Author image not provided
 Geoff E Skinner

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article1.37
Citation Count37
Publication count27
Publication years2001-2017
Available for download6
Average downloads per article285.17
Downloads (cumulative)1,711
Downloads (12 Months)84
Downloads (6 Weeks)8
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


27 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 27
Result page: 1 2

Sort by:

1
May 2017 Education and Information Technologies: Volume 22 Issue 3, May 2017
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 0

Open learning represents a new form of online learning where courses are provided freely online for large numbers of learners. MOOCs are examples of this form of learning. The authors see an opportunity for personalising open learning environments by adapting to learners' learning styles and providing adaptive support to meet ...
Keywords: Adaptive learning, Felder and Silverman model, Learning styles identification, MOOCs, Open learning, Web-based learning

2
January 2016 International Journal of Learning Technology: Volume 11 Issue 3, January 2016
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 0

This paper presents an adaptive framework to personalise open learning environments. The design of the framework is grounded in cognitive science and learning principles. Theories of learning styles, specifically the model of Felder and Silverman 1988, have been considered and applied, with the technology of adaptive navigation support integrated into ...
Keywords: personalisation, undergraduate students, MOOCs, adaptive navigation support, cognitive science, electronic learning, learner preferences, learning styles, massive open online courses, online learning, adaptive learning systems, e-learning, higher education, open learning environments

3
May 2015 CSEDU 2015: Proceedings of the 7th International Conference on Computer Supported Education - Volume 1
Publisher: SCITEPRESS - Science and Technology Publications, Lda
Bibliometrics:
Citation Count: 0

This paper presents an adaptive framework to personalise open learning environments. The design of the framework has been grounded in cognitive science and learning principles. The theory of learning styles, and more specifically the model of Felder and Silverman, has been considered and applied. The developed framework has two main ...
Keywords: Learning Styles, Adaptive Framework, MOOCs, Open Learning, Personalisation.

4 published by ACM
December 2014 IE2014: Proceedings of the 2014 Conference on Interactive Entertainment
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 12,   Downloads (Overall): 62

Full text available: PDFPDF
MySteps is an inspiring acronym for a novel active living framework detailed in this paper. Managing Youth Screen Time and Exercise Performance Statistics (MySteps) is a cohesive collection of Information and Communication Technologies (ICT) integrated in a unique way for specific application in the adolescent demographic health domain. Specifically, it ...
Keywords: Active Living Technologies, eHealth, Exertainment

5 published by ACM
May 2013 ACM Transactions on Internet Technology (TOIT): Volume 12 Issue 3, May 2013
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2,   Downloads (12 Months): 22,   Downloads (Overall): 327

Full text available: PDFPDF
The advent of digital environments has generated significant benefits for businesses, organizations, governments, academia and societies in general. Today, over millions of transactions take place on the Internet. Although the widespread use of digital environments has generally provided opportunities for societies, a number of threats have limited their adoption. The ...
Keywords: trust models, digital environments online communities, Trust, reputation

6 published by ACM
November 2011 MEDES '11: Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 6,   Downloads (Overall): 74

Full text available: PDFPDF
In this paper, we investigate the effectiveness and appropriateness of several existing security mechanisms for a Digital Ecosystem (DE) environment. DE is characterized as an open and dynamic environment where the interaction and collaboration between its entities are highly promoted. A major requirement to promote such intensive interaction and collaboration ...
Keywords: authorisation, digital ecosystems, access control, authentication

7 published by ACM
November 2011 MEDES '11: Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 0,   Downloads (12 Months): 6,   Downloads (Overall): 90

Full text available: PDFPDF
In this paper, we investigate the effectiveness and appropriateness of several existing trust management systems for a Digital Ecosystem (DE) environment. DE is characterized as an open and dynamic environment where the interaction and collaboration between its entities are highly promoted. A major requirement to promote such intensive interaction and ...
Keywords: trust management, digital ecosystems, distributed, trustworthiness

8
October 2011 ICA3PP'11: Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

Digital Ecosystem (DE) is characterized as an open and dynamic environment where the interaction and collaboration between its entities are highly promoted. A major requirement to promote such intensive interaction and collaboration in a DE environment is the ability to secure and uphold the confidentiality, integrity and non-repudiation of shared ...
Keywords: authentication, digital ecosystem, authorization

9
September 2009 MMACTEE'09: Proceedings of the 11th WSEAS international conference on Mathematical methods and computational techniques in electrical engineering
Publisher: World Scientific and Engineering Academy and Society (WSEAS)
Bibliometrics:
Citation Count: 1

Healthcare enterprises require the ability to respond to rapidly changing circumstances. The increasing attention to patient safety and access to efficient health care services has bought about the adoption of new identification and sensor networks technologies. These technologies are being coupled to information systems to help clarify the complex nature ...
Keywords: rfid deployment, bar codes, patient identification, medical errors

10
September 2009 ICSNC '09: Proceedings of the 2009 Fourth International Conference on Systems and Networks Communications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

The integrity and authentication of an academic transcript is vital to the prestige of aneducational organisation as well as its graduates. It is important to the organisation issuing the transcript andany future educational organisation that uses the transcript to ascertain the merit of aproposed enrolment or academic employment.The business case ...
Keywords: rfid methodology, academic transcripts, rfid deployment, radio frequency identification

11
June 2009 WSEAS Transactions on Information Science and Applications: Volume 6 Issue 6, June 2009
Publisher: World Scientific and Engineering Academy and Society (WSEAS)
Bibliometrics:
Citation Count: 3

The newly emerging concept of Digital Ecosystem (DE) has played a significant role in today's technology, especially for Small and Medium Enterprises (SMEs) to adopt Information and Communication Technology (ICT) inside their businesses. DE reveals the opportunities to enhance the productivity and efficiency of each business transaction. Therefore, it will ...
Keywords: authentication, information management, access permissions, authorization, distributed resource protection

12
March 2009 ICAI'09: Proceedings of the 10th WSEAS international conference on Automation & information
Publisher: World Scientific and Engineering Academy and Society (WSEAS)
Bibliometrics:
Citation Count: 0

The first dimension of this presentation discusses the idea of a Digital Ecosystem. Since its first introduction in 2002, the newly emerging concept of Digital Ecosystem (DE) has received increasing attention from researchers, businesses, ICT professionals and communities around the world. The DE concept utilizes an open framework infrastructure to ...

13
March 2009 ICAI'09: Proceedings of the 10th WSEAS international conference on Automation & information
Publisher: World Scientific and Engineering Academy and Society (WSEAS)
Bibliometrics:
Citation Count: 0

Resource and information protection plays a significant role in engaging the enterprises to actively participate inside a Digital Ecosystem environment. However, current developments of such security mechanisms for protecting these resources are still in their infancy. Most of the proposed protection frameworks do not provide a scalable and effective mechanism ...
Keywords: authentication, information management, access permissions, authorization, distributed resource protection

14
November 2008 ACS'08: Proceedings of the 8th conference on Applied computer scince
Publisher: World Scientific and Engineering Academy and Society (WSEAS)
Bibliometrics:
Citation Count: 2

Radio frequency identification (RFID) investigation and deployment requires a methodology for a successful initiation and implementation. This paper will outline a rationale and deployment methodology which is divided into three phases, namely the business, infrastructure and deployment environments. Progression through each environment is guided by the outcome from phase transitional ...
Keywords: RFID methodology, discretionary behaviour, RFID deployment, supply chain, business motivators

15
November 2008 ACS'08: Proceedings of the 8th conference on Applied computer scince
Publisher: World Scientific and Engineering Academy and Society (WSEAS)
Bibliometrics:
Citation Count: 0

Today's complex IT systems and multitude of possible permission configurations create a challenge for IT administrators, especially in determining optimal permission configuration for user groups. This is further exaggerated with the users' privilege requirements not being clearly specified or available. This typically leads to excessively permissive security configurations in IT ...
Keywords: excessively permissive security configurations, privilege requirements, security configurations

16
June 2008 WSEAS Transactions on Computers: Volume 7 Issue 6, June 2008
Publisher: World Scientific and Engineering Academy and Society (WSEAS)
Bibliometrics:
Citation Count: 3

Digital Collaborations are proving themselves as ideal environments for increasing the productivity and knowledge exploration capabilities of their members. Many organizations are realizing the diverse range of benefits they provide to not only their organization as a whole but also to individual employees. The challenge in environments that encourage the ...
Keywords: authentication, information privacy, data security, digital collaborations, personal identity

17
May 2008 ACC'08: Proceedings of the WSEAS International Conference on Applied Computing Conference
Publisher: World Scientific and Engineering Academy and Society (WSEAS)
Bibliometrics:
Citation Count: 0

The uptake and utility of digital collaboration's continues to grow as organizaions are realizing the diverse range of benefits they provide to not only their organization as a whole but also to individual employees. However, like many information and communication technologies the implementation push often overshadows a proper evaluation of ...
Keywords: digital collaborations, biometrics, data Security, authentication, information privacy

18
May 2008 MMACTEE'08: Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
Publisher: World Scientific and Engineering Academy and Society (WSEAS)
Bibliometrics:
Citation Count: 0

The paper details the findings of a recent research project in the realms of Information and Communication Technologies (ICT) and Innovation Management. The major issues considered by the project included: investigation of the possible inherent entrepreneurial nature of ICT; how to foster ICT innovation; and examination of the inherent difficulties ...
Keywords: technological innovation, collaboration, information and communication technology, entrepreneurship, technical creativity

19
November 2007 ACS'07: Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7
Publisher: World Scientific and Engineering Academy and Society (WSEAS)
Bibliometrics:
Citation Count: 3

In order to sustain privacy in digital collaborative environments a comprehensive multidimensional privacy protecting framework is required. Such information privacy solutions for collaborations must incorporate environmental factors and influences in order to provide a holistic information privacy solution. Our Technical, Legal, and Community Privacy Protecting (TLC-PP) framework addresses the problems ...
Keywords: manual privacy management (MPM), community observed privacy (COP), privacy evaluator module (PEM), TLC-PP, information privacy

20
November 2007 COLCOM '07: Proceedings of the 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 3

In order to preserve privacy in electronic collaborative environments a comprehensive multidimensional privacy protecting framework is required. Such information privacy and personal data management solutions for collaborations must incorporate a number of factors and influences in order to provide a holistic information privacy solution. Our Technical, Legal, and Community Privacy ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us