SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Rönkkö Kari) "

Sökning: WFRF:(Rönkkö Kari)

  • Resultat 11-20 av 53
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
11.
  • Faraon, Montathar, et al. (författare)
  • Design av AI-drivna praktiker för högre utbildning
  • 2024
  • Ingår i: Högskolepedagogisk debatt. - : Kristianstad University Press. - 2000-9216. ; 2024:1, s. 11-19
  • Tidskriftsartikel (övrigt vetenskapligt/konstnärligt)abstract
    • Artikeln diskuterar hur man skulle kunna utforma en design för AI-praktiker i högre utbildning. En utgångspunkt är att lärare vid högskolorna har haft tillgång till hjälpmedel för att identifiera textöverlappning men idag inte har motsvarande tillgång till tjänster som identifierar AI-genererade texter. Författarna ger exempel på sådana tjänster som finns eller är under utveckling och antar att de snart kommer att vara lika accepterade och använda som textjämförelsetjänster. Texten ställer bland annat frågan om användningen av AI kan leda till att studenternas fokus förskjuts från lärande till teknikanvändning och diskuterar även vem som bör ansvara för utformningen av högre utbildning. Är det de stora företagen som utvecklar AI-tjänster eller vi som arbetar inom högre undervisning? I slutet av artikeln diskuterar författarna möjligheten att utveckla Blooms taxonomi till en digital taxonomi. Syftet är att tydliggöra hur olika verktyg kan användas på olika nivåer, vilket kan vara ett sätt att skapa och utformaAI-drivna metoder och strategier.
  •  
12.
  • Faraon, Montathar, et al. (författare)
  • Learning by coding : A sociocultural approach to teaching web development in higher education
  • 2020
  • Ingår i: Education and Information Technologies. - : Springer Science and Business Media LLC. - 1360-2357 .- 1573-7608. ; 25:3, s. 1759-1783
  • Tidskriftsartikel (refereegranskat)abstract
    • As information technology continues to evolve rapidly in society, coding skills become increasingly essential to develop. The purpose of this article is to examine differences between the learner-centered and sociocultural approaches when teaching and learning coding in higher education. A quasi-experiment was applied over six academic semesters evaluating the mentioned approaches in terms of students' explicit attitudes, grades, and course evaluations. The findings indicated that the sociocultural approach may be a viable alternative to the learner-centered approach. More specifically, students indicated a preference for the sociocultural approach over the learner-centered approach, a greater number of students who passed the courses were educated via the sociocultural approach, and overall satisfaction was significantly higher for this approach as well. While the sociocultural approach has demonstrated to be advantageous, its integration in courses must concurrently be carefully balanced against constraints that teachers continuously experience in higher education, such as time and resources, which presents a challenge to the design of courses and to academia at large.
  •  
13.
  • Faraon, Montathar, et al. (författare)
  • Sociocultural pedagogy and digital transformation of higher education beyond the COVID-19 pandemic
  • 2022
  • Konferensbidrag (refereegranskat)abstract
    • This article draws attention to the need for a structured sociocultural pedagogical model supported by a novel digital education platform to meet the needs of Millennials and Generation Z in higher-education. Societal advances and the COVID-19 pandemic have accelerated the digital transformation of higher education and shown a need to go beyond existing teacher- and learner-centered approaches to supplement face-to-face instruction. Developing a structured sociocultural pedagogical model supported by a novel digital education platform has the potential to strengthen the cooperation and mobility of educators and learners in higher education.
  •  
14.
  •  
15.
  •  
16.
  • Johansson, Conny, et al. (författare)
  • Commitment as an Underlying Principle for Learning
  • 2004
  • Konferensbidrag (refereegranskat)abstract
    • The prevailingmodel of software development on which most educational programs are based is in conflict with general practice in industry. As following paper demonstrates Software Engineering education lacks an approach to teach the skills needed to master coalitions of existing recourses that are hard to control. In order to prepare students to handle unpredictable, non-technical and moving targets, an adequate curriculum is needed. Since 1990 software engineering education at Blekinge Institute of Technology has used commitment as the underlying principle for learning. This principle has made it possible to address the discrepancies between education and industry. This paper describes and evaluates our experience of using six elements of commitment in the education of software engineers.
  •  
17.
  • Johansson, Michael, et al. (creator_code:cre_t)
  • Att vandra med andra : Fotoböcker Gamlegården
  • 2023
  • Konstnärligt arbete (refereegranskat)abstract
    • Städer växer snabbt och en sådan tillväxt kräver att beslutsfattare och chefer fattar kloka beslut om tex markanvändning, transportsystem och rumslig layout. När städer växer och byggs om, blir det lika viktigt att minimera negativ miljöpåverkan som att säkerställa goda boendemöjligheter och jämlikhet för människor i staden. Denna typ av utmanande krav kan inte kommuner hantera enbart inom sin interna organisations. Intressenter och medborgares deltagande i beslutsfattande och förbättring av utformning och leverans av offentliga tjänster blir nödvändig. Med ökad urbanisering engagerar alltfler stadsstyrelser hållbara utvecklingsprojekt som syftar till att skapa urbana rum där välbefinnande främjas genom nya former av styrning och större ekonomisk, social och miljömässig hållbarhet. Detta gäller också Kristianstads kommun (region Skåne, Sverige) som initierade projektet “Klimatsmart Näsby”. Projektet sträckte sig över 2 och ett halvt år (från 1 januari 2021 till 28 februari 2023). Projektet bedrevs i ett samarbetsformat mellan Kristianstads kommun, Krinova Science & Incubator Park och Högskolan Kristianstad. Projektet finansieras av EU:s regionala utvecklingsfond och de tre partnerna. Där vi från HKR som presenterar denna utställning hade rollen att utforska hur medborgare kan involveras i denna typ av förändringsarbete. Att "vandra med andra" blev vår bärande designmetod för att inkludera det sociala ur ett medborgarperspektiv utifrån den situation som råder specifikt i Näsby och Gamlegården i Kristianstad - vilket också utställningen är ämnad att spegla.
  •  
18.
  • Larsson, Stefan, et al. (författare)
  • Law, Norms, Piracy and Online Anonymity – Practices of de-identification in the global file sharing community
  • 2012
  • Ingår i: Journal of Research in Interactive Marketing: Special Issue on Digital Piracy. - : Emerald. - 2040-7130. ; 6:4, s. 260-280
  • Tidskriftsartikel (refereegranskat)abstract
    • Purpose The purpose of this study is to better understand online anonymity in the global file-sharing community in the context of social norms and copyright law. The study describes the respondents in terms of use of Virtual Private Networks (VPNs) or similar services with respect to age, gender, geographical location, as well as analysing the correlation with file-sharing frequencies. Design/methodology/approach This study, to a large extent, collected descriptive data through a web-based survey. This was carried out in collaboration with the BitTorrent tracker The Pirate Bay (TPB), which allowed us to link the survey from the main logo of their site. In 72 hours, we received over 75,000 responses, providing the opportunity to compare use of anonymity services with factors of age, geographical region, file-sharing frequency, etc. Findings Overall, 17.8 per cent of the respondents used a VPN or similar service (free or paid). A core of high-frequency uploaders is more inclined to use VPNs or similar services than the average file sharer. Online anonymity practices in the file-sharing community depend on how legal and social norms correlate (more enforcement means more anonymity). Research limitations/implications The web-based survey was in English and mainly attracted visitors on The Pirate Bay’s web site. This means that it is likely that those who do not have the language skills necessary were excluded from the survey. Practical implications This study adds to the knowledge of online anonymity practices in terms of traceability and identification, and therefore describes some of the conditions for legal enforcement in a digital environment. Social implications This study adds to the knowledge of how the Internet is changing in terms of a polarization between stronger means of legally enforced identification and a growing awareness of how to be more untraceable. Originality/value The scale of the survey, with over 75,000 respondents from most parts of the world, has likely not been seen before on this topic. The descriptive study of anonymity practices in the global file-sharing community is therefore likely unique.
  •  
19.
  • Petersen, Kai, et al. (författare)
  • The impact of time controlled reading on software inspection effectiveness and efficiency : a controlled experiment
  • 2008
  • Konferensbidrag (refereegranskat)abstract
    • Reading techniques help to guide reviewers during individual software inspections. In this experiment, we completely transfer the principle of statistical usage testing to inspection reading techniques for the first time. Statistical usage testing relies on a usage profile to determine how intensively certain parts of the system shall be tested from the users' perspective. Usage-based reading applies statistical usage testing principles by utilizing prioritized use cases as a driver for inspecting software artifacts (e.g., design). In order to reflect how intensively certain use cases should be inspected, time budgets are introduced to usage-based reading where a maximum inspection time is assigned to each use case. High priority use cases receive more time than low priority use cases. A controlled experiment is conducted with 23 Software Engineering M.Sc. students inspecting a design document. In this experiment, usage-based reading without time budgets is compared with time controlled usage-based reading. The result of the experiment is that time budgets do not significantly improve inspection performance. In conclusion, it is sufficient to only use prioritized use cases to successfully transfer statistical usage testing to inspections.
  •  
20.
  • Petersen, Kai, et al. (författare)
  • The impact of time controlled reading on software inspection effectiveness and efficiency a controlled experiment
  • 2008
  • Ingår i: ESEM'08. - : ASSOC COMPUTING MACHINERY. ; , s. 139-148
  • Konferensbidrag (refereegranskat)abstract
    • Reading techniques help to guide reviewers during individual software inspections. In this experiment, we completely transfer the principle of statistical usage testing to inspection reading techniques for the first time. Statistical usage testing relies on a usage profile to determine how intensively certain parts of the system shall be tested from the users' perspective. Usage-based reading applies statistical usage testing principles by utilizing prioritized use cases as a driver for inspecting software artifacts (e.g., design). In order to reflect how intensively certain use cases should be inspected, time budgets are introduced to usage-based reading where a maximum inspection time is assigned to each use case. High priority use cases receive more time than low priority use cases. A controlled experiment is conducted with 23 Software Engineering M.Sc. students inspecting a design document. In this experiment, usage-based reading without time budgets is compared with time controlled usage-based reading. The result of the experiment is that time budgets do not significantly improve inspection performance. In conclusion, it is sufficient to only use prioritized use cases to successfully transfer statistical usage testing to inspections.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 11-20 av 53
Typ av publikation
konferensbidrag (22)
tidskriftsartikel (12)
rapport (5)
bokkapitel (4)
bok (3)
doktorsavhandling (3)
visa fler...
konstnärligt arbete (2)
samlingsverk (redaktörskap) (1)
licentiatavhandling (1)
visa färre...
Typ av innehåll
refereegranskat (35)
övrigt vetenskapligt/konstnärligt (17)
populärvet., debatt m.m. (1)
Författare/redaktör
Rönkkö, Kari (52)
Svensson, Måns (10)
Winter, Jeff (8)
Hellman, Mats (8)
Dittrich, Yvonne (7)
Johansson, Michael (6)
visa fler...
Argento, Daniela (5)
Imre, Özgün (5)
Larsson, Stefan (4)
Faraon, Montathar (4)
Bergman, Anna-Karin (3)
De Kaminski, Marcin (3)
Åström, Fredrik (3)
Danielsson, Pernilla (3)
Rosengren, Calle (3)
Lindeberg, Olle (3)
Wohlin, Claes (2)
Petersen, Kai (2)
Alkan Olsson, Johann ... (2)
Svensson, Lupita (2)
Eriksson, Jeanette (2)
Wetterstrand, Martin (2)
Olsson, Johanna Alka ... (2)
Carlsson, Hanna (2)
Hansson, Christina (2)
Winter, Jeff, 1959- (2)
Ådahl, Kerstin (2)
Åberg, Kristoffer (2)
Rissanen, Mikko (2)
Prikladnicki, Rafael (1)
Urinboyev, Rustam (1)
Karlsson, Staffan (1)
Pettersson, Mårten (1)
Freij, Maria (1)
Johansson, Conny (1)
Wiberg, Mikael, 1974 ... (1)
Ramberg, Robert (1)
Baier, Matthias (1)
Gencel, Cigdem (1)
Olsson Möller, Ulrik ... (1)
Randall, Dave (1)
De Kaminsky, Marcin (1)
Dyba, Tore (1)
Seaman, Carolyn (1)
Sillito, Jonathan (1)
Faraon, Montathar, 1 ... (1)
Granlund, Veronica (1)
Johansson, Michael, ... (1)
Spikol, Daniel, Asso ... (1)
Nivestam, Anna (1)
visa färre...
Lärosäte
Blekinge Tekniska Högskola (27)
Högskolan Kristianstad (22)
Lunds universitet (6)
Linnéuniversitetet (6)
Umeå universitet (1)
Stockholms universitet (1)
visa fler...
Malmö universitet (1)
visa färre...
Språk
Engelska (45)
Svenska (8)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (33)
Samhällsvetenskap (20)
Teknik (2)
Medicin och hälsovetenskap (1)
Humaniora (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy