The research described here presents an approach to gamification for the classroom. The purpose of this paper is to determine whether students would perceive the gamification activities in a positive light. Previous research has contended that students need a positive mental attitude for effective learning. The core question was to examine student attitudes to gamification, not the success of the gamification itself.
Based on a survey of the gamification literature, and particularly drawing on the work of Groh (2012), this system is designed with three key principles in mind: relatedness, competence and autonomy. Classroom activities and associated software were designed and implemented. Almost 200 students were surveyed to determine their attitude to the gamification. The survey included both Likert-scale and qualitative responses.
A majority of the students reported that they found the gamification useful and enjoyable, only a minority of students (around 15 per cent) disagreeing with such statements. However, only a minority of students perceived a relationship between the gamification activities and games. The authors conclude that well-designed gamification systems can be well-received by students and suggest that the success of gamification projects may not lie in their ability to recreate the experience of a video game, but in the strength of the relatedness, competence and autonomy of the student experience.
The research is limited by the nature of the participants, who were drawn from videogame and media units and who may be predisposed to game-like activities.
This research demonstrates that students are able to perceive value in gamification in the classroom.
President Bill Clinton has had many opponents and enemies, most of whom come from the political right wing. Clinton supporters contend that these opponents, throughout the…
President Bill Clinton has had many opponents and enemies, most of whom come from the political right wing. Clinton supporters contend that these opponents, throughout the Clinton presidency, systematically have sought to undermine this president with the goal of bringing down his presidency and running him out of office; and that they have sought non‐electoral means to remove him from office, including Travelgate, the death of Deputy White House Counsel Vincent Foster, the Filegate controversy, and the Monica Lewinsky matter. This bibliography identifies these and other means by presenting citations about these individuals and organizations that have opposed Clinton. The bibliography is divided into five sections: General; “The conspiracy stream of conspiracy commerce”, a White House‐produced “report” presenting its view of a right‐wing conspiracy against the Clinton presidency; Funding; Conservative organizations; and Publishing/media. Many of the annotations note the links among these key players.
This chapter draws on feminist theorizing on rape culture and victim blaming, and proposes a concept, racialized victim blaming, as a useful tool for understanding…
This chapter draws on feminist theorizing on rape culture and victim blaming, and proposes a concept, racialized victim blaming, as a useful tool for understanding discourse on state violence.
The concept of racialized victim blaming is applied to historically analyze the genesis of the carceral state, and deconstruct public debates on police shootings and immigration crises.
This chapter argues that racialized victim blaming is used as a discursive tool to legitimize and mystify state violence projects. Officials and the media use racialized logics and narratives to blame the victims of state violence for their own suffering, justifying continued or increased state violence.
The concept of victim blaming is most often associated with violence against women. Here I demonstrate that victim blaming is also a useful tool for understanding state violence, particularly when attention is given to the place of racializing narratives.
As the field of history expands with each passing decade, so does the number of reference works on historical events. Many fine reference works have been released in recent years, and the following is an annotated list of some of those that librarians ought to consider purchasing. The materials included were published in the decade beginning with the American Bicentennial. The scope of the bibliography is also limited to certain subjects deemed appropriate by the author, and excludes a number of excellent works that were considered too limited (bibliographies of individuals, for example), even though they might well be proper purchases for a library's reference collection. Also excluded, generally, are those works that are revisions of earlier works. The range of subjects included within the larger context of “American history” is somewhat dependent on the materials actually published, and the author has attempted to select only those materials that have received favorable reviews.
Since the first Volume of this Bibliography there has been an explosion of literature in all the main areas of business. The researcher and librarian have to be able to…
Since the first Volume of this Bibliography there has been an explosion of literature in all the main areas of business. The researcher and librarian have to be able to uncover specific articles devoted to certain topics. This Bibliography is designed to help. Volume III, in addition to the annotated list of articles as the two previous volumes, contains further features to help the reader. Each entry within has been indexed according to the Fifth Edition of the SCIMP/SCAMP Thesaurus and thus provides a full subject index to facilitate rapid information retrieval. Each article has its own unique number and this is used in both the subject and author index. The first Volume of the Bibliography covered seven journals published by MCB University Press. This Volume now indexes 25 journals, indicating the greater depth, coverage and expansion of the subject areas concerned.
Effective and risk‐free operation of modern information systems relies heavily on security practices and overall information security management. Usually, organizations…
Effective and risk‐free operation of modern information systems relies heavily on security practices and overall information security management. Usually, organizations perform risk analysis in order to adjust their security practices and controls to an acceptable level of risk. One of the various outputs of a risk analysis is a set of recommended practices expressed in high‐level statements of a natural language. In order to be applied to the real world, it is necessary to technically implement those requirements tailored to the specific organizational context. This is usually performed by experienced individuals. For this technical implementation and the configuration of the information technology facilities, several formal policy languages exist, which define access control policies, roles and responsibilities. This paper describes requirements for a software tool that could assist in the transition from high‐level security requirements to a formal, well‐defined policy language. Such a tool would provide valuable assistance and support in both policy implementation and overall security management.
I’ll give it to you as I remember it … a sequence of things that did all happen within a period. So, it’s my recollection of them.1