Research on role-based learning technologies

被引:0
|
作者
Slator, BM [1 ]
Clark, J [1 ]
Juell, P [1 ]
McClean, P [1 ]
Saini-Eidukat, B [1 ]
Schwert, DP [1 ]
White, AR [1 ]
机构
[1] Dept Comp Sci, Fargo, ND 58105 USA
关键词
D O I
10.1109/ICALT.2001.943848
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One of the goals of science education is to familiarize students with an intellectual framework based on established scientific principles and general approaches that can later be used to solve science-based problems. Science is also content-based, and students must master the content of a discipline in order to succeed. The challenge for science educators is to develop educational tools and methods that deliver the principles but at the same time teach the important content material, but in a meaningful way. This paper describes research based on experimental virtual role-based environments built to explore the following beliefs: -educational technology should capitalize on the natural human propensity for role-playing; -students will be willing to assume roles if the environment makes it easy to do, and if the environment reinforces role-playing through careful crafting of explicit tutorial components; -that educational software should be engaging, entertaining, attractive, interactive, and flexible: in short, game-like. The experiences provided to the student within these virtual worlds can be both meaningful and authentic, although some trade-offs are required to make them fun, challenging, and occasionally unpredictable.
引用
收藏
页码:37 / 40
页数:4
相关论文
共 50 条
  • [41] Research on Security Status Recovery in Temporal Role-Based Access Control System
    Yu Wanjun
    Wang Yong
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 27 - 29
  • [42] Role-based Log Analysis Applying Deep Learning for Insider Threat Detection
    Zhang, Dongxue
    Zheng, Yang
    Wen, Yu
    Xu, Yujue
    Wang, Jingchuo
    Yu, Yang
    Meng, Dan
    PROCEEDINGS OF THE 1ST WORKSHOP ON SECURITY-ORIENTED DESIGNS OF COMPUTER ARCHITECTURES AND PROCESSORS (SECARCH'18), 2018, : 18 - 20
  • [43] Role-based federated learning exploiting IPFS for privacy enhancement in IoT environment
    Kim, Hyowon
    Heo, Gabin
    Doh, Inshil
    COMPUTER NETWORKS, 2025, 263
  • [44] The application research of role-based access control model in workflow management system
    Wang, BY
    Zhang, SM
    Xia, XD
    GRID AND COOPERATIVE COMPUTING, PT 2, 2004, 3033 : 1034 - 1037
  • [45] Research on Role-based Access Control in IPv6 Smart Home
    Cui, Bo
    Lan, Zhikun
    Bai, Xiangyu
    PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019), 2019, : 205 - 208
  • [46] Role-based Runtime Model Synchronization
    Werner, Christopher
    Schoen, Hendrik
    Kuehn, Thomas
    Goetz, Sebastian
    Assmann, Uwe
    44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, : 306 - 313
  • [47] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [48] Experiences and perspectives of a role-based IdM
    Ritter, Christopher
    Hildmann, Thomas
    Kao, Odej
    Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), 2010, P-166 : 83 - 92
  • [49] Role-Based Generic Model Refactoring
    Heimann, Jan
    Seifert, Mirko
    Assmann, Uwe
    MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, PT II, 2010, 6395 : 78 - 92
  • [50] Role-based access control in DCOM
    Ahn, GJ
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184