental constructs. The findings have implications for our collective understanding of the scope of the professional engineering body of knowledge.
24

Technology for the 21st Century Workforce: A Case Study of a Rural East Tennessee Workforce Community

Bolton, Kim 01 May 2019 (has links)
The purpose of this study was to assess technology use, on-the-job technology training, education levels, and salary ranges of employees in low-, middle-, and high- skill jobs in a rural county in East Tennessee to create an example of a small town workforce. For this study, technology included computers, robotics, and mobile technology. A survey determined the technology used, training provided, salaries, and job skill levels based on education obtained and required by major employers. The study identified the level of jobs requiring more technology skills and salaries or training related to these job skill levels. Participants included 336 persons who completed an electronic survey. Participants represented twenty-eight different companies in healthcare, education, manufacturing, banking, and other small businesses in an East Tennessee rural county. The major findings of the study included: a) use of multiple forms of technology in all job skill levels; b) more time spent in on-the-job training for higher job skill levels; c) participants in lower job skill levels more likely to be overqualified for their position; d) participants in higher paying jobs used more types of technology; and e) participants in higher skill level jobs tend to have higher salaries. The study concluded that, while technology affected all skill levels, there was a significantly positive relationship between salary, technology use, technology training, and job skill level.
25

A Digital Identity Management System

Phiri, Jackson January 2007 (has links)
>Magister Scientiae - MSc / The recent years have seen an increase in the number of users accessing online services using communication devices such as computers, mobile phones and cards based credentials such as credit cards. This has prompted most governments and business organizations to change the way they do business and manage their identity information. The coming of the online services has however made most Internet users vulnerable to identity fraud and theft. This has resulted in a subsequent increase in the number of reported cases of identity theft and fraud, which is on the increase and costing the global industry excessive amounts. Today with more powerful and effective technologies such as artificial intelligence, wireless communication, mobile storage devices and biometrics, it should be possible to come up with a more effective multi-modal authentication system to help reduce the cases of identity fraud and theft. A multi-modal digital identity management system IS proposed as a solution for managing digital identity information in an effort to reduce the cases of identity fraud and theft seen on most online services today. The proposed system thus uses technologies such as artificial intelligence and biometrics on the current unsecured networks to maintain the security and privacy of users and service providers in a transparent, reliable and efficient way. In order to be authenticated in the proposed multi-modal authentication system, a user is required to submit more than one credential attribute. An artificial intelligent technology is used to implement a technique of information fusion to combine the user's credential attributes for optimum recognition. The information fusion engine is then used to implement the required multi-modal authentication system.
26

Investigating employability: a study to ascertain whether attaining stackable credentials increases opportunity for employment for career technical graduates

Whittington, Amy Green 06 May 2017 (has links)
Career technical education plays an important part in the mission of community colleges – providing educational opportunities needed by members of their communities. Career technical programs prepare students for entry into the workforce. Accountability standards for career technical programs, from local, state, and federal bodies, monitor placement of career technical graduates in jobs related to their field of study. To help these students become more competitive in the job market, curricula are being aligned with national certifications to help students graduate from career technical programs with stackable credentials. Stackable credentials refer to the idea of “stacking” degrees, certifications, and credentials along the way to an education in a particular field of study. Some of these credentials can be costly, though, requiring career technical program administrators to question whether implementing this stackable credential structure is truly beneficial for the students. The purpose of this study was to examine survey results of industry representatives who serve on advisory committees for career technical programs at a rural community college to ascertain whether earning stackable credentials in career technical programs at a rural community college does increase opportunities for employment. Data were obtained from an Industry Input Survey conducted at a rural community college. Descriptive statistics were used for data analysis. Results of this study indicate that while entry-level employment requirements focus more on a high-school diploma or high school equivalency exam and an earned Associate of Applied Science degree, the majority of participants did indicate that holding a national certification would give a potential employee hiring preferences. Results of the analysis are presented in narrative and table form. Conclusions and recommendations for future research follow discussion of analysis.
27

Ohio Educators’ Perceptions of College Credit Plus Adjunct Teacher Credentialing

Collins, Tracy Ann 13 July 2022 (has links)
No description available.
28

Photovoice: exploring immigrants and refugees' perceptions and access to mental health services in Winnipeg

Sherzoi, Ogai 25 January 2017 (has links)
The deterioration of health status for immigrants and refugees is mostly observed after their arrival in Canada. Additionally, immigrant and refugee minorities are at a higher risk for mental health problems. Yet, refugees and immigrants in Canada, particularly those from non-European countries tend to underutilize community resources and mental health services. This study uses a participatory arts-based method of photovoice to gain deeper knowledge of the realities and lived experiences of immigrants and refugees who have or are dealing with mental health problems in Winnipeg. Additionally, it will shed light on the barriers faced by immigrant and refugee community, and the context in which they are unable to access services. Six immigrant and refugee individuals volunteered to participate in this photovoice project. The participants discussed structural barriers, non-recognition of non-Canadian credentials, underemployment/ unemployment, poverty, discrimination, stigma, language barriers, lack of culturally inclusive services, inequality, lack of social network, and marginalization. The findings have implications for social work and future research is discussed. / February 2017
29

Nymbler: Privacy-enhanced Protection from Abuses of Anonymity

Henry, Ryan January 2010 (has links)
Anonymous communications networks help to solve the real and important problem of enabling users to communicate privately over the Internet. However, by doing so, they also introduce an entirely new problem: How can service providers on the Internet---such as websites, IRC networks and mail servers---allow anonymous access while protecting themselves against abuse by misbehaving anonymous users? Recent research efforts have focused on using anonymous blacklisting systems (also known as anonymous revocation systems) to solve this problem. As opposed to revocable anonymity systems, which enable some trusted third party to deanonymize users, anonymous blacklisting systems provide a way for users to authenticate anonymously with a service provider, while enabling the service provider to revoke access from individual misbehaving anonymous users without revealing their identities. The literature contains several anonymous blacklisting systems, many of which are impractical for real-world deployment. In 2006, however, Tsang et al. proposed Nymble, which solves the anonymous blacklisting problem very efficiently using trusted third parties. Nymble has inspired a number of subsequent anonymous blacklisting systems. Some of these use fundamentally different approaches to accomplish what Nymble does without using third parties at all; so far, these proposals have all suffered from serious performance and scalability problems. Other systems build on the Nymble framework to reduce Nymble's trust assumptions while maintaining its highly efficient design. The primary contribution of this thesis is a new anonymous blacklisting system built on the Nymble framework---a nimbler version of Nymble---called Nymbler. We propose several enhancements to the Nymble framework that facilitate the construction of a scheme that minimizes trust in third parties. We then propose a new set of security and privacy properties that anonymous blacklisting systems should possess to protect: 1) users' privacy against malicious service providers and third parties (including other malicious users), and 2) service providers against abuse by malicious users. We also propose a set of performance requirements that anonymous blacklisting systems should meet to maximize their potential for real-world adoption, and formally define some optional features in the anonymous blacklisting systems literature. We then present Nymbler, which improves on existing Nymble-like systems by reducing the level of trust placed in third parties, while simultaneously providing stronger privacy guarantees and some new functionality. It avoids dependence on trusted hardware and unreasonable assumptions about non-collusion between trusted third parties. We have implemented all key components of Nymbler, and our measurements indicate that the system is highly practical. Our system solves several open problems in the anonymous blacklisting systems literature, and makes use of some new cryptographic constructions that are likely to be of independent theoretical interest.
30

Nymbler: Privacy-enhanced Protection from Abuses of Anonymity

Henry, Ryan January 2010 (has links)
Anonymous communications networks help to solve the real and important problem of enabling users to communicate privately over the Internet. However, by doing so, they also introduce an entirely new problem: How can service providers on the Internet---such as websites, IRC networks and mail servers---allow anonymous access while protecting themselves against abuse by misbehaving anonymous users? Recent research efforts have focused on using anonymous blacklisting systems (also known as anonymous revocation systems) to solve this problem. As opposed to revocable anonymity systems, which enable some trusted third party to deanonymize users, anonymous blacklisting systems provide a way for users to authenticate anonymously with a service provider, while enabling the service provider to revoke access from individual misbehaving anonymous users without revealing their identities. The literature contains several anonymous blacklisting systems, many of which are impractical for real-world deployment. In 2006, however, Tsang et al. proposed Nymble, which solves the anonymous blacklisting problem very efficiently using trusted third parties. Nymble has inspired a number of subsequent anonymous blacklisting systems. Some of these use fundamentally different approaches to accomplish what Nymble does without using third parties at all; so far, these proposals have all suffered from serious performance and scalability problems. Other systems build on the Nymble framework to reduce Nymble's trust assumptions while maintaining its highly efficient design. The primary contribution of this thesis is a new anonymous blacklisting system built on the Nymble framework---a nimbler version of Nymble---called Nymbler. We propose several enhancements to the Nymble framework that facilitate the construction of a scheme that minimizes trust in third parties. We then propose a new set of security and privacy properties that anonymous blacklisting systems should possess to protect: 1) users' privacy against malicious service providers and third parties (including other malicious users), and 2) service providers against abuse by malicious users. We also propose a set of performance requirements that anonymous blacklisting systems should meet to maximize their potential for real-world adoption, and formally define some optional features in the anonymous blacklisting systems literature. We then present Nymbler, which improves on existing Nymble-like systems by reducing the level of trust placed in third parties, while simultaneously providing stronger privacy guarantees and some new functionality. It avoids dependence on trusted hardware and unreasonable assumptions about non-collusion between trusted third parties. We have implemented all key components of Nymbler, and our measurements indicate that the system is highly practical. Our system solves several open problems in the anonymous blacklisting systems literature, and makes use of some new cryptographic constructions that are likely to be of independent theoretical interest.

Page generated in 0.1291 seconds