This paper provides a summary account of Activity-Centred Analysis and Design (ACAD). ACAD offers a practical approach to analysing complex learning situations, in a way that can generate knowledge that is reusable in subsequent (re)design work. ACAD has been developed over the last two decades. It has been tested and refined through collaborative analyses of a large number of complex learning situations and through research studies involving experienced and inexperienced design teams. The paper offers a definition and high level description of ACAD and goes on to explain the underlying motivation. The paper also provides an overview of two current areas of development in ACAD: the creation of explicit design rationales and the ACAD toolkit for collaborative design meetings. As well as providing some ideas that can help teachers, design teams and others discuss and agree on their working methods, ACAD has implications for some broader issues in educational technology research and development. It questions some deep assumptions about the framing of research and design thinking, in the hope that fresh ideas may be useful to people involved in leadership and advocacy roles in the field.
Y. Liang, S. Ke, J. Zhang, X. Yi, and Y. Zheng. Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, International Joint Conferences on Artificial Intelligence Organization, (July 2018)
A. Vovk, D. Gasques, F. Wild, and N. Weibel. Proceedings of the 2019 CHI Conference Extended Abstracts on Human Factors in Computing Systems, New York, NY, USA, ACM, (2019)Workshop.
L. Morency, S. Oviatt, S. Scherer, N. Weibel, and M. Worsley. Proceedings of the 15th ACM on International Conference on Multimodal Interaction, page 373--378. New York, NY, USA, ACM, (2013)Workshop.
M. Griselda. International Journal of Trend in Scientific Research and Development, Special Issue (2nd International Congress of Engineering):
P26 - P32(October 2017)
H. TARIQ, W. YANG, I. HAMEED, B. AHMED, and R. KHAN. IJIRIS:: International Journal of Innovative Research Journal in Information Security, Volume IV (Issue XII):
01-07(December 2017)1 Hugh A. Chipman, Edward I. George, and Robert E. McCulloch. “Bayesian CART Model Search.” Journal of the American Statistical Association, Vol. 93(443), pp 935–948, September 1998. 2 Sujata Garera, Niels Provos, Monica Chew, and Aviel D. Rubin. “A framework for detection and measurement of phishing attacks.” In Proceedings of the 2007 ACM workshop on Recurring malicious code - WORM ’07, page 1, 2007. 3 Abhishek Gattani, AnHai Doan, Digvijay S. Lamba, NikeshGarera, Mitul Tiwari, Xiaoyong Chai, Sanjib Das, Sri Subramaniam, AnandRajaraman, and VenkyHarinarayan. “Entity extraction, linking, classifica- tion, and tagging for social media.” Proceedings of the VLDB Endowment, Vol. 6(11), pp 1126–1137, August 2013. 4 David D. Lewis. Naive (Bayes) at forty: The independence assumption in information retrieval. pages 4–15. 1998. 5 Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker. “Learning to detect malicious URLs.” ACM Transactions on Intelligent Systems and Technology, Vol. 2(3), pp 1–24, April 2011. 6 FadiThabtah Maher Aburrous, M.A.Hossain, KeshavDahal. “Intelligent phishing detection system for e-banking using fuzzy data mining.” Expert Systems with Applications, Vol. 37(12), pp 7913–7921, Dec 2010. 7 AnkushMeshram and Christian Haas. “Anomaly Detection in Industrial. Networks using Machine Learning: A Roadmap.” In Machine Learning for Cyber Physical Systems, pages 65–72. Springer Berlin Heidelberg, Berlin, Heidelberg, 2017. 8 Xuequn Wang Nik Thompson,Tanya Jane McGill. “Security begins at home: Determinants of home computer and mobile device security behavior.” Computers & Security, Vol. 70, pp 376–391, Sep 2017. 9 Dan Steinberg and Phillip Colla. “CART: Classification and Regression Trees.” The Top Ten Algorithms in Data Mining, pp 179–201, 2009. 10 D. Teal. “Information security techniques including detection, interdiction and/or mitigation of memory injection attacks,” Google patents. Oct 2013. 11 Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, and Dawn Song. “Design and Evaluation of a Real-Time URL Spam Filtering Service.” In 2011 IEEE Symposium on Security and Privacy, pp 447–462. May 2011. 12 Sean Whalen, Nathaniel Boggs, and Salvatore J. Stolfo. “Model Aggregation for Distributed Content Anomaly Detection.” In Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop - AISec ’14, pp 61–71, New York, USA, 2014. ACM Press. 13 Ying Yang and Geoffrey I. Webb. “Discretization for Naive-Bayes learning: managing a discretization bias and variance.” Machine Learning, Vol. 74(1), pp 39–74, Jan 2009..
A. Labuhn, B. Zimmerman, and M. Hasselhorn. Metacognition and Learning, 5; Jg. 2010 (2):
173-194(2010)Methodology: experimental study ; Journal Article, Literature: English ; Quelldatenbank: EBPSYX.
M. Rashid, U. Uzma-Muhmood, and A. Ayse-Gulmez. Proceedings of the 9th WSEAS international conference on Distance
learning and web engineering, page 29 -- 37. Stevens Point, Wisconsin, USA; WSEAS, World Scientific and Engineering Academy and Society, (2009)
I. Jonyer, and A. Himes. Proceedings of the Nineteenth International Florida
Artificial Intelligence Research Society Conference, page 556--561. Melbourne Beach, Florida, USA, American Association for Artificial Intelligence, (May 2006)
M. Crepinsek, M. Mernik, B. Bryant, F. Javed, and A. Sprague. Electronic Notes in Theoretical Computer Science, 141 (4):
99--116(12 December 2005)Proceedings of the Fifth Workshop on Language
Descriptions, Tools, and Applications (LDTA 2005).
C. Clack, J. Farringdon, P. Lidwell, and T. Yu. Research Note, RN/96/48. University College London, Computer Science, Gower Street, London, WC1E 6BT, UK, (June 1996)
S. Card, and C. Mohan. GECCO 2006: Proceedings of the 8th annual conference
on Genetic and evolutionary computation, 2, page 1587--1588. Seattle, Washington, USA, ACM Press, (8-12 July 2006)
A. Almal, A. Mitra, R. Datar, P. Lenehan, D. Fry, R. Cote, and W. Worzel. GECCO 2006: Proceedings of the 8th annual conference
on Genetic and evolutionary computation, 1, page 239--246. Seattle, Washington, USA, ACM Press, (8-12 July 2006)