NASA Astrophysics Data System (ADS)
Wilson, Meredith
Geologic field trips are among the most beneficial learning experiences for students as they engage the topic of geology, but they are also difficult environments to maximize learning. This action research study explored one facet of the problems associated with teaching geology in the field by attempting to improve the transition of undergraduate students from a traditional laboratory setting to an authentic field environment. Utilizing an artificial outcrop, called the GeoScene, during an introductory college-level non-majors geology course, the transition was studied. The GeoScene was utilized in this study as an intermediary between laboratory and authentic field based experiences, allowing students to apply traditional laboratory learning in an outdoor environment. The GeoScene represented a faux field environment; outside, more complex and tangible than a laboratory, but also simplified geologically and located safely within the confines of an educational setting. This exploratory study employed a mixed-methods action research design. The action research design allowed for systematic inquiry by the teacher/researcher into how the students learned. The mixed-methods approach garnered several types of qualitative and quantitative data to explore phenomena and support conclusions. Several types of data were collected and analyzed, including: visual recordings of the intervention, interviews, analytic memos, student reflections, field practical exams, and a pre/post knowledge and skills survey, to determine whether the intervention affected student comprehension and interpretation of geologic phenomena in an authentic field environment, and if so, how. Students enrolled in two different sections of the same laboratory course, sharing a common lecture, participated in laboratory exercises implementing experiential learning and constructivist pedagogies that focused on learning the basic geological skills necessary for work in a field environment. These laboratory activities were followed by an approximate 15 minute intervention at the GeoScene for a treatment group of students (n=13) to attempt to mitigate potential barriers, such as: self-efficacy, novelty space, and spatial skills, which hinder student performance in an authentic field environment. Comparisons were made to a control group (n=12), who did not participate in GeoScene activities, but completed additional exercises and applications in the laboratory setting. Qualitative data sources suggested that the GeoScene treatment was a positive addition to the laboratory studies and improved the student transition to the field environment by: (1) reducing anxiety and decreasing heightened stimulus associated with the novelty of the authentic field environment, (2) allowing a physical transition between the laboratory and field that shifted concepts learned in the lab to the field environment, and (3) improving critical analysis of geologic phenomena. This was corroborated by the quantitative data that suggested the treatment group may have outperformed the control group in geology content related skills taught in the laboratory, and supported by the GeoScene, while in an authentic field environment (p≤0.01, delta=0.507).
Farm Education and the Value of Learning in an Authentic Learning Environment
ERIC Educational Resources Information Center
Smeds, Pia; Jeronen, Eila; Kurppa, Sirpa
2015-01-01
Farm education is a newly emerging field of research that utilises authentic learning environments, environments that combine a subject of academic study with its real-world surroundings, actors, and activities--in this case, the practical context of a farm. The aim of the study was to investigate the effects of various learning environments…
Petraglia, Joseph
2009-03-01
A topic gaining attention in the field of education has been that of "authenticity"-the creation of learning environments that provide learners with richer and more realistic contexts in which to apply knowledge and practice skills. The subject of authenticity has yet to attract much attention in the field of public health and specifically in health communication and education, although these fields have long experience with the problem of getting audiences to translate knowledge into action. This article reviews the rationale for an interest in authenticity as it relates to health communication and education and notes that "authenticity" does not inhere in information but is an appraisal made by a member of the public who is persuaded to view the information as especially relevant to his or her health behavior and consonant with his or her prior experiences. This article argues that a public health communicator or educator can encourage such appraisals by using narrative formats that provide rich contextualization. But contextualizing behavior change information in the form of stories is not enough; there is a dialogic dimension to persuasion that aids in the process of authentication. Creating opportunities for dialogue between behavior change narratives and their audiences has its own challenges, but nonetheless deserves to be a priority in public health.
NASA Astrophysics Data System (ADS)
Millette, Patricia M.
Authentic field geology research is a inquiry method that encourages students to interact more with their local environment, and by solving genuine puzzles, begin to increase their intuitive understanding of the nature and processes of science. The goal of the current study was to determine if conducting authentic field research and giving high school students the opportunity to present findings to adult audiences outside of the school setting 1) enhances students' understanding of the nature of science, and 2) affects students views of themselves as researchers. To accomplish this, ninth-grade students from a public school in northern New England engaged in a community-initiated glacial geology problem, completed a field research investigation, and presented their findings at several professional conferences. Following the completion of this student-centered field research, I investigated its effects by using a mixed methods approach consisting of qualitative and quantitative data from two sources. These included selected questions from an open-response survey (VNOS-c), and interviews that were conducted with fifteen of the students of different ages and genders. Findings show that conducting original field research seems to have a positive influence on these students' understanding of the NOS as well as the processes of science. Many of the students reported feelings of accomplishment, acceptance of responsibility for the investigation, a sense of their authentic contribution to the body of scientific knowledge in the world, and becoming scientists. This type of authentic field investigation is significant because recent reforms in earth-science education stress the importance of students learning about the nature and processes of scientific knowledge along with science content.
The Design of Computerized Practice Fields for Problem Solving and Contextualized Transfer
ERIC Educational Resources Information Center
Riedel, Jens; Fitzgerald, Gail; Leven, Franz; Toenshoff, Burkhard
2003-01-01
Current theories of learning emphasize the importance of learner-centered, active, authentic, environments for meaningful knowledge construction. From this perspective, computerized case-based learning systems afford practice fields for learners to build domain knowledge and problem-solving skills and to support contextualized transfer of…
Linking teaching and research in an undergraduate course and exploring student learning experiences
NASA Astrophysics Data System (ADS)
Wallin, Patric; Adawi, Tom; Gold, Julie
2017-01-01
In this case study, we first describe how teaching and research are linked in a master's course on tissue engineering. A central component of the course is an authentic research project that the students carry out in smaller groups and in collaboration with faculty. We then explore how the students experience learning in this kind of discovery-oriented environment. Data were collected through a survey, reflective writing, and interviews. Using a general inductive approach for qualitative analysis, we identified three themes related to the students' learning experiences: learning to navigate the field, learning to do real research, and learning to work with others. Overall, the students strongly valued learning in a discovery-oriented environment and three aspects of the course contributed to much of its success: taking a holistic approach to linking teaching and research, engaging students in the whole inquiry process, and situating authentic problems in an authentic physical and social context.
Authentic leaders creating healthy work environments for nursing practice.
Shirey, Maria R
2006-05-01
Implementation of authentic leadership can affect not only the nursing workforce and the profession but the healthcare delivery system and society as a whole. Creating a healthy work environment for nursing practice is crucial to maintain an adequate nursing workforce; the stressful nature of the profession often leads to burnout, disability, and high absenteeism and ultimately contributes to the escalating shortage of nurses. Leaders play a pivotal role in retention of nurses by shaping the healthcare practice environment to produce quality outcomes for staff nurses and patients. Few guidelines are available, however, for creating and sustaining the critical elements of a healthy work environment. In 2005, the American Association of Critical-Care Nurses released a landmark publication specifying 6 standards (skilled communication, true collaboration, effective decision making, appropriate staffing, meaningful recognition, and authentic leadership) necessary to establish and sustain healthy work environments in healthcare. Authentic leadership was described as the "glue" needed to hold together a healthy work environment. Now, the roles and relationships of authentic leaders in the healthy work environment are clarified as follows: An expanded definition of authentic leadership and its attributes (eg, genuineness, trustworthiness, reliability, compassion, and believability) is presented. Mechanisms by which authentic leaders can create healthy work environments for practice (eg, engaging employees in the work environment to promote positive behaviors) are described. A practical guide on how to become an authentic leader is advanced. A research agenda to advance the study of authentic leadership in nursing practice through collaboration between nursing and business is proposed.
Mindtool-Assisted In-Field Learning (MAIL): An Advanced Ubiquitous Learning Project in Taiwan
ERIC Educational Resources Information Center
Hwang, Gwo-Jen; Hung, Pi-Hsia; Chen, Nian-Shing; Liu, Gi-Zen
2014-01-01
Scholars have identified that learning in an authentic environment with quality contextual and procedural supports can engage students in thorough observations and knowledge construction. Moreover, the target is that students are able to experience and make sense of all of the learning activities in the real-world environment with meaningful…
A Framework and a Methodology for Developing Authentic Constructivist e-Learning Environments
ERIC Educational Resources Information Center
Zualkernan, Imran A.
2006-01-01
Semantically rich domains require operative knowledge to solve complex problems in real-world settings. These domains provide an ideal environment for developing authentic constructivist e-learning environments. In this paper we present a framework and a methodology for developing authentic learning environments for such domains. The framework is…
Weeks, Keith W; Meriel Hutton, B; Coben, Diana; Clochesy, John M; Pontin, David
2013-03-01
When designing learning and assessment environments it is essential to articulate the underpinning education philosophy, theory, model and learning style support mechanisms that inform their structure and content. We elaborate on original PhD research that articulates the design rationale of authentic medication dosage calculation problem-solving (MDC-PS) learning and diagnostic assessment environments. These environments embody the principles of authenticity, building knowledge and skills and competency assessment and are designed to support development of competence and bridging of the theory-practice gap. Authentic learning and diagnostic assessment environments capture the features and expert practices that are located in real world practice cultures and recreate them in authentic virtual clinical environments. We explore how this provides students with a safe virtual authentic environment to actively experience, practice and undertake MDC-PS learning and assessment activities. We argue that this is integral to the construction and diagnostic assessment of schemata validity (mental constructions and frameworks that are an individual's internal representation of their world), bridging of the theory-practice gap and cognitive and functional competence development. We illustrate these principles through the underpinning pedagogical design of two online virtual authentic learning and diagnostic assessment environments (safeMedicate and eDose™). Copyright © 2012. Published by Elsevier Ltd.
A Lightweight Continuous Authentication Protocol for the Internet of Things.
Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-04-05
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.
Reconciling Divisions in the Field of Authentic Education
ERIC Educational Resources Information Center
Sarid, Ariel
2015-01-01
The aim of this article is twofold: first, to identify and address three central divisions in the field of authentic education that introduce ambiguity and at times inconsistencies within the field of authentic education. These divisions concern a) the relationship between autonomy and authenticity; b) the division between the two basic attitudes…
Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho
2015-01-01
In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.
Khan, Muhammad Khurram; Alghathbar, Khaled
2010-01-01
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.
A Lightweight Continuous Authentication Protocol for the Internet of Things
Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-01-01
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168
A Study of Developing an Attitude Scale towards Authentic Learning Environments and Evaluation
ERIC Educational Resources Information Center
Çetinkaya, Murat
2018-01-01
The aim of the research is to improve a valid and reliable attributing scale which identifies authentic learning environments and evaluation attributes of the science teacher candidates. The study has been designed on the base of validity and reliability of the scale developed to evaluate the authentic learning environments. The research group is…
Sensitive Metamaterial Sensor for Distinction of Authentic and Inauthentic Fuel Samples
NASA Astrophysics Data System (ADS)
Tümkaya, Mehmet Ali; Dinçer, Furkan; Karaaslan, Muharrem; Sabah, Cumali
2017-08-01
A metamaterial-based sensor has been realized to distinguish authentic and inauthentic fuel samples in the microwave frequency regime. Unlike the many studies in literature on metamaterial-based sensor applications, this study focuses on a compact metamaterial-based sensor operating in the X-band frequency range. Firstly, electromagnetic properties of authentic and inauthentic fuel samples were obtained experimentally in a laboratory environment. Secondly, these experimental results were used to design and create a highly efficient metamaterial-based sensor with easy fabrication characteristics and simple design structure. The experimental results for the sensor were in good agreement with the numerical ones. The proposed sensor offers a more efficient design and can be used to detect fuel and multiple other liquids in various application fields from medical to military areas in several frequency regimes.
Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho
2015-01-01
In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user’s management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.’s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.’s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.’s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702
ERIC Educational Resources Information Center
Chizhik, Estella Williams; Chizhik, Alexander Williams; Close, Catherine; Gallego, Margaret
2017-01-01
Student-teaching field placements play an important role in preparing teacher candidates, many of whom rate the practice as the most authentic and relevant learning experience associated with their teacher-education programs. As a part of these field experiences, teacher candidates have opportunities to learn instructional and class management…
Regan, Sandra; Laschinger, Heather K S; Wong, Carol A
2016-01-01
The aim of this study was to examine the influence of structural empowerment, authentic leadership and professional nursing practice environments on experienced nurses' perceptions of interprofessional collaboration. Enhanced interprofessional collaboration (IPC) is seen as one means of transforming the health-care system and addressing concerns about shortages of health-care workers. Organizational supports and resources are suggested as key to promoting IPC. A predictive non-experimental design was used to test the effects of structural empowerment, authentic leadership and professional nursing practice environments on perceived interprofessional collaboration. A random sample of experienced registered nurses (n = 220) in Ontario, Canada completed a mailed questionnaire. Hierarchical multiple regression analysis was used. Higher perceived structural empowerment, authentic leadership, and professional practice environments explained 45% of the variance in perceived IPC (Adj. R² = 0.452, F = 59.40, P < 0.001). Results suggest that structural empowerment, authentic leadership and a professional nursing practice environment may enhance IPC. Nurse leaders who ensure access to resources such as knowledge of IPC, embody authenticity and build trust among nurses, and support the presence of a professional nursing practice environment can contribute to enhanced IPC. © 2015 John Wiley & Sons Ltd.
Schmader, Toni; Sedikides, Constantine
2017-10-01
People seek out situations that "fit," but the concept of fit is not well understood. We introduce State Authenticity as Fit to the Environment (SAFE), a conceptual framework for understanding how social identities motivate the situations that people approach or avoid. Drawing from but expanding the authenticity literature, we first outline three types of person-environment fit: self-concept fit, goal fit, and social fit. Each type of fit, we argue, facilitates cognitive fluency, motivational fluency, and social fluency that promote state authenticity and drive approach or avoidance behaviors. Using this model, we assert that contexts subtly signal social identities in ways that implicate each type of fit, eliciting state authenticity for advantaged groups but state inauthenticity for disadvantaged groups. Given that people strive to be authentic, these processes cascade down to self-segregation among social groups, reinforcing social inequalities. We conclude by mapping out directions for research on relevant mechanisms and boundary conditions.
Measuring Teacher Authenticity: Criteria Students Use in Their Perception of Teacher Authenticity
ERIC Educational Resources Information Center
De Bruyckere, Pedro; Kirschner, Paul A.
2017-01-01
Authenticity is an often-heard term with respect to education. Tasks should be authentic, the learning environment should be authentic and, above all, the teacher should be authentic. Previous qualitative research has shown that there are four primary criteria that students in formal educational settings use when forming their perceptions of…
40 CFR 1612.4 - Requests for authentication or certification of records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Requests for authentication or certification of records. 1612.4 Section 1612.4 Protection of Environment CHEMICAL SAFETY AND HAZARD INVESTIGATION BOARD PRODUCTION OF RECORDS IN LEGAL PROCEEDINGS § 1612.4 Requests for authentication or...
A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.
Zhao, Zhenguo
2014-05-01
With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.
Enquiry-Based Learning and Formative Assessment Environments: Student Perspectives
ERIC Educational Resources Information Center
Sambell, Kay
2010-01-01
This paper outlines case study research into first-year students' experiences of enquiry-based learning (EBL) on a year-long introductory theory module. Students were supported to carry out a series of authentic small-scale enquiries involving: (1) working in research teams; (2) gathering, disseminating and analysing data from the field; (3)…
ERIC Educational Resources Information Center
Coskie, Tracy; Hornof, Michelle; Trudel, Heidi
2007-01-01
A five-week study taught students how to write a field guide that identified the plants in a small wooded area they passed through on their way to their school playground. By creating this authentic genre of science writing, students came to understand and care for the natural world in their immediate environment. They also developed important…
Virtual Quests As Learning Environments for K-12 Students.
ERIC Educational Resources Information Center
Spudic, Linda
Perhaps some of the most engaging, unique, Web-based activities are virtual quests that take student participants along on real expeditions, following a team in the field as they explore new territory or do research on authentic scientific problems. Virtual quests, such as the MayaQuest expedition produced by Classroom Connect, are excellent…
Designing Authentic Learning Activities to Train Pre-Service Teachers about Teaching Online
ERIC Educational Resources Information Center
Luo, Tian; Murray, Alexander; Crompton, Helen
2017-01-01
Online learning is increasingly being used in K-12 learning environments. A concomitant trend is found towards learning becoming "authentic" as students learn with tasks that are connected to real world occupations. In this study, 48 pre-service teachers use an online environment to engage in authentic practice as they developed online…
Development and Assessment of a Chemistry-Based Computer Video Game as a Learning Tool
ERIC Educational Resources Information Center
Martinez-Hernandez, Kermin Joel
2010-01-01
The chemistry-based computer video game is a multidisciplinary collaboration between chemistry and computer graphics and technology fields developed to explore the use of video games as a possible learning tool. This innovative approach aims to integrate elements of commercial video game and authentic chemistry context environments into a learning…
Heckle, Rosa R; Lutters, Wayne G
2011-08-01
Healthcare providers and their IT staff, working in an effort to balance appropriate accessibility with stricter security mandates, are considering the use of a single network sign-on approach for authentication and password management. Single sign-on (SSO) promises to improve usability of authentication for multiple-system users, increase compliance, and help curb system maintenance costs. However, complexities are introduced when SSO is placed within a collaborative environment. These complexities include unanticipated workflow implications that introduce greater security vulnerability for the individual user. OBJECTIVES AND METHODOLOGY: In this work, we examine the challenges of implementing a single sign-on authentication technology in a hospital environment. The aim of the study was to document the factors that affected SSO adoption within the context of use. The ultimate goal is to better inform the design of usable authentication systems within collaborative healthcare work sites. The primary data collection techniques used are ethnographically informed - observation, contextual interviews, and document review. The study included a cross-section of individuals from various departments and varying rolls. These participants were a mix of both clinical and administrative staff, as well as the Information Technology group. The field work revealed fundamental mis-matches between the technology and routine work practices that will significantly impact its effective adoption. While single sign-on was effective in the administrative offices, SSO was not a good fit for collaborative areas. The collaborative needs of the clinical staff unearthed tensions in its implementation. An analysis of the findings revealed that the workflow, activities, and physical environment of the clinical areas create increased security vulnerabilities for the individual user. The clinical users were cognizant of these vulnerabilities and this created resistance to the implementation due to a concern for privacy. From a preliminary analysis of our on-going field study at a community hospital, there appears to be a number of mismatches between the SSO vision and the realities of routine work. While we cannot conclusively say if a SSO adoption will be effective in meeting its goals in a hospital environment, we do know that it will affect the work practice and that will make the management of the SSO system problematic. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
Secure Biometric Multi-Logon System Based on Current Authentication Technologies
NASA Astrophysics Data System (ADS)
Tait, Bobby L.
The need for accurate authentication in the current IT world is of utmost importance. Users rely on current IT technologies to facilitate in day to day interactions with nearly all environments. Strong authentication technologies like the various biometric technologies have been in existence for many years. Many of these technologies, for instance fingerprint biometrics, have reached maturity. However, passwords and pins are still the most commonly used authentication mechanisms at this stage. An average user has to be authenticated in various situations during daily interaction with his or her environment, by means of a pin or a password. This results in many different passwords and pins that the user has to remember. The user will eventually either start documenting these passwords and pins, or often, simply use the same password and pin for all authentication situations.
Chung, Ill-Min; Park, Sung-Kyu; Lee, Kyoung-Jin; An, Min-Jeong; Lee, Ji-Hee; Oh, Yong-Taek; Kim, Seung-Hyun
2017-11-01
The increasing demand for organic foods creates, in turn, a pressing need for the development of more accurate tools for the authentication of organic food in order to ensure both fair trade and food safety. This study examines the feasibility of δ 13 C and δ 15 N analyses as potential tools for authentication of environment-friendly rice sold in Korea. δ 13 C and δ 15 N examination in different rice grains showed that environment-friendly rice can be successfully distinguished from conventional rice. No multi-residue pesticides were detected in the examined rice samples, including conventional rice. This study demonstrates the complementary feasibility of δ 13 C and δ 15 N analyses for the authentication of environment-friendly rice sold in Korea in cases where pesticide residue analysis alone is insufficient for discrimination of organic and conventional rice. In future, complementary analyses including compound-specific isotope ratio analysis might be employed for improving the reliability of organic authentication. Copyright © 2017 Elsevier Ltd. All rights reserved.
Authentic leadership: a new theory for nursing or back to basics?
Wong, Carol; Cummings, Greta
2009-01-01
Authentic leadership is an emerging theoretical model purported to focus on the root component of effective leadership. The purpose of this paper is to describe the relevance of authentic leadership to the advancement of nursing leadership practice and research and address the question of whether this is a new theory for leadership or an old one in new packaging. The paper outlines the origins and key elements of the model, assesses the theoretical, conceptual and measurement issues associated with authentic leadership and compares it with other leadership theories frequently reported in the nursing literature. The emerging authentic leadership theory holds promise for explaining the underlying processes by which authentic leaders and followers influence work outcomes and organizational performance. Construct validity of authentic leadership has preliminary documentation and a few studies have shown positive relationships between authenticity and trust. Furthermore, the clarity of the authenticity construct and comprehensiveness of the overall theoretical framework provide a fruitful base for future research examining the relationship between authentic leadership and the creation of healthier work environments. A clear focus on the relational aspects of leadership, the foundational moral/ethical component, a potential linkage of positive psychological capital to work engagement and the emphasis on leader and follower development in the authentic leadership framework are closely aligned to current and future nursing leadership practice and research priorities for the creation of sustainable changes in nursing work environments.
Two RFID standard-based security protocols for healthcare environments.
Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E
2013-10-01
Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.
Simmons, M E; Wu, X B; Knight, S L; Lopez, R R
2008-01-01
Combining field experience with use of information technology has the potential to create a problem-based learning environment that engages learners in authentic scientific inquiry. This study, conducted over a 2-yr period, determined differences in attitudes and conceptual knowledge between students in a field lab and students with combined field and geographic information systems (GIS) experience. All students used radio-telemetry equipment to locate fox squirrels, while one group of students was provided an additional data set in a GIS to visualize and quantify squirrel locations. Pre/postsurveys and tests revealed that attitudes improved in year 1 for both groups of students, but differences were minimal between groups. Attitudes generally declined in year 2 due to a change in the authenticity of the field experience; however, attitudes for students that used GIS declined less than those with field experience only. Conceptual knowledge also increased for both groups in both years. The field-based nature of this lab likely had a greater influence on student attitude and conceptual knowledge than did the use of GIS. Although significant differences were limited, GIS did not negatively impact student attitude or conceptual knowledge but potentially provided other benefits to learners.
NASA Technical Reports Server (NTRS)
Moore, Reagan W.
2004-01-01
The long-term preservation of digital entities requires mechanisms to manage the authenticity of massive data collections that are written to archival storage systems. Preservation environments impose authenticity constraints and manage the evolution of the storage system technology by building infrastructure independent solutions. This seeming paradox, the need for large archives, while avoiding dependence upon vendor specific solutions, is resolved through use of data grid technology. Data grids provide the storage repository abstractions that make it possible to migrate collections between vendor specific products, while ensuring the authenticity of the archived data. Data grids provide the software infrastructure that interfaces vendor-specific storage archives to preservation environments.
Facilitating Application of Language Skills in Authentic Environments with a Mobile Learning System
ERIC Educational Resources Information Center
Shadiev, R.; Hwang, W.-Y.; Huang, Y.-M.; Liu, T.-Y.
2018-01-01
We uncovered two critical issues in earlier studies: (a) some studies have shown that mobile learning technology is not beneficial for all students due to complexity of learning environments and student prior knowledge, skills, and experience and (b) familiarity of students with the authentic environments in which they learn using mobile…
Weeks, Keith W; Clochesy, John M; Hutton, B Meriel; Moseley, Laurie
2013-03-01
Advancing the art and science of education practice requires a robust evaluation of the relationship between students' exposure to learning and assessment environments and the development of their cognitive competence (knowing that and why) and functional competence (know-how and skills). Healthcare education translation research requires specific education technology assessments and evaluations that consist of quantitative analyses of empirical data and qualitative evaluations of the lived student experience of the education journey and schemata construction (Weeks et al., 2013a). This paper focuses on the outcomes of UK PhD and USA post-doctorate experimental research. We evaluated the relationship between exposure to traditional didactic methods of education, prototypes of an authentic medication dosage calculation problem-solving (MDC-PS) environment and nursing students' construction of conceptual and calculation competence in medication dosage calculation problem-solving skills. Empirical outcomes from both UK and USA programmes of research identified highly significant differences in the construction of conceptual and calculation competence in MDC-PS following exposure to the authentic learning environment to that following exposure to traditional didactic transmission methods of education (p < 0.001). This research highlighted that for many students exposure to authentic learning environments is an essential first step in the development of conceptual and calculation competence and relevant schemata construction (internal representations of the relationship between the features of authentic dosage problems and calculation functions); and how authentic environments more ably support all cognitive (learning) styles in mathematics than traditional didactic methods of education. Functional competence evaluations are addressed in Macdonald et al. (2013) and Weeks et al. (2013e). Copyright © 2012. Published by Elsevier Ltd.
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Linking Immersive Virtual Field Trips with an Adaptive Learning Platform
NASA Astrophysics Data System (ADS)
Bruce, G.; Taylor, W.; Anbar, A. D.; Semken, S. C.; Buxner, S.; Mead, C.; El-Moujaber, E.; Summons, R. E.; Oliver, C.
2016-12-01
The use of virtual environments in science education has been constrained by the difficulty of guiding a learner's actions within the those environments. In this work, we demonstrate how advances in education software technology allow educators to create interactive learning experiences that respond and adapt intelligently to learner input within the virtual environment. This innovative technology provides a far greater capacity for delivering authentic inquiry-driven educational experiences in unique settings from around the world. Our immersive virtual field trips (iVFT) bring students virtually to geologically significant but inaccessible environments, where they learn through authentic practices of scientific inquiry. In one recent example, students explore the fossil beds in Nilpena, South Australia to learn about the Ediacaran fauna. Students interactively engage in 360° recreations of the environment, uncover the nature of the historical ecosystem by identifying fossils with a dichotomous key, explore actual fossil beds in high resolution imagery, and reconstruct what an ecosystem might have looked like millions of years ago in an interactive simulation. With the new capacity to connect actions within the iVFT to an intelligent tutoring system, these learning experiences can be tracked, guided, and tailored individually to the immediate actions of the student. This new capacity also has great potential for learning designers to take a data-driven approach to lesson improvement and for education researchers to study learning in virtual environments. Thus, we expect iVFT will be fertile ground for novel research. Such iVFT are currently in use in several introductory classes offered online at Arizona State University in anthropology, introductory biology, and astrobiology, reaching thousands of students to date. Drawing from these experiences, we are designing a curriculum for historical geology that will be built around iVFT-based exploration of Earth history.
Opportunistic Mobility Support for Resource Constrained Sensor Devices in Smart Cities
Granlund, Daniel; Holmlund, Patrik; Åhlund, Christer
2015-01-01
A multitude of wireless sensor devices and technologies are being developed and deployed in cities all over the world. Sensor applications in city environments may include highly mobile installations that span large areas which necessitates sensor mobility support. This paper presents and validates two mechanisms for supporting sensor mobility between different administrative domains. Firstly, EAP-Swift, an Extensible Authentication Protocol (EAP)-based sensor authentication protocol is proposed that enables light-weight sensor authentication and key generation. Secondly, a mechanism for handoffs between wireless sensor gateways is proposed. We validate both mechanisms in a real-life study that was conducted in a smart city environment with several fixed sensors and moving gateways. We conduct similar experiments in an industry-based anechoic Long Term Evolution (LTE) chamber with an ideal radio environment. Further, we validate our results collected from the smart city environment against the results produced under ideal conditions to establish best and real-life case scenarios. Our results clearly validate that our proposed mechanisms can facilitate efficient sensor authentication and handoffs while sensors are roaming in a smart city environment. PMID:25738767
Opportunistic mobility support for resource constrained sensor devices in smart cities.
Granlund, Daniel; Holmlund, Patrik; Åhlund, Christer
2015-03-02
A multitude of wireless sensor devices and technologies are being developed and deployed in cities all over the world. Sensor applications in city environments may include highly mobile installations that span large areas which necessitates sensor mobility support. This paper presents and validates two mechanisms for supporting sensor mobility between different administrative domains. Firstly, EAP-Swift, an Extensible Authentication Protocol (EAP)-based sensor authentication protocol is proposed that enables light-weight sensor authentication and key generation. Secondly, a mechanism for handoffs between wireless sensor gateways is proposed. We validate both mechanisms in a real-life study that was conducted in a smart city environment with several fixed sensors and moving gateways. We conduct similar experiments in an industry-based anechoic Long Term Evolution (LTE) chamber with an ideal radio environment. Further, we validate our results collected from the smart city environment against the results produced under ideal conditions to establish best and real-life case scenarios. Our results clearly validate that our proposed mechanisms can facilitate efficient sensor authentication and handoffs while sensors are roaming in a smart city environment.
Spence Laschinger, Heather K; Fida, Roberta
2015-05-01
A model linking authentic leadership, structural empowerment, and supportive professional practice environments to nurses' perceptions of patient care quality and job satisfaction was tested. Positive work environment characteristics are important for nurses' perceptions of patient care quality and job satisfaction (significant factors for retention). Few studies have examined the mechanism by which these characteristics operate to influence perceptions of patient care quality or job satisfaction. A cross-sectional provincial survey of 723 Canadian nurses was used to test the hypothesized models using structural equation modeling. The model was an acceptable fit and all paths were significant. Authentic leadership had a positive effect on structural empowerment, which had a positive effect on perceived support for professional practice and a negative effect on nurses' perceptions that inadequate unit staffing prevented them from providing high-quality patient care. These workplace conditions predicted job satisfaction. Authentic leaders play an important role in creating empowering professional practice environments that foster high-quality care and job satisfaction.
Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian
2015-01-01
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.
Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian
2015-01-01
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.’s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes. PMID:25978373
Kim, Daehee; Kim, Dongwan; An, Sunshin
2016-07-09
Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption.
Kim, Daehee; Kim, Dongwan; An, Sunshin
2016-01-01
Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption. PMID:27409616
[Causes for change in producing areas of geo-authentic herbs].
Liang, Fei; Li, Jian; Zhang, Wei; Zhang, Rui-Xian
2013-05-01
Geo-authentic herbs lay stress on their producing areas. The producing areas of most geo-authentic herbs have never changed since the ancient times. However, many other geo-authentic herbs have experienced significant changes in the long history. There are two main causes for the change in producing areas of herbs-change of natural environment and development of human society, which are restricted by each other and play a great role throughout the development process of geo-authentic herbs.
User Authentication and Authorization Challenges in a Networked Library Environment.
ERIC Educational Resources Information Center
Machovec, George S.
1997-01-01
Discusses computer user authentication and authorization issues when libraries need to let valid users access databases and information services without making the process too difficult for either party. Common solutions are explained, including filtering, passwords, and kerberos (cryptographic authentication scheme for secure use over public…
Review of Research on Mobile Language Learning in Authentic Environments
ERIC Educational Resources Information Center
Shadiev, Rustam; Hwang, Wu-Yuin; Huang, Yueh-Min
2017-01-01
We reviewed literature from 2007 to 2016 (March) on mobile language learning in authentic environments. We aimed to understand publications' trend, research focus, technology used, methodology, and current issues. Our results showed that there was increasing trend in the publications. Students' perceptions towards mobile learning technologies and…
Making Authentic Data Accessible: The Sensing the Environment Inquiry Module
ERIC Educational Resources Information Center
Griffis, Kathy; Thadani, Vandana; Wise, Joe
2008-01-01
We report on the development of a middle school life sciences inquiry module, Sensing the Environment. This "data-enriched" inquiry module includes a series of activities exploring the nature of science, photosynthesis, transpiration, and natural selection, which culminates in students' querying authentic environmental data to support a scientific…
Use of Authentic Materials in the ESP Classroom
ERIC Educational Resources Information Center
Benavent, Gabriela Torregrosa; Penamaria, Sonsoles Sanchez-Reyes
2011-01-01
Authentic materials are especially important for ESP trainees, since they reproduce an immersion environment and provide a realistic context for tasks that relate to learners' needs. Realia and authentic materials increase learners' motivation but are difficult to adapt to the learner's level of language, especially at the beginning level. It is…
Antecedents, mediators, and outcomes of authentic leadership in healthcare: A systematic review.
Alilyyani, Bayan; Wong, Carol A; Cummings, Greta
2018-07-01
Leaders are essential in every organization to achieve patient safety and healthy work environments. Authentic leadership is a relational leadership style purported to promote healthy work environments that influence staff performance and organizational outcomes. Given recent growth in authentic leadership research in healthcare and the importance of new knowledge to inform leadership development, there is an obligation to determine what is known about the antecedents and outcomes of authentic leadership in healthcare settings and clarify mechanisms by which authentic leadership affects healthcare staff and patient outcomes. The aim of this systematic review was to examine the antecedents, mediators and outcomes associated with authentic leadership in healthcare. Systematic review. The search strategy included 11 electronic databases: ABI Inform Dateline, Academic Search Complete, Cochrane Database of Systematic Reviews, PubMed, CINAHL, Embase, ERIC, PsycINFO, Scopus, Web of Science, and ProQuest Dissertations & Theses. The search was conducted in January 2017. Published English-only quantitative research that examined the antecedents, mediators and outcomes of authentic leadership practices of leaders in healthcare settings was included. Quality assessment, data extractions, and analysis were completed on all included studies. Data extracted from included studies were analyzed through descriptive and narrative syntheses. Content analysis was used to group antecedents, outcomes and mediators into categories which were then compared to authentic leadership theory. 1036 titles and abstracts were screened yielding 136 manuscripts for full-text review which resulted in 21 included studies reported in 38 manuscripts. Significant associations between authentic leadership and 43 outcomes were grouped into two major themes: healthcare staff outcomes with 5 subthemes (personal psychological states, satisfaction with work, work environment factors, health & well-being, and performance) and patient outcomes. There were 23 mediators between authentic leadership and 35 different outcomes in the included studies and one antecedent of authentic leadership. Findings of this review provide support for authentic leadership theory and suggest need for additional testing in future studies using longitudinal and interventional designs in more varied healthcare settings with diverse and interprofessional healthcare samples. Knowledge generated through this systematic review provides a more comprehensive understanding of authentic leadership, which can be used to educate future leaders and has the potential to improve leadership development strategies and positive outcomes in healthcare workplaces. Copyright © 2018 Elsevier Ltd. All rights reserved.
Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining
2015-03-01
Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.
Authentic leadership, organizational culture, and healthy work environments.
Shirey, Maria R
2009-01-01
The purpose of this article is to showcase the relationship among authentic leadership, organizational culture, and healthy work environments using a stress and coping lens. A qualitative descriptive study was conducted to determine what situations contribute to nurse manager stress, what coping strategies they utilize, what health outcomes they report, and what decision-making processes they follow to address stressful situations in their roles. A purposive sample of 21 nurse managers employed at 3 US acute care hospitals completed a demographic questionnaire and 14-question interview incorporating components of the Critical Decision Method. A secondary analysis of the data was conducted to identify differences in nurse manager narratives based upon differences in the organizational cultures where the managers worked. Of the 21 nurse managers studied, differences were evident in the organizational cultures reported. Nurse managers working in the positive organizational cultures (n = 12) generally worked in healthy work environments and engaged in more authentic leadership behaviors. Conversely, nurse managers working in the negative organizational cultures (n = 9) worked in unhealthy work environments and reported less optimism and more challenges engaging in authentic leadership practices. Organizational culture and leadership matter in creating and sustaining healthy work environments. Nurse managers play a pivotal role in creating these environments, yet they need supportive structures and resources to more effectively execute their roles.
On Location Learning: Authentic Applied Science with Networked Augmented Realities
ERIC Educational Resources Information Center
Rosenbaum, Eric; Klopfer, Eric; Perry, Judy
2007-01-01
The learning of science can be made more like the practice of science through authentic simulated experiences. We have created a networked handheld Augmented Reality environment that combines the authentic role-playing of Augmented Realities and the underlying models of Participatory Simulations. This game, known as Outbreak @ The Institute, is…
Digital Learning Playground: Supporting Authentic Learning Experiences in the Classroom
ERIC Educational Resources Information Center
Chen, Gwo-Dong; Nurkhamid; Wang, Chin-Yeh; Yang, Su-Hang; Lu, Wei-Yuan; Chang, Chih-Kai
2013-01-01
This study proposes a platform to provide a near-authentic environment, context, and situation for task-based learning. The platform includes two projection screens (a vertical and a horizontal screen) combined for situated or authentic learning. The horizontal screen extends the vertical screen scene to form a space for learning activities and…
40 CFR 2.406 - Requests for authenticated copies of EPA documents.
Code of Federal Regulations, 2012 CFR
2012-07-01
... EPA documents. 2.406 Section 2.406 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL... the United States Is Not a Party § 2.406 Requests for authenticated copies of EPA documents. Requests for authenticated copies of EPA documents for purposes of admissibility under 28 U.S.C. 1733 and Rule...
Improving a Field School Curriculum Using Modularized Lessons and Authentic Case-Based Learning
ERIC Educational Resources Information Center
Rea, Roy V.; Hodder, Dexter P.
2007-01-01
University course evaluations are replete with student comments expressing frustration with taking time out of work, paying money for, and putting energy into field education projects that lack authentic "real-world" problem-solving objectives. Here, we describe a model for field school education that borrows on pedagogical tools such as…
van den Bosch, Ralph; Taris, Toon W
2014-01-01
Previous research on authenticity has mainly focused on trait conceptualizations of authenticity (e.g., Wood et al., 2008), whereas in specific environments (e.g., at work) state conceptualizations of authenticity (cf. Van den Bosch & Taris, 2013) are at least as relevant. For example, working conditions are subject to change, and this could well have consequences for employees' perceived level of authenticity at work. The current study employs a work-specific, state-like conceptualization of authenticity to investigate the relations between authenticity at work, well-being, and work outcomes. A series of ten separate hierarchical regression analyses using data from 685 participants indicated that after controlling for selected work characteristics and demographic variables, authenticity at work accounted for on average 11% of the variance of various wellbeing and work outcomes. Of the three subscales of authenticity at work (i.e., authentic living, self-alienation, and accepting influence), self-alienation was the strongest predictor of outcomes, followed by authentic living and accepting external influence, respectively. These findings are discussed in the light of their practical and theoretical implications.
ERIC Educational Resources Information Center
Franetovic, Marija
2012-01-01
Current educational initiatives encourage the use of authentic learning environments to realistically prepare students for jobs in a constantly changing world. Many students of the Millennial generation may be social media savvy. However, what can be said about learning conditions and student readiness for active, reflective and collaborative…
Building on Authentic Learning for Pre-Service Teachers in a Technology-Rich Environment
ERIC Educational Resources Information Center
Latham, Gloria; Carr, Nicky
2015-01-01
The article "Authentic learning for pre-service teachers in a technology-rich environment" (Latham & Carr, 2012) appeared in the "Journal of Learning Design," Volume 5, Issue 1 in 2012. Since writing this paper three years ago, the authors reflect upon and brainstorm what they describe here as a radically revised approach.…
Investigating the Role of Multibiometric Authentication on Professional Certification E-Examination
ERIC Educational Resources Information Center
Smiley, Garrett
2013-01-01
E-learning has grown to such an extent that paper-based testing is being replaced by computer-based testing otherwise known as e-exams. Because these e-exams can be delivered outside of the traditional proctored environment, additional authentication measures must be employed in order to offer similar authentication assurance as found in…
The Role of Authenticity in Design-Based Learning Environments: The Case of Engineering Education
ERIC Educational Resources Information Center
Strobel, J.; Wang, J.; Weber, N. R.; Dyehouse, M.
2013-01-01
The term "authenticity" is pervasive in the education literature in general and specifically in the design education and engineering education literature; yet, the construct is often used un-reflected and ill defined. The purpose of this paper is (1) to critically examine current conceptualizations of authenticity as principles to design learning…
Learning in Authentic Earth and Planetary Contexts
NASA Astrophysics Data System (ADS)
Fergusson, J. A.; Oliver, C. A.
2006-12-01
A Virtual Field Trip project has been developed in collaboration with NASA Learning Technologies to allow students, internationally, to accompany scientists on a field trip to the Pilbara region of Western Australia to debate the relevance of ancient structures called stromatolites, to the origins of life on Earth and the search for life on Mars. The project was planned with the aim of exposing high school students to `science in the making', including exposure to the ongoing debate and uncertainties involved in scientific research. The development of the project stemmed from both research-based and anecdotal evidence that current science education programs are not providing secondary students with a good understanding of the processes of science. This study seeks to examine the effectiveness of student use of the tools to increase awareness of the processes of science and to evaluate the effectiveness of the tools in terms of student learning. The literature reports that there is a need for learning activities to be conducted within meaningful contexts. The virtual field trip tools create an environment that simulates key elements in the scientific process. Such an approach allows students to learn by doing, to work like scientists and apply their learning in an authentic context.
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874
ERIC Educational Resources Information Center
Schumacher, Andrea; Reiners, Christiane S.
2013-01-01
Authenticity has recently become a popular term in science education. A study focusing on authenticity in the sense of making chemistry lessons better resemble chemistry practice is carried out at the University of Cologne in the Institute of Chemical Education, where prospective chemistry teachers are trained. In the long run an innovative module…
NASA Astrophysics Data System (ADS)
Wegner, K.; Branch, B. D.; Smith, S. C.
2013-12-01
The Global Learning and Observations to Benefit the Environment (GLOBE) program is a worldwide hands-on, primary and secondary school-based science and education program (www.globe.gov). GLOBE's vision promotes and supports students, teachers and scientists to collaborate on inquiry-based authentic science investigations of the environment and the Earth system working in close partnership with NASA, NOAA and NSF Earth System Science Projects (ESSP's) in study and research about the dynamics of Earth's environment. GLOBE Partners conduct face-to-face Professional Development in more than 110 countries, providing authentic scientific research experience in five investigation areas: atmosphere, earth as a system, hydrology, land cover, and soil. This presentation will provide a sample for a new framework of Professional Development that was implemented in July 2013 at Purdue University lead by Mr. Steven Smith who has tested GLOBE training materials for future training. The presentation will demonstrate how institutions can provide educators authentic scientific research opportunities through various components, including: - Carrying out authentic research investigations - Learning how to enter their authentic research data into the GLOBE database and visualize it on the GLOBE website - Learn how to access to NASA's Earth System Science resources via GLOBE's new online 'e-Training Program' - Exploring the connections of their soil protocol measurements and the history of the soil in their area through iPad soils app - LIDAR data exposure, Hydrology data exposure
The influence of authentic leadership and areas of worklife on work engagement of registered nurses.
Bamford, Megan; Wong, Carol A; Laschinger, Heather
2013-04-01
To examine the relationships among nurses' perceptions of nurse managers' authentic leadership, nurses' overall person-job match in the six areas of worklife and their work engagement. Reports have highlighted the impact of demanding and unsupportive work environments on nurses' wellbeing, resulting in a need for strong nursing leadership to build sustainable and healthier work environments. A secondary analysis of data collected from a non-experimental, predictive design survey of a random sample of 280 registered nurses working in acute care hospitals was conducted. An overall person-job match in the six areas of worklife fully mediated the relationship between authentic leadership and work engagement. Further, authentic leadership, overall person-job match in the six areas of worklife and years of nursing experience explained 33.1% of the variance in work engagement. Findings suggest that nurses who work for managers demonstrating higher levels of authentic leadership report a greater overall person-job match in the six areas of worklife and greater work engagement. As nurse managers' play a key role in promoting work engagement among nurses, authentic leadership development for nurse managers focusing on self-awareness, relational transparency, ethics and balanced processing would be beneficial. © 2012 Blackwell Publishing Ltd.
Counterfeit-resistant materials and a method and apparatus for authenticating materials
Ramsey, J. Michael; Klatt, Leon N.
2001-01-01
Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&
Counterfeit-resistant materials and a method and apparatus for authenticating materials
Ramsey, J. Michael; Klatt, Leon N.
2000-01-01
Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.
Maitra, Tanmoy; Giri, Debasis
2014-12-01
The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost.
Authentication and Key Establishment in Dynamic Wireless Sensor Networks
Qiu, Ying; Zhou, Jianying; Baek, Joonsang; Lopez, Javier
2010-01-01
When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing. In order to provide a high level of security in this environment, the moving sensor node needs to be authenticated to new neighboring nodes and a key established for secure communication. The paper proposes an efficient and scalable protocol to establish and update the authentication key in a dynamic wireless sensor network environment. The protocol guarantees that two sensor nodes share at least one key with probability 1 (100%) with less memory and energy cost, while not causing considerable communication overhead. PMID:22319321
Learning Authentic Leadership in New Zealand: A Learner-Centred Methodology and Evaluation
ERIC Educational Resources Information Center
Roche, Maree
2010-01-01
This study provides preliminary examination of the efficacy of the "Best Authentic Leadership Self" exercise. A field quasi-experimental design was conducted with a dual purpose: (1) to ascertain the value of interventions aimed at triggering events to enhance the learning (c.f. teaching) of "authentic leadership? and how this…
Weeks, Keith W; Higginson, Ray; Clochesy, John M; Coben, Diana
2013-03-01
This paper evaluates nursing students' transition through schemata construction and competence development in medication dosage calculation problem-solving (MDC-PS). We advance a grounded theory from interview data that reflects the experiences and perceptions of two groups of undergraduate pre-registration nursing students: eight students exposed to a prototype authentic MDC-PS environment and didactic transmission methods of education and 15 final year students exposed to the safeMedicate authentic MDC-PS environment. We advance a theory of how classroom-based 'chalk and talk' didactic transmission environments offered multiple barriers to accurate MDC-PS schemata construction among novice students. While conversely it was universally perceived by all students that authentic learning and assessment environments enabled MDC-PS schemata construction through facilitating: 'seeing' the authentic features of medication dosage problems; context-based and situational learning; learning within a scaffolded environment that supported construction of cognitive links between the concrete world of clinical MDC-PS and the abstract world of mathematics; and confidence-building in their cognitive and functional competence ability. Drawing on the principle of veni, vidi, duci (I came, I saw, I calculated), we combined the two sets of evaluations to offer a grounded theoretical basis for schemata construction and competence development within this critical domain of professional practice. Copyright © 2012 Elsevier Ltd. All rights reserved.
Park, YoHan; Park, YoungHo
2016-12-14
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.
A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks
Wang, Qiuhua
2017-01-01
Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate. PMID:28165423
Park, YoHan; Park, YoungHo
2016-01-01
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment. PMID:27983616
A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.
Wang, Qiuhua
2017-02-04
Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.
A network identity authentication system based on Fingerprint identification technology
NASA Astrophysics Data System (ADS)
Xia, Hong-Bin; Xu, Wen-Bo; Liu, Yuan
2005-10-01
Fingerprint verification is one of the most reliable personal identification methods. However, most of the automatic fingerprint identification system (AFIS) is not run via Internet/Intranet environment to meet today's increasing Electric commerce requirements. This paper describes the design and implementation of the archetype system of identity authentication based on fingerprint biometrics technology, and the system can run via Internet environment. And in our system the COM and ASP technology are used to integrate Fingerprint technology with Web database technology, The Fingerprint image preprocessing algorithms are programmed into COM, which deployed on the internet information server. The system's design and structure are proposed, and the key points are discussed. The prototype system of identity authentication based on Fingerprint have been successfully tested and evaluated on our university's distant education applications in an internet environment.
Empirical grounding of the nature of scientific inquiry: A study of developing researchers
NASA Astrophysics Data System (ADS)
Stucky, Amy Preece
This work uses grounded theory methodology for developing theory about the nature of authentic scientific inquiry that occurs on a day-to-day basis in an academic research laboratory. Symbolic interaction and situated learning provide a theoretical framework. Data were collected from field notes, over 100 hours of videotape of researchers working in a chemical research laboratory, and interviews with participants. The phenomena of a research laboratory suggest that authentic daily work stretches scientists in three learning modalities: cognitive, affective and motivational beliefs and goals, which influence action to promote learning. A laboratory's line of research is divided into individual, thematic projects. Researchers are enabled in a specialized laboratory environment with sets of unique artifacts, substances, people and theoretical concepts to facilitate production of significant research goals. The work itself consists of chemical and mechanical processes facilitated by human actions, appropriate mental states, and theoretical explanations. The cognitive, affective (emotional), and conative (motivational) stretching then leads to explicit learning as well as implicit learning in the gain of experience and tacit knowledge. Implications of these findings about the nature of authentic scientific research on a day-to-day basis are applied to inquiry in science education in undergraduate and graduate education.
Fostering Preservice Teachers' Development: Engagement in Practice and Learning
ERIC Educational Resources Information Center
McMahan, Sarah K.; Garza, Rubén
2017-01-01
Given the benefits associated with authentic field experiences (Edwards, 1996; McMahan et al., 2015; Siwatu, 2010), it is not uncommon to include early field experiences prior to student teaching as a way to engage university students with teaching diverse students in an authentic school setting. This study explored preservice teachers'…
Review of Data Integrity Models in Multi-Level Security Environments
2011-02-01
2: (E-1 extension) Only executions described in a (User, TP, (CDIs)) relation are allowed • E-3: Users must be authenticated before allowing TP... authentication and verification procedures for upgrading the integrity of certain objects. The mechanism used to manage access to objects is primarily...that is, the self-consistency of interdependent data and the consistency of real-world environment data. The prevention of authorised users from making
Authentic leadership, empowerment and burnout: a comparison in new graduates and experienced nurses.
Laschinger, Heather K Spence; Wong, Carol A; Grau, Ashley L
2013-04-01
To examine the effect of authentic leadership and structural empowerment on the emotional exhaustion and cynicism of new graduates and experienced acute-care nurses. Employee empowerment is a fundamental component of healthy work environments that promote nurse health and retention, and nursing leadership is key to creating these environments. In a secondary analysis of data from two studies we compared the pattern of relationships among study variables in two Ontario groups: 342 new graduates with <2 years of experience and 273 nurses with more than 2 years of experience. A multi-group path analysis using Structural Equation Modelling indicated an acceptable fit of the final model (χ(2) = 17.52, df = 2, P < 0.001, CFI = 0.97, IFI = 0.97 and RMSEA = 0.11). Authentic leadership significantly and negatively influenced emotional exhaustion and cynicism through workplace empowerment in both groups. The authentic behaviour of nursing leaders was important to nurses' perceptions of structurally empowering conditions in their work environments, regardless of experience level, and ultimately contributed to lower levels of emotional exhaustion and cynicism. Leadership training for nurse managers may help develop the empowering work environments required in today's health-care organizations in order to attract and retain nurses. © 2012 Blackwell Publishing Ltd.
Exploring Windows Domain-Level Defenses Against Authentication Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nichols, Jeff A.; Curtis, Laura
2016-01-01
We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary tomore » cause this response.« less
Authentic Classroom Leaders: The Student Perspective
ERIC Educational Resources Information Center
Downing, Megan S.
2016-01-01
In a qualitative study assessing students' perceptions of faculty-student interaction in the online learning environment, findings demonstrated that students make meaning of faculty-student interaction in ways that align with authentic leadership behaviors. Faculty interaction, or lack thereof, shaped students' perceptions of faculty authenticity…
A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
Farash, Mohammad Sabzinejad; Nawaz, Omer; Mahmood, Khalid; Chaudhry, Shehzad Ashraf; Khan, Muhammad Khurram
2016-07-01
To enhance the quality of healthcare in the management of chronic disease, telecare medical information systems have increasingly been used. Very recently, Zhang and Qi (J. Med. Syst. 38(5):47, 32), and Zhao (J. Med. Syst. 38(5):46, 33) separately proposed two authentication schemes for telecare medical information systems using radio frequency identification (RFID) technology. They claimed that their protocols achieve all security requirements including forward secrecy. However, this paper demonstrates that both Zhang and Qi's scheme, and Zhao's scheme could not provide forward secrecy. To augment the security, we propose an efficient RFID authentication scheme using elliptic curves for healthcare environments. The proposed RFID scheme is secure under common random oracle model.
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.
A Key Establishment Protocol for RFID User in IPTV Environment
NASA Astrophysics Data System (ADS)
Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho
In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.
Alexander, Catherine; Lopez, Ruth Palan
2018-01-01
The aim of this study is to understand the behaviors experienced nurse executives use to create healthy work environments (HWEs). The constructs of authentic leadership formed the conceptual framework for the study. The American Association of Critical-Care Nurses recommends authentic leadership as the preferred style of leadership for creating and sustaining HWEs. Behaviors associated with authentic leadership in nursing are not well understood. A purposive sample of 17 experienced nurse executives were recruited from across the United States for this qualitative study. Thematic analysis was used to analyze the in-depth, semistructured interviews. Four constructs of authentic leaders were supported and suggest unique applications of each including self-awareness (a private and professional self), balanced processing (open hearted), transparency (limiting exposure), and moral leadership (nursing compass). Authentic leadership may provide a sound foundation to support nursing leadership practices; however, its application to the discipline requires additional investigation.
Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept
NASA Astrophysics Data System (ADS)
Damousis, Ioannis G.; Tzovaras, Dimitrios; Bekiaris, Evangelos
2008-12-01
Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO) (2007) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.
Laschinger, Heather K S; Smith, Lesley Marie
2013-01-01
The aim of this study was to examine new-graduate nurses' perceptions of the influence of authentic leadership and structural empowerment on the quality of interprofessional collaboration in healthcare work environments. Although the challenges associated with true interprofessional collaboration are well documented, new-graduate nurses may feel particularly challenged in becoming contributing members. Little research exists to inform nurse leaders' efforts to facilitate effective collaboration in acute care settings. A predictive nonexperimental design was used to test a model integrating authentic leadership and workplace empowerment as resources that support interprofessional collaboration. Multiple regression analysis revealed that 24% of the variance in perceived interprofessional collaboration was explained by unit-leader authentic leadership and structural empowerment (R = 0.24, F = 29.55, P = .001). Authentic leadership (β = .294) and structural empowerment (β = .288) were significant independent predictors. Results suggest that authentic leadership and structural empowerment may promote interprofessional collaborative practice in new nurses.
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments
Huang, Yuanfei; Ma, Fangchao
2017-01-01
In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.
Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao
2017-01-01
In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.
Yang, Li; Zheng, Zhiming
2018-01-01
According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks.
Zheng, Zhiming
2018-01-01
According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks. PMID:29534085
AliEn—ALICE environment on the GRID
NASA Astrophysics Data System (ADS)
Saiz, P.; Aphecetche, L.; Bunčić, P.; Piskač, R.; Revsbech, J.-E.; Šego, V.; Alice Collaboration
2003-04-01
AliEn ( http://alien.cern.ch) (ALICE Environment) is a Grid framework built on top of the latest Internet standards for information exchange and authentication (SOAP, PKI) and common Open Source components. AliEn provides a virtual file catalogue that allows transparent access to distributed datasets and a number of collaborating Web services which implement the authentication, job execution, file transport, performance monitor and event logging. In the paper we will present the architecture and components of the system.
Authenticity in a Digital Environment.
ERIC Educational Resources Information Center
Cullen, Charles T.; Hirtle, Peter B.; Levy, David; Lynch, Clifford A.; Rothenberg, Jeff
On January 24, 2000, the Council on Library and Information Resources (CLIR) convened a group of experts from different domains of the information resources community to address the question, "What is an authentic digital object?" Five writers--an archivist, a digital library expert, a documentary editor and special collections…
Authentic Game-Based Learning and Teachers' Dilemmas in Reconstructing Professional Practice
ERIC Educational Resources Information Center
Chee, Yam San; Mehrotra, Swati; Ong, Jing Chuan
2015-01-01
Teachers who attempt pedagogical innovation with authentic digital games face significant challenges because such games instantiate open systems of learner activity, inviting enquiry learning rather than knowledge acquisition. However, school environments are normatively sanctioned cultural spaces where direct instruction and high-stakes tests are…
ERIC Educational Resources Information Center
Klenow, Trish
2011-01-01
The best way to combat apathy in art class is through authentic art education. Authentic art education involves making meaningful connections with students. Students are motivated by their environment, their peers, and their media. Sometimes this means eschewing the canon of old masters in art education and embracing more current trends. The…
Adventure Learning: Situating Learning in an Authentic Context
ERIC Educational Resources Information Center
Doering, Aaron
2007-01-01
In this paper, Aaron Doering describes an adventure learning project that connected students to explorers and researchers participating in a trans-Arctic dogsled expedition. Adventure learning (AL) uses a hybrid online educational environment to provide students with opportunities to explore real-world issues through authentic learning…
[Application of rapid PCR to authenticate medicinal snakes].
Chen, Kang; Jiang, Chao; Yuan, Yuan; Huang, Lu-Qi; Li, Man
2014-10-01
To obtained an accurate, rapid and efficient method for authenticate medicinal snakes listed in Chinese Pharmacopoeia (Zaocysd humnades, Bungarus multicinctus, Agkistrodon acutus), a rapid PCR method for authenticate snakes and its adulterants was established based on the classic molecular authentication methods. DNA was extracted by alkaline lysis and the specific primers were amplified by two-steps PCR amplification method. The denatured and annealing temperature and cycle numbers were optimized. When 100 x SYBR Green I was added in the PCR product, strong green fluorescence was visualized under 365 nm UV whereas adulterants without. The whole process can complete in 30-45 minutes. The established method provides the technical support for authentication of the snakes on field.
A Novel GMM-Based Behavioral Modeling Approach for Smartwatch-Based Driver Authentication.
Yang, Ching-Han; Chang, Chin-Chun; Liang, Deron
2018-03-28
All drivers have their own distinct driving habits, and usually hold and operate the steering wheel differently in different driving scenarios. In this study, we proposed a novel Gaussian mixture model (GMM)-based method that can improve the traditional GMM in modeling driving behavior. This new method can be applied to build a better driver authentication system based on the accelerometer and orientation sensor of a smartwatch. To demonstrate the feasibility of the proposed method, we created an experimental system that analyzes driving behavior using the built-in sensors of a smartwatch. The experimental results for driver authentication-an equal error rate (EER) of 4.62% in the simulated environment and an EER of 7.86% in the real-traffic environment-confirm the feasibility of this approach.
ERIC Educational Resources Information Center
Purcell, Sean C.; Pande, Prithvi; Lin, Yingxin; Rivera, Ernesto J.; Paw U, Latisha; Smallwood, Luisa M.; Kerstiens, Geri A.; Armstrong, Laura B.; Robak, MaryAnn T.; Baranger, Anne M.; Douskey, Michelle C.
2016-01-01
In this undergraduate analytical chemistry experiment, students quantitatively assess the antibacterial activity of essential oils found in thyme leaves ("Thymus vulgaris") in an authentic, research-like environment. This multi-week experiment aims to instill green chemistry principles as intrinsic to chemical problem solving. Students…
Authentic Learning Environments in Higher Education
ERIC Educational Resources Information Center
Herrington, Tony; Herrington, Jan
2006-01-01
As greater accountability in higher education grows, authentic learning has found a prominent place in the education agenda. Technology continues to open up possibilities for innovative and effective learning opportunities, and students and teachers are no longer happy to accept familiar classroom-based pedagogies that rely on content delivery and…
ERIC Educational Resources Information Center
Banks, Jerome; Mhunpiew, Nathara
2012-01-01
Character development must balance academic achievement. International school environments are diverse and multicultural settings, containing a learning-focused culture. This investigation constructs the sophisticated elements of authentic leadership and the complexities of the social cognitive theory as factors that produce a practical approach…
40 CFR 2.406 - Requests for authenticated copies of EPA documents.
Code of Federal Regulations, 2010 CFR
2010-07-01
... EPA documents. 2.406 Section 2.406 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL PUBLIC INFORMATION Testimony by Employees and Production of Documents in Civil Legal Proceedings Where the United States Is Not a Party § 2.406 Requests for authenticated copies of EPA documents. Requests...
Authentic, Dialogical Knowledge Construction: A Blended and Mobile Teacher Education Programme
ERIC Educational Resources Information Center
Ruhalahti, Sanna; Korhonen, Anne-Maria; Rasi, Päivi
2017-01-01
Background: Knowledge construction and technology have been identified as critical for an understanding of the future of teacher education. Knowledge is discovered, applied and created collaboratively from authentic starting points. Today's new mobile and blended learning environments create increased opportunities for such processes, including…
NASA Astrophysics Data System (ADS)
Schielack, J. F.; Herbert, B. E.
2004-12-01
The ITS Center for Teaching and Learning (http://its.tamu.edu) is a five-year NSF-funded collaborative effort to engage scientists, educational researchers, and educators in the use of information technology to enhance science teaching and learning at Grades 7 - 16. The ITS program combines graduate courses in science and science education leadership for both science and education graduate students with professional development experiences for classroom teachers. The design of the ITS professional development experience is based upon the assumption that science and mathematics teaching and learning will be improved when they become more connected to the authentic science research done in field settings or laboratories. The effective use of information technology to support inquiry in science classrooms has been shown to help achieve this objective. In particular, the professional development for teachers centers around support for implementing educational research in their own classrooms on the impacts of using information technology to promote authentic science experiences for their students. As a design study that is "working toward a greater understanding of the "learning ecology," the research related to the creation and refinement of the ITS Center's collaborative environment for integrating professional development for faculty, graduate students, and classroom teachers is contributing information about an important setting not often included in the descriptions of professional development, a setting that incorporates distributed expertise and resulting distributed growth in the various categories of participants: scientists, science graduate students, education researchers, science education graduate students, and master teachers. Design-based research is an emerging paradigm for the study of learning in context through the systematic design and study of instructional strategies and tools. In this presentation, we will discuss the results of the formative evaluation process that has moved the ITS Center's collaborative environment for professional development through the iterative process from Phase I (the planned program designed in-house) to Phase II (the experimental program being tested in-house). Phase II highlighted learning experiences over two summers focused on the exploration of environmentally-related science, technology, engineering or mathematics (STEM) topics through the use of modeling, visualization and complex data sets to explore authentic scientific questions that can be integrated within the 7-16 curriculum.
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Wang, Weijia; Hu, Lei
2014-01-01
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847
Seo, Jung Woo; Lee, Sang Jin
2016-01-01
Weather information provides a safe working environment by contributing to the economic activity of the nation, and plays role of the prevention of natural disasters, which can cause large scaled casualties and damage of property. Especially during times of war, weather information plays a more important role than strategy, tactics and information about trends of the enemy. Also, it plays an essential role for the taking off and landing of fighter jet and the sailing of warships. If weather information, which plays a major role in national security and economy, gets misused for cyber terrorism resulting false weather information, it could be a huge threat for national security and the economy. We propose a plan to safely transmit the measured value from meteorological sensors through a meteorological telecommunication network in order to guarantee the confidentiality and integrity of the data despite cyber-attacks. Also, such a plan allows one to produce reliable weather forecasts by performing mutual authentication through authentication devices. To make sure of this, one can apply an Identity Based Signature to ensure the integrity of measured data, and transmit the encrypted weather information with mutual authentication about the authentication devices. There are merits of this research: It is not necessary to manage authentication certificates unlike the Public Key Infrastructure methodology, and it provides a powerful security measure with the capability to be realized in a small scale computing environment, such as the meteorological observation system due to the low burden on managing keys.
Bland, Andrew J; Topping, Annie; Tobbell, Jane
2014-07-01
High-fidelity patient simulation is a method of education increasingly utilised by educators of nursing to provide authentic learning experiences. Fidelity and authenticity, however, are not conceptually equivalent. Whilst fidelity is important when striving to replicate a life experience such as clinical practice, authenticity can be produced with low fidelity. A challenge for educators of undergraduate nursing is to ensure authentic representation of the clinical situation which is a core component for potential success. What is less clear is the relationship between fidelity and authenticity in the context of simulation based learning. Authenticity does not automatically follow fidelity and as a result, educators of nursing cannot assume that embracing the latest technology-based educational tools will in isolation provide a learning environment perceived authentic by the learner. As nursing education programmes increasingly adopt simulators that offer the possibility of representing authentic real world situations, there is an urgency to better articulate and understand the terms fidelity and authenticity. Without such understanding there is a real danger that simulation as a teaching and learning resource in nurse education will never reach its potential and be misunderstood, creating a potential barrier to learning. This paper examines current literature to promote discussion within nurse education, concluding that authenticity in the context of simulation-based learning is complex, relying on far more than engineered fidelity. Copyright © 2014 Elsevier Ltd. All rights reserved.
Experiential and authentic learning approaches in vaccine management.
Kartoglu, Umit; Vesper, James; Teräs, Hanna; Reeves, Thomas
2017-04-19
A high level of concern is placed on the storage, handling, transportation, and distribution of vaccines and other pharmaceutical products, particularly those that are time and temperature sensitive. While active and passive cooling equipment and monitoring devices are important, it is the various personnel responsible for executing and writing procedures, designing and operating systems, and investigating problems and helping prevent them who are paramount in establishing and maintaining a "cold chain" for time and temperature sensitive pharmaceutical products (TTSPPs). These professionals must possess the required competencies, knowledge, skills and abilities so they can effectively perform these activities with appropriate levels of expertise. These are complex tasks that require the development of higher cognitive skills that cannot be adequately addressed through professional development opportunities based on simple information delivery and content acquisition. This paper describes two unique learning solutions (one on a bus called the "wheels course" and the other online called "e-learning") that have been developed by WHO Global Learning Opportunities (WHO/GLO) to provide participants with opportunities not just to learn about cold chain systems or vaccine management, but, rather, to develop high levels of expertise in their respective fields through experiential and authentic learning activities. In these interactive learning environments, participants have opportunities to address real-life situations in contexts similar to what they may face in their own work environments and develop solutions and critical thinking skills they can apply when they return to their jobs. This paper further delineates the managerial and operational vaccine management functions encompassed in these two unique learning environments. The paper also describes the alignment of the objectives addressed in the "wheels course" and the e-learning version with effective vaccine management (EVM) criteria as prescribed by WHO. The paper concludes with an example of a real world product developed by course graduates (specifically a decision tree that is now used by some national programmes). These types of products, valuable in their own right, often emerge when learning environments based on authentic learning principles are designed and implemented as they were by WHO/GLO. Copyright © 2017 The Author(s). Published by Elsevier Ltd.. All rights reserved.
M-AssIST: Interaction and Scaffolding Matters in Authentic Assessment
ERIC Educational Resources Information Center
Santos, Patricia; Cook, John; Hernández-Leo, Davinia
2015-01-01
Authentic assessment is important in formal and informal learning. Technology has the potential to be used to support the assessment of higher order skills particularly with respect to real life tasks. In particular, the use of mobile devices allows the learner to increase her interactions with physical objects, various environments (indoors and…
Literacy Cafe: Making Writing Authentic
ERIC Educational Resources Information Center
Daniels, Erika
2007-01-01
The "Literacy Cafe," a celebration of genre study and student writing, offers students (and visitors!) a positive environment in which to engage in reading and discussion of writing without self-consciousness or fear of criticism. It works because students learn to recognize writing as a learning tool and a relevant, authentic skill in the real…
Authenticity and Authorship in the Computer-Mediated Acquisition of L2 Literacy.
ERIC Educational Resources Information Center
Kramsch, Claire
2000-01-01
Examines two tenets of communicative language teaching--authenticity of the input and authorship of the language user--in an electronic environment. Reviews research in textually-mediated second language acquisition and analyzes two cases of computer-mediated language learning: the construction of a multimedia CD-ROM by American college learners…
New Learning Design in Distance Education: The Impact on Student Perception and Motivation
ERIC Educational Resources Information Center
Martens, Rob; Bastiaens, Theo; Kirschner, Paul A.
2007-01-01
Many forms of e-learning (such as online courses with authentic tasks and computer-supported collaborative learning) have become important in distance education. Very often, such e-learning courses or tasks are set up following constructivist design principles. Often, this leads to learning environments with authentic problems in ill-structured…
ERIC Educational Resources Information Center
Stevahn, Laurie; McGuire, Margit E.
2017-01-01
Pre-service teachers typically find it challenging to implement cooperative learning authentically in schools given the complexities of classroom environments. Curriculum integration also is demanding because it requires combining research-informed pedagogies and best practices to promote academic and social learning. This article describes how…
Creating an Authentic Learning Environment in the Foreign Language Classroom
ERIC Educational Resources Information Center
Nikitina, Larisa
2011-01-01
Theatrical activities are widely used by language educators to promote and facilitate language learning. Involving students in production of their own video or a short movie in the target language allows a seamless fusion of language learning, art, and popular culture. The activity is also conducive for creating an authentic learning situation…
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-01-01
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications. PMID:24521942
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-02-11
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications.
The INDIGO-Datacloud Authentication and Authorization Infrastructure
NASA Astrophysics Data System (ADS)
Ceccanti, A.; Hardt, M.; Wegh, B.; Millar, AP; Caberletti, M.; Vianello, E.; Licehammer, S.
2017-10-01
Contemporary distributed computing infrastructures (DCIs) are not easily and securely accessible by scientists. These computing environments are typically hard to integrate due to interoperability problems resulting from the use of different authentication mechanisms, identity negotiation protocols and access control policies. Such limitations have a big impact on the user experience making it hard for user communities to port and run their scientific applications on resources aggregated from multiple providers. The INDIGO-DataCloud project wants to provide the services and tools needed to enable a secure composition of resources from multiple providers in support of scientific applications. In order to do so, a common AAI architecture has to be defined that supports multiple authentication mechanisms, support delegated authorization across services and can be easily integrated in off-the-shelf software. In this contribution we introduce the INDIGO Authentication and Authorization Infrastructure, describing its main components and their status and how authentication, delegation and authorization flows are implemented across services.
A digital memories based user authentication scheme with privacy preservation.
Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang
2017-01-01
The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.
A digital memories based user authentication scheme with privacy preservation
Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang
2017-01-01
The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users’ privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results. PMID:29190659
ESnet authentication services and trust federations
NASA Astrophysics Data System (ADS)
Muruganantham, Dhivakaran; Helm, Mike; Genovese, Tony
2005-01-01
ESnet provides authentication services and trust federation support for SciDAC projects, collaboratories, and other distributed computing applications. The ESnet ATF team operates the DOEGrids Certificate Authority, available to all DOE Office of Science programs, plus several custom CAs, including one for the National Fusion Collaboratory and one for NERSC. The secure hardware and software environment developed to support CAs is suitable for supporting additional custom authentication and authorization applications that your program might require. Seamless, secure interoperation across organizational and international boundaries is vital to collaborative science. We are fostering the development of international PKI federations by founding the TAGPMA, the American regional PMA, and the worldwide IGTF Policy Management Authority (PMA), as well as participating in European and Asian regional PMAs. We are investigating and prototyping distributed authentication technology that will allow us to support the "roaming scientist" (distributed wireless via eduroam), as well as more secure authentication methods (one-time password tokens).
Exploring the Use of Discrete Gestures for Authentication
NASA Astrophysics Data System (ADS)
Chong, Ming Ki; Marsden, Gary
Research in user authentication has been a growing field in HCI. Previous studies have shown that peoples’ graphical memory can be used to increase password memorability. On the other hand, with the increasing number of devices with built-in motion sensors, kinesthetic memory (or muscle memory) can also be exploited for authentication. This paper presents a novel knowledge-based authentication scheme, called gesture password, which uses discrete gestures as password elements. The research presents a study of multiple password retention using PINs and gesture passwords. The study reports that although participants could use kinesthetic memory to remember gesture passwords, retention of PINs is far superior to retention of gesture passwords.
Jiang, Zhi-quan; Hu, Ke-liang
2016-03-01
In the field of forensic science, conventional infrared spectral analysis technique is usually unable to meet the detection requirements, because only very a few trace material evidence with diverse shapes and complex compositions, can be extracted from the crime scene. Infrared microscopic technique is developed based on a combination of Fourier-transform infrared spectroscopic technique and microscopic technique. Infrared microscopic technique has a lot of advantages over conventional infrared spectroscopic technique, such as high detection sensitivity, micro-area analysisand nondestructive examination. It has effectively solved the problem of authentication of trace material evidence in the field of forensic science. Additionally, almost no external interference is introduced during measurements by infrared microscopic technique. It can satisfy the special need that the trace material evidence must be reserved for witness in court. It is illustrated in detail through real case analysis in this experimental center that, infrared microscopic technique has advantages in authentication of trace material evidence in forensic science field. In this paper, the vibration features in infrared spectra of material evidences, including paints, plastics, rubbers, fibers, drugs and toxicants, can be comparatively analyzed by means of infrared microscopic technique, in an attempt to provide powerful spectroscopic evidence for qualitative diagnosis of various criminal and traffic accident cases. The experimental results clearly suggest that infrared microscopic technique has an incomparable advantage and it has become an effective method for authentication of trace material evidence in the field of forensic science.
Identity development in upper-level physics students: transitions in and out of physics
NASA Astrophysics Data System (ADS)
Irving, Paul
2016-03-01
In this era of unprecedented attention from the White House and Congress, the STEM community must rise to the challenge of recruiting and retaining students to achieve the mandate of producing one million additional college graduates with degrees in STEM. However, the number of students choosing to pursue and persist with physics as a degree has had a stagnated growth rate when compared to other STEM fields, and some institutions are experiencing dramatic shifts in the demographics of the students entering their programs. The development of a subject-specific identity is a strong influence on students' persistence in a discipline and is a productive lens from which to understand the stagnated growth rate of physics majors and how to support a shift in student demographics. In this presentation, ongoing research is presented that aims to understand identity development in STEM with a focus on the transition from physics student to physicist. Community development and exposure to authentic practice are established as crucial factors that contribute to the development of a professional identity. How these findings can be implemented into course design is discussed with an outline of the P3 learning environment. The P3 learning environment blends the regular focus of reform-based teaching practices on deep conceptual understanding with a focus on students obtaining understanding through engagement with authentic scientific practices. By establishing and studying learning environments similar to P3 we can further explore the development of subject-specific identity while also developing effective teaching practices.
ERIC Educational Resources Information Center
Neo, Mai; Neo, Ken Tse-Kian; Tan, Heidi Yeen-Ju
2012-01-01
The advancements of ICT have impacted significantly on educators to utilise the technologies in their classrooms (Sivapalan & Wan Fatimah, 2010). There is also a significant move to make curriculum and content more authentic and relevant for student learning (Apple, 2008) and to allow students to become creative thinkers and problem solvers.…
Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm
NASA Astrophysics Data System (ADS)
Kim, Yoonjeong; Ohm, Seongyong; Yi, Kang
In this letter, we propose a privacy-preserving authentication protocol with RSA cryptosystem in an RFID environment. For both overcoming the resource restriction and strengthening security, our protocol uses only modular exponentiation with exponent three at RFID tag side, with the padded random message whose length is greater than one-sixth of the whole message length.
Emergency Management Students' Perceptions of the Use of WebEOC[R] to Support Authentic Learning
ERIC Educational Resources Information Center
Johnson, Thomas
2012-01-01
This study investigates the use of software technology that is used by emergency management professionals to create an authentic learning environment in emergency and disaster management courses in the classroom. Participants were 235 upper-level students enrolled in residential and online emergency and disaster management courses at a mid-sized…
Authentic Education by Providing a Situation for Student-Selected Problem-Based Learning
ERIC Educational Resources Information Center
Strimel, Greg
2014-01-01
Students are seldom given an authentic experience within school that allows them the opportunity to solve real-life complex engineering design problems that have meaning to their lives and/ or the greater society. They are often confined to learning environments that are limited by the restrictions set by course content for assessment purposes and…
ERIC Educational Resources Information Center
Ainsworth, Hannah; Gilchrist, Mollie; Grant, Celia; Hewitt, Catherine; Ford, Sue; Petrie, Moira; Torgerson, Carole J.; Torgerson, David J.
2012-01-01
In response to concern over the numeracy skills deficit displayed by student nurses, an online computer programme, "Authentic World[R]", which aims to simulate a real-life clinical environment and improve the medication dosage calculation skills of users, was developed (Founded in 2004 Authentic World Ltd is a spin out company of…
The Digital Handshake: A Group Contract for Authentic eLearning in Higher Education
ERIC Educational Resources Information Center
Hesterman, Sandra
2016-01-01
An emerging challenge for the Australian higher education sector is the delivery of authentic eLearning to support the collaborative construction of knowledge through the provision of real-life tasks in an online environment. This paper describes research conducted in a fourth-year university course where students from across the nation were…
ERIC Educational Resources Information Center
Lin, Li-Fen; Hsu, Ying-Shao; Yeh, Yi-Fen
2012-01-01
Several researchers have investigated the effects of computer simulations on students' learning. However, few have focused on how simulations with authentic contexts influences students' inquiry skills. Therefore, for the purposes of this study, we developed a computer simulation (FossilSim) embedded in an authentic inquiry lesson. FossilSim…
ERIC Educational Resources Information Center
Swan, Kathy; Hofer, Mark; Swan, Gerry
2011-01-01
Three criteria for meaningful student learning--construction of knowledge, disciplined inquiry, and value beyond school--are assessed as authentic learning outcomes for an implementation of a digital documentary project in two fifth grade history classrooms where teachers' practices are constrained by a high-stakes testing climate. In all three…
A Multifactor Secure Authentication System for Wireless Payment
NASA Astrophysics Data System (ADS)
Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip
Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram
2017-04-01
Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.
BFT replication resistant to MAC attacks
NASA Astrophysics Data System (ADS)
Zbierski, Maciej
2016-09-01
Over the last decade numerous Byzantine fault-tolerant (BFT) replication protocols have been proposed in the literature. However, the vast majority of these solutions reuse the same authentication scheme, which makes them susceptible to a so called MAC attack. Such vulnerability enables malicious clients to undetectably prevent the replicated service from processing incoming client requests, and consequently making it permanently unavailable. While some BFT protocols attempted to address this issue by using different authentication mechanisms, they at the same time significantly degraded the performance achieved in correct environments. This article presents a novel adaptive authentication mechanism which can be combined with practically any Byzantine fault-tolerant replication protocol. Unlike previous solutions, the proposed scheme dynamically switches between two operation modes to combine high performance in correct environments and liveness during MAC attacks. The experiment results presented in the article demonstrate that the proposed mechanism can sufficiently tolerate MAC attacks without introducing any observable overhead whenever no faults are present.
STEM Education is Missing This.......
NASA Astrophysics Data System (ADS)
Orr, Laura; Johnson, Milton; Miller, Alexandra; Rebull, Luisa M.
2017-01-01
STEM education gets a lot of attention in schools, media, politics, and funding. But while the acronym grows from STEM to STEAM to STREAM, we still see a lack of student participation in real science, using big data and building partnerships with professionals in the field, and real student growth in science achievement. After the NITARP experience, we believe that NITARP is a rich, demanding, and authentic experience for dedicated teachers and students that provides a caliber of learning that is hard, if not impossible, to achieve in the traditional classroom. This poster looks at what STEM still needs to be and become for it to be the driving force behind greater student involvement, interest, and increased academic performance in the sciences. We focus on our own experiences and that of our students; our different teaching backgrounds and school environments; and the effects we see on our students using traditional and new STEM education and participation in the NITARP program. We come from backgrounds and situations that range from urban to rural, middle to high school, wide socioeconomic variety, gender differences, as well as different exposures to STEM opportunities. We propose that traditional and current standards for STEM education are falling short of what is needed for students to truly experience, understand, and gain the skills to accurately apply and advance in science. Incoming and current science teachers at all levels are not provided with quality, realistic, or applicable preparation. NITARP is truly a STEM experience because it actually integrates the 4 fields and provides opportunities for students to experience the overlap of the 4 fields in an authentic way. The deep, long term exposure to authentic research and technology as well as opportunity to talk with working scientists in a variety of fields have a huge impact on the students and teachers alike. Exposure to programs and experiences like NITARP are needed to help drive and support STEM education to meet its goals and intentions. Support provided for this work by the NASA/IPAC Teacher Archive Research Program (NITARP), which receives funding from the NASA ADP program.
Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo
2012-12-01
The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.
Virtual Field Sites: Losses and Gains in Authenticity with Semantic Technologies
ERIC Educational Resources Information Center
Litherland, Kate; Stott, Tim A.
2012-01-01
The authors investigate the potential of semantic web technologies to enhance "Virtual Fieldwork" resources and learning activities in the Geosciences. They consider the difficulties inherent in the concept of Virtual Fieldwork and how these might be reconciled with the desire to provide students with "authentic" tools for…
Citizen Science as a REAL Environment for Authentic Scientific Inquiry
ERIC Educational Resources Information Center
Meyer, Nathan J.; Scott, Siri; Strauss, Andrea Lorek; Nippolt, Pamela L.; Oberhauser, Karen S.; Blair, Robert B.
2014-01-01
Citizen science projects can serve as constructivist learning environments for programming focused on science, technology, engineering, and math (STEM) for youth. Attributes of "rich environments for active learning" (REALs) provide a framework for design of Extension STEM learning environments. Guiding principles and design strategies…
ERIC Educational Resources Information Center
Jafari, Mina; Welden, Alicia Rae; Williams, Kyle L.; Winograd, Blair; Mulvihill, Ellen; Hendrickson, Heidi P.; Lenard, Michael; Gottfried, Amy; Geva, Eitan
2017-01-01
In this paper, we report on the implementation of a novel compute-to-learn pedagogy, which is based upon the theories of situated cognition and meaningful learning. The "compute-to-learn" pedagogy is designed to simulate an authentic research experience as part of the undergraduate curriculum, including project development, teamwork,…
Hangul Ro Boja! Authentic Korean Video. Lessons for Intermediate to Advanced Self-Study. [CD-ROM].
ERIC Educational Resources Information Center
Joo, H.; Choo, M.; Yeun, Soo-ah Kim; Hiple, David
This compact disc offers 10 Korean lessons from a variety of authentic sources, including the following: television commercials and scenes from a soap opera, news reports on politics, sports, the environment, and a book fair; and scenes from a Korean film, "Our Twisted Hero." The learner is lead through a series of activities aiding…
Managing authenticity: the paradox of great leadership.
Goffee, Rob; Jones, Gareth
2005-12-01
Leaders and followers both associate authenticity with sincerity, honesty, and integrity. It's the real thing--the attribute that uniquely defines great managers. But while the expression of a genuine self is necessary for great leadership, the concept of authenticity is often misunderstood, not least by leaders themselves. They often assume that authenticity is an innate quality--that a person is either genuine or not. In fact, the authors say, authenticity is largely defined by what other people see in you and, as such, can to a great extent be controlled by you. In this article, the authors explore the qualities of authentic leadership. To illustrate their points, they recount the experiences of some of the authentic leaders they have known and studied, including the BBC's Greg Dyke, Nestlé's Peter Brabeck-Letmathe, and Marks & Spencer's Jean Tomlin. Establishing your authenticity as a leader is a two-part challenge. You have to consistently match your words and deeds; otherwise, followers will never accept you as authentic. But it is not enough just to practice what you preach. To get people to follow you, you also have to get them to relate to you. This means presenting different faces to different audiences--a requirement that many people find hard to square with authenticity. But authenticity is not the product of manipulation. It accurately reflects aspects of the leader's inner self, so it can't be an act. Authentic leaders seem to know which personality traits they should reveal to whom, and when. Highly attuned to their environments, authentic leaders rely on an intuition born of formative, sometimes harsh experiences to understand the expectations and concerns of the people they seek to influence. They retain their distinctiveness as individuals, yet they know how to win acceptance in strong corporate and social cultures and how to use elements of those cultures as a basis for radical change.
Authenticity assessment of banknotes using portable near infrared spectrometer and chemometrics.
da Silva Oliveira, Vanessa; Honorato, Ricardo Saldanha; Honorato, Fernanda Araújo; Pereira, Claudete Fernandes
2018-05-01
Spectra recorded using a portable near infrared (NIR) spectrometer, Soft Independent Modeling of Class Analogy (SIMCA) and Linear Discriminant Analysis (LDA) associated to Successive Projections Algorithm (SPA) models were applied to identify counterfeit and authentic Brazilian Real (R$20, R$50 and R$100) banknotes, enabling a simple field analysis. NIR spectra (950-1650nm) were recorded from seven different areas of the banknotes (two with fluorescent ink, one over watermark, three with intaglio printing process and one over the serial numbers with typography printing). SIMCA and SPA-LDA models were built using 1st derivative preprocessed spectral data from one of the intaglio areas. For the SIMCA models, all authentic (300) banknotes were correctly classified and the counterfeits (227) were not classified. For the two classes SPA-LDA models (authentic and counterfeit currencies), all the test samples were correctly classified into their respective class. The number of selected variables by SPA varied from two to nineteen for R$20, R$50 and R$100 currencies. These results show that the use of the portable near-infrared with SIMCA or SPA-LDA models can be a completely effective, fast, and non-destructive way to identify authenticity of banknotes as well as permitting field analysis. Copyright © 2018 Elsevier B.V. All rights reserved.
A privacy authentication scheme based on cloud for medical environment.
Chen, Chin-Ling; Yang, Tsai-Tung; Chiang, Mao-Lun; Shih, Tzay-Farn
2014-11-01
With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.
Teacher Training and Authentic Scientific Research Utilizing Cretaceous Fossil Resources
NASA Astrophysics Data System (ADS)
Danch, J. M.
2016-12-01
The readily accessible Cretaceous fossil beds of central New Jersey provide an excellent opportunity for both teacher training in the utilization of paleontological resources in the classroom and authentic scientific student research at the middle and high school levels. Woodbridge Township New Jersey School District teachers participated in field trips to various fossiliferous sites to obtain photographic and video data and invertebrate and vertebrate fossil specimens for use in the classroom. Teachers were also presented with techniques allowing them to mentor students in performing authentic paleontological research. Students participated in multi-year research projects utilizing Cretaceous fossils collected in the field and presented their findings at science fairs and symposia. A workshop for K - 12 teachers statewide was developed for the New Jersey Science Convention providing information about New Jersey fossil resources and allowing participants to obtain, study and classify specimens. Additionally, the workshop provided participants with the information necessary for them to plan and conduct their own field trips.
Drosou, A.; Ioannidis, D.; Moustakas, K.; Tzovaras, D.
2011-01-01
Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities. PMID:21380485
Supporting Authentic Learning Contexts Beyond Classroom Walls
NASA Astrophysics Data System (ADS)
Herrington, Jan; Specht, Marcus; Brickell, Gwyn; Harper, Barry
At the classroom level, contexts for learning are often limited in the experiential component. Teachers and trainers feel overwhelmed by the difficulty of inventing authentic learning contexts, and creating tasks that truly reflect the way knowledge would be used in the real world (Herrington et al. 2004). However, there are growing numbers of examples of how such authentic learning environments are being used in schools, higher education, and professional development in a variety of contexts and discipline areas, such as in literacy education (Ferry et al. 2006), in physical activity fitness and health (Rice et al. 1999), in Indigenous education (Marshall et al. 2001), in evaluation (Agostinho 2006), in multimedia and ICT (Bennett et al. 2001), in literature (Fitzsimmons 2006), and in business writing (Pennell et al. 1997). Teachers and trainers who subscribe to this approach to learning can be very inventive in developing learner perceptions of authentic contexts, but often financial, situational and time constraints limit the experiential elements of authentic learning settings.
A Hybrid Authentication and Authorization Process for Control System Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Manz, David O.; Edgar, Thomas W.; Fink, Glenn A.
2010-08-25
Convergence of control system and IT networks require that security, privacy, and trust be addressed. Trust management continues to plague traditional IT managers and is even more complex when extended into control system networks, with potentially millions of entities, a mission that requires 100% availability. Yet these very networks necessitate a trusted secure environment where controllers and managers can be assured that the systems are secure and functioning properly. We propose a hybrid authentication management protocol that addresses the unique issues inherent within control system networks, while leveraging the considerable research and momentum in existing IT authentication schemes. Our hybridmore » authentication protocol for control systems provides end device to end device authentication within a remote station and between remote stations and control centers. Additionally, the hybrid protocol is failsafe and will not interrupt communication or control of vital systems in a network partition or device failure. Finally, the hybrid protocol is resilient to transitory link loss and can operate in an island mode until connectivity is reestablished.« less
Drosou, A; Ioannidis, D; Moustakas, K; Tzovaras, D
2011-03-01
Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.
ERIC Educational Resources Information Center
Buerle, Stephen
2017-01-01
This dissertation explores some of the fundamental challenges facing the information assurance community as it relates to knowledge categorization, organization and representation within the field of information security and more specifically within the domain of biometric authentication. A primary objective of this research is the development of…
Empowering Girls of Color through Authentic Science Internships
ERIC Educational Resources Information Center
Adjapong, Edmund S.; Levy, Ian P.; Emdin, Christopher
2016-01-01
The underrepresentation of girls and students of color in STEM fields, particularly in science, is an ongoing issue that is very well documented. There is a limited amount of research that provides insight on experiences of girls, especially girls of color, who have been exposed to authentic science experiences. This article interrogates the…
Authenticity in Teaching: A Constant Process of Becoming
ERIC Educational Resources Information Center
Ramezanzadeh, Akram; Zareian, Gholamreza; Adel, Seyyed Mohammad Reza; Ramezanzadeh, Ramin
2017-01-01
This study probed the conceptualization of (in)authenticity in teaching and the way it could be enacted in pedagogical practices. The participants were a purposive sample of 20 Iranian university teachers. Data were collected using in-depth interviews, field notes, and observation. The collected data were analyzed through the lens of hermeneutic…
NASA Astrophysics Data System (ADS)
Lenzini, Gabriele
We describe an existing software architecture for context and proximity aware services that enables trust-based and context-aware authentication. A service is proximity aware when it automatically detects the presence of entities in its proximity. Authentication is context-aware when it uses contextual information to discern among different identities and to evaluate to which extent they are authentic. The software architecture that we describe here is functioning in our Institute: It manages a sensor network to detect the presence and location of users and their devices. A context manager is responsible to merge the different sources of contextual information, to solve potential contradictions, and to determine the level of authentication of the identity of the person approaching one of the services offered in the coffee-break corners of our Institute. In our solution for context-aware authentication, sensors are managed as if they were recommenders having subjective belief, disbelief, and uncertainty (i.e., trust) on the position and identity of users. A sensor’s subjective trust depends on what it has been sensing in the environment. We discuss the results of an array of simulations that we conducted to validate our concept of trust-based and context-aware authentication. We use Subjective Logic to manage trust.
Chica, Manuel
2012-11-01
A novel method for authenticating pollen grains in bright-field microscopic images is presented in this work. The usage of this new method is clear in many application fields such as bee-keeping sector, where laboratory experts need to identify fraudulent bee pollen samples against local known pollen types. Our system is based on image processing and one-class classification to reject unknown pollen grain objects. The latter classification technique allows us to tackle the major difficulty of the problem, the existence of many possible fraudulent pollen types, and the impossibility of modeling all of them. Different one-class classification paradigms are compared to study the most suitable technique for solving the problem. In addition, feature selection algorithms are applied to reduce the complexity and increase the accuracy of the models. For each local pollen type, a one-class classifier is trained and aggregated into a multiclassifier model. This multiclassification scheme combines the output of all the one-class classifiers in a unique final response. The proposed method is validated by authenticating pollen grains belonging to different Spanish bee pollen types. The overall accuracy of the system on classifying fraudulent microscopic pollen grain objects is 92.3%. The system is able to rapidly reject pollen grains, which belong to nonlocal pollen types, reducing the laboratory work and effort. The number of possible applications of this authentication method in the microscopy research field is unlimited. Copyright © 2012 Wiley Periodicals, Inc.
Read, Emily A; Laschinger, Heather K S
2015-07-01
To examine a theoretical model testing the effects of authentic leadership, structural empowerment and relational social capital on the mental health and job satisfaction of new graduate nurses over the first year of practice. Relational social capital is an important interpersonal organizational resource that may foster new graduate nurses' workplace well-being and promote retention. Evidence shows that authentic leadership and structural empowerment are key aspects of the work environment that support new graduate nurses; however, the mediating role of relational social capital has yet to be explored. A longitudinal survey design was used to test the hypothesized model. One hundred ninety-one new graduate nurses in Ontario with <2 years of experience completed mail surveys in January-March 2010 and 1 year later in 2011. Path analysis using structural equation modelling was used to test the theoretical model. Participants were mostly female, working full time in medicine/surgery or critical care. All measures demonstrated acceptable reliability and validity. Path analysis results supported our hypothesized model; structural empowerment mediated the relationship between authentic leadership and nurses' relational social capital, which in turn had a negative effect on mental health symptoms and a positive effect on job satisfaction. All indirect paths in the model were significant. By creating structurally empowering work environments, authentic leaders foster relational social capital among new graduate nurses leading to positive health and retention outcomes. © 2015 John Wiley & Sons Ltd.
Adventure Learning: Theory and Implementation of Hybrid Learning
NASA Astrophysics Data System (ADS)
Doering, A.
2008-12-01
Adventure Learning (AL), a hybrid distance education approach, provides students and teachers with the opportunity to learn about authentic curricular content areas while interacting with adventurers, students, and content experts at various locations throughout the world within an online learning environment (Doering, 2006). An AL curriculum and online environment provides collaborative community spaces where traditional hierarchical classroom roles are blurred and learning is transformed. AL has most recently become popular in K-12 classrooms nationally and internationally with millions of students participating online. However, in the literature, the term "adventure learning" many times gets confused with phrases such as "virtual fieldtrip" and activities where someone "exploring" is posting photos and text. This type of "adventure learning" is not "Adventure Learning" (AL), but merely a slideshow of their activities. The learning environment may not have any curricular and/or social goals, and if it does, the environment design many times does not support these objectives. AL, on the other hand, is designed so that both teachers and students understand that their online and curriculum activities are in synch and supportive of the curricular goals. In AL environments, there are no disparate activities as the design considers the educational, social, and technological affordances (Kirschner, Strijbos, Kreijns, & Beers, 2004); in other words, the artifacts of the learning environment encourage and support the instructional goals, social interactions, collaborative efforts, and ultimately learning. AL is grounded in two major theoretical approaches to learning - experiential and inquiry-based learning. As Kolb (1984) noted, in experiential learning, a learner creates meaning from direct experiences and reflections. Such is the goal of AL within the classroom. Additionally, AL affords learners a real-time authentic online learning experience concurrently as they study the AL curriculum. AL is also grounded in an inquiry- based approach to learning where learners are pursuing answers to questions they have posed rather than focusing on memorizing and regurgitating isolated, irrelevant facts. Both the curriculum and the online classroom are developed to foster students' abilities to inquire via "identifying and posing questions, designing and conducting investigations, analyzing data and evidence, using models and explanations, and communicating findings" (Keys and Bryan, 2001, p 121). The union of experiential and inquiry-based learning is the foundation of AL, guiding and supporting authentic learning endeavors. Based on these theoretical foundations, the design of the adventure learning experiences follows seven interdependent principles that further operationalize AL: researched curriculum grounded in inquiry; collaboration and interaction opportunities between students, experts, peers, and content; utilization of the Internet for curriculum and learning environment delivery; enhancement of curriculum with media and text from the field delivered in a timely manner; synched learning opportunities with the AL curriculum; pedagogical guidelines of the curriculum and the online learning environment; and adventure-based education. (Doering, 2006).
ERIC Educational Resources Information Center
Chen, Julian ChengChiang; Brown, Kimberly Lynn
2012-01-01
The majority of writing tasks assigned to second language (L2) learners tend to target an abstract audience and the writing generated is not meant for real or meaningful purposes. The emergence of Web 2.0 concepts has created a potential educational environment where students have access to a widely distributed, authentic audience with a simple…
ERIC Educational Resources Information Center
Gratch, Jonathan
2012-01-01
Project-based learning has long been used in the educational realm as it emphasis a student-centered strategy which promotes meaning, enriched learning that enhances inquiry and problem-solving skills in a rich, authentic environment. The relevance and authentic design of projects may further be enhanced by the use of technology in the classroom.…
Integrating teaching and authentic research in the field and laboratory settings
NASA Astrophysics Data System (ADS)
Daryanto, S.; Wang, L.; Kaseke, K. F.; Ravi, S.
2016-12-01
Typically authentic research activities are separated from rigorous classroom teaching. Here we assessed the potential of integrating teaching and research activities both in the field and in the laboratory. We worked with students from both US and abroad without strong science background to utilize advanced environmental sensors and statistical tool to conduct innovative projects. The students include one from Namibia and two local high school students in Indianapolis (through Project SEED, Summer Experience for the Economically Disadvantaged). They conducted leaf potential measurements, isotope measurements and meta-analysis. The experience showed us the great potential of integrating teaching and research in both field and laboratory settings.
Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming
2016-01-01
With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.
NASA Astrophysics Data System (ADS)
Herbert, B. E.; Schroeder, C.; Brody, S.; Cahill, T.; Kenimer, A.; Loving, C.; Schielack, J.
2003-12-01
The ITS Center for Teaching and Learning is a five-year NSF-funded collaborative effort to engage scientists and university and school or district-based science educators in the use of information technology to improve science teaching and learning at all levels. One assumption is that science and mathematics teaching and learning will be improved when they become more connected to the authentic science research done in field settings or laboratories. The effective use of information technology in science classrooms has been shown to help achieve this objective. As a design study that is -working toward a greater understanding of a -learning ecology", the research related to the creation and refinement of the ITS Centeres collaborative environment for professional development is contributing information about an important setting not often included in the descriptions of professional development, a setting that incorporates distributed expertise and resulting distributed growth in the various categories of participants: scientists, science graduate students, education researchers, education graduate students, and master teachers. Design-based research is an emerging paradigm for the study of learning in context through the systematic design and study of instructional strategies and tools. This presentation will discuss the results of the formative evaluation process that has moved the ITS Centeres collaborative environment for professional development through the iterative process from Phase I (the planned program designed in-house) to Phase II (the experimental program being tested in-house). In particular, we will focus on the development of the ITS Centeres Project Teams, which create learning experiences over two summers focused on the exploration of science, technology, engineering or mathematics (STEM) topics through the use of modeling, visualization and complex data sets to explore authentic scientific questions that can be integrated within the K-16 curriculum. Ongoing formative assessment of the Cohort I project teams led to a greater emphasis on participant exploration of authentic scientific questions and tighter integration of scientific explorations and development of participant inquiry projects.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian
2015-06-01
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.
Enhancing the AliEn Web Service Authentication
NASA Astrophysics Data System (ADS)
Zhu, Jianlin; Saiz, Pablo; Carminati, Federico; Betev, Latchezar; Zhou, Daicui; Mendez Lorenzo, Patricia; Grigoras, Alina Gabriela; Grigoras, Costin; Furano, Fabrizio; Schreiner, Steffen; Vladimirovna Datskova, Olga; Sankar Banerjee, Subho; Zhang, Guoping
2011-12-01
Web Services are an XML based technology that allow applications to communicate with each other across disparate systems. Web Services are becoming the de facto standard that enable inter operability between heterogeneous processes and systems. AliEn2 is a grid environment based on web services. The AliEn2 services can be divided in three categories: Central services, deployed once per organization; Site services, deployed on each of the participating centers; Job Agents running on the worker nodes automatically. A security model to protect these services is essential for the whole system. Current implementations of web server, such as Apache, are not suitable to be used within the grid environment. Apache with the mod_ssl and OpenSSL only supports the X.509 certificates. But in the grid environment, the common credential is the proxy certificate for the purpose of providing restricted proxy and delegation. An Authentication framework was taken for AliEn2 web services to add the ability to accept X.509 certificates and proxy certificates from client-side to Apache Web Server. The authentication framework could also allow the generation of access control policies to limit access to the AliEn2 web services.
A Survey of Authentication Schemes in Telecare Medicine Information Systems.
Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber
2017-01-01
E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing.
Kumar, Vinod; Jangirala, Srinivas; Ahmad, Musheer
2018-06-28
The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet connectivity. Security and privacy preservation is necessary for medical data of the patient in TMIS because of the very perceptive purpose. Recently, Mohit et al.'s proposed a mutual authentication protocol for TMIS in the cloud computing environment. In this work, we reviewed their protocol and found that it is not secure against stolen verifier attack, many logged in patient attack, patient anonymity, impersonation attack, and fails to protect session key. For enhancement of security level, we proposed a new mutual authentication protocol for the similar environment. The presented framework is also more capable in terms of computation cost. In addition, the security evaluation of the protocol protects resilience of all possible security attributes, and we also explored formal security evaluation based on random oracle model. The performance of the proposed protocol is much better in comparison to the existing protocol.
Trust Model to Enhance Security and Interoperability of Cloud Environment
NASA Astrophysics Data System (ADS)
Li, Wenjuan; Ping, Lingdi
Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.
Basis for the implementation of digital signature in Argentine's health environment
NASA Astrophysics Data System (ADS)
Escobar, P. P.; Formica, M.
2007-11-01
The growth of telemedical applications and electronic transactions in health environments is paced by the constant technology evolution. This implies a big cultural change in traditional medicine and in hospital information systems' users which arrival is delayed, basically, by the lack of solid laws and a well defined role-based infrastructure. The use of digital signature as a mean of identification, authentication, confidentiality and non-repudiation is the most suitable tool for assuring the electronic transactions and patient's data protection. The implementation of a Public Key Infrastructure (PKI) in health environment allows for authentication, encryption and use of digital signature for assuring confidentiality and control of the movement of sensitive information. This work defines the minimum technological, legal and procedural basis for a successful PKI implementation and establishes the roles for the different actors in the chain of confidence in the public health environment of Argentine.
A General Comparison of SharePoint 2007 and SharePoint 2010
2012-10-01
rich as some dedicated Wiki offerings, e.g. Confluence, appropriately authorised users can collaboratively develop content. Unlike Wiki pages...Workspace 2010 uses Windows credentials instead of a Groove-specific logon for authenticating users, thus improving consistency with the rest of the Office...environment, such as authentication properties. In SharePoint 2010 the Business Data Connectivity service is the new version of SharePoint 2007’s Business
Authentic leadership and nurse-assessed adverse patient outcomes.
Wong, Carol A; Giallonardo, Lisa M
2013-07-01
Our purpose was to test a model examining relationships among authentic leadership, nurses' trust in their manager, areas of work life and nurse-assessed adverse patient outcomes. Although several work environment factors have been cited as critical to patient outcomes, studies linking nursing leadership styles with patient outcomes are limited suggesting the need for additional research to investigate the mechanisms by which leadership may influence patient outcomes. Secondary analysis of data collected in a cross-sectional survey of 280 (48% response rate) registered nurses working in acute care hospitals in Ontario was conducted using structural equation modelling. The final model fit the data acceptably (χ(2) = 1.30, df = 2, P = 0.52, IFI = 0.99, CFI = 1.00, RMSEA = 0.00). Authentic leadership was significantly associated with decreased adverse patient outcomes through trust in the manager and areas of work life. The findings suggest that nurses who see their managers as demonstrating high levels of authentic leadership report increased trust, greater congruence in the areas of work life and lower frequencies of adverse patient outcomes. Managers who emphasize transparency, balanced processing, self-awareness and high ethical standards in their interactions with nurses may contribute to safer work environments for patients and nurses. © 2013 John Wiley & Sons Ltd.
NASA Astrophysics Data System (ADS)
Siswono, T. Y. E.; Kohar, A. W.; Rosyidi, A. H.; Hartono, S.; Masriyah
2018-01-01
Designing problem like in PISA is known as a challenging activity for teachers particularly as the use of authentic context within that type of problem. This paper aims to describe the experiences of secondary mathematics teachers in designing PISA-like problems within an innovative training program focusing on building teachers’ understanding on the concept of mathematical literacy. The teachers were engaged in a set of problem-solving and problem-posing activities using PISA-based problem within indoor and outdoor field experiences. Within indoor field experience, the teachers worked collaboratively in groups on designing PISA-like problems with a given context through problem generation and reformulation techniques. Within outdoor field experience, they worked on designing PISA-like problems with self-chosen context from the place where the outdoor field experience took place. Our analysis indicates that there were improvements on the PISA-like problems designed by teachers based on its level use of context from indoor to outdoor experience. Also, the teachers were relatively successful with creating appropriate and motivating contexts by harnessing a variety of context consisting of personal, occupational, societal, and scientific contexts. However, they still experienced difficulties in turning these contexts into an appropriate problem satisfying PISA framework such as regarding authenticity of context use, language structure, and PISA task profile.
Communicating food safety, authenticity and consumer choice. Field experiences.
Syntesa, Heiner Lehr
2013-04-01
The paper reviews patented and non-patented technologies, methods and solutions in the area of food traceability. It pays special attention to the communication of food safety, authenticity and consumer choice. Twenty eight recent patents are reviewed in the areas of (secure) identification, product freshness indicators, meat traceability, (secure) transport of information along the supply chain, country/region/place of origin, automated authentication, supply chain management systems, consumer interaction systems. In addition, solutions and pilot projects are described in the areas of Halal traceability, traceability of bird's nests, cold chain management, general food traceability and other areas.
Mu, Zhendong; Yin, Jinhai; Hu, Jianfeng
2018-01-01
In this paper, a person authentication system that can effectively identify individuals by generating unique electroencephalogram signal features in response to self-face and non-self-face photos is presented. In order to achieve a good stability performance, the sequence of self-face photo including first-occurrence position and non-first-occurrence position are taken into account in the serial occurrence of visual stimuli. In addition, a Fisher linear classification method and event-related potential technique for feature analysis is adapted to yield remarkably better outcomes than that by most of the existing methods in the field. The results have shown that the EEG-based person authentications via brain-computer interface can be considered as a suitable approach for biometric authentication system.
Ubiquitous Learning Environments in Higher Education: A Scoping Literature Review
ERIC Educational Resources Information Center
Virtanen, Mari Aulikki; Haavisto, Elina; Liikanen, Eeva; Kääriäinen, Maria
2018-01-01
Ubiquitous learning and the use of ubiquitous learning environments heralds a new era in higher education. Ubiquitous learning environments enhance context-aware and seamless learning experiences available from any location at any time. They support smooth interaction between authentic and digital learning resources and provide personalized…
Authentic leadership, performance, and job satisfaction: the mediating role of empowerment.
Wong, Carol A; Laschinger, Heather K S
2013-04-01
To report a study conducted to test a model linking authentic leadership of managers with nurses' perceptions of structural empowerment, performance, and job satisfaction. Authentic leadership has been proposed as the root element of effective leadership needed to build healthier work environments because there is special attention to the development of empowering leader-follower relationships. Although the influence of leadership style and empowerment on job satisfaction is well documented, there are few studies examining the influence of authentic leadership on nurses' empowerment and work outcomes. A non-experimental, predictive survey. In 2008, a random sample of 600 Registered Nurses working in acute care hospitals across Ontario in Canada was surveyed. The final sample consisted of 280 (48% response rate) nurses. Variables were measured using the Authentic Leadership Questionnaire, Conditions of Work Effectiveness Questionnaire, Global Job Satisfaction Survey, and General Performance scale. The theoretical model was tested using structural equation modelling. The final model fit the data acceptably. Authentic leadership significantly and positively influenced staff nurses' structural empowerment, which in turn increased job satisfaction and self-rated performance. The results suggest that the more managers are seen as authentic, by emphasizing transparency, balanced processing, self-awareness and high ethical standards, the more nurses perceive they have access to workplace empowerment structures, are satisfied with their work, and report higher performance. © 2012 Blackwell Publishing Ltd.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2013-07-24
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2013-01-01
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged. PMID:23887085
Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses
NASA Astrophysics Data System (ADS)
Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon
This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.
Park, Namje; Kang, Namhi
2015-12-24
The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.
Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming
2016-01-01
With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.’s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606
Analog Video Authentication and Seal Verification Equipment Development
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gregory Lancaster
Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital imagesmore » and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.« less
Secure and Privacy Enhanced Gait Authentication on Smart Phone
Choi, Deokjai
2014-01-01
Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits. PMID:24955403
Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment.
Chiou, Shin-Yan; Ying, Zhaoqin; Liu, Junqiang
2016-04-01
Medical systems allow patients to receive care at different hospitals. However, this entails considerable inconvenience through the need to transport patients and their medical records between hospitals. The development of Telecare Medicine Information Systems (TMIS) makes it easier for patients to seek medical treatment and to store and access medical records. However, medical data stored in TMIS is not encrypted, leaving patients' private data vulnerable to external leaks. In 2014, scholars proposed a new cloud-based medical information model and authentication scheme which would not only allow patients to remotely access medical services but also protects patient privacy. However, this scheme still fails to provide patient anonymity and message authentication. Furthermore, this scheme only stores patient medical data, without allowing patients to directly access medical advice. Therefore, we propose a new authentication scheme, which provides anonymity, unlinkability, and message authentication, and allows patients to directly and remotely consult with doctors. In addition, our proposed scheme is more efficient in terms of computation cost. The proposed system was implemented in Android system to demonstrate its workability.
Flexible and Transparent User Authentication for Mobile Devices
NASA Astrophysics Data System (ADS)
Clarke, Nathan; Karatzouni, Sevasti; Furnell, Steven
The mobile device has become a ubiquitous technology that is capable of supporting an increasingly large array of services, applications and information. Given their increasing importance, it is imperative to ensure that such devices are not misused or abused. Unfortunately, a key enabling control to prevent this, user authentication, has not kept up with the advances in device technology. This paper presents the outcomes of a 2 year study that proposes the use of transparent and continuous biometric authentication of the user: providing more comprehensive identity verification; minimizing user inconvenience; and providing security throughout the period of use. A Non-Intrusive and Continuous Authentication (NICA) system is described that maintains a continuous measure of confidence in the identity of the user, removing access to sensitive services and information with low confidence levels and providing automatic access with higher confidence levels. An evaluation of the framework is undertaken from an end-user perspective via a trial involving 27 participants. Whilst the findings raise concerns over education, privacy and intrusiveness, overall 92% of users felt the system offered a more secure environment when compared to existing forms of authentication.
ERIC Educational Resources Information Center
Kreber, Carolin; Klampfleitner, Monika
2013-01-01
This study investigated an under-explored area in the field of academic practice: the meaning of the complex notion of authenticity in teaching. Combining conceptual with empirical investigation, data included philosophical texts, repertory grid interviews with fifty-five lecturers and students from Law, Physics and English Literature, and…
An improved authenticated key agreement protocol for telecare medicine information system.
Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin
2016-01-01
In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.
Authentic leadership and thriving among nurses: the mediating role of empathy.
Mortier, Anneleen Viona; Vlerick, Peter; Clays, Els
2016-04-01
To examine the relationship between perceived authentic leadership and two dimensions of thriving (learning and vitality) among nurses, and to study the mediating role of empathy in this relationship. Nurses' thriving is a key asset for health care organisations, and its significant role warrants the need to identify the underlying key determinants and psychological mechanisms. A cross-sectional design was carried out in a large hospital in September 2013. Self-administered questionnaires were distributed to 360 nurses. The main hypotheses were tested through hierarchical regression analyses. The significant positive relationship between perceived authentic leadership and vitality was mediated by perceived empathy. This mediation, however, was not confirmed in relation to learning. Nurse managers' authentic leadership enhances nurses' thriving at work. Furthermore, empathic nurse managers seem to increase the vitality of their nurses. Training nurse managers in authentic leadership skills is important for the nursing field, as those skills help nurse managers to better express empathy and consequently foster thriving in nursing. © 2015 John Wiley & Sons Ltd.
2002-09-01
Secure Multicast......................................................................24 i. Message Digests and Message Authentication Codes ( MACs ...that is, the needs of the VE will determine what the design will look like (e.g., reliable vs . unreliable data communications). In general, there...Molva00] and [Abdalla00]. i. Message Digests and Message Authentication Codes ( MACs ) Message digests and MACs are used for data integrity verification
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin
2010-04-01
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.
ERIC Educational Resources Information Center
Kinnebrew, John S.; Segedy, James R.; Biswas, Gautam
2017-01-01
Research in computer-based learning environments has long recognized the vital role of adaptivity in promoting effective, individualized learning among students. Adaptive scaffolding capabilities are particularly important in open-ended learning environments, which provide students with opportunities for solving authentic and complex problems, and…
ERIC Educational Resources Information Center
Fernández-Pascual, Maria Dolores; Ferrer-Cascales, Rosario; Reig-Ferrer, Abilio; Albaladejo-Blázquez, Natalia; Walker, Scott L.
2015-01-01
The aim of this study was to examine the validity of the Spanish version of the Distance Education Learning Environments Survey (Sp-DELES). This instrument assesses students' perceptions of virtual learning environments using six scales: Instructor Support, Student Interaction and Collaboration, Personal Relevance, Authentic Learning, Active…
The Role of Environment Design in an Educational Multi-User Virtual Environment
ERIC Educational Resources Information Center
Papachristos, Nikiforos M.; Vrellis, Ioannis; Natsis, Antonis; Mikropoulos, Tassos A.
2014-01-01
This paper presents empirical results from an exploratory study conducted in an authentic educational situation with preservice education students enrolled in an undergraduate course, which was partially taught in Second Life. The study investigated the effect of environment design on presence, learning outcomes and the overall experience of the…
Proteomics for the authentication of fish species.
Mazzeo, Maria Fiorella; Siciliano, Rosa Anna
2016-09-16
Assessment of seafood authenticity and origin, mainly in the case of processed products (fillets, sticks, baby food) represents the crucial point to prevent fraudulent deceptions thus guaranteeing market transparency and consumers health. The most dangerous practice that jeopardies fish safety is intentional or unintentional mislabeling, originating from the substitution of valuable fish species with inferior ones. Conventional analytical methods for fish authentication are becoming inadequate to comply with the strict regulations issued by the European Union and with the increase of mislabeling due to the introduction on the market of new fish species and market globalization. This evidence prompts the development of high-throughput approaches suitable to identify unambiguous biomarkers of authenticity and screen a large number of samples with minimal time consumption. Proteomics provides suitable and powerful tools to investigate main aspects of food quality and safety and has given an important contribution in the field of biomarkers discovery applied to food authentication. This report describes the most relevant methods developed to assess fish identity and offers a perspective on their potential in the evaluation of fish quality and safety thus depicting the key role of proteomics in the authentication of fish species and processed products. The assessment of fishery products authenticity is a main issue in the control quality process as deceptive practices could imply severe health risks. Proteomics based methods could significantly contribute to detect falsification and frauds, thus becoming a reliable operative first-line testing resource in food authentication. Copyright © 2016 Elsevier B.V. All rights reserved.
Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim
2015-01-01
In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of “bad” nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics—maliciousness, cooperation, and compatibility—and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates “bad”, “misbehaving” or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated “bad” behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to “good” nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations. PMID:25648712
Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim
2015-02-02
In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of "bad" nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics-maliciousness, cooperation, and compatibility-and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates "bad", "misbehaving" or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated "bad" behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to "good" nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations.
ERIC Educational Resources Information Center
Parkinson, Debra D.; Muir Welsh, Kate
2009-01-01
In 2003, a state in the Rocky Mountain region combined the concept of partner schools (Goodlad, 1993) and the model of a professional development school (Holmes Group, 1986, 1995) to develop four university public school partnerships. This study asked two guiding questions: Is authentic cross-cultural collaboration possible between a university…
Standards for Cell Line Authentication and Beyond
Cole, Kenneth D.; Plant, Anne L.
2016-01-01
Different genomic technologies have been applied to cell line authentication, but only one method (short tandem repeat [STR] profiling) has been the subject of a comprehensive and definitive standard (ASN-0002). Here we discuss the power of this document and why standards such as this are so critical for establishing the consensus technical criteria and practices that can enable progress in the fields of research that use cell lines. We also examine other methods that could be used for authentication and discuss how a combination of methods could be used in a holistic fashion to assess various critical aspects of the quality of cell lines. PMID:27300367
A new method of enhancing telecommand security: the application of GCM in TC protocol
NASA Astrophysics Data System (ADS)
Zhang, Lei; Tang, Chaojing; Zhang, Quan
2007-11-01
In recent times, security has grown to a topic of major importance for the space missions. Many space agencies have been engaged in research on the selection of proper algorithms for ensuring Telecommand security according to the space communication environment, especially in regard to the privacy and authentication. Since space missions with high security levels need to ensure both privacy and authentication, Authenticated Encryption with Associated Data schemes (AEAD) be integrated into normal Telecommand protocols. This paper provides an overview of the Galois Counter Mode (GCM) of operation, which is one of the available two-pass AEAD schemes, and some preliminary considerations and analyses about its possible application to Telecommand frames specified by CCSDS.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lingerfelt, Eric J; Endeve, Eirik; Hui, Yawei
Improvements in scientific instrumentation allow imaging at mesoscopic to atomic length scales, many spectroscopic modes, and now--with the rise of multimodal acquisition systems and the associated processing capability--the era of multidimensional, informationally dense data sets has arrived. Technical issues in these combinatorial scientific fields are exacerbated by computational challenges best summarized as a necessity for drastic improvement in the capability to transfer, store, and analyze large volumes of data. The Bellerophon Environment for Analysis of Materials (BEAM) platform provides material scientists the capability to directly leverage the integrated computational and analytical power of High Performance Computing (HPC) to perform scalablemore » data analysis and simulation and manage uploaded data files via an intuitive, cross-platform client user interface. This framework delivers authenticated, "push-button" execution of complex user workflows that deploy data analysis algorithms and computational simulations utilizing compute-and-data cloud infrastructures and HPC environments like Titan at the Oak Ridge Leadershp Computing Facility (OLCF).« less
NASA Astrophysics Data System (ADS)
McDermott, J. M.; Scherf, L.; Ward, S.; Cady, P.; Bromley, J.; Varner, R. K.; Froburg, E.
2008-12-01
In a secondary-level Earth System Science (ESS) curriculum, the most authentic learning is achieved through the inquiry-based application of real-world research methods in the context of modern understanding of the interconnected components of the Earth System (e.g. lithosphere, hydrosphere, atmosphere, and biosphere). Following the intensive ESST-1 summer institute at UNH, during which teachers enhance their ESS content knowledge via interactions with UNH faculty, staff, and graduate students, each participating teacher is paired with one graduate student fellow for the duration of the school year. This graduate fellow provides a continuing link between the secondary-level school teaching environment and university resources, facilitating the implementation of new content knowledge and current scientific research methodology into the classroom setting. According to the National Science Education Standards (1), scientific inquiry is the central strategy for teaching science. "In successful science classrooms, teachers and students collaborate in the pursuit of ideas... Students formulate questions and devise ways to answer them, they collect data and decide how to represent it, they organize data to generate knowledge, and they test the reliability of the knowledge they have generated. As they proceed, students explain and justify their work to themselves and to one another, learn to cope with problems such as the limitations of equipment, and react to challenges posed by the teacher and by classmates." To speak to these goals, an ongoing local wetland field study has been conceptualized and implemented in three example classrooms (seventh grade general science, ninth grade physical science and tenth grade biology) in two school systems (Oyster River Middle School in Durham, NH and Berlin High School in Berlin, NH). These field studies were conducted using authentic scientific equipment to collect data, including a Li-Cor 840 infrared CO2 analyzer and handmade sediment coring devices. Students utilized GPS and Google Earth technology both to facilitate the generation of research questions and for accurate geographic location during their field studies. An emphasis was placed on maintaining organized records of observations and data using field notebooks. Every site visit was followed by teacher-guided data analyses, and students communicated their results through a variety of formats, including posters, written reports, and oral presentations. These authentic research experiences create an initial data set which may be referenced in future classroom studies, while effectively engaging students in ESS topics that meet national and state educational standards. (1) National Research Council, 1996.
Authentication of Electromagnetic Interference Removal in Johnson Noise Thermometry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Britton Jr, Charles L.; Roberts, Michael
This report summarizes the testing performed offsite at the TVA Kingston Fossil Plant (KFP). This location is selected as a valid offsite test facility because the environment is very similar to the expected industrial nuclear power plant environment. This report will discuss the EMI discovered in the environment, the removal technique validity, and results from the measurements.
ERIC Educational Resources Information Center
Hwang, Gwo-Jen; Chu, Hui-Chun; Shih, Ju-Ling; Huang, Shu-Hsien; Tsai, Chin-Chung
2010-01-01
A context-aware ubiquitous learning environment is an authentic learning environment with personalized digital supports. While showing the potential of applying such a learning environment, researchers have also indicated the challenges of providing adaptive and dynamic support to individual students. In this paper, a decision-tree-oriented…
Cardea: Providing Support for Dynamic Resource Access in a Distributed Computing Environment
NASA Technical Reports Server (NTRS)
Lepro, Rebekah
2003-01-01
The environment framing the modem authorization process span domains of administration, relies on many different authentication sources, and manages complex attributes as part of the authorization process. Cardea facilitates dynamic access control within this environment as a central function of an inter-operable authorization framework. The system departs from the traditional authorization model by separating the authentication and authorization processes, distributing the responsibility for authorization data and allowing collaborating domains to retain control over their implementation mechanisms. Critical features of the system architecture and its handling of the authorization process differentiate the system from existing authorization components by addressing common needs not adequately addressed by existing systems. Continuing system research seeks to enhance the implementation of the current authorization model employed in Cardea, increase the robustness of current features, further the framework for establishing trust and promote interoperability with existing security mechanisms.
Centralized Authentication with Kerberos 5, Part I
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wachsmann, A
Account administration in a distributed Unix/Linux environment can become very complicated and messy if done by hand. Large sites use special tools to deal with this problem. I will describe how even very small installations like your three computer network at home can take advantage of the very same tools. The problem in a distributed environment is that password and shadow files need to be changed individually on each machine if an account change occurs. Account changes include: password change, addition/removal of accounts, name change of an account (UID/GID changes are a big problem in any case), additional or removedmore » login privileges to a (group of) computer(s), etc. In this article, I will show how Kerberos 5 solves the authentication problem in a distributed computing environment. A second article will describe a solution for the authorization problem.« less
Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young
2016-01-01
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.
A Selective Group Authentication Scheme for IoT-Based Medical Information System.
Park, YoHan; Park, YoungHo
2017-04-01
The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2015-03-01
The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes.
A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.
Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander
2017-01-01
Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.
ERIC Educational Resources Information Center
Harrington, Diane, Comp.; And Others
The second annual Affiliates' meeting of the National Center for Restructuring Education, Schools, and Teaching brought together 200 people to examine authentic teaching and assessment practices and policies. Nine presentations from the meeting are compiled in this document, illustrating different approaches to developing alternative assessment…
On Location Learning: Authentic Applied Science with Networked Augmented Realities
NASA Astrophysics Data System (ADS)
Rosenbaum, Eric; Klopfer, Eric; Perry, Judy
2007-02-01
The learning of science can be made more like the practice of science through authentic simulated experiences. We have created a networked handheld Augmented Reality environment that combines the authentic role-playing of Augmented Realities and the underlying models of Participatory Simulations. This game, known as Outbreak @ The Institute, is played across a university campus where players take on the roles of doctors, medical technicians, and public health experts to contain a disease outbreak. Players can interact with virtual characters and employ virtual diagnostic tests and medicines. They are challenged to identify the source and prevent the spread of an infectious disease that can spread among real and/or virtual characters according to an underlying model. In this paper, we report on data from three high school classes who played the game. We investigate students' perception of the authenticity of the game in terms of their personal embodiment in the game, their experience playing different roles, and their understanding of the dynamic model underlying the game.
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle
Park, Namje; Kang, Namhi
2015-01-01
The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, “things” are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks. PMID:26712759
Wind tunnel behavioural response and field trapping of the blowfly Calliphora vicina.
Aak, A; Knudsen, G K; Soleng, A
2010-09-01
The attraction of the blowfly Calliphora vicina Robineau-Desvoidy, 1830 (Diptera: Calliphoridae) to single synthetic compounds, blends and authentic odours was investigated in a wind tunnel. A total of 1850 C. vicina (1750 females and 100 males) were tested. A comparison of male and female responses showed significant differences in attraction between the sexes. Females were more attracted than males to liver odour. The attraction of females lay in the ranges of 0-22% for single compounds, 26-64% for synthetic blends and 58-88% for authentic odours. Dimethyl trisulphide was the most attractive single compound. Significant improvement in attraction was achieved with blends and a three-component lure, consisting of dimethyl trisulphide, mercaptoethanol and o-cresol, was found to be the best solution for field trapping of C. vicina. Authentic odours from dead fish and mice were significantly more attractive than liver and the three-component blend, and the blend and liver were similarly effective as attractants. Field tests support the results of the wind tunnel study and a high number of C. vicina were caught in funnel traps. Overall, 99.1% of the specimens caught were females.
1967-02-06
Aerial Survey of Ames Research Center - Flight Simulation Complex' Flight simulators create an authentic aircraft environment by generating the appropriate physical cues that provide the sensations of flight.
Continuous-variable quantum authentication of physical unclonable keys
NASA Astrophysics Data System (ADS)
Nikolopoulos, Georgios M.; Diamanti, Eleni
2017-04-01
We propose a scheme for authentication of physical keys that are materialized by optical multiple-scattering media. The authentication relies on the optical response of the key when probed by randomly selected coherent states of light, and the use of standard wavefront-shaping techniques that direct the scattered photons coherently to a specific target mode at the output. The quadratures of the electromagnetic field of the scattered light at the target mode are analysed using a homodyne detection scheme, and the acceptance or rejection of the key is decided upon the outcomes of the measurements. The proposed scheme can be implemented with current technology and offers collision resistance and robustness against key cloning.
A DBR Framework for Designing Mobile Virtual Reality Learning Environments
ERIC Educational Resources Information Center
Cochrane, Thomas Donald; Cook, Stuart; Aiello, Stephen; Christie, Duncan; Sinfield, David; Steagall, Marcus; Aguayo, Claudio
2017-01-01
This paper proposes a design based research (DBR) framework for designing mobile virtual reality learning environments. The application of the framework is illustrated by two design-based research projects that aim to develop more authentic educational experiences and learner-centred pedagogies in higher education. The projects highlight the first…
Bilingual Language Supports in Online Science Inquiry Environments
ERIC Educational Resources Information Center
Clark, Douglas B.; Touchman, Stephanie; Martinez-Garza, Mario; Ramirez-Marin, Frank; Drews, Tina Skjerping
2012-01-01
Research over the past fifteen years has investigated and developed online science inquiry environments to support students engaging in authentic scientific inquiry practices. This research has focused on developing activity structures and tools to scaffold students in engaging in different aspects of these practices, but relatively little of this…
ERIC Educational Resources Information Center
Ge, Xun; Huang, Kun; Dong, Yifei
2010-01-01
A semester-long ethnography study was carried out to investigate project-based learning in a graduate software engineering course through the implementation of an Open-Source Software Development (OSSD) learning environment, which featured authentic projects, learning community, cognitive apprenticeship, and technology affordances. The study…
The Comparison of Students' Satisfaction between Ubiquitous and Web-Based Learning Environments
ERIC Educational Resources Information Center
Virtanen, Mari Aulikki; Kääriäinen, Maria; Liikanen, Eeva; Haavisto, Elina
2017-01-01
Higher education is moving towards digitalized learning. The rapid development of technological resources, devices and wireless networks enables more flexible opportunities to study and learn in innovative learning environments. New technologies enable combining of authentic and virtual learning spaces and digital resources as multifunctional…
Field trial of the enhanced data authentication system (EDAS)
Thomas, Maikael A.; Hymel, Ross W.; Baldwin, George; ...
2016-11-01
The Enhanced Data Authentication System (EDAS) is means to securely branch information from an existing measurement system or data stream to a secondary observer. In an international nuclear safeguards context, the EDAS connects to operator instrumentation, and provides a cryptographically secure copy of the information for a safeguards inspectorate. However, this novel capability could be a valuable complement to inspector-owned safeguards instrumentation, offering context that is valuable for anomaly resolution and contingency.
Apprenticeships, Collaboration and Scientific Discovery in Academic Field Studies
ERIC Educational Resources Information Center
Madden, Derek Scott; Grayson, Diane J.; Madden, Erinn H.; Milewski, Antoni V.; Snyder, Cathy Ann
2012-01-01
Teachers may use apprenticeships and collaboration as instructional strategies that help students to make authentic scientific discoveries as they work as amateur researchers in academic field studies. This concept was examined with 643 students, ages 14-72, who became proficient at field research through cognitive apprenticeships with the…
UNIX security in a supercomputing environment
NASA Technical Reports Server (NTRS)
Bishop, Matt
1989-01-01
The author critiques some security mechanisms in most versions of the Unix operating system and suggests more effective tools that either have working prototypes or have been implemented, for example in secure Unix systems. Although no computer (not even a secure one) is impenetrable, breaking into systems with these alternate mechanisms will cost more, require more skill, and be more easily detected than penetrations of systems without these mechanisms. The mechanisms described fall into four classes (with considerable overlap). User authentication at the local host affirms the identity of the person using the computer. The principle of least privilege dictates that properly authenticated users should have rights precisely sufficient to perform their tasks, and system administration functions should be compartmentalized; to this end, access control lists or capabilities should either replace or augment the default Unix protection system, and mandatory access controls implementing multilevel security models and integrity mechanisms should be available. Since most users access supercomputing environments using networks, the third class of mechanisms augments authentication (where feasible). As no security is perfect, the fourth class of mechanism logs events that may indicate possible security violations; this will allow the reconstruction of a successful penetration (if discovered), or possibly the detection of an attempted penetration.
Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young
2016-01-01
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786
Authentic leadership and nurses' voice behaviour and perceptions of care quality.
Wong, Carol A; Spence Laschinger, Heather K; Cummings, Greta G
2010-11-01
The purpose of the present study was to test a theoretical model linking authentic leadership with staff nurses' trust in their manager, work engagement, voice behaviour and perceived unit care quality. Authentic leadership is a guide for effective leadership needed to build trust and healthier work environments because there is special attention given to honesty, integrity and high ethical standards in the development of leader-follower relationships. A non-experimental, predictive survey design was used to test the hypothesized model in a random sample of 280 (48% response rate) registered nurses working in acute care hospitals in Ontario. The final model fitted the data acceptably (χ(2)=17.24, d.f.=11, P=0.10, IFI=0.99, CFI=0.99, RMSEA=0.045). Authentic leadership significantly and positively influenced staff nurses' trust in their manager and work engagement which in turn predicted voice behaviour and perceived unit care quality. These findings suggest that authentic leadership and trust in the manager play a role in fostering trust, work engagement, voice behaviour and perceived quality of care. Nursing leaders can improve care quality and workplace conditions by paying attention to facilitating genuine and positive relationships with their staff. © 2010 The Authors. Journal compilation © 2010 Blackwell Publishing Ltd.
Controlled mutual quantum entity authentication with an untrusted third party
NASA Astrophysics Data System (ADS)
Kang, Min-Sung; Heo, Jino; Hong, Chang-Ho; Yang, Hyung-Jin; Han, Sang-Wook; Moon, Sung
2018-07-01
We propose a quantum control entity mutual authentication protocol that can be executed in environments involving an untrusted third party. In general, the third party, referred to as Charlie, can be an entity such as a telephone company, server, financial company, or login webpage for a portal service. Most communication protocols controlled by third parties are vulnerable to internal attacks. In this study, we present two solutions that make use of an entanglement correlation checking method and random numbers against an internal attack by an untrusted third party.
Teaching Environmental Geochemistry: An Authentic Inquiry Approach
ERIC Educational Resources Information Center
Koretsky, Carla M.; Petcovic, Heather L.; Rowbotham, Katherine L.
2012-01-01
A field-based environmental geochemistry course was developed at Western Michigan University for undergraduate geosciences and environmental studies students to (1) improve student understanding of complex environmental systems, specifically targeting lake systems; (2) facilitate student development of professional-level, field- and…
Excellence in Coaching: The Art and Skill of Elite Practitioners
ERIC Educational Resources Information Center
Nash, Christine S.; Sproule, John; Horton, Peter
2011-01-01
During this study, 10 expert coaches were interviewed to examine their views on aspects of their individual coaching practice. Four themes emerged from the interviews: (a) the long-term approach, (b) the authentic coaching environment, (c) creating a learning environment, and (d) the quality and quantity of training sessions. These coaches were…
ERIC Educational Resources Information Center
Barber, Wendy; Taylor, Stacey; Buchanan, Sylvia
2014-01-01
The purpose of this paper is to examine a specific online pedagogical tool, "Digital Moments" that can be an effective strategy for building online communities in a knowledge building environment. While the paper will examine the specific techniques and teaching methodologies that enabled the authors to create authentic online learning…
A PKI Approach for Deploying Modern Secure Distributed E-Learning and M-Learning Environments
ERIC Educational Resources Information Center
Kambourakis, Georgios; Kontoni, Denise-Penelope N.; Rouskas, Angelos; Gritzalis, Stefanos
2007-01-01
While public key cryptography is continuously evolving and its installed base is growing significantly, recent research works examine its potential use in e-learning or m-learning environments. Public key infrastructure (PKI) and attribute certificates (ACs) can provide the appropriate framework to effectively support authentication and…
ERIC Educational Resources Information Center
Roskvist, Annelies; Harvey, Sharon; Corder, Deborah; Stacey, Karen
2014-01-01
The overseas immersion environment has long been considered a superior context for language learning, supposedly providing unlimited exposure to target language (TL) input and countless opportunities for authentic interaction with expert users. This article focuses on immersion programmes (IPs) for in-service language teachers--a relatively…
Incorporating Relevance and Rigor in a Game Environment: Barracuda Cove Investment Game
ERIC Educational Resources Information Center
Hall, Susan E.
2014-01-01
Achieving student learning outcomes in a "gamelike" environment allows students to connect real-world activities to marketing and business concepts presented in a relevant and authentic manner. The innovative game, Barracuda Cove Investment Game, can be incorporated into any marketing-related course that would require a marketing or…
Learning Genetics through an Authentic Research Simulation in Bioinformatics
ERIC Educational Resources Information Center
Gelbart, Hadas; Yarden, Anat
2006-01-01
Following the rationale that learning is an active process of knowledge construction as well as enculturation into a community of experts, we developed a novel web-based learning environment in bioinformatics for high-school biology majors in Israel. The learning environment enables the learners to actively participate in a guided inquiry process…
Elgenaidi, Walid; Newe, Thomas; O'Connell, Eoin; Toal, Daniel; Dooly, Gerard
2016-12-21
There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper.
Elgenaidi, Walid; Newe, Thomas; O’Connell, Eoin; Toal, Daniel; Dooly, Gerard
2016-01-01
There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper. PMID:28009834
Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles
Xu, Wenyu; Zhang, Jing; Xu, Yan; Liu, Lu
2018-01-01
The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies. Therefore, security and privacy issues of the message in the tamper proof device (TPD) broadcasted to other vehicles and roadside units (RSUs) have become an important research subject in the field of smart transportation. Many authentication schemes are proposed to tackle the challenges above and most of them are heavy in computation and communication. In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. Because of not using bilinear pairing, our scheme yields a better performance in terms of computation overhead and communication overhead, and is more suitable to be applied in the Internet of Vehicles. PMID:29735941
Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles.
Cui, Jie; Xu, Wenyu; Zhong, Hong; Zhang, Jing; Xu, Yan; Liu, Lu
2018-05-07
The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies. Therefore, security and privacy issues of the message in the tamper proof device (TPD) broadcasted to other vehicles and roadside units (RSUs) have become an important research subject in the field of smart transportation. Many authentication schemes are proposed to tackle the challenges above and most of them are heavy in computation and communication. In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. Because of not using bilinear pairing, our scheme yields a better performance in terms of computation overhead and communication overhead, and is more suitable to be applied in the Internet of Vehicles.
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham- Yahalom logic. PMID:27007951
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham-Yahalom logic.
Enhancing the authenticity of assessments through grounding in first impressions.
Humă, Bogdana
2015-09-01
This article examines first impressions through a discursive and interactional lens. Until now, social psychologists have studied first impressions in laboratory conditions, in isolation from their natural environment, thus overseeing their discursive roles as devices for managing situated interactional concerns. I examine fragments of text and talk in which individuals spontaneously invoke first impressions of other persons as part of assessment activities in settings where the authenticity of speakers' stances might be threatened: (1) in activities with inbuilt evaluative components and (2) in sequential contexts where recipients have been withholding affiliation to speakers' actions. I discuss the relationship between authenticity, as a type of credibility issue related to intersubjective trouble, and the characteristics of first impression assessments, which render them useful for dealing with this specific credibility concern. I identify four features of first impression assessments which make them effective in enhancing authenticity: witness positioning (Potter, 1996, Representing reality: Discourse, rhetoric and social construction, Sage, London), (dis)location in time and space, automaticity, and extreme formulations (Edwards, 2003, Analyzing race talk: Multidisciplinary perspectives on the research interview, Cambridge University Press, New York). © 2014 The British Psychological Society.
Security in Distributed Collaborative Environments: Limitations and Solutions
NASA Astrophysics Data System (ADS)
Saadi, Rachid; Pierson, Jean-Marc; Brunie, Lionel
The main goal of establishing collaboration between heterogeneous environment is to create such as Pervasive context which provide nomadic users with ubiquitous access to digital information and surrounding resources. However, the constraints of mobility and heterogeneity arise a number of crucial issues related to security, especially authentication access control and privacy. First of all, in this chapter we explore the trust paradigm, specially the transitive capability to enable a trust peer to peer collaboration. In this manner, when each organization sets its own security policy to recognize (authenticate) users members of a trusted community and provide them a local access (access control), the trust transitivity between peers will allows users to gain a broad, larger and controlled access inside the pervasive environment. Next, we study the problem of user's privacy. In fact in pervasive and ubiquitous environments, nomadic users gather and exchange certificates or credential which providing them rights to access by transitivity unknown and trusted environments. These signed documents embeds increasing number of attribute that require to be filtered according to such contextual situation. In this chapter, we propose a new morph signature enabling each certificate owner to preserve his privacy by discloses or blinds some sensitive attributes according to faced situation.
Naughton, Bernard; Roberts, Lindsey; Dopson, Sue; Chapman, Stephen; Brindley, David
2016-01-01
Objectives To identify the authentication and detection rate of serialised medicines using medicines authentication technology. Design and intervention 4192 serialised medicines were entered into a hospital dispensary over two separate 8-week stages in 2015. Medicines were authenticated using secure external database cross-checking, triggered by the scanning of a two-dimensional data matrix with a unit specific 12-digit serial code. 4% of medicines included were preprogrammed with a message to identify the product as either expired, pack recalled, product recalled or counterfeit. Setting A site within a large UK National Health Service teaching hospital trust. Participants Accredited checking staff, pharmacists and dispensers in a pharmacy department. Primary outcome measures Authentication and detection rate of counterfeit expired and recalled medicines. Results The operational detection rate of counterfeit, recalled and expired medicines scanned as a combined group was 81.4% (stage 1 (S1)) and 87% (stage 2 (S2)). The technology's technical detection rate (TDR) was 100%; however, not all medicines were scanned and of those that were scanned not all that generated a warning message were quarantined. Owing to an operational authentication rate (OAR) of 66.3% (over both stages), only 31.8% of counterfeit medicines, 58% of recalled drugs and 64% of expired medicines were detected as a proportion of those entered into the study. Response times (RTs) of 152 ms (S1) and 165 ms (S2) were recorded, meeting the falsified medicines directive-mandated 300 ms limit. Conclusions TDRs and RTs were not a limiting factor in this study. The suboptimal OAR poses significant quality and safety issues with this detection approach. Authentication at the checking stage, however, demonstrated higher OARs. There is a need for further qualitative research to establish the reasons for less than absolute authentication and detection rates in the hospital environment to improve this technology in preparation for the incumbent European Union regulative deadline. PMID:27940634
Creating Healing Environments Through the Theory of Caring.
Norman, Vivian; Rossillo, Kim; Skelton, Katie
2016-11-01
We describe the journey of personnel at one hospital to create a healing environment for patients and staff members at all levels through the implementation of Watson's Theory of Human Caring and her Caritas Processes (ie, loving kindness, authentic presence, spirituality, being the environment, believing in miracles). We used experiential teaching and learning to explore the nursing theory with staff members. Positive outcomes include using Caritas Processes care plans in our electronic medical record, greater ease in the understanding and application of Watson's theory, integrating a blessing for nurses during National Nurses Week, inclusion of ministry formation courses to extend the mission of the hospital's founding religious order to current and future employees, and positive patient feedback. As a result of theory application, our nurses are more open to discussing caring, authentic presence and, when appropriate, prayer in their clinical narratives and how it is affecting patients and themselves. Copyright © 2016 AORN, Inc. Published by Elsevier Inc. All rights reserved.
Examining the Content of Preservice Teachers' Reflections of Early Field Experiences
ERIC Educational Resources Information Center
Subramaniam, Karthigeyan
2013-01-01
This paper describes an exploratory study that examined the content of preservice elementary teachers' reflections of their documented early field experiences of science teaching in authentic contexts. The study used an early field experience model that was focused on the objective of profiling an elementary science teacher as the practical…
Hooking tomorrow's geoscientists: Authentic field inquiry as a compelling pedagogy
NASA Astrophysics Data System (ADS)
Wallstrom, Erica
2015-04-01
Engaging high school students in the geosciences without providing them with opportunities to directly explore, understand, and question the natural world is like trying to catch a fish without a hook. How can educators hope to inspire youth to pursue a career in the geosciences when the subject is first introduced to teenagers within the confines of a classroom? Regardless of the content and activities employed by the teacher, the synthetic classroom setting is unable to recreate the organic richness of an authentic outdoor learning environment. A new course offering at Rutland High School in Rutland, Vermont, USA shifts away from the traditional classroom based pedagogy by focusing the learning on exploring the temporal changes occurring in the region's geologic features. Numerous visits to local quarries, outcrops, overlooks, and universities guide the course curriculum. Students use their new understandings and personal observations to complete a culminating independent investigation. This alternate learning model is made possible through collaboration with local universities, businesses, and government agencies. If the geosciences is to remain competitive in the recruitment of exemplary STEM candidates, than the focus of high school earth science programs must be considered. This course offers one alternative to improve engagement and understanding of the geoscience standards. While not the only option, it offers one possibility for hooking students on geosciences.
Spence Laschinger, Heather K; Wong, Carol A; Grau, Ashley L
2012-10-01
Retaining skilled and engaged nurses is critical during a time of shortage, however growing reports of workplace bullying threaten nurses' health and wellbeing, especially the transition of newly graduated nurses entering the profession. High rates of burnout and turnover among new nurses puts additional strain on limited financial resources in healthcare organizations and can compromise the quality of care provided to patients. The purpose of this study is to test a model linking authentic leadership to new graduate nurses' experiences of workplace bullying and burnout, and subsequently, job satisfaction and intentions to leave their jobs. This study employed a cross-sectional survey design with 342 new graduate nurses (defined as less than two years of practice experience) working in acute care hospitals in Ontario, Canada. Participants completed a questionnaire with measures of authentic leadership, workplace bullying, burnout, job satisfaction and turnover intentions. The model was tested using path analysis techniques within structural equation modeling. The model fit indices suggested that the original hypothesized model did not adequately fit the data (χ(2)=33.59, df=5, p=.000, χ(2)/df=6.72, IFI=.937, CFI=.937, RMSEA=.130), thus an additional theoretically justified direct path from authentic leadership to job satisfaction was added, which improved the fit substantially (χ(2)=5.26, df=4, p=.261, χ(2)/df=1.32, IFI=.997, CFI=.997, RMSEA=.030). Authentic leadership had a negative direct effect on workplace bullying, which in turn had a direct positive effect on emotional exhaustion. Authentic leadership also influenced job satisfaction indirectly through bullying and emotional exhaustion. Authentic leadership, workplace bullying and emotional exhaustion all had significant direct effects on job satisfaction, which in turn, was related to lower turnover intentions. The findings from this study demonstrate the fundamental importance of authentic leadership in creating supportive working environments. An authentic leadership style may reduce the probability of a unit culture of workplace bullying developing, contributing to a nursing workforce that is less burned out, more satisfied with their job, and ultimately, less likely to leave their position. Copyright © 2012 Elsevier Ltd. All rights reserved.
Aerial Survey of Ames Research Center - Flight Simulation Complex' Flight simulators create an
NASA Technical Reports Server (NTRS)
1967-01-01
Aerial Survey of Ames Research Center - Flight Simulation Complex' Flight simulators create an authentic aircraft environment by generating the appropriate physical cues that provide the sensations of flight.
The Effects of Collaborative Models in Second Life on French Learning
ERIC Educational Resources Information Center
Hsiao, Indy Y. T.; Yang, Stephen J. H.; Chia-Jui, Chu
2015-01-01
French is the ninth most widely used language globally, but French-learning environments in Taiwan have been insufficient. Language acquisition is easier in a natural setting, and so such a setting should be available to language learners wherever possible. This study aimed to (1) create an authentic environment for learning French in Second Life…
ERIC Educational Resources Information Center
So, Wing Mui Winnie; Kong, Siu Cheung
2010-01-01
This research aims to study how a resource-based learning environment (RBLE) helps primary students develop better understanding of the Earth's movement. One objective of the study is to establish an RBLE by creating authentic contexts, selecting appropriate resources, designing relevant tools and adopting necessary scaffolds. The other objective…
ERIC Educational Resources Information Center
Amigud, Alexander
2013-01-01
Physical separation of students and instructors creates the gap of anonymity and limited control over the remote learning environment. The ability of academic institutions to authenticate students and validate authorship of academic work at various points during a course is necessary for preserving not only perceived credibility but also public…
ERIC Educational Resources Information Center
Zuiker, Steven J.
2012-01-01
As a global cyberinfrastructure, the Internet makes authentic digital problem spaces like educational virtual environments (EVEs) available to a wide range of classrooms, schools and education systems operating under different circumstantial, practical, social and cultural conditions. And yet, if the makers and users of EVEs both have a hand in…
User Control and Task Authenticity for Spatial Learning in 3D Environments
ERIC Educational Resources Information Center
Dalgarno, Barney; Harper, Barry
2004-01-01
This paper describes two empirical studies which investigated the importance for spatial learning of view control and object manipulation within 3D environments. A 3D virtual chemistry laboratory was used as the research instrument. Subjects, who were university undergraduate students (34 in the first study and 80 in the second study), undertook…
Cognitive Diffusion Model: Facilitating EFL Learning in an Authentic Environment
ERIC Educational Resources Information Center
Shadiev, Rustam; Hwang, Wu-Yuin; Huang, Yueh-Min; Liu, Tzu-Yu
2017-01-01
For this study, we designed learning activities in which students applied newly acquired knowledge to solve meaningful daily life problems in their local community--a real, familiar, and relevant environment for students. For example, students learned about signs and rules in class and then applied this new knowledge to create their own rules for…
2007-09-01
Australian/New Zealand English, Canadian French, Cantonese , European French, German, Italian, Japanese, Jordanian Arabic, Mandarin, Portuguese...Environment Within the congruence model, the environment “includes people, other organizations, social and economic forces, and legal constraints” [28
Building Ecological Complexity in the Classroom Using Pea Aphids & Components of Their Community
ERIC Educational Resources Information Center
Richardson, Matthew L.; Hari, Janice
2009-01-01
Teachers face the challenge of introducing ecological concepts in an authentic way that students can apply to their lives and surroundings. Fieldwork helps achieve this goal and can have a range of beneficial impacts on participants, but opportunities to conduct fieldwork can be limited, especially in urban environments. Urban environments are…
ERIC Educational Resources Information Center
Jossberger, Helen; Brand-Gruwel, Saskia; Boshuizen, Henny; van de Wiel, Margje
2010-01-01
Workplace simulations (WPS), authentic learning environments at school, are increasingly used in vocational education. This article provides a theoretical analysis and synthesis of requirements considering learner skills, characteristics of the learning environment and the role of the teacher that influence good functioning in WPS and foster…
Field Trial of the Enhanced Data Authentication System (EDAS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Maikael A.; Baldwin, George T.; Hymel, Ross W.
2016-05-01
The goal of the field trial of EDAS was to demonstrate the utility of secure branching of operator instrumentation for nuclear safeguards, identify any unforeseen implementation and application issues with EDAS, and confirm whether the approach is compatible with operator concerns and constraints.
Automating CapCom: Pragmatic Operations and Technology Research for Human Exploration of Mars
NASA Technical Reports Server (NTRS)
Clancey, William J.
2003-01-01
During the Apollo program, NASA and the scientific community used terrestrial analog sites for understanding planetary features and for training astronauts to be scientists. More recently, computer scientists and human factors specialists have followed geologists and biologists into the field, learning how science is actually done on expeditions in extreme environments. Research stations have been constructed by the Mars Society in the Arctic and American southwest, providing facilities for hundreds of researchers to investigate how small crews might live and work on Mars. Combining these interests-science, operations, and technology-in Mars analog field expeditions provides tremendous synergy and authenticity to speculations about Mars missions. By relating historical analyses of Apollo and field science, engineers are creating experimental prototypes that provide significant new capabilities, such as a computer system that automates some of the functions of Apollo s CapCom. Thus, analog studies have created a community of practice-a new collaboration between scientists and engineers-so that technology begins with real human needs and works incrementally towards the challenges of the human exploration of Mars.
Classification and authentication of unknown water samples using machine learning algorithms.
Kundu, Palash K; Panchariya, P C; Kundu, Madhusree
2011-07-01
This paper proposes the development of water sample classification and authentication, in real life which is based on machine learning algorithms. The proposed techniques used experimental measurements from a pulse voltametry method which is based on an electronic tongue (E-tongue) instrumentation system with silver and platinum electrodes. E-tongue include arrays of solid state ion sensors, transducers even of different types, data collectors and data analysis tools, all oriented to the classification of liquid samples and authentication of unknown liquid samples. The time series signal and the corresponding raw data represent the measurement from a multi-sensor system. The E-tongue system, implemented in a laboratory environment for 6 numbers of different ISI (Bureau of Indian standard) certified water samples (Aquafina, Bisleri, Kingfisher, Oasis, Dolphin, and McDowell) was the data source for developing two types of machine learning algorithms like classification and regression. A water data set consisting of 6 numbers of sample classes containing 4402 numbers of features were considered. A PCA (principal component analysis) based classification and authentication tool was developed in this study as the machine learning component of the E-tongue system. A proposed partial least squares (PLS) based classifier, which was dedicated as well; to authenticate a specific category of water sample evolved out as an integral part of the E-tongue instrumentation system. The developed PCA and PLS based E-tongue system emancipated an overall encouraging authentication percentage accuracy with their excellent performances for the aforesaid categories of water samples. Copyright © 2011 ISA. Published by Elsevier Ltd. All rights reserved.
Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things.
Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido
2016-01-07
This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie-Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes.
Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things
Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido
2016-01-01
This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie–Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes. PMID:26751454
NASA Technical Reports Server (NTRS)
Graff, P. V.; Foxworth, S.; Miller, R.; Runco, S.; Luckey, M. K.; Maudlin, E.
2018-01-01
The public with hands-on activities that infuse content related to NASA assets, missions, and science and reflect authentic scientific practices promotes understanding and generates excitement about NASA science, research, and exploration. These types of activities expose our next generation of explorers to science they may be inspired to pursue as a future STEM career and expose people of all ages to unique, exciting, and authentic aspects of NASA exploration. The activities discussed here (Blue Marble Matches, Lunar Geologist Practice, Let's Discover New Frontiers, Target Asteroid, and Meteorite Bingo) have been developed by Astromaterials Research and Exploration Science (ARES) Science Engagement Specialists in conjunction with ARES Scientists at the NASA Johnson Space Center. Activities are designed to be usable across a variety of educational environments (formal and informal) and reflect authentic scientific content and practices.
Gelbart, Hadas; Ben-Dor, Shifra; Yarden, Anat
2017-01-01
Despite the central place held by bioinformatics in modern life sciences and related areas, it has only recently been integrated to a limited extent into high-school teaching and learning programs. Here we describe the assessment of a learning environment entitled ‘Bioinformatics in the Service of Biotechnology’. Students’ learning outcomes and attitudes toward the bioinformatics learning environment were measured by analyzing their answers to questions embedded within the activities, questionnaires, interviews and observations. Students’ difficulties and knowledge acquisition were characterized based on four categories: the required domain-specific knowledge (declarative, procedural, strategic or situational), the scientific field that each question stems from (biology, bioinformatics or their combination), the associated cognitive-process dimension (remember, understand, apply, analyze, evaluate, create) and the type of question (open-ended or multiple choice). Analysis of students’ cognitive outcomes revealed learning gains in bioinformatics and related scientific fields, as well as appropriation of the bioinformatics approach as part of the students’ scientific ‘toolbox’. For students, questions stemming from the ‘old world’ biology field and requiring declarative or strategic knowledge were harder to deal with. This stands in contrast to their teachers’ prediction. Analysis of students’ affective outcomes revealed positive attitudes toward bioinformatics and the learning environment, as well as their perception of the teacher’s role. Insights from this analysis yielded implications and recommendations for curriculum design, classroom enactment, teacher education and research. For example, we recommend teaching bioinformatics in an integrative and comprehensive manner, through an inquiry process, and linking it to the wider science curriculum. PMID:26801769
Machluf, Yossy; Gelbart, Hadas; Ben-Dor, Shifra; Yarden, Anat
2017-01-01
Despite the central place held by bioinformatics in modern life sciences and related areas, it has only recently been integrated to a limited extent into high-school teaching and learning programs. Here we describe the assessment of a learning environment entitled 'Bioinformatics in the Service of Biotechnology'. Students' learning outcomes and attitudes toward the bioinformatics learning environment were measured by analyzing their answers to questions embedded within the activities, questionnaires, interviews and observations. Students' difficulties and knowledge acquisition were characterized based on four categories: the required domain-specific knowledge (declarative, procedural, strategic or situational), the scientific field that each question stems from (biology, bioinformatics or their combination), the associated cognitive-process dimension (remember, understand, apply, analyze, evaluate, create) and the type of question (open-ended or multiple choice). Analysis of students' cognitive outcomes revealed learning gains in bioinformatics and related scientific fields, as well as appropriation of the bioinformatics approach as part of the students' scientific 'toolbox'. For students, questions stemming from the 'old world' biology field and requiring declarative or strategic knowledge were harder to deal with. This stands in contrast to their teachers' prediction. Analysis of students' affective outcomes revealed positive attitudes toward bioinformatics and the learning environment, as well as their perception of the teacher's role. Insights from this analysis yielded implications and recommendations for curriculum design, classroom enactment, teacher education and research. For example, we recommend teaching bioinformatics in an integrative and comprehensive manner, through an inquiry process, and linking it to the wider science curriculum. © The Author 2016. Published by Oxford University Press.
ERIC Educational Resources Information Center
Cooper, Sandi; Nesmith, Suzanne
2013-01-01
Although the importance of field experience is supported and attended to by teacher education programs across the United States, there have been numerous national reports and research findings stressing the need for major improvements in the preparation of teachers with an emphasis on more authentic experiences. Quality field experiences have the…
ERIC Educational Resources Information Center
Bodzin, Alec; Shive, Louise
2004-01-01
Investigating local watersheds presents middle school students with authentic opportunities to engage in inquiry and address questions about their immediate environment. Investigation activities promote learning in an investigations interdisciplinary context as students explore relationships among chemical, biological, physical, geological, and…
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-08-16
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.
Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange
Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti
2017-01-01
A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328
Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.
Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti
2017-03-31
A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.
Benefits and Limitations of DNA Barcoding and Metabarcoding in Herbal Product Authentication
Raclariu, Ancuta Cristina; Heinrich, Michael; Ichim, Mihael Cristin
2017-01-01
Abstract Introduction Herbal medicines play an important role globally in the health care sector and in industrialised countries they are often considered as an alternative to mono‐substance medicines. Current quality and authentication assessment methods rely mainly on morphology and analytical phytochemistry‐based methods detailed in pharmacopoeias. Herbal products however are often highly processed with numerous ingredients, and even if these analytical methods are accurate for quality control of specific lead or marker compounds, they are of limited suitability for the authentication of biological ingredients. Objective To review the benefits and limitations of DNA barcoding and metabarcoding in complementing current herbal product authentication. Method Recent literature relating to DNA based authentication of medicinal plants, herbal medicines and products are summarised to provide a basic understanding of how DNA barcoding and metabarcoding can be applied to this field. Results Different methods of quality control and authentication have varying resolution and usefulness along the value chain of these products. DNA barcoding can be used for authenticating products based on single herbal ingredients and DNA metabarcoding for assessment of species diversity in processed products, and both methods should be used in combination with appropriate hyphenated chemical methods for quality control. Conclusions DNA barcoding and metabarcoding have potential in the context of quality control of both well and poorly regulated supply systems. Standardisation of protocols for DNA barcoding and DNA sequence‐based identification are necessary before DNA‐based biological methods can be implemented as routine analytical approaches and approved by the competent authorities for use in regulated procedures. © 2017 The Authors. Phytochemical Analysis Published by John Wiley & Sons Ltd. PMID:28906059
Benefits and Limitations of DNA Barcoding and Metabarcoding in Herbal Product Authentication.
Raclariu, Ancuta Cristina; Heinrich, Michael; Ichim, Mihael Cristin; de Boer, Hugo
2018-03-01
Herbal medicines play an important role globally in the health care sector and in industrialised countries they are often considered as an alternative to mono-substance medicines. Current quality and authentication assessment methods rely mainly on morphology and analytical phytochemistry-based methods detailed in pharmacopoeias. Herbal products however are often highly processed with numerous ingredients, and even if these analytical methods are accurate for quality control of specific lead or marker compounds, they are of limited suitability for the authentication of biological ingredients. To review the benefits and limitations of DNA barcoding and metabarcoding in complementing current herbal product authentication. Recent literature relating to DNA based authentication of medicinal plants, herbal medicines and products are summarised to provide a basic understanding of how DNA barcoding and metabarcoding can be applied to this field. Different methods of quality control and authentication have varying resolution and usefulness along the value chain of these products. DNA barcoding can be used for authenticating products based on single herbal ingredients and DNA metabarcoding for assessment of species diversity in processed products, and both methods should be used in combination with appropriate hyphenated chemical methods for quality control. DNA barcoding and metabarcoding have potential in the context of quality control of both well and poorly regulated supply systems. Standardisation of protocols for DNA barcoding and DNA sequence-based identification are necessary before DNA-based biological methods can be implemented as routine analytical approaches and approved by the competent authorities for use in regulated procedures. © 2017 The Authors. Phytochemical Analysis Published by John Wiley & Sons Ltd. © 2017 The Authors. Phytochemical Analysis Published by John Wiley & Sons Ltd.
ERIC Educational Resources Information Center
Scott, Graham; Churchill, Helen; Grassam, Matthew; Scott, Lisa
2012-01-01
There is a need to evaluate the benefits to children of integrated classroom and field-based learning. In this article, we describe a case study that involves children in the production of a field guide: an authentic task which integrates learner autonomy and open enquiry with field work, information and communication technologies (ICT) and…
Authentication of beef versus horse meat using 60 MHz 1H NMR spectroscopy.
Jakes, W; Gerdova, A; Defernez, M; Watson, A D; McCallum, C; Limer, E; Colquhoun, I J; Williamson, D C; Kemsley, E K
2015-05-15
This work reports a candidate screening protocol to distinguish beef from horse meat based upon comparison of triglyceride signatures obtained by 60 MHz (1)H NMR spectroscopy. Using a simple chloroform-based extraction, we obtained classic low-field triglyceride spectra from typically a 10 min acquisition time. Peak integration was sufficient to differentiate samples of fresh beef (76 extractions) and horse (62 extractions) using Naïve Bayes classification. Principal component analysis gave a two-dimensional "authentic" beef region (p=0.001) against which further spectra could be compared. This model was challenged using a subset of 23 freeze-thawed training samples. The outcomes indicated that storing samples by freezing does not adversely affect the analysis. Of a further collection of extractions from previously unseen samples, 90/91 beef spectra were classified as authentic, and 16/16 horse spectra as non-authentic. We conclude that 60 MHz (1)H NMR represents a feasible high-throughput approach for screening raw meat. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.
Guidelines for Network Security in the Learning Environment.
ERIC Educational Resources Information Center
Littman, Marlyn Kemper
1996-01-01
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Authenticity techniques for PACS images and records
NASA Astrophysics Data System (ADS)
Wong, Stephen T. C.; Abundo, Marco; Huang, H. K.
1995-05-01
Along with the digital radiology environment supported by picture archiving and communication systems (PACS) comes a new problem: How to establish trust in multimedia medical data that exist only in the easily altered memory of a computer. Trust is characterized in terms of integrity and privacy of digital data. Two major self-enforcing techniques can be used to assure the authenticity of electronic images and text -- key-based cryptography and digital time stamping. Key-based cryptography associates the content of an image with the originator using one or two distinct keys and prevents alteration of the document by anyone other than the originator. A digital time stamping algorithm generates a characteristic `digital fingerprint' for the original document using a mathematical hash function, and checks that it has not been modified. This paper discusses these cryptographic algorithms and their appropriateness for a PACS environment. It also presents experimental results of cryptographic algorithms on several imaging modalities.
ERIC Educational Resources Information Center
Campbell, Stacey; Torr, Jane; Cologon, Kathy
2014-01-01
Language-rich environments are key to overall quality in early childhood settings, including frequent child-staff interactions around picture books and dramatic play. In a language-rich environment, explicit teaching of literacy concepts, such as phonics, is embedded in authentic and meaningful situations where alphabet letters and sounds are…
ERIC Educational Resources Information Center
Ketelhut, Diane Jass
2007-01-01
This exploratory study investigated data-gathering behaviors exhibited by 100 seventh-grade students as they participated in a scientific inquiry-based curriculum project delivered by a multi-user virtual environment (MUVE). This research examined the relationship between students' self-efficacy on entry into the authentic scientific activity and…
MODeLeR: A Virtual Constructivist Learning Environment and Methodology for Object-Oriented Design
ERIC Educational Resources Information Center
Coffey, John W.; Koonce, Robert
2008-01-01
This article contains a description of the organization and method of use of an active learning environment named MODeLeR, (Multimedia Object Design Learning Resource), a tool designed to facilitate the learning of concepts pertaining to object modeling with the Unified Modeling Language (UML). MODeLeR was created to provide an authentic,…
ERIC Educational Resources Information Center
Wong, Lung-Hsiang; King, Ronnel B.; Chai, Ching Sing; Liu, May
2016-01-01
Second language learners are typically hampered by the lack of a natural environment to use the target language for authentic communication purpose (as a means for "learning by applying"). Thus, we propose MyCLOUD, a mobile-assisted seamless language learning approach that aims to nurture a second language social network that bridges…
An Integrated Field-Based Approach to Building Teachers' Geoscience Skills
ERIC Educational Resources Information Center
Almquist, Heather; Stanley, George; Blank, Lisa; Hendrix, Marc; Rosenblatt, Megan; Hanfling, Seymour; Crews, Jeffrey
2011-01-01
The Paleo Exploration Project was a professional development program for K-12 teachers from rural eastern Montana. The curriculum was designed to incorporate geospatial technologies, including Global Positioning Systems (GPS), Geographic Information Systems (GIS), and total station laser surveying, with authentic field experiences in geology and…
Voices of Educational Administration Internship Mentors
ERIC Educational Resources Information Center
Clayton, Jennifer K.; Thessin, Rebecca A.
2017-01-01
Within the field of leadership preparation, there is agreement by both scholars and practitioners of the need to engage aspiring leaders in authentic field-based learning experiences that tightly align to coursework (Perez, Uline, Johnson, James-Ward, & Basom, 2011). An integrated approach including mentoring is critical to the success of the…
ERIC Educational Resources Information Center
Cothran, Boyd
2010-01-01
Originally conceived by National Park Service (NPS) officials as a way to "revive and maintain the interest of Indians in their own games and industries," the Yosemite Indian Field Days were part rodeo, part pageant, and part craft fair. Through its activities, the Field Days offered white tourists the opportunity to encounter…
Teachers doing science: An authentic geology research experience for teachers
Hemler, D.; Repine, T.
2006-01-01
Fairmont State University (FSU) and the West Virginia Geological and Economic Survey (WVGES) provided a small pilot group of West Virginia science teachers with a professional development session designed to mimic experiences obtained by geology majors during a typical summer field camp. Called GEOTECH, the program served as a research capstone event complimenting the participants' multi-year association with the RockCamp professional development program. GEOTECH was funded through a Improving Teacher Quality Grant administered by West Virginia Higher Education Policy Commission. Over the course of three weeks, eight GEOTEACH participants learned field measurement and field data collection techniques which they then applied to the construction of a surficial geologic map. The program exposed participants to authentic scientific processes by emphasizing the authentic scientific application of content knowledge. As a secondary product, it also enhanced their appreciation of the true nature of science in general and geology particular. After the session, a new appreciation of the effort involved in making a geologic map emerged as tacit knowledge ready to be transferred to their students. The program was assessed using pre/post instruments, cup interviews, journals, artifacts (including geologic maps, field books, and described sections), performance assessments, and constructed response items. Evaluation of the accumulated data revealed an increase in participants demonstrated use of science content knowledge, an enhanced awareness and understanding of the processes and nature of geologic mapping, positive dispositions toward geologic research and a high satisfaction rating for the program. These findings support the efficacy of the experience and document future programmatic enhancements.
Naughton, Bernard; Roberts, Lindsey; Dopson, Sue; Chapman, Stephen; Brindley, David
2016-12-09
To identify the authentication and detection rate of serialised medicines using medicines authentication technology. 4192 serialised medicines were entered into a hospital dispensary over two separate 8-week stages in 2015. Medicines were authenticated using secure external database cross-checking, triggered by the scanning of a two-dimensional data matrix with a unit specific 12-digit serial code. 4% of medicines included were preprogrammed with a message to identify the product as either expired, pack recalled, product recalled or counterfeit. A site within a large UK National Health Service teaching hospital trust. Accredited checking staff, pharmacists and dispensers in a pharmacy department. Authentication and detection rate of counterfeit expired and recalled medicines. The operational detection rate of counterfeit, recalled and expired medicines scanned as a combined group was 81.4% (stage 1 (S1)) and 87% (stage 2 (S2)). The technology's technical detection rate (TDR) was 100%; however, not all medicines were scanned and of those that were scanned not all that generated a warning message were quarantined. Owing to an operational authentication rate (OAR) of 66.3% (over both stages), only 31.8% of counterfeit medicines, 58% of recalled drugs and 64% of expired medicines were detected as a proportion of those entered into the study. Response times (RTs) of 152 ms (S1) and 165 ms (S2) were recorded, meeting the falsified medicines directive-mandated 300 ms limit. TDRs and RTs were not a limiting factor in this study. The suboptimal OAR poses significant quality and safety issues with this detection approach. Authentication at the checking stage, however, demonstrated higher OARs. There is a need for further qualitative research to establish the reasons for less than absolute authentication and detection rates in the hospital environment to improve this technology in preparation for the incumbent European Union regulative deadline. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
NASA Astrophysics Data System (ADS)
Boling, M. E.
1989-09-01
Prototypes were assembled pursuant to recommendations made in report K/DSRD-96, Issues and Approaches for Electronic Document Approval and Transmittal Using Digital Signatures and Text Authentication, and to examine and discover the possibilities for integrating available hardware and software to provide cost effective systems for digital signatures and text authentication. These prototypes show that on a LAN, a multitasking, windowed, mouse/keyboard menu-driven interface can be assembled to provide easy and quick access to bit-mapped images of documents, electronic forms and electronic mail messages with a means to sign, encrypt, deliver, receive or retrieve and authenticate text and signatures. In addition they show that some of this same software may be used in a classified environment using host to terminal transactions to accomplish these same operations. Finally, a prototype was developed demonstrating that binary files may be signed electronically and sent by point to point communication and over ARPANET to remote locations where the authenticity of the code and signature may be verified. Related studies on the subject of electronic signatures and text authentication using public key encryption were done within the Department of Energy. These studies include timing studies of public key encryption software and hardware and testing of experimental user-generated host resident software for public key encryption. This software used commercially available command-line source code. These studies are responsive to an initiative within the Office of the Secretary of Defense (OSD) for the protection of unclassified but sensitive data. It is notable that these related studies are all built around the same commercially available public key encryption products from the private sector and that the software selection was made independently by each study group.
Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan
2016-12-01
Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.
Exposing the Challenges and Coping Strategies of Field-Ecology Graduate Students
NASA Astrophysics Data System (ADS)
Leon-Beck, Mika; Dodick, Jeff
2012-11-01
In this paper, we expose the unique challenges confronting graduate field-ecology students and the coping strategies they adopt to overcome such challenges. To do so, we used a qualitative (in vivo) research method that combines interviews, observations and open questionnaires with a group of five Israeli graduate students. The two major challenges that the students faced were the uncontrolled nature of field research (or complexity), and the nature of field setting, which isolated the students from authoritative guidance. In response to these challenges, the students developed a set of research skills which were expressed in this study by a series of three (metacognitive) strategies which we designated as 'protocol-dominated', 'intermediate' or 'field-dominated'. In order to develop such research skills, our subjects rely upon declarative and procedural knowledge. In contrast to declarative knowledge, learned in coursework, procedural knowledge is learned and activated via the situated experience of implementing research in authentic field environments. We also found that fieldwork complexity imposes itself the minute the students step into the field; potentially, this can negatively impact students' motivation. However, as the students accumulate field experience and acquire the knowledge and skills needed to overcome the field's complexity, their motivation improves. Recognizing the unique learning components connected to field research will help novice students better cope with fieldwork challenges, as well as help their advisers in guiding them. This work also has implications for designing inquiry curricula in field sciences for university and high-school students.
Hiraishi, A; Furuhata, K; Matsumoto, A; Koike, K A; Fukuyama, M; Tabuchi, K
1995-01-01
Strains of pink-pigmented facultative methylotrophs which were isolated previously from various environments and assigned tentatively to the genus Methylobacterium were characterized in comparison with authentic strains of previously known species of this genus. Most of the isolates derived from chlorinated water supplies exhibited resistance to chlorine, whereas 29 to 40% of the isolates from air, natural aquatic environments, and clinical materials were chlorine resistant. None of the tested authentic strains of Methylobacterium species obtained from culture collections exhibited chlorine resistance. Numerical analysis of phenotypic profiles showed that the test organisms tested were separated from each other except M. organophilum and M. rhodesianum. The chlorine-resistant isolates were randomly distributed among all clusters. The 16S ribosomal DNA (rDNA) sequence-based phylogenetic analyses showed that representatives of the isolates together with known Methylobacterium species formed a line of descent distinct from that of members of related genera in the alpha-2 subclass of the Proteobacteria and were divided into three subclusters within the Methylobacterium group. These results demonstrate that there is phenotypic and genetic diversity among chlorine-resistant Methylobacterium strains within the genus. PMID:7793931
Using the Geospatial Web to Deliver and Teach Giscience Education Programs
NASA Astrophysics Data System (ADS)
Veenendaal, B.
2015-05-01
Geographic information science (GIScience) education has undergone enormous changes over the past years. One major factor influencing this change is the role of the geospatial web in GIScience. In addition to the use of the web for enabling and enhancing GIScience education, it is also used as the infrastructure for communicating and collaborating among geospatial data and users. The web becomes both the means and the content for a geospatial education program. However, the web does not replace the traditional face-to-face environment, but rather is a means to enhance it, expand it and enable an authentic and real world learning environment. This paper outlines the use of the web in both the delivery and content of the GIScience program at Curtin University. The teaching of the geospatial web, web and cloud based mapping, and geospatial web services are key components of the program, and the use of the web and online learning are important to deliver this program. Some examples of authentic and real world learning environments are provided including joint learning activities with partner universities.
A Proposal of TLS Implementation for Cross Certification Model
NASA Astrophysics Data System (ADS)
Kaji, Tadashi; Fujishiro, Takahiro; Tezuka, Satoru
Today, TLS is widely used for achieving a secure communication system. And TLS is used PKI for server authentication and/or client authentication. However, its PKI environment, which is called as “multiple trust anchors environment,” causes the problem that the verifier has to maintain huge number of CA certificates in the ubiquitous network because the increase of terminals connected to the network brings the increase of CAs. However, most of terminals in the ubiquitous network will not have enough memory to hold such huge number of CA certificates. Therefore, another PKI environment, “cross certification environment”, is useful for the ubiquitous network. But, because current TLS is designed for the multiple trust anchors model, TLS cannot work efficiently on the cross-certification model. This paper proposes a TLS implementation method to support the cross certification model efficiently. Our proposal reduces the size of exchanged messages between the TLS client and the TLS server during the handshake process. Therefore, our proposal is suitable for implementing TLS in the terminals that do not have enough computing power and memory in ubiquitous network.
Hiraishi, A; Furuhata, K; Matsumoto, A; Koike, K A; Fukuyama, M; Tabuchi, K
1995-06-01
Strains of pink-pigmented facultative methylotrophs which were isolated previously from various environments and assigned tentatively to the genus Methylobacterium were characterized in comparison with authentic strains of previously known species of this genus. Most of the isolates derived from chlorinated water supplies exhibited resistance to chlorine, whereas 29 to 40% of the isolates from air, natural aquatic environments, and clinical materials were chlorine resistant. None of the tested authentic strains of Methylobacterium species obtained from culture collections exhibited chlorine resistance. Numerical analysis of phenotypic profiles showed that the test organisms tested were separated from each other except M. organophilum and M. rhodesianum. The chlorine-resistant isolates were randomly distributed among all clusters. The 16S ribosomal DNA (rDNA) sequence-based phylogenetic analyses showed that representatives of the isolates together with known Methylobacterium species formed a line of descent distinct from that of members of related genera in the alpha-2 subclass of the Proteobacteria and were divided into three subclusters within the Methylobacterium group. These results demonstrate that there is phenotypic and genetic diversity among chlorine-resistant Methylobacterium strains within the genus.
NASA Astrophysics Data System (ADS)
Radencic, S.; Walker, R. M.; Anthony, K. V.
2014-12-01
Graduate and undergraduate students with an interest in science education complete an intensive three-week "Maymester" course at Mississippi State University that includes one week of field experience teaching science in outdoor environments. The focus of the course includes the history and rationales for interdisciplinary outdoor education and informal learning environments while promoting successful pedagogical practices to enhance science instruction. Students gain valuable outdoor education field experience through a week of full emersion at a residential environmental learning center at the Great Smoky Mountains Institute at Tremont, TN (www.gsmit.org) that challenges perceptions of what many believe are "good teaching" practices. Tremont offers multiple overnight educational options for K-12 schools, teacher professional development programs, master naturalists trainings, and citizen science opportunities to the public. Being fully immersed in the outdoors teaching and learning about Earth Science interdisciplinary topics creates a paradigm shift in what is considered to be effective teaching by the graduate and undergraduate participants. Prior to the week at Tremont, students select a Tremont created outdoor educational activity to teach their fellow the graduate and undergraduate students while at Tremont. All activities promote inquiry and hands-on exploration utilizing authentic science process skills in outdoor field research settings that can also be adapted for local school environments. At Tremont the students reside in platform tents located at the center to allow complete immersion in the culture of informal learning unique to outdoor education. In addition to gaining personal experiences leading outdoor science activities, the college students get to actively observe experts in the field of outdoor ecological education model exemplary pedagogical practices of guided inquiry and effective questioning strategies. The impact of the full emersion field experience gained by class participants will be one that they can implement into a variety of science education settings to enrich understanding of the Geosciences to diverse audiences.
ERIC Educational Resources Information Center
Orville, Richard E.
1976-01-01
Correspondence of Benjamin Franklin provides authenticity to a historical account of early work in the field of lightning. Present-day theories concerning the formation and propagation of lightning are expressed and photographic evidence provided. (CP)
An improved anonymous authentication scheme for roaming in ubiquitous networks.
Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho
2018-01-01
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.
An improved anonymous authentication scheme for roaming in ubiquitous networks
Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick
2018-01-01
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-01-01
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890
Interoperable PKI Data Distribution in Computational Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pala, Massimiliano; Cholia, Shreyas; Rea, Scott A.
One of the most successful working examples of virtual organizations, computational grids need authentication mechanisms that inter-operate across domain boundaries. Public Key Infrastructures(PKIs) provide sufficient flexibility to allow resource managers to securely grant access to their systems in such distributed environments. However, as PKIs grow and services are added to enhance both security and usability, users and applications must struggle to discover available resources-particularly when the Certification Authority (CA) is alien to the relying party. This article presents how to overcome these limitations of the current grid authentication model by integrating the PKI Resource Query Protocol (PRQP) into the Gridmore » Security Infrastructure (GSI).« less
Sensor sentinel computing device
Damico, Joseph P.
2016-08-02
Technologies pertaining to authenticating data output by sensors in an industrial environment are described herein. A sensor sentinel computing device receives time-series data from a sensor by way of a wireline connection. The sensor sentinel computing device generates a validation signal that is a function of the time-series signal. The sensor sentinel computing device then transmits the validation signal to a programmable logic controller in the industrial environment.
`INCLUDING' Partnerships to Build Authentic Research Into K-12 Science Education
NASA Astrophysics Data System (ADS)
Turrin, M.; Lev, E.; Newton, R.; Xu, C.
2017-12-01
Opportunities for authentic research experiences have been shown effective for recruiting and retaining students in STEM fields. Meaningful research experiences entail significant time in project design, modeling ethical practice, providing training, instruction, and ongoing guidance. We propose that in order to be sustainable, a new instructional paradigm is needed, one that shifts from being top-weighted in instruction to a distributed weight model. This model relies on partnerships where everyone has buy-in and reaps rewards, establishing broadened networks for support, and adjusting the mentoring model. We use our successful Secondary School Field Research Program as a model for this new paradigm. For over a decade this program has provided authentic geoscience field research for an expanding group of predominantly inner city high school youth from communities underrepresented in the sciences. The program has shifted the balance with returning participants now serving as undergraduate mentors for the high school student `researchers', providing much of the ongoing training, instruction, guidance and feedback needed. But in order to be sustainable and impactful we need to broaden our base. A recent NSF-INCLUDES pilot project has allowed us to expand this model, linking schools, informal education non-profits, other academic institutions, community partners and private funding agencies into geographically organized `clusters'. Starting with a tiered mentoring model with scientists as consultants, teachers as team members, undergraduates as team leaders and high school students as researchers, each cluster will customize its program to reflect the needs and strengths of the team. To be successful each organization must identify how the program fits their organizational goals, the resources they can contribute and what they need back. Widening the partnership base spreads institutional commitments for research scientists, research locations and lab space, meaningful projects and undergraduate mentors. Representatives from the clusters formed working groups to turn best practices in areas such as mentoring, recruitment, assessment and funding into a flexible structure for the clusters. These working groups will provide the outline to expand a successful authentic research program.
Fan, Desheng; Meng, Xiangfeng; Wang, Yurong; Yang, Xiulun; Pan, Xuemei; Peng, Xiang; He, Wenqi; Dong, Guoyan; Chen, Hongyi
2015-04-10
A multiple-image authentication method with a cascaded multilevel architecture in the Fresnel domain is proposed, in which a synthetic encoded complex amplitude is first fabricated, and its real amplitude component is generated by iterative amplitude encoding, random sampling, and space multiplexing for the low-level certification images, while the phase component of the synthetic encoded complex amplitude is constructed by iterative phase information encoding and multiplexing for the high-level certification images. Then the synthetic encoded complex amplitude is iteratively encoded into two phase-type ciphertexts located in two different transform planes. During high-level authentication, when the two phase-type ciphertexts and the high-level decryption key are presented to the system and then the Fresnel transform is carried out, a meaningful image with good quality and a high correlation coefficient with the original certification image can be recovered in the output plane. Similar to the procedure of high-level authentication, in the case of low-level authentication with the aid of a low-level decryption key, no significant or meaningful information is retrieved, but it can result in a remarkable peak output in the nonlinear correlation coefficient of the output image and the corresponding original certification image. Therefore, the method realizes different levels of accessibility to the original certification image for different authority levels with the same cascaded multilevel architecture.
Assessment! The Foundation to This Performance/Field-Based Teacher Preparation Program.
ERIC Educational Resources Information Center
Schmitz, Steve; Veilbig, Cindy; Fitch, Lanny; Alawiye, Osman
This report describes the assessment practices of the undergraduate performance and field-based teacher preparation programs of Central Washington University. The undergraduate program involves 2-year programs for elementary school teacher candidates in 3 school districts. Portfolios are used in this program as a means of authentic assessment and…
More from the Horse's Mouth: What Scientists Say about Science as a Social Practice
ERIC Educational Resources Information Center
Wong, Siu Ling; Hodson, Derek
2010-01-01
This research study sought to identify prominent features of the nature of science (NOS) embedded in authentic scientific inquiry. Fourteen well-established scientists from different parts of the world, working in experimental or theoretical research, in both traditional fields such as astrophysics and rapidly growing research fields such as…
From the Horse's Mouth: What Scientists Say about Scientific Investigation and Scientific Knowledge
ERIC Educational Resources Information Center
Wong, Siu Ling; Hodson, Derek
2009-01-01
This study sought to identify prominent features of the nature of science (NOS) embedded in authentic scientific inquiry. Thirteen well-established scientists from different parts of the world, working in experimental or theoretical research, in both traditional fields such as astrophysics and rapidly growing research fields such as molecular…
Towards an Epistemology of Authenticity in Higher Popular Music Education
ERIC Educational Resources Information Center
Parkinson, Tom; Smith, Gareth Dylan
2015-01-01
Popular music education is becoming firmly established as an academic field, in the UK and internationally. In order to help ensure that scholarship and practice within the field develop in reflexive and ethical ways appropriate to particular traditions, musics, people and institutional contexts, the authors advocate a discursive and iterative…
ERIC Educational Resources Information Center
Willis, Patrick
2014-01-01
When high school students are asked what's the best part of science class, many will say it's the field trips. Students enjoy engaging in authentic, community-based science outside the classroom. To capitalize on this, Patrick Willis created the Bird Box Survey Project for his introductory field biology class. The project takes students…
ERIC Educational Resources Information Center
Basten, Melanie; Meyer-Ahrens, Inga; Fries, Stefan; Wilde, Matthias
2014-01-01
Field trips can provide unique opportunities for authentic, meaningful, and self-determined learning. Capitalizing on these opportunities requires that field trips be structured. A common way to do this is through the use of educational materials such as worksheets. The extent to which the guide's or teacher's autonomy-supportive or…
Assessment-Ready Preservice Teachers
ERIC Educational Resources Information Center
Kelting-Gibson, Lynn; Karsted, Kimberly; Weikert, Angela
2013-01-01
As teacher educators search for ways to prepare future educators for the challenges of assessment implementation, we suggest that authentic practice by preservice teachers in an informal learning environment promotes assessment implementation. The analysis of 28 volunteer assessment students' reflections revealed that practicing assessment…
Clone-preventive technique that features magnetic microfibers and cryptography
NASA Astrophysics Data System (ADS)
Matsumoto, Hiroyuki; Suzuki, Keiichi; Matsumoto, Tsutomu
1998-04-01
We have used the term 'clone' to refer to those things which are produced by methods such as counterfeiting, alteration, duplication or simulation. To satisfy the requirements of secure and low-cost techniques for preventing card fraud, we have recently developed a clone preventive system called 'FibeCrypt (Fiber Cryptosystem)' which utilizes physical characteristics. Each card has a canonical domain (i.e. a distinctive part), similar to fingerprints as the biometric measurement, made up of magnetic micro-fibers scattered randomly inside. We have applied cryptosystems to the system. FibeCrypt examines and authenticates the unique pattern of the canonical domain using pre-stored reference data and a digital signature. In our paper, the schemes and the features of this system are described in detail. The results of our examinations show the accuracy of authentication of the system. We conclude that this authentication technique which utilizes physical characteristics can be very effective for clone prevention in various fields.
RMB identification based on polarization parameters inversion imaging
NASA Astrophysics Data System (ADS)
Liu, Guoyan; Gao, Kun; Liu, Xuefeng; Ni, Guoqiang
2016-10-01
Social order is threatened by counterfeit money. Conventional anti-counterfeit technology is much too old to identify its authenticity or not. The intrinsic difference between genuine notes and counterfeit notes is its paper tissue. In this paper a new technology of detecting RMB is introduced, the polarization parameter indirect microscopic imaging technique. A conventional reflection microscopic system is used as the basic optical system, and inserting into it with polarization-modulation mechanics. The near-field structural characteristics can be delivered by optical wave and material coupling. According to coupling and conduction physics, calculate the changes of optical wave parameters, then get the curves of the intensity of the image. By analyzing near-field polarization parameters in nanoscale, finally calculate indirect polarization parameter imaging of the fiber of the paper tissue in order to identify its authenticity.
NASA Astrophysics Data System (ADS)
Hughes, Roxanne M.; Nzekwe, Brandon; Molyneaux, Kristen J.
2013-10-01
Currently, there are policy debates regarding the efficacy and legality of single sex formal and informal education programs. This issue is particularly poignant in science education due to the historical marginalization of women in these fields. This marginalization has resulted in women being positioned as a stigmatized group within many science, technology, engineering, and mathematics (STEM) related fields. Research points to adolescence as the age where this sense of marginalization begins to develop. As a result, policy responses have utilized various frameworks such as: increased access for women, changing pedagogy to address women's learning styles, changing the language and culture of science to prevent marginalization of stigmatized groups, and finally exploring the role that individual identity plays in the marginalization of women. This study adds to the policy debate as it applies to single sex education by comparing middle school participants' STEM identity formation during two informal science learning environments (an all girls' STEM camp and a co-educational STEM camp). Additionally, this study focuses on the influence of camp activities within two informal science education programs: particularly the provision of role models and authentic STEM research activities, as means to improve STEM identity and make these fields relevant to the lives of middle school students. The results indicate that both camps improved girls' STEM identities. These findings suggest that the single sex environment is not as important to STEM identity as the pedagogy used within the program.
Leder, Drew; Krucoff, Mitchell W
2011-09-01
Modern medicine is often accused by diverse critics of being "too materialistic" and therefore insufficiently holistic and effective. Yet, this critique can be misleading, dependent upon the ambiguous meanings of "materialism." The term can refer to the prevalence of financial concerns in driving medical practice. Alternatively, it can refer to "mechanistic materialism," the patient viewed as a body-machine. In each case, this article shows that this represents not authentic "materialism" at play, but a focus upon high-level abstractions. "Bottom-line" financial or diagnostic numbers can distract practitioners from the embodied needs of sick patients. In this sense, medical practice is not materialist enough. Through a series of clinical examples, this article explores how an authentic materialism would look in current and future practice. The article examines the use of prayer/comfort shawls at the bedside; hospitals and nursing homes redesigned as enriched healing environments; and a paradigmatic medical device--the implantable cardioverter defibrillator--as it might be presented to patients, in contrast to current practice.
NASA Astrophysics Data System (ADS)
Salvemini, Filomena; Grazzi, Francesco; Kardjilov, Nikolay; Wieder, Frank; Manke, Ingo; Edge, David; Williams, Alan; Zoppi, Marco
2017-05-01
Non-invasive experimental methods play an important role in the field of cultural heritage. Benefiting from the technical progress in recent years, neutron imaging has been demonstrated to complement effectively studies based on surface analysis, allowing for a non-invasive characterization of the whole three-dimensional volume. This study focuses on a kris and a kanjar, two weapons from ancient Asia, to show the potential of the combined use of X-ray and neutron imaging techniques for the characterisation of the manufacturing methods and the authentication of objects of cultural and historical interest.
Simulation for Authentic Learning in Informal Education
Dupuis, Jason; Ludwig-Palit, DeDee
2016-01-01
In 2011, the Museum of Science and Industry in Chicago, Illinois embarked on the creation of a program that allows middle and high school students to explore community health issues using human patient simulation. MedLab was created to engage students in an authentic exploration of medical science, biology, and human anatomy, with a particular focus on how these fields apply to learners’ lives. The program content is made relevant through an emphasis on personal health, community health, and medical science career pathways. This article explores the development, implementation, use of technology, and outcomes of MedLab. PMID:27980372
Simulation for Authentic Learning in Informal Education.
Dupuis, Jason; Ludwig-Palit, DeDee
2016-01-01
In 2011, the Museum of Science and Industry in Chicago, Illinois embarked on the creation of a program that allows middle and high school students to explore community health issues using human patient simulation. MedLab was created to engage students in an authentic exploration of medical science, biology, and human anatomy, with a particular focus on how these fields apply to learners' lives. The program content is made relevant through an emphasis on personal health, community health, and medical science career pathways. This article explores the development, implementation, use of technology, and outcomes of MedLab.
Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai
2017-11-21
Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.
Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai
2017-01-01
Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions. PMID:29160861
System and method for authentication
Duerksen, Gary L.; Miller, Seth A.
2015-12-29
Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.
Kahl, Johannes; Busscher, Nicolaas; Mergardt, Gaby; Mäder, Paul; Torp, Torfinn; Ploeger, Angelika
2015-01-01
There is a need for authentication tools in order to verify the existing certification system. Recently, markers for analytical authentication of organic products were evaluated. Herein, crystallization with additives was described as an interesting fingerprint approach which needs further evidence, based on a standardized method and well-documented sample origin. The fingerprint of wheat cultivars from a controlled field trial is generated from structure analysis variables of crystal patterns. Method performance was tested on factors such as crystallization chamber, day of experiment and region of interest of the patterns. Two different organic treatments and two different treatments of the non-organic regime can be grouped together in each of three consecutive seasons. When the k-nearest-neighbor classification method was applied, approximately 84% of Runal samples and 95% of Titlis samples were classified correctly into organic and non-organic origin using cross-validation. Crystallization with additive offers an interesting complementary fingerprint method for organic wheat samples. When the method is applied to winter wheat from the DOK trial, organic and non-organic treated samples can be differentiated significantly based on pattern recognition. Therefore crystallization with additives seems to be a promising tool in organic wheat authentication. © 2014 Society of Chemical Industry.
NASA Astrophysics Data System (ADS)
Liljeström, Anu; Enkenberg, Jorma; Pöllänen, Sinikka
2013-03-01
This design experiment aimed to answer the question of how to mediate the practices of authentic science inquiries in primary education. An instructional approach based on activity theory was designed and carried out with multi-age students in a small village school. An open-ended learning task was offered to the older students. Their task was to design and implement instruction about the Ice Age to their younger fellows. The objective was collaborative learning among students, the teacher, and outside domain experts. Mobile phones and GPS technologies were applied as the main technological mediators in the learning process. Technology provided an opportunity to expand the learning environment outside the classroom, including the natural environment. Empirically, the goal was to answer the following questions: What kind of learning project emerged? How did the students' knowledge develop? What kinds of science learning processes, activities, and practices were represented? Multiple and parallel data were collected to achieve this aim. The data analysis revealed that the learning project both challenged the students to develop explanations for the phenomena and generated high quality conceptual and physical models in question. During the learning project, the roles of the community members were shaped, mixed, and integrated. The teacher also repeatedly evaluated and adjusted her behavior. The confidence of the learners in their abilities raised the quality of their learning outcomes. The findings showed that this instructional approach can not only mediate the kind of authentic practices that scientists apply but also make learning more holistic than it has been. Thus, it can be concluded that nature of the task, the tool-integrated collaborative inquiries in the natural environment, and the multiage setting can make learning whole.
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.
2012-01-01
As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are necessary. AIU achieves fine-grain data access and user control, reducing the security risk significantly, simplifying the complexity of various security operations, and providing the high information assurance across different network domains.
Evaluation of the Persistent Issues in History Laboratory for Virtual Field Experience (PIH-LVFE)
ERIC Educational Resources Information Center
Brush, Thomas; Saye, John; Kale, Ugur; Hur, Jung Won; Kohlmeier, Jada; Yerasimou, Theano; Guo, Lijiang; Symonette, Simone
2009-01-01
The Persistent Issues in History Laboratory for Virtual Field Experience (PIH-LVFE) combines a database of video cases of authentic classroom practices with multiple resources and tools to enable pre-service social studies teachers to virtually observe teachers implementing problem-based learning activities. In this paper, we present the results…
Authentic Teachers: Student Criteria Perceiving Authenticity of Teachers
ERIC Educational Resources Information Center
De Bruyckere, Pedro; Kirschner, Paul A.
2016-01-01
Authenticity is seen by many as a key for good learning and education. There is talk of authentic instruction, authentic learning, authentic problems, authentic assessment, authentic tools and authentic teachers. The problem is that while authenticity is an often-used adjective describing almost all aspects of teaching and learning, the concept…
Adventure Learning: Transformative Hybrid Online Education
ERIC Educational Resources Information Center
Doering, Aaron
2006-01-01
Adventure learning (AL) is a hybrid distance education approach that provides students with opportunities to explore real-world issues through authentic learning experiences within collaborative learning environments. This article defines this online distance education approach, outlines an AL framework, and showcases an AL archetype. In AL…
The Technology Information Environment with Industry{trademark} system description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Detry, R.; Machin, G.
The Technology Information Environment with Industry (TIE-In{trademark}) provides users with controlled access to distributed laboratory resources that are packaged in intelligent user interfaces. These interfaces help users access resources without requiring the user to have technical or computer expertise. TIE-In utilizes existing, proven technologies such as the Kerberos authentication system, X-Windows, and UNIX sockets. A Front End System (FES) authenticates users and allows them to register for resources and subsequently access them. The FES also stores status and accounting information, and provides an automated method for the resource owners to recover costs from users. The resources available through TIE-In aremore » typically laboratory-developed applications that are used to help design, analyze, and test components in the nation`s nuclear stockpile. Many of these applications can also be used by US companies for non-weapons-related work. TIE-In allows these industry partners to obtain laboratory-developed technical solutions without requiring them to duplicate the technical resources (people, hardware, and software) at Sandia.« less
Development of a HIPAA-compliant environment for translational research data and analytics.
Bradford, Wayne; Hurdle, John F; LaSalle, Bernie; Facelli, Julio C
2014-01-01
High-performance computing centers (HPC) traditionally have far less restrictive privacy management policies than those encountered in healthcare. We show how an HPC can be re-engineered to accommodate clinical data while retaining its utility in computationally intensive tasks such as data mining, machine learning, and statistics. We also discuss deploying protected virtual machines. A critical planning step was to engage the university's information security operations and the information security and privacy office. Access to the environment requires a double authentication mechanism. The first level of authentication requires access to the university's virtual private network and the second requires that the users be listed in the HPC network information service directory. The physical hardware resides in a data center with controlled room access. All employees of the HPC and its users take the university's local Health Insurance Portability and Accountability Act training series. In the first 3 years, researcher count has increased from 6 to 58.
Active Time Domain Reflectometry for Tamper Indication in Unattended Safeguards Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheen, David M.; Smith, Leon E.; Tedeschi, Jonathan R.
2015-07-14
The International Atomic Energy Agency (IAEA) continues to expand its use of unattended measurement systems. An increasing number of systems and an expanding family of instruments create challenges in terms of deployment efficiency and the implementation of data authentication measures. In collaboration with the IAEA, tamper-indicating measures to address data-transmission authentication challenges with unattended safeguards systems are under investigation. Pacific Northwest National Laboratory is studying the viability of active time-domain reflectometry (TDR) along two parallel but interconnected paths: (1) swept-frequency TDR as the highly flexible, laboratory gold standard to which field-deployable options can be compared, and (2) a low-cost commerciallymore » available spread-spectrum TDR technology as one option for field implementation. This paper describes the TDR methods under investigation and the associated benchtop test-bed, tampering scenarios of interest,, and viability measurement results to date (e.g., comparison of relative sensitivity to tamper scenarios).« less
Universal Design and Outdoor Learning
ERIC Educational Resources Information Center
Harte, Helene Arbouet
2013-01-01
Engagement in the natural environment provides authentic and concrete opportunities for children to enhance development in all domains (Bailie, 2010). As children play and explore in nature they build gross motor development moving through the outdoors. Learning outside and in nature not only allows for learning across subject areas and…
Extending the Pedagogy of Mobility
ERIC Educational Resources Information Center
Hedberg, John G.
2014-01-01
Direct student experience of the real organism, object, place or environment is recognised by teachers as having powerful potential for high-quality learning. Mobile technologies offer a way for students to capture their authentic learning experiences, but rendering this rich experience into explicit and highly situated learning contexts for…
Competence Development of Entrepreneurs in Innovative Horticulture
ERIC Educational Resources Information Center
Mulder, Martin; Lans, Thomas; Verstegen, Jos; Biemans, Harm; Meijer, Ypie
2007-01-01
Purpose: The purpose of this paper is to study the learning of entrepreneurs in authentic learning environments. The research questions are: How do entrepreneurs assess their compentencies, and how do employees and external consultants assess the compentencies of these entrepreneurs? What are the competence strengths and weaknesses of…
Supporting Geographic Investigations and Visualizations and Engaging Students as Citizen Scientists
NASA Astrophysics Data System (ADS)
Takaki, E.
2011-12-01
Historically, citizen science projects have had to provide their own technical infrastructure to handle the data they collect. National Geographic Education Programs (funded by the National Science Foundation) has developed a free (or low cost for large projects) online data visualization and analysis tool called FieldScope, which is available to any person or group doing studies that involve geographically dispersed data. FieldScope can house and scaffold the analysis of authentic environmental data as well as augment it with other helpful layers such as precipitation, population density, water quality parameters, etc. During the session, participants will come to understand the basics of GIS, the history of FieldScope, and its unique educational features. We will spend the majority of the time exploring specific tools for analyzing authentic data, the different types of layers that make FieldScope powerful in its educational and research capacities, and examining various questions that can be addressed in a classroom or citizen science setting. We'll conclude the hands-on portion by sharing what was learned and how they were able to make meaning from the myriad of ways that data can be displayed.
Patient privacy protection using anonymous access control techniques.
Weerasinghe, D; Rajarajan, M; Elmufti, K; Rakocevic, V
2008-01-01
The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.
Authentication of beef versus horse meat using 60 MHz 1H NMR spectroscopy
Jakes, W.; Gerdova, A.; Defernez, M.; Watson, A.D.; McCallum, C.; Limer, E.; Colquhoun, I.J.; Williamson, D.C.; Kemsley, E.K.
2015-01-01
This work reports a candidate screening protocol to distinguish beef from horse meat based upon comparison of triglyceride signatures obtained by 60 MHz 1H NMR spectroscopy. Using a simple chloroform-based extraction, we obtained classic low-field triglyceride spectra from typically a 10 min acquisition time. Peak integration was sufficient to differentiate samples of fresh beef (76 extractions) and horse (62 extractions) using Naïve Bayes classification. Principal component analysis gave a two-dimensional “authentic” beef region (p = 0.001) against which further spectra could be compared. This model was challenged using a subset of 23 freeze–thawed training samples. The outcomes indicated that storing samples by freezing does not adversely affect the analysis. Of a further collection of extractions from previously unseen samples, 90/91 beef spectra were classified as authentic, and 16/16 horse spectra as non-authentic. We conclude that 60 MHz 1H NMR represents a feasible high-throughput approach for screening raw meat. PMID:25577043
Wang, Hongtao; Li, Guisheng; Kwon, Woo-Saeng; Yang, Deok-Chun
2016-06-04
Panax ginseng is one of the most valuable medicinal plants in the Orient. The low level of genetic variation has limited the application of molecular markers for cultivar authentication and marker-assisted selection in cultivated ginseng. To exploit DNA polymorphism within ginseng cultivars, ginseng expressed sequence tags (ESTs) were searched against the potential intron polymorphism (PIP) database to predict the positions of introns. Intron-flanking primers were then designed in conserved exon regions and used to amplify across the more variable introns. Sequencing results showed that single nucleotide polymorphisms (SNPs), as well as indels, were detected in four EST-derived introns, and SNP markers specific to "Gopoong" and "K-1" were first reported in this study. Based on cultivar-specific SNP sites, allele-specific polymerase chain reaction (PCR) was conducted and proved to be effective for the authentication of ginseng cultivars. Additionally, the combination of a simple NaOH-Tris DNA isolation method and real-time allele-specific PCR assay enabled the high throughput selection of cultivars from ginseng fields. The established real-time allele-specific PCR assay should be applied to molecular authentication and marker assisted selection of P. ginseng cultivars, and the EST intron-targeting strategy will provide a potential approach for marker development in species without whole genomic DNA sequence information.
NASA Astrophysics Data System (ADS)
Bank, C.; Rotzien, J.
2007-12-01
More and more students and faculty engage in collaborative research. Field geophysics provides a fascinating venue, as it always contributes to interpersonal relations, usually involves off-campus work, and often allows us to meet new people and explore a different culture. Tackling an authentic research problem keeps a faculty member excited about her/his discipline, while allowing a student to engage in the process of science, follow a researcher's thoughts and contribute to a real project. The exchange of ideas and the generation of new knowledge is rewarding to the student as it facilitates her/his academic growth. Despite the obvious advantages of including students in field-based research, few students are allowed such an opportunity because of the institutional commitment in time and money that is necessary for success. Other challenges in field-based geophysical research include steep learning curves related to the use of equipment, unknown outcomes (data that is often difficult to interpret), and a true commitment to the project on the student's part. The faculty member on the other hand faces additional challenges because of the responsibility for students in the field, scheduling constraints, limited funding, and students' diverse academic goals. This presentation will be given by a faculty member and a student who have engaged in various authentic research projects. Projects ranged from afternoon lab exercises on campus (eg, microgravity survey over a tunnel on campus), course projects connected to field trips (eg, magnetic study and subsequent potential field analysis), summer research projects (eg, georadar survey of Deboullie Lake rock glacier), to year-long undergraduate thesis projects (eg, potential field studies at igneous centres of the Navajo Volcanic Field). We will present highlights of these projects, examine their pedagogical merits, and discuss the advantages and rewards we earned as well as the challenges we faced. Despite all challenges, we find that the outcomes, the sense of accomplishment, the rich interpersonal exchange, and the intellectual as well as personal growth of students is well worth the effort that goes into planning and executing such projects. Our aim is to promote collaborative and authentic research, and to find out about creative ways to bring such an experience to a wider range of interested students.
Moving Apart and Coming Together: Discourse, Engagement, and Deep Learning
ERIC Educational Resources Information Center
Gomoll, Andrea S.; Hmelo-Silver, Cindy E.; Tolar, Erin; Šabanovic, Selma; Francisco, Matthew
2017-01-01
An important part of "doing" science is engaging in collaborative science practices. To better understand how to support these practices, we need to consider how students collaboratively construct and represent shared understanding in complex, problem-oriented, and authentic learning environments. This research presents a case study…
Learning to Write and Loving It! Preschool-Kindergarten
ERIC Educational Resources Information Center
Trehearne, Miriam P.
2011-01-01
"Learning to Write and Loving It!" equips teachers of young children with practical strategies, assessment tools, and motivating writing activities that are based on current research and proven practice and are easily applicable to all kinds of learning environments. Included are many authentic writing samples and photos to illustrate effective,…
ERIC Educational Resources Information Center
Conlin, Luke D.
2012-01-01
Collaborative inquiry learning environments, such as "The Tutorials in Physics Sensemaking," are designed to provide students with opportunities to partake in the authentic disciplinary practices of argumentation and sensemaking. Through these practices, groups of students in tutorial can build shared conceptual understandings of the…
ERIC Educational Resources Information Center
Forrest, Lorrie; Hechter, Richard
2017-01-01
This article describes an activity designed to foster an authentic way for students to learn about the biodiversity in their community. The activity is a half year scaffolding sequence to explore the living environment right outside the classroom. In using the outdoors just outside the window as a classroom, an inquiry based activity accomplished…
Improving Students' English Speaking Proficiency in Saudi Public Schools
ERIC Educational Resources Information Center
Alharbi, Heba Awadh
2015-01-01
In English as a foreign language (EFL) contexts, the absence of authentic language learning situations outside the classroom presents a significant challenge to improving students' English communication skills. Specific obstacles in the learning environment can also result in students' limited use of English inside the classroom. These issues…
Individual Innovation Competence: A Systematic Review and Future Research Agenda
ERIC Educational Resources Information Center
Hero, Laura-Maija; Lindfors, Eila; Taatila, Vesa
2017-01-01
Learning for innovation is a central element in European policymaking in developing higher education. Students often learn in project settings together with work organizations developing new solutions, products and services. These authentic creative, social and collaborative settings offer an attractive learning environment. The aim of this study…
A Framework for Designing Scaffolds that Improve Motivation and Cognition
ERIC Educational Resources Information Center
Belland, Brian R.; Kim, ChanMin; Hannafin, Michael J.
2013-01-01
A problematic, yet common, assumption among educational researchers is that when teachers provide authentic, problem-based experiences, students will automatically be engaged. Evidence indicates that this is often not the case. In this article, we discuss (a) problems with ignoring motivation in the design of learning environments, (b)…
ERIC Educational Resources Information Center
Kedian, Jeremy; Giles, David; Morrison, Michele; Fletcher, Murray
2016-01-01
Rapidly changing educational contexts demand deft leadership responses. In this fluid environment, it is imperative that leadership learning models sound educational praxis. Such praxis necessitates the inclusion of participant voices within relational and dialogic processes that enable authentic, creative and collaborative thinking. This paper…
Audience, Elegance, and Learning via the Internet.
ERIC Educational Resources Information Center
Lafer, Stephen
1997-01-01
Discusses the need for educational environments that allow for authentic learning. Shows how the Internet enables practice in which students are able to manipulate concepts for the sake of getting things done and receiving feedback regarding how well the application of an understanding worked. Provides examples of three learning activities on the…
MYSEA: The Monterey Security Architecture
2009-01-01
Security and Protection, Organization and Design General Terms: Design; Security Keywords: access controls, authentication, information flow controls...Applicable environments include: mil- itary coalitions, agencies and organizations responding to security emergencies, and mandated sharing in business ...network architecture affords users the abil- ity to securely access information across networks at dif- ferent classifications using standardized
Assessing Creative Thinking in Design-Based Learning
ERIC Educational Resources Information Center
Doppelt, Yaron
2009-01-01
Infusing creative thinking competence through the design process of authentic projects requires not only changing the teaching methods and learning environment, but also adopting new assessment methods, such as portfolio assessment. The participants in this study were 128 high school pupils who have studied MECHATRONICS from 10th to 12th grades…
Engaging Professional Learning in Online Environments
ERIC Educational Resources Information Center
Bell, Amani; Morris, Gayle
2009-01-01
Much of what is regarded as effective professional learning is that which is situated, incorporates a social dimension and enables practitioners to converge in and around authentic practice. This article describes an inter-university online learning resource for tutors which is underpinned by a practice based approach to professional learning. The…
Building and Managing Makerspaces in Extension
ERIC Educational Resources Information Center
Francis, Dave; Hill, Paul; Graham, Dallini; Swadley, Emy; Esplin, Kaleb
2017-01-01
As traditional face-to-face Extension office interactions are supplanted by online education options, the makerspace offers a venue for authentic engagement between Extension and the community. In makerspaces, learners make and learn from one another in a cooperative learning environment. Through involvement in the maker movement, Extension has an…
Corporate-Academic Partnerships: Creating a Win-Win in the Classroom
ERIC Educational Resources Information Center
Deeter-Schmelz, Dawn Reneé
2015-01-01
For instructors seeking ways to provide sales students with experiential learning projects designed to develop and enhance skills in an authentic environment, corporate-academic partnerships offer a viable option. The author describes a unique and innovative corporate-academic integrated project, including course content, role plays, and corporate…
Tool-Mediated Authentic Learning in an Educational Technology Course: A Designed-Based Innovation
ERIC Educational Resources Information Center
Amory, Alan
2014-01-01
This design-based research project is concerned with the design, development and deployment of interactive technological learning environments to support contemporary education. The use of technologies in education often replicates instructivist positions and practices. However, the use of Cultural Historical Activity Theory (C), authentic…
Teaching "With" and "About" Nature of Science, and Science Teacher Knowledge Domains
ERIC Educational Resources Information Center
Abd-El-Khalick, Fouad
2013-01-01
The ubiquitous goals of helping precollege students develop informed conceptions of nature of science (NOS) and experience inquiry learning environments that progressively approximate authentic scientific practice have been long-standing and central aims of science education reforms around the globe. However, the realization of these goals…
Using Computer-Assisted Instruction to Enhance Achievement of English Language Learners
ERIC Educational Resources Information Center
Keengwe, Jared; Hussein, Farhan
2014-01-01
Computer-assisted instruction (CAI) in English-Language environments offer practice time, motivates students, enhance student learning, increase authentic materials that students can study, and has the potential to encourage teamwork between students. The findings from this particular study suggested that students who used computer assisted…
Validation diagnostics for defective thermocouple circuits
NASA Astrophysics Data System (ADS)
Reed, R. P.
Thermocouples, properly used under favorable conditions, can measure temperature with an accepted tolerance. However, when improperly applied or exposed to hostile mechanical, chemical, thermal, or radiation environments, they often fail without the error being evident in the temperature record. Conversely, features that appear to be unreasonable in temperature records can be authentic. When hidden failure occurs during measurement, deliberate recording of supplementary information is necessary to distinguish valid from faulty data. Loop resistance change, circuit isolation, isolated noise potential, and other measures can reveal symptoms of developing defects. Monitored continually along with temperature, they can reveal the occurrence, location, and natures of damage incurred during measurement. Special multiterminal branched thermocouple circuits and combinatorial multiplex switching allow detection of dc measurement noise and decalibration. Symptoms of insidious failure, often consequential, are illustrated by examples from field experience in measuring temperature of a propagating retorting front in underground coal gasification.
Security of social network credentials for accessing course portal: Users' experience
NASA Astrophysics Data System (ADS)
Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee
2015-12-01
Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.
Research Aircraft - Controlling Instruments from the Ground in a Secure and Authenticated Fashion
NASA Astrophysics Data System (ADS)
Baltzer, T.; Martin, C.; Fawaz, S.; Webster, C.
2012-12-01
At NCAR's Research Aviation Facility (RAF) we're finding a number of factors motivating the desire to be able to control instruments fielded on the aircraft we operate for the NSF. Investigators are increasingly interested in fielding greater numbers of research instruments for projects, instruments are becoming increasingly complicated, and adjustment of instrument behavior to adapt to changing conditions around the aircraft and to meet project goals are just a few of these factors. Usually there are not enough seats on the aircraft to accommodate all the instrument PIs and crew members who do occupy the seats are being asked to monitor and control increasing numbers of instruments about which they have limited knowledge. We use Satellite Communications (SatCom) to allow researchers to communicate with colleagues/crew on the aircraft and so that some of the real-time data can be sent to the ground for helping to optimize the research. Historically, challenges of authentication, security and the disruptive SatCom system have motivated us to avoid providing for remote instrument control. Now we have now reached an era where remote instrument control is a necessity. This poster will discuss the approach we are implementing to provide this capability for our instrument investigators. Particular attention is paid to how we assure authentication and security so that only the instrument investigators are capable of communicating with their instruments.;
Secure Control Systems for the Energy Sector
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Rhett; Campbell, Jack; Hadley, Mark
2012-03-31
Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use thismore » technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.« less
A Framework for Designing Scaffolds That Improve Motivation and Cognition
Belland, Brian R.; Kim, ChanMin; Hannafin, Michael J.
2013-01-01
A problematic, yet common, assumption among educational researchers is that when teachers provide authentic, problem-based experiences, students will automatically be engaged. Evidence indicates that this is often not the case. In this article, we discuss (a) problems with ignoring motivation in the design of learning environments, (b) problem-based learning and scaffolding as one way to help, (c) how scaffolding has strayed from what was originally equal parts motivational and cognitive support, and (d) a conceptual framework for the design of scaffolds that can enhance motivation as well as cognitive outcomes. We propose guidelines for the design of computer-based scaffolds to promote motivation and engagement while students are solving authentic problems. Remaining questions and suggestions for future research are then discussed. PMID:24273351
On securing wireless sensor network--novel authentication scheme against DOS attacks.
Raja, K Nirmal; Beno, M Marsaline
2014-10-01
Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN's has many constrictions, including low computation capability, less memory, limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.
Cuadros-Rodríguez, Luis; Ruiz-Samblás, Cristina; Valverde-Som, Lucia; Pérez-Castaño, Estefanía; González-Casado, Antonio
2016-02-25
Fingerprinting methods describe a variety of analytical methods that provide analytical signals related to the composition of foodstuffs in a non-selective way such as by collecting a spectrum or a chromatogram. Mathematical processing of the information in such fingerprints may allow the characterisation and/or authentication of foodstuffs. In this context, the particular meaning of 'fingerprinting', in conjunction with 'profiling', is different from the original meanings used in metabolomics. This fact has produced some confusion with the use of these terms in analytical papers. Researchers coming from the metabolomic field could use 'profiling' or 'fingerprinting' on a different way to researchers who are devoted to food science. The arrival of an eclectic discipline, named 'foodomics' has not been enough to allay this terminological problem, since the authors keep on using the terms with both meanings. Thus, a first goal of this tutorial is to clarify the difference between both terms. In addition, the chemical approaches for food authentication, i.e., chemical markers, component profiling and instrumental fingerprinting, have been described. A new term, designated as 'food identitation', has been introduced in order to complete the life cycle of the chemical-based food authentication process. Chromatographic fingerprinting has been explained in detail and some strategies which could be applied has been clarified and discussed. Particularly, the strategies for chromatographic signals acquisition and chromatographic data handling are unified in a single framework. Finally, an overview about the applications of chromatographic (GC and LC) fingerprints in food authentication using different chemometric techniques has been included. Copyright © 2016 Elsevier B.V. All rights reserved.
Authenticated, private, and secured smart cards (APS-SC)
NASA Astrophysics Data System (ADS)
Szu, Harold; Mehmood, Amir
2006-04-01
From historical perspective, the recent advancements in better antenna designs, low power circuitry integrations and inexpensive fabrication materials have made possible a miniature counter-measure against Radar, a clutter behaving like a fake target return called Digital Reflection Frequency Modulation (DRFM). Such a military counter-measure have found its way in the commerce as a near field communication known as Radio Frequency Identification (RFID), a passive or active item tag T attached to every readable-writable Smart Card (SC): Passports ID, medical patient ID, biometric ID, driver licenses, book ID, library ID, etc. These avalanche phenomena may be due to the 3 rd Gen phones seeking much more versatile & inexpensive interfaces, than the line-of-sight bar-code optical scan. Despite of the popularity of RFID, the lacking of Authenticity, Privacy and Security (APS) protection restricted somewhat the wide spread commercial, financial, medical, legal, and militarily applications. Conventional APS approach can obfuscate a private passkey K of SC with the tag number T or the reader number R, or both, i.e. only T*K or R*K or both will appear on them, where * denotes an invertible operation, e.g. EXOR, but not limited to it. Then, only the authentic owner, knowing all, can inverse the operation, e.g. EXOR*EXOR= I to find K. However, such an encryption could be easily compromised by a hacker seeking exhaustively by comparison based on those frequently used words. Nevertheless, knowing biological wetware lesson for power of pairs sensors and Radar hardware counter-measure history, we can counter the counter-measure DRFM, instead using one RFID tag per SD, we follow the Nature adopting two ears/tags, e.g. each one holding portions of the ID or simply two different ID's readable only by different modes of the interrogating reader, followed by brain central processor in terms of nonlinear invertible shufflers mixing two ID bits. We prefer to adopt such a hardware-software combined hybrid approach because of a too limited phase space of a single RFID for any meaningful encryption approach. Furthermore, a useful biological lesson is not to put all eggs in one basket, "if you don't get it all, you can't hack it". According to the Radar physics, we can choose the amplitude, the frequency, the phase, the polarization, and two radiation energy supply principles, the capacitance coupling (~6m) and the inductance coupling (<1m), to code the pair of tags differently. A casual skimmer equipped with single-mode reader can not read all. We consider near-field and mid-field applications each in this paper. The near-field is at check-out counters or the convey-belt inventory involving sensitive and invariant data. The mid-field search & rescue involves not only item/person identification, but also the geo-location. If more RF power becomes cheaper & portable for longer propagation distance in the near future, then a triangulation with pair of secured readers, located at known geo-locations, could interrogate and identify items/persons and their locations in a GPS-blind environment.
Authentic Research: An Interview on the Way to Ponderosa
ERIC Educational Resources Information Center
Swisher, Karen
1986-01-01
The educational research community has stressed the importance of minority researchers studying the groups of which they are members. The field work described here, investigating attitudes of parents and teachers in a reservation community toward multicultural education, supports this view. (LHW)
ERIC Educational Resources Information Center
Caballero, Ana Maria; Dashoush, Nermeen
2017-01-01
The Arnold Arboretum Field Study Program provides outdoor experiences for children in order to develop authentic firsthand knowledge of life sciences. The Arboretum welcomes approximately 3,200 children (preK-5) from greater Boston annually. During the program called Explorations with Head Start participants, the children visit three times…
ERIC Educational Resources Information Center
Abraham, Lee B.
2008-01-01
Language learners have unprecedented opportunities for developing second language literacy skills and intercultural understanding by reading authentic texts on the Internet and in multimedia computer-assisted language learning environments. This article presents findings from a meta-analysis of 11 studies of computer-mediated glosses in second…
Berlin Kompass: Multimodal Gameful Empowerment for Foreign Language Learning
ERIC Educational Resources Information Center
Kallioniemi, Pekka; Posti, Laura-Pihkala; Hakulinen, Jaakko; Turunen, Markku; Keskinen, Tuuli; Raisamo, Roope
2015-01-01
This article presents an innovative, gameful, multimodal, and authentic learning environment for training of oral communication in a foreign language--a virtual adventure called Berlin Kompass. After a brief presentation of the pedagogical and technological backgrounds, the system is described. Central results of a series of pilots in autumn 2013…
Integrated Approach to User Account Management
NASA Technical Reports Server (NTRS)
Kesselman, Glenn; Smith, William
2007-01-01
IT environments consist of both Windows and other platforms. Providing user account management for this model has become increasingly diffi cult. If Microsoft#s Active Directory could be enhanced to extend a W indows identity for authentication services for Unix, Linux, Java and Macintosh systems, then an integrated approach to user account manag ement could be realized.
ERIC Educational Resources Information Center
Auclair, Joy
2014-01-01
This author wanted to begin her 10-grade biology course with an authentic inquiry that included a review of equipment use, investigation methods, and critical thinking skills. She also wanted to engage students in the practice of science while teaching biological core ideas and crosscutting concepts. She was at a loss as to what that inquiry might…
ERIC Educational Resources Information Center
Maich, Kimberly; Belcher, E. Christina
2012-01-01
Students with autism spectrum disorders (ASD) may exhibit behaviors that can negatively affect peer relationships. A process for raising awareness about this exceptionality to their peers can build a foundation for authentic inclusion in the classroom environment. This article suggests that deliberately planned interventions using picture books to…
ERIC Educational Resources Information Center
Lin, Huifen; Chen, Tsuiping
2007-01-01
The purpose of this experimental study was to compare the effects of different types of computer-generated visuals (static versus animated) and advance organizers (descriptive versus question) in enhancing comprehension and retention of a content-based lesson for learning English as a Foreign Language (EFL). Additionally, the study investigated…
Uncommon Territory: Declaration, and the Supervision of Queer Design Theses
ERIC Educational Resources Information Center
Ings, Welby John
2014-01-01
While attempting to develop authentic, practice-led inquiries into identity, queer students face unique issues. They often need to consider questions of community and frequently find themselves with one foot outside of the academic environment. Many also have to carefully consider the implications of declaration, and the management of trust. This…
The Relationship of the World Wide Web to Thinking Skills.
ERIC Educational Resources Information Center
Bradshaw, Amy C.; Bishop, Jeanne L.; Gens, Linda S.; Miller, Sharla L.; Rogers, Martha A.
2002-01-01
Discusses use of the World Wide Web in education and its possibilities for developing higher order critical thinking skills to successfully deal with the demands of the future information society. Suggests that teachers need to provide learning environments that are learner-centered, authentic, problem-based, and collaborative. (Contains 61…
Improving Science Assessments by Situating Them in a Virtual Environment
ERIC Educational Resources Information Center
Ketelhut, Diane Jass; Nelson, Brian; Schifter, Catherine; Kim, Younsu
2013-01-01
Current science assessments typically present a series of isolated fact-based questions, poorly representing the complexity of how real-world science is constructed. The National Research Council asserts that this needs to change to reflect a more authentic model of science practice. We strongly concur and suggest that good science assessments…
Simulated Sampling of Estuary Plankton
ERIC Educational Resources Information Center
Fortner, Rosanne W.; Jenkins, Deborah Bainer
2009-01-01
To find out about the microscopic life in the valuable estuary environment, it is usually necessary to be near the water. This dry lab offers an alternative, using authentic data and a simulation of plankton sampling. From the types of organisms found in the sample, middle school students can infer relationships in the biological and physical…
Conducting Guided Inquiry in Science Classes Using Authentic, Archived, Web-Based Data
ERIC Educational Resources Information Center
Ucar, Sedat; Trundle, Kathy Cabe
2011-01-01
Students are often unable to collect the real-time data necessary for conducting inquiry in science classrooms. Web-based, real-time data could, therefore, offer a promising tool for conducting scientific inquiries within classroom environments. This study used a quasi-experimental research design to investigate the effects of inquiry-based…
Using Broadcast Journalism To Motivate Hypermedia Exploration.
ERIC Educational Resources Information Center
Kass, Alex; And Others
An effective learning environment must ensure that students are motivated to access whatever information is available, that they have an authentic context in which to situate that knowledge, and that they face challenges that allow them to put that knowledge to use. In an attempt to address these issues, a computer program was developed, called…
Immersive Learning Technologies: Realism and Online Authentic Learning
ERIC Educational Resources Information Center
Herrington, Jan; Reeves, Thomas C.; Oliver, Ron
2007-01-01
The development of immersive learning technologies in the form of virtual reality and advanced computer applications has meant that realistic creations of simulated environments are now possible. Such simulations have been used to great effect in training in the military, air force, and in medical training. But how realistic do problems need to be…
Primary School Teachers' Views on the Preparation and Usage of Authentic Material
ERIC Educational Resources Information Center
Bedir, Gülay; Özbek, Özlem Yesim
2016-01-01
The students of primary school, secondary school, high school and university confront a vast array of stimulants along with the developing technology in their daily lives. With the classroom environment's lack of rich stimulus, it is difficult to get the students' attention using traditional teaching methods. If teachers choose both technological…
Authentic Learning for Pre-Service Teachers in a Technology-Rich Environment
ERIC Educational Resources Information Center
Latham, Gloria; Carr, Nicky
2012-01-01
This paper shares the findings from a three year Participatory Action Research Study around the selection, implementation and effectiveness of educational technologies for enhancing learning in a Teacher Education subject for second year pre-service primary teachers. The innovative Project-Based subject is described using a critical lens. The…
Learning English with "The Sims": Exploiting Authentic Computer Simulation Games for L2 Learning
ERIC Educational Resources Information Center
Ranalli, Jim
2008-01-01
With their realistic animation, complex scenarios and impressive interactivity, computer simulation games might be able to provide context-rich, cognitively engaging virtual environments for language learning. However, simulation games designed for L2 learners are in short supply. As an alternative, could games designed for the mass-market be…
Improving the Usefulness of Concept Maps as a Research Tool for Science Education
ERIC Educational Resources Information Center
Van Zele, Els; Lenaerts, Josephina; Wieme, Willem
2004-01-01
The search for authentic science research tools to evaluate student understanding in a hybrid learning environment with a large multimedia component has resulted in the use of concept maps as a representation of student's knowledge organization. One hundred and seventy third-semester introductory university-level engineering students represented…
Tell Me Your Story: A Reflection Strategy for Preservice Teachers
ERIC Educational Resources Information Center
Binks, Emily; Smith, Dennie L.; Smith, Lana J.; Joshi, R. Malatesha
2009-01-01
"Tell me your story" is a phrase popularly being promoted in the business setting during recent years. The power of storytelling can be utilized in student teacher reflection as a strategy for making connections between theory and practice in authentic classroom environments and enabling preservice teachers to actively develop plans for growth. A…
ERIC Educational Resources Information Center
Ko, Mon-Lin Monica
2013-01-01
A focus of reforms in standards, learning environments, teacher preparation programs and professional development is to support teachers' and students' engagement with scientific practices such as argumentation, modeling and generating explanations for real-world phenomena (NRC, 2011). Engaging in these practices in authentic ways…
The Power of Investigating: Guiding Authentic Assessments
ERIC Educational Resources Information Center
McGough, Julie V.; Nyberg, Lisa M.
2017-01-01
Children want to explore, dig, build, play, and wonder. To do this they need to touch, feel, see, observe, listen, manipulate, plan, and create. How does a teacher build and maintain a learning environment that will help students investigate meaningful questions? How does a teacher plan and manage ongoing investigations? How does a teacher use…
ERIC Educational Resources Information Center
Hamel, Christine; Viau-Guay, Anabelle; Ria, Luc; Dion-Routhier, Justine
2018-01-01
Elementary teachers are expected to teach complex and authentic lessons and integrating multiple disciplines. In so doing, they must take many elements into account, such as disciplinary content, learning standards, and pedagogical knowledge, in an ever more complex environment, including pupils' increasingly heterogeneous characteristics. Our…
Exploring Small Group Analysis of Instructional Design Cases in Online Learning Environments
ERIC Educational Resources Information Center
Trespalacios, Jesus
2017-01-01
The case-based approach is a constructivist instructional strategy that helps students apply their emerging knowledge by studying design problems in authentic real-world situations. One important instructional strategy in case-based instruction is to analyze cases in small groups before discussing them with the whole class. This study investigates…
Children's Literature in an Integrated Curriculum: The Authentic Voice.
ERIC Educational Resources Information Center
Bosma, Bette, Ed.; Guth, Nancy DeVries, Ed.
This book, a collection of essays on teaching, first explains the theoretical foundations of a collaborative, integrated, literature-based curriculum, and then links the theory to real-life accounts in individual chapters. The book shows how to put theory into practice by selecting appropriate books, creating an interactive classroom environment,…
Simulated Apprenticeship for Pre-Service Filipino Teachers
ERIC Educational Resources Information Center
Medula, Cesar Turqueza
2017-01-01
The delivery of teacher education courses often for the most part deal with the visible parts of knowledge, the "know-what", which is often disconnected from the tacit knowledge, the "know-how", required in authentic teaching environments. It could be argued that would-be teachers do undergo practice teaching as part of their…
ERIC Educational Resources Information Center
Picho, Katherine
2016-01-01
The author used phenomenology to explore the subjective experience of ninth-grade girls susceptible to mathematics-related stereotype threat in their authentic learning environments. The sample constituted students categorized as either having low or high susceptibility to stereotype threat (SST) enrolled in Honors mathematics classes at an urban…
ERIC Educational Resources Information Center
Hunt, Anne-Marie
2015-01-01
Online and blended learning bring opportunities and challenges, including more opportunities for authentic activities (Gikandi, Morrow, & Davis, 2011). Blended online environments are now a common mode for pre-service teacher education, providing interesting opportunities to develop and showcase alternative approaches that blend with practice…
PBL-SEE: An Authentic Assessment Model for PBL-Based Software Engineering Education
ERIC Educational Resources Information Center
dos Santos, Simone C.
2017-01-01
The problem-based learning (PBL) approach has been successfully applied to teaching software engineering thanks to its principles of group work, learning by solving real problems, and learning environments that match the market realities. However, the lack of well-defined methodologies and processes for implementing the PBL approach represents a…
Lights, Camera, Action! Learning about Management with Student-Produced Video Assignments
ERIC Educational Resources Information Center
Schultz, Patrick L.; Quinn, Andrew S.
2014-01-01
In this article, we present a proposal for fostering learning in the management classroom through the use of student-produced video assignments. We describe the potential for video technology to create active learning environments focused on problem solving, authentic and direct experiences, and interaction and collaboration to promote student…
Effects of Practice Type in the Here and Now Mobile Learning Environment
ERIC Educational Resources Information Center
Tutty, Jeremy I.; Martin, Florence
2014-01-01
This generation of technology is characterized by mobile and portable devices such as smartphones and tablet computers with wireless broadband access. Mobile technologies enable a new kind of learning called "here and now learning," where learners have access to information anytime and anywhere to perform authentic activities in the…
The Influence of Technological Literacy on Students' Writing
ERIC Educational Resources Information Center
Turner, Kristen H.; Katic, Elvira K.
2009-01-01
Many forms of technological communication exist in non-linear environments and there is potential for new approaches to learning and teaching which may more closely approximate naturalistic and authentic approaches to learning. The following study examined the ways in which high school students were influenced by technology as they wrote and how…
A Spanish-Finnish Telecollaboration: Extending Intercultural Competence via Videoconferencing
ERIC Educational Resources Information Center
Puranen, Pasi; Vurdien, Ruby
2016-01-01
In language learning today, students from different geographical locations are able to interact online in a more authentic environment, share their views with their partners, create profiles as well as build online communities enjoying common interests. With this in mind, this paper examines and reports on a study about how students from two…
Real Clients, Real Management, Real Failure: The Risks and Rewards of Service Learning
ERIC Educational Resources Information Center
Cyphert, Dale
2006-01-01
There are multiple advantages to service-learning projects across the business curriculum, but in communication classes the author has found their biggest value to be authenticity. A "real-world" assignment requires the flexible, creative integration of communication skills in an environment where, "unlike exams and other typical university…
Unlocking the Laboratory: Autonomous Wireless Sensor Authentication in Practice
ERIC Educational Resources Information Center
Huggard, Meriel; McGoldrick, Ciaran
2013-01-01
Purpose: The purpose of this study is to evaluate a practical laboratory task where final year undergraduate students design, implement and validate an inferred security wireless sensor access system. Design/methodology/approach: The quality of the learning and technical environment was evaluated from a number of perspectives using a mixed methods…
Designing Science Learning with Game-Based Approaches
ERIC Educational Resources Information Center
Liu, Min; Rosenblum, Jason A.; Horton, Lucas; Kang, Jina
2014-01-01
Given the growing popularity of digital games as a form of entertainment, educators are interested in exploring using digital games as a tool to facilitate learning. In this study, we examine game-based learning by describing a learning environment that combines game elements, play, and authenticity in the real world for the purpose of engaging…
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601
ERIC Educational Resources Information Center
Schwandt, Thomas A.; Lincoln, Yvonna S.; Guba, Egon G.
2007-01-01
Among the most knotty problems faced by investigators committed to interpretive practices in disciplines and fields such as sociocultural anthropology, jurisprudence, literary criticism, historiography, feminist studies, public administration, policy analysis, planning, educational research, and evaluation are deciding whether an interpretation is…
Time-Domain Reflectometry for Tamper Indication in Unattended Monitoring Systems for Safeguards
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tedeschi, Jonathan R.; Smith, Leon E.; Moore, David E.
2014-12-01
The International Atomic Energy Agency (IAEA) continues to expand its use of unattended, remotely monitored measurement systems. An increasing number of systems and an expanding family of instruments create challenges in terms of deployment efficiency and the implementation of data authentication measures. Pacific Northwest National Laboratory (PNNL) leads a collaboration that is exploring various tamper-indicating (TI) measures that could help to address some of the long-standing detector and data-transmission authentication challenges with IAEA’s unattended systems. PNNL is investigating the viability of active time-domain reflectometry (TDR) along two parallel but interconnected paths: (1) swept-frequency TDR as the highly flexible, laboratory goldmore » standard to which field-deployable options can be compared, and (2) a low-cost commercially available spread-spectrum TDR technology as one option for field implementation. This report describes PNNL’s progress and preliminary findings from the first year of the study, and describes the path forward.« less
An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology
Winata, Doni
2018-01-01
The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE) technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer’s smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol. PMID:29587399
An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology.
Yohan, Alexander; Lo, Nai-Wei; Winata, Doni
2018-03-25
The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE) technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer's smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol.
Wang, Hongtao; Li, Guisheng; Kwon, Woo-Saeng; Yang, Deok-Chun
2016-01-01
Panax ginseng is one of the most valuable medicinal plants in the Orient. The low level of genetic variation has limited the application of molecular markers for cultivar authentication and marker-assisted selection in cultivated ginseng. To exploit DNA polymorphism within ginseng cultivars, ginseng expressed sequence tags (ESTs) were searched against the potential intron polymorphism (PIP) database to predict the positions of introns. Intron-flanking primers were then designed in conserved exon regions and used to amplify across the more variable introns. Sequencing results showed that single nucleotide polymorphisms (SNPs), as well as indels, were detected in four EST-derived introns, and SNP markers specific to “Gopoong” and “K-1” were first reported in this study. Based on cultivar-specific SNP sites, allele-specific polymerase chain reaction (PCR) was conducted and proved to be effective for the authentication of ginseng cultivars. Additionally, the combination of a simple NaOH-Tris DNA isolation method and real-time allele-specific PCR assay enabled the high throughput selection of cultivars from ginseng fields. The established real-time allele-specific PCR assay should be applied to molecular authentication and marker assisted selection of P. ginseng cultivars, and the EST intron-targeting strategy will provide a potential approach for marker development in species without whole genomic DNA sequence information. PMID:27271615
Quantum Dialogue with Authentication Based on Bell States
NASA Astrophysics Data System (ADS)
Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping
2013-06-01
We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.
NASA Astrophysics Data System (ADS)
Farroha, Bassam; Farroha, Deborah
2012-05-01
Gaining the competitive advantage in today's aggressive environment requires our corporate leaders and Warfighters alike to be armed with up-to-date knowledge related to friendly and opposing forces. This knowledge has to be delivered in real-time between the core enterprise and tactical/mobile units at the edge. The type and sensitivity of data delivered will vary depending on users, threat level and current rules of dissemination. This paper will describe the mobile security management that basis access rights on positive identification of user, authenticating the user and the edge device. Next, Access Management is granted on a fine grain basis where each data element is tagged with meta-data that is crypto-bound to the data itself to ensure authenticity of contents and observance of data sensitivity.
A Simulated Learning Environment for Teaching Medicine Dispensing Skills
Styles, Kim; Sewell, Keith; Trinder, Peta; Marriott, Jennifer; Maher, Sheryl; Naidu, Som
2016-01-01
Objective. To develop an authentic simulation of the professional practice dispensary context for students to develop their dispensing skills in a risk-free environment. Design. A development team used an Agile software development method to create MyDispense, a web-based simulation. Modeled on virtual learning environments elements, the software employed widely available standards-based technologies to create a virtual community pharmacy environment. Assessment. First-year pharmacy students who used the software in their tutorials, were, at the end of the second semester, surveyed on their prior dispensing experience and their perceptions of MyDispense as a tool to learn dispensing skills. Conclusion. The dispensary simulation is an effective tool for helping students develop dispensing competency and knowledge in a safe environment. PMID:26941437
Authenticity in occupational therapy leadership: a case study of a servant leader.
Dillon, T H
2001-01-01
The purpose of this qualitative study was to examine the leadership of occupational therapy educator Sr. Genevieve Cummings at the College of St. Catherine in St. Paul, Minnesota, from 1960 to 1994. In-depth interviews were conducted with faculty, staff, administrators, and friends who knew her work intimately. Themes regarding her leadership were synthesized from the interview data and compared with trends in the leadership literature. The predominant themes representing the major elements of her success as a leader were enabling others, focusing on the greater good, collaborative visioning, and leadership through caring and service. The findings indicate that Sr. Genevieve led in uniquely authentic manner by serving the needs of students, faculty members, and the profession. Sr. Genevieve was an effective, authentic, and accomplished leader throughout her career. Her contributions had a significant impact on the field of occupational therapy and occupational therapy education. The legacy of her leadership serves as a model for others in occupational therapy who must balance multiple challenges, pressures, or roles and be able to work effectively with others.
Banknote authentication using chaotic elements technology
NASA Astrophysics Data System (ADS)
Ambadiyil, Sajan; P. S., Krishnendu; Mahadevan Pillai, V. P.; Prabhu, Radhakrishna
2017-10-01
The counterfeit banknote is a growing threat to the society since the advancements in the field of computers, scanners and photocopiers, as they have made the duplication process for banknote much simpler. The fake note detection systems developed so far have many drawbacks such as high cost, poor accuracy, unavailability, lack of user-friendliness and lower effectiveness. One possible solution to this problem could be the use of a system uniquely linked to the banknote itself. In this paper, we present a unique identification and authentication process for the banknote using chaotic elements embedded in it. A chaotic element means that the physical elements are formed from a random process independent from human intervention. The chaotic elements used in this paper are the random distribution patterns of such security fibres set into the paper pulp. A unique ID is generated from the fibre pattern obtained from UV image of the note, which can be verified by any person who receives the banknote to decide whether the banknote is authentic or not. Performance analysis of the system is also studied in this paper.
NASA Astrophysics Data System (ADS)
Dohaney, J. A.; kennedy, B.; Brogt, E.; Gravley, D.; Wilson, T.; O'Steen, B.
2011-12-01
This qualitative study investigates behaviors and experiences of upper-year geosciences undergraduate students during an intensive role-play simulation, in which the students interpret geological data streams and manage a volcanic crisis event. We present the development of the simulation, its academic tasks, (group) role assignment strategies and planned facilitator interventions over three iterations. We aim to develop and balance an authentic, intensive and highly engaging capstone activity for volcanology and geo-hazard courses. Interview data were collected from academic and professional experts in the fields of Volcanology and Hazard Management (n=11) in order to characterize expertise in the field, characteristics of key roles in the simulation, and to validate the authenticity of tasks and scenarios. In each iteration, observations and student artifacts were collected (total student participants: 68) along with interviews (n=36) and semi-structured, open-ended questionnaires (n=26). Our analysis of these data indicates that increasing the structure (i.e. organization, role-specific tasks and responsibilities) lessens non-productive group dynamics, which allows for an increase in difficulty of academic tasks within the simulation without increasing the cognitive load on students. Under these conditions, students exhibit professional expert-like behaviours, in particular in the quality of decision-making, communication skills and task-efficiency. In addition to illustrating the value of using this simulation to teach geosciences concepts, this study has implications for many complex situated-learning activities.
NASA Astrophysics Data System (ADS)
Smith, S. C.; Wegner, K.; Branch, B. D.; Miller, B.; Schulze, D. G.
2013-12-01
Many national and statewide programs throughout the K-12 science education environment teach students about science in a hands-on format, including programs such as Global Learning and Observations to Benefit the Environment (GLOBE), Project Learning Tree (PLT), Project Wild, Project Wet, and Hoosier River Watch. Partnering with one or more of these well-known programs can provide many benefits to both the scientists involved in disseminating research and the K-12 educators. Scientists potentially benefit by broader dissemination of their research by providing content enrichment for educators. Educators benefit by gaining understanding in content, becoming more confident in teaching the concept, and increasing their enthusiasm in teaching the concepts addressed. This presentation will discuss an innovative framework for professional development that was implemented at Purdue University, Indiana in July 2013. The professional development incorporated GLOBE protocols with iPad app modules and interactive content sessions from faculty and professionals. By collaborating with the GLOBE program and scientists from various content areas, the Department of Earth, Atmospheric, and Planetary Sciences at Purdue University successfully facilitated a content rich learning experience for educators. Such activity is promoted and supported by Purdue University Libraries where activities such as Purdue's GIS Day are efforts of making authentic learning sustainable in the State of Indiana and for national consideration. Using iPads to visualize soil transitions on a field trip. Testing Water quality in the field.
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
Das, Ashok Kumar; Wazid, Mohammad; Kumar, Neeraj; Khan, Muhammad Khurram; Choo, Kim-Kwang Raymond; Park, YoungHo
2017-09-18
Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., Android and iOS device) and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and the mobile terminal. The security of the proposed scheme is then demonstrated through the broadly-accepted Real-Or-Random model, as well as using the popular formal security verification tool, known as the Automated Validation of Internet Security Protocols and Applications (AVISPA). Finally, we present a comparative summary of the proposed scheme in terms of the overheads such as computation and communication costs, security and functionality features of the proposed scheme and related schemes, and also the evaluation findings from the NS2 simulation.
Using CALL in the Classroom: Analyzing Student Interactions in an Authentic Classroom
ERIC Educational Resources Information Center
Hegelheimer, Volker; Tower, Dustin
2004-01-01
Recent CALL research has started to go beyond the comparison of CALL versus non-CALL environments to explore what learners do while going through CALL activities. One important strand within that area has focused on the use and utility of providing learners with opportunities to request modified input. While many studies have carried out research…
Teaching LGBTQ-Themed Literature in English Language Arts Classrooms. Equity by Design
ERIC Educational Resources Information Center
Blackburn, Mollie; Miller, Mary Catherine
2017-01-01
The purpose of this Brief is to gain a better understanding of the barriers experienced by students who identify as lesbian, gay, bisexual, transgender, and queer/questioning (LGBTQ) and the need to ensure authentically represented within the curriculum, and to create a safe and inclusive learning environment. Data shows that students who identify…
Redesigning the Traditional Business Gaming Process: Aiming to Capture Business Process Authenticity
ERIC Educational Resources Information Center
Lainema, Timo
2004-01-01
The constantly changing business environment has forced many organizations to move away from focusing on individual tasks and functions to focusing on more integrated and coordinated ways of work. Higher-level business and information systems (IS) education is also in a state of change, as the traditional curriculum does not coincide with business…
Authenticity in Learning for the Twenty-First Century: Bridging the Formal and the Informal
ERIC Educational Resources Information Center
Hung, David; Lee, Shu-Shing; Lim, Kenneth Y. T.
2012-01-01
The paper attempts to bridge informal and formal learning by leveraging on affordance structures associated with informal environments to help learners develop social, cognitive, and metacognitive dispositions that can be applied to learning in classrooms. Most studies focus on either learning in formal or informal contexts, but this study seeks…
ERIC Educational Resources Information Center
Seely, Brian J.
2015-01-01
This study aims to advance learning outdoors with mobile devices. As part of the ongoing Tree Investigators design-based research study, this research investigated a mobile application to support observation, identification, and explanation of the tree life cycle within an authentic, outdoor setting. Recognizing the scientific and conceptual…
ERIC Educational Resources Information Center
Hill, Patrick L.; Allemand, Mathias; Grob, Sabine Zehnder; Peng, Aristide; Morgenthaler, Christoph; Kappler, Christoph
2013-01-01
The current study focused on three aspects of identity development relevant to the adolescent years: being an authentic person, perceiving control over and consistency in one's environment, and having consistent expectations from close others. In a two-wave study of adolescents (n = 750), we examined how these aspects change over the course of a…
ERIC Educational Resources Information Center
Peker, Deniz; Dolan, Erin
2012-01-01
As student-teacher-scientist partnerships become more widespread, there is a need for research to understand the roles assumed by scientists and teachers as they interact with students in general and in inquiry learning environments in particular. Although teacher roles during inquiry learning have been studied, there is a paucity of research…
The Fidelity and Usability of 5-DIE: A Design Study of Enacted Cyberlearning
ERIC Educational Resources Information Center
Kern, Cindy L.; Crippen, Kent J.; Skaza, Heather
2014-01-01
This paper describes a design study of a cyberlearning instructional unit about climate change created with a new inquiry-based design framework, the 5-featured Dynamic Inquiry Enterprise (5-DIE). The 5-DIE framework was created to address the need for authentic science inquiry experiences in cyberlearning environments that leverage existing tools…
ERIC Educational Resources Information Center
Ekmekci, Adem; Gulacar, Ozcan
2015-01-01
Science education reform emphasizes innovative and constructivist views of science teaching and learning that promotes active learning environments, dynamic instructions, and authentic science experiments. Technology-based and hands-on instructional designs are among innovative science teaching and learning methods. Research shows that these two…
ERIC Educational Resources Information Center
Wagh, Aditi; Cook-Whitt, Kate; Wilensky, Uri
2017-01-01
Research on the design of learning environments for K-12 science education has been informed by two bodies of literature: inquiry-based science and Constructionism. Inquiry-based science has emphasized engagement in activities that reflect authentic scientific practices. Constructionism has focused on designing intuitively accessible authoring…
ERIC Educational Resources Information Center
Canto, Silvia; Jauregi Ondarra, Kristi
2017-01-01
This article attempts to shed some light on the possible learning benefits for language acquisition and intercultural development of authentic social interaction with expert peers through computer mediated communication (CMC) tools. The environments used in this study are video communication and the 3D virtual world "Second Life." For…
Learning about Flood Risk: Comparing the Web-Based and Physical Flood-Walk Learning Environments
ERIC Educational Resources Information Center
Chang Rundgren, Shu-Nu; Nyberg, Lars; Evers, Mariele; Alexandersson, Jan
2015-01-01
Numerous of sustainable development related challenges are emerging today, e.g. flooding problems. Our group has developed "the flood walk" project since 2010 to convey flood risk knowledge in an authentic context. Considering the limitation of time and space to educate people the flood risk knowledge, we tried to transform the physical…
An Integrative Approach to Teaching English as a Second Language: The Hong Kong Case.
ERIC Educational Resources Information Center
Wan, Yee
This paper proposes an integrative approach for teaching English as a second language to students in Hong Kong to develop their listening, speaking, reading, and writing skills in English to meet the challenge of an English curriculum. The integrative approach provides an authentic language environment for learners to develop language skills in a…
Learning Transferable Skills through Adventure Education: The Role of an Authentic Process
ERIC Educational Resources Information Center
Sibthorp, Jim
2003-01-01
The purpose of this study is threefold: (a) to explore what 18 adolescents learned while participating in a three week long adventure program, (b) to examine how they learned while on the program, and (c) to determine what program outcomes they considered most applicable to their home environments, or which learning is "transferable". To address…
An Authentic Online Community of Learning Framework for Higher Education: Development Process
ERIC Educational Resources Information Center
Parker, Jenni
2017-01-01
A key challenge for higher education practitioners is to identify how to construct more engaging online environments that promote key learning skills and encourage self-directed learning. This paper discusses a study that investigated how online university courses could be designed to be more engaging. The study employed a design-based research…
ERIC Educational Resources Information Center
Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen
2008-01-01
This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…
An Undergraduate Course to Bridge the Gap between Textbooks and Scientific Research
Wiegant, Fred; Scager, Karin; Boonstra, Johannes
2011-01-01
This article reports on a one-semester Advanced Cell Biology course that endeavors to bridge the gap between gaining basic textbook knowledge about cell biology and learning to think and work as a researcher. The key elements of this course are 1) learning to work with primary articles in order to get acquainted with the field of choice, to learn scientific reasoning, and to identify gaps in our current knowledge that represent opportunities for further research; 2) formulating a research project with fellow students; 3) gaining thorough knowledge of relevant methodology and technologies used within the field of cell biology; 4) developing cooperation and leadership skills; and 5) presenting and defending research projects before a jury of experts. The course activities were student centered and focused on designing a genuine research program. Our 5-yr experience with this course demonstrates that 1) undergraduate students are capable of delivering high-quality research designs that meet professional standards, and 2) the authenticity of the learning environment in this course strongly engages students to become self-directed and critical thinkers. We hope to provide colleagues with an example of a course that encourages and stimulates students to develop essential research thinking skills. PMID:21364103
An undergraduate course to bridge the gap between textbooks and scientific research.
Wiegant, Fred; Scager, Karin; Boonstra, Johannes
2011-01-01
This article reports on a one-semester Advanced Cell Biology course that endeavors to bridge the gap between gaining basic textbook knowledge about cell biology and learning to think and work as a researcher. The key elements of this course are 1) learning to work with primary articles in order to get acquainted with the field of choice, to learn scientific reasoning, and to identify gaps in our current knowledge that represent opportunities for further research; 2) formulating a research project with fellow students; 3) gaining thorough knowledge of relevant methodology and technologies used within the field of cell biology; 4) developing cooperation and leadership skills; and 5) presenting and defending research projects before a jury of experts. The course activities were student centered and focused on designing a genuine research program. Our 5-yr experience with this course demonstrates that 1) undergraduate students are capable of delivering high-quality research designs that meet professional standards, and 2) the authenticity of the learning environment in this course strongly engages students to become self-directed and critical thinkers. We hope to provide colleagues with an example of a course that encourages and stimulates students to develop essential research thinking skills.
NASA Astrophysics Data System (ADS)
Goehring, L.; Kelsey, K.; Carlson, J.
2005-12-01
Teacher professional development designed to promote authentic research in the classroom is ultimately aimed at improving student scientific literacy. In addition to providing teachers with opportunities to improve their understanding of science through research experiences, we need to help facilitate similar learning in students. This is the focus of the SEAS (Student Experiments At Sea) program: to help students learn science by doing science. SEAS offers teachers tools and a framework to help foster authentic student inquiry in the classroom. SEAS uses the excitement of deep-sea research, as well as the research facilities and human resources that comprise the deep-sea scientific community, to engage student learners. Through SEAS, students have the opportunity to practice inquiry skills and participate in research projects along side scientists. SEAS is a pilot program funded by NSF and sponsored by the Ridge 2000 research community. The pilot includes inquiry-based curricular materials, facilitated interaction with scientists, opportunities to engage students in research projects, and teacher training. SEAS offers a framework of resources designed to help translate inquiry skills and approaches to the classroom environment, recognizing the need to move students along the continuum of scientific inquiry skills. This framework includes hands-on classroom lessons, Classroom to Sea labs where students compare their investigations with at-sea investigations, and a student experiment competition. The program also uses the Web to create a virtual ``scientific community'' including students. Lessons learned from this two year pilot emphasize the importance of helping teachers feel knowledgeable and experienced in the process of scientific inquiry as well as in the subject. Teachers with experience in scientific research were better able to utilize the program. Providing teachers with access to scientists as a resource was also important, particularly given the challenges of working in the deep-sea environment. Also, fostering authentic student investigations (i.e., working through preparatory materials, developing proposals, analyzing data and writing summary reports) is challenging to fit within the academic year. Nonetheless, teacher feedback highlights that the excitement generated by participation in real research is highly motivating. Further, students experience a ``paradigm shift'' in understanding evidence-based reasoning and the process of scientific discovery.
NASA Astrophysics Data System (ADS)
Ward, Dennis W.; Bennett, Kelly W.
2017-05-01
The Sensor Information Testbed COllaberative Research Environment (SITCORE) and the Automated Online Data Repository (AODR) are significant enablers of the U.S. Army Research Laboratory (ARL)'s Open Campus Initiative and together create a highly-collaborative research laboratory and testbed environment focused on sensor data and information fusion. SITCORE creates a virtual research development environment allowing collaboration from other locations, including DoD, industry, academia, and collation facilities. SITCORE combined with AODR provides end-toend algorithm development, experimentation, demonstration, and validation. The AODR enterprise allows the U.S. Army Research Laboratory (ARL), as well as other government organizations, industry, and academia to store and disseminate multiple intelligence (Multi-INT) datasets collected at field exercises and demonstrations, and to facilitate research and development (R and D), and advancement of analytical tools and algorithms supporting the Intelligence, Surveillance, and Reconnaissance (ISR) community. The AODR provides a potential central repository for standards compliant datasets to serve as the "go-to" location for lessons-learned and reference products. Many of the AODR datasets have associated ground truth and other metadata which provides a rich and robust data suite for researchers to develop, test, and refine their algorithms. Researchers download the test data to their own environments using a sophisticated web interface. The AODR allows researchers to request copies of stored datasets and for the government to process the requests and approvals in an automated fashion. Access to the AODR requires two-factor authentication in the form of a Common Access Card (CAC) or External Certificate Authority (ECA)
Baring the soul: Paul Bindrim, Abraham Maslow and 'nude psychotherapy'.
Nicholson, Ian
2007-01-01
Nude psychotherapy is one of the most flamboyant therapeutic techniques ever developed in American psychology. Largely forgotten today, the therapy was an academic and popular sensation upon its introduction in 1967. Developed by psychologist Paul Bindrim, the therapy promised to guide clients to their authentic selves through the systematic removal of clothing. This paper explores the intellectual, cultural and ethical context of nude therapy and its significance as a form of unchurched spirituality. Although nude therapy has an indisputable tabloid character, it is also rooted in a long-standing academic search for authenticity and ultimate meaning through science. Bindrim's career demonstrates the historically long-standing interweaving of spirituality and science within American psychology while simultaneously highlighting the field's extraordinary capacity for adaptive reinvention.
School-Based Experiential Outdoor Education: A Neglected Necessity
ERIC Educational Resources Information Center
James, Joan K.; Williams, Theresa
2017-01-01
In this research study, we hear the voices of middle school students, preservice teachers, and practicing middle school teachers in support of school-based experiential outdoor education. The benefits of engaging youth in memorably relevant learning, immersing them in physically active, field-based education, and providing them with authentic,…
Applying the Sport Education Model to Tennis
ERIC Educational Resources Information Center
Ayvazo, Shiri
2009-01-01
The physical education field abounds with theoretically sound curricular approaches such as fitness education, skill theme approach, tactical approach, and sport education. In an era that emphasizes authentic sport experiences, the Sport Education Model includes unique features that sets it apart from other curricular models and can be a valuable…
ERIC Educational Resources Information Center
Staub, Nancy L.; Poxleitner, Marianne; Braley, Amanda; Smith-Flores, Helen; Pribbenow, Christine M.; Jaworski, Leslie; Lopatto, David; Anders, Kirk R.
2016-01-01
Authentic research experiences are valuable components of effective undergraduate education. Research experiences during the first years of college are especially critical to increase persistence in science, technology, engineering, and mathematics fields. The Science Education Alliance Phage Hunters Advancing Genomics and Evolutionary Science…
Testing Honey Bees' Avoidance of Predators
ERIC Educational Resources Information Center
Robinson, Jesse Wade; Nieh, James C.; Goodale, Eben
2012-01-01
Many high school science students do not encounter opportunities for authentic science inquiry in their formal coursework. Ecological field studies can provide such opportunities. The purpose of this project was to teach students about the process of science by designing and conducting experiments on whether and how honey bees (Apis mellifera)…
Prescriptivism and French L2 Instruction
ERIC Educational Resources Information Center
Beaulieu, Suzie
2016-01-01
Studies in the field of transcultural nursing in the USA and Australia have shown that bilingual nurses who work in their non-dominant language face many communication challenges. The majority of the linguistic problems they encounter are related to their inability to interpret and use language appropriately in different, authentic nursing…
ERIC Educational Resources Information Center
Ervin, Gerard L.
Three developments in the field of foreign language education seem to have particularly great potential for foreign language teaching and learning in the 1990s: (1) proficiency; (2) technology; and (3) authenticity (PTA). The first of these developments involves the language proficiency movement's debate over the establishment of a common metric…
Dawnay, Nick; Hughes, Rebecca; Court, Denise Syndercombe; Duxbury, Nicola
2016-01-01
Identifying individual species or determining species' composition in an unknown sample is important for a variety of forensic applications. Food authentication, monitoring illegal trade in endangered species, forensic entomology, sexual assault case work and counter terrorism are just some of the fields that can require the detection of the biological species present. Traditional laboratory based approaches employ a wide variety of tools and technologies and exploit a number of different species specific traits including morphology, molecular differences and immuno-chemical analyses. A large number of these approaches require laboratory based apparatus and results can take a number of days to be returned to investigating authorities. Having a presumptive test for rapid identification could lead to savings in terms of cost and time and allow sample prioritisation if confirmatory testing in a laboratory is required later. This model study describes the development of an assay using a single HyBeacon(®) probe and melt curve analyses allowing rapid screening and authentication of food products labelled as Atlantic cod (Gadus morhua). Exploiting melt curve detection of species specific SNP sites on the COI gene the test allows detection of a target species (Atlantic cod) and closely related species which may be used as substitutes. The assay has been designed for use with the Field Portable ParaDNA system, a molecular detection platform for non-expert users. The entire process from sampling to result takes approximately 75min. Validation studies were performed on both single source genomic DNA, mixed genomic DNA and commercial samples. Data suggests the assay has a lower limit of detection of 31 pg DNA. The specificity of the assay to Atlantic cod was measured by testing highly processed food samples including frozen, defrosted and cooked fish fillets as well as fish fingers, battered fish fillet and fish pie. Ninety-six (92.7%) of all Atlantic cod food products, tested, provided a correct single species result with the remaining samples erroneously identified as containing non-target species. The data shows that the assay was quick to design and characterise and is also capable of yielding results that would be beneficial in a variety of fields, not least the authentication of food. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887
ERIC Educational Resources Information Center
Lüddecke, Florian
2016-01-01
Whereas the importance of authenticity in relation to educational contexts has been highlighted, educational authenticity (EA) has mainly referred to a real-life/world convergence or the notion of teacher authenticity, implying that authenticity can be taught and learnt. This view, however, has largely overlooked philosophical considerations so…
ERIC Educational Resources Information Center
Nematollahi, Shirin; Maghsoudi, Mojtaba
2015-01-01
In this current study the researchers have tried to investigate the possible effect of authentic and non-authentic texts on Iranian EFL learners' vocabulary retention. Despite the great deal of studies conducted in the area of EFL/ESL learning, the effect of authentic versus non-authentic texts have almost gained little attention and been…
Fulfillment of HTTP Authentication Based on Alcatel OmniSwitch 9700
NASA Astrophysics Data System (ADS)
Liu, Hefu
This paper provides a way of HTTP authentication On Alcatel OmniSwitch 9700. Authenticated VLANs control user access to network resources based on VLAN assignment and user authentication. The user can be authenticated through the switch via any standard Web browser software. Web browser client displays the username and password prompts. Then a way for HTML forms can be given to pass HTTP authentication data when it's submitted. A radius server will provide a database of user information that the switch checks whenever it tries to authenticate through the switch. Before or after authentication, the client can get an address from a Dhcp server.
A Trusted Portable Computing Device
NASA Astrophysics Data System (ADS)
Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang
A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.
Multimodal person authentication on a smartphone under realistic conditions
NASA Astrophysics Data System (ADS)
Morris, Andrew C.; Jassim, Sabah; Sellahewa, Harin; Allano, Lorene; Ehlers, Johan; Wu, Dalei; Koreman, Jacques; Garcia-Salicetti, Sonia; Ly-Van, Bao; Dorizzi, Bernadette
2006-05-01
Verification of a person's identity by the combination of more than one biometric trait strongly increases the robustness of person authentication in real applications. This is particularly the case in applications involving signals of degraded quality, as for person authentication on mobile platforms. The context of mobility generates degradations of input signals due to the variety of environments encountered (ambient noise, lighting variations, etc.), while the sensors' lower quality further contributes to decrease in system performance. Our aim in this work is to combine traits from the three biometric modalities of speech, face and handwritten signature in a concrete application, performing non intrusive biometric verification on a personal mobile device (smartphone/PDA). Most available biometric databases have been acquired in more or less controlled environments, which makes it difficult to predict performance in a real application. Our experiments are performed on a database acquired on a PDA as part of the SecurePhone project (IST-2002-506883 project "Secure Contracts Signed by Mobile Phone"). This database contains 60 virtual subjects balanced in gender and age. Virtual subjects are obtained by coupling audio-visual signals from real English speaking subjects with signatures from other subjects captured on the touch screen of the PDA. Video data for the PDA database was recorded in 2 recording sessions separated by at least one week. Each session comprises 4 acquisition conditions: 2 indoor and 2 outdoor recordings (with in each case, a good and a degraded quality recording). Handwritten signatures were captured in one session in realistic conditions. Different scenarios of matching between training and test conditions are tested to measure the resistance of various fusion systems to different types of variability and different amounts of enrolment data.
Boamah, Sheila A; Read, Emily A; Spence Laschinger, Heather K
2017-05-01
To test a hypothesized model linking new graduate nurses' perceptions of their manager's authentic leadership behaviours to structural empowerment, short-staffing and work-life interference and subsequent burnout, job satisfaction and patient care quality. Authentic leadership and structural empowerment have been shown to reduce early career burnout among nurses. Short-staffing and work-life interference are also linked to burnout and may help explain the impact of positive, empowering leadership on burnout, which in turn influences job satisfaction and patient care quality. A time-lagged study of Canadian new graduate nurses was conducted. At Time 1, surveys were sent to 3,743 nurses (November 2012-March 2013) and 1,020 were returned (27·3% response rate). At Time 2 (May-July 2014), 406 nurses who responded at Time 1 completed surveys (39·8% response rate). Descriptive analysis was conducted in SPSS. Structural equation modelling in Mplus was used to test the hypothesized model. The hypothesized model was supported. Authentic leadership had a significant positive effect on structural empowerment, which in turn decreased both short-staffing and work-life interference. Short-staffing and work-life imbalance subsequently resulted in nurse burnout, lower job satisfaction and lower patient care quality 1 year later. The findings suggest that short-staffing and work-life interference are important factors influencing new graduate nurse burnout. Developing nurse managers' authentic leadership behaviours and working with them to create and sustain empowering work environments may help reduce burnout, increase nurse job satisfaction and improve patient care quality. © 2016 John Wiley & Sons Ltd.
Using evidence-based leadership initiatives to create a healthy nursing work environment.
Nayback-Beebe, Ann M; Forsythe, Tanya; Funari, Tamara; Mayfield, Marie; Thoms, William; Smith, Kimberly K; Bradstreet, Harry; Scott, Pamela
2013-01-01
In an effort to create a healthy nursing work environment in a military hospital Intermediate Care Unit (IMCU), a facility-level Evidence Based Practice working group composed of nursing.Stakeholders brainstormed and piloted several unit-level evidence-based leadership initiatives to improve the IMCU nursing work environment. These initiatives were guided by the American Association of Critical Care Nurses Standards for Establishing and Sustaining Healthy Work Environments which encompass: (1) skilled communication, (2) true collaboration, (3) effective decision making, (4) appropriate staffing, (5) meaningful recognition, and (6) authentic leadership. Interim findings suggest implementation of these six evidence-based, relationship-centered principals, when combined with IMCU nurses' clinical expertise, management experience, and personal values and preferences, improved staff morale, decreased staff absenteeism, promoted a healthy nursing work environment, and improved patient care.
Zhang, Ruisheng; Liu, Qidong
2017-01-01
Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research. PMID:28135288
Liu, Xin; Zhang, Ruisheng; Liu, Qidong
2017-01-01
Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research.
Graph State-Based Quantum Group Authentication Scheme
NASA Astrophysics Data System (ADS)
Liao, Longxia; Peng, Xiaoqi; Shi, Jinjing; Guo, Ying
2017-02-01
Motivated by the elegant structure of the graph state, we design an ingenious quantum group authentication scheme, which is implemented by operating appropriate operations on the graph state and can solve the problem of multi-user authentication. Three entities, the group authentication server (GAS) as a verifier, multiple users as provers and the trusted third party Trent are included. GAS and Trent assist the multiple users in completing the authentication process, i.e., GAS is responsible for registering all the users while Trent prepares graph states. All the users, who request for authentication, encode their authentication keys on to the graph state by performing Pauli operators. It demonstrates that a novel authentication scheme can be achieved with the flexible use of graph state, which can synchronously authenticate a large number of users, meanwhile the provable security can be guaranteed definitely.
22 CFR 92.36 - Authentication defined.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication defined. 92.36 Section 92.36... Notarial Acts § 92.36 Authentication defined. An authentication is a certification of the genuineness of... recognized in another jurisdiction. Documents which may require authentication include legal instruments...
State-of-the-Art of Virtual Reality Technologies for Children on the Autism Spectrum
ERIC Educational Resources Information Center
Parsons, Sarah; Cobb, Sue
2011-01-01
In the past decade there has been a rapid advance in the use of virtual reality (VR) technologies for leisure, training and education. VR is argued to offer particular benefits for children on the autism spectrum, chiefly because it can offer simulations of authentic real-world situations in a carefully controlled and safe environment. Given the…
An Analysis of a Language Test for Employment: The Authenticity of the PhonePass Test
ERIC Educational Resources Information Center
Chun, Christian W.
2006-01-01
This article presents an analysis of Ordinate Corporation's PhonePass Spoken English Test-10. The company promotes this product as being a useful assessment tool for screening job candidates' ability in spoken English. In the real-life domain of the work environment, one of the primary target language use tasks involves extended production…
The Use of MOOC as a Means of Creating a Collaborative Learning Environment in a Blended CLIL Course
ERIC Educational Resources Information Center
Titova, Svetlana
2017-01-01
The objective of this action research is to work out the possible ways of Massive Open Online Course (MOOC) integration in a blended Content and Language Integrated Learning (CLIL) course to create an authentic online collaborative community. The theoretical framework of the intervention is based on current MOOC theories, connectivism, and the…
ERIC Educational Resources Information Center
Kamarainen, Amy M.; Metcalf, Shari; Grotzer, Tina; Dede, Chris
2015-01-01
Recent reform efforts and the next generation science standards emphasize the importance of incorporating authentic scientific practices into science instruction. Modeling can be a particularly challenging practice to address because modeling occurs within a socially structured system of representation that is specific to a domain. Further, in the…
The Need for a Deeper Perspective of Education to Make Way for an Authentic Learning Experience
ERIC Educational Resources Information Center
Watagodakumbura, Chandana
2013-01-01
This paper discusses some of the limitations of our common practices as educational practitioners. We may not pay attention to the needs of a neurodiverse society. Instead, we may incorrectly assume the existence of idealistic individuals in our learning environments. There are a number of areas related to assessment that we can improve on,…
Two-Black Box Concept for Warhead Verification
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bates, Cameron Russell; Frame, Katherine Chiyoko; Mckigney, Edward Allen
2017-03-06
We have created a possible solution to meeting the requirements of certification/authentication while still employing complicated criteria. Technical solutions to protecting information from the host in an inspection environment needs to be assessed by those with specific expertise but, LANL can still study the verification problem. The two-black box framework developed provides another potential solution to the confidence vs. certification paradox.
ERIC Educational Resources Information Center
Hadley, Bree Jamila
2012-01-01
This article investigates the role of information communication technologies (ICTs) in establishing a well-aligned, authentic learning environment for a diverse cohort of non-cognate and cognate students studying event management in a higher education context. Based on a case study which examined the way ICTs assisted in accommodating diverse…
ERIC Educational Resources Information Center
Hoorens, Stijn; Rothenberg, Jeff; van Orange, Constantijn; van der Mandele, Martijn; Levitt, Ruth
2007-01-01
Storing and curating authentic academic literature and making it accessible for the long term has been a time-honoured task of national libraries. By guarding existing knowledge and facilitating its use to produce new insights, national and university libraries have formed an integral part of the research environment, complementing the roles of…
The Impact of Supported and Annotated Mobile Learning on Achievement and Cognitive Load
ERIC Educational Resources Information Center
Shadiev, Rustam; Hwang, Wu-Yuin; Huang, Yueh-Min; Liu, Tzu-Yu
2015-01-01
We designed activities for learning English as a foreign language in a mobile learning environment with familiar authentic support for this study. Students learned at school and then applied their newly gained knowledge to solve daily life problems by first using a tablet to take pictures of objects they wished to learn about, then describing them…
ERIC Educational Resources Information Center
O'Neill, D. Kevin; Harris, Judith B.
2005-01-01
Telementoring, also referred to as e-mentoring or online mentoring, has been carried out in a wide range of K-12 environments and continues to grow in popularity. Through a review of several studies, we argue that the potential for telementoring to support deeper and more authentic school learning will not be fully realized unless researchers pay…
Mobile Active Authentication via Linguistic Modalities
2015-07-01
was cleared for public release by the DARPA Public Affairs Office and is available to the general public, including foreign nationals. Copies may be...colocation of the subjects in the study is representative of a large closed-world environment such as an organization where the unauthorized user of a...8-98) Prescribed by ANSI Std. Z39.18 29 i Contents 1 SUMMARY
ERIC Educational Resources Information Center
Stockwell, Esther
2016-01-01
This study adapted web-based exploratory tasks using WebQuests as a means of enabling students to understand and reflect on both the target and their own culture. Learners actively used various authentic resources selected to meet their linguistic and cognitive needs to complete the tasks. The aim of this study was to help Japanese university…
Operational Assessment of Tools for Accelerating Leader Development (ALD): Volume 1, Capstone Report
2009-06-01
in units and user juries provided feedback on the tools. The pressures of the operational environment seriously limited the time available to work...following functions: account set-up, user authentication, learning management , usage monitoring, problem reporting, assessment data collection, data...especially sources of data) represented—demonstration/assessment manager , operations manager , Web site experts, users (target audience), data collectors
ERIC Educational Resources Information Center
Coskun, Hilal; Dogan, Alev; Uluay, Gulsah
2017-01-01
Today, most of the researchers have agreed on the importance of classroom environment where students responsible of their own learning. It is important to use modern learning methods with technology to reach this aim in courses. The main purpose of this study is to investigate the effect of using Technology in science courses to investigate 7th…
ERIC Educational Resources Information Center
Oner, Diler
2008-01-01
In this paper, I review both mathematics education and CSCL literature and discuss how we can better take advantage of CSCL tools for developing mathematical proof skills. I introduce a model of proof in school mathematics that incorporates both empirical and deductive ways of knowing. I argue that two major forces have given rise to this…
ERIC Educational Resources Information Center
Miller, Charles; Veletsianos, George; Doering, Aaron
2008-01-01
Grounded in the theoretical approaches of experiential learning and inquiry-based learning, adventure learning (AL) is a hybrid distance education approach that seeks to transform the experiences of students by having learners explore real-world issues and pursue answers to their own questions in an authentic, anchor-based environment. In this…
ERIC Educational Resources Information Center
Mason, Katherine
2006-01-01
In an environment, in which English is a second or other language for every student, fear and anxiety affect students' learning and engagement. Yet, in spite of these concerns, students welcomed the chance to practice their spoken English in cooperative structures while learning about and engaging in their composing processes. English language…
ERIC Educational Resources Information Center
Advance CTE: State Leaders Connecting Learning to Work, 2016
2016-01-01
Work-based learning provides a continuum of activities--from career exploration and job shadowing to internships and apprenticeships--that help students develop technical and professional skills in an authentic work environment. While many work-based learning programs are designed and operated at the local level, several states have begun building…
Authentic feminist? Authenticity and feminist identity in teenage feminists' talk.
Calder-Dawe, Octavia; Gavey, Nicola
2017-12-01
This article explores how young people's feminist identities take shape in conjunction with a contemporary ideal of personal authenticity: to know and to express the 'real me'. Drawing from interviews with 18 teenagers living in Auckland, New Zealand, we examine a novel convergence of authenticity and feminism in participants' identity talk. For social psychologists interested in identity and politics, this convergence is intriguing: individualizing values such as authenticity are generally associated with disengagement with structural critique and with a repudiation of politicized and activist identities. Rather than seeking to categorize authentic feminism as an instance of either 'good/collective' or 'bad/individualized' feminist politics, we use discourse analysis to examine how the identity position of authentic feminist was constructed and to explore implications for feminist politics. On one hand, interviewees mobilized authentic feminism to affirm their commitment to normative liberal values of authenticity and self-expression. At the same time, the position of authentic feminist appeared to authorize risky feminist identifications and to justify counter-normative feelings, desires, and actions. To conclude, we explore how encountering others' intolerance of authentic feminism exposed interviewees to the limits of authenticity discourse, propelling some towards new understandings of the social world and their space for action within it. © 2017 The British Psychological Society.
Collaborative learning in gerontological clinical settings: The students' perspective.
Suikkala, Arja; Kivelä, Eeva; Käyhkö, Pirjo
2016-03-01
This study deals with student nurses' experiences of collaborative learning in gerontological clinical settings where aged people are involved as age-experts in students' learning processes. The data were collected in 2012 using the contents of students' reflective writing assignments concerning elderly persons' life history interviews and the students' own assessments of their learning experiences in authentic elder care settings. The results, analyzed using qualitative content analysis, revealed mostly positive learning experiences. Interaction and collaborative learning activities in genuine gerontological clinical settings contributed to the students' understanding of the multiple age-related and disease-specific challenges as well as the issues of functional decline that aged patients face. Three types of factors influenced the students' collaborative learning experiences in gerontological clinical settings: student-related, patient-related and learning environment-related factors. According to the results, theoretical studies in combination with collaboration, in an authentic clinical environment, by student nurses, elderly patients, representatives of the elder care staff and nurse educators provide a feasible method for helping students transform their experiences with patients into actual skills. Their awareness of and sensitivity to the needs of the elderly increase as they learn. Copyright © 2016 Elsevier Ltd. All rights reserved.
Ethical Issues in Social Media Research for Public Health.
Hunter, Ruth F; Gough, Aisling; O'Kane, Niamh; McKeown, Gary; Fitzpatrick, Aine; Walker, Tom; McKinley, Michelle; Lee, Mandy; Kee, Frank
2018-03-01
Social media (SM) offer huge potential for public health research, serving as a vehicle for surveillance, delivery of health interventions, recruitment to trials, collection of data, and dissemination. However, the networked nature of the data means they are riddled with ethical challenges, and no clear consensus has emerged as to the ethical handling of such data. This article outlines the key ethical concerns for public health researchers using SM and discusses how these concerns might best be addressed. Key issues discussed include privacy; anonymity and confidentiality; authenticity; the rapidly changing SM environment; informed consent; recruitment, voluntary participation, and sampling; minimizing harm; and data security and management. Despite the obvious need, producing a set of prescriptive guidelines for researchers using SM is difficult because the field is evolving quickly. What is clear, however, is that the ethical issues connected to SM-related public health research are also growing. Most importantly, public health researchers must work within the ethical principles set out by the Declaration of Helsinki that protect individual users first and foremost.
22 CFR 92.38 - Forms of certificate of authentication.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Forms of certificate of authentication. 92.38... SERVICES Specific Notarial Acts § 92.38 Forms of certificate of authentication. The form of a certificate of authentication depends on the statutory requirements of the jurisdiction where the authenticated...
18 CFR 375.102 - Custody and authentication of Commission records.
Code of Federal Regulations, 2010 CFR
2010-04-01
... authentication of Commission records. 375.102 Section 375.102 Conservation of Power and Water Resources FEDERAL... Provisions § 375.102 Custody and authentication of Commission records. (a) Custody of official records. (1...) Authentication of Commission action. All orders and other actions of the Commission shall be authenticated or...
ERIC Educational Resources Information Center
Bialystok, Lauren
2015-01-01
Authenticity is often touted as an important virtue for teachers. But what do we mean when we say that a teacher ought to be "authentic"? Research shows that discussions of teacher authenticity frequently refer to other character traits or simply to teacher effectiveness, but authenticity is a unique concept with a long philosophical…
Richard Peters and Valuing Authenticity
ERIC Educational Resources Information Center
Degenhardt, M. A. B.
2009-01-01
Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…
Defining the questions: a research agenda for nontraditional authentication in arms control
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hauck, Danielle K; Mac Arthur, Duncan W; Smith, Morag K
Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidencesmore » in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.« less
Do We Need to Design Course-Based Undergraduate Research Experiences for Authenticity?
Rowland, Susan; Pedwell, Rhianna; Lawrie, Gwen; Lovie-Toon, Joseph; Hung, Yu
2016-01-01
The recent push for more authentic teaching and learning in science, technology, engineering, and mathematics indicates a shared agreement that undergraduates require greater exposure to professional practices. There is considerable variation, however, in how “authentic” science education is defined. In this paper we present our definition of authenticity as it applies to an “authentic” large-scale undergraduate research experience (ALURE); we also look to the literature and the student voice for alternate perceptions around this concept. A metareview of science education literature confirmed the inconsistency in definitions and application of the notion of authentic science education. An exploration of how authenticity was explained in 604 reflections from ALURE and traditional laboratory students revealed contrasting and surprising notions and experiences of authenticity. We consider the student experience in terms of alignment with 1) the intent of our designed curriculum and 2) the literature definitions of authentic science education. These findings contribute to the conversation surrounding authenticity in science education. They suggest two things: 1) educational experiences can have significant authenticity for the participants, even when there is no purposeful design for authentic practice, and 2) the continuing discussion of and design for authenticity in UREs may be redundant. PMID:27909029
Modern technology in originality and authentication dispute on movable and detached artworks
NASA Astrophysics Data System (ADS)
Tornari, Vivi; Kouloumpi, Eleni; Koussiaki, Fotini
2013-05-01
Begin the abstract two lines below author names and addresses. The abstract summarizes key findings in the paper. It is a paragraph of 250 words or less. For the keywords, select up to 8 key terms for a search on your manuscript's subject. Precious artworks are in constant loan due to the increase demand for tour exhibitions around the globe. Archeological findings and historical parts of wallpaintings are detached and get into the route of a fraud market. Most of these detached art pieces are lost, destroyed or hidden by public view by anonymous collectors. The damage to the historical, cultural and aesthetic values is most of the times irreversible. Originality and authentication are essential properties in the identification of movable artworks provoking dispute and fraud actions endangering the long-lasting public approach to the precious but disputed works of art. Scientific community and technology developments are implemented in the battle against fraud and misinterpretation of origin through systematic and material classified studies. European projects have influenced and provoked intense research in this fragile field of modern technology applications and recent results are presented. Investigation protocols and classification needed for the standardization of valuation of these critical properties comprise an intense field of research embraced with international interest. In this paper it is presented long-lasting research effort with photonic technologies to bridge the results with the conventional means and the conservation expert opinion aiding to the identification and ensuring the origin of a masterpiece. Results from laboratory investigation and characteristic examples of paintings faced with the dispute of their authentication are given.
Becoming a Science Teacher: The Competing Pedagogies of Schools and Teacher Education
ERIC Educational Resources Information Center
Rozelle, Jeffrey J.
2010-01-01
A culminating student teaching or internship experience is a central component of nearly every teacher education program and has been for most of teacher education's history. New teachers cite field experience and student teaching as the most beneficial, authentic, or practical aspect of teacher education. Teacher educators, however, have cause to…
Shifting Authenticities in Scandinavian Music Education
ERIC Educational Resources Information Center
Dyndahl, Petter; Nielsen, Siw Graabraek
2014-01-01
There has been an ongoing tendency, taking place in the Scandinavian countries from the late 1970s onwards, to expand the repertoires and resources of music as an educational matter, an academic field, as well as an area for support and funding from cultural authorities, organisations and institutions. Here, popular music, jazz, folk music and…
Exploring Action Research as an Approach to Interactive (Participatory) Evaluation
ERIC Educational Resources Information Center
Chaudary, Imran Anjum; Imran, Shahida
2012-01-01
This investigation seeks to understand "action research" as an approach to "interactive form of evaluation". The first half of the investigation illuminates the approach with the help of the selective body of literature and the second half draws attention to its application in the field with the help of an authentic evaluation…
Learner Corpora: The Missing Link in EAP Pedagogy
ERIC Educational Resources Information Center
Gilquin, Gaetanelle; Granger, Sylviane; Paquot, Magali
2007-01-01
This article deals with the place of learner corpora, i.e. corpora containing authentic language data produced by learners of a foreign/second language, in English for academic purposes (EAP) pedagogy and sets out to demonstrate that they have a valuable contribution to make to the field. Following an initial brief introduction to corpus-based…
Culturally Responsive Pedagogy: Reflections on Mentoring by Educational Leadership Candidates
ERIC Educational Resources Information Center
Genao, Soribel
2016-01-01
Authentic field experience is an important component in educational leadership programs. This article revisits the literature examining the cultural gap that exists in public education, while taking a closer look at what it means to be a culturally responsive leader and teacher. The need to integrate culturally responsive practices to connect and…
Toad-Ally Cool Math and Science Integration
ERIC Educational Resources Information Center
Brkich, Katie; Allen, Melony; Huffling, Lacey; Matthews, Catherine
2017-01-01
"Hop to It," a week-long herpetology-focused summer STEM camp for rising fourth-, fifth-, and sixth-grade girls, provided young females with authentic, hands-on science experiences, allowing them to develop the habits of thought and processes of action used by STEM field experts while also engaging and sustaining their interest in the…
Early Childhood Investment Zones: A Learning Approach for Authentic Community Partnership
ERIC Educational Resources Information Center
Vermilya, Lois; Kerwin, Dorothy
2017-01-01
Many professionals in the early childhood field are inspired by community-driven initiatives that hold great promise for transforming outcomes for the youngest children and their families. However, most collective impact efforts are mobilized in large urban areas, where early childhood professionals and civic leaders take the lead. New Mexico has…
Creating Games as Authentic Learning in the Information Technology Classroom
ERIC Educational Resources Information Center
Frydenberg, Mark
2015-01-01
Teaching students to create computer games has become a common practice in both K-12 and tertiary education to introducing programming concepts, increasing student engagement, and recruiting majors and minors in technology fields. This study describes a project where first-year college students in an introductory technology concepts course use a…
Representing Refugee Youth in Qualitative Research: Questions of Ethics, Language and Authenticity
ERIC Educational Resources Information Center
Thorstensson Dávila, Liv
2014-01-01
This article speaks conceptually and methodologically about the ethics and politics of doing research with newcomer refugee youth and issues of representation. Feminist poststructuralist paradigms across a variety of fields have critically examined notions of experience, agency, and identity to in order to encompass more fluid understandings of…
From the One-Hour Field Trip to a Nature Preschool: Partnering with Environmental Organizations
ERIC Educational Resources Information Center
Bailie, Patti Ensel
2010-01-01
Nature education is an important part of early childhood education. As young children develop, the natural world offers concrete and authentic learning experiences. Activities focused on nature support learning in all developmental domains. Children develop physically through hiking in natural terrain, climbing hills and trees, balancing on logs,…
Digging into History: Authentic Learning through Archeology
ERIC Educational Resources Information Center
Glendinning, Matt
2005-01-01
Facts, or skills? Content, or process? Teachers of history and social studies teachers often lock horns over these questions, trying to define the nature of their field and its role in secondary education. Teachers of history often focus on content, presenting the past as a series of important people and events, an accumulated cultural lore that…
A Collectibles Project: Engaging Students in Authentic Multimodal Research and Writing
ERIC Educational Resources Information Center
Moynihan, Karen E.
2007-01-01
High school teacher Karen E. Moynihan creates a multimodal project inspired by the creative nonfiction style of "The Orchid Thief" by Susan Orlean. Students choose a collectible item and immerse themselves in the subculture of the collectors. The project includes participation in library and field research, interviews, photography and graphic…
Independent vs. Integrated Writing Tasks: A Comparison of Task Representation
ERIC Educational Resources Information Center
Plakans, Lia
2010-01-01
As the field of second language writing embraces the authenticity and meaningfulness of connecting writing with other skills, language teachers and testers require greater understanding of how writers respond to as well as compose for integrated tasks. Research on integrated tasks is critical in highlighting how integration impacts students and…
Lakota Undergraduates as Partners in Aging Research in American Indian Communities
ERIC Educational Resources Information Center
Anagnopoulos, Cheryl
2006-01-01
Studies have established the beneficial role of engaging students in research at both the graduate and undergraduate level. Authentic research experiences serve as a tool for instruction where students are actively involved in the process of discovery, the scientific method, and advancing existing fields with scientific data. Further, students…
Foregrounding Fieldwork in Leadership Preparation: The Transformative Capacity of Authentic Inquiry
ERIC Educational Resources Information Center
Perez, Lynne G.; Uline, Cynthia L.; Johnson, Joseph F., Jr.; James-Ward, Cheryl; Basom, Margaret R.
2011-01-01
This study follows leadership candidates through the first phase of a comprehensive effort to reform master's-level principal preparation at a large, urban California university. The reforms placed an 18-month field experience at the center of candidates' preparation. Researchers sought to capture the changes over time in candidates' beliefs about…
ERIC Educational Resources Information Center
Nicola-Richmond, Kelli; Richards, Kieva; Britt, Kellie
2016-01-01
Student preparation for work-integrated learning using simulated learning experiences is an under researched field in occupational therapy. In 2013 the Deakin University occupational therapy degree introduced a simulated learning experience for students aimed at preparing them for work-integrated learning experiences. The session gave students an…
ERIC Educational Resources Information Center
Creese, Angela; Blackledge, Adrian; Takhi, Jaspreet Kaur
2014-01-01
This article presents a linguistic ethnographic study of a Panjabi complementary school in Birmingham, UK. Researchers observed classes for one academic year, writing field notes, conducting interviews, and making digital audio recordings of linguistic interactions. Sets of beliefs about the production and deployment of certain linguistic signs…
Learners without Borders: Connected Learning in a Digital Third Space
ERIC Educational Resources Information Center
Moran, Clarice M.
2018-01-01
Authentic field experiences are an important aspect of most teacher education programs, yet collaboration often is difficult because of distance and limited resources. This collective case study aimed to explore the experiences of 30 ninth-grade English language arts (ELA) students and 17 preservice English education teachers as they collaborated…