scholarly journals Using a hematology curriculum in a web portfolio environment

In 2005 the European Hematology Association developed the European Hematology Curriculum. This was distributed as a printed booklet and the intention was that junior hematologist could use it for personal competence development. In the EU-funded project H-net this Curriculum has been adapted into the a web environment by using RDF and placed inside a web portfolio system. How this is done is further described in this article. Furthermore, the possibilities of reusing the curriculum in ways that was not initially intended is described, such as describing Learning Resources inside the web-portfolio system with how they relate to different parts of the curriculum. That way a search for learning resources inside the portfolio by using the curriculum is enabled. And, since the medical field of hematology is closely related to other medical fields the design of the web-version of the curriculum was done in a way that builds for possible combination with any other curriculum in another medical field.

2020 ◽  
Vol 22 (11) ◽  
pp. 1957-1975
Author(s):  
Rasmus Helles ◽  
Stine Lomborg ◽  
Signe Sophus Lai

Today, websites operate in a modular fashion, outsourcing the surveillance and datafication of users to outside companies, along with security functions, video hosting, and so on. These third-party services (TPSs) function as key enablers of the web, with respect to functionality and the monetization of user activity. Departing from critical data studies and media systems analysis, the article contributes to understanding TPS infrastructures by placing these in a wider context of markets, cultural differences and regulation. Through a study of top-150 websites from the 28 EU countries, the article demonstrates how the use of TPSs varies between different parts of the region and different types of sites, and traces this variation to issues of language, regulatory traditions and differences in online businesses. These insights may inform current debates about surveillance capitalism and big data, by linking different forms of commodification of users’ behavioural data to broader social and cultural structures.


2012 ◽  
Vol 35 (111) ◽  
pp. 87-104 ◽  
Author(s):  
Alison Jane Pickard ◽  
Pat Gannon-Leary ◽  
Lynne Coventry

This article describes a Joint Information Systems Committee (JISC)-funded project, conducted by a cross-disciplinary team, examining trust in information resources in the web environment employing a literature review and online Delphi study with follow-up community consultation. The project aimed to try to explain how users assess or assert trust in their use of resources in the web environment; to examine how perceptions of trust influence the behavior of information users; and to consider whether ways of asserting trust in information resources could assist the development of information literacy. A trust model was developed from the analysis of the literature and discussed in the consultation. Elements comprising the i-Trust model include external factors, internal factors and user's cognitive state. This article gives a brief overview of the JISC funded project which has now produced the i-Trust model (Pickard et. al. 2010) and focuses on issues of particular relevance for information providers and practitioners.


2016 ◽  
Vol 1 (1) ◽  
pp. 001
Author(s):  
Harry Setya Hadi

String searching is a common process in the processes that made the computer because the text is the main form of data storage. Boyer-Moore is the search string from right to left is considered the most efficient methods in practice, and matching string from the specified direction specifically an algorithm that has the best results theoretically. A system that is connected to a computer network that literally pick a web server that is accessed by multiple users in different parts of both good and bad aim. Any activity performed by the user, will be stored in Web server logs. With a log report contained in the web server can help a web server administrator to search the web request error. Web server log is a record of the activities of a web site that contains the data associated with the IP address, time of access, the page is opened, activities, and access methods. The amount of data contained in the resulting log is a log shed useful information.


Author(s):  
Brent Morgan ◽  
Andrew J. Hampton ◽  
Zhiqiang Cai ◽  
Andrew Tackett ◽  
Lijia Wang ◽  
...  
Keyword(s):  

2020 ◽  
Vol 123 ◽  
pp. 87-101
Author(s):  
Grega Strban ◽  
Sara Bagari

There have always been people who cannot take care of their daily needs and are reliant on care. However, due to higher life expectancy and low birth rates, changes in lifestyle and increased mobility, reliance on long-term care is becoming a general risk in life. Therefore, it must be provided with social protection. In this respect, the criteria for shaping the (new) social risk of reliance on long-term care are also fulfilled. Although different benefits are already provided within different parts of the social security system, the paper discusses that the best option is to define reliance on long-term care as an independent social risk. Furthermore, we must ensure that providing long-term care will not turn out to be a double social risk. The issue has to be addressed at the national and at the EU level.


Author(s):  
A. K. Tripathi ◽  
S. Agrawal ◽  
R. D. Gupta

Abstract. Sharing and management of geospatial data among different communities and users is a challenge which is suitably addressed by Spatial Data Infrastructure (SDI). SDI helps people in the discovery, editing, processing and visualization of spatial data. The user can download the data from SDI and process it using the local resources. However, large volume and heterogeneity of data make this processing difficult at the client end. This problem can be resolved by orchestrating the Web Processing Service (WPS) with SDI. WPS is a service interface through which geoprocessing can be done over the internet. In this paper, a WPS enabled SDI framework with OGC compliant services is conceptualized and developed. It is based on the three tier client server architecture. OGC services are provided through GeoServer. WPS extension of GeoServer is used to perform geospatial data processing and analysis. The developed framework is utilized to create a public health SDI prototype using Open Source Software (OSS). The integration of WPS with SDI demonstrates how the various data analysis operations of WPS can be performed over the web on distributed data sources provided by SDI.


Author(s):  
S. Retalis

The Web puts a huge number of learning resources within reach of anyone with Internet access. In many cases, these valuable resources are difficult for most users to find in an efficient and effective manner. What makes an e-learning resources repository much more than a portal is the ability to discover a learning object and put it to a new use. The purpose of an e-learning resources repository is not simply safe storage and delivery but the ability of their administration, in terms of updating, identifying, utilizing, sharing and re-using them, which remains a great challenge. Moreover, the various repositories are either closed systems or systems that allow user access only through proprietary interfaces and data formats. In brief, there is lack of interoperability. The aim of this chapter is to present the requirements of an ideal e-learning resources repository that will provide services for covering the aforementioned critical issues. We will also describe such an ideal system could be non-centralized, which is the main difference from all the system that exists today in the WWW. Peer to Peer (P2P) based approaches are more flexible than centralized approaches with several advantages.


10.28945/3216 ◽  
2008 ◽  
Author(s):  
Tanja Krunic ◽  
Ljiljana Ruzic-Dimitrijevic

The idea of the paper is to investigate how much the online user privacy is respected by website owners, and how online privacy can be improved. We first focus ourselves on issues like possibilities of misusing personal data, data collecting and user-tracking. Then we give a short report about legislation in the EU concerning user privacy. Some facts about user confidence are given as well. They are follows by a brief list of hints for the users to protect their personal data when surfing the Web. Then we give an overview of actions website owners should take in order to support user privacy. Finally, we present the results of our investigation of the condition of user privacy in practice, and give some suggestions on its improvement.


Sign in / Sign up

Export Citation Format

Share Document