Research on role-based learning technologies

被引:0
|
作者
Slator, BM [1 ]
Clark, J [1 ]
Juell, P [1 ]
McClean, P [1 ]
Saini-Eidukat, B [1 ]
Schwert, DP [1 ]
White, AR [1 ]
机构
[1] Dept Comp Sci, Fargo, ND 58105 USA
关键词
D O I
10.1109/ICALT.2001.943848
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One of the goals of science education is to familiarize students with an intellectual framework based on established scientific principles and general approaches that can later be used to solve science-based problems. Science is also content-based, and students must master the content of a discipline in order to succeed. The challenge for science educators is to develop educational tools and methods that deliver the principles but at the same time teach the important content material, but in a meaningful way. This paper describes research based on experimental virtual role-based environments built to explore the following beliefs: -educational technology should capitalize on the natural human propensity for role-playing; -students will be willing to assume roles if the environment makes it easy to do, and if the environment reinforces role-playing through careful crafting of explicit tutorial components; -that educational software should be engaging, entertaining, attractive, interactive, and flexible: in short, game-like. The experiences provided to the student within these virtual worlds can be both meaningful and authentic, although some trade-offs are required to make them fun, challenging, and occasionally unpredictable.
引用
收藏
页码:37 / 40
页数:4
相关论文
共 50 条
  • [31] Role-Based Systems are Autonomic
    Zhu, Haibin
    PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS, 2008, : 144 - 152
  • [32] Delegation in a role-based organization
    Pacheco, O
    Santos, F
    DEONTIC LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2004, 3065 : 209 - 227
  • [33] Role-based measurement of performance
    Murdoch, J
    Fernandes, KJ
    Astley, K
    INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOL 1-4, PROCEEDINGS, 2005, : 1586 - 1591
  • [34] ROLE-BASED NETWORK SECURITY
    JOLITZ, WF
    JOLITZ, LG
    DR DOBBS JOURNAL, 1995, 20 (05): : 80 - &
  • [35] Constrained role-based delegation
    Zhang, LH
    Ahn, GJ
    SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 289 - 300
  • [36] Role-based security policy
    Ma, Jianping
    Yu, Xiangxuan
    Hong, Fan
    Zhang, Jiangling
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 35 (05): : 447 - 450
  • [37] Research and Implemention of File Protection System Based on Improved Role-Based Access Control
    Ke, Gang
    Ling, Jie
    Hao, Yanjun
    Liao, Hongqi
    Yang, Zhaoxia
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 2, PROCEEDINGS, 2009, : 242 - +
  • [38] Role-based Knowledge Mapping: an Operational Decision Support Media for Research Purposes
    Moradi, Rizan
    Mirian, Maryam S.
    2014 6TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2014, : 37 - 43
  • [39] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [40] Information Diffusion Prediction with Network Regularized Role-based User Representation Learning
    Wang, Zhitao
    Chen, Chengyao
    Li, Wenjie
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2019, 13 (03)